{"id":8949,"date":"2022-04-04T14:42:02","date_gmt":"2022-04-04T14:42:02","guid":{"rendered":"https:\/\/www.insentragroup.com\/au\/?p=8949"},"modified":"2024-09-13T03:47:46","modified_gmt":"2024-09-13T03:47:46","slug":"azure-active-directory-cross-tenant-access-policies-authentication-made-simple","status":"publish","type":"post","link":"https:\/\/www.insentragroup.com\/au\/insights\/geek-speak\/professional-services\/azure-active-directory-cross-tenant-access-policies-authentication-made-simple\/","title":{"rendered":"Azure Active Directory Cross-Tenant Access Policies &#8211; Authentication Made Simple"},"content":{"rendered":"\n<p>A recent feature release, in public preview by Microsoft, is a major step to simplifying and improving the B2B authentication experience with Azure AD. This feature now makes it possible for an Azure AD tenant to accept <em>authentication tokens<\/em> from a different Azure AD tenant. To find more information please refer to the Microsoft documentation on <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/external-identities\/cross-tenant-access-overview\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Cross-tenant access with Azure AD External Identities<\/a> and John Savill has an excellent YouTube video, on <a href=\"https:\/\/www.youtube.com\/watch?v=Ku64fo7iZ4Y\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Azure AD Cross-Tenant Access deep diving<\/a> into how the solution works.<\/p>\n\n\n\n<p>I am sure many of us are familiar with the pain of managing multiple different MFA registrations when collaborating with customer tenants. Each individual tenant requires its own MFA registration, individual sign-ins to each tenant, and the list goes on.&nbsp;<\/p>\n\n\n\n<p>Well now, with cross-tenant access policies becoming available, we have the option of configuring policies that allow our Azure AD tenant to accept user sign-ins, and more importantly authentication tokens, from businesses we work with, or share data with on a regular basis, that also have an Azure AD tenant.&nbsp;<\/p>\n\n\n\n<p>The cross-tenant access policies preview features can be found in the Azure AD portal, under the external identities blade.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"418\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2022\/04\/image-1024x418.png\" alt=\"\" class=\"wp-image-8950\" title=\"\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2022\/04\/image-1024x418.png 1024w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2022\/04\/image-300x122.png 300w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2022\/04\/image-768x313.png 768w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2022\/04\/image.png 1052w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Once an organisation is added, using either the tenant ID or.onmicrosoft.com organisational name, the below settings can then be configured for both inbound and outbound authentication. These settings can be assigned to all users or apps, or selected users, groups, or apps, however this requires obtaining the object id\u2019s from the partner organisation to do so.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1015\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2022\/04\/image-1.png\" alt=\"\" class=\"wp-image-8951\" title=\"\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2022\/04\/image-1.png 1015w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2022\/04\/image-1-300x59.png 300w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2022\/04\/image-1-768x151.png 768w\" sizes=\"(max-width: 1015px) 100vw, 1015px\" \/><\/figure>\n\n\n\n<p>By enabling the above configuration to another Azure AD tenant, authorised B2B users from the partner tenant will now have a single sign-on experience when accessing resources in our tenant.&nbsp;<\/p>\n\n\n\n<p>The scenario I have described is an inbound concept, however this will also work when thinking about an outbound scenario.&nbsp;<\/p>\n\n\n\n<p>If we have a partner business that requires us to frequently access resources in their tenant, then the same configurations can be applied in the partner\u2019s Azure AD tenant, to enable single sign-on for our users, to our partner\u2019s resources.&nbsp;<\/p>\n\n\n\n<p>A crucial point that needs to be made here, is that cross-tenant access policies are an <em>authentication<\/em> solution only, at this point in the preview, they do not provide access to resources in either ours, or our partner\u2019s tenants. Manual configurations for resource permissions still need to be applied for the guest accounts to be able to access said resources.&nbsp;<\/p>\n\n\n\n<p>In saying that, this is an important first step on that journey and will still provide relief for many of us.&nbsp;<\/p>\n\n\n\n<p>I hope this provides some valuable information for some of you out there!&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A recent feature release, in public preview by Microsoft, is a major step to simplifying and improving the B2B authentication experience with Azure AD. This feature now makes it possible for an Azure AD tenant to accept authentication tokens from a different Azure AD tenant. To find more information please refer to the Microsoft documentation&hellip; <a class=\"more-link\" href=\"https:\/\/www.insentragroup.com\/au\/insights\/geek-speak\/professional-services\/azure-active-directory-cross-tenant-access-policies-authentication-made-simple\/\">Continue reading <span class=\"screen-reader-text\">Azure Active Directory Cross-Tenant Access Policies &#8211; Authentication Made Simple<\/span><\/a><\/p>\n","protected":false},"author":75,"featured_media":8953,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[25],"tags":[],"class_list":["post-8949","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-professional-services","entry"],"_links":{"self":[{"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/posts\/8949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/users\/75"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/comments?post=8949"}],"version-history":[{"count":4,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/posts\/8949\/revisions"}],"predecessor-version":[{"id":9237,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/posts\/8949\/revisions\/9237"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/media\/8953"}],"wp:attachment":[{"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/media?parent=8949"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/categories?post=8949"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/tags?post=8949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}