You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/cross-cloud-settings.md
+24-4Lines changed: 24 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Configure B2B collaboration Microsoft cloud settings - Azure AD
3
-
description: Use Microsoft cloud settings to enable cross-cloud B2B collaboration between sovereign (national) Microsoft Azure clouds.
3
+
description: Use Microsoft cloud settings to enable cross-cloud B2B collaboration between sovereign (national) Microsoft Azure clouds (aka cross-cloud b2b).
When Azure AD organizations in separate Microsoft Azure clouds need to collaborate, they can use Microsoft cloud settings to enable Azure AD B2B collaboration. B2B collaboration is available between the following global and sovereign Microsoft Azure clouds:
23
23
24
-
- Microsoft Azure global cloud and Microsoft Azure Government
25
-
- Microsoft Azure global cloud and Microsoft Azure China 21Vianet
24
+
- Microsoft Azure commercial cloud and Microsoft Azure Government
25
+
- Microsoft Azure commercial cloud and Microsoft Azure China 21Vianet
26
26
27
27
To set up B2B collaboration between partner organizations in different Microsoft Azure clouds, each partner mutually agrees to configure B2B collaboration with each other. In each organization, an admin completes the following steps:
28
28
@@ -74,12 +74,32 @@ Follow these steps to add the tenant you want to collaborate with to your Organi
74
74
75
75

76
76
77
-
78
77
1. If you want to change the cross-tenant access settings for this organization, select the **Inherited from default** link under the **Inbound access** or **Outbound access** column. Then follow the detailed steps in these sections:
After enabling collaboration with an organization from a different Microsoft cloud, cross-cloud Azure AD guest users can now sign in to your multi-tenant or Microsoft first-party apps by using a [common endpoint](redemption-experience.md#redemption-and-sign-in-through-a-common-endpoint) (in other words, a general app URL that doesn't include your tenant context). During the sign-in process, the guest user chooses **Sign-in options**, and then selects **Sign in to an organization**. The user then types the name of your organization and continues signing in using their Azure AD credentials.
85
+
86
+
Cross-cloud Azure AD guest users can also use application endpoints that include your tenant information, for example:
You can also give cross-cloud Azure AD guest users a direct link to an application or resource by including your tenant information, for example `https://myapps.microsoft.com/signin/Twitter/<application ID?tenantId=<your tenant ID>`.
93
+
94
+
## Supported scenarios with cross-cloud Azure AD guest users
95
+
96
+
The following scenarios are supported when collaborating with an organization from a different Microsoft cloud:
97
+
98
+
- Use B2B collaboration to invite a user in the partner tenant to access resources in your organization, including web line-of-business apps, SaaS apps, and SharePoint Online sites, documents, and files.
99
+
- Use B2B collaboration to grant users from a partner tenant to access and manage configurations in the Azure portal
100
+
- Use B2B collaboration to [share Power BI content to a user in the partner tenant](/power-bi/enterprise/service-admin-azure-ad-b2b#cross-cloud-b2b).
101
+
- Apply Conditional Access policies to the B2B collaboration user and opt to trust multi-factor authentication or device claims (compliant claims and hybrid Azure AD joined claims) from the user’s home tenant.
102
+
83
103
## Next steps
84
104
85
105
See [Configure external collaboration settings](external-collaboration-settings-configure.md) for B2B collaboration with non-Azure AD identities, social identities, and non-IT managed external accounts.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/cross-tenant-access-overview.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,17 +68,18 @@ You can configure organization-specific settings by adding an organization and m
68
68
69
69
Microsoft cloud settings let you collaborate with organizations from different Microsoft Azure clouds. With Microsoft cloud settings, you can establish mutual B2B collaboration between the following clouds:
70
70
71
-
- Microsoft Azure global cloud and Microsoft Azure Government
72
-
- Microsoft Azure global cloud and Microsoft Azure China 21Vianet
71
+
- Microsoft Azure commercial cloud and Microsoft Azure Government
72
+
- Microsoft Azure commercial cloud and Microsoft Azure China (operated by 21Vianet)
73
73
74
74
> [!NOTE]
75
75
> Microsoft Azure Government includes the Office GCC-High and DoD clouds.
76
76
77
77
To set up B2B collaboration, both organizations configure their Microsoft cloud settings to enable the partner's cloud. Then each organization uses the partner's tenant ID to find and add the partner to their organizational settings. From there, each organization can allow their default cross-tenant access settings apply to the partner, or they can configure partner-specific inbound and outbound settings. After you establish B2B collaboration with a partner in another cloud, you'll be able to:
78
78
79
79
- Use B2B collaboration to invite a user in the partner tenant to access resources in your organization, including web line-of-business apps, SaaS apps, and SharePoint Online sites, documents, and files.
80
+
- Use B2B collaboration to grant users from a partner tenant to access and manage configurations in the Azure portal
80
81
- Use B2B collaboration to [share Power BI content to a user in the partner tenant](/power-bi/enterprise/service-admin-azure-ad-b2b#cross-cloud-b2b).
81
-
- Apply Conditional Access policies to the B2B collaboration user and opt to trust device claims (compliant claims and hybrid Azure AD joined claims) from the user’s home tenant.
82
+
- Apply Conditional Access policies to the B2B collaboration user and opt to trust multi-factor authentication or device claims (compliant claims and hybrid Azure AD joined claims) from the user’s home tenant.
82
83
83
84
> [!NOTE]
84
85
> B2B direct connect is not supported for collaboration with Azure AD tenants in a different Microsoft cloud.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/redemption-experience.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ When you add a guest user to your directory, the guest user account has a consen
29
29
30
30
## Redemption and sign-in through a common endpoint
31
31
32
-
Guest users can now sign in to your multi-tenant or Microsoft first-party apps through a common endpoint (URL), for example `https://myapps.microsoft.com`. Previously, a common URL would redirect a guest user to their home tenant instead of your resource tenant for authentication, so a tenant-specific link was required (for example `https://myapps.microsoft.com/?tenantid=<tenant id>`). Now the guest user can go to the application's common URL, choose **Sign-in options**, and then select **Sign in to an organization**. The user then types the name of your organization.
32
+
Guest users can now sign in to your multi-tenant or Microsoft first-party apps through a common endpoint (URL), for example `https://myapps.microsoft.com`. Previously, a common URL would redirect a guest user to their home tenant instead of your resource tenant for authentication, so a tenant-specific link was required (for example `https://myapps.microsoft.com/?tenantid=<tenant id>`). Now the guest user can go to the application's common URL, choose **Sign-in options**, and then select **Sign in to an organization**. The user then types the domain name of your organization.
0 commit comments