Lab 05: B2B Guest Users - Portal Solution
Task 1: Review External Collaboration Settings
Step-by-Step Portal Walkthrough
Navigate to External Identities:
- Go to Microsoft Entra admin center
- Expand Identity in the left menu
- Click External Identities
- Click External collaboration settings
Review Guest Invite Settings:
| Setting | Options | Description |
|---|---|---|
| Guest invite restrictions | No one / Admins only / Members + specific admin roles / Anyone | Controls who can invite guests |
Current options:
- No one in the organization can invite guest users - Most restrictive
- Only users assigned to specific admin roles - Admin-controlled
- Member users and users assigned to specific admin roles - Balanced
- Anyone in the organization can invite guests - Least restrictive
Review Guest User Access Restrictions:
| Setting | What Guests Can See |
|---|---|
| Most inclusive | Same as members (see all users, groups, etc.) |
| Limited | Only their own profile + members of groups they belong to |
| Most restrictive | Only their own profile |
Document current settings by taking a screenshot or noting:
- Who can invite guests
- What guests can see in the directory
- Any collaboration restrictions
Task 2: Configure Collaboration Restrictions
Step-by-Step Portal Walkthrough
- In External collaboration settings
- Scroll to Collaboration restrictions
- Select "Allow invitations only to the specified domains"
- Click Target domains
- Add your partner domains:
partner.com contoso.com - Click Save
Screenshot what you see:
- Radio button selected for domain restrictions
- List of allowed domains
Lab Note: To continue with tasks below, you may want to temporarily set this back to "Allow invitations to be sent to any domain"
Task 3: Invite a Guest User
Step-by-Step Portal Walkthrough
Navigate to Users:
- Go to Azure Portal
- Search for "Microsoft Entra ID"
- Click Users in the left menu
- Click + New user dropdown
- Select Invite external user
Fill in the invitation form:
| Field | Value |
|---|---|
| your-external-email@gmail.com (or any external email) | |
| Display name | External Partner User |
| Personal message | "Welcome! You're being invited to collaborate on Project Alpha" |
Additional Settings (expand):
- First name: External
- Last name: Partner
- Job title: Consultant
- Company name: Partner Corp
- Click Invite
Verify the invitation:
- Go back to Users > All users
- Search for the guest user
- Confirm you see:
- User type: Guest
- Source: Invited user
Task 4: Examine Guest User Properties
Step-by-Step Portal Walkthrough
- Click on the guest user to open their profile
- Review the Properties tab
Key differences from member users:
| Property | Guest User Example |
|---|---|
| User principal name | external_gmail.com#EXT#@yourtenant.onmicrosoft.com |
| external@gmail.com | |
| User type | Guest |
| Source | External Microsoft Entra ID or Microsoft account |
| Creation type | Invitation |
Click Assigned roles tab
- Should be empty (no admin roles)
Click Groups tab
- Should be empty (not added to any groups yet)
Click Sign-in logs tab (if available)
- May show "No sign-in activity" since they haven't accepted yet
Task 5: Accept the Guest Invitation
Step-by-Step Walkthrough (as the Guest)
Check the invitation email:
- Log into the email account you invited
- Find email from "Microsoft Invitations" or "Microsoft on behalf of [Your Company]"
- Subject: "You've been added as a guest to [Tenant Name]"
Accept the invitation:
- Click Accept invitation button in the email
- Sign in with your external account (or create Microsoft account if needed)
- Review the permissions being requested
- Click Accept on the consent screen
Verify access as the guest:
- Go to portal.azure.com
- Click your profile icon (top right)
- Click Switch directory
- You should see the inviting tenant listed
- Select it to access resources
Task 6: Grant Guest User Resource Access
Step-by-Step Portal Walkthrough
Create a resource group:
- Go to Azure Portal
- Search for "Resource groups"
- Click + Create
- Fill in:
- Subscription: Your subscription
- Resource group:
rg-guest-collaboration - Region: East US
- Click Review + create > Create
Add role assignment:
- Open
rg-guest-collaboration - Click Access control (IAM) in the left menu
- Click + Add > Add role assignment
Role tab:
- Search for Reader
- Select Reader
- Click Next
Members tab:
- Keep User, group, or service principal selected
- Click + Select members
- Search for your guest user
- Select them (you'll see their external email)
- Click Select
- Click Next
Review + assign:
- Review the assignment
- Click Review + assign
Verify:
- Go to IAM > Role assignments tab
- Guest user should appear with Reader role
Task 7: Add Guest to a Security Group
Step-by-Step Portal Walkthrough
Create the security group:
- Go to Microsoft Entra ID > Groups
- Click + New group
- Fill in:
- Group type: Security
- Group name:
sg-external-partners - Group description: "External partner access group"
- Membership type: Assigned
- Click No members selected
- Search for and select your guest user
- Click Select
- Click Create
Create a Storage Account (for testing):
- Search for Storage accounts
- Click + Create
- Fill in:
- Resource group:
rg-guest-collaboration - Storage account name:
stguestcollab+ random numbers - Region: East US
- Resource group:
- Click Review + create > Create
Assign group role on Storage Account:
- Open the new Storage Account
- Click Access control (IAM)
- Click + Add > Add role assignment
- Select Storage Blob Data Contributor
- Click Next
- Click + Select members
- Search for
sg-external-partners(the GROUP, not the user) - Select the group
- Click Select > Next > Review + assign
Verify inherited access:
- Guest user is member of the group
- Group has role on Storage Account
- Therefore, guest inherits access through group membership
Task 8: Conditional Access for Guests
Step-by-Step Portal Walkthrough (Requires P1 License)
- Go to Microsoft Entra ID > Security > Conditional Access
- Click + Create new policy
Configure the policy:
| Setting | Configuration |
|---|---|
| Name | CA-Guest-MFA-Required |
Assignments > Users:
- Under "Include", select Select users and groups
- Check All guest and external users
- Click Done
Assignments > Target resources:
- Under "Include", select All cloud apps
Grant:
- Click Grant
- Select Grant access
- Check Require multifactor authentication
- Click Select
Enable policy:
- Set Enable policy to Report-only
- Click Create
Verify:
- Policy shows in the policy list
- Status shows "Report-only"
- When guest signs in, check Sign-in logs for "Report-only: Not applied"
Task 9: Review Guest User Activity
Step-by-Step Portal Walkthrough
Access Sign-in logs:
- Go to Microsoft Entra ID > Sign-in logs
- Click Add filters
- Select User type
- Click Apply
- Select Guest
- Click Apply
Review guest sign-ins: For each sign-in entry, you can see:
- Date and time
- User (guest email)
- Application accessed
- Status (Success/Failure)
- Conditional Access policies applied
Check a specific sign-in:
- Click on a sign-in entry
- Review:
- Basic info tab: Status, IP, location
- Location tab: Where they signed in from
- Device info tab: Browser, OS
- Conditional Access tab: Which policies were evaluated
- Authentication Details tab: MFA method used (if any)
Task 10: Remove Guest User Access
Step-by-Step Portal Walkthrough
Remove from groups:
- Go to Microsoft Entra ID > Groups
- Open
sg-external-partners - Click Members
- Select the guest user
- Click Remove
- Confirm removal
Remove direct role assignments:
- Go to
rg-guest-collaborationresource group - Click Access control (IAM)
- Click Role assignments tab
- Find the guest user's Reader assignment
- Check the box next to it
- Click Remove
- Confirm removal
Delete the guest user:
- Go to Microsoft Entra ID > Users
- Search for the guest user
- Click on their name
- Click Delete in the top menu
- Confirm deletion
Verify cleanup:
- User no longer appears in Users list
- No orphaned role assignments remain
- Group membership is cleared
Cleanup Summary
| Resource | How to Delete |
|---|---|
| Resource Group | Resource groups > rg-guest-collaboration > Delete |
| Security Group | Entra ID > Groups > sg-external-partners > Delete |
| CA Policy | Security > Conditional Access > Delete policy |
| Guest User | Already deleted in Task 10 |
Delete resource group (removes Storage Account too):
- Go to Resource groups
- Click
rg-guest-collaboration - Click Delete resource group
- Type the name to confirm
- Click Delete