Sharing files to Non-Microsoft account external receipents via OneDrive using Outlook

%3CLINGO-SUB%20id%3D%22lingo-sub-1447693%22%20slang%3D%22en-US%22%3ESharing%20files%20to%20Non-Microsoft%20account%20external%20receipents%20via%20OneDrive%20using%20Outlook%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1447693%22%20slang%3D%22en-US%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhen%20I%20share%20a%20file%20via%20the%20upload%20to%20OneDrive%20option%20in%20Outlook%2C%20I%20have%20the%20option%20to%20set%20the%20permissions%20as%20follows%3A%26nbsp%3B%3C%2FP%3E%3CP%3E1.%20Anyone%20can%20Edit%3C%2FP%3E%3CP%3E2.%20Anyone%20can%20View%3C%2FP%3E%3CP%3E3.%20Organization%20can%20Edit%3C%2FP%3E%3CP%3E4.%20Organization%20can%20View%3C%2FP%3E%3CP%3E5.%20Recipient%20can%20Edit%3C%2FP%3E%3CP%3E6.%20Recipient%20can%20View%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhen%20I%20choose%201%20or%202%2C%20the%20external%20or%20Organization%20user%20can%20access%20the%20files%20with%20no%20problem.%26nbsp%3B%20Also%20when%20checking%20the%20permissions%20via%20the%20OneDrive%20web%20client%2C%20you%20can%20see%20the%20Anyone%20permission%20has%20been%20applied%20to%20the%20file.%26nbsp%3B%20This%20behavior%20is%20expected.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EWhen%20I%20choose%203%20or%204%2C%20only%20Organization%20users%20can%20access%20the%20files%20with%20no%20problem.%26nbsp%3B%20Also%20when%20checking%20the%20permissions%20via%20the%20OneDrive%20web%20client%2C%20you%20can%20see%20the%20Organization%20permission%20has%20been%20applied.%26nbsp%3B%20This%20behaviour%20is%20expected.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EWhen%20I%20choose%205%20or%206%2C%20only%20Organization%2C%20Microsoft%20account%2C%20or%20AzureAD%20users%20can%20access%20the%20files%20with%20no%20problem%2C%20non%20microsoft%20users%20(gmail%2C%20yahoo%2C%20etc)%20is%20only%20given%20a%20signin%20option.%26nbsp%3B%20This%20option%20fails%20and%20the%20user%20is%20force%20to%20create%20a%20Microsoft%20Account.%26nbsp%3B%20Also%20when%20checking%20the%20permissions%20via%20the%20OneDrive%20web%20client%2C%20the%20non-microsoft%20user%20permission%20did%20not%20apply.%26nbsp%3B%20This%20behaviour%20is%20%3CSTRONG%3ENot%3C%2FSTRONG%3E%20expected.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EFurthermore%2C%20if%20I%20share%20the%20file%20via%20OneDrive%20on%20web%20to%20the%20non-microsoft%20external%20user.%26nbsp%3B%20The%20user%20receives%20a%20Verification%20Code%20Request%20and%20is%20able%20to%20access%20the%20file.%26nbsp%3B%20Also%2C%20the%20user%20does%20%3CSTRONG%3ENOT%3C%2FSTRONG%3E%20show%20up%20in%20AzureAD.%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3EThis%20behaviour%20is%20expected.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThere%20must%20be%20some%20setting%20that%20I%20am%20missing%3F%26nbsp%3B%20Thanks%20for%20any%20help.%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1447693%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EFiles%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EOffice%20365%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EOneDrive%20for%20Business%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1447710%22%20slang%3D%22en-US%22%3ERe%3A%20Sharing%20files%20to%20Non-Microsoft%20account%20external%20receipents%20via%20OneDrive%20using%20Outlook%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1447710%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F78406%22%20target%3D%22_blank%22%3E%40Dominic%20Booker%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EFor%20option%205%20and%206%2C%20it%20is%20expected%20behaviour%20that%20Gmail%20users%20will%20need%20to%20create%20a%20Microsoft%20Account.%20I%20also%20believe%20that%20you%20would%20not%20see%20the%20permissions%20applied%20until%20the%20Gmail%20user%20has%20successfully%20accepted%20the%20invitation.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhat%20you%20could%20do%20for%20Gmail%20accounts%20is%20try%20and%20implement%20this%20-%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fcampbell.scot%2Fsign-in-to-azure-ad-using-google-with-azure-ad-external-identities%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fcampbell.scot%2Fsign-in-to-azure-ad-using-google-with-azure-ad-external-identities%2F%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Highlighted
Senior Member

 

When I share a file via the upload to OneDrive option in Outlook, I have the option to set the permissions as follows: 

1. Anyone can Edit

2. Anyone can View

3. Organization can Edit

4. Organization can View

5. Recipient can Edit

6. Recipient can View

 

When I choose 1 or 2, the external or Organization user can access the files with no problem.  Also when checking the permissions via the OneDrive web client, you can see the Anyone permission has been applied to the file.  This behavior is expected.

 

When I choose 3 or 4, only Organization users can access the files with no problem.  Also when checking the permissions via the OneDrive web client, you can see the Organization permission has been applied.  This behaviour is expected.

 

When I choose 5 or 6, only Organization, Microsoft account, or AzureAD users can access the files with no problem, non microsoft users (gmail, yahoo, etc) is only given a signin option.  This option fails and the user is force to create a Microsoft Account.  Also when checking the permissions via the OneDrive web client, the non-microsoft user permission did not apply.  This behaviour is Not expected.

 

Furthermore, if I share the file via OneDrive on web to the non-microsoft external user.  The user receives a Verification Code Request and is able to access the file.  Also, the user does NOT show up in AzureAD.  This behaviour is expected.

 

There must be some setting that I am missing?  Thanks for any help. 

1 Reply
Highlighted

@Dominic Booker 

 

For option 5 and 6, it is expected behaviour that Gmail users will need to create a Microsoft Account. I also believe that you would not see the permissions applied until the Gmail user has successfully accepted the invitation. 

 

What you could do for Gmail accounts is try and implement this - https://campbell.scot/sign-in-to-azure-ad-using-google-with-azure-ad-external-identities/