Cross-tenant synchronization

Microsoft Security
15 Mar 202307:55

Summary

TLDRIn this video, Arvind, a Product Manager on the Azure AD team, introduces cross-tenant synchronization, a feature that enables organizations to automate the process of inviting users across different Azure AD tenants and maintaining their data in sync. The demonstration showcases how to set up cross-tenant access policies, establish trust, and configure synchronization between two tenants, ensuring that user changes are automatically reflected across all connected tenants. This allows for seamless access to resources and simplifies management across multiple organizations.

Takeaways

  • 📝 The video is presented by Arvind, a Product Manager on the Azure AD team, focusing on cross-tenant synchronization.
  • 🔄 Cross-tenant synchronization is a feature that allows for the sharing of resources across different Azure AD tenants, facilitating collaboration between merged or acquired companies.
  • 💼 The example scenario involves Contoso, which uses M365 and Azure, and an acquired company with its own Azure AD tenant and resources.
  • 🤝 Azure AD B2B enables inviting users from different tenants and assigning them the necessary access to resources.
  • 📊 There's a demand for automating the process of inviting users across organizations and keeping their data synchronized across all tenants.
  • 🛠️ Cross-tenant synchronization automatically invites B2B users across tenants and keeps them updated, including removing accounts when employees leave.
  • 📱 The setup process involves configuring cross-tenant access policies and trust settings in the Azure portal.
  • 🔑 Admins can consent on behalf of end users to avoid consent prompts when accessing resources for the first time.
  • 🔄 The configuration for cross-tenant synchronization includes assigning users or groups, specifying the target tenant ID, and defining attribute mappings.
  • 👤 The user type attribute can be set to 'B2B member' to provide a unified multi-tenant organization experience.
  • 🔍 By setting the 'show in address list' attribute to true, users become searchable across tenants in the target tenant's gallery.
  • ⚙️ On-demand provisioning allows for quick account creation in the target tenant, with updates and changes automatically reflected across all connected tenants.

Q & A

  • What is the main topic of the video presented by Arvind?

    -The main topic of the video is cross-tenant synchronization in Azure AD B2B, which allows users from different tenants to access resources across their organizational boundaries.

  • What does Contoso initially use for collaboration and cloud resource management?

    -Initially, Contoso uses M365 for collaboration and Azure to manage cloud resources and non-Microsoft apps like Adobe.

  • What is the scenario where cross-tenant synchronization becomes necessary for Contoso?

    -Cross-tenant synchronization becomes necessary when Contoso acquires a new company with its own Azure AD tenant, and users from both companies need to access resources from the other tenant, like ServiceNow or Adobe.

  • How does Azure AD B2B facilitate access to resources across different tenants?

    -Azure AD B2B allows you to invite users across tenants and assign them access to the necessary resources, automating the process and keeping their data in sync across all tenants.

  • What is the purpose of the Azure portal demonstration in the video?

    -The purpose of the Azure portal demonstration is to show how to set up cross-tenant synchronization between two tenants, ZT Tire Company and Woodgrove.

  • What is the first step in setting up cross-tenant access policy in the Azure portal?

    -The first step is to grab the tenant ID of one company and go into external identities in the other company's tenant to set up the cross-tenant access policy.

  • What does the 'consent prompt' setting in the trust settings tab allow an admin to do?

    -The 'consent prompt' setting allows an admin to consent on behalf of end users in their organization, so they won't face a consent prompt when accessing resources in the target tenant for the first time.

  • How does the outbound policy work in the context of cross-tenant synchronization?

    -The outbound policy allows the admin of one tenant to consent on behalf of users in their tenant, so those users won't have to face a consent prompt when accessing resources in the target tenant.

  • What is the significance of the user type attribute in cross-tenant synchronization?

    -The user type attribute is significant because it determines whether the user is treated as a B2B guest or a B2B member, with the latter providing a full multi-tenant organization experience.

  • What does the 'show in address list' attribute do in cross-tenant synchronization?

    -By setting the 'show in address list' attribute to true, all users will be visible in the target tenant's gallery, allowing admins to search for users across tenants.

  • How can an admin quickly provision a user account in the target tenant using on-demand provisioning?

    -An admin can quickly provision a user account in the target tenant by using on-demand provisioning, which allows them to create a user account within a few seconds.

  • What happens to user accounts when they leave the company in the context of cross-tenant synchronization?

    -When a user leaves the company, the changes, including their departure, will automatically be reflected across all tenants where the user was provisioned, without requiring manual action.

  • How can additional users be assigned access to necessary apps in cross-tenant synchronization?

    -Additional users can be assigned to a configuration, and as they join or leave the group associated with the configuration, they will be provisioned or deprovisioned automatically, with access to all the apps they need.

Outlines

00:00

🔗 Introduction to Cross-Tenant Synchronization

Arvind, a Product Manager on the Azure AD team, introduces the concept of cross-tenant synchronization. He presents a scenario where an organization, Contoso, uses M365 and Azure for collaboration and resource management, including non-Microsoft apps like Adobe. After acquiring a new company with its own Azure AD tenant and resources, they face the challenge of enabling users to access resources across different tenants. Arvind explains how Azure AD B2B can be used to invite users across tenants and assign them access to necessary resources. He also discusses the need for automation in this process to keep user data synchronized across all tenants, which is addressed by cross-tenant synchronization. Arvind then proceeds to demonstrate the setup process in the Azure portal using two example tenants, ZT Tire Company and Woodgrove.

05:01

🛠️ Setting Up Cross-Tenant Synchronization

The video script details the process of setting up cross-tenant synchronization in Azure AD. It begins with obtaining the tenant ID and navigating to external identities to add a new tenant and set up a cross-tenant access policy. The admin configures trust settings, including consent prompts, to streamline the user experience. The script then moves on to setting up an outbound policy from the source tenant to the target tenant, which involves consenting on behalf of users to avoid consent prompts when accessing resources. After the initial setup, the script describes creating a new configuration for cross-tenant synchronization, assigning users or groups to the configuration, and specifying the target tenant for provisioning accounts. The attribute mappings are explained, emphasizing the user type attribute, which defaults to B2B member for a seamless multi-tenant experience. The script also highlights how to enable users to appear in the address list of the target tenant. The video concludes with a demonstration of on-demand provisioning, showing how user accounts are quickly created in the target tenant and automatically updated or deprovisioned as users join or leave groups in the source tenant. Arvind wraps up the video with a resource link for further information.

Mindmap

Keywords

💡Azure AD

Azure AD stands for Azure Active Directory, which is Microsoft's cloud-based identity and access management service. It plays a central role in the video's theme by enabling organizations to manage user identities and access to various resources securely. In the script, Azure AD is used to facilitate cross-tenant synchronization, allowing users from different organizations to access resources across their respective tenants.

💡Cross-tenant synchronization

Cross-tenant synchronization refers to the process of automatically managing user identities and access rights across multiple Azure AD tenants. This concept is central to the video as it explains how organizations can seamlessly integrate their operations when they acquire new companies with their own Azure AD tenants. The script provides a detailed walkthrough of setting up cross-tenant synchronization to ensure users can access necessary resources across different tenants.

💡M365

M365, or Microsoft 365, is a suite of productivity and collaboration tools offered by Microsoft. It is mentioned in the script as one of the services that organizations use for collaboration. The video discusses how cross-tenant synchronization can be used to manage access to M365 resources for users across different tenants.

💡Single sign-on (SSO)

Single sign-on (SSO) is an authentication process that allows a user to access multiple applications with one set of login credentials. In the context of the video, SSO is set up for the organization, enabling users to easily access the apps they need without having to log in multiple times.

💡B2B

B2B stands for business-to-business and, in the context of Azure AD, it refers to a feature that allows businesses to collaborate with each other securely. The video script discusses Azure AD B2B, explaining how it can be used to invite users across tenants and assign them the necessary access to resources.

💡Azure portal

The Azure portal is a web-based interface that provides access to Microsoft Azure cloud services. In the script, the Azure portal is used to demonstrate the setup process for cross-tenant synchronization, showing how administrators can configure policies and access controls.

💡External identities

External identities in Azure AD refer to users from outside the organization's own tenant. The script explains how to manage external identities by setting up cross-tenant access policies and synchronization, which is crucial for organizations that collaborate with other companies.

💡Consent prompt

A consent prompt is a user interface element that requests user permission to access resources or perform certain actions. In the video, the script discusses how administrators can consent on behalf of end users to avoid consent prompts when accessing resources in another tenant for the first time.

💡Provisioning

Provisioning in the context of Azure AD refers to the process of creating and managing user accounts automatically. The script describes how provisioning is used in cross-tenant synchronization to automatically create user accounts in the target tenant without manual intervention.

💡Attribute mapping

Attribute mapping is the process of defining how user attributes from one system correspond to attributes in another system during synchronization. The video script explains how attribute mapping can be used to specify which user attributes should be synchronized across tenants, ensuring that user information remains consistent.

💡On-demand provisioning

On-demand provisioning allows for the immediate creation of user accounts or resources when needed. In the script, the concept is demonstrated by showing how a user account can be quickly provisioned in the target tenant, illustrating the efficiency of the cross-tenant synchronization process.

Highlights

Introduction to cross-tenant synchronization by Arvind, a Product Manager on the Azure AD team.

Example scenario involving Contoso organization using M365 and Azure for collaboration and resource management.

Contoso's acquisition of a new company with its own Azure AD tenant and M365 instance.

Challenge of enabling users to access resources across different tenants.

Azure AD B2B's capability to invite users across tenants and assign access to necessary resources.

Need for automation in inviting users across organizations and keeping data in sync.

Investment in cross-tenant synchronization to automate user invitations and data updates.

Demonstration of setting up cross-tenant synchronization in the Azure portal.

Procedure to add a tenant and set up cross-tenant access policy in external identities.

Explanation of trust settings and consent prompt for cross-tenant access.

Setting up outbound policy in ZT Tires to avoid consent prompt for users accessing Woodgrove resources.

Configuration process for cross-tenant synchronization, including naming and assigning users/groups.

Provisioning accounts into the target tenant without the need for additional credentials.

Attribute mappings for synchronization, including user type and show in address list.

On-demand provisioning to quickly create user accounts in the target tenant.

Automatic updates and deprovisioning of user accounts as they leave the company or change groups.

Conclusion and invitation to learn more about cross-tenant synchronization.

Transcripts

play00:00

>> [music]

play00:09

>> Hi I’m Arvind and I’m a Product Manager on the

play00:12

Azure AD team.

play00:14

In this video, I’ll be talking to you about cross-tenant

play00:16

synchronization. Let’s take a look at an example scenario.

play00:21

Here I’ve got an organization, Contoso.

play00:25

And today they’re using M365 for collaboration,

play00:29

Azure to manage cloud

play00:31

resources, and non-Microsoft apps

play00:34

like Adobe. They’ve set up

play00:37

single sign-on, and users in this

play00:39

organization are easily able to access the apps that they need.

play00:45

Over time they acquire a new company and that company

play00:49

has its own Azure AD tenant with its M365 instance,

play00:54

Azure resources, as well as

play00:57

non-Microsoft apps like ServiceNow.

play01:02

Over time these companies start to function more like

play01:05

one and users, like User 1, needs to access ServiceNow

play01:10

in the other tenant or User 2 needs to access Adobe

play01:14

in the other tenant.

play01:16

How do you enable these users to access resources across

play01:19

the boundaries of their tenant?

play01:22

Well, today with Azure AD B2B, you can invite these users

play01:26

across tenants and assign them access to the resources

play01:29

that they need. We’ve heard from you that you want

play01:33

to automate this process and

play01:35

invite users across organizations

play01:38

and keep their data in sync, so when someone changes

play01:41

their name, changes departments, leaves the company,

play01:46

we’ve heard from you that you want that information

play01:48

to get reflected across all the tenants that that user is

play01:51

collaborating in. So we’ve invested in cross-tenant

play01:55

synchronization which automatically invites these B2B

play01:59

users across tenants in your organization, as well as keeps

play02:03

them up to date and removes accounts when someone

play02:06

leaves the company.

play02:09

Let’s take a look at the Azure

play02:12

portal and see how this is set up.

play02:15

For this demo, I’ve got two tenants, ZT Tire Company

play02:19

and Woodgrove. To get this

play02:21

set up, I’ll first grab the tenant

play02:24

ID of ZT Tire Company and go into external identities

play02:28

in the Woodgrove tenant.

play02:31

Here I can choose to add ZT Tire Company and set up the

play02:35

cross-tenant access policy.

play02:38

I’ve actually added them previously, so I can go into the

play02:40

existing policy and click on the cross-tenant

play02:44

synchronization tab.

play02:46

Here, I as the admin of the Woodgrove tenant, can say that

play02:50

I trust the ZT Tire Company to sync users into my tenant.

play02:56

Once I’ve checked this

play02:57

checkbox, I can switch over to the

play03:00

trust settings tab, where I’ll see a new section

play03:03

for consent prompt.

play03:06

Here, I as the admin of Woodgrove, can consent

play03:09

on behalf of end users in my organization so that when

play03:13

they access resources in my tenant for the first time,

play03:16

they won’t face a consent prompt.

play03:20

With both those checkboxes selected, I’m actually done

play03:23

on the Woodgrove or target side with setting

play03:26

up cross-tenant sync.

play03:30

Now let’s switch back to ZT Tires. Here I can go

play03:34

into external identities. And I’ll set up an outbound policy

play03:41

where I am also consenting on behalf of users in my

play03:44

tenant so that way those users don’t have to face the

play03:47

consent prompt when they access resources in the

play03:50

Woodgrove tenant.

play03:53

Now that that initial setup is done,

play03:56

I can go into cross-tenant synchronization and choose

play04:00

to add a new configuration. I’ll provide it a name.

play04:05

We’ll call it ZTTire to Woodgrove and then create

play04:14

the configuration. Now clicking on the configuration,

play04:22

I can first assign a user or a group to the configuration.

play04:28

Previously I created a user

play04:29

called CrossTenantSynchronization,

play04:32

so I’ll go ahead and assign them.

play04:36

Now to set up cross-tenant sync, I will need the ID of the

play04:39

target tenant. So here I’ll grab the Woodgrove tenant ID.

play04:45

And then going into provisioning,

play04:47

specify the target tenant

play04:49

that I’d like to provision accounts into.

play04:53

That’s it. No credentials or anything to manage.

play04:55

Once I’ve provided the target tenant,

play04:57

I can save the configuration. And our sync engine will

play05:01

check to make sure that that cross-tenant access policy is

play05:04

in place before syncing any users.

play05:09

Now going into the attribute mappings, I can define which

play05:12

attributes I want to synchronize. We’ve got a set

play05:16

of defaults here. You can choose to delete these mappings,

play05:19

add additional attributes. For example, if you need to sync

play05:21

a directory extension, you’ll be able to choose that

play05:24

from the list of attributes.

play05:27

I’ll bring your attention to two attributes in particular.

play05:30

First is the user type. Most of you are probably using the

play05:35

B2B guest user type today. The default for cross-tenant

play05:39

synchronization will be B2B member to provide that full

play05:43

multi-tenant organization experience so that it feels like

play05:46

these users are just part of one tenant.

play05:52

If you’d like to update existing users from guest to member,

play05:55

you can choose to change the mapping to always

play05:58

and convert existing users.

play06:02

We also have an attribute

play06:04

here called show an address list.

play06:06

By setting this as a constant where the value is true,

play06:11

all users will then light up in the gallery in the target

play06:15

tenant and you’ll be able to search for users across tenants.

play06:22

Now let’s move back and transition to on-demand

play06:27

provisioning where I can quickly provision this in a few

play06:30

seconds and show that user account has been created.

play06:35

Now I’ll search for the user CrossTenantSynchronization.

play06:39

And in a few seconds, that account will get created in the

play06:42

target tenant.

play06:47

Switching over to the target tenant, I can search for the

play06:51

user that I just created.

play06:58

And here we can see that that account was created

play07:01

and they’ve been created as a type member.

play07:03

As we make updates to this user as they leave the company,

play07:07

those changes will

play07:08

automatically be reflected across

play07:09

tenants without you having to take action.

play07:14

Switching back to my previous tenant, I could choose

play07:18

to assign additional users to this configuration

play07:22

or, more likely, assign a group to the configuration.

play07:25

And as users come into the group, they’ll get provisioned

play07:28

automatically. As they leave the group,

play07:31

they’ll get deprovisioned automatically and you can assign

play07:34

those users access to all the apps that they need.

play07:38

Thanks for watching this video and to learn more,

play07:41

you can go to

play07:42

aka.ms/CrossTenantSynchronization.

play07:45

>> [music]

Rate This

5.0 / 5 (0 votes)

Ähnliche Tags
Azure ADB2BCross-TenantSynchronizationSSOCollaborationResource ManagementUser AccessAutomationCloud Security
Benötigen Sie eine Zusammenfassung auf Englisch?