Troubleshoot common issues with Microsoft Entra B2B collaboration
Applies to: Workforce tenants External tenants (learn more)
Here are some remedies for common problems with Microsoft Entra B2B collaboration.
Guest sign-in fails with error code AADSTS50020
When a guest user from an identity provider (IdP) can't sign in to a resource tenant in Microsoft Entra ID and receives an error code AADSTS50020, there are several possible causes. See the troubleshooting article for error AADSTS50020.
Users can no longer read email encrypted with Microsoft Rights Management Service (OME))
As you configure cross-tenant access settings, if you block access to all apps by default, users will be unable to read emails encrypted with Microsoft Rights Management Service (also known as OME). To avoid this issue, we recommend configuring your outbound settings to allow your users to access this app ID: 00000012-0000-0000-c000-000000000000. If this is the only application you allow, access to all other apps will be blocked by default.
I’ve added an external user but don't see them in my Global Address Book or in the people picker
In cases where external users aren't populated in the list, the object might take a few minutes to replicate.
A B2B guest user isn't showing up in SharePoint Online/OneDrive people picker
The ability to search for existing guest users in the SharePoint Online (SPO) people picker is OFF by default to match legacy behavior.
You can enable this feature by using the setting 'ShowPeoplePickerSuggestionsForGuestUsers' at the tenant and site collection level. You can set the feature using the Set-SPOTenant and Set-SPOSite cmdlets, which allow members to search all existing guest users in the directory. Changes in the tenant scope don't affect already provisioned SPO sites.
My guest invite settings and domain restrictions aren't being respected by SharePoint Online/OneDrive
By default, SharePoint Online and OneDrive have their own set of external user options and don't use the settings from Microsoft Entra ID. You need to enable SharePoint and OneDrive integration with Microsoft Entra B2B to ensure the options are consistent among those applications.
Invitations have been disabled for directory
If you're notified that you don't have permissions to invite users, verify that your user account is authorized to invite external users under Microsoft Entra ID > Users > User settings > External users > Manage external collaboration settings:
If you've recently modified these settings or assigned the Guest Inviter role to a user, there might be a 15-60 minute delay before the changes take effect.
The user that I invited is receiving an error during the redemption process
Common errors include:
Invitee’s Admin has disallowed EmailVerified Users from being created in their tenant
When inviting users whose organization is using Microsoft Entra ID, but where the specific user’s account doesn't exist (for example, the user doesn't exist in Microsoft Entra contoso.com). The administrator of contoso.com may have a policy in place preventing users from being created. The user must check with their admin to determine if external users are allowed. The external user’s admin may need to allow Email Verified users in their domain (see this article on allowing Email Verified Users).
External user doesn't exist already in a federated domain
If you're using federation authentication and the user doesn't already exist in Microsoft Entra ID, the user can't be invited.
To resolve this issue, the external user’s admin must synchronize the user’s account to Microsoft Entra ID.
External user has a proxyAddress that conflicts with a proxyAddress of an existing local user
When we check whether a user is able to be invited to your tenant, one of the things we check for is for a collision in the proxyAddress. This includes any proxyAddresses for the user in their home tenant and any proxyAddress for local users in your tenant. For external users, we'll add the email to the proxyAddress of the existing B2B user. For local users, you can ask them to sign in using the account they already have.
I can't invite an email address because of a conflict in proxyAddresses
This happens when another object in the directory has the same invited email address as one of its proxyAddresses. The other conflicting object could be a User, Group, or Microsoft 365 Contact.
On a guest user object, the proxyAddresses or email attribute isn't populated
When you add or invite a guest with an email that matches an existing Contact object in the directory, the proxyAddresses property on the guest user object isn't populated. Also, when synchronizing contact objects from on-premises AD, if a guest user has a matching proxyAddresses property, the conflicting proxyAddresses property is removed from the existing guest user.
The invitation redemption process has been updated so that this scenario no longer causes issues with just-in-time redemption or email one-time passcode authentication. Previously, External ID searched only the proxyAddresses property, so redemption with a direct link or one-time passcode failed when it couldn’t find a match. Now, External ID searches the proxyAddresses and invited email properties.
If you want to identify conflicting user objects in your directory, use these PowerShell steps:
- Open the Microsoft Graph PowerShell module and run
Connect-MgGraph -Environment China -ClientId 'YOUR_CLIENT_ID' -TenantId 'YOUR_TENANT_ID'
. - Sign in as at least a Directory Reader to the Microsoft Entra tenant for which you want to check for duplicate contact objects.
- Run the PowerShell command
Get-MgContact -All | ? {$_.Mail -match 'user@domain.com'}
.
How does ‘#’, which isn't normally a valid character, sync with Microsoft Entra ID?
“#” is a reserved character in UPNs for Microsoft Entra B2B collaboration or external users, because the invited account user@contoso.com becomes user_contoso.com#EXT#@fabrikam.partner.onmschina.cn. Therefore, # in UPNs coming from on-premises aren't allowed to sign in to the Microsoft Entra admin center.
I receive an error when adding external users to a synchronized group
External users can be added only to “assigned” or “Security” groups and not to groups that are mastered on-premises.
My external user didn't receive an email to redeem
The invitee should check with their ISP or spam filter to ensure that the following address is allowed: invites@oe.21vianet.com
Note
- For the Azure service operated by 21Vianet in China, the sender address is Invites@oe.21vianet.com.
I notice that the custom message doesn't get included with invitation messages at times
To comply with privacy laws, our APIs don't include custom messages in the email invitation when:
- The inviter doesn’t have an email address in the inviting tenant
- When an appservice principal sends the invitation
If this scenario is important to you, you can suppress our API invitation email, and send it through the email mechanism of your choice. Consult your organization’s legal counsel to make sure any email you send this way also complies with privacy laws.
You receive an “AADSTS65005” error when you try to sign in to an Azure resource
A user who has a guest account can't sign in, and is receiving the following error message:
AADSTS65005: Using application 'AppName' is currently not supported for your organization contoso.com because it is in an unmanaged state. An administrator needs to claim ownership of the company by DNS validation of contoso.com before the application AppName can be provisioned.
The user has an Azure user account and is a viral tenant who has been abandoned or unmanaged. Additionally, there are no administrators in the tenant.
To resolve this problem, you must take over the abandoned tenant. You must also access the internet-facing DNS for the domain suffix in question in order to provide direct evidence that you are in control of the namespace. After the tenant is returned to a managed state, discuss with the customer whether leaving the users and verified domain name is the best option for their organization.
A guest user with a just-in-time or "viral" tenant is unable to reset their password
If the identity tenant is a just-in-time (JIT) or viral tenant (meaning it's a separate, unmanaged Azure tenant), only the guest user can reset their password. Sometimes an organization will take over management of viral tenants that are created when employees use their work email addresses to sign up for services. After the organization takes over a viral tenant, only an administrator in that organization can reset the user's password or enable SSPR. If necessary, as the inviting organization, you can remove the guest user account from your directory and resend an invitation.
A guest user is unable to use the Azure AD PowerShell V1 module
Note
Azure AD Powershell is planned for deprecation on March 30, 2024. To learn more, read the deprecation update.
We recommend migrating to Microsoft Graph PowerShell to interact with Microsoft Entra ID (formerly Azure AD). Microsoft Graph PowerShell allows access to all Microsoft Graph APIs and is available on PowerShell 7. For answers to common migration queries, see the Migration FAQ.
As of November 18, 2019, guest users in your directory (defined as user accounts where the userType property equals Guest) are blocked from using the Azure AD PowerShell V1 module. Going forward, a user will need to either be a member user (where userType equals Member) or use the Azure AD PowerShell V2 module.
Invitation is blocked due to cross-tenant access policies
When you try to invite a B2B collaboration user, you might see this error message: "This invitation is blocked by cross-tenant access settings. Admins in both your organization and the invited user's organization must configure cross-tenant access settings to allow the invitation." This error message will appear, if B2B collaboration is supported, but is blocked by cross-tenant access settings. Check your cross-tenant access settings, and make sure that your settings allow B2B collaboration with the user. When you try to collaborate with another Microsoft Entra organization in a separate Azure cloud, you can use Microsoft cloud settings to enable Microsoft Entra B2B collaboration.
Invitation is blocked due to disabled Microsoft B2B Cross Cloud Worker application
Rarely, you might see this message: “This action can't be completed because the Microsoft B2B Cross Cloud Worker application has been disabled in the invited user’s tenant. Ask the invited user’s admin to re-enable it, then try again.” This error means that the Microsoft B2B Cross Cloud Worker application has been disabled in the B2B collaboration user’s home tenant. This app is typically enabled, but it might have been disabled by an admin in the user’s home tenant, either through PowerShell or the Microsoft Entra admin center (see Disable how a user signs in). An admin in the user’s home tenant can re-enable the app through PowerShell or the Microsoft Entra admin center. In the admin center, search for “Microsoft B2B Cross Cloud Worker” to find the app, select it, and then choose to re-enable it.
I receive the error that Microsoft Entra ID can't find the aad-extensions-app
in my tenant
When you're using self-service sign-up features, like custom user attributes or user flows, an app called aad-extensions-app. Do not modify. Used by AAD for storing user data.
is automatically created. It's used by Microsoft Entra External ID to store information about users who sign up and custom attributes collected.
If you accidentally deleted the aad-extensions-app
, you have 30 days to recover it. You can restore the app using the Microsoft Graph PowerShell module.
- Launch the Microsoft Graph PowerShell module and run
Connect-MgGraph
. - Sign in as at least an Application Administrator to the Microsoft Entra tenant for which you want to recover the deleted app.
- Run the PowerShell command
Get-MgDirectoryDeletedItem -DirectoryObjectId {id}
. As an example:
Get-MgDirectoryDeletedItem -DirectoryObjectId '00aa00aa-bb11-cc22-dd33-44ee44ee44ee'
Id DeletedDateTime
-- ---------------
00aa00aa-bb11-cc22-dd33-44ee44ee44ee 8/30/2021 7:37:37 AM
- Run the PowerShell command
Restore-MgDirectoryDeletedItem -DirectoryObjectId {id}
. Replace the{id}
portion of the command with theDirectoryObjectId
from the previous step.
You should now see the restored app in the Microsoft Entra admin center.
External access blocked by policy error on the login screen
When you try to log in to your tenant, you might see this error message: "Your network administrator has restricted what organizations can be accessed. Contact your IT department to unblock access." This error is related to tenant restriction settings. To resolve this issue, ask your IT team to follow the instructions in this article.
Invitation is blocked due missing cross-tenant access settings
You might see this message: "This invitation is blocked by cross-tenant access settings in your organization. Your administrator must configure cross-tenant access settings to allow this invitation." In this case, ask your administrator to check the cross-tenant access settings.