You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-identity-access-management/includes/3-design-solution-external-identities.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,15 +24,15 @@ External ID addresses two primary scenarios through different tenant configurati
24
24
|**B2B collaboration**| Workforce tenant | Partners, vendors, and contractors accessing your organization's Microsoft 365 apps, SharePoint, Teams, and line-of-business applications |
25
25
|**Customer identity (CIAM)**| External tenant | Consumers and business customers accessing your custom applications with branded sign-in experiences |
26
26
27
-
:::image type="content" source="../media/external-id-tenant-configurations.png" alt-text="Diagram showing a representation of the two external ID scenarios and the corresponding tenant type. Collaboration with business guests uses a workforce tenant configuration. External facing apps use an external tenant configuration.":::
27
+
:::image type="content" source="../media/external-id-tenant-configurations.png" lightbox="../media/external-id-tenant-configurations.png" alt-text="Diagram showing a representation of the two external ID scenarios and the corresponding tenant type. Collaboration with business guests uses a workforce tenant configuration. External facing apps use an external tenant configuration.":::
28
28
29
29
### B2B collaboration in workforce tenants
30
30
31
31
B2B collaboration enables your workforce to work securely with external business partners. You invite guests to sign in to your Microsoft Entra organization using their own credentials, granting them access to the apps and resources you choose to share.
32
32
33
33
With B2B collaboration, the partner uses their own identity management solution. You don't manage external accounts, sync accounts, or handle password resets. Guest users authenticate with their home organization or identity provider, while your organization controls resource access through policies. This means B2B guests are subject to your Conditional Access policies, MFA requirements, terms of use, and other security controls—just like your internal users.
34
34
35
-
:::image type="content" source="../media/b2b-collaboration-overview.png" alt-text="Diagram showing a representation of B2B collaboration.":::
35
+
:::image type="content" source="../media/b2b-collaboration-overview.png" lightbox="../media/b2b-collaboration-overview.png" alt-text="Diagram showing a representation of B2B collaboration.":::
36
36
37
37
#### Authentication with B2B collaboration
38
38
@@ -78,7 +78,7 @@ Both organizations must mutually enable B2B direct connect through cross-tenant
78
78
79
79
When building applications for consumers or business customers, Microsoft Entra External ID in an external tenant provides customer identity and access management (CIAM) capabilities. This configuration isolates customer identities from your workforce directory.
80
80
81
-
:::image type="content" source="../media/overview-ciam.png" alt-text="Diagram showing a representation of External ID in an external tenant.":::
81
+
:::image type="content" source="../media/customer-identity-access-management.png" lightbox="../media/customer-identity-access-management.png" alt-text="Diagram showing a representation of External ID in an external tenant.":::
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-identity-access-management/includes/5-align-conditional-access-zero-trust.md
+22-17Lines changed: 22 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -97,31 +97,36 @@ The assume breach principle acknowledges that compromise can occur and focuses o
97
97
Use this checklist to validate your Conditional Access configuration against Zero Trust requirements:
98
98
99
99
**Identity controls**
100
-
-[ ] MFA required for all users
101
-
-[ ] Legacy authentication blocked
102
-
-[ ] Risk-based policies enabled
103
-
-[ ] Phishing-resistant authentication for privileged accounts
100
+
101
+
☐ MFA required for all users<br>
102
+
☐ Legacy authentication blocked<br>
103
+
☐ Risk-based policies enabled<br>
104
+
☐ Phishing-resistant authentication for privileged accounts
104
105
105
106
**Device controls**
106
-
-[ ] Device compliance required for corporate resource access
107
-
-[ ] Device filters configured for appropriate targeting
0 commit comments