Blog Post

Microsoft Entra Blog
4 MIN READ

Collaborate securely across organizational boundaries and Microsoft clouds

Robin Goldstein's avatar
Feb 23, 2023

Hello friends, 

 

Today I’m super excited to announce that the capability to collaborate across Microsoft clouds is generally available! This means there’s now support for Azure Active Directory (Azure AD) B2B collaboration across the following Microsoft clouds:

 

  • Azure Commercial and Azure Government clouds 
  • Azure Commercial and Azure China clouds (operated by 21Vianet)

Many of you are already using Azure AD, part of Microsoft Entra, to collaborate with external users like suppliers, partners, and vendors within a Microsoft cloud. We heard you also need to share and collaborate with organizations hosted by Microsoft clouds that are different from the cloud hosting your organization. Until now, to do this, you’ve had to go through the complex process of setting up tenants in multiple clouds and issuing different accounts to the same user. But now, your users can collaborate seamlessly across Microsoft clouds using their primary identities, whether your organizations are in the Azure Commercial, Government, or China clouds.

 

Start collaborating across Microsoft clouds in three simple steps

 

Let’s walk through an example of how Contoso Industries, an organization in the Azure Government cloud, collaborates with their partners in the Azure Commercial cloud.

 

Contoso Industries supplies mission critical equipment to government agencies and commercial organizations. Given the sensitive nature of business, the government requires Contoso Industries to be hosted in the Government cloud.

 

Contoso Industries also has commercial partners like Woodgrove, which provides software for the equipment that Contoso Industries manufactures. Now, with the capability to collaborate across Microsoft clouds, Contoso Industries users can invite Woodgrove users to collaborate with them and give them access to the inventory application or SharePoint documents.

 

 

Let’s look at how to make this happen!

 

Step 1: Enable Microsoft cloud settings for External Identities 

The Contoso Industries admin, Dean, enables the setting to collaborate with the Azure Commercial cloud by navigating to External Identities cross-tenant access settings in the Azure portal.

 

Enable Microsoft cloud settings in External Identities.

 

Dean then adds Woodgrove tenant to their list of partners in cross-tenant access settings. The admin at Woodgrove also makes corresponding changes in the Azure portal.

 

Dean can make additional changes, like leveraging granular controls to only allow specific users to access specific applications. This can further secure these collaborations. After completing these changes, Contoso Industries users can now invite users from Woodgrove to collaborate on the line-of-business apps, SaaS apps, Power BI reports, and SharePoint Online sites, documents, and files that are hosted by Contoso Industries.

 

Learn more about how to enable collaboration across Microsoft clouds.

 

Step 2: Govern external users from other Microsoft clouds on Day 1 

Contoso Industries wants to ensure users from different clouds are governed so that the external users only have access to Contoso Industries resources for a limited time. Dean adds Woodgrove as a trusted connected organization.

 

Add connected organization from another Microsoft cloud.

 

Dean can now assign access packages that include specific resources, access reviews, and sponsors for approvals. This makes it easy for Woodgrove users to self-service onboard and to be governed by Contoso Industries access policies immediately.

 

Learn more about how to use connected organizations and access packages to onboard and govern users from a different Microsoft cloud. 

 

Step 3: Secure and monitor external collaboration across Microsoft clouds 

Dean wants to secure the resources that are shared with Woodgrove users. Because Woodgrove users are guest users in Contoso Industries, all Conditional Access policies can be applied to Woodgrove users, like requiring multi-factor authentication (MFA) before accessing Contoso Industries resources. 

 

Contoso Industries can also leverage cross-tenant access settings to trust MFA or compliant Azure AD joined devices from Woodgrove, which enables a seamless collaboration experience for Woodgrove users while keeping their security posture intact.

 

Trust MFA and device signals from another Azure AD tenant.

 

When a Woodgrove user accesses resources in Contoso Industries, Dean can monitor the user’s activities using sign-in logs. Dean can also use the cross-tenant access activity workbook to get visibility into the resources Woodgrove users are accessing.

 

What customers are saying

 

We got some great feedback from customers like you during the previews: 

 

“Collaboration across Microsoft clouds will enable us to finally migrate the last dozen or so apps from ADFS to Azure AD. ADFS has historically been our solution to provide SSO for both our corporate and China users to apps that they all need. Once this migration is complete, it will help us deprecate ADFS, greatly reducing cost, increasing reliability, and minimizing our security footprint.” 

-Customer in financial services industry

 

“We’ve been unable to move our users to our government tenant due to lack of collaboration, and this feature will unblock that move!” 

-Customer in engineering and construction industry

 

We love hearing from you, so please share your feedback on these updates through the Azure forum or by tagging @AzureAD on Twitter.  


Robin Goldstein  

Director of Product Management, Microsoft identity 

Twitter: @RobinGo_MS 

LinkedIn: Robin Goldstein | LinkedIn 

 

Learn more about Microsoft identity:

Updated Feb 24, 2023
Version 2.0
  • joshdoug Thanks for the explanation. Under the situation of above 50,000 MAUs, AADP P1 and P2 users will be charged at different rates. Then what about the AAD users without P1 and P2 licenses? Do they need to purchase an AADP license or they will be charged another rate?

  • Yu_Guo - Cross-cloud b2b does not require P1 licensing by itself, but it does fall in to the MAU billing model. So if a customer has more than 50,000 active users in a month, there is a charge for the number of users above 50,000. A p1 license would be required when you want to apply premium features, such as security controls (like Conditional Access or granular controls in cross-tenant access settings). Hope this helps clarify!

  • According to Pricing - Active Directory External Identities | Microsoft AzureAzure AD External Identities will not be billed unless over 50,000 MAUs per month. The customer's first 50,000 MAUs per month are free for both Premium P1 and Premium P2 features. Does that mean if a customer wants to implement Cross-Cloud B2B, they need to purchase an Azure AD Premium license and they will be extra charged when more than 50,000 MAU?

     

  • Mike Crowley  

     

    When doing a GET it does not accurately reflect the state of the user in exchange. Cross-tenant sync does run into this challenge as it relies on the user Graph APIs. It is able to circumvent the issue by supporting creating a constant mapping where everyone is provisioned as showInAddressList = true. This takes away the need to do a GET call for the attribute.  There is a backend process to then sync the data into exchange. 

     

    If you are building your own automation, then I would certainly recommend using the exchange commandlets. 

     

     

  • MikeCrowley's avatar
    MikeCrowley
    Iron Contributor

    Thanks, but my question is if cross tenant sync falls victim to the apparent graph bug concerning the creation of contacts, as discussed in the KB I posted.

  • MikeCrowley's avatar
    MikeCrowley
    Iron Contributor

    Nice! Can you comment on the support for this feature with the showInAddressList attribute for guest accounts? According to this, we cannot set the attribute through Graph, but should use Exchange Online directly, however I'm not sure if the cross-tenant sync uses graph or is otherwise subject to this bug?