Skip to content

Commit e8bba59

Browse files
authored
Merge pull request #214699 from MicrosoftDocs/main
Publish to live, Monday 4 AM PST, 10/17
2 parents 8a77cab + b6177f9 commit e8bba59

27 files changed

+369
-134
lines changed

articles/active-directory/authentication/concept-certificate-based-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ The following scenarios aren't supported:
7070
- Only one CRL Distribution Point (CDP) for a trusted CA is supported.
7171
- The CDP can be only HTTP URLs. We don't support Online Certificate Status Protocol (OCSP), or Lightweight Directory Access Protocol (LDAP) URLs.
7272
- Configuring other certificate-to-user account bindings, such as using the **Subject**, **Subject + Issuer** or **Issuer + Serial Number**, aren’t available in this release.
73-
- Password as an authentication method cannot be disabled and the option to sign in using a password is displayed even with Azure AB CBA method available to the user.
73+
- Password as an authentication method cannot be disabled and the option to sign in using a password is displayed even with Azure AD CBA method available to the user.
7474

7575
## Out of Scope
7676

articles/active-directory/external-identities/cross-tenant-access-settings-b2b-collaboration.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection: M365-identity-device-management
1616

1717
# Configure cross-tenant access settings for B2B collaboration
1818

19-
Use External Identities cross-tenant access settings to manage how you collaborate with other Azure AD organizations through B2B collaboration. These settings determine both the level of *inbound* access users in external Azure AD organizations have to your resources, as well as the level of *outbound* access your users have to external organizations. They also let you trust multi-factor authentication (MFA) and device claims ([compliant claims and hybrid Azure AD joined claims](../conditional-access/howto-conditional-access-policy-compliant-device.md)) from other Azure AD organizations. For details and planning considerations, see [Cross-tenant access in Azure AD External Identities](cross-tenant-access-overview.md).
19+
Use External Identities cross-tenant access settings to manage how you collaborate with other Azure AD organizations through B2B collaboration. These settings determine both the level of *inbound* access users in external Azure AD organizations have to your resources, and the level of *outbound* access your users have to external organizations. They also let you trust multi-factor authentication (MFA) and device claims ([compliant claims and hybrid Azure AD joined claims](../conditional-access/howto-conditional-access-policy-compliant-device.md)) from other Azure AD organizations. For details and planning considerations, see [Cross-tenant access in Azure AD External Identities](cross-tenant-access-overview.md).
2020

2121
## Before you begin
2222

@@ -92,9 +92,13 @@ With inbound settings, you select which external users and groups will be able t
9292

9393
### To change inbound B2B collaboration settings
9494

95-
1. Select the **B2B collaboration** tab.
95+
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator or Security administrator account. Then open the **Azure Active Directory** service.
96+
97+
1. Select **External Identities** > **Cross-tenant access settings**.
98+
99+
1. Under **Organizational settings** select the link in the **Inbound access** column and the **B2B collaboration** tab.
96100

97-
1. (This step applies to **Organizational settings** only.) If you're configuring inbound access settings for a specific organization, select one of the following:
101+
1. If you're configuring inbound access settings for a specific organization, select one of the following:
98102

99103
- **Default settings**: Select this option if you want the organization to use the default inbound settings (as configured on the **Default** settings tab). If customized settings were already configured for this organization, you'll need to select **Yes** to confirm that you want all settings to be replaced by the default settings. Then select **Save**, and skip the rest of the steps in this procedure.
100104

@@ -232,7 +236,7 @@ With outbound settings, you select which of your users and groups will be able t
232236
- When you're done selecting the users and groups you want to add, choose **Select**.
233237

234238
> [!NOTE]
235-
> When targeting your users and groups, you won't be able to select users who have configured [SMS-based authentication](../authentication/howto-authentication-sms-signin.md). This is because users who have a "federated credential" on their user object are blocked to prevent external users from being added to outbound access settings. As a workaround, you can use the [Microsoft Graph API](/graph/api/resources/crosstenantaccesspolicy-overview?view=graph-rest-1.0) to add the user's object ID directly or target a group the user belongs to.
239+
> When targeting your users and groups, you won't be able to select users who have configured [SMS-based authentication](../authentication/howto-authentication-sms-signin.md). This is because users who have a "federated credential" on their user object are blocked to prevent external users from being added to outbound access settings. As a workaround, you can use the [Microsoft Graph API](/graph/api/resources/crosstenantaccesspolicy-overview) to add the user's object ID directly or target a group the user belongs to.
236240
237241
1. Select the **External applications** tab.
238242

@@ -281,4 +285,4 @@ When you remove an organization from your Organizational settings, the default c
281285
## Next steps
282286

283287
- See [Configure external collaboration settings](external-collaboration-settings-configure.md) for B2B collaboration with non-Azure AD identities, social identities, and non-IT managed external accounts.
284-
- [Configure cross-tenant access settings for B2B direct connect](cross-tenant-access-settings-b2b-direct-connect.md)
288+
- [Configure cross-tenant access settings for B2B direct connect](cross-tenant-access-settings-b2b-direct-connect.md)

articles/active-directory/external-identities/invitation-email-elements.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 04/12/2021
9+
ms.date: 09/30/2022
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -17,13 +17,13 @@ ms.collection: M365-identity-device-management
1717

1818
# The elements of the B2B collaboration invitation email - Azure Active Directory
1919

20-
Invitation emails are a critical component to bring partners on board as B2B collaboration users in Azure AD. While it’s [not required that you send an email to invite someone using B2B collaboration](add-user-without-invite.md), doing so gives the user all the information they need to make a decision about whether to accept your invite. It also gives them a link they can always refer to in the future when they need to return to your resources.
20+
Invitation emails are a critical component to bring partners on board as B2B collaboration users in Azure AD. It’s [not required that you send an email to invite someone using B2B collaboration](add-user-without-invite.md), but it gives the user all the information they need to decide if they accept your invite or not. It also gives them a link they can always refer to in the future when they need to return to your resources.
2121

2222
![Screenshot showing the B2B invitation email](media/invitation-email-elements/invitation-email.png)
2323

2424
## Explaining the email
2525

26-
Let's look at a few elements of the email so you know how best to use their capabilities.
26+
Let's look at a few elements of the email so you know how best to use their capabilities. These elements might look slightly different in some email clients.
2727

2828
### Subject
2929

@@ -36,34 +36,34 @@ The subject of the email follows this pattern:
3636
We use a LinkedIn-like pattern for the From address. This pattern should make it clear that although the email comes from [email protected], the invitation is from another organization. The format is: Microsoft Invitations <[email protected]> or Microsoft invitations on behalf of &lt;tenantname&gt;<[email protected]>.
3737

3838
> [!NOTE]
39-
> For the Azure service operated by 21Vianet in China, the sender address is [email protected].
40-
> For the Azure AD Government, the sender address is [email protected].
39+
> For the Azure service operated by [21Vianet in China](/azure/china), the sender address is [email protected].
40+
> For the [Azure AD Government](/azure/azure-government), the sender address is [email protected].
4141
4242
### Reply To
4343

4444
The reply-to email is set to the inviter's email when available, so that replying to the email sends an email back to the inviter.
4545

4646
### Phishing warning
4747

48-
The email starts with a brief warning to the user about phishing, alerting them that they should only accept invitations they're expecting. It’s good practice to make sure the partners you’re inviting will not be surprised by your invitation by mentioning it to them ahead of time.
48+
The email starts with a brief warning to the user about phishing, alerting them that they should only accept invitations they're expecting. It’s good practice to make sure the partners you’re inviting won't be surprised by your invitation by mentioning it to them ahead of time.
4949

5050
![Image of the phishing warning in the email](media/invitation-email-elements/phishing-warning.png)
5151

5252
### Inviter's information and invitation message
5353

54-
The email includes the name and primary domain associated with the organization sending the invitation. This information should help the invitee make an informed decision about accepting the invitation. If the inviter includes a message as part of their invitation when they [invite a guest user to the directory, group, or app](add-users-administrator.md) or when they [use the invitation API](customize-invitation-api.md), the message is highlighted in the main section of the email. Also included are the inviter’s name and profile image if they’ve set one. The message itself is a text area, so for security reasons, it doesn't process HTML tags.
54+
The email includes the name and primary domain associated with the organization sending the invitation. This information should help the invitee make an informed decision about accepting the invitation. The inviter can include a message as part of their invitation to the [directory, group, or app](add-users-administrator.md), or when they [use the invitation API](customize-invitation-api.md). The message is highlighted in the main section of the email. The inviter’s name and profile image are also included if they’ve set one. The message itself is a text area, so for security reasons, it doesn't process HTML tags.
5555

5656
![Image of the invitation message in the email](media/invitation-email-elements/invitation-message-inviters-info.png)
5757

58-
### Accept button and redirect URL
58+
### Accept invitation button or link and redirect URL
5959

60-
The next section of the email contains information about where the invitee will be taken after they accept the invitation, as well as a button to do so. In the future, the invitee can always use this link to return to your resources directly.
60+
The next section of the email contains information about where the invitee will be taken after they accept the invitation, and a button or link to do so. In the future, the invitee can always use this link to return to your resources directly.
6161

6262
![Image of the accept button and redirect URL in the email](media/invitation-email-elements/accept-button.png)
6363

6464
### Footer section
6565

66-
The footer contains more information about the invitation being sent. There is always an option for the invitee to block future invitations. If the organization has [set a privacy statement](../fundamentals/active-directory-properties-area.md), the link to the statement is displayed here. Otherwise, a note indicates the organization hasn't set a privacy statement.
66+
The footer contains more information about the invitation being sent. There's always an option for the invitee to block future invitations. If the organization has [set a privacy statement](../fundamentals/active-directory-properties-area.md), the link to the statement is displayed here. Otherwise, a note indicates the organization hasn't set a privacy statement.
6767

6868
![Image of the footer section in the email](media/invitation-email-elements/footer-section.png)
6969

0 commit comments

Comments
 (0)