Access to sharepoint folder

%3CLINGO-SUB%20id%3D%22lingo-sub-1294395%22%20slang%3D%22en-US%22%3EAccess%20to%20sharepoint%20folder%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1294395%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3C%2FP%3E%3CP%3EI%20have%20an%20office365%20unified%20group.%20My%20user%20connects%20to%20sharepoint%20using%20this%20office365%20unified%20group.%3CBR%20%2F%3EThe%20user%20has%20many%20folders%20in%20the%20sharepoint%20and%20user%20want%20to%20share%20one%20particular%20folder%20to%20one%20of%20the%20external%20domain%20user.%20When%20user%20has%20shared%20the%20folder%20to%20external%20user.%20when%20ever%20external%20user%20tries%20to%20access%20this%20folder%2C%20external%20user%20is%20asked%20to%20enter%20verification%20code%20sent%20to%20his%20email.%20how%20do%20i%20bypass%20this%20verification%20code.%20Do%20i%20need%20to%20create%20a%20contact%20of%20the%20external%20user%2C%20if%20so%20do%20i%20need%20to%20create%20in%20azure%20AD%20and%20how%20do%20i%20create%20it%20or%20is%20there%20any%20other%20way%20to%20bypass%20this.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1294395%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAdmin%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EDocument%20Library%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EFiles%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESharePoint%20Online%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESites%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1295083%22%20slang%3D%22en-US%22%3ERe%3A%20Access%20to%20sharepoint%20folder%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1295083%22%20slang%3D%22en-US%22%3E%3CP%3EHi%2C%3C%2FP%3E%3CP%3EBased%20on%20your%20question%2C%20it%20looks%20like%20you%20are%20sharing%20the%20folder%20to%20the%20email%20address%20of%20the%20external%20user%20that%20isn't%20a%20Microsoft%20account%20or%20a%20work%20or%20school%20account%20in%20Azure%20AD%20or%20an%20email%20account%20in%20federated%20organization.%3CBR%20%2F%3E%26nbsp%3B%3CBR%20%2F%3EOne%20of%20the%20easiest%20way%20to%20enable%20your%20external%20users%20to%20access%20the%20shared%20folder%20without%20providing%20code%20every%20time%20is%20to%20add%20the%20required%20external%20user%20to%20your%20Azure%20AD%20as%20Guest%20User%20Type%20who%20then%20would%20be%20receiving%20invitation%20via%20email%20from%20your%20organization%20and%20they%20would%20be%20prompted%20to%20create%20their%20Microsoft%20Account%20(MSAs)%20after%20which%20they%20would%20be%20required%20to%20review%20permissions%20and%20provide%20their%20consent%20and%20acceptance.%20After%20this%20one%20time%20activity%2C%20subsequently%20whenever%20you%20share%20new%20files%20or%20folders%20to%20these%20users%2C%20they%20would%20be%20able%20to%20login%20with%20their%20corresponding%20Microsoft%20Account%20and%20then%20access%20the%20shared%20files%20or%20folders%20without%20the%20need%20of%20verification%20code.%3C%2FP%3E%3CP%3EPlease%20refer%20the%20below%20links%20on%20the%20Guest%20Users%20creation%20%5BIndividual%20as%20well%20as%20bulk%20creation%5D%20via%20Azure%20Portal%20-%3C%2FP%3E%3CP%3E1.%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fb2b%2Fadd-users-administrator%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fb2b%2Fadd-users-administrator%3C%2FA%3E%3C%2FP%3E%3CP%3E2.%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fb2b%2Ftutorial-bulk-invite%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fb2b%2Ftutorial-bulk-invite%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F144450%22%20target%3D%22_blank%22%3E%40Roger%20Roger%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20hope%20this%20is%20helpful%2C%20please%20like%20it%20or%20mark%20it%20as%20a%20solution%20if%20it%20answers%20your%20query.%3C%2FP%3E%3CP%3EThanks.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Highlighted
Frequent Contributor

Hi 

I have an office365 unified group. My user connects to sharepoint using this office365 unified group.
The user has many folders in the sharepoint and user want to share one particular folder to one of the external domain user. When user has shared the folder to external user. when ever external user tries to access this folder, external user is asked to enter verification code sent to his email. how do i bypass this verification code. Do i need to create a contact of the external user, if so do i need to create in azure AD and how do i create it or is there any other way to bypass this.

1 Reply
Highlighted

Hi,

Based on your question, it looks like you are sharing the folder to the email address of the external user that isn't a Microsoft account or a work or school account in Azure AD or an email account in federated organization.
 
One of the easiest way to enable your external users to access the shared folder without providing code every time is to add the required external user to your Azure AD as Guest User Type who then would be receiving invitation via email from your organization and they would be prompted to create their Microsoft Account (MSAs) after which they would be required to review permissions and provide their consent and acceptance. After this one time activity, subsequently whenever you share new files or folders to these users, they would be able to login with their corresponding Microsoft Account and then access the shared files or folders without the need of verification code.

Please refer the below links on the Guest Users creation [Individual as well as bulk creation] via Azure Portal -

1. https://docs.microsoft.com/en-us/azure/active-directory/b2b/add-users-administrator

2. https://docs.microsoft.com/en-us/azure/active-directory/b2b/tutorial-bulk-invite

 

@Roger Roger 

I hope this is helpful, please like it or mark it as a solution if it answers your query.

Thanks.