Authentication with Microsoft Entra ID for External users
Each person who accesses your application needs permission.
- You can invite an external user in Micorosft Entra ID:
https://portal.azure.com/#view/Microsoft_AAD_UsersAndTenants/UserManagementMenuBlade/~/AllUsers
- You can set up a Dynamic Group in MS Entra ID to provide access to these users:
https://portal.azure.com/#view/Microsoft_AAD_IAM/GroupsManagementMenuBlade/~/AllGroups
One way to dynamically add external users to the group is using a dynamic rule, such as this:
(user.userPrincipalName -contains "#EXT#")
- Give the group access to your application
- Find your application name in the App registrations page
https://portal.azure.com/#view/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/~/RegisteredApps
Look in All Applications, using your ClientID
Then go to Enterprise Applications
https://portal.azure.com/#view/Microsoft_AAD_IAM/StartboardApplicationsMenuBlade/~/AppAppsPreview/menuId~/null
First, remove the ‘Enterprise Applications’ filter And add the group:
Click ‘None Selected’ to begin
- Provide cross-domain collaboration rights to the user’s domain
https://portal.azure.com/#view/Microsoft_AAD_IAM/CompanyRelationshipsMenuBlade/~/Settings
Add the domain name, or select one of the other radio buttons