Skip to content

Commit c2bd8ec

Browse files
committed
B2B direct connect
1 parent 6d0bd73 commit c2bd8ec

File tree

6 files changed

+39
-16
lines changed

6 files changed

+39
-16
lines changed

articles/active-directory/external-identities/authentication-conditional-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 03/01/2022
9+
ms.date: 03/21/2022
1010

1111
ms.author: mimart
1212
author: msmimart

articles/active-directory/external-identities/b2b-direct-connect-overview.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 03/01/2022
9+
ms.date: 03/21/2022
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -81,7 +81,7 @@ Fabrikam will also need to configure their outbound cross-tenant access settings
8181

8282
## Authentication
8383

84-
In a B2B direct connect scenario, authentication involves a user from an Azure AD organization attempting to sign in to a file or app in the external resource tenant. The user signs in with Azure AD credentials from their home tenant. The sign-in attempt is evaluated against cross-tenant access settings in both the external tenant and the resource tenant. If all access requirements are met, a token is issued to the user that allows the user to access the resource. This token is valid for 1 hour.
84+
In a B2B direct connect scenario, authentication involves a user from an Azure AD organization (the user's home tenant) attempting to sign in to a file or app in another Azure AD organization (the resource tenant). The user signs in with Azure AD credentials from their home tenant. The sign-in attempt is evaluated against cross-tenant access settings in both the user's home tenant and the resource tenant. If all access requirements are met, a token is issued to the user that allows the user to access the resource. This token is valid for 1 hour.
8585

8686
For details about how authentication works in a cross-tenant scenario with Conditional Access policies, see [Authentication and Conditional Access in cross-tenant scenarios](authentication-conditional-access.md).
8787

@@ -90,7 +90,7 @@ For details about how authentication works in a cross-tenant scenario with Condi
9090

9191
If you want to allow B2B direct connect with an external organization and your Conditional Access policies require MFA, you must configure your trust settings so that your Conditional Access policies will accept MFA claims from the external organization. This configuration ensures that B2B direct connect users from the external organization are compliant with your Conditional Access policies, and it provides a more seamless user experience.
9292

93-
For example, say Contoso (the resource tenant) trusts MFA claims from Fabrikam. Contoso has a Conditional Access policy requiring MFA. This policy is scoped to all guest and external users, as well as all SharePoint Online cloud apps. As a prerequisite for B2B direct connect, Contoso must configure trust settings in their cross-tenant access settings to accept MFA claims from Fabrikam. When a Fabrikam user access a B2B direct connect-enabled app (for example, a Teams Connect shared channel), the user is subject to the MFA requirement enforced by Contoso:
93+
For example, say Contoso (the resource tenant) trusts MFA claims from Fabrikam. Contoso has a Conditional Access policy requiring MFA. This policy is scoped to all guest and external users, as well as SharePoint Online. As a prerequisite for B2B direct connect, Contoso must configure trust settings in their cross-tenant access settings to accept MFA claims from Fabrikam. When a Fabrikam user access a B2B direct connect-enabled app (for example, a Teams Connect shared channel), the user is subject to the MFA requirement enforced by Contoso:
9494

9595
- If the Fabrikam user has already performed MFA in their home tenant, they’ll be able to access the resource within the shared channel.
9696
- If the Fabrikam user hasn’t completed MFA, they’ll be blocked from accessing the resource.
@@ -119,8 +119,7 @@ Within the context of Teams, there are differences in how resources can be share
119119

120120
- With B2B direct connect, you add the external user to a shared channel within a team. This user can access the resources within the shared channel, but they don’t have access to the entire team or any other resources outside the shared channel. For example, they don’t have access to the Azure AD admin portal. B2B direct connect users don’t have access to other resources outside the shared channel. They do, however, have access to My apps portal, where they can choose to leave an organization. B2B direct connect users don’t have a presence in your Azure AD organization, so these users are managed in the Teams client by the shared channel owner. For details, see the [Assign team owners and members in Microsoft Teams](/microsoftteams/assign-roles-permissions).
121121

122-
123-
- With B2B collaboration, you can invite the guest user to a team. The B2B collaboration guest user signs into the resource tenant using the guest account that was used to invite them. Their access is determined by the permissions assigned to guest users in the resource tenant. Guest users can’t see or participate in any shared channels in the team.
122+
- With B2B collaboration, you can invite the guest user to a team. The B2B collaboration guest user signs into the resource tenant using the email address that was used to invite them. Their access is determined by the permissions assigned to guest users in the resource tenant. Guest users can’t see or participate in any shared channels in the team.
124123

125124
For more information about differences between B2B collaboration and B2B direct connect in Teams, see [Guest access in Microsoft Teams](/microsoftteams/guest-access).
126125

@@ -138,7 +137,7 @@ Azure AD includes information about cross-tenant access and B2B direct connect i
138137

139138
- **Azure AD sign-in logs** Azure AD sign-in logs are available in both the home organization and the resource organization. The information reported in each organization varies, for example:
140139

141-
- In both organizations, B2B direct connect sign-ins are labeled with a cross-tenant access type of B2B direct connect. Sign-in logs are recorded when a B2B direct connect first accesses a resource organization, and then again when a refresh token is issued for the user. Users can access their own sign-in logs. Admins can view their sign-ins for their entire organization to see how B2B connect users are accessing resources in their tenant.
140+
- In both organizations, B2B direct connect sign-ins are labeled with a cross-tenant access type of B2B direct connect. A sign-in event is recorded when a B2B direct connect user first accesses a resource organization, and again when a refresh token is issued for the user. Users can access their own sign-in logs. Admins can view sign-ins for their entire organization to see how B2B direct connect users are accessing resources in their tenant.
142141

143142
- In the home organization, the logs include client application information.
144143

@@ -156,13 +155,13 @@ The Microsoft Teams admin center displays reporting for shared channels, includi
156155

157156
- **Teams access reviews**: Access reviews of Groups that are Teams can now detect B2B direct connect users who are using Teams shared channels. When creating an access review, you can scope the review to all internal users, guest users, and external B2B direct connect users who have been added directly to a shared channel. The reviewer is then presented with users who have direct access to the shared channel.
158157

159-
- **Current limitations**: Reviewers can review individual internal users or external B2B direct connect users, but not other teams that have been added to the shared channel. As a workaround, the Teams shared channel owner can view and remove the other teams that a channel is shared with.
158+
- **Current limitations**: An access review can detect internal users and external B2B direct connect users, but not other teams, that have been added to a shared channel. To view and remove teams that have been added to a shared channel, the shared channel owner can manage membership from within Teams.
160159

161160
For more details about Microsoft Teams audit logs, see the [Microsoft Teams auditing documentation](/microsoftteams/audit-log-events).
162161

163162
## Privacy and data handling
164163

165-
B2B direct connect lets your users and groups access apps and resources that are hosted by an external organization. To establish a connection, an admin from the external organization must also enable B2B direct connect.
164+
B2B direct connect lets your users and groups access apps and resources that are hosted by an external organization. To establish a connection, an admin from the external organization must also enable B2B direct connect.
166165

167166
By enabling B2B connect with an external organization, you're allowing the external organizations that you have enabled outbound settings with to access limited contact data about your users. Microsoft shares this data with those organizations to help them send a request to connect with your users. Data collected by external organizations, including limited contact data, is subject to the privacy policies and practices of those organizations.
168167

articles/active-directory/external-identities/b2b-fundamentals.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 03/01/2022
9+
ms.date: 03/21/2022
1010

1111
ms.author: mimart
1212
author: msmimart

articles/active-directory/external-identities/cross-tenant-access-settings-b2b-direct-connect.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: how-to
8-
ms.date: 03/01/2022
8+
ms.date: 03/21/2022
99

1010
ms.author: mimart
1111
author: msmimart
@@ -255,4 +255,19 @@ With outbound settings, you select which of your users and groups will be able t
255255

256256
1. Select **Save**.
257257

258+
## Remove an organization
259+
260+
When you remove an organization from your Organizational settings, the default cross-tenant access settings will go into effect for all B2B collaboration with that organization.
261+
262+
> [!NOTE]
263+
> If the organization is a Cloud Service Provider for your organization (the isServiceProvider property in the Microsoft Graph [partner-specific configuration](/graph/api/resources/crosstenantaccesspolicyconfigurationpartner) is true), you won't be able to remove the organization.
264+
265+
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator or Security administrator account. Then open the **Azure Active Directory** service.
266+
267+
1. Select **External Identities**, and then select **Cross-tenant access settings (Preview)**.
268+
269+
1. Select the **Organizational settings** tab.
270+
271+
2. Find the organization in the list, and then select the trash can icon on that row.
272+
258273
## Next steps

articles/active-directory/external-identities/external-identities-overview.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: overview
10-
ms.date: 02/07/2022
10+
ms.date: 03/21/2022
1111
ms.author: mimart
1212
author: msmimart
1313
manager: celestedg
@@ -35,7 +35,7 @@ Depending on how you want to interact with external organizations and the types
3535

3636
## B2B collaboration
3737

38-
With B2B collaboration, you can invite anyone to sign in to your Azure AD organization using their own credentials so they can access the apps and resources you want to share with them. Use B2B collaboration when you need to let external users access your Office 365 apps, software-as-a-service (SaaS) apps, and line-of-business applications, especially when the partner doesn't use Azure AD or it's impractical for administrators to set up a mutual connection through B2B direct connect. There are no credentials associated with B2B collaboration users. Instead, they authenticate with their home organization or identity provider, and then your organization checks the guest user’s eligibility for B2B collaboration.
38+
With [B2B collaboration](what-is-b2b.md), you can invite anyone to sign in to your Azure AD organization using their own credentials so they can access the apps and resources you want to share with them. Use B2B collaboration when you need to let external users access your Office 365 apps, software-as-a-service (SaaS) apps, and line-of-business applications, especially when the partner doesn't use Azure AD or it's impractical for administrators to set up a mutual connection through B2B direct connect. There are no credentials associated with B2B collaboration users. Instead, they authenticate with their home organization or identity provider, and then your organization checks the guest user’s eligibility for B2B collaboration.
3939

4040
There are various ways to add external users to your organization for B2B collaboration:
4141

@@ -49,8 +49,6 @@ A user object is created for the B2B collaboration user in the same directory as
4949

5050
You can use [cross-tenant access settings](cross-tenant-access-overview.md) to manage B2B collaboration with other Azure AD organizations. For B2B collaboration with non-Azure AD external users and organizations, use [external collaboration settings](external-collaboration-settings-configure.md).
5151

52-
Learn more about [B2B collaboration in Azure AD](what-is-b2b.md).
53-
5452
## B2B direct connect
5553

5654
B2B direct connect is a new way to collaborate with other Azure AD organizations. With B2B direct connect, you create two-way trust relationships with other Azure AD organizations to allow users to seamlessly sign in to your shared resources and vice versa. B2B direct connect users are not added as guests to your Azure AD directory. When two organizations mutually enable B2B direct connect, users authenticate in their home organization and receive a token from the resource organization for access. Learn more about [B2B direct connect in Azure AD](b2b-direct-connect-overview.md).

articles/active-directory/external-identities/troubleshoot.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: troubleshooting
8-
ms.date: 02/14/2022
8+
ms.date: 03/21/2022
99
tags: active-directory
1010
ms.author: mimart
1111
author: msmimart
@@ -23,6 +23,17 @@ Here are some remedies for common problems with Azure Active Directory (Azure AD
2323
> - **Starting September 30, 2021**, Google is [deprecating embedded web-view sign-in support](https://developers.googleblog.com/2016/08/modernizing-oauth-interactions-in-native-apps.html). If your apps authenticate users with an embedded web-view and you're using Google federation with [Azure AD B2C](../../active-directory-b2c/identity-provider-google.md) or Azure AD B2B for [external user invitations](google-federation.md) or [self-service sign-up](identity-providers.md), Google Gmail users won't be able to authenticate. [Learn more](google-federation.md#deprecation-of-web-view-sign-in-support).
2424
> - **Starting July 2022**, we'll begin rolling out a change to turn on the email one-time passcode feature for all existing tenants and enable it by default for new tenants. As part of this change, Microsoft will stop creating new, unmanaged ("viral") Azure AD accounts and tenants during B2B collaboration invitation redemption. We're enabling the email one-time passcode feature because it provides a seamless fallback authentication method for your guest users. However, if you don't want to allow this feature to turn on automatically, you can [disable it](one-time-passcode.md#disable-email-one-time-passcode).
2525
26+
27+
## B2B direct connect user is unable to access a shared channel (error AADSTS90071)
28+
29+
When a B2B direct connect sees the following error message when trying to access another organization's Teams shared channel, multi-factor authentication trust settings haven't been configured by the external organization:
30+
31+
> The organization you're trying to reach needs to update their settings to let you sign in.
32+
>
33+
> AADSTS90071: An admin from *<organization>* must update their access settings to accept inbound multifactor authentication.
34+
35+
The organization hosting the Teams shared channel must enable the trust setting for multi-factor authentication to allow access to B2B direct connect users. Trust settings are configurable in an organization's [cross-tenant access settings](cross-tenant-access-settings-b2b-direct-connect.md).
36+
2637
## An error similar to "Failure to update policy due to object limit" appears while configuring cross-tenant access settings
2738

2839
While configuring [cross-tenant access settings](cross-tenant-access-settings-b2b-collaboration.md), if you receive an error that says “Failure to update policy due to object limit” you have reached the policy object limit of 25 KB. We're working toward increasing this limit. If you need to be able to calculate how close the current policy is to this limit, do the following:

0 commit comments

Comments
 (0)