Require conditional access for people outside your organization
You can require any of the following conditional access options for people outside your organization:
- Multifactor authentication
- Compliant devices
- Microsoft Entra hybrid joined devices
When using Microsoft Entra B2B direct connect - such as with shared channels in Teams - you can choose to trust the conditional access settings from other organizations for these options. Note that the conditional access policies are only used for access to the Files tab in the shared channel and the associated SharePoint site.
Multifactor authentication can be used with any external account. If your organization doesn't trust multifactor authentication from other Microsoft Entra organizations, users from those organizations must perform multifactor authentication when accessing resources in your organization. People with email addresses not hosted by Microsoft are always prompted for multifactor authentication.
The options Trust compliant devices and Trust Microsoft Entra hybrid joined device require devices that are managed in Microsoft Entra ID. If you choose to enable these options, people outside your organization must be using devices that are managed by your organization or by an organization that you trust. People without managed devices will be blocked, including:
- People with email addresses not hosted by Microsoft, including consumer email addresses
- People from Microsoft 365 or Microsoft Entra organizations that don't manage devices
- People from Microsoft 365 or Microsoft Entra organizations that require managed devices where your organization doesn't trust their conditional access settings.
We recommend using caution when requiring compliant or Microsoft Entra hybrid joined devices because this blocks many external collaboration scenarios. Be sure all of your partner organizations manage their devices and that your organization trusts their settings.
To require conditional access for people outside your organization, do the following:
- Choose conditional access settings to trust from other organizations.
- Set up conditional access for people outside your organization.
You can choose to trust conditional access settings from all other Microsoft 365 and Microsoft Entra organizations or only from those you specify.
Note
Changes to cross-tenant access settings may take two hours to take effect.
If you want to trust conditional access settings from all organizations, follow this procedure.
To trust conditional access settings from all Microsoft Entra organizations
- Sign in to Microsoft Entra ID using a Security Administrator account.
- Expand External Identities, and then select Cross-tenant access settings.
- Select the Default settings tab.
- Under Inbound access settings, select Edit inbound defaults.
- Select the Trust settings tab.
- Choose which settings you want your conditional access policies to accept from other organizations.
- Select Save and close the Default settings blade.
If you want to trust conditional access settings from a specific organization, follow this procedure.
To trust conditional access settings from a specific organization
- Sign in to Microsoft Entra ID using a Security Administrator account.
- Expand External Identities, and then select Cross-tenant access settings.
- Select the Inbound access settings for the organization where you want to trust conditional access settings.
- Select the Trust settings tab.
- Select the Customize settings option.
- Choose which settings you want your conditional access policies to accept from other organizations.
- Select Save and close the Inbound access settings blade.
Setting up a conditional access policy for people outside your organization affects the following:
- People using guest accounts (Microsoft Entra B2B collaboration users)
- External participants in Teams shared channels (Microsoft Entra B2B direct connect users)
Important
Only select the Require device to be marked compliant or Require Microsoft Entra hybrid joined device if everyone outside your organization is using a device that is managed by your organization or by a trusted Microsoft 365 or Microsoft Entra organization.
To set up conditional access for people outside your organization
- Sign in to the Microsoft Entra admin center.
- Browse to Protection > Conditional Access.
- Select Create new policy.
- Give your policy a name.
- Under Assignments, select Users or workload identities.
- Under Include, select All guest and external users
- Under Exclude, select Users and groups and choose your organization's emergency access or break-glass accounts.
- Under Target resources > Cloud apps > Include, select All cloud apps.
- Under Exclude, select any applications that don't require multifactor authentication.
- Under Access controls > Grant, select Grant access, Require multifactor authentication, and select Select.
- Choose if you want to enable the policy and select Create.