Solutions for External Access (part 2 of 3)
To read part 1, please click here
To read part 3, please click here
Properties of an Azure AD B2B User
According to the inviting organization's requirements, a user with an Azure AD B2B collaboration can have anyone of the following account states:
- State 1- Here, the B2B users can sign in with the help of an Azure AD account that belongs to the invited tenant. The guest user in Azure AD is still created even if the partner organization don't use Azure AD by simply redeeming their invitation and email address verification by Azure AD. This particular arrangement is also known as Just-in-Time (JIT) tenancy or a "viral" tenancy.
- State 2- This one allows the guest users to sign in with a Microsoft account or a social account like google.com or similar. The invited user's identity can be created as a Microsoft account in the inviting organization's directory during offer redemption.
- State 3- It's homed in the host organization's on-premises AD and synced with the host organization's Azure AD. Azure AD Connect can be used to sync the partner accounts to the cloud as Azure AD B2B users with UserType = Guest.
- State 4- Homed in the host organization's Azure AD with UserType = Guest and credentials that the host organization manages.
Key Properties of the Azure AD B2B Collaboration User
UserType
This property represents the relationship of the user as well as the host tenancy and have following two values:
- Member- It represents an employee of the host organization and a user in the organization's payroll. For example, if a user expects to have access to internal-only sites, then, it is not considered an external collaborator.
- Guest- It represents a user who isn't considered internal to the company, like an external collaborator, partner, or customer. This user doesn't receive a CEO's internal memo or receive company benefits, etc.
Source
It represents how the user signs in.
- Invited User- This user has been invited but has not yet redeemed an invitation.
- External Azure AD- This user is homed in an external organization and authenticates with the help of an Azure AD account that belongs to the other organization. This type of sign-in is similar to State 1.
- Microsoft Account- As the name suggests, this user is homed in a Microsoft account and authenticates with the Microsoft account as well. This type of sign-in is similar to State 2.
- Windows Server AD- This user is signed-in from on-premises AD that belongs to this organization. This type of sign-in is similar to State 3.
- Azure AD- This user authenticates with the help of an Azure AD account that belongs to this organization and this type of sign-in is similar to State 4.
To read part 1, please click here
To read part 3, please click here
Comments
Post a Comment