Skip to content

Commit da635fc

Browse files
committed
Cross-cloud updates
Updating based on feedback from CSS.
1 parent fe2c462 commit da635fc

File tree

3 files changed

+29
-8
lines changed

3 files changed

+29
-8
lines changed

articles/active-directory/external-identities/cross-cloud-settings.md

Lines changed: 24 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Configure B2B collaboration Microsoft cloud settings - Azure AD
3-
description: Use Microsoft cloud settings to enable cross-cloud B2B collaboration between sovereign (national) Microsoft Azure clouds.
3+
description: Use Microsoft cloud settings to enable cross-cloud B2B collaboration between sovereign (national) Microsoft Azure clouds (aka cross-cloud b2b).
44
services: active-directory
55
ms.service: active-directory
66
ms.subservice: B2B
@@ -21,8 +21,8 @@ ms.collection: M365-identity-device-management
2121
2222
When Azure AD organizations in separate Microsoft Azure clouds need to collaborate, they can use Microsoft cloud settings to enable Azure AD B2B collaboration. B2B collaboration is available between the following global and sovereign Microsoft Azure clouds:
2323

24-
- Microsoft Azure global cloud and Microsoft Azure Government
25-
- Microsoft Azure global cloud and Microsoft Azure China 21Vianet
24+
- Microsoft Azure commercial cloud and Microsoft Azure Government
25+
- Microsoft Azure commercial cloud and Microsoft Azure China 21Vianet
2626

2727
To set up B2B collaboration between partner organizations in different Microsoft Azure clouds, each partner mutually agrees to configure B2B collaboration with each other. In each organization, an admin completes the following steps:
2828

@@ -74,12 +74,32 @@ Follow these steps to add the tenant you want to collaborate with to your Organi
7474

7575
![Screenshot showing an organization added with default settings.](media/cross-cloud-settings/org-specific-settings-inherited.png)
7676

77-
7877
1. If you want to change the cross-tenant access settings for this organization, select the **Inherited from default** link under the **Inbound access** or **Outbound access** column. Then follow the detailed steps in these sections:
7978

8079
- [Modify inbound access settings](cross-tenant-access-settings-b2b-collaboration.md#modify-inbound-access-settings)
8180
- [Modify outbound access settings](cross-tenant-access-settings-b2b-collaboration.md#modify-outbound-access-settings)
8281

82+
## Sign-in endpoints
83+
84+
After enabling collaboration with an organization from a different Microsoft cloud, cross-cloud Azure AD guest users can now sign in to your multi-tenant or Microsoft first-party apps by using a [common endpoint](redemption-experience.md#redemption-and-sign-in-through-a-common-endpoint) (in other words, a general app URL that doesn't include your tenant context). During the sign-in process, the guest user chooses **Sign-in options**, and then selects **Sign in to an organization**. The user then types the name of your organization and continues signing in using their Azure AD credentials.
85+
86+
Cross-cloud Azure AD guest users can also use application endpoints that include your tenant information, for example:
87+
88+
* `https://myapps.microsoft.com/?tenantid=<your tenant ID>`
89+
* `https://myapps.microsoft.com/<your verified domain>.onmicrosoft.com`
90+
* `https://portal.azure.com/<your tenant ID>`
91+
92+
You can also give cross-cloud Azure AD guest users a direct link to an application or resource by including your tenant information, for example `https://myapps.microsoft.com/signin/Twitter/<application ID?tenantId=<your tenant ID>`.
93+
94+
## Supported scenarios with cross-cloud Azure AD guest users
95+
96+
The following scenarios are supported when collaborating with an organization from a different Microsoft cloud:
97+
98+
- Use B2B collaboration to invite a user in the partner tenant to access resources in your organization, including web line-of-business apps, SaaS apps, and SharePoint Online sites, documents, and files.
99+
- Use B2B collaboration to grant users from a partner tenant to access and manage configurations in the Azure portal
100+
- Use B2B collaboration to [share Power BI content to a user in the partner tenant](/power-bi/enterprise/service-admin-azure-ad-b2b#cross-cloud-b2b).
101+
- Apply Conditional Access policies to the B2B collaboration user and opt to trust multi-factor authentication or device claims (compliant claims and hybrid Azure AD joined claims) from the user’s home tenant.
102+
83103
## Next steps
84104

85105
See [Configure external collaboration settings](external-collaboration-settings-configure.md) for B2B collaboration with non-Azure AD identities, social identities, and non-IT managed external accounts.

articles/active-directory/external-identities/cross-tenant-access-overview.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -68,17 +68,18 @@ You can configure organization-specific settings by adding an organization and m
6868
6969
Microsoft cloud settings let you collaborate with organizations from different Microsoft Azure clouds. With Microsoft cloud settings, you can establish mutual B2B collaboration between the following clouds:
7070

71-
- Microsoft Azure global cloud and Microsoft Azure Government
72-
- Microsoft Azure global cloud and Microsoft Azure China 21Vianet
71+
- Microsoft Azure commercial cloud and Microsoft Azure Government
72+
- Microsoft Azure commercial cloud and Microsoft Azure China (operated by 21Vianet)
7373

7474
> [!NOTE]
7575
> Microsoft Azure Government includes the Office GCC-High and DoD clouds.
7676
7777
To set up B2B collaboration, both organizations configure their Microsoft cloud settings to enable the partner's cloud. Then each organization uses the partner's tenant ID to find and add the partner to their organizational settings. From there, each organization can allow their default cross-tenant access settings apply to the partner, or they can configure partner-specific inbound and outbound settings. After you establish B2B collaboration with a partner in another cloud, you'll be able to:
7878

7979
- Use B2B collaboration to invite a user in the partner tenant to access resources in your organization, including web line-of-business apps, SaaS apps, and SharePoint Online sites, documents, and files.
80+
- Use B2B collaboration to grant users from a partner tenant to access and manage configurations in the Azure portal
8081
- Use B2B collaboration to [share Power BI content to a user in the partner tenant](/power-bi/enterprise/service-admin-azure-ad-b2b#cross-cloud-b2b).
81-
- Apply Conditional Access policies to the B2B collaboration user and opt to trust device claims (compliant claims and hybrid Azure AD joined claims) from the user’s home tenant.
82+
- Apply Conditional Access policies to the B2B collaboration user and opt to trust multi-factor authentication or device claims (compliant claims and hybrid Azure AD joined claims) from the user’s home tenant.
8283

8384
> [!NOTE]
8485
> B2B direct connect is not supported for collaboration with Azure AD tenants in a different Microsoft cloud.

articles/active-directory/external-identities/redemption-experience.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ When you add a guest user to your directory, the guest user account has a consen
2929
3030
## Redemption and sign-in through a common endpoint
3131

32-
Guest users can now sign in to your multi-tenant or Microsoft first-party apps through a common endpoint (URL), for example `https://myapps.microsoft.com`. Previously, a common URL would redirect a guest user to their home tenant instead of your resource tenant for authentication, so a tenant-specific link was required (for example `https://myapps.microsoft.com/?tenantid=<tenant id>`). Now the guest user can go to the application's common URL, choose **Sign-in options**, and then select **Sign in to an organization**. The user then types the name of your organization.
32+
Guest users can now sign in to your multi-tenant or Microsoft first-party apps through a common endpoint (URL), for example `https://myapps.microsoft.com`. Previously, a common URL would redirect a guest user to their home tenant instead of your resource tenant for authentication, so a tenant-specific link was required (for example `https://myapps.microsoft.com/?tenantid=<tenant id>`). Now the guest user can go to the application's common URL, choose **Sign-in options**, and then select **Sign in to an organization**. The user then types the domain name of your organization.
3333

3434
![Common endpoint sign-in](media/redemption-experience/common-endpoint-flow-small.png)
3535

0 commit comments

Comments
 (0)