Home

External Sharing with SSO Enabled

%3CLINGO-SUB%20id%3D%22lingo-sub-99605%22%20slang%3D%22en-US%22%3EExternal%20Sharing%20with%20SSO%20Enabled%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-99605%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20are%20trying%20to%20confirm%20the%20experience%20we%20are%20seeing%20is%20to%20be%20expected.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20are%20using%20ADFS%20to%20authenticate%20our%20users%20and%20provide%20a%20SSO%20experience%20which%20works%20fine.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAs%20soon%20as%20we%20enable%20the%20ability%20to%20provide%20external%20sharing%20to%20SPO%2C%20our%20users%20get%20directed%20to%20the%20AAD%20account%20login%20screen%20where%20the%20user%20needs%20to%20select%20their%20username%20and%20then%20allowed%20to%20enter%20O365.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ETurn%20off%20external%20sharing%20and%20the%20user%20experience%20goes%20back%20too%20SSO.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20took%20this%20up%20with%20Premiere%20and%20they%20indicated%20that%20this%20is%20expected%20because%20of%20our%20use%20of%20ADFS%20for%20SSO.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWas%20just%20wondering%20if%20this%20is%20in%20fact%20the%20experience%20we%20should%20be%20seeing%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-99605%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAuthentication%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-99666%22%20slang%3D%22en-US%22%3ERe%3A%20External%20Sharing%20with%20SSO%20Enabled%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-99666%22%20slang%3D%22en-US%22%3EAnd%20to%20add%20to%20that%2C%20because%20O365%20doesn't%20know%20if%20your%20external%20or%20not%2C%20it%20redirects%20all%20users%20to%20AAD%20until%20users%20enters%20their%20login%20name.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-99662%22%20slang%3D%22en-US%22%3ERe%3A%20External%20Sharing%20with%20SSO%20Enabled%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-99662%22%20slang%3D%22en-US%22%3EThis%20is%20the%20experience%20that%20you%20will%20get%20as%20I%20have%20seen%20this%20before.%20The%20issue%20is%20that%20external%20users%20need%20to%20authenticate%20through%20AAD%20as%20that%20holds%20there%20account%20reference%2C%20if%20it%20directed%20them%20to%20ADFS%20they%20wouldn't%20be%20able%20to%20sign%20in%20as%20there%20account%20is%20not%20in%20your%20internal%20AD.%3CBR%20%2F%3EThere%20isn't%20a%20workaround%20for%20this%20that%20I%20know%20of.%3C%2FLINGO-BODY%3E
Peter Graham
Occasional Contributor

We are trying to confirm the experience we are seeing is to be expected.

 

We are using ADFS to authenticate our users and provide a SSO experience which works fine.

 

As soon as we enable the ability to provide external sharing to SPO, our users get directed to the AAD account login screen where the user needs to select their username and then allowed to enter O365.

 

Turn off external sharing and the user experience goes back too SSO.

 

We took this up with Premiere and they indicated that this is expected because of our use of ADFS for SSO.

 

Was just wondering if this is in fact the experience we should be seeing?

2 Replies
This is the experience that you will get as I have seen this before. The issue is that external users need to authenticate through AAD as that holds there account reference, if it directed them to ADFS they wouldn't be able to sign in as there account is not in your internal AD.
There isn't a workaround for this that I know of.
And to add to that, because O365 doesn't know if your external or not, it redirects all users to AAD until users enters their login name.
Related Conversations
Tabs and Dark Mode
cjc2112 in Discussions on
50 Replies
Extentions Synchronization
Deleted in Discussions on
3 Replies
Stable version of Edge insider browser
HotCakeX in Discussions on
35 Replies
How to Prevent Teams from Auto-Launch
chenrylee in Microsoft Teams on
32 Replies
Security Community Webinars
Valon_Kolica in Security, Privacy & Compliance on
15 Replies
Dev channel update to 80.0.355.1 is live
josh_bodner in Discussions on
67 Replies