Skip to content

Commit c6d535b

Browse files
committed
Resolved merge conflict.
2 parents 553cf20 + 82238b7 commit c6d535b

File tree

560 files changed

+13885
-4934
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

560 files changed

+13885
-4934
lines changed

.openpublishing.redirection.json

Lines changed: 85 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -811,16 +811,30 @@
811811
"redirect_url": "/azure/cognitive-services/personalizer/how-to-manage-model",
812812
"redirect_document_id": false
813813
},
814+
{
815+
"source_path": "articles/cognitive-services/LUIS/luis-tutorial-composite-entity.md",
816+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities"
817+
},
818+
{
819+
"source_path": "articles/cognitive-services/LUIS/tutorial-entity-roles.md",
820+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities"
821+
},
822+
{
823+
"source_path": "articles/cognitive-services/LUIS/tutorial-list-entity.md",
824+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities"
825+
},
826+
{
827+
"source_path": "articles/cognitive-services/LUIS/tutorial-regex-entity.md",
828+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities"
829+
},
814830
{
815831
"source_path": "articles/cognitive-services/LUIS/luis-boundaries.md",
816832
"redirect_url": "/azure/cognitive-services/LUIS/luis-limits"
817833
},
818-
{
819-
"source_path": "articles/cognitive-services/LUIS/luis-migration-api-authoring.md",
820-
"redirect_url": "/azure/cognitive-services/LUIS/luis-migration-authoring-entities",
821-
"redirect_document_id": false
822-
},
823-
834+
{
835+
"source_path": "articles/cognitive-services/LUIS/luis-migration-api-authoring.md",
836+
"redirect_url": "/azure/cognitive-services/LUIS/luis-migration-authoring-entities"
837+
},
824838
{
825839
"source_path": "articles/cognitive-services/LUIS/luis-resources-faq.md",
826840
"redirect_url": "/azure/cognitive-services/LUIS/troubleshooting",
@@ -853,13 +867,11 @@
853867
},
854868
{
855869
"source_path": "articles/cognitive-services/LUIS/luis-quickstart-intent-and-list-entity.md",
856-
"redirect_url": "/azure/cognitive-services/LUIS/tutorial-list-entity",
857-
"redirect_document_id": false
870+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities"
858871
},
859872
{
860873
"source_path": "articles/cognitive-services/LUIS/luis-quickstart-intents-regex-entity.md",
861-
"redirect_url": "/azure/cognitive-services/LUIS/tutorial-regex-entity",
862-
"redirect_document_id": false
874+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities"
863875
},
864876
{
865877
"source_path": "articles/cognitive-services/LUIS/luis-quickstart-intent-and-sentiment-analysis.md",
@@ -868,8 +880,7 @@
868880
},
869881
{
870882
"source_path": "articles/cognitive-services/LUIS/luis-how-to-add-example-utterances.md",
871-
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities",
872-
"redirect_document_id": false
883+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities"
873884
},
874885
{
875886
"source_path": "articles/cognitive-services/LUIS/luis-tutorial-prebuilt-intents-entities.md",
@@ -2436,6 +2447,26 @@
24362447
"redirect_url": "/azure/cosmos-db/how-to-multi-master",
24372448
"redirect_document_id": true
24382449
},
2450+
{
2451+
"source_path": "articles/cosmos-db/analytics-usecases.md",
2452+
"redirect_url": "/azure/cosmos-db/synapse-link",
2453+
"redirect_document_id": true
2454+
},
2455+
{
2456+
"source_path": "articles/cosmos-db/analytics-solution-architectures.md",
2457+
"redirect_url": "/azure/cosmos-db/synapse-link",
2458+
"redirect_document_id": false
2459+
},
2460+
{
2461+
"source_path": "articles/cosmos-db/lambda-architecture.md",
2462+
"redirect_url": "/azure/cosmos-db/synapse-link",
2463+
"redirect_document_id": false
2464+
},
2465+
{
2466+
"source_path": "articles/cosmos-db/globally-distributed-transactional-analytical-storage.md",
2467+
"redirect_url": "/azure/cosmos-db/synapse-link",
2468+
"redirect_document_id": false
2469+
},
24392470
{
24402471
"source_path": "articles/cosmos-db/sql-api-java-get-started.md",
24412472
"redirect_url": "/azure/cosmos-db/create-sql-api-java",
@@ -37627,8 +37658,7 @@
3762737658
},
3762837659
{
3762937660
"source_path": "articles/cognitive-services/LUIS/Add-entities.md",
37630-
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities",
37631-
"redirect_document_id": true
37661+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities"
3763237662
},
3763337663
{
3763437664
"source_path": "articles/java-add-certificate-ca-store.md",
@@ -44892,8 +44922,7 @@
4489244922
},
4489344923
{
4489444924
"source_path": "articles/cognitive-services/LUIS/luis-quickstart-intent-and-hier-entity.md",
44895-
"redirect_url": "/azure/cognitive-services/LUIS/tutorial-entity-roles",
44896-
"redirect_document_id": true
44925+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities"
4489744926
},
4489844927
{
4489944928
"source_path": "articles/azure-monitor/app/previews.md",
@@ -49435,6 +49464,11 @@
4943549464
"redirect_url": "/azure/cognitive-services/translator/translator-info-overview",
4943649465
"redirect_document_id": false
4943749466
},
49467+
{
49468+
"source_path": "articles/cognitive-services/translator/translator-text-how-to-signup.md",
49469+
"redirect_url": "/azure/cognitive-services/translator/translator-how-to-signup",
49470+
"redirect_document_id": false
49471+
},
4943849472
{
4943949473
"source_path": "articles/aks/virtual-kubelet.md",
4944049474
"redirect_url": "/azure/aks/concepts-scale#burst-to-azure-container-instances",
@@ -52133,6 +52167,41 @@
5213352167
"source_path": "articles/virtual-desktop/troubleshoot-windows-7-vm.md",
5213452168
"redirect_url": "/azure/virtual-desktop/virtual-desktop-fall-2019/troubleshoot-windows-7-vm",
5213552169
"redirect_document_id": false
52170+
},
52171+
{
52172+
"source_path": "articles/sql-database-edge/index.yml",
52173+
"redirect_url": "/azure/azure-sql-edge/",
52174+
"redirect_document_id": true
52175+
},
52176+
{
52177+
"source_path": "articles/sql-database-edge/deploy-onnx.md",
52178+
"redirect_url": "/azure/azure-sql-edge/deploy-onnx",
52179+
"redirect_document_id": true
52180+
},
52181+
{
52182+
"source_path": "articles/sql-database-edge/deploy-portal.md",
52183+
"redirect_url": "/azure/azure-sql-edge/deploy-portal",
52184+
"redirect_document_id": true
52185+
},
52186+
{
52187+
"source_path": "articles/sql-database-edge/onnx-overview.md",
52188+
"redirect_url": "/azure/azure-sql-edge/onnx-overview",
52189+
"redirect_document_id": true
52190+
},
52191+
{
52192+
"source_path": "articles/sql-database-edge/overview.md",
52193+
"redirect_url": "/azure/azure-sql-edge/overview",
52194+
"redirect_document_id": true
52195+
},
52196+
{
52197+
"source_path": "articles/sql-database-edge/stream-analytics.md",
52198+
"redirect_url": "/azure/azure-sql-edge/stream-analytics",
52199+
"redirect_document_id": true
52200+
},
52201+
{
52202+
"source_path": "articles/sql-database-edge/tutorial-sync-data-factory.md",
52203+
"redirect_url": "/azure/azure-sql-edge/tutorial-sync-data-factory",
52204+
"redirect_document_id": true
5213652205
}
5213752206
]
5213852207
}

articles/active-directory/b2b/add-users-administrator.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: conceptual
10-
ms.date: 05/11/2020
10+
ms.date: 05/19/2020
1111

1212
ms.author: mimart
1313
author: msmimart

articles/active-directory/b2b/auditing-and-reporting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020
With guest users, you have auditing capabilities similar to with member users.
2121

2222
## Access reviews
23-
You can use access reviews to periodically verify whether guest users still need access to your resources. The **Access reviews** feature is available in **Azure Active Directory** under **Organizational Relationships** > **Access reviews** (or **External Identities** > **Access reviews** ). You can also search for "access reviews" from **All services** in the Azure portal. To learn how to use access reviews, see [Manage guest access with Azure AD access reviews](../governance/manage-guest-access-with-access-reviews.md).
23+
You can use access reviews to periodically verify whether guest users still need access to your resources. The **Access reviews** feature is available in **Azure Active Directory** under **External Identities** > **Access reviews**. You can also search for "access reviews" from **All services** in the Azure portal. To learn how to use access reviews, see [Manage guest access with Azure AD access reviews](../governance/manage-guest-access-with-access-reviews.md).
2424

2525
## Audit logs
2626

Lines changed: 27 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22

3-
title: Compare B2B collaboration and B2C - Azure Active Directory | Microsoft Docs
4-
description: What is the difference between Azure Active Directory B2B collaboration and Azure AD B2C?
3+
title: Compare External Identities - Azure Active Directory | Microsoft Docs
4+
description: Azure AD External Identities allow people outside your organization to access your apps and resources using their own identity. Compare solutions for External Identities, including Azure Active Directory B2B collaboration and Azure AD B2C.
55

66
services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: overview
10-
ms.date: 07/22/2019
10+
ms.date: 05/19/2020
1111

1212
ms.author: mimart
1313
author: msmimart
@@ -17,31 +17,37 @@ ms.reviewer: elisolMS
1717
ms.collection: M365-identity-device-management
1818
---
1919

20-
# Compare B2B collaboration and B2C in Azure Active Directory
20+
# Compare solutions for External Identities in Azure Active Directory
2121

22-
Both Azure Active Directory (Azure AD) B2B collaboration and Azure AD B2C allow you to work with external users in Azure AD. But how do they compare?
22+
With External Identities in Azure AD, you can allow people outside your organization to access your apps and resources, while letting them sign in using whatever identity they prefer. Your partners, distributors, suppliers, vendors, and other guest users can "bring their own identities." Whether they're part of Azure AD or another IT-managed system, or have an unmanaged social identity like Google or Facebook, they can use their own credentials to sign in. The identity provider manages the external user’s identity, and you manage access to your apps with Azure AD to keep your resources protected.
2323

24-
**Azure AD B2B** is for businesses that want to securely share files and resources with external users so they can collaborate. An Azure admin sets up B2B in the Azure portal, and Azure AD takes care of federation between your business and your external partner. Users sign in to the shared resources using a simple invitation and redemption process with their work or school account, or any email account.
25-
26-
**Azure AD B2C** is primarily for businesses and developers that create customer-facing apps. With Azure AD B2C, developers can use Azure AD as the full-featured identity system for their application, while letting customers sign in with an identity they already have established (like Facebook or Gmail).
24+
## External Identities scenarios
2725

28-
The table below gives a detailed comparison.
26+
Azure AD External Identities focuses less on a user's relationship to your organization and more on the way an individual wants to sign in to your apps and resources. Within this framework, Azure AD supports a variety of scenarios from business-to-business (B2B) collaboration to app development for customers and consumers (business-to-consumer, or B2C).
2927

28+
- **Share apps with external users (B2B collaboration)**. Invite external users into your own tenant as "guest" users that you can assign permissions to (for authorization) while allowing them to use their existing credentials (for authentication). Users sign in to the shared resources using a simple invitation and redemption process with their work account, school account, or any email account. And now with the availability of Self-service sign-up user flows (Preview), you can also provide a sign-in experience for your external users through the application you want to share. You can configure user flow settings to control how the user signs up for the application and that allows them to use their work account, school account, or any social identity (like Google or Facebook) they want to use. For more information, see the [Azure AD B2B documentation](index.yml).
3029

31-
B2B collaboration capabilities | Azure AD B2C stand-alone offering
32-
-------- | --------
33-
Intended for: Organizations that want to be able to authenticate users from a partner organization, regardless of identity provider. | Intended for: Inviting customers of your mobile and web apps, whether individuals, institutional or organizational customers into your Azure AD.
34-
Identities supported: Employees with work or school accounts, partners with work or school accounts, or any email address. Soon to support direct federation. | Identities supported: Consumer users with local application accounts (any email address or user name) or any supported social identity with direct federation.
35-
External users are managed in the same directory as employees, but annotated specially. They can be managed the same way as employees, they can be added to the same groups, and so on | External users are managed in the application directory. They're managed separately from the organization’s employee and partner directory (if any).
36-
Single sign-on (SSO) to all Azure AD-connected apps is supported. For example, you can provide access to Office 365 or on-premises apps, and to other SaaS apps such as Salesforce or Workday. | SSO to customer owned apps within the Azure AD B2C tenants is supported. SSO to Office 365 or to other Microsoft SaaS apps is not supported.
37-
Partner lifecycle: Managed by the host/inviting organization. | Customer lifecycle: Self-serve or managed by the application.
38-
Security policy and compliance: Managed by the host/inviting organization (for example, with [Conditional Access policies](https://docs.microsoft.com/azure/active-directory/b2b/conditional-access)). | Security policy and compliance: Managed by the application.
39-
Branding: Host/inviting organization’s brand is used. | Branding: Managed by application. Typically tends to be product branded, with the organization fading into the background.
40-
More info: [Blog post](https://blogs.technet.microsoft.com/enterprisemobility/2017/02/01/azure-ad-b2b-new-updates-make-cross-business-collab-easy/), [Documentation](what-is-b2b.md) | More info: [Product page](https://azure.microsoft.com/services/active-directory-b2c/), [Documentation](https://docs.microsoft.com/azure/active-directory-b2c/)
30+
- **Develop apps intended for other Azure AD tenants (single-tenant or multi-tenant)**. When developing applications for Azure AD, you can target users from a single organization (single tenant), or users from any organization that already has an Azure AD tenant (called multi-tenant applications). These multi-tenant applications are registered once by yourself in your own Azure AD, but can then be used by any Azure AD user from any organization without any additional work on your part.
4131

32+
- **Develop white-labeled apps for consumers and customers (Azure AD B2C)**. If you're a business or developer creating customer-facing apps, you can scale to consumers, customers, or citizens by using an Azure AD B2C. Developers can use Azure AD as the full-featured identity system for their application, while letting customers sign in with an identity they already have established (like Facebook or Gmail). With Azure AD B2C, you can completely customize and control how customers sign up, sign in, and manage their profiles when using your applications. For more information, see the [Azure AD B2C documentation](https://docs.microsoft.com/azure/active-directory-b2c/).
33+
34+
The table below gives a detailed comparison of the various scenarios you can enable with Azure AD External Identities.
35+
36+
| Multi-tenant applications | External user collaboration (B2B) | Apps for consumers or customers (B2C) |
37+
| ---- | --- | --- |
38+
| Primary scenario: Enterprise Software-as-a-Service (SaaS) | Primary scenario: Collaboration using Microsoft applications (Office 365, Teams, ...) or your own collaboration software. | Primary scenario: Transactional applications using custom developed applications. |
39+
| Intended for: Organizations that want to provide software to many enterprise customers. | Intended for: Organizations that want to be able to authenticate users from a partner organization, regardless of identity provider. | Intended for: Inviting customers of your mobile and web apps, whether individuals, institutional or organizational customers into an Azure AD directory separate from your own organization's directory. |
40+
| Identities supported: Employees with Azure AD accounts. | Identities supported: Employees with work or school accounts, partners with work or school accounts, or any email address. Soon to support direct federation. | Identities supported: Consumer users with local application accounts (any email address or user name) or any supported social identity with direct federation. |
41+
| External users are managed in their own directory, isolated from the directory where the application was registered. | External users are managed in the same directory as employees, but annotated specially. They can be managed the same way as employees, they can be added to the same groups, and so on. | External users are managed in the application directory. They're managed separately from the organization's employee and partner directory (if any). |
42+
| Single sign-on: SSO to all Azure AD-connected apps is supported. | Single sign-on: SSO to all Azure AD-connected apps is supported. For example, you can provide access to Office 365 or on-premises apps, and to other SaaS apps such as Salesforce or Workday. | Single sign-on: SSO to customer owned apps within the Azure AD B2C tenants is supported. SSO to Office 365 or to other Microsoft SaaS apps is not supported. |
43+
| Customer lifecycle: Managed by the user's home organization. | Partner lifecycle: Managed by the host/inviting organization. | Customer lifecycle: Self-serve or managed by the application. |
44+
| Security policy and compliance: Managed by the host/inviting organization (for example, with [Conditional Access policies](https://docs.microsoft.com/azure/active-directory/b2b/conditional-access)). | Security policy and compliance: Managed by the host/inviting organization (for example, with [Conditional Access policies](https://docs.microsoft.com/azure/active-directory/b2b/conditional-access)). | Security policy and compliance: Managed by the application. |
45+
| Branding: Host/inviting organization's brand is used. | Branding: Host/inviting organization's brand is used. | Branding: Managed by application. Typically tends to be product branded, with the organization fading into the background. |
46+
| More info: [Manage identity in multi-tenant applications](https://docs.microsoft.com/azure/architecture/multitenant-identity/), [How-to Guide](https://docs.microsoft.com/azure/active-directory/develop/howto-convert-app-to-be-multi-tenant) | More info: [Blog post](https://blogs.technet.microsoft.com/enterprisemobility/2017/02/01/azure-ad-b2b-new-updates-make-cross-business-collab-easy/), [Documentation](what-is-b2b.md) | More info: [Product page](https://azure.microsoft.com/services/active-directory-b2c/), [Documentation](https://docs.microsoft.com/azure/active-directory-b2c/) |
47+
48+
Secure and manage customers and partners beyond your organizational boundaries with Azure AD External Identities.
4249

4350
### Next steps
4451

4552
- [What is Azure AD B2B collaboration?](what-is-b2b.md)
46-
- [B2B collaboration user properties](user-properties.md)
47-
53+
- [About Azure AD B2C](https://docs.microsoft.com/azure/active-directory-b2c/overview)

articles/active-directory/b2b/delegate-invitations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ By default, all users, including guests, can invite guest users.
3535

3636
1. Sign in to the [Azure portal](https://portal.azure.com) as a tenant administrator.
3737
2. Select **Azure Active Directory**.
38-
3. Select **Organizational Relationships** > **Settings** (or select **External Identities** > **External collaboration settings**).
38+
3. Select **External Identities** > **External collaboration settings**.
3939
6. On the **External collaboration settings** page, choose the policies you want to enable.
4040

4141
![External collaboration settings](./media/delegate-invitations/control-who-to-invite.png)

0 commit comments

Comments
 (0)