-
Notifications
You must be signed in to change notification settings - Fork 301
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Azure AD Guest Organization Management #49
Comments
Microsoft Graph can be used for this: {
"B2BManagementPolicy": {
"InvitationsAllowedAndBlockedDomainsPolicy": {
"AllowedDomains": [
"domain1.com",
"domain2.com",
"..."
]
},
"AutoRedeemPolicy": {
"AdminConsentedForUsersIntoTenantIds": [],
"NoAADConsentForUsersFromTenantsIds": []
}
}
} |
This comment has been minimized.
This comment has been minimized.
So to achieve this the following is needed...
{
"odata.metadata": "https://graph.windows.net/myorganization/$metadata#directoryObjects",
"value": [
{
"odata.type": "Microsoft.DirectoryServices.Policy",
"objectType": "Policy",
"objectId": "00000000-0000-0000-0000-000000000001",
"deletionTimestamp": null,
"alternativeIdentifier": null,
"definition": [
"{\"B2BManagementPolicy\":{\"InvitationsAllowedAndBlockedDomainsPolicy\":{\"AllowedDomains\":[]},\"AutoRedeemPolicy\":{\"AdminConsentedForUsersIntoTenantIds\":[],\"NoAADConsentForUsersFromTenantsIds\":[]}}}"
],
"displayName": "B2BManagementPolicy",
"isTenantDefault": true,
"keyCredentials": [],
"type": "B2BManagementPolicy"
},
{
"odata.type": "Microsoft.DirectoryServices.Policy",
"objectType": "Policy",
"objectId": "00000000-0000-0000-0000-000000000002",
"deletionTimestamp": null,
"alternativeIdentifier": null,
"definition": [
"{\"B2BManagementPolicy\":{\"InvitationsAllowedAndBlockedDomainsPolicy\":{\"AllowedDomains\":[\"Worlintest.onmicrosoft.com\"]},\"PreviewPolicy\":{\"Features\":[\"OneTimePasscode\"]},\"AutoRedeemPolicy\":{\"AdminConsentedForUsersIntoTenantIds\":[],\"NoAADConsentForUsersFromTenantsIds\":[]}}}"
],
"displayName": "B2BManagementPolicy2",
"isTenantDefault": false,
"keyCredentials": [],
"type": "B2BManagementPolicy"
}
]
}
PATCH /myorganization/policies/00000000-0000-0000-0000-000000000001?api-version=1.6 HTTP/1.1
Content-Type: application/json;charset=UTF-8
Authorization: Bearer <token> PATCH request body: {
"definition": [
"{\"B2BManagementPolicy\":{\"InvitationsAllowedAndBlockedDomainsPolicy\":{\"AllowedDomains\":[\"Worlintest.onmicrosoft.com\"]},\"PreviewPolicy\":{\"Features\":[\"OneTimePasscode\"]},\"AutoRedeemPolicy\":{\"AdminConsentedForUsersIntoTenantIds\":[],\"NoAADConsentForUsersFromTenantsIds\":[]}}}"
],
"displayName": "B2BManagementPolicy2",
"type": "B2BManagementPolicy"
} There seems to be a limitation using this where FYI - @divyavmnair - this might also help your question |
Thanks Adam |
Hi Adam, Collaboration settings also works perfect for me with this solution. I can seethe settings changed on active directory after refreshing the page. |
It looks like this API was deprecated and/or removed from MS Graph. Marking as blocked for now. |
Looks like cross-tenant configuration is supported on Graph now, is there possibility to revive this? |
Fix body marshalling for addPassword
Community Note
Description
A way to manage
Allowed
orDenied
guest organisations in the Azure AD external organisational relationship settings.Would like to be able to use an azuread_guest type resource (#41) but wouldn't be able to in many Azure AD tenancies until we can also whitelist the the domain for the guests.
New or Affected Resource(s)
Potential Terraform Configuration
Specifically separating management of individual guest organisations rather than treating it as a single collection set. Organisations may be added from elsewhere, managed under other processes.
An error would be given if specifying
Allow
in an AAD tenant with theDeny invitations ...
setting, and the reverse, if specifyingDeny
in an AAD tenant with theAllow invitations only ...
setting.References
The text was updated successfully, but these errors were encountered: