Skip to content

Commit f56856d

Browse files
Merge pull request #209867 from msmimart/mm-eotp-namkedia
[EXID] Update email one-time passcode (EOTP) for common endpoint capability
2 parents 05308de + c558aad commit f56856d

File tree

1 file changed

+14
-6
lines changed

1 file changed

+14
-6
lines changed

articles/active-directory/external-identities/one-time-passcode.md

Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: how-to
10-
ms.date: 08/30/2022
10+
ms.date: 08/31/2022
1111
ms.author: mimart
1212
author: msmimart
1313
manager: CelesteDG
@@ -20,16 +20,23 @@ ms.collection: M365-identity-device-management
2020

2121
The email one-time passcode feature is a way to authenticate B2B collaboration users when they can't be authenticated through other means, such as Azure AD, Microsoft account (MSA), or social identity providers. When a B2B guest user tries to redeem your invitation or sign in to your shared resources, they can request a temporary passcode, which is sent to their email address. Then they enter this passcode to continue signing in.
2222

23-
You can enable this feature at any time in the Azure portal by configuring the Email one-time passcode identity provider under your tenant's External Identities settings. You can choose to enable the feature, disable it, or wait for automatic enablement.
24-
2523
![Diagram showing an overview of Email one-time passcode.](media/one-time-passcode/email-otp.png)
2624

2725
> [!IMPORTANT]
2826
>
2927
> - The email one-time passcode feature is now turned on by default for all new tenants and for any existing tenants where you haven’t explicitly turned it off. This feature provides a seamless fallback authentication method for your guest users. If you don’t want to use this feature, you can [disable it](#disable-email-one-time-passcode), in which case users will be prompted to create a Microsoft account instead.
30-
> - Email one-time passcode settings have moved in the Azure portal from **External collaboration settings** to **All identity providers**.
31-
> [!NOTE]
32-
> One-time passcode users must sign in using a link that includes the tenant context (for example, `https://myapps.microsoft.com/?tenantid=<tenant id>` or `https://portal.azure.com/<tenant id>`, or in the case of a verified domain, `https://myapps.microsoft.com/<verified domain>.onmicrosoft.com`). Direct links to applications and resources also work as long as they include the tenant context. Guest users are currently unable to sign in using endpoints that have no tenant context. For example, using `https://myapps.microsoft.com`, `https://portal.azure.com` will result in an error.
28+
29+
## Sign-in endpoints
30+
31+
Email one-time passcode guest users can now sign in to your multi-tenant or Microsoft first-party apps by using a [common endpoint](redemption-experience.md#redemption-and-sign-in-through-a-common-endpoint) (in other words, a general app URL that doesn't include your tenant context). During the sign-in process, the guest user chooses **Sign-in options**, and then selects **Sign in to an organization**. The user then types the name of your organization and continues signing in using one-time passcode.
32+
33+
Email one-time passcode guest users can also use application endpoints that include your tenant information, for example:
34+
35+
* `https://myapps.microsoft.com/?tenantid=<your tenant ID>`
36+
* `https://myapps.microsoft.com/<your verified domain>.onmicrosoft.com`
37+
* `https://portal.azure.com/<your tenant ID>`
38+
39+
You can also give email one-time passcode guest users a direct link to an application or resource by including your tenant information, for example `https://myapps.microsoft.com/signin/Twitter/<application ID?tenantId=<your tenant ID>`.
3340

3441
## User experience for one-time passcode guest users
3542

@@ -55,6 +62,7 @@ When a guest user redeems an invitation or uses a link to a resource that has be
5562
- They don't have an Azure AD account
5663
- They don't have a Microsoft account
5764
- The inviting tenant didn't set up federation with social (like [Google](google-federation.md)) or other identity providers.
65+
- Email one-time passcode is enabled.
5866

5967
At the time of invitation, there's no indication that the user you're inviting will use one-time passcode authentication. But when the guest user signs in, one-time passcode authentication will be the fallback method if no other authentication methods can be used.
6068

0 commit comments

Comments
 (0)