You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/direct-federation.md
+47-20Lines changed: 47 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: B2B
8
8
ms.topic: how-to
9
-
ms.date: 05/13/2022
9
+
ms.date: 10/24/2022
10
10
11
11
ms.author: mimart
12
12
author: msmimart
@@ -27,7 +27,7 @@ This article describes how to set up federation with any organization whose iden
27
27
>
28
28
>- We no longer support an allowlist of IdPs for new SAML/WS-Fed IdP federations. When you're setting up a new external federation, refer to [Step 1: Determine if the partner needs to update their DNS text records](#step-1-determine-if-the-partner-needs-to-update-their-dns-text-records).
29
29
>- In the SAML request sent by Azure AD for external federations, the Issuer URL is a tenanted endpoint. For any new federations, we recommend that all our partners set the audience of the SAML or WS-Fed based IdP to a tenanted endpoint. Refer to the [SAML 2.0](#required-saml-20-attributes-and-claims) and [WS-Fed](#required-ws-fed-attributes-and-claims) required attributes and claims sections below. Any existing federations configured with the global endpoint will continue to work, but new federations will stop working if your external IdP is expecting a global issuer URL in the SAML request.
30
-
> -Currently, you can add only one domain to your external federation. We're actively working on allowing additional domains.
30
+
> -We've removed the single domain limitation. You can now associate multiple domains with an individual federation configuration.
31
31
> - We've removed the limitation that required the authentication URL domain to match the target domain or be from an allowed IdP. For details, see [Step 1: Determine if the partner needs to update their DNS text records](#step-1-determine-if-the-partner-needs-to-update-their-dns-text-records).
32
32
33
33
## When is a guest user authenticated with SAML/WS-Fed IdP federation?
@@ -60,31 +60,40 @@ You can also give guest users a direct link to an application or resource by inc
60
60
61
61
## Frequently asked questions
62
62
63
-
### Can I set up SAML/WS-Fed IdP federation with Azure AD verified domains?
63
+
**Can I set up SAML/WS-Fed IdP federation with Azure AD verified domains?**
64
+
64
65
No, we block SAML/WS-Fed IdP federation for Azure AD verified domains in favor of native Azure AD managed domain capabilities. If you try to set up SAML/WS-Fed IdP federation with a domain that is DNS-verified in Azure AD, you'll see an error.
65
66
66
-
### Can I set up SAML/WS-Fed IdP federation with a domain for which an unmanaged (email-verified) tenant exists?
67
+
**Can I set up SAML/WS-Fed IdP federation with a domain for which an unmanaged (email-verified) tenant exists?**
68
+
67
69
Yes, you can set up SAML/WS-Fed IdP federation with domains that aren't DNS-verified in Azure AD, including unmanaged (email-verified or "viral") Azure AD tenants. Such tenants are created when a user redeems a B2B invitation or performs self-service sign-up for Azure AD using a domain that doesn’t currently exist. If the domain hasn't been verified and the tenant hasn't undergone an [admin takeover](../enterprise-users/domains-admin-takeover.md), you can set up federation with that domain.
68
70
69
-
### How many federation relationships can I create?
71
+
**How many federation relationships can I create?**
72
+
70
73
Currently, a maximum of 1,000 federation relationships is supported. This limit includes both [internal federations](/powershell/module/msonline/set-msoldomainfederationsettings) and SAML/WS-Fed IdP federations.
71
74
72
-
### Can I set up federation with multiple domains from the same tenant?
73
-
We don’t currently support SAML/WS-Fed IdP federation with multiple domains from the same tenant.
75
+
**Can I set up federation with multiple domains from the same tenant?**
76
+
77
+
Yes, we now support SAML/WS-Fed IdP federation with multiple domains from the same tenant.
78
+
79
+
**Do I need to renew the signing certificate when it expires?**
74
80
75
-
### Do I need to renew the signing certificate when it expires?
76
81
If you specify the metadata URL in the IdP settings, Azure AD will automatically renew the signing certificate when it expires. However, if the certificate is rotated for any reason before the expiration time, or if you don't provide a metadata URL, Azure AD will be unable to renew it. In this case, you'll need to update the signing certificate manually.
77
82
78
-
### If SAML/WS-Fed IdP federation and email one-time passcode authentication are both enabled, which method takes precedence?
83
+
**If SAML/WS-Fed IdP federation and email one-time passcode authentication are both enabled, which method takes precedence?**
84
+
79
85
When SAML/WS-Fed IdP federation is established with a partner organization, it takes precedence over email one-time passcode authentication for new guest users from that organization. If a guest user redeemed an invitation using one-time passcode authentication before you set up SAML/WS-Fed IdP federation, they'll continue to use one-time passcode authentication.
80
86
81
-
### Does SAML/WS-Fed IdP federation address sign-in issues due to a partially synced tenancy?
87
+
**Does SAML/WS-Fed IdP federation address sign-in issues due to a partially synced tenancy?**
88
+
82
89
No, the [email one-time passcode](one-time-passcode.md) feature should be used in this scenario. A “partially synced tenancy” refers to a partner Azure AD tenant where on-premises user identities aren't fully synced to the cloud. A guest whose identity doesn’t yet exist in the cloud but who tries to redeem your B2B invitation won’t be able to sign in. The one-time passcode feature would allow this guest to sign in. The SAML/WS-Fed IdP federation feature addresses scenarios where the guest has their own IdP-managed organizational account, but the organization has no Azure AD presence at all.
83
90
84
-
### Once SAML/WS-Fed IdP federation is configured with an organization, does each guest need to be sent and redeem an individual invitation?
91
+
**Once SAML/WS-Fed IdP federation is configured with an organization, does each guest need to be sent and redeem an individual invitation?**
92
+
85
93
Setting up SAML/WS-Fed IdP federation doesn’t change the authentication method for guest users who have already redeemed an invitation from you. You can update a guest user’s authentication method by [resetting their redemption status](reset-redemption-status.md).
86
94
87
-
### Is there a way to send a signed request to the SAML identity provider?
95
+
**Is there a way to send a signed request to the SAML identity provider?**
96
+
88
97
Currently, the Azure AD SAML/WS-Fed federation feature doesn't support sending a signed authentication token to the SAML identity provider.
89
98
90
99
## Step 1: Determine if the partner needs to update their DNS text records
@@ -187,7 +196,7 @@ Next, you'll configure federation with the IdP configured in step 1 in Azure AD.
187
196
4. On the **New SAML/WS-Fed IdP** page, enter the following:
188
197
-**Display name** - Enter a name to help you identify the partner's IdP.
189
198
-**Identity provider protocol** - Select **SAML** or **WS-Fed**.
190
-
-**Domain name of federating IdP** - Enter your partner’s IdP target domain name for federation. Currently, one domain name is supported, but we're working on allowing more.
199
+
-**Domain name of federating IdP** - Enter your partner’s IdP target domain name for federation. During this initial configuration, enter just one domain name. You'll be able to add more domains later.
191
200
192
201

193
202
@@ -202,8 +211,20 @@ Next, you'll configure federation with the IdP configured in step 1 in Azure AD.
202
211
> [!NOTE]
203
212
> Metadata URL is optional, however we strongly recommend it. If you provide the metadata URL, Azure AD can automatically renew the signing certificate when it expires. If the certificate is rotated for any reason before the expiration time or if you do not provide a metadata URL, Azure AD will be unable to renew it. In this case, you'll need to update the signing certificate manually.
204
213
205
-
6. Select **Save**.
214
+
6. Select **Save**. The identity provider is added to the **SAML/WS-Fed identity providers** list.
215
+
216
+

217
+
218
+
7. (Optional) To add more domain names to this federating identity provider:
219
+
220
+
a. Select the link in the **Domains** column.
221
+
222
+

206
223
224
+
b. Next to **Domain name of federating IdP**, type the domain name, and then select **Add**. Repeat for each domain you want to add. When you're finished, select **Done**.
225
+
226
+

227
+
207
228
### To configure federation using the Microsoft Graph API
208
229
209
230
You can use the Microsoft Graph API [samlOrWsFedExternalDomainFederation](/graph/api/resources/samlorwsfedexternaldomainfederation?view=graph-rest-beta&preserve-view=true) resource type to set up federation with an identity provider that supports either the SAML or WS-Fed protocol.
@@ -215,7 +236,7 @@ Now test your federation setup by inviting a new B2B guest user. For details, se
215
236
216
237
On the **All identity providers** page, you can view the list of SAML/WS-Fed identity providers you've configured and their certificate expiration dates. From this list, you can renew certificates and modify other configuration details.
217
238
218
-

239
+

219
240
220
241
1. Go to the [Azure portal](https://portal.azure.com/). In the left pane, select **Azure Active Directory**.
221
242
1. Select **External Identities**.
@@ -233,11 +254,16 @@ On the **All identity providers** page, you can view the list of SAML/WS-Fed ide
233
254
234
255

235
256
236
-
1. To view the domain for the IdP, select the link in the **Domains** column to view the partner's target domain name for federation.
237
-
> [!NOTE]
238
-
> If you need to update the partner's domain, you'll need to [delete the configuration](#how-do-i-remove-federation) and reconfigure federation with the identity provider using the new domain.
257
+
1. To edit the domains associated with the partner, select the link in the **Domains** column. In the domain details pane:
258
+
259
+
- To add a domain, type the domain name next to **Domain name of federating IdP**, and then select **Add**. Repeat for each domain you want to add.
260
+
- To delete a domain, select the delete icon next to the domain.
261
+
- When you're finished, select **Done**.
239
262
240
-

263
+

264
+
265
+
> [!NOTE]
266
+
> To remove federation with the partner, delete all but one of the domains and follow the steps in the [next section](#how-do-i-remove-federation).
241
267
242
268
## How do I remove federation?
243
269
@@ -249,7 +275,8 @@ To remove a configuration for an IdP in the Azure AD portal:
249
275
1. Select **All identity providers**.
250
276
1. Under **SAML/WS-Fed identity providers**, scroll to the identity provider in the list or use the search box.
251
277
1. Select the link in the **Domains** column to view the IdP's domain details.
252
-
1. Select **Delete Configuration**.
278
+
2. Delete all but one of the domains in the **Domain name** list.
279
+
3. Select **Delete Configuration**, and then select **Done**.
253
280
254
281

Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/external-collaboration-settings-configure.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: B2B
8
8
ms.topic: how-to
9
-
ms.date: 08/22/2022
9
+
ms.date: 10/24/2022
10
10
11
11
ms.author: mimart
12
12
author: msmimart
@@ -52,8 +52,6 @@ For B2B collaboration with other Azure AD organizations, you should also review
52
52
-**Member users and users assigned to specific admin roles can invite guest users including guests with member permissions**: To allow member users and users who have specific administrator roles to invite guests, select this radio button.
53
53
-**Only users assigned to specific admin roles can invite guest users**: To allow only those users with administrator roles to invite guests, select this radio button. The administrator roles include [Global Administrator](../roles/permissions-reference.md#global-administrator), [User Administrator](../roles/permissions-reference.md#user-administrator), and [Guest Inviter](../roles/permissions-reference.md#guest-inviter).
54
54
-**No one in the organization can invite guest users including admins (most restrictive)**: To deny everyone in the organization from inviting guests, select this radio button.
55
-
> [!NOTE]
56
-
> If **Members can invite** is set to **No** and **Admins and users in the guest inviter role can invite** is set to **Yes**, users in the **Guest Inviter** role will still be able to invite guests.
57
55
58
56
1. Under **Enable guest self-service sign up via user flows**, select **Yes** if you want to be able to create user flows that let users sign up for apps. For more information about this setting, see [Add a self-service sign-up user flow to an app](self-service-sign-up-user-flow.md).
0 commit comments