Home
%3CLINGO-SUB%20id%3D%22lingo-sub-172423%22%20slang%3D%22en-US%22%3EAuto-Acceleration%20in%20SharePoint%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-172423%22%20slang%3D%22en-US%22%3E%3CP%3E%3CEM%3ENote%3A%20This%20is%20an%20earlier%20blog%20article%20that%20was%20previously%20hosted%20on%20the%20SharePoint%20Online%20Support%20blog%20on%20MSDN.%20It%2C%20and%20other%20articles%2C%20are%20being%20moved%20over%20to%20this%20site%20as%20part%20of%20an%20ongoing%20Global%20Blog%20effort%20by%20the%20SharePoint%20Online%20Support%20Organization.%3C%2FEM%3E%3CBR%20%2F%3E%3CBR%20%2F%3EInformation%20Technology%20is%20often%20tasked%20with%20two%20opposing%20goals%3A%20increase%20productivity%20by%20giving%20better%20and%20easier%20access%20to%20data%3B%20while%20at%20the%20same%20time%2C%20protecting%20that%20data%20from%20unauthorized%20access.%26nbsp%3B%20This%20means%20that%20services%20such%20as%20SharePoint%20Online%20(and%20Office365%20in%20general)%20must%20be%26nbsp%3Bable%20to%20correctly%20identify%20the%20user%20requesting%20the%20information%2C%20authenticate%20that%20user%2C%20then%20check%20that%20user's%20authorization%20to%20ensure%20that%20the%20user%20has%20the%20correct%20rights%20to%20the%20information%20they%20are%20requesting.%26nbsp%3B%20Add%20in%20that%20these%20users%20might%20be%20authenticating%20against%20different%20providers%20and%20things%20become%20complicated.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EUsers%20do%20not%20enjoy%20interruptions%20to%20their%20workflow%2C%20and%20authentication%20prompts%20are%20often%20viewed%20as%20needless%20interruptions.%20The%20solution%2C%20of%20course%2C%20lies%20in%20a%20Cloud%20experience%20that%20feels%20as%20seamless%20as%20an%20on%20premise.%26nbsp%3B%20SharePoint%20Online%20allows%20for%20some%20of%20the%20most%20feature%20rich%20collaboration%20experiences%20currently%20available.%26nbsp%3B%20It%20allows%20users%20across%20organizations%20to%20access%20shared%20resources%2C%20and%20collaborate%20on%20exciting%20and%20impactful%20work.%26nbsp%3B%20In%20order%20to%20enable%20those%20experiences%2C%20SharePoint%20has%20to%20discover%20who%20the%20person%20requesting%20the%20resource%20is%20first.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECurrently%2C%20when%20you%20access%20a%20SharePoint%20Online%20resource%2C%20SharePoint%20Online%20expects%20your%20browser%20or%20app%20to%20provide%20a%20cookie%20authenticating%20you.%26nbsp%3B%20If%20you%20do%20not%20have%20that%20cookie%2C%20SharePoint%20will%20undergo%20the%20authentication%20process.%26nbsp%3B%20Your%20browser%20session%20will%20be%20sent%20to%20login.microsoftonline.com%20and%20you%20will%20be%20prompted%20to%20enter%20your%20username%20and%20password.%26nbsp%3B%20When%20you%20complete%20entering%20your%20username%2C%20login.microsoftonline.com%20will%20do%20what%20is%20called%20a%20Realm%20Discovery.%26nbsp%3B%20Based%20on%20your%20address%2C%20you%20are%20sent%20to%20the%20appropriate%20identity%20provider.%26nbsp%3B%20In%20cases%20when%20you%20are%20signing%20in%20to%20your%20own%20tenant%2C%20you%20are%20sent%20to%20the%20identity%20provider%20your%20Office365%20admin%20has%20configured%2C%20such%20as%20ADFS%2C%20or%20Azure%20Active%20Directory%2C%20or%20another%20third%20party%20Identity%20Provider%20that%20supports%20the%20appropriate%20%3CA%20href%3D%22https%3A%2F%2Fmsdn.microsoft.com%2Fen-us%2Flibrary%2Fazure%2Fdn641269.aspx%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESAML%20standards%20for%20Office%20365.%3C%2FA%3E%26nbsp%3B%20When%20an%20external%20user%20is%20attempting%20to%20ask%20for%20a%20resource%20on%20your%20tenant%2C%20then%20the%20realm%20discovery%20routes%20them%20to%20the%20appropriate%20identity%20provider%20for%20their%20user%20name.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20your%20identity%20provider%20is%20set%20up%20for%20Single%20Sign%20On%2C%20this%20added%20step%20of%20providing%20your%20username%20for%20realm%20discovery%20is%20an%20additional%20hurdle%20that%20prevents%20your%20users%20from%20enjoying%20a%20true%20seamless%20Single%20Sign%20On%20experience.%26nbsp%3B%20Enter%20%3CA%20href%3D%22https%3A%2F%2Fsupport.office.com%2Fen-us%2Farticle%2FEnable-auto-acceleration-for-your-SharePoint-Online-tenancy-74985ebf-39e1-4c59-a74a-dcdfd678ef83%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAuto-Acceleration%20for%20SharePoint%20Online%3C%2FA%3E.%26nbsp%3B%20Auto-Acceleration%20is%20a%20feature%20in%20SharePoint%20that%20aims%20to%20remove%20the%20realm%20discovery%20aspect%20from%20the%20sign%20on%20experience.%26nbsp%3B%20When%20it%20is%20enabled%2C%20you%20specify%20the%20default%20Identity%20Provider%20endpoint%20for%20your%20tenant.%26nbsp%3B%20In%20this%20configuration%2C%20when%20one%20of%20your%20users%20accesses%20a%20resource%20that%20is%20not%20shared%20with%20external%20users%2C%20rather%20than%20landing%20on%20Login.MicrosoftOnline.Com%2C%20your%20users%20will%20be%20sent%20directly%20to%20the%20identity%20provider.%26nbsp%3B%20If%20you%20have%20configured%20Integrated%20Windows%20Authentication%20on%20ADFS%20and%20the%20user's%20client%20machine%20is%20domain%20joined%2C%20they%20will%20have%20a%20completely%20seamless%20single%20sign%20on%20experience%3B%20it%20will%20be%20no%20different%20than%20if%20they%20were%20accessing%20an%20on%20premises%20resource.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20some%20organizations%2C%20the%20redirect%20to%20Azure%20Active%20Directory%20for%20realm%20discovery%20is%20the%20key%20feature.%26nbsp%3B%20Unlike%20login.microsoftonline.com%2C%20an%20organizations%20Azure%20Active%20Directory%20page%20is%20customizable%20for%20branding%2C%20and%20many%20customers%20want%20to%20create%20login%20experiences%20that%20are%20tailored%20to%20their%20organization.%26nbsp%3B%20To%20enable%20this%20functionality%2C%20you%20will%20enable%20Auto-acceleration%2C%20and%20then%20configure%20your%20sites%20to%20be%20externally-sharable.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOne%20final%20note%2C%20worth%20noting%20because%20it%20is%20a%20favorite%20question%20here%20in%20support%20regarding%20Auto-Acceleration%3A%20If%20you%20chose%20to%20configure%20auto-acceleration%2C%20your%20back%20out%20plan%20when%20filing%20your%20change%20control%20is%20to%20run%20Set-SPOTenant%20%E2%80%93SignInAccelerationDomain%20%E2%80%9C%E2%80%9D.%26nbsp%3B%20This%20will%20clear%20out%20the%20feature%20and%20things%20will%20work%20normally%20again.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EResources%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EEnable%20auto-acceleration%20for%20your%20SharePoint%20Online%20tenancy%3A%20%3CA%20href%3D%22https%3A%2F%2Fsupport.office.com%2Fen-us%2Farticle%2FEnable-auto-acceleration-for-your-SharePoint-Online-tenancy-74985ebf-39e1-4c59-a74a-dcdfd678ef83%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fsupport.office.com%2Fen-us%2Farticle%2FEnable-auto-acceleration-for-your-SharePoint-Online-tenancy-74985ebf-39e1-4c59-a74a-dcdfd678ef83%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3ESet-SPOTenant%20on%20TechNet%3A%20%3CA%20href%3D%22https%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Flibrary%2Ffp161390.aspx%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Flibrary%2Ffp161390.aspx%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-172423%22%20slang%3D%22en-US%22%3E%3CP%3E%3CEM%3ENote%3A%20This%20is%20an%20earlier%20blog%20article%20that%20was%20previously%20hosted%20on%20the%20SharePoint%20Online%20Support%20blog%20on%20TechNet.%20It%2C%20and%20other%20articles%2C%20are%20being%20moved%20over%20to%20this%20site%20as%20part%20of%20an%20ongoing%20Global%20Blog%20effort%20by%20the%20SharePoint%20Online%20Support%20Organization.Information%20Technology%20is%20often%20tasked%20with%20two%20opposing%20goals%3A%20increase%20productivity%20by%20giving%20better%20and%20easier%20access%20to%20data%3B%20while%20at%20the%20same%20time%2C%20protecting%20that%20data%20from%20unauthorized%20access.%26nbsp%3B%20This%20means%20that%20services%20such%20as%20SharePoint%20Online%20(and%20Office365%20in%20general)%20must%20be%26nbsp%3Bable%20to%20correctly%20identify%20the%20user%20requesting%20the%20information%2C%20authenticate%20that%20user%2C%20then%20check%20that%20user's%20authorization%20to%20ensure%20that%20the%20user%20has%20the%20correct%20rights%20to%20the%20information%20they%20are%20requesting.%26nbsp%3B%20Add%20in%20that%20these%20users%20might%20be%20authenticating%20against%20different%20providers%20and%20things%20become%20complicated.%3C%2FEM%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-172423%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ESharePoint%20Support%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-357755%22%20slang%3D%22en-US%22%3ERe%3A%20Auto-Acceleration%20in%20SharePoint%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-357755%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F106517%22%20target%3D%22_blank%22%3E%40Toby%20Bianchi%3C%2FA%3E%26nbsp%3B%2C%20we%20are%20planning%20to%20enable%20Auto%20acceleration%20for%20one%20of%20our%20tenant.%20Could%20you%20please%20do%20let%20me%20know%20what%20would%20be%20the%20impact%20on%20Guest%20users%20if%20we%20don't%20enable%20this%20parameter%26nbsp%3B%20%22%20enableguestsigninaccelaration%22%3F%20I%20believe%20they%20should%20be%20able%20to%20access%20external%20sharing%20site%20collections%20in%20similar%20way%20how%20they%20access%20in%20the%20past%20and%20there%20won't%20be%20any%20impact.%3C%2FSTRONG%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-339881%22%20slang%3D%22en-US%22%3ERe%3A%20Auto-Acceleration%20in%20SharePoint%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-339881%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F106517%22%20target%3D%22_blank%22%3E%40Toby%20Bianchi%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20use%20a%203rd%20party%20IDP%2C%20specifically%20BIG-IP%20APM%20and%20have%26nbsp%3Bintegrated%20windows%20authentication%20and%20user%20client%20machine%20is%20domain%20joined%20to%20get%20the%20seamless%26nbsp%3BSSO%20experience.%20But%26nbsp%3Binternal%20users%20were%20still%20getting%20prompt%20in%20SharePoint%20to%20click%20their%20username%20to%20authenticate.%20%26nbsp%3BWe%20turned%20on%20Auto%20Acceleration%20to%20prevent%20the%20login%20prompts%20and%20also%20for%20the%20site%20collections%20with%20external%20sharing%20turned%20on%20(EnableGuestSignInAcceleration).%20We%20are%20experiencing%20this%20same%20issue%20with%20external%20guest%20accounts%20that%20cannot%20get%20into%20our%20SharePoint%20Online%20environment.%26nbsp%3BWe%20have%20an%20open%20premier%20ticket%20on%20this%20and%20they%20want%20us%20to%20turn%20on%20auto%20acceleration%2C%20but%20our%20internal%20users%20will%20be%20getting%20the%20login%20prompt%20again.%20Any%20idea%20around%20this%20for%20external%20users%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-247055%22%20slang%3D%22en-US%22%3ERe%3A%20Auto-Acceleration%20in%20SharePoint%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-247055%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20Toby%2C%3C%2FP%3E%3CP%3EI%20have%20the%20same%20question%20as%20Ivan.%20How%20do%20we%20solve%20this%20issue%3F%20I%20am%20forcing%20redirect%20to%20their%20IDP%20using%20the%20domainhint%20parameter%20in%20the%20URL%20(that%20starts%20with%20login.microsoftonline.com..).%20However%2C%20even%20after%20the%20partner%20ADFS%20(guest%20user's)%20authenticates%20it%20successfully%2C%20the%20user%20gets%20the%26nbsp%3Bannoying%3A%26nbsp%3B%22%3CSPAN%3EAADSTS50011%3A%20The%20reply%20url%20specified%20in%20the%20request%20does%20not%20match%20the%20reply%20urls%20configured%20for%20the%20application...%22%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3ESo%20far%2C%20the%20MS%20Premier%20support%20seems%20to%20be%20stumped%20at%20this%2C%20and%20just%20trying%20to%20understand%20where%20the%20issue%20is.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3EIn%20summary%2C%20does%20enabling%20auto-acceleration%20for%20my%20domain%20break%20the%20guest%20login%3F%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-179369%22%20slang%3D%22en-US%22%3ERe%3A%20Auto-Acceleration%20in%20SharePoint%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-179369%22%20slang%3D%22en-US%22%3E%3CP%3EWhile%20definitely%20a%20niche%20situation%2C%20I%20appreciate%20the%20knowledge%20sharing!%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-172804%22%20slang%3D%22en-US%22%3ERe%3A%20Auto-Acceleration%20in%20SharePoint%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-172804%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1081%22%20target%3D%22_blank%22%3E%40Ivan%20Unger%3C%2FA%3E%2C%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3EBy%20default%2C%20when%20you%20enable%20Auto-Acceleration%2C%20site%20collections%20that%20are%20enabled%20for%20Guest%20User%20Access%20should%20continue%20to%20present%20the%20home%20realm%20discovery%20page.%20However%2C%20if%20an%20administrator%20uses%20the%20-enableguestsigninacceleration%20parameter%20of%20the%20Set-SPOTenant%20cmdlet%2C%20all%20requests%20will%20be%20routed%20to%20the%20identity%20provider%20on%20record%20for%20the%20domain.%26nbsp%3B%20Guest%20Sign%20In%20Acceleration%20is%20a%20very%20niche%20edge%20case%20where%20a%20single%20endpoint%20is%20used%20for%20multiple%20domains%20and%20can%20handle%20guest%20user%20authentication.%26nbsp%3B%20This%20is%20not%20common%20in%20the%20service.%3CBR%20%2F%3E%3CBR%20%2F%3EI%20hope%20this%20helps%2C%20and%20please%20feel%20free%20to%20follow%20up%20with%20any%20other%20questions%20you%20might%20have.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-172493%22%20slang%3D%22en-US%22%3ERe%3A%20Auto-Acceleration%20in%20SharePoint%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-172493%22%20slang%3D%22en-US%22%3E%3CP%3ECan%20you%20comment%20on%20the%20effect%20this%20has%20for%20external%20users%3F%3C%2FP%3E%0A%3CP%3EIf%20I%20remember%20correctly%20from%20my%20experience%2C%20I%20had%20this%20enabled%20for%20our%20domain%20(worked%20superbly)%20but%20weeks%20later%20I've%20had%20some%20complaints%20from%20external%20users%20(guests)%20that%20were%20no%20longer%20able%20to%20login%2C%20since%20they%20were%20always%20redirected%20to%20our%20ADFS%20server%2C%20where%20they%20of%20course%20were%20not%20able%20to%20authenticated%2C%20since%20they%20needed%20to%20be%20authenticated%20against%20their%20Microsoft%20ID.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-764006%22%20slang%3D%22en-US%22%3ERe%3A%20Auto-Acceleration%20in%20SharePoint%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-764006%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F106517%22%20target%3D%22_blank%22%3E%40Toby%20Bianchi%3C%2FA%3E%26nbsp%3B%20We%20looking%20for%20to%20enable%20this%20option%20and%20we%20don't%20want%20any%20changes%20to%20external%20users%20authentication%20model%20(should%20be%20able%20to%20use%20their%20own%20account%20to%20authenticate).%20What's%20the%20best%20way%20of%20doing%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

Note: This is an earlier blog article that was previously hosted on the SharePoint Online Support blog on MSDN. It, and other articles, are being moved over to this site as part of an ongoing Global Blog effort by the SharePoint Online Support Organization.

Information Technology is often tasked with two opposing goals: increase productivity by giving better and easier access to data; while at the same time, protecting that data from unauthorized access.  This means that services such as SharePoint Online (and Office365 in general) must be able to correctly identify the user requesting the information, authenticate that user, then check that user's authorization to ensure that the user has the correct rights to the information they are requesting.  Add in that these users might be authenticating against different providers and things become complicated.

 

Users do not enjoy interruptions to their workflow, and authentication prompts are often viewed as needless interruptions. The solution, of course, lies in a Cloud experience that feels as seamless as an on premise.  SharePoint Online allows for some of the most feature rich collaboration experiences currently available.  It allows users across organizations to access shared resources, and collaborate on exciting and impactful work.  In order to enable those experiences, SharePoint has to discover who the person requesting the resource is first.

 

Currently, when you access a SharePoint Online resource, SharePoint Online expects your browser or app to provide a cookie authenticating you.  If you do not have that cookie, SharePoint will undergo the authentication process.  Your browser session will be sent to login.microsoftonline.com and you will be prompted to enter your username and password.  When you complete entering your username, login.microsoftonline.com will do what is called a Realm Discovery.  Based on your address, you are sent to the appropriate identity provider.  In cases when you are signing in to your own tenant, you are sent to the identity provider your Office365 admin has configured, such as ADFS, or Azure Active Directory, or another third party Identity Provider that supports the appropriate SAML standards for Office 365.  When an external user is attempting to ask for a resource on your tenant, then the realm discovery routes them to the appropriate identity provider for their user name.

 

If your identity provider is set up for Single Sign On, this added step of providing your username for realm discovery is an additional hurdle that prevents your users from enjoying a true seamless Single Sign On experience.  Enter Auto-Acceleration for SharePoint Online.  Auto-Acceleration is a feature in SharePoint that aims to remove the realm discovery aspect from the sign on experience.  When it is enabled, you specify the default Identity Provider endpoint for your tenant.  In this configuration, when one of your users accesses a resource that is not shared with external users, rather than landing on Login.MicrosoftOnline.Com, your users will be sent directly to the identity provider.  If you have configured Integrated Windows Authentication on ADFS and the user's client machine is domain joined, they will have a completely seamless single sign on experience; it will be no different than if they were accessing an on premises resource.

 

For some organizations, the redirect to Azure Active Directory for realm discovery is the key feature.  Unlike login.microsoftonline.com, an organizations Azure Active Directory page is customizable for branding, and many customers want to create login experiences that are tailored to their organization.  To enable this functionality, you will enable Auto-acceleration, and then configure your sites to be externally-sharable.

 

One final note, worth noting because it is a favorite question here in support regarding Auto-Acceleration: If you chose to configure auto-acceleration, your back out plan when filing your change control is to run Set-SPOTenant –SignInAccelerationDomain “”.  This will clear out the feature and things will work normally again.

 

Resources:

7 Comments
Valued Contributor

Can you comment on the effect this has for external users?

If I remember correctly from my experience, I had this enabled for our domain (worked superbly) but weeks later I've had some complaints from external users (guests) that were no longer able to login, since they were always redirected to our ADFS server, where they of course were not able to authenticated, since they needed to be authenticated against their Microsoft ID.

Microsoft

Hi @Ivan Unger

By default, when you enable Auto-Acceleration, site collections that are enabled for Guest User Access should continue to present the home realm discovery page. However, if an administrator uses the -enableguestsigninacceleration parameter of the Set-SPOTenant cmdlet, all requests will be routed to the identity provider on record for the domain.  Guest Sign In Acceleration is a very niche edge case where a single endpoint is used for multiple domains and can handle guest user authentication.  This is not common in the service.

I hope this helps, and please feel free to follow up with any other questions you might have.

Frequent Contributor

While definitely a niche situation, I appreciate the knowledge sharing! 

Occasional Visitor

Hi Toby,

I have the same question as Ivan. How do we solve this issue? I am forcing redirect to their IDP using the domainhint parameter in the URL (that starts with login.microsoftonline.com..). However, even after the partner ADFS (guest user's) authenticates it successfully, the user gets the annoying: "AADSTS50011: The reply url specified in the request does not match the reply urls configured for the application..."

So far, the MS Premier support seems to be stumped at this, and just trying to understand where the issue is.

In summary, does enabling auto-acceleration for my domain break the guest login? 

Occasional Contributor

@Toby Bianchi 

 

We use a 3rd party IDP, specifically BIG-IP APM and have integrated windows authentication and user client machine is domain joined to get the seamless SSO experience. But internal users were still getting prompt in SharePoint to click their username to authenticate.  We turned on Auto Acceleration to prevent the login prompts and also for the site collections with external sharing turned on (EnableGuestSignInAcceleration). We are experiencing this same issue with external guest accounts that cannot get into our SharePoint Online environment. We have an open premier ticket on this and they want us to turn on auto acceleration, but our internal users will be getting the login prompt again. Any idea around this for external users?

@Toby Bianchi , we are planning to enable Auto acceleration for one of our tenant. Could you please do let me know what would be the impact on Guest users if we don't enable this parameter  " enableguestsigninaccelaration"? I believe they should be able to access external sharing site collections in similar way how they access in the past and there won't be any impact.

Established Member

@Toby Bianchi  We looking for to enable this option and we don't want any changes to external users authentication model (should be able to use their own account to authenticate). What's the best way of doing?