Skip to content

Commit c527fb9

Browse files
authored
Merge pull request #209838 from msmimart/mm-content-health-allow
[EXID] Content health update: Allow or block invitations to B2B users from specific organizations
2 parents 1180c82 + 4f47928 commit c527fb9

File tree

1 file changed

+29
-23
lines changed

1 file changed

+29
-23
lines changed

articles/active-directory/external-identities/allow-deny-list.md

Lines changed: 29 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,89 +1,93 @@
11
---
22

33
title: Allow or block invites to specific organizations - Azure AD
4-
description: Shows how an administrator can use the Azure portal or PowerShell to set an access or deny list to allow or block B2B users from certain domains.
4+
description: Shows how an administrator can use the Azure portal or PowerShell to set an access or blocklist to allow or block B2B users from certain domains.
55

66
services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: how-to
10-
ms.date: 02/03/2021
10+
ms.date: 08/31/2022
1111

1212
ms.author: mimart
1313
author: msmimart
1414
manager: celestedg
15-
ms.reviewer: sasubram
1615
ms.custom: "it-pro, seo-update-azuread-jan"
1716
ms.collection: M365-identity-device-management
1817
---
1918

2019
# Allow or block invitations to B2B users from specific organizations
2120

22-
You can use an allow list or a deny list to allow or block invitations to B2B users from specific organizations. For example, if you want to block personal email address domains, you can set up a deny list that contains domains like Gmail.com and Outlook.com. Or, if your business has a partnership with other businesses like Contoso.com, Fabrikam.com, and Litware.com, and you want to restrict invitations to only these organizations, you can add Contoso.com, Fabrikam.com, and Litware.com to your allow list.
21+
You can use an allowlist or a blocklist to allow or block invitations to B2B collaboration users from specific organizations. For example, if you want to block personal email address domains, you can set up a blocklist that contains domains like Gmail.com and Outlook.com. Or, if your business has a partnership with other businesses like Contoso.com, Fabrikam.com, and Litware.com, and you want to restrict invitations to only these organizations, you can add Contoso.com, Fabrikam.com, and Litware.com to your allowlist.
22+
23+
This article discusses two ways to configure an allow or blocklist for B2B collaboration:
24+
25+
- In the portal by configuring collaboration restrictions in your organization's [External collaboration settings](external-collaboration-settings-configure.md)
26+
- Through PowerShell
2327

2428
## Important considerations
2529

26-
- You can create either an allow list or a deny list. You can't set up both types of lists. By default, whatever domains are not in the allow list are on the deny list, and vice versa.
30+
- You can create either an allowlist or a blocklist. You can't set up both types of lists. By default, whatever domains aren't in the allowlist are on the blocklist, and vice versa.
2731
- You can create only one policy per organization. You can update the policy to include more domains, or you can delete the policy to create a new one.
28-
- The number of domains you can add to an allow list or deny list is limited only by the size of the policy. This limit applies to the number of characters, so you can have a greater number of shorter domains or fewer longer domains. The maximum size of the entire policy is 25 KB (25,000 characters), which includes the allow list or deny list and any other parameters configured for other features.
29-
- This list works independently from OneDrive for Business and SharePoint Online allow/block lists. If you want to restrict individual file sharing in SharePoint Online, you need to set up an allow or deny list for OneDrive for Business and SharePoint Online. For more information, see [Restricted domains sharing in SharePoint Online and OneDrive for Business](https://support.office.com/article/restricted-domains-sharing-in-sharepoint-online-and-onedrive-for-business-5d7589cd-0997-4a00-a2ba-2320ec49c4e9).
30-
- The list does not apply to external users who have already redeemed the invitation. The list will be enforced after the list is set up. If a user invitation is in a pending state, and you set a policy that blocks their domain, the user's attempt to redeem the invitation will fail.
32+
- The number of domains you can add to an allowlist or blocklist is limited only by the size of the policy. This limit applies to the number of characters, so you can have a greater number of shorter domains or fewer longer domains. The maximum size of the entire policy is 25 KB (25,000 characters), which includes the allowlist or blocklist and any other parameters configured for other features.
33+
- This list works independently from OneDrive for Business and SharePoint Online allow/block lists. If you want to restrict individual file sharing in SharePoint Online, you need to set up an allow or blocklist for OneDrive for Business and SharePoint Online. For more information, see [Restricted domains sharing in SharePoint Online and OneDrive for Business](https://support.office.com/article/restricted-domains-sharing-in-sharepoint-online-and-onedrive-for-business-5d7589cd-0997-4a00-a2ba-2320ec49c4e9).
34+
- The list doesn't apply to external users who have already redeemed the invitation. The list will be enforced after the list is set up. If a user invitation is in a pending state, and you set a policy that blocks their domain, the user's attempt to redeem the invitation will fail.
3135

32-
## Set the allow or deny list policy in the portal
36+
## Set the allow or blocklist policy in the portal
3337

3438
By default, the **Allow invitations to be sent to any domain (most inclusive)** setting is enabled. In this case, you can invite B2B users from any organization.
3539

36-
### Add a deny list
40+
### Add a blocklist
3741

3842
This is the most typical scenario, where your organization wants to work with almost any organization, but wants to prevent users from specific domains to be invited as B2B users.
3943

40-
To add a deny list:
44+
To add a blocklist:
4145

4246
1. Sign in to the [Azure portal](https://portal.azure.com).
4347
2. Select **Azure Active Directory** > **Users** > **User settings**.
4448
3. Under **External users**, select **Manage external collaboration settings**.
4549
4. Under **Collaboration restrictions**, select **Deny invitations to the specified domains**.
4650
5. Under **TARGET DOMAINS**, enter the name of one of the domains that you want to block. For multiple domains, enter each domain on a new line. For example:
4751

48-
![Shows the deny option with added domains](./media/allow-deny-list/DenyListSettings.png)
52+
![Screenshot showing the deny option with added domains.](./media/allow-deny-list/DenyListSettings.png)
4953

5054
6. When you're done, select **Save**.
5155

5256
After you set the policy, if you try to invite a user from a blocked domain, you receive a message saying that the domain of the user is currently blocked by your invitation policy.
5357

54-
### Add an allow list
58+
### Add an allowlist
5559

56-
This is a more restrictive configuration, where you can set specific domains in the allow list and restrict invitations to any other organizations or domains that aren't mentioned.
60+
This is a more restrictive configuration, where you can set specific domains in the allowlist and restrict invitations to any other organizations or domains that aren't mentioned.
5761

58-
If you want to use an allow list, make sure that you spend time to fully evaluate what your business needs are. If you make this policy too restrictive, your users may choose to send documents over email, or find other non-IT sanctioned ways of collaborating.
62+
If you want to use an allowlist, make sure that you spend time to fully evaluate what your business needs are. If you make this policy too restrictive, your users may choose to send documents over email, or find other non-IT sanctioned ways of collaborating.
5963

6064

61-
To add an allow list:
65+
To add an allowlist:
6266

6367
1. Sign in to the [Azure portal](https://portal.azure.com).
6468
2. Select **Azure Active Directory** > **Users** > **User settings**.
6569
3. Under **External users**, select **Manage external collaboration settings**.
6670
4. Under **Collaboration restrictions**, select **Allow invitations only to the specified domains (most restrictive)**.
6771
5. Under **TARGET DOMAINS**, enter the name of one of the domains that you want to allow. For multiple domains, enter each domain on a new line. For example:
6872

69-
![Shows the allow option with added domains](./media/allow-deny-list/AllowListSettings.png)
73+
![Screenshot showing the allow option with added domains.](./media/allow-deny-list/AllowListSettings.png)
7074

7175
6. When you're done, select **Save**.
7276

73-
After you set the policy, if you try to invite a user from a domain that's not on the allow list, you receive a message saying that the domain of the user is currently blocked by your invitation policy.
77+
After you set the policy, if you try to invite a user from a domain that's not on the allowlist, you receive a message saying that the domain of the user is currently blocked by your invitation policy.
7478

75-
### Switch from allow list to deny list and vice versa
79+
### Switch from allowlist to blocklist and vice versa
7680

7781
If you switch from one policy to the other, this discards the existing policy configuration. Make sure to back up details of your configuration before you perform the switch.
7882

79-
## Set the allow or deny list policy using PowerShell
83+
## Set the allow or blocklist policy using PowerShell
8084

8185
### Prerequisite
8286

8387
> [!Note]
8488
> The AzureADPreview Module is not a fully supported module as it is in preview.
8589
86-
To set the allow or deny list by using PowerShell, you must install the preview version of the Azure Active Directory Module for Windows PowerShell. Specifically, install the AzureADPreview module version 2.0.0.98 or later.
90+
To set the allow or blocklist by using PowerShell, you must install the preview version of the Azure Active Directory Module for Windows PowerShell. Specifically, install the AzureADPreview module version 2.0.0.98 or later.
8791

8892
To check the version of the module (and see if it's installed):
8993

@@ -124,7 +128,7 @@ If the module is not installed, or you don't have a required version, do one of
124128
125129
### Use the AzureADPolicy cmdlets to configure the policy
126130
127-
To create an allow or deny list, use the [New-AzureADPolicy](/powershell/module/azuread/new-azureadpolicy?view=azureadps-2.0-preview&preserve-view=true) cmdlet. The following example shows how to set a deny list that blocks the "live.com" domain.
131+
To create an allow or blocklist, use the [New-AzureADPolicy](/powershell/module/azuread/new-azureadpolicy?view=azureadps-2.0-preview&preserve-view=true) cmdlet. The following example shows how to set a blocklist that blocks the "live.com" domain.
128132
129133
```powershell
130134
$policyValue = @("{`"B2BManagementPolicy`":{`"InvitationsAllowedAndBlockedDomainsPolicy`":{`"AllowedDomains`": [],`"BlockedDomains`": [`"live.com`"]}}}")
@@ -138,7 +142,7 @@ The following shows the same example, but with the policy definition inline.
138142
New-AzureADPolicy -Definition @("{`"B2BManagementPolicy`":{`"InvitationsAllowedAndBlockedDomainsPolicy`":{`"AllowedDomains`": [],`"BlockedDomains`": [`"live.com`"]}}}") -DisplayName B2BManagementPolicy -Type B2BManagementPolicy -IsOrganizationDefault $true
139143
```
140144

141-
To set the allow or deny list policy, use the [Set-AzureADPolicy](/powershell/module/azuread/set-azureadpolicy?view=azureadps-2.0-preview&preserve-view=true) cmdlet. For example:
145+
To set the allow or blocklist policy, use the [Set-AzureADPolicy](/powershell/module/azuread/set-azureadpolicy?view=azureadps-2.0-preview&preserve-view=true) cmdlet. For example:
142146

143147
```powershell
144148
Set-AzureADPolicy -Definition $policyValue -Id $currentpolicy.Id
@@ -159,4 +163,6 @@ Remove-AzureADPolicy -Id $currentpolicy.Id
159163
## Next steps
160164

161165
- For an overview of Azure AD B2B, see [What is Azure AD B2B collaboration?](what-is-b2b.md)
166+
- To learn more about managing B2B collaboration in your organization, see [External collaboration settings](external-collaboration-settings-configure.md).
167+
162168
- For information about Conditional Access and B2B collaboration, see [Conditional Access for B2B collaboration users](authentication-conditional-access.md).

0 commit comments

Comments
 (0)