Skip to content

Commit

Permalink
Merge pull request #8981 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
Publish main to live, 12/05/24, 3:30 PM PT
  • Loading branch information
Ruchika-mittal01 authored Dec 5, 2024
2 parents 043f4ac + 46570b4 commit 1807dd9
Show file tree
Hide file tree
Showing 3 changed files with 18 additions and 14 deletions.
5 changes: 4 additions & 1 deletion Viva/glint/setup/access-glint.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,13 +14,16 @@ search-appverid: MET150
ms.topic: article
ms.service: viva-glint
ms.localizationpriority: high
ms.date: 04/30/2024
ms.date: 12/05/2024
---

# Access the Viva Glint platform

Access Microsoft Viva Glint with a Microsoft Entra ID user account and review supported browsers and session timeout information.

> [!NOTE]
> Users must exist in Entra with a Member Type of "Member" (not "Guest") to successfully access Viva Glint. Learn more about how Microsoft 365 Global Administrators or Entra admins can [set up access to Glint with Microsoft Entra ID](access-with-azure-ad.md).
## Select a supported browser

Glint users access surveys and dashboards with various internet browsers. Use this information to verify that your preferred browser is supported for accessing Glint.
Expand Down
22 changes: 10 additions & 12 deletions Viva/glint/setup/access-with-azure-ad.md
Original file line number Diff line number Diff line change
@@ -1,38 +1,36 @@
---
title: Access Viva Glint with Microsoft Entra ID
title: Set up access to Viva Glint with Microsoft Entra ID
description: To access the Microsoft Viva Glint application, a Global administrator must first register Viva Glint in a Microsoft Entra tenant.
ms.author: SarahBerg
author: SarahAnneBerg
manager: elizapo
audience: admin
f1.keywords: NOCSH
keywords: Access, authentication, login, AAD, Azure Active Directory, Azure AD, sign in
keywords: Access, authentication, login, AAD, Azure Active Directory, Azure AD, sign in, Microsoft Entra ID, Entra
ms.collection:
- m365initiative-viva
- selfserve
search-appverid: MET150
ms.topic: article
ms.service: viva-glint
ms.localizationpriority: high
ms.date: 08/08/2024
ms.date: 12/05/2024
---

# Access Viva Glint with Microsoft Entra ID
# Set up access to Viva Glint with Microsoft Entra ID

To access the Microsoft Viva Glint application, a Global administrator must register Viva Glint in a Microsoft Entra tenant. A service administrator must also import users to Viva Glint. Users must exist in both Microsoft Entra ID and Viva Glint with the same email address to successfully access the application.
To access the Microsoft Viva Glint application, a Microsoft 365 Global Administrator must register Viva Glint in a Microsoft Entra tenant. A Viva Glint Administrator must also import users to the Viva Glint app. Users must exist in both Microsoft Entra ID and Viva Glint with the same email address to successfully access the application.

If you don't already have a Microsoft Entra user account, you can [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).

>[!NOTE]
> To add a Support or Partner user to Viva Glint, follow this guidance: [Add an external user to Viva Glint.](https://go.microsoft.com/fwlink/?linkid=2240483)
<a name='set-up-and-manage-a-viva-glint-azure-active-directory-tenant'></a>
> [!NOTE]
> To add a Support or Partner user to Viva Glint, follow this guidance: [Add an external user to Viva Glint.](add-external-user.md)
## Set up and manage a Viva Glint Microsoft Entra tenant

For information on tenant creation, user and group creation, bulk user maintenance, authentication options, how to enable single sign-on, and federation, see the following articles:

- [Set up a Microsoft Viva Glint tenant](https://go.microsoft.com/fwlink/?linkid=2230741)
- [Set up a Microsoft Viva Glint tenant](viva-glint-tenant-provision.md)
- [Create users and groups in Microsoft Entra ID](/training/modules/create-users-and-groups-in-azure-active-directory/)
- [Perform bulk user maintenance in Microsoft Entra ID](/training/modules/manage-user-accounts-licenses-microsoft-365/7-perform-bulk-user-maintenance-azure-active-directory)
- [What authentication and verification methods are available in Microsoft Entra ID?](/azure/active-directory/authentication/concept-authentication-methods)
Expand All @@ -41,8 +39,8 @@ For information on tenant creation, user and group creation, bulk user maintenan
- [Microsoft Entra Connect and federation](/entra/identity/hybrid/connect/how-to-connect-fed-whatis)
- [Microsoft Entra federation compatibility list](/entra/identity/hybrid/connect/how-to-connect-fed-compatibility)

>[!TIP]
> Add all users in Microsoft Entra ID to minimize friction for ongoing role and data access changes for Viva Glint users. Control Viva Glint User Role membership and permissions in the Viva Glint application.
> [!NOTE]
> Users must exist in Entra with a Member Type of "Member" (not "Guest") to successfully access Viva Glint.
## Import users to Viva Glint

Expand Down
5 changes: 4 additions & 1 deletion Viva/glint/setup/understand-survey-access-methods.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ search-appverid: MET150
ms.topic: article
ms.service: viva-glint
ms.localizationpriority: high
ms.date: 11/15/2024
ms.date: 12/05/2024
---

# Viva Glint survey access methods
Expand All @@ -34,6 +34,9 @@ Microsoft Viva Glint offers multiple survey access methods that can be used inde

Use this guidance to enable survey invite links that require authentication with Microsoft Entra ID. Grant all users access to the Viva Glint **My Surveys** tab so that participants can access their surveys. After selecting the **Provide Feedback** button in survey emails, users with one active survey go directly to the survey landing page after authentication. Users with multiple active surveys land on the My Surveys tab to select a survey.

> [!NOTE]
> Users must exist in Entra with a Member Type of "Member" (not "Guest") to successfully access Viva Glint. Learn more about how Microsoft 365 Global Administrators or Entra admins can [set up access to Glint with Microsoft Entra ID](access-with-azure-ad.md).
> [!CAUTION]
> If your organization uses **URL Defense**, a security feature that can rewrite URLs in inbound emails, disable this feature for Glint emails. If left enabled when using survey access that requires authentication with Microsoft Entra, the **Provide Feedback** link in emails directs users to the Glint dashboard instead of their survey or My Surveys tab.
Expand Down

0 comments on commit 1807dd9

Please sign in to comment.