Forum Discussion
Azure AD B2B SharePoint on Premise using Groups
- Jun 07, 2017
Now Azure AD Groups are transmitted as Roles-Claim to SharePoint. The only thing we changed was the AzureCP configuration (Claims Provider) by removing the UPN Claim, so that only EmailAddress and Role is used as Claim types mapped to Azure objects.
Inorder for B2B users to access OnPrem applications, you need to:
1. Set up App proxy for Authentication to work
2. Write back B2B users to OnPremises for Authorization to work
We are working on making this more seamless in the future.
- DeletedSep 14, 2017What do you mean by "Write back B2B user" are you referring to leveraging AD connect? We are facing this same challenge. We have an on-prem SharePoint but need to share webaccess to external users.
- roykimSep 15, 2017MVP
My understanding the user writeback is no longer supported in Azure AD Connect
- null nullApr 05, 2018Copper Contributor
Hi
I don't know how you solved this but I'm using accounts defined in AzureAD (members and B2B guests), putting them in Azure groups (usage of AzureCP to see them in People Picker). The "Role" claim with the Azure group will appear in the claims associated to the user for Azure AD members and Azure AD Guest but only when defined as Microsoft Account (= source). When the source is "Azure AD External", it won't appear. Any idea ?
- Thomas HabersatterMay 19, 2017Copper Contributor
So do you mean that the suggested steps are necessary to access onPrem Farm at all, or do you mean the steps are necessary for being permitted with an Office 365 group.
Because directly authorized users already can access our onPrem SharePoint (via ADFS Proxy). I just search for an option to authorize external users by using a security group.
An alternative for me would be to have a group like "Everyone except External users". I just want to have a group (onPrem) to identify all external users.
- Bart KuppensMay 24, 2017Copper ContributorHello Thomas,
No, you don't need to do this to access your SharePoint On-Prem. I have done the same thing to give external users access to a SharePoint 2013 On-Prem, without an App Proxy or write-back stuff.
But I'm facing the same issue you have. I can give individual users from Azure AD access to a SharePoint on-prem but when they are part of a security group in Azure and I give them access through that group, the get an access denied.
Haven't found a solution for this. Would be great to know if this is even possible or not.- Thomas HabersatterMay 29, 2017Copper Contributor
Or maybe its not working with NTLM enabled, instead of Kerberos?