Cross Tenancy Synchronisation Setup

Prerequisites

  • Any standalone or bundled licence that contains Entra ID Plan 1

  • Tenant ID for the Source Tenant

  • Tenant ID for the Destination Tenant

Steps - Target Tenant

Log into the Azure Portal for the Target Tenant

Go to Azure Active Directory > External Identities

Click on Cross-tenant access settings, then select Organisational settings when the page loads

Click Add organisation and then enter the Tenant ID of the Source Tenant

Once added, click on "Inherited from Default" under the Inbound access column of the newly created Organisation

Click on Cross-tenant sync > select Allow users sync into this tenant > scroll down and select Save

This should then give you a pop-up to accept the changes and enable Automatic Invitation Redemption.

Click on Trust settings to confirm that this has been enabled. It should be ticked and greyed out like the below screenshot:

Steps - Source Tenant

Log into the Azure Portal for the Source Tenant

Go to Azure Active Directory > Groups

Create a new Group that will contain the users to be synchronised to the Target Tenant. For Example SG-Entra-CTS-<Name_of_Tenant>. The membership of this group should only be users, as Enterprise Applications do not support nested groups when evaluating Application access.

Go to Azure Active Directory > External Identities

Click on Cross-tenant access settings, then select Organisational settings when the page loads !

Click Add organisation and then enter the Tenant ID of the Target Tenant

Once added, click on "Inherited from Default" under the Outbound access column of the newly created Organisation

Click on Trust settings and select the checkbox next to Automatically redeem invitations with the tenant <TenantName>

Go back to Azure Active Directory and then select Cross-tenant synchronisation

Select Configurations

At the top of the page, select New Configuration

Provide a name for the configuration and select Create

Click on the configuration when it appears in the list - you may need to refresh the page

Click Get Started

Change the provisioning mode to Automatic

Specify the Tenant ID of the Target Tenant > select Test Connection

If successful, click Save

Refresh the page and then you will see that you can configure Scope under Settings

Generally leaving this as Sync only assigned users and groups is acceptable.

Click on Users and groups and then add the group you created earlier

Click on Provision on demand and search for a user who is in the group you just added to the configuration > click Provision

If all of the setup is working, the provision should work

Click on Provisioning and then set Provisioning Status to On > save the Config

Go to back to Azure Active Directory > select Users. You should then see the synchronised account. It will be in the format of what we're used to seeing as a Guest user, but it will have the User type of "Member".

Last updated