🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901 aws-saa-c03 aws-aif-c01
Guided MS-700 Domain 1
Domain 1 — Module 10 of 13 77%
10 of 27 overall

MS-700 Study Guide

Domain 1: Configure and manage a Teams environment

  • Network Planning & Readiness
  • Security Roles, Alerts & Defender
  • Retention & Sensitivity Labels
  • DLP & Conditional Access
  • Information Barriers & Insider Risk
  • Update Policies & Policy Packages
  • Group Creation, Naming & Expiration
  • Archive, Restore & Access Reviews
  • Guest Access & External Sharing
  • Shared Channels & Cross-Tenant Access
  • Teams Phone & Resource Accounts
  • Teams Rooms & Device Management
  • PowerShell & Graph Automation

Domain 2: Manage teams, channels, chats, and apps

  • Teams Rollout & Creation Free
  • Membership, Roles & Team Settings Free
  • Channel Types & Policies Free
  • App Management & Permissions Free
  • App Extensibility & Store Free

Domain 3: Manage meetings and calling

  • Meeting Types & Settings
  • Webinars & Town Halls
  • Phone Numbers & Conferencing
  • Voice Policies & Voicemail
  • Auto Attendants & Call Routing

Domain 4: Monitor, report on, and troubleshoot Teams

  • Voice & Meeting Quality
  • Usage, Alerts & Diagnostics Tools
  • Client Logs & Diagnostics
  • Copilot & Meeting Troubleshooting

MS-700 Study Guide

Domain 1: Configure and manage a Teams environment

  • Network Planning & Readiness
  • Security Roles, Alerts & Defender
  • Retention & Sensitivity Labels
  • DLP & Conditional Access
  • Information Barriers & Insider Risk
  • Update Policies & Policy Packages
  • Group Creation, Naming & Expiration
  • Archive, Restore & Access Reviews
  • Guest Access & External Sharing
  • Shared Channels & Cross-Tenant Access
  • Teams Phone & Resource Accounts
  • Teams Rooms & Device Management
  • PowerShell & Graph Automation

Domain 2: Manage teams, channels, chats, and apps

  • Teams Rollout & Creation Free
  • Membership, Roles & Team Settings Free
  • Channel Types & Policies Free
  • App Management & Permissions Free
  • App Extensibility & Store Free

Domain 3: Manage meetings and calling

  • Meeting Types & Settings
  • Webinars & Town Halls
  • Phone Numbers & Conferencing
  • Voice Policies & Voicemail
  • Auto Attendants & Call Routing

Domain 4: Monitor, report on, and troubleshoot Teams

  • Voice & Meeting Quality
  • Usage, Alerts & Diagnostics Tools
  • Client Logs & Diagnostics
  • Copilot & Meeting Troubleshooting
Domain 1: Configure and manage a Teams environment Premium ⏱ ~13 min read

Shared Channels & Cross-Tenant Access

Shared channels, B2B direct connect, and multi-tenant organisations let people collaborate across companies without guest accounts. Learn the trade-offs and how to configure each option.

Beyond guest access

☕ Simple explanation

Guest access is like giving someone a visitor badge to your building. It works, but they’re always marked as “visitor” and they have to log into YOUR systems.

Shared channels are more like having a meeting room between two buildings — both companies can walk in from their own side. External users stay in their own tenant, use their own identity, and see the shared channel right inside their own Teams client. No switching tenants, no guest accounts.

Multi-tenant organisations (MTO) go even further — they make two separate tenants behave almost like one. Users across tenants can search each other, see presence, and collaborate as if they were in the same company.

Shared channels use Entra B2B direct connect instead of traditional B2B guest collaboration. External users access shared channels directly from their home tenant — no guest account is created in the host tenant. This requires cross-tenant access settings to be configured in both tenants.

B2B direct connect is configured in Microsoft Entra ID → Cross-tenant access settings. Both the resource tenant (hosting the shared channel) and the home tenant (where the external user lives) must explicitly enable B2B direct connect for each other.

Multi-tenant organisations (MTO) are a new feature for enterprises with multiple Entra ID tenants (common after mergers or for companies with regional tenants). MTO enables cross-tenant people search, presence, and seamless collaboration.

Shared channels — how they work

Shared channels enable cross-tenant collaboration without guest accounts:

FeatureStandard ChannelPrivate ChannelShared Channel
MembershipAll team membersInvited team members onlyAnyone — including external users from other tenants
External usersNeed guest accountNeed guest accountNO guest account needed (B2B direct connect)
SharePoint siteTeam’s main SharePoint siteSeparate SharePoint siteSeparate SharePoint site
Where it appearsIn the host teamIn the host teamIn the host team AND in external users’ Teams client
IdentityHost tenant identityHost tenant identityHOME tenant identity (no tenant switching)

Shared channel limitations (exam-critical)

Shared channels have notable limitations compared to guest access:

  • Up to 1,000 shared channels per team (within total channel limit)
  • No bots, connectors, or message extensions in shared channels (tabs are supported except Stream, Planner, and Forms)
  • No @team mentions — only @channel and @user
  • No scheduled channel meetings — only ad-hoc meetings
  • Private channels can’t become shared — only standard team channels can be shared
  • Both tenants must configure B2B direct connect — it’s not unilateral
💡 Exam tip: Guest access vs. shared channels — when to use which

A common exam pattern asks you to choose between guest access and shared channels:

  • Use guest access when: external users need apps, bots, tabs, or full team membership. Guest access gives more features but requires a guest account.
  • Use shared channels when: you want seamless cross-tenant collaboration with no tenant switching, no guest accounts, and the collaboration fits within channel limitations. Best for focused project collaboration.
  • Use external access (federation) when: you only need 1:1 chat and calls with no file sharing or team content access.

Configuring B2B direct connect

Shared channels require B2B direct connect in both tenants. Configuration in Entra ID → External identities → Cross-tenant access settings.

Both tenants must configure

In the resource tenant (hosting the shared channel):

  1. Add the partner organisation (by tenant ID or domain)
  2. Inbound access → B2B direct connect → Allow users from the partner to access shared channels
  3. Configure which users/groups from the partner are allowed

In the home tenant (where external users live):

  1. Add the partner organisation
  2. Outbound access → B2B direct connect → Allow your users to access shared channels in the partner tenant
  3. Configure which of your users can participate

Both inbound AND outbound must be configured. If Pinnacle Corp allows inbound from Partner Corp, but Partner Corp doesn’t allow outbound to Pinnacle Corp, shared channel access fails.

Scenario: Tara configures shared channels for APAC partners

Pinnacle Corp (Melbourne) collaborates with two APAC partners on a joint project. Tara configures B2B direct connect:

Pinnacle Corp (resource tenant — hosts the shared channel):

  • Adds Partner-Tokyo (tenant ID) → inbound B2B direct connect → Allow all users
  • Adds Partner-Singapore (tenant ID) → inbound B2B direct connect → Allow “Project Team” group only

Partner-Tokyo (home tenant):

  • Adds Pinnacle Corp → outbound B2B direct connect → Allow all users

Partner-Singapore (home tenant):

  • Adds Pinnacle Corp → outbound B2B direct connect → Allow “Joint Venture” group only

Tara creates a shared channel “#apac-joint-project” in the existing “Infrastructure” team. She adds users from Tokyo and Singapore. Those users see the channel appear directly in their own Teams client — no tenant switching needed.

Multi-tenant organisations (MTO)

MTO is designed for enterprises with multiple Entra ID tenants — typically from mergers, acquisitions, or regional structures.

What MTO enables

CapabilityWithout MTOWith MTO
People searchUsers can’t find people in other tenantsCross-tenant people search works
PresenceExternal users show as “Unknown”Real-time presence visible across tenants
1:1 chatWorks via external access (federation)Seamless — feels like same org
Profile cardsLimited info for external usersFull profile info across tenants

MTO configuration

  1. Define the MTO in Entra ID → one tenant is the “owner” tenant
  2. Add member tenants via the owner tenant
  3. Member tenants accept the MTO invitation
  4. Cross-tenant sync automatically provisions users across tenants
  5. Shared email domain (optional) for a unified address book

Licensing: MTO requires Microsoft Entra ID P1 or higher in all participating tenants.

Scenario: Pinnacle Corp's post-acquisition MTO

Pinnacle Corp acquired a NZ company. Both have separate Entra ID tenants:

  • pinnacle.com.au (2,000 users)
  • acquired-nz.co.nz (500 users)

Instead of migrating all NZ users into the AU tenant (risky and disruptive), Tara configures an MTO:

  1. pinnacle.com.au is the owner tenant
  2. acquired-nz.co.nz is added as a member
  3. Cross-tenant sync provisions NZ users as external members in the AU tenant
  4. Users in both tenants can search each other, see presence, and chat seamlessly
  5. Shared channels work without additional B2B direct connect configuration (MTO handles it)

From the users’ perspective, it feels like one company. Behind the scenes, each tenant retains its own policies and administration.

🎬 Video walkthrough

🎬 Video coming soon

Shared Channels & Cross-Tenant Access — MS-700 Module 10

Shared Channels & Cross-Tenant Access — MS-700 Module 10

~11 min

Flashcards

Question

What's the key difference between guest access and shared channels for external users?

Click or press Enter to reveal answer

Answer

Guest access: external user gets a guest account in your Entra ID and must switch tenants. Shared channels: external user stays in their home tenant, no guest account — uses B2B direct connect.

Click to flip back

Question

What must both tenants configure for shared channels to work?

Click or press Enter to reveal answer

Answer

B2B direct connect in Entra ID cross-tenant access settings. The resource tenant configures INBOUND access, the home tenant configures OUTBOUND access. Both must be configured — it's not unilateral.

Click to flip back

Question

Name three limitations of shared channels.

Click or press Enter to reveal answer

Answer

1. No apps, bots, or tabs (limited support), 2. No scheduled channel meetings (ad-hoc only), 3. Max 10 shared channels per team and 50 external teams per shared channel. Also: no @team mentions, private channels can't be shared.

Click to flip back

Knowledge Check

Knowledge Check

Pinnacle Corp wants to collaborate with Partner-Tokyo on a shared channel. Tara configures inbound B2B direct connect in Pinnacle's Entra ID. Users from Tokyo still can't access the shared channel. What's missing?

Knowledge Check

Pinnacle Corp acquired a NZ company with its own Entra ID tenant. They want users to see each other's presence and search across tenants WITHOUT migrating user accounts. What should Tara configure?


Next up: Teams Phone & Resource Accounts — the big one: PSTN connectivity options (Calling Plans vs Direct Routing vs Operator Connect), licensing, and resource accounts.

← Previous

Guest Access & External Sharing

Next →

Teams Phone & Resource Accounts

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.