🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-300 Domain 1
Domain 1 — Module 6 of 8 75%
6 of 27 overall

SC-300 Study Guide

Domain 1: Implement and Manage User Identities

  • Your Entra Tenant: Branding, Settings & Domains
  • Entra Roles & Administrative Units
  • Managing Users & Groups
  • Device Registration & Licensing
  • External Identities: Guest Access & B2B
  • Cross-Tenant Access & Synchronisation
  • Hybrid Identity: Connect Sync vs Cloud Sync
  • Hybrid Authentication: PHS, PTA & Seamless SSO

Domain 2: Implement Authentication and Access Management

  • Authentication Methods: Plan & Implement
  • Passwordless & Windows Hello for Business
  • MFA, SSPR & Password Protection
  • Conditional Access: Plan & Build Policies
  • Conditional Access: Advanced Controls & Troubleshooting
  • Entra ID Protection: Risk-Based Security
  • Global Secure Access: Zero Trust Networking

Domain 3: Plan and Implement Workload Identities

  • Workload Identities: Managed Identities & Service Principals
  • Enterprise Apps: SSO, App Proxy & Integration
  • Enterprise Apps: Users, Consent & Collections
  • App Registrations: Build & Secure
  • Defender for Cloud Apps: Discover & Control
  • Defender for Cloud Apps: Policies & OAuth Governance

Domain 4: Plan and Automate Identity Governance

  • Entitlement Management: Catalogs & Access Packages Free
  • Access Requests, Terms of Use & External Lifecycle Free
  • Access Reviews: Plan, Create & Monitor Free
  • PIM: Protect Your Privileged Roles Free
  • PIM: Azure Resources, Groups & Audit Free
  • Identity Monitoring: Logs, KQL & Secure Score Free

SC-300 Study Guide

Domain 1: Implement and Manage User Identities

  • Your Entra Tenant: Branding, Settings & Domains
  • Entra Roles & Administrative Units
  • Managing Users & Groups
  • Device Registration & Licensing
  • External Identities: Guest Access & B2B
  • Cross-Tenant Access & Synchronisation
  • Hybrid Identity: Connect Sync vs Cloud Sync
  • Hybrid Authentication: PHS, PTA & Seamless SSO

Domain 2: Implement Authentication and Access Management

  • Authentication Methods: Plan & Implement
  • Passwordless & Windows Hello for Business
  • MFA, SSPR & Password Protection
  • Conditional Access: Plan & Build Policies
  • Conditional Access: Advanced Controls & Troubleshooting
  • Entra ID Protection: Risk-Based Security
  • Global Secure Access: Zero Trust Networking

Domain 3: Plan and Implement Workload Identities

  • Workload Identities: Managed Identities & Service Principals
  • Enterprise Apps: SSO, App Proxy & Integration
  • Enterprise Apps: Users, Consent & Collections
  • App Registrations: Build & Secure
  • Defender for Cloud Apps: Discover & Control
  • Defender for Cloud Apps: Policies & OAuth Governance

Domain 4: Plan and Automate Identity Governance

  • Entitlement Management: Catalogs & Access Packages Free
  • Access Requests, Terms of Use & External Lifecycle Free
  • Access Reviews: Plan, Create & Monitor Free
  • PIM: Protect Your Privileged Roles Free
  • PIM: Azure Resources, Groups & Audit Free
  • Identity Monitoring: Logs, KQL & Secure Score Free
Domain 1: Implement and Manage User Identities Premium ⏱ ~13 min read

Cross-Tenant Access & Synchronisation

Control how your organisation trusts and collaborates with other Entra ID tenants — inbound, outbound, and cross-tenant sync for multi-org environments.

Why cross-tenant access matters

☕ Simple explanation

Cross-tenant access is like a diplomatic agreement between two countries.

Each country (tenant) decides: who from the other country can visit (inbound), and which of our citizens can travel there (outbound). They might also agree to trust each other’s passport stamps (trust settings) so visitors don’t need extra checks.

Without these agreements, every visitor gets the default treatment — full security screening every time. With agreements, trusted partners get a smoother experience.

Cross-tenant access settings control B2B collaboration and B2B direct connect at the tenant level. They define which external organisations can collaborate with yours (inbound) and which external organisations your users can collaborate with (outbound).

Settings are configured per external organisation (by tenant ID) and override defaults. You can also configure trust settings to honour MFA claims, compliant device claims, and Hybrid Entra Joined device claims from the external tenant — reducing friction for trusted partners.

Cross-tenant access settings

Don’t confuse these two — the exam tests the boundary:

FeatureExternal Collaboration SettingsCross-Tenant Access Settings
PurposeControl guest invitation policiesControl trust and B2B flow with specific tenants
ScopeTenant-wide defaults for all guestsPer-organisation policies (by tenant ID)
ControlsWho can invite, guest permissions, domain allow/denyInbound/outbound B2B collab, B2B direct connect, trust settings (MFA, device)
Where configuredExternal Identities → External collaboration settingsExternal Identities → Cross-tenant access settings
Key question it answersCan our users invite guests at all?How much do we trust Contoso's tenant specifically?

Found at: Entra admin center → External Identities → Cross-tenant access settings

Default settings vs organisational settings

LevelApplies ToExample
Default settingsALL external tenants (unless overridden)“By default, block B2B collaboration from all tenants”
Organisational settingsA SPECIFIC external tenant (overrides defaults)“Allow B2B collaboration with Contoso’s tenant”

Inbound vs outbound

DirectionWho It ControlsExample
InboundExternal users accessing YOUR resources”Contoso users can access our SharePoint”
OutboundYOUR users accessing external resources”Our users can access Contoso’s Teams channels”

For each direction, you can control:

  • B2B collaboration — guest user access (traditional invitations)
  • B2B direct connect — seamless access without creating guest accounts (used for Teams shared channels)

Trust settings

Trust settings let you honour security claims from external tenants:

Trust SettingWhat It MeansImpact
Trust MFAAccept MFA completion from the external tenantGuest doesn’t re-do MFA in your tenant
Trust compliant devicesAccept Intune compliance from external tenantGuest’s compliant device satisfies your CA policy
Trust Hybrid Entra JoinedAccept hybrid join status from external tenantGuest’s domain-joined device is trusted
ℹ️ Scenario: Anika configures cross-tenant trust for a merger

Sentinel Partners is helping two companies (Alpha Corp and Beta Ltd) through a merger. Both have Entra tenants and need tight collaboration.

Anika configures cross-tenant access:

  • Alpha → Beta (inbound): Allow all Alpha users, trust their MFA and compliant devices
  • Beta → Alpha (inbound): Allow all Beta users, trust their MFA and compliant devices
  • B2B direct connect: Enabled for Teams shared channels between both tenants
  • Default settings: Remain restrictive (block collaboration with all other tenants)

Result: Alpha and Beta employees collaborate seamlessly in Teams shared channels without re-doing MFA, while all other external organisations are blocked.

💡 Exam tip: B2B collaboration vs B2B direct connect

B2B collaboration: Creates a guest user object in your tenant. The external user appears in your directory. Traditional invitation-based.

B2B direct connect: No guest user object created. The external user accesses resources directly through their home tenant identity. Currently used primarily for Teams shared channels.

The exam tests this distinction. B2B direct connect is newer and lighter — no directory footprint in your tenant.

Cross-tenant synchronisation

Cross-tenant synchronisation automatically creates and manages B2B guest accounts in a target tenant based on users in a source tenant. It’s different from inviting guests manually — it’s automated, ongoing, and keeps accounts in sync.

When to use it:

  • Multi-tenant organisations (parent company + subsidiaries)
  • Mergers and acquisitions (before tenant consolidation)
  • Organisations with separate tenants for different regions or business units

How it works:

  1. Source tenant has the users you want to sync
  2. Target tenant receives guest accounts automatically
  3. Scoping filters define WHICH users sync (by group, department, etc.)
  4. Attribute mapping controls WHAT properties sync (name, department, job title)
  5. Sync runs on a schedule — creates, updates, and optionally deprovisions users
FeatureCross-Tenant SyncManual Guest Invitations
AutomationAutomatic, ongoingManual, one-time
ScaleThousands of usersIndividual or bulk CSV
LifecycleCreates, updates, and deprovisionsCreates only — manual cleanup
Attribute syncKeeps properties in sync automaticallyStatic at invitation time
Setup complexityHigher (requires configuration in both tenants)Lower (just send invitations)
Best forMulti-tenant organisationsAd-hoc partner collaboration
ℹ️ Scenario: Priya syncs users across Meridian's tenants

After acquiring a smaller clinic chain, Meridian Health has two tenants: MeridianHealth.com and CityClinic.com. Staff need to access resources in both.

Priya configures cross-tenant synchronisation:

  • Source: CityClinic.com (500 users)
  • Target: MeridianHealth.com
  • Scope: All CityClinic users in the “Clinical Staff” group
  • Attributes synced: Display name, department, job title, manager
  • Deprovisioning: When a user leaves CityClinic, their guest account in MeridianHealth is automatically disabled

This replaces the manual process of inviting each CityClinic employee — and keeps accounts clean when people leave.

Configuration steps (high-level)

  1. Both tenants: Configure cross-tenant access settings to allow sync
  2. Source tenant: Create a cross-tenant sync configuration (which users to sync, attribute mappings)
  3. Target tenant: The inbound access policy must allow the sync
  4. Test: Run an on-demand sync, verify guest accounts are created correctly
  5. Enable schedule: Turn on the automatic sync schedule

🎬 Video walkthrough

🎬 Video coming soon

Cross-Tenant Access & Sync — SC-300 Module 6

Cross-Tenant Access & Sync — SC-300 Module 6

~11 min

Flashcards

Question

What is the difference between B2B collaboration and B2B direct connect?

Click or press Enter to reveal answer

Answer

B2B collaboration creates a guest user object in your directory (traditional invitations). B2B direct connect provides access without creating a guest object — the user accesses resources through their home identity. Direct connect is currently used mainly for Teams shared channels.

Click to flip back

Question

What are the three trust settings in cross-tenant access?

Click or press Enter to reveal answer

Answer

1) Trust MFA — accept MFA completion from the external tenant. 2) Trust compliant devices — accept Intune compliance claims. 3) Trust Hybrid Entra Joined devices — accept hybrid join status. These reduce friction for trusted partner organisations.

Click to flip back

Question

What does cross-tenant synchronisation do?

Click or press Enter to reveal answer

Answer

Automatically creates, updates, and deprovisions B2B guest accounts in a target tenant based on users in a source tenant. Used for multi-tenant organisations (subsidiaries, mergers) where thousands of users need ongoing access across tenants.

Click to flip back

Knowledge Check

Knowledge Check

Two companies are merging and need their 3,000 employees to access resources in both Entra tenants. Guest accounts should be created and maintained automatically, including deprovisioning when employees leave. Which solution fits?

Knowledge Check

Anika configures cross-tenant trust settings so her client's tenant trusts MFA from a partner tenant. What is the practical effect?


Next up: Hybrid Identity: Connect Sync vs Cloud Sync — bridge your on-premises Active Directory with Entra ID using the right synchronisation tool.

← Previous

External Identities: Guest Access & B2B

Next →

Hybrid Identity: Connect Sync vs Cloud Sync

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.