You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-certificate-based-authentication-smartcard.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,6 +54,9 @@ Some customers may maintain different and sometimes may have non-routable UPN va
54
54
>[!NOTE]
55
55
>In all cases, a user supplied username login hint (X509UserNameHint) will be sent if provided. For more information, see [User Name Hint](/windows/security/identity-protection/smart-cards/smart-card-group-policy-and-registry-settings#allow-user-name-hint)
56
56
57
+
>[!IMPORTANT]
58
+
> If a user supplies a username login hint (X509UserNameHint), the value provided **MUST** be in UPN Format.
59
+
57
60
For more information about the Windows flow, see [Certificate Requirements and Enumeration (Windows)](/windows/security/identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration).
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/ui-autopilot.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,13 +8,13 @@ ms.service: active-directory
8
8
ms.subservice: ciem
9
9
ms.workload: identity
10
10
ms.topic: overview
11
-
ms.date: 02/23/2022
11
+
ms.date: 02/16/2023
12
12
ms.author: jfields
13
13
---
14
14
15
15
# View rules in the Autopilot dashboard
16
16
17
-
The **Autopilot** dashboard in Permissions Management provides a table of information about **Autopilot rules** for administrators.
17
+
The **Autopilot** dashboard in Permissions Management provides a table of information about Autopilot rules for administrators. Creating Autopilot rules allows you to automate right-sizing policies so you can automatically remove unused roles and permissions assigned to identities in your authorization system.
18
18
19
19
20
20
> [!NOTE]
@@ -30,13 +30,13 @@ The **Autopilot** dashboard in Permissions Management provides a table of inform
30
30
The following information displays in the **Autopilot Rules** table:
31
31
32
32
-**Rule Name**: The name of the rule.
33
-
-**State**: The status of the rule: idle (not being use) or active (being used).
34
-
-**Rule Type**: The type of rule being applied.
33
+
-**State**: The status of the rule: idle (not in use) or active (in use).
34
+
-**Rule Type**: The type of rule that's applied.
35
35
-**Mode**: The status of the mode: on-demand or not.
36
36
-**Last Generated**: The date and time the rule was last generated.
37
37
-**Created By**: The email address of the user who created the rule.
38
38
-**Last Modified**: The date and time the rule was last modified.
39
-
-**Subscription**: Provides an **On** or **Off** subscription that allows you to receive email notifications when recommendations have been generated, applied, or unapplied.
39
+
-**Subscription**: Provides an **On** or **Off** subscription that allows you to receive email notifications when recommendations are generated, applied, or unapplied.
40
40
41
41
## View other available options for rules
42
42
@@ -48,7 +48,7 @@ The **Autopilot** dashboard in Permissions Management provides a table of inform
48
48
-**Delete Rule**: Select to delete the rule. Only the user who created the selected rule can delete the rule.
49
49
-**Generate Recommendations**: Creates recommendations for each user and the authorization system. Only the user who created the selected rule can create recommendations.
50
50
-**View Recommendations**: Displays the recommendations for each user and authorization system.
51
-
-**Notification Settings**: Displays the users subscribed to this rule. Only the user who created the selected rule can add other users to be notified.
51
+
-**Notification Settings**: Displays the users subscribed to this rule. Only the user who created the selected rule can add other users to receive notifications.
The following table gives a detailed comparison of the security policy and compliance options in Azure AD External Identities. Security policy and compliance are managed by the host/inviting organization under Conditional Access policies.
94
+
95
+
|**Policy**|**B2B collaboration users**|**B2B direct connect users**|
|**Grant controls — Require multifactor authentication**| Supported | Supported, requires configuring your [inbound trust settings](cross-tenant-access-settings-b2b-direct-connect.md#to-change-inbound-trust-settings-for-mfa-and-device-state) to accept MFA claims from the external organization |
99
+
|**Grant controls — Require compliant device**| Supported, requires configuring your [inbound trust settings](cross-tenant-access-settings-b2b-collaboration.md#to-change-inbound-trust-settings-for-mfa-and-device-claims) to accept compliant device claims from the external organization. | Supported, requires configuring your [inbound trust settings](cross-tenant-access-settings-b2b-direct-connect.md#to-change-inbound-trust-settings-for-mfa-and-device-state) to accept compliant device claims from the external organization. |
100
+
|**Grant controls — Require Hybrid Azure AD joined device**| Supported, requires configuring your [inbound trust settings](cross-tenant-access-settings-b2b-collaboration.md#to-change-inbound-trust-settings-for-mfa-and-device-claims) to accept hybrid Azure AD joined device claims from the external organization | Supported, requires configuring your [inbound trust settings](cross-tenant-access-settings-b2b-direct-connect.md#to-change-inbound-trust-settings-for-mfa-and-device-state) to accept hybrid Azure AD joined device claims from the external organization |
101
+
|**Grant controls — Require approved client app**| Not supported | Not supported |
102
+
|**Grant controls — Require app protection policy**| Not supported | Not supported |
103
+
|**Grant controls — Require password change**| Not supported | Not supported |
104
+
|**Grant controls — Terms of Use**| Supported | Not supported |
105
+
|**Session controls — Use app enforced restrictions**| Supported | Not supported |
106
+
|**Session controls — Use Conditional Access App control**| Supported | Not supported |
107
+
|**Session controls — Sign-in frequency**| Supported | Not supported |
In an Azure AD cross-tenant scenario, the resource organization can create Conditional Access policies that require MFA or device compliance for all guest and external users. Generally, a B2B collaboration user accessing a resource is then required to set up their Azure AD MFA with the resource tenant. However, Azure AD now offers the ability to trust MFA claims from other Azure AD tenants. Enabling MFA trust with another tenant streamlines the sign-in process for B2B collaboration users and enables access for B2B direct connect users.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/external-identities-overview.md
+6-1Lines changed: 6 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,7 +85,12 @@ The following table gives a detailed comparison of the scenarios you can enable
85
85
|**Identity providers supported**| External users can collaborate using work accounts, school accounts, any email address, SAML and WS-Fed based identity providers, and social identity providers like Gmail and Facebook. | External users collaborate using Azure AD work accounts or school accounts. | Consumer users with local application accounts (any email address, user name, or phone number), Azure AD, various supported social identities, and users with corporate and government-issued identities via SAML/WS-Fed-based identity provider federation. |
86
86
|**Single sign-on (SSO)**| SSO to all Azure AD-connected apps is supported. For example, you can provide access to Microsoft 365 or on-premises apps, and to other SaaS apps such as Salesforce or Workday. | SSO to a Teams shared channel. | SSO to customer owned apps within the Azure AD B2C tenants is supported. SSO to Microsoft 365 or to other Microsoft SaaS apps isn't supported. |
87
87
|**Licensing and billing**| Based on monthly active users (MAU), including B2B collaboration and Azure AD B2C users. Learn more about [External Identities pricing](https://azure.microsoft.com/pricing/details/active-directory/external-identities/) and [billing setup for B2B](external-identities-pricing.md). | Based on monthly active users (MAU), including B2B collaboration, B2B direct connect, and Azure AD B2C users. Learn more about [External Identities pricing](https://azure.microsoft.com/pricing/details/active-directory/external-identities/) and [billing setup for B2B](external-identities-pricing.md). | Based on monthly active users (MAU), including B2B collaboration and Azure AD B2C users. Learn more about [External Identities pricing](https://azure.microsoft.com/pricing/details/active-directory/external-identities/) and [billing setup for Azure AD B2C](../../active-directory-b2c/billing.md). |
88
-
|**Security policy and compliance**| Managed by the host/inviting organization (for example, with [Conditional Access policies](authentication-conditional-access.md) and cross-tenant access settings). | Managed by the host/inviting organization (for example, with [Conditional Access policies](authentication-conditional-access.md) and cross-tenant access settings). See also the [Teams documentation](/microsoftteams/security-compliance-overview). | Managed by the organization via Conditional Access and Identity Protection. |
88
+
|**Security policy and compliance**| Managed by the host/inviting organization (for example, with [Conditional Access policies](authentication-conditional-access.md) and cross-tenant access settings). | Managed by the host/inviting organization (for example, with [Conditional Access policies](authentication-conditional-access.md) and cross-tenant access settings). See also the [Teams documentation](/microsoftteams/security-compliance-overview). | Managed by the organization via [Conditional Access and Identity Protection](../../active-directory-b2c/conditional-access-identity-protection-overview.md). |
89
+
| **Multi-factor Authentication (MFA)** | If inbound trust settings to accept MFA claims from the user's home tenant are configured, and MFA policies have already been met in the user's home tenant, the external user can sign in. If MFA trust isn't enabled, the user is presented with an MFA challenge from the resource organization. [Learn more](authentication-conditional-access.md#mfa-for-azure-ad-external-users) about MFA for Azure AD external users. | If inbound trust settings to accept MFA claims from the user's home tenant are configured, and MFA policies have already been met in the user's home tenant, the external user can sign in. If MFA trust isn't enabled, and Conditional Access policies require MFA, the user is blocked from accessing resources. You *must* configure your inbound trust settings to accept MFA claims from the organization. [Learn more](authentication-conditional-access.md#mfa-for-azure-ad-external-users) about MFA for Azure AD external users. | [Integrates directly](../../active-directory-b2c/multi-factor-authentication.md) with Azure AD Multi-Factor Authentication. |
90
+
|**Microsoft cloud settings**|[Supported.](cross-cloud-settings.md)|[Not supported.](cross-cloud-settings.md)| Not applicable. |
91
+
|**Entitlement management**|[Supported.](../governance/entitlement-management-overview.md)| Not supported. | Not applicable. |
92
+
|**Line-of-business (LOB) apps**| Supported. | Not supported. Only B2B direct connect-enabled apps can be shared (currently, Teams Connect shared channels). | Works with [RESTful API](../../active-directory-b2c/technical-overview.md#add-your-own-business-logic-and-call-restful-apis). |
93
+
|**Conditional Access**| Managed by the host/inviting organization. [Learn more](authentication-conditional-access.md) about Conditional Access policies. | Managed by the host/inviting organization. [Learn more](authentication-conditional-access.md) about Conditional Access policies. | Managed by the organization via [Conditional Access and Identity Protection](../../active-directory-b2c/conditional-access-identity-protection-overview.md). |
89
94
|**Branding**| Host/inviting organization's brand is used. | For sign-in screens, the user’s home organization brand is used. In the shared channel, the resource organization's brand is used. | Fully customizable branding per application or organization. |
0 commit comments