Skip to content

Commit e4ba6c1

Browse files
committed
Graph scrub on b2b
1 parent a576d58 commit e4ba6c1

File tree

3 files changed

+8
-8
lines changed

3 files changed

+8
-8
lines changed

articles/active-directory/b2b/b2b-fundamentals.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ This article contains recommendations and best practices for business-to-busines
3030
| Enforce Conditional Access policies for Multi-Factor Authentication (MFA) | We recommend enforcing MFA policies on the apps you want to share with partner B2B users. This way, MFA will be consistently enforced on the apps in your tenant regardless of whether the partner organization is using MFA. See [Conditional Access for B2B collaboration users](conditional-access.md). |
3131
| If you’re enforcing device-based Conditional Access policies, use exclusion lists to allow access to B2B users | If device-based Conditional Access policies are enabled in your organization, B2B guest user devices will be blocked because they’re not managed by your organization. You can create exclusion lists containing specific partner users to exclude them from the device-based Conditional Access policy. See [Conditional Access for B2B collaboration users](conditional-access.md). |
3232
| Use a tenant-specific URL when providing direct links to your B2B guest users | As an alternative to the invitation email, you can give a guest a direct link to your app or portal. This direct link must be tenant-specific, meaning it must include a tenant ID or verified domain so the guest can be authenticated in your tenant, where the shared app is located. See [Redemption experience for the guest user](redemption-experience.md). |
33-
| When developing an app, use UserType to determine guest user experience | If you're developing an application and you want to provide different experiences for tenant users and guest users, use the UserType property. The UserType claim isn't currently included in the token. Applications should use the Graph API to query the directory for the user to get their UserType. |
33+
| When developing an app, use UserType to determine guest user experience | If you're developing an application and you want to provide different experiences for tenant users and guest users, use the UserType property. The UserType claim isn't currently included in the token. Applications should use the Microsoft Graph API to query the directory for the user to get their UserType. |
3434
| Change the UserType property *only* if the user’s relationship to the organization changes | Although it’s possible to use PowerShell to convert the UserType property for a user from Member to Guest (and vice-versa), you should change this property only if the relationship of the user to your organization changes. See [Properties of a B2B guest user](user-properties.md).|
3535

3636
## Next steps

articles/active-directory/b2b/code-samples.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ This cmdlet sends an invitation to the email addresses in invitations.csv. Addit
5555
- Sending messages to CCs or suppressing email messages altogether
5656

5757
## Code sample
58-
Here we illustrate how to call the invitation API, in "app-only" mode, to get the redemption URL for the resource to which you are inviting the B2B user. The goal is to send a custom invitation email. The email can be composed with an HTTP client, so you can customize how it looks and send it through Graph API.
58+
Here we illustrate how to call the invitation API, in "app-only" mode, to get the redemption URL for the resource to which you are inviting the B2B user. The goal is to send a custom invitation email. The email can be composed with an HTTP client, so you can customize how it looks and send it through the Microsoft Graph API.
5959

6060
```csharp
6161
namespace SampleInviteApp
@@ -69,12 +69,12 @@ namespace SampleInviteApp
6969
class Program
7070
{
7171
/// <summary>
72-
/// Microsoft graph resource.
72+
/// Microsoft Graph resource.
7373
/// </summary>
7474
static readonly string GraphResource = "https://graph.microsoft.com";
7575

7676
/// <summary>
77-
/// Microsoft graph invite endpoint.
77+
/// Microsoft Graph invite endpoint.
7878
/// </summary>
7979
static readonly string InviteEndPoint = "https://graph.microsoft.com/v1.0/invitations";
8080

@@ -172,14 +172,14 @@ namespace SampleInviteApp
172172
}
173173

174174
/// <summary>
175-
/// Get the access token for our application to talk to microsoft graph.
175+
/// Get the access token for our application to talk to Microsoft Graph.
176176
/// </summary>
177-
/// <returns>Returns the access token for our application to talk to microsoft graph.</returns>
177+
/// <returns>Returns the access token for our application to talk to Microsoft Graph.</returns>
178178
private static string GetAccessToken()
179179
{
180180
string accessToken = null;
181181

182-
// Get the access token for our application to talk to microsoft graph.
182+
// Get the access token for our application to talk to Microsoft Graph.
183183
try
184184
{
185185
AuthenticationContext testAuthContext =

articles/active-directory/b2b/faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ Azure AD has a fixed set of character, password strength, and account lockout re
9494
For federated accounts, password policy depends on the policy that is applied in the on-premises tenancy and the user's Microsoft account settings.
9595

9696
### An organization might want to have different experiences in their applications for tenant users and guest users. Is there standard guidance for this? Is the presence of the identity provider claim the correct model to use?
97-
A guest user can use any identity provider to authenticate. For more information, see [Properties of a B2B collaboration user](user-properties.md). Use the **UserType** property to determine user experience. The **UserType** claim isn't currently included in the token. Applications should use the Graph API to query the directory for the user, and to get the UserType.
97+
A guest user can use any identity provider to authenticate. For more information, see [Properties of a B2B collaboration user](user-properties.md). Use the **UserType** property to determine user experience. The **UserType** claim isn't currently included in the token. Applications should use the Microsoft Graph API to query the directory for the user, and to get the UserType.
9898

9999
### Where can I find a B2B collaboration community to share solutions and to submit ideas?
100100
We're constantly listening to your feedback, to improve B2B collaboration. Please share your user scenarios, best practices, and what you like about Azure AD B2B collaboration. Join the discussion in the [Microsoft Tech Community](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-B2B/bd-p/AzureAD_B2b).

0 commit comments

Comments
 (0)