You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/b2b-direct-connect-overview.md
+7-8Lines changed: 7 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: B2B
8
8
ms.topic: conceptual
9
-
ms.date: 03/01/2022
9
+
ms.date: 03/21/2022
10
10
11
11
ms.author: mimart
12
12
author: msmimart
@@ -81,7 +81,7 @@ Fabrikam will also need to configure their outbound cross-tenant access settings
81
81
82
82
## Authentication
83
83
84
-
In a B2B direct connect scenario, authentication involves a user from an Azure AD organization attempting to sign in to a file or app in the external resource tenant. The user signs in with Azure AD credentials from their home tenant. The sign-in attempt is evaluated against cross-tenant access settings in both the external tenant and the resource tenant. If all access requirements are met, a token is issued to the user that allows the user to access the resource. This token is valid for 1 hour.
84
+
In a B2B direct connect scenario, authentication involves a user from an Azure AD organization (the user's home tenant) attempting to sign in to a file or app in another Azure AD organization (the resource tenant). The user signs in with Azure AD credentials from their home tenant. The sign-in attempt is evaluated against cross-tenant access settings in both the user's home tenant and the resource tenant. If all access requirements are met, a token is issued to the user that allows the user to access the resource. This token is valid for 1 hour.
85
85
86
86
For details about how authentication works in a cross-tenant scenario with Conditional Access policies, see [Authentication and Conditional Access in cross-tenant scenarios](authentication-conditional-access.md).
87
87
@@ -90,7 +90,7 @@ For details about how authentication works in a cross-tenant scenario with Condi
90
90
91
91
If you want to allow B2B direct connect with an external organization and your Conditional Access policies require MFA, you must configure your trust settings so that your Conditional Access policies will accept MFA claims from the external organization. This configuration ensures that B2B direct connect users from the external organization are compliant with your Conditional Access policies, and it provides a more seamless user experience.
92
92
93
-
For example, say Contoso (the resource tenant) trusts MFA claims from Fabrikam. Contoso has a Conditional Access policy requiring MFA. This policy is scoped to all guest and external users, as well as all SharePoint Online cloud apps. As a prerequisite for B2B direct connect, Contoso must configure trust settings in their cross-tenant access settings to accept MFA claims from Fabrikam. When a Fabrikam user access a B2B direct connect-enabled app (for example, a Teams Connect shared channel), the user is subject to the MFA requirement enforced by Contoso:
93
+
For example, say Contoso (the resource tenant) trusts MFA claims from Fabrikam. Contoso has a Conditional Access policy requiring MFA. This policy is scoped to all guest and external users, as well as SharePoint Online. As a prerequisite for B2B direct connect, Contoso must configure trust settings in their cross-tenant access settings to accept MFA claims from Fabrikam. When a Fabrikam user access a B2B direct connect-enabled app (for example, a Teams Connect shared channel), the user is subject to the MFA requirement enforced by Contoso:
94
94
95
95
- If the Fabrikam user has already performed MFA in their home tenant, they’ll be able to access the resource within the shared channel.
96
96
- If the Fabrikam user hasn’t completed MFA, they’ll be blocked from accessing the resource.
@@ -119,8 +119,7 @@ Within the context of Teams, there are differences in how resources can be share
119
119
120
120
- With B2B direct connect, you add the external user to a shared channel within a team. This user can access the resources within the shared channel, but they don’t have access to the entire team or any other resources outside the shared channel. For example, they don’t have access to the Azure AD admin portal. B2B direct connect users don’t have access to other resources outside the shared channel. They do, however, have access to My apps portal, where they can choose to leave an organization. B2B direct connect users don’t have a presence in your Azure AD organization, so these users are managed in the Teams client by the shared channel owner. For details, see the [Assign team owners and members in Microsoft Teams](/microsoftteams/assign-roles-permissions).
121
121
122
-
123
-
- With B2B collaboration, you can invite the guest user to a team. The B2B collaboration guest user signs into the resource tenant using the guest account that was used to invite them. Their access is determined by the permissions assigned to guest users in the resource tenant. Guest users can’t see or participate in any shared channels in the team.
122
+
- With B2B collaboration, you can invite the guest user to a team. The B2B collaboration guest user signs into the resource tenant using the email address that was used to invite them. Their access is determined by the permissions assigned to guest users in the resource tenant. Guest users can’t see or participate in any shared channels in the team.
124
123
125
124
For more information about differences between B2B collaboration and B2B direct connect in Teams, see [Guest access in Microsoft Teams](/microsoftteams/guest-access).
126
125
@@ -138,7 +137,7 @@ Azure AD includes information about cross-tenant access and B2B direct connect i
138
137
139
138
-**Azure AD sign-in logs** Azure AD sign-in logs are available in both the home organization and the resource organization. The information reported in each organization varies, for example:
140
139
141
-
- In both organizations, B2B direct connect sign-ins are labeled with a cross-tenant access type of B2B direct connect. Sign-in logs are recorded when a B2B direct connect first accesses a resource organization, and then again when a refresh token is issued for the user. Users can access their own sign-in logs. Admins can view their sign-ins for their entire organization to see how B2B connect users are accessing resources in their tenant.
140
+
- In both organizations, B2B direct connect sign-ins are labeled with a cross-tenant access type of B2B direct connect. A sign-in event is recorded when a B2B direct connect user first accesses a resource organization, and again when a refresh token is issued for the user. Users can access their own sign-in logs. Admins can view sign-ins for their entire organization to see how B2B direct connect users are accessing resources in their tenant.
142
141
143
142
- In the home organization, the logs include client application information.
144
143
@@ -156,13 +155,13 @@ The Microsoft Teams admin center displays reporting for shared channels, includi
156
155
157
156
-**Teams access reviews**: Access reviews of Groups that are Teams can now detect B2B direct connect users who are using Teams shared channels. When creating an access review, you can scope the review to all internal users, guest users, and external B2B direct connect users who have been added directly to a shared channel. The reviewer is then presented with users who have direct access to the shared channel.
158
157
159
-
-**Current limitations**: Reviewers can review individual internal users or external B2B direct connect users, but not other teams that have been added to the shared channel. As a workaround, the Teams shared channel owner can view and remove the other teams that a channel is shared with.
158
+
-**Current limitations**: An access review can detect internal users and external B2B direct connect users, but not other teams, that have been added to a shared channel. To view and remove teams that have been added to a shared channel, the shared channel owner can manage membership from within Teams.
160
159
161
160
For more details about Microsoft Teams audit logs, see the [Microsoft Teams auditing documentation](/microsoftteams/audit-log-events).
162
161
163
162
## Privacy and data handling
164
163
165
-
B2B direct connect lets your users and groups access apps and resources that are hosted by an external organization. To establish a connection, an admin from the external organization must also enable B2B direct connect.
164
+
B2B direct connect lets your users and groups access apps and resources that are hosted by an external organization. To establish a connection, an admin from the external organization must also enable B2B direct connect.
166
165
167
166
By enabling B2B connect with an external organization, you're allowing the external organizations that you have enabled outbound settings with to access limited contact data about your users. Microsoft shares this data with those organizations to help them send a request to connect with your users. Data collected by external organizations, including limited contact data, is subject to the privacy policies and practices of those organizations.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/cross-tenant-access-settings-b2b-direct-connect.md
+16-1Lines changed: 16 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: active-directory
5
5
ms.service: active-directory
6
6
ms.subservice: B2B
7
7
ms.topic: how-to
8
-
ms.date: 03/01/2022
8
+
ms.date: 03/21/2022
9
9
10
10
ms.author: mimart
11
11
author: msmimart
@@ -255,4 +255,19 @@ With outbound settings, you select which of your users and groups will be able t
255
255
256
256
1. Select **Save**.
257
257
258
+
## Remove an organization
259
+
260
+
When you remove an organization from your Organizational settings, the default cross-tenant access settings will go into effect for all B2B collaboration with that organization.
261
+
262
+
> [!NOTE]
263
+
> If the organization is a Cloud Service Provider for your organization (the isServiceProvider property in the Microsoft Graph [partner-specific configuration](/graph/api/resources/crosstenantaccesspolicyconfigurationpartner) is true), you won't be able to remove the organization.
264
+
265
+
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator or Security administrator account. Then open the **Azure Active Directory** service.
266
+
267
+
1. Select **External Identities**, and then select **Cross-tenant access settings (Preview)**.
268
+
269
+
1. Select the **Organizational settings** tab.
270
+
271
+
2. Find the organization in the list, and then select the trash can icon on that row.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/external-identities-overview.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ services: active-directory
7
7
ms.service: active-directory
8
8
ms.subservice: B2B
9
9
ms.topic: overview
10
-
ms.date: 02/07/2022
10
+
ms.date: 03/21/2022
11
11
ms.author: mimart
12
12
author: msmimart
13
13
manager: celestedg
@@ -35,7 +35,7 @@ Depending on how you want to interact with external organizations and the types
35
35
36
36
## B2B collaboration
37
37
38
-
With B2B collaboration, you can invite anyone to sign in to your Azure AD organization using their own credentials so they can access the apps and resources you want to share with them. Use B2B collaboration when you need to let external users access your Office 365 apps, software-as-a-service (SaaS) apps, and line-of-business applications, especially when the partner doesn't use Azure AD or it's impractical for administrators to set up a mutual connection through B2B direct connect. There are no credentials associated with B2B collaboration users. Instead, they authenticate with their home organization or identity provider, and then your organization checks the guest user’s eligibility for B2B collaboration.
38
+
With [B2B collaboration](what-is-b2b.md), you can invite anyone to sign in to your Azure AD organization using their own credentials so they can access the apps and resources you want to share with them. Use B2B collaboration when you need to let external users access your Office 365 apps, software-as-a-service (SaaS) apps, and line-of-business applications, especially when the partner doesn't use Azure AD or it's impractical for administrators to set up a mutual connection through B2B direct connect. There are no credentials associated with B2B collaboration users. Instead, they authenticate with their home organization or identity provider, and then your organization checks the guest user’s eligibility for B2B collaboration.
39
39
40
40
There are various ways to add external users to your organization for B2B collaboration:
41
41
@@ -49,8 +49,6 @@ A user object is created for the B2B collaboration user in the same directory as
49
49
50
50
You can use [cross-tenant access settings](cross-tenant-access-overview.md) to manage B2B collaboration with other Azure AD organizations. For B2B collaboration with non-Azure AD external users and organizations, use [external collaboration settings](external-collaboration-settings-configure.md).
51
51
52
-
Learn more about [B2B collaboration in Azure AD](what-is-b2b.md).
53
-
54
52
## B2B direct connect
55
53
56
54
B2B direct connect is a new way to collaborate with other Azure AD organizations. With B2B direct connect, you create two-way trust relationships with other Azure AD organizations to allow users to seamlessly sign in to your shared resources and vice versa. B2B direct connect users are not added as guests to your Azure AD directory. When two organizations mutually enable B2B direct connect, users authenticate in their home organization and receive a token from the resource organization for access. Learn more about [B2B direct connect in Azure AD](b2b-direct-connect-overview.md).
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/troubleshoot.md
+12-1Lines changed: 12 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: active-directory
5
5
ms.service: active-directory
6
6
ms.subservice: B2B
7
7
ms.topic: troubleshooting
8
-
ms.date: 02/14/2022
8
+
ms.date: 03/21/2022
9
9
tags: active-directory
10
10
ms.author: mimart
11
11
author: msmimart
@@ -23,6 +23,17 @@ Here are some remedies for common problems with Azure Active Directory (Azure AD
23
23
> -**Starting September 30, 2021**, Google is [deprecating embedded web-view sign-in support](https://developers.googleblog.com/2016/08/modernizing-oauth-interactions-in-native-apps.html). If your apps authenticate users with an embedded web-view and you're using Google federation with [Azure AD B2C](../../active-directory-b2c/identity-provider-google.md) or Azure AD B2B for [external user invitations](google-federation.md) or [self-service sign-up](identity-providers.md), Google Gmail users won't be able to authenticate. [Learn more](google-federation.md#deprecation-of-web-view-sign-in-support).
24
24
> -**Starting July 2022**, we'll begin rolling out a change to turn on the email one-time passcode feature for all existing tenants and enable it by default for new tenants. As part of this change, Microsoft will stop creating new, unmanaged ("viral") Azure AD accounts and tenants during B2B collaboration invitation redemption. We're enabling the email one-time passcode feature because it provides a seamless fallback authentication method for your guest users. However, if you don't want to allow this feature to turn on automatically, you can [disable it](one-time-passcode.md#disable-email-one-time-passcode).
25
25
26
+
27
+
## B2B direct connect user is unable to access a shared channel (error AADSTS90071)
28
+
29
+
When a B2B direct connect sees the following error message when trying to access another organization's Teams shared channel, multi-factor authentication trust settings haven't been configured by the external organization:
30
+
31
+
> The organization you're trying to reach needs to update their settings to let you sign in.
32
+
>
33
+
> AADSTS90071: An admin from *<organization>* must update their access settings to accept inbound multifactor authentication.
34
+
35
+
The organization hosting the Teams shared channel must enable the trust setting for multi-factor authentication to allow access to B2B direct connect users. Trust settings are configurable in an organization's [cross-tenant access settings](cross-tenant-access-settings-b2b-direct-connect.md).
36
+
26
37
## An error similar to "Failure to update policy due to object limit" appears while configuring cross-tenant access settings
27
38
28
39
While configuring [cross-tenant access settings](cross-tenant-access-settings-b2b-collaboration.md), if you receive an error that says “Failure to update policy due to object limit” you have reached the policy object limit of 25 KB. We're working toward increasing this limit. If you need to be able to calculate how close the current policy is to this limit, do the following:
0 commit comments