Skip to content

Commit bfd04c8

Browse files
Merge pull request #233271 from SanDeo-MSFT/patch-114
Update authentication-conditional-access.md
2 parents ce3deba + 1a7da02 commit bfd04c8

File tree

3 files changed

+11
-11
lines changed

3 files changed

+11
-11
lines changed

articles/active-directory/conditional-access/howto-conditional-access-policy-authentication-strength-external.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 10/12/2022
9+
ms.date: 04/03/2023
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -65,7 +65,7 @@ Use the following steps to create a Conditional Access policy that applies an au
6565

6666
<!---![Screenshot showing where to select guest and external user types.](media/howto-conditional-access-policy-authentication-strength-external/assignments-external-user-types.png)--->
6767

68-
1. Select the types of [guest or external users](../external-identities/authentication-conditional-access.md#assigning-conditional-access-policies-to-external-user-types-preview) you want to apply the policy to.
68+
1. Select the types of [guest or external users](../external-identities/authentication-conditional-access.md#assigning-conditional-access-policies-to-external-user-types) you want to apply the policy to.
6969

7070
1. Under **Exclude**, select **Users and groups** and choose your organization's emergency access or break-glass accounts.
7171
1. Under **Cloud apps or actions**, under **Include** or **Exclude**, select any applications you want to include in or exclude from the authentication strength requirements.

articles/active-directory/external-identities/authentication-conditional-access.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 10/12/2022
9+
ms.date: 04/03/2023
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -72,10 +72,7 @@ The following diagram illustrates the flow when email one-time passcode authenti
7272

7373
Organizations can enforce [Conditional Access](../conditional-access/overview.md) policies for external B2B collaboration and B2B direct connect users in the same way that they’re enabled for full-time employees and members of the organization. With the introduction of cross-tenant access settings, you can also trust MFA and device claims from external Azure AD organizations. This section describes important considerations for applying Conditional Access to users outside of your organization.
7474

75-
### Assigning Conditional Access policies to external user types (preview)
76-
77-
> [!NOTE]
78-
> This section describes a preview feature of Azure Active Directory. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
75+
### Assigning Conditional Access policies to external user types
7976

8077
When configuring a Conditional Access policy, you have granular control over the types of external users you want to apply the policy to. External users are categorized based on how they authenticate (internally or externally) and their relationship to your organization (guest or member).
8178

@@ -86,6 +83,9 @@ When configuring a Conditional Access policy, you have granular control over the
8683
- **Service provider users** - Organizations that serve as cloud service providers for your organization (the isServiceProvider property in the Microsoft Graph [partner-specific configuration](/graph/api/resources/crosstenantaccesspolicyconfigurationpartner) is true).
8784
- **Other external users** - Applies to any users who don't fall into the categories above, but who are not considered internal members of your organization, meaning they don't authenticate internally via Azure AD, and the user object created in the resource Azure AD directory does not have a UserType of Member.
8885

86+
>[!NOTE]
87+
> The "All guest and external users" selection has now been replaced with "Guest and external users" and all its sub types. For customers who previously had a Condtional Access policy with "All guest and external users" selected will now see "Guest and external users" along with all sub types being selected. This change in UX does not have any functional impact on how policy is evaluated by Conditional Access backend. The new selection provides customers the needed granularity to choose specifc types of guest and external users to include/exclude from user scope when creating their Conditional Access policy.
88+
8989
Learn more about [Conditional Access user assignments](../conditional-access/concept-conditional-access-users-groups.md).
9090

9191
### Comparing External Identities Conditional Access policies
@@ -171,7 +171,7 @@ The following PowerShell cmdlets are available to *proof up* or request MFA regi
171171

172172
[Authentication strength](https://aka.ms/b2b-auth-strengths) is a Conditional Access control that lets you define a specific combination of multifactor authentication (MFA) methods that an external user must complete to access your resources. This control is especially useful for restricting external access to sensitive apps in your organization because you can enforce specific authentication methods, such as a phishing-resistant method, for external users.
173173

174-
You also have the ability to apply authentication strength to the different types of [guest or external users](#assigning-conditional-access-policies-to-external-user-types-preview) that you collaborate or connect with. This means you can enforce authentication strength requirements that are unique to your B2B collaboration, B2B direct connect, and other external access scenarios.
174+
You also have the ability to apply authentication strength to the different types of [guest or external users](#assigning-conditional-access-policies-to-external-user-types) that you collaborate or connect with. This means you can enforce authentication strength requirements that are unique to your B2B collaboration, B2B direct connect, and other external access scenarios.
175175

176176
Azure AD provides three [built-in authentication strengths](https://aka.ms/b2b-auth-strengths):
177177

@@ -282,4 +282,4 @@ For more information, see the following articles:
282282
- [What is Azure AD B2B collaboration?](./what-is-b2b.md)
283283
- [Identity Protection and B2B users](../identity-protection/concept-identity-protection-b2b.md)
284284
- [External Identities pricing](https://azure.microsoft.com/pricing/details/active-directory/external-identities/)
285-
- [Frequently Asked Questions (FAQs)](./faq.yml)
285+
- [Frequently Asked Questions (FAQs)](./faq.yml)

articles/active-directory/external-identities/b2b-tutorial-require-mfa.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: tutorial
9-
ms.date: 02/03/2023
9+
ms.date: 04/03/2023
1010

1111
ms.author: cmulligan
1212
author: csmulligan
@@ -84,7 +84,7 @@ To complete the scenario in this tutorial, you need:
8484
1. On the **Conditional Access** page, in the toolbar on the top, select **New policy**.
8585
1. On the **New** page, in the **Name** textbox, type **Require MFA for B2B portal access**.
8686
1. In the **Assignments** section, choose the link under **Users and groups**.
87-
1. On the **Users and groups** page, choose **Select users and groups**, and then choose **Guest or external users**. You can assign the policy to different [external user types](authentication-conditional-access.md#assigning-conditional-access-policies-to-external-user-types-preview), built-in [directory roles](../conditional-access/concept-conditional-access-users-groups.md#include-users), or users and groups.
87+
1. On the **Users and groups** page, choose **Select users and groups**, and then choose **Guest or external users**. You can assign the policy to different [external user types](authentication-conditional-access.md#assigning-conditional-access-policies-to-external-user-types), built-in [directory roles](../conditional-access/concept-conditional-access-users-groups.md#include-users), or users and groups.
8888

8989
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-user-access.png" alt-text="Screenshot showing selecting all guest users.":::
9090

0 commit comments

Comments
 (0)