You have an Azure Active Directory (Azure AD) tenant named contoso.com.
You plan to bulk invite Azure AD business-to-business (B2B) collaboration users.
Which two parameters must you include when you create the bulk invite? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
Click on the arrows to vote for the correct answer
A. B. C. D. E.AB.
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/tutorial-bulk-inviteTo create bulk invitations for Azure AD business-to-business (B2B) collaboration users, you need to include the email address and the redirection URL parameters.
A) Email Address: The email address is required for the bulk invitation process. It identifies the user that you want to invite. You can invite users by entering their email addresses in a comma-separated list or by uploading a CSV file that contains the email addresses.
B) Redirection URL: The redirection URL is the URL where the invited users will be directed after they accept the invitation. This URL is used to redirect the user to the application or resource that they have been invited to access. When you create a bulk invitation, you can specify the redirection URL that will be used for all of the invitations.
C) Username: The username is not a required parameter for bulk invitations. When you invite users to access a resource in Azure AD, they will be prompted to enter their credentials (i.e., username and password) before they can access the resource.
D) Shared Key: The shared key is not a required parameter for bulk invitations. It is used in certain scenarios where you need to authenticate the user without prompting them for their credentials. However, for bulk invitations, the email address and redirection URL are the only required parameters.
E) Password: The password is not a required parameter for bulk invitations. As mentioned earlier, when you invite users to access a resource in Azure AD, they will be prompted to enter their credentials (i.e., username and password) before they can access the resource.