First published on CloudBlogs on Aug, 28 2018
If you follow the blog, you know that Azure AD B2B Collaboration makes it incredibly easy and secure to share applications and collaborate seamlessly across company boundaries. What you might not know is that it’s one of our fastest growing features and more than one million new users are invited to collaborate each month using Azure AD B2B!
We’ve been hard at work to make B2B Collaboration even more seamless and inclusive. Our vision is to enable you to collaborate with people from any organization in the world, whether or not they have Azure AD or even an IT department. We’re reducing friction during invitation redemption and eliminating the proliferation of credentials by enabling your partners to bring their own existing identities to collaborate with you!
Today, I’m excited to unveil the next major step on this vision—the public preview of support for Google ID's! We’ve supported folks using Azure AD and Microsoft Accounts (or signing up for one just in time) until now, and yes, we’ve heard your enthusiasm about federation with non-Microsoft identity providers. I’m thrilled to announce that Google is the first third-party identity provider that Azure AD supports!
Enabling Google federation makes your invited Gmail user's experience more seamless. After you have set up B2B Google federation for your organization, invited Gmail users can use their Google identity to sign in and collaborate. They no longer need to create an Azure AD account or Microsoft Account to access the apps and resources you’re sharing with them!
(Important note: Currently we only support Google ID's with the @gmail.com extension).
You can enable Google identities in Organizational relationships—a new administration experience that lets you manage all settings related to external collaboration!
Go ahead and
dive into the documentation
to try out B2B Google federation! Let us know what you think by taking
our brief survey
. And as always, connect with us for any
or send us your
feedback and suggestions
. You know we’re listening!
Alex Simons (@Twitter:
Vice President of Program Management
Microsoft Identity Division