Home » Blog » External Identities in Microsoft Entra

External Identities in Microsoft Entra

External Identities in Microsoft Entra

This blog article aims to give Microsoft 365 administrators an overview of the External Identities section in Entra (formerly Azure Active Directory or Azure AD).

External Identities refers to a collection of features designed to help businesses securely handle and oversee users who aren’t part of their organization, such as clients or business partners. These features expand upon the B2B (business-to-business) collaboration tools available in Microsoft Entra ID by offering more options for engaging and establishing connections with users from outside your company. Essentially, it’s about making it easier and safer to interact with people who need access to certain parts of your IT environment but aren’t your employees.

In this blog post, we take a look at the External Identities features in the Microsoft Entra Admin Center at https://entra.microsoft.com/.

While Entra covers most topics around guests, several important settings can be found in various other Microsoft Admin Centers.

This is where External User Manager can help: it is a comprehensive tool designed to simplify the management of external identities in Microsoft 365 by combining all security and compliance features in one easy-to-use app.

Get control over your guests with External User Manager

Overview

Once you have opened Entra or the Entra Admin Center, select the item „External Identities“ in the navigation menu on the left, just below „Identity Governance“.

External Identities in Entra: Overview

The option “Overview” is the starting point when working with External Identities and gives an outline of the different sub-bullets.

In addition to the main navigation points, there are also three additional topics included and linked to:

Invite exteral users to collaborate

Here you can find a list of all users in your tenant and can invite new external users.

For setting up a customized invitation process with automated approval workflows, External User Manager is the tool for you.

Set up Conditional Access policy to protect your applications & brand

Use a dvanced security features within Microsoft Entra Conditional Access to control how external users access your applications and data, ensuring they comply with your company’s security standards.

Manage provisioning & access and set up access reviews

Identity Governance offers the tools necessary for managing external users. It streamlines the process of adding (onboarding) and removing (offboarding) these users through Entitlement Management. Additionally, Access Reviews can be set up to verify that only those who still need access have it, ensuring proper control over who gets to access what within your organization.

For provisioning and access management, External User Manager automates the onboarding of external users as well as the offboarding process. Admins can set up lifecycles for external users, including periodic access reviews for continuous compliance or even automated removal from the tenant and the AD / Entra.

All identity providers

Decide on options for how users authenticate their identities to access your resources. This includes using accounts from social networks like Facebook and Google.

Entra: Identity Providers

Configured identity providers

Microsoft Entra ID

Users with a Microsoft Entra account can be invited to access your resources through email. They can log in directly without needing further setup. They also have the option to register themselves through Self-service sign-up and User flows.

Microsoft Account

Similar to a Microsoft Entra account, users with a Microsoft account can be invited and log in without extra steps. They too can use Self-service sign-up with User flows for registration.

Email one-time passcode

This option is for users who don’t have a Microsoft Entra or Microsoft account. They can access your environment by receiving a one-time passcode via email each time they need to sign in, avoiding the need to create a new account. This method can also be used for self-service sign-up for specific applications within your user flows.

SAML/WS-Fed identity providers

SAML (Security Assertion Markup Language)

This is a standard used for exchanging authentication and authorization data between parties, e.g. between an identity provider and a service provider. By using SAML, users can sign in to multiple applications with one set of credentials managed by their organization. It’s widely used for single sign-on (SSO) processes to access web applications, e.g. bei AWS (Amazon Web Services) or Okta.

WS-Fed (WS-Federation)

Similar to SAML, WS-Federation is a protocol used for federated identity and access management. It allows different organizations to use their existing identity management processes to authenticate users without exposing sensitive information. WS-Fed is often used in corporate environments for seamless access across a range of applications and services. Single Sign-On with WS-Fed is supported by OneLogin, for example.

User flows

A self-service sign-up user flow lets you set up a system where people outside your organization can register themselves to use your applications. This means you can design a registration process tailored to your needs, allowing external users, like customers or partners, to create accounts and gain access to your apps without needing direct assistance from your IT team.

User flows for external identities

Please note: Self-service sign-up for guests needs to be enabled before you can create user flows.

Custom authentication extensions

Custom authentication extensions enable you to personalize how users log into Microsoft Entra by connecting it with outside systems. If you want to employ a special method for users to sign in or verify their identity that isn’t provided out of the box, these extensions allow you to build that custom process using web APIs.

Custom authentication extensions in Microsoft Entra

Cross-tenant access settings

Organizational Settings

Cross-tenant access settings in Microsoft Entra enable you to tailor how your organization interacts with selected external Microsoft Entra tenants. When dealing with entities that don’t utilize Microsoft Entra, adjust your general collaboration settings instead.

Cross Tenant Access: Organizational Settings

Organizational settings within this context refer to the specific access permissions and policies you’ve established for certain Microsoft Entra environments with which you collaborate. These settings ensure that your collaboration rules are applied precisely to those entities. For any Microsoft Entra environments not explicitly covered by these bespoke settings, your organization’s default settings will automatically apply.

The detailed settings can be found under External Collaboration Settings.

Default Settings

In Microsoft Entra, the default settings act as a baseline for how your organization interacts with any external Microsoft Entra environments that you haven’t specified under the organizational settings tab. While you can change these default settings to better suit your organization’s security or collaboration needs, you cannot remove them entirely. This ensures there’s always a predefined way your system handles interactions with any external Microsoft Entra tenants not explicitly covered by your customized settings.

Cross tenant access: Default settings

Default Inbound access settings

This section offers different ways you can manage access for external users into your Microsoft Entra environment, focusing on how to control this access and the type of user experience you want to provide.

Type: B2B collaboration

Default Inbound Access Settings for B2B Collaboration allow you to work with individuals from outside your organization by letting them use their own credentials to sign in. These external users are treated as guests within your Microsoft Entra tenant. You can either invite these external users manually or enable a self-service registration process, allowing them to request access on their own. You can specify whether to allow or deny access to these users for certain apps or all apps within your environment and set the order in which primary identity providers and fallback identity providers are used.

Type: B2B direct connect

This setting is about enabling a more seamless connection with users from other Microsoft Entra tenants, allowing them access to your resources without the need to add them as guests. By opting to “Allow access,” you open the door for users and groups from other organizations to connect with your resources directly, provided the other party has also enabled B2B direct connect.

Trust settings

These settings relate to how your Conditional Access policies treat claims from other Microsoft Entra tenants. Essentially, you can decide whether to trust multifactor authentication, compliant devices, and Microsoft Entra hybrid joined devices from external tenants. This trust is critical for enforcing your security policies when external users access your resources. The default trust settings apply universally, except for those external tenants you’ve configured with specific organizational settings. To enhance security for guest access, you might require multifactor authentication or device compliance across all cloud apps.

Manage existing guest users in Microsoft Teams

Default Outbound access settings

Configure outbound access for your users, detailing how they can interact with external organizations via Microsoft Entra, with a focus on B2B (business-to-business) collaboration and B2B direct connect settings.

Type: B2B collaboration

B2B collaboration outbound access settings control whether your users can be invited to collaborate with external Microsoft Entra tenants, essentially allowing them to be added to these external directories as guests. These settings are the default for all external tenants unless you’ve created specific settings with certain tenants. Here, you determine if your users and groups can be invited to these external entities and which external applications they are allowed to access.

Type: B2B direct connect

These settings manage the ability of your users and groups to access applications and resources hosted by external organizations. The default configuration is applied across all situations where your users interact with external tenants unless you’ve specified different settings for particular external organizations. Although these default settings can be altered to fit your needs, they cannot be entirely removed.

B2B direct connect determines your users’ and groups’ access to resources in another organization. For this access to be granted, an administrator on the external side must also have B2B direct connect enabled. When you activate this feature, a limited amount of your users’ information is shared with the external organization to allow for functionalities like user search. The amount of data shared can increase if your users agree to the privacy policies of the external organization.

Default Tenant restrictions

Tenant restrictions are about setting up rules within your network to control if and how your users can use external applications with non-company accounts. This includes both accounts given to them by other organizations and personal accounts they’ve created under other Microsoft Entra tenants. You can specifically allow or deny access to certain external applications.

These default settings are your baseline rules for dealing with all external Microsoft Entra tenants, unless you’ve crafted specific policies for particular tenants. Essentially, you’re setting a general policy that applies universally, with the option to tailor policies for specific external partners or services.

In this context, you can also develop detailed policies targeting specific scenarios, like access permissions for external users and groups or for certain external applications. This gives you granular control over how your organization interacts with external digital environments.

Microsoft Cloud settings

Microsoft cloud settings provide the capability to work together with entities located in various Microsoft cloud environments. Once you’ve activated these settings, you’re set to integrate organizations from those specific clouds into your collaboration efforts using Microsoft Entra’s B2B collaboration feature.

Cross tenant access: Microsoft Cloud settings

Here are the options you have:

Microsoft Azure Government

This is tailored for U.S. government agencies, providing a cloud environment that complies with U.S. government regulations.

Microsoft Azure China (operated by 21Vianet)

This is a version of Microsoft’s cloud services operated by 21Vianet within China, designed to comply with Chinese regulatory requirements.

By utilizing these settings, you enable your organization to establish and manage secure collaboration channels with partners operating in these distinct Microsoft cloud environments.

External collaboration settings

Configure the rules and permissions for how external users can interact with your organization’s resources, i.e. how they are invited, what they can access, and any limitations on their activities.

External collaboration settings in Entra

Guest user access

Choose the level of access restrictions for guest user access best suited for your organization:

  • Grant them the same rights as full members (broadest access).
  • Allow them limited access to and interaction with directory objects.
  • Restrict their access to only viewing and interacting with their own directory objects (tightest control).

Guest invite settings

This determines who in your organization is able to invite guest users to your directory for collaboration on e.g. SharePoint sites or Azure resources. Choose which of these guest invite restrictions best matches your requirements. In this section, you can also enable or disable guest self-service sign up via user flows.

  • Allow everyone, including current guests and non-administrators, to send invites (most open).
  • Limit invitation rights to members and certain admins, including guests with member rights.
  • Restrict this capability solely to users in specific administrative roles.
  • Block anyone in the organization from inviting guests (strictest setting).

In this section, you can also toggle on or off the ability for guests to sign up for access on their own through user flows.

External user leave settings

Here you can allow external users to remove themselves from your organization or block them from doing so.

Enabling this settings means that external users can remove themselves from your organization without needing admin approval. Disabling it requires them to consult a privacy statement or contact a privacy officer for permission to leave, adding an extra layer of control.

Collaboration restrictions

These settings impact the cross-tenant invitation process by setting rules based on the recipient’s domain:

  • Allow invitations to any domain for the most inclusive approach.
  • Block invitations to specific external domains to prevent access from certain organizations, thus creating a blacklist of external domains.
  • Only allow invitations to specific approved target domains for the most controlled environment, thus creating a whitelist of approved external domains.
Restrictions for external collaboration in Entra

External User Manager provides detailed controls for managing access between different tenants, ensuring the security and efficiency of cross-tenant collaborations. Administrators can set specific policies for external access and also create blacklists and whitelists for entire external domains.

Cross-tenant synchronization

Cross-tenant synchronization is a capability within Microsoft Entra ID designed to streamline the management of user identities across different tenants within your organization. This feature focuses on easing the collaboration process by ensuring that user identities are consistent and up-to-date across various tenants.

Entra: Cross tenant synchronization

Automated Provisioning

Set up automatic processes for creating and managing user identities across your organizational tenants. This simplifies the onboarding process for new users and ensures everyone has access to the necessary resources without manual intervention.

Seamless Collaboration

By maintaining synchronized identities, users can more easily collaborate across different parts of your organization, even if those parts are managed as separate tenants.

Account Lifecycle Management

Automate the process of deactivating accounts when they’re no longer needed and keep user accounts synchronized to reflect any changes in their status or roles within the organization.

Cross-tenant synchronization supports scenarios such as:

B2B User Management

Automatically create user accounts across tenants for B2B scenarios, or enrich B2B user profiles with data from their primary (home) tenant.

Application Sharing

Facilitate the sharing of applications across tenants, utilizing the identity and access management (IAM) capabilities of Microsoft Entra ID to control access securely.

Initiate the process by creating a new configuration. This involves setting up rules and processes for automatically managing the identity lifecycle within Microsoft Entra, including the creation, updating, and deletion of user accounts as people join, move within, or leave your organization.

Complicated admin centers – or one comprehensive app

External User Manager offers a comprehensive solution for guest management in Microsoft 365 that goes beyond the native features of Microsoft Entra and the other admin centers. External User Manager provides an intuitive interface for the automation of invitations and access reviews and significantly reduces the administrative effort required to manage external identities.

Its capabilities for detailed access control and security compliance ensure that organizations can maintain high security standards while still staying open to collaboration. Book a free demo to find out more!

Interested in easily managing External Identities?

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Copyright 2021 © Solutions2Share GmbH

Terms and conditions Privacy policy Cookie Policy Imprint

Send this to a friend