SC‑300 Study Portal Dark

Unit 13: Implement Cross-Tenant Access Controls

1. Purpose

Cross-tenant access controls allow you to govern collaboration between two Microsoft Entra organizations. They define how users from one tenant (the external organization) access resources in another tenant, and vice versa.

This is the foundation for secure and trusted B2B relationships between organizations — ensuring you can share apps, Teams channels, and documents without giving excessive access.

2. Key Concepts

TermDescription
Inbound AccessControls what external users (from other tenants) can access in your tenant.
Outbound AccessControls what your users can access in external tenants.
Trust SettingsDetermine whether you trust the external tenant’s authentication (e.g., MFA or device compliance).
Cross-Tenant SynchronizationOptional capability to synchronize specific users or groups between tenants.
B2B Direct ConnectEnables direct collaboration (for example, Teams shared channels) between two organizations with mutual trust.

3. Default Behavior

By default:

→ External users can be invited and access resources using their home credentials. → Shared Teams channels or direct organizational access require explicit configuration.

These defaults maintain collaboration flexibility while preventing unauthorized tenant-to-tenant connections.

4. Access Settings

You can manage cross-tenant access settings at two levels:

To access: Microsoft Entra admin center → Identity → External Identities → Cross-tenant access settings.

5. Managing Inbound and Outbound Access

Each direction (inbound/outbound) can define who and what is allowed to connect.

Outbound Access Settings

Control what your users can access in external tenants.

Inbound Access Settings

Control what external users can access your resources.

Example: Contoso allows inbound access from Fabrikam only for Teams and SharePoint apps, while blocking all others.

6. Trust Settings (Inbound)

Trust settings determine how much you trust the external tenant’s security posture. You can configure whether to accept their MFA or device compliance checks — reducing redundant challenges for users.

Trust SettingDescription
Trust MFAAccepts MFA completed in the user’s home tenant.
Trust compliant devicesAccepts device compliance evaluation from the external tenant.
Trust Entra hybrid joined devicesRecognizes hybrid-joined device status from the external tenant.

Example: If Fabrikam already enforces MFA, Contoso can trust that authentication rather than prompting for MFA again when Fabrikam users access Contoso’s resources.

7. Organization-Specific Configuration

You can create customized rules for each partner organization:

This flexibility lets you define stronger security for unknown tenants and relaxed rules for trusted partners.

8. Microsoft Cloud-Specific Configuration

If your organization operates across different Microsoft clouds (e.g., Microsoft 365 Commercial, Government (GCC), or China Cloud), you can configure cloud-to-cloud collaboration.

Use Microsoft Cloud Settings to:

9. B2B Direct Connect

B2B Direct Connect is a mutual trust relationship between two tenants that allows seamless, direct collaboration — most notably in Microsoft Teams shared channels.

Key points:

Example: Contoso and Fabrikam establish Direct Connect. Fabrikam users can access a shared Teams channel hosted by Contoso from within their own Teams client, without tenant switching or reauthentication.

10. Real-World Example

Scenario: Contoso collaborates with a key supplier, Northwind Traders. They want Northwind’s employees to access Contoso’s Teams shared channels securely.

Result → Seamless, secure collaboration with minimal friction.

11. Exam Tip

12. Summary

Cross-tenant access controls are the policy backbone of secure B2B collaboration. They define how and when trust is established between tenants, providing a robust framework for both compliance and productivity.