Επεξεργασία

Κοινή χρήση μέσω


Configure cross-tenant synchronization

This article describes the steps to configure cross-tenant synchronization using the Microsoft Entra admin center. When configured, Microsoft Entra ID automatically provisions and de-provisions B2B users in your target tenant. For important details on what this service does, how it works, and frequently asked questions, see Automate user provisioning and deprovisioning to SaaS applications with Microsoft Entra ID.

Diagram that shows cross-tenant synchronization between source tenant and target tenant.

Learning objectives

By the end of this article, you'll be able to:

  • Create B2B users in your target tenant
  • Remove B2B users in your target tenant
  • Keep user attributes synchronized between your source and target tenants

Prerequisites

Icon for the source tenant.
Source tenant

Icon for the target tenant.
Target tenant

Step 1: Plan your provisioning deployment

  1. Define how you would like to structure the tenants in your organization.

  2. Learn about how the provisioning service works.

  3. Determine who will be in Scope for provisioning.

  4. Determine what data to map between tenants.

Step 2: Enable user synchronization in the target tenant

Tip

Steps in this article might vary slightly based on the portal you start from.

Icon for the target tenant.
Target tenant

  1. Sign in to the Microsoft Entra admin center of the target tenant.

  2. Browse to Identity > External Identities > Cross-tenant access settings.

  3. On the Organization settings tab, select Add organization.

  4. Add the source tenant by typing the tenant ID or domain name and selecting Add.

    Screenshot that shows the Add organization pane to add the source tenant.

  5. Under Inbound access of the added organization, select Inherited from default.

  6. Select the Cross-tenant sync tab.

  7. Select the Allow users sync into this tenant checkbox.

    Screenshot that shows the  Cross-tenant sync tab with the Allow users sync into this tenant checkbox.

  8. Select Save.

  9. If you see an Enable cross-tenant sync and auto-redemption dialog box asking if you want to enable auto-redemption, select Yes.

    Selecting Yes will automatically redeem invitations in the target tenant.

    Screenshot that shows the Enable cross-tenant sync and auto-redemption dialog box to automatically redeem invitations in the target tenant.

Step 3: Automatically redeem invitations in the target tenant

Icon for the target tenant.
Target tenant

In this step, you automatically redeem invitations so users from the source tenant don't have to accept the consent prompt. This setting must be checked in both the source tenant (outbound) and target tenant (inbound). For more information, see Automatic redemption setting.

  1. In the target tenant, on the same Inbound access settings page, select the Trust settings tab.

  2. Check the Automatically redeem invitations with the tenant <tenant> checkbox.

    This box might already be checked if you previously selected Yes in the Enable cross-tenant sync and auto-redemption dialog box.

    Screenshot that shows the inbound Automatic redemption checkbox.

  3. Select Save.

Step 4: Automatically redeem invitations in the source tenant

Icon for the source tenant.
Source tenant

In this step, you automatically redeem invitations in the source tenant.

  1. Sign in to the Microsoft Entra admin center of the source tenant.

  2. Browse to Identity > External Identities > Cross-tenant access settings.

  3. On the Organization settings tab, select Add organization.

  4. Add the target tenant by typing the tenant ID or domain name and selecting Add.

    Screenshot that shows the Add organization pane to add the target tenant.

  5. Under Outbound access for the target organization, select Inherited from default.

  6. Select the Trust settings tab.

  7. Check the Automatically redeem invitations with the tenant <tenant> checkbox.

    Screenshot that shows the outbound Automatic redemption checkbox.

  8. Select Save.

Step 5: Create a configuration in the source tenant

Icon for the source tenant.
Source tenant

  1. In the source tenant, browse to Identity > External Identities > Cross-tenant synchronization.

    Screenshot that shows the Cross-tenant synchronization navigation in the Microsoft Entra admin center.

    If you are using the Azure portal, browse to Microsoft Entra ID > Manage > Cross-tenant synchronization.

    Screenshot that shows the Cross-tenant synchronization navigation in the Azure portal.

  2. Select Configurations.

  3. At the top of the page, select New configuration.

  4. Provide a name for the configuration and select Create.

    It can take up to 15 seconds for the configuration that you just created to appear in the list.

Step 6: Test the connection to the target tenant

Icon for the source tenant.
Source tenant

  1. In the source tenant, you should see your new configuration. If not, in the configuration list, select your configuration.

    Screenshot that shows the Cross-tenant synchronization Configurations page and a new configuration.

  2. Select Get started.

  3. Set the Provisioning Mode to Automatic.

  4. Under the Admin Credentials section, change the Authentication Method to Cross Tenant Synchronization Policy.

    Screenshot that shows the Provisioning page with the Cross-tenant Synchronization Policy selected.

  5. In the Tenant Id box, enter the tenant ID of the target tenant.

  6. Select Test Connection to test the connection.

    You should see a message that the supplied credentials are authorized to enable provisioning. If the test connection fails, see Troubleshooting tips later in this article.

    Screenshot that shows a testing connection notification.

  7. Select Save.

    Mappings and Settings sections appear.

  8. Close the Provisioning page.

Step 7: Define who is in scope for provisioning

Icon for the source tenant.
Source tenant

The Microsoft Entra provisioning service allows you to define who will be provisioned in one or both of the following ways:

  • Based on assignment to the configuration
  • Based on attributes of the user

Start small. Test with a small set of users before rolling out to everyone. When the scope for provisioning is set to assigned users and groups, you can control it by assigning one or two users to the configuration. You can further refine who is in scope for provisioning by creating attribute-based scoping filters, described in the next step.

  1. In the source tenant, select Provisioning and expand the Settings section.

    Screenshot of the Provisioning page that shows the Settings section with the Scope and Provisioning Status options.

  2. In the Scope list, select whether to synchronize all users in the source tenant or only users assigned to the configuration.

    It's recommended that you select Sync only assigned users and groups instead of Sync all users and groups. Reducing the number of users in scope improves performance.

  3. If you made any changes, select Save.

  4. On the configuration page, select Users and groups.

    For cross-tenant synchronization to work, at least one internal user must be assigned to the configuration.

  5. Select Add user/group.

  6. On the Add Assignment page, under Users and groups, select None Selected.

  7. On the Users and groups pane, search for and select one or more internal users or groups you want to assign to the configuration.

    If you select a group to assign to the configuration, only users that are direct members in the group will be in scope for provisioning. You can select a static group or a dynamic group. The assignment doesn't cascade to nested groups.

  8. Select Select.

  9. Select Assign.

    Screenshot that shows the Users and groups page with a user assigned to the configuration.

    For more information, see Assign users and groups to an application.

Step 8: (Optional) Define who is in scope for provisioning with scoping filters

Icon for the source tenant.
Source tenant

Regardless of the value you selected for Scope in the previous step, you can further limit which users are synchronized by creating attribute-based scoping filters.

  1. In the source tenant, select Provisioning and expand the Mappings section.

    Screenshot that shows the Provisioning page with the Mappings section expanded.

  2. Select Provision Microsoft Entra ID Users to open the Attribute Mapping page.

  3. Under Source Object Scope, select All records.

    Screenshot that shows the Attribute Mapping page with the Source Object Scope.

  4. On the Source Object Scope page, select Add scoping filter.

  5. Add any scoping filters to define which users are in scope for provisioning.

    To configure scoping filters, refer to the instructions provided in Scoping users or groups to be provisioned with scoping filters.

    Screenshot that shows the Add Scoping Filter page with sample filter.

  6. Select Ok and Save to save any changes.

    If you added a filter, you'll see a message that saving your changes will result in all assigned users and groups being resynchronized. This may take a long time depending on the size of your directory.

  7. Select Yes and close the Attribute Mapping page.

Step 9: Review attribute mappings

Icon for the source tenant.
Source tenant

Attribute mappings allow you to define how data should flow between the source tenant and target tenant. For information on how to customize the default attribute mappings, see Tutorial - Customize user provisioning attribute-mappings for SaaS applications in Microsoft Entra ID.

  1. In the source tenant, select Provisioning and expand the Mappings section.

  2. Select Provision Microsoft Entra ID Users.

  3. On the Attribute Mapping page, scroll down to review the user attributes that are synchronized between tenants in the Attribute Mappings section.

    The first attribute, alternativeSecurityIdentifier, is an internal attribute used to uniquely identify the user across tenants, match users in the source tenant with existing users in the target tenant, and ensure that each user only has one account. The matching attribute cannot be changed. Attempting to change the matching attribute or adding additional matching attributes will result in a schemaInvalid error.

    Screenshot of the Attribute Mapping page that shows the list of Microsoft Entra attributes.

  4. Select the Member (userType) attribute to open the Edit Attribute page.

  5. Review the Constant Value setting for the userType attribute.

    This setting defines the type of user that will be created in the target tenant and can be one of the values in the following table. By default, users will be created as external member (B2B collaboration users). For more information, see Properties of a Microsoft Entra B2B collaboration user.

    Constant Value Description
    Member Default. Users will be created as external member (B2B collaboration users) in the target tenant. Users will be able to function as any internal member of the target tenant.
    Guest Users will be created as external guests (B2B collaboration users) in the target tenant.

    Note

    If the B2B user already exists in the target tenant then Member (userType) will not changed to Member, unless the Apply this mapping setting is set to Always.

    The user type you choose has the following limitations for apps or services (but aren't limited to):

    App or service Limitations
    Power BI - Support for UserType Member in Power BI is currently in preview. For more information, see Distribute Power BI content to external guest users with Microsoft Entra B2B.
    Azure Virtual Desktop - External member and external guest aren't supported in Azure Virtual Desktop.

    Screenshot of the Edit Attribute page that shows the Member attribute.

  6. If you want to define any transformations, on the Attribute Mapping page, select the attribute you want to transform, such as displayName.

  7. Set the Mapping type to Expression.

  8. In the Expression box, enter the transformation expression. For example with the display name, you can do the following:

    • Flip the first name and last name and add a comma in between.
    • Add the domain name in parentheses at the end of the display name.

    For examples, see Reference for writing expressions for attribute mappings in Microsoft Entra ID.

    Screenshot of the Edit Attribute page that shows the displayName attribute with the Expression box.

Tip

You can map directory extensions by updating the schema of the cross-tenant synchronization. For more information, see Map directory extensions in cross-tenant synchronization.

Step 10: Specify additional provisioning settings

Icon for the source tenant.
Source tenant

  1. In the source tenant, select Provisioning and expand the Settings section.

    Screenshot of the Provisioning page that shows the Settings section with the Scope and Provisioning Status options.

  2. Select the Send an email notification when a failure occurs checkbox.

  3. In the Notification Email box, enter the email address of a person or group who should receive provisioning error notifications.

    Email notifications are sent within 24 hours of the job entering quarantine state. For custom alerts, see Understand how provisioning integrates with Azure Monitor logs.

  4. To prevent accidental deletion, select Prevent accidental deletion and specify a threshold value. By default, the threshold is set to 500.

    For more information, see Enable accidental deletions prevention in the Microsoft Entra provisioning service.

  5. Select Save to save any changes.

Step 11: Test provision on demand

Icon for the source tenant.
Source tenant

Now that you have a configuration, you can test on-demand provisioning with one of your users.

  1. In the source tenant, browse to Identity > External Identities > Cross-tenant synchronization.

  2. Select Configurations and then select your configuration.

  3. Select Provision on demand.

  4. In the Select a user or group box, search for and select one of your test users.

    Screenshot of the Provision on demand page that shows a test user selected.

  5. Select Provision.

    After a few moments, the Perform action page appears with information about the provisioning of the test user in the target tenant.

    Screenshot of the Perform action page that shows the test user and list of modified attributes.

    If the user isn't in scope, you'll see a page with information about why test user was skipped.

    Screenshot of the Determine if user is in scope page that shows information about why test user was skipped.

    On the Provision on demand page, you can view details about the provision and have the option to retry.

    Screenshot of the Provision on demand page that shows details about the provision.

  6. In the target tenant, verify that the test user was provisioned.

    Screenshot of the Users page of the target tenant that shows the test user provisioned.

  7. If all is working as expected, assign additional users to the configuration.

    For more information, see On-demand provisioning in Microsoft Entra ID.

Step 12: Start the provisioning job

Icon for the source tenant.
Source tenant

The provisioning job starts the initial synchronization cycle of all users defined in Scope of the Settings section. The initial cycle takes longer to perform than subsequent cycles, which occur approximately every 40 minutes as long as the Microsoft Entra provisioning service is running.

  1. In the source tenant, browse to Identity > External Identities > Cross-tenant synchronization.

  2. Select Configurations and then select your configuration.

  3. On the Overview page, review the provisioning details.

    Screenshot of the Configurations Overview page that lists provisioning details.

  4. Select Start provisioning to start the provisioning job.

Step 13: Monitor provisioning

Icon for the source tenant. Icon for the target tenant.
Source and target tenants

Once you've started a provisioning job, you can monitor the status.

  1. In the source tenant, on the Overview page, check the progress bar to see the status of the provisioning cycle and how close it's to completion. For more information, see Check the status of user provisioning.

    If provisioning seems to be in an unhealthy state, the configuration will go into quarantine. For more information, see Application provisioning in quarantine status.

    Screenshot of the Configurations Overview page that shows the status of the provisioning cycle.

  2. Select Provisioning logs to determine which users have been provisioned successfully or unsuccessfully. By default, the logs are filtered by the service principal ID of the configuration. For more information, see Provisioning logs in Microsoft Entra ID.

    Screenshot of the Provisioning logs page that lists the log entries and their status.

  3. Select Audit logs to view all logged events in Microsoft Entra ID. For more information, see Audit logs in Microsoft Entra ID.

    Screenshot of the Audit logs page that lists the log entries and their status.

    You can also view audit logs in the target tenant.

  4. In the target tenant, select Users > Audit logs to view logged events for user management.

    Screenshot of the Audit logs page in the target tenant that lists the log entries for user management.

Step 14: Configure leave settings

Icon for the target tenant.
Target tenant

Even though users are being provisioned in the target tenant, they still might be able to remove themselves. If users remove themselves and they are in scope, they'll be provisioned again during the next provisioning cycle. If you want to disallow the ability for users to remove themselves from your organization, you must configure the External user leave settings.

  1. In the target tenant, browse to Identity > External Identities > External collaboration settings.

  2. Under External user leave settings, choose whether to allow external users to leave your organization themselves.

This setting also applies to B2B collaboration and B2B direct connect, so if you set External user leave settings to No, B2B collaboration users and B2B direct connect users can't leave your organization themselves. For more information, see Leave an organization as an external user.

Troubleshooting tips

Delete a configuration

Follows these steps to delete a configuration on the Configurations page.

  1. In the source tenant, browse to Identity > External Identities > Cross-tenant synchronization.

  2. On the Configurations page, add a check mark next to the configuration you want to delete.

  3. Select Delete and then OK to delete the configuration.

    Screenshot of the Configurations page showing how to delete a configuration.

Common scenarios and solutions

Symptom - Test connection fails with AzureDirectoryB2BManagementPolicyCheckFailure

When configuring cross-tenant synchronization in the source tenant and you test the connection, it fails with the following error message:

You appear to have entered invalid credentials. Please confirm you are using the correct information for an administrative account.
Error code: AzureDirectoryB2BManagementPolicyCheckFailure
Details: Policy permitting auto-redemption of invitations not configured.

Screenshot that shows the error when test connection fails with AzureDirectoryB2BManagementPolicyCheckFailure.

Cause

This error indicates the policy to automatically redeem invitations in both the source and target tenants wasn't set up.

Solution

Follow the steps in Step 3: Automatically redeem invitations in the target tenant and Step 4: Automatically redeem invitations in the source tenant.

Symptom - Automatic redemption checkbox is disabled

When configuring cross-tenant synchronization, the Automatic redemption checkbox is disabled.

Screenshot that shows the Automatic redemption checkbox as disabled.

Cause

Your tenant doesn't have a Microsoft Entra ID P1 or P2 license.

Solution

You must have Microsoft Entra ID P1 or P2 to configure trust settings.

Symptom - Recently deleted user in the target tenant is not restored

After soft deleting a synchronized user in the target tenant, the user isn't restored during the next synchronization cycle. If you try to soft delete a user with on-demand provisioning and then restore the user, it can result in duplicate users.

Cause

Restoring a previously soft-deleted user in the target tenant isn't supported.

Solution

Manually restore the soft-deleted user in the target tenant. For more information, see Restore or remove a recently deleted user using Microsoft Entra ID.

Symptom - Users are skipped because SMS sign-in is enabled on the user

Users are skipped from synchronization. The scoping step includes the following filter with status false: "Filter external users.alternativeSecurityIds EQUALS 'None'"

Cause

If SMS sign-in is enabled for a user, they will be skipped by the provisioning service.

Solution

Disable SMS Sign-in for the users. The script below shows how you can disable SMS Sign-in using PowerShell.

##### Disable SMS Sign-in options for the users

#### Import module
Install-Module Microsoft.Graph.Users.Actions
Install-Module Microsoft.Graph.Identity.SignIns
Import-Module Microsoft.Graph.Users.Actions

Connect-MgGraph -Scopes "User.Read.All", "Group.ReadWrite.All", "UserAuthenticationMethod.Read.All","UserAuthenticationMethod.ReadWrite","UserAuthenticationMethod.ReadWrite.All"

##### The value for phoneAuthenticationMethodId is 3179e48a-750b-4051-897c-87b9720928f7

$phoneAuthenticationMethodId = "3179e48a-750b-4051-897c-87b9720928f7"

#### Get the User Details

$userId = "objectid_of_the_user_in_Entra_ID"

#### validate the value for SmsSignInState

$smssignin = Get-MgUserAuthenticationPhoneMethod -UserId $userId


    if($smssignin.SmsSignInState -eq "ready"){   
      #### Disable Sms Sign-In for the user is set to ready

      Disable-MgUserAuthenticationPhoneMethodSmsSignIn -UserId $userId -PhoneAuthenticationMethodId $phoneAuthenticationMethodId
      Write-Host "SMS sign-in disabled for the user" -ForegroundColor Green
    }
    else{
    Write-Host "SMS sign-in status not set or found for the user " -ForegroundColor Yellow
    }



##### End the script

Symptom - Users fail to provision with error AzureActiveDirectoryForbidden

Users in scope fail to provision. The provisioning logs details include the following error message:

Guest invitations not allowed for your company. Contact your company administrator for more details.

Cause

This error indicates the Guest invite settings in the target tenant are configured with the most restrictive setting: "No one in the organization can invite guest users including admins (most restrictive)".

Solution

Change the Guest invite settings in the target tenant to a less restrictive setting. For more information, see Configure external collaboration settings.

Symptom - User Principal Name does not update for existing B2B users in pending acceptance state

When a user is first invited through manual B2B invitation, the invitation is sent to the source user mail address. As a result the guest user in the target tenant is created with a user principal name (UPN) prefix using the source mail value property. There are environments where the source user object properties, UPN and Mail, have different values, for example Mail == user.mail@domain.com and UPN == user.upn@otherdomain.com. In this case the guest user in the target tenant will be created with the UPN as user.mail_domain.com#EXT#@contoso.onmicrosoft.com.

The issue raises when then the source object is put in scope for cross-tenant sync and the expectation is that besides other properties, the UPN prefix of the target guest user would be updated to match the UPN of the source user (using the example above the value would be: user.upn_otherdomain.com#EXT#@contoso.onmicrosoft.com). However, that's not happening during incremental sync cycles, and the change is ignored.

Cause

This issue happens when the B2B user which was manually invited into the target tenant didn't accept or redeem the invitation, so its state is in pending acceptance. When a user is invited through an email, an object is created with a set of attributes that are populated from the mail, one of them is the UPN, which is pointing to the mail value of the source user. If later you decide to add the user to the scope for cross-tenant sync, the system will try to join the source user with a B2B user in target tenant based on the alternativeSecurityIdentifier attribute, but the previously created user does not have an alternativeSecurityIdentifier property populated because the invitation was not redeemed. So, the system won't consider this to be a new user object and will not update the UPN value. The user principal name is not updated in the following scenarios:

  1. The UPN and mail are different for a user when was manually invited.
  2. The user was invited prior to enabling cross-tenant sync.
  3. The user never accepted the invitation, so they are in "pending acceptance state".
  4. The user is brought into scope for cross-tenant sync.

Solution

To resolve the issue, run on-demand provisioning for the affected users to update the UPN. You can also restart provisioning to update the UPN for all affected users. Please note that this triggers an initial cycle, which can take a long time for large tenants. To get a list of manual invited users in pending acceptance state, you can use a script, please see the below sample.

Connect-MgGraph -Scopes "User.Read.All"
$users = Get-MgUser -Filter "userType eq 'Guest' and externalUserState eq 'PendingAcceptance'" 
$users | Select-Object DisplayName, UserPrincipalName | Export-Csv "C:\Temp\GuestUsersPending.csv"

Then you can use provisionOnDemand with PowerShell for each user. The rate limit for this API is 5 requests per 10 seconds. For more information, see Known limitations for on-demand provisioning.

Next steps