SOLVED

Best Practice to Administer Guest Users from another Tenant

Copper Contributor

All,

 

I have a requirement to implement B2B for few partners with are with us.

I would like to know what the best practice for doing this?

 

 

AAD is configured with AAD Connect to Windows AD.

 

Requirements:

1. Guest users shouldn't have the ability to access AAD related information even through Powershell or Graph API

2. Group Guest Users using AAD Groups and grant them access for specific application only

3. Implement Additional Security policy over Authentication like MFA and Password Complexity over their original Tenant.

 

 

 

 

 

3 Replies
best response confirmed by MosesLim (Copper Contributor)
Solution

Hello,

 

For 1) you can take a look at this feature (in preview)

For 3) (MFA) you can use conditional access

For password complexity I'm not sure you can do it because, to me, it doesn't make sense a tenant manage passwords for external identities.

I assumed, guest user are still treated like normal user where we can still track their activity through log analytics right?
You cannot change the guest users password, but all conditional access control will apply to a user (require MFA, block etc...)
You can monitor through log analytics indeed

For number 2, I would look into access packages - https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-access-pac...
1 best response

Accepted Solutions
best response confirmed by MosesLim (Copper Contributor)
Solution

Hello,

 

For 1) you can take a look at this feature (in preview)

For 3) (MFA) you can use conditional access

For password complexity I'm not sure you can do it because, to me, it doesn't make sense a tenant manage passwords for external identities.

View solution in original post