Steps your IT team takes to enable B2B with GDOTS.
Microsoft Entra ID B2B (business-to-business) collaboration enables organizations to securely share applications and resources with users from other organizations. Cross-tenant access settings control how your organization collaborates with external Entra ID tenants.
To establish a B2B connection with GDOTS, you need to configure outbound cross-tenant access settings in your organization's Entra ID tenant. This allows your users to access resources in the GDOTS tenant when invited.
GDOTS operates in the Microsoft Azure Government (GCC High) environment. This has specific implications for cross-tenant configuration that are noted throughout this guide.
See About B2B Connections for a non-technical overview of the benefits.
| Requirement | Details |
|---|---|
| Entra ID License | Microsoft Entra ID P1 or P2 (included with Microsoft 365 E3/E5, EMS E3/E5) |
| Admin Role | Global Administrator or Security Administrator in your Entra ID tenant |
| GDOTS Tenant ID | Will be provided by your GDOTS point of contact |
| Azure Portal Access | Access to the Microsoft Entra admin center (entra.microsoft.com) or Azure portal |
GDOTS uses the Azure Government (GCC High) cloud environment. Cross-cloud B2B collaboration between commercial Azure and Azure Government is supported through cross-tenant access settings. Your commercial tenant can establish trust with the GDOTS GCC High tenant.
Review the B2B Requirements to understand what your organization needs before configuring cross-tenant access.
Navigate to https://entra.microsoft.com and sign in with an account that has Global Administrator or Security Administrator privileges.
This page shows your organization's default cross-tenant access policies and any organization-specific configurations.
The GDOTS organization will appear in your list of configured organizations.
Since GDOTS operates in GCC High, you must use the tenant ID (a GUID), not a domain name. Cross-cloud lookups by domain name are not supported.
Click on the GDOTS organization entry, then select the Outbound access tab. Configure the following:
B2B Collaboration > Users and groups:
B2B Collaboration > External applications:
Click Save when finished.
Select the Trust settings tab for the GDOTS organization. These settings determine whether the GDOTS tenant will trust MFA and device compliance claims from your organization's tenant.
| Setting | Recommendation | Effect |
|---|---|---|
| Trust multi-factor authentication from Microsoft Entra tenants | Enable | Your users' MFA completion is recognized by the GDOTS tenant, so they won't be prompted for MFA again when accessing GDOTS resources |
| Trust compliant devices | Optional | Allows GDOTS to recognize device compliance claims from your tenant |
| Trust Microsoft Entra hybrid joined devices | Optional | Allows GDOTS to recognize hybrid join claims from your tenant |
Click Save when finished.
After configuration is complete and propagation time has elapsed:
If your tenant's default cross-tenant access policy blocks outbound access, the organization-specific policy for GDOTS should override it. However, Conditional Access policies are evaluated separately and can still block access. Review your Conditional Access policies if users are denied.
Changes to cross-tenant access settings can take up to 2 hours to propagate. If the connection doesn't work immediately after configuration, wait and try again.
Since GDOTS is in Azure Government (GCC High) and your organization may be in commercial Azure:
If users are being asked to complete MFA for both their home tenant and GDOTS, verify that MFA trust is enabled in the Trust settings (Step 5 above). Also confirm that the MFA trust policy has had time to propagate.
Once you have configured your cross-tenant access settings and verified the connection:
@guest.gdots.com guest accountsFor details on what happens during conversion and what your users need to know, see the conversion section below.
When your organization completes the cross-tenant setup above and requests account conversion, GDOTS converts your internal guest accounts to B2B collaboration users using Microsoft Entra ID. This changes where you authenticate, but preserves all your existing access.
GDOTS uses the Entra ID "Convert to B2B user" feature to change the authentication source for your accounts. Instead of authenticating against the GDOTS tenant (with your @guest.gdots.com credentials), your accounts are linked to your home organization's tenant. GDOTS handles this process. No action is required from end users during conversion.
| What | Before (Guest Account) | After (B2B) |
|---|---|---|
| Sign-in credentials | @guest.gdots.com username + password | Your own organization's username + password |
| Password management | Managed separately by GDOTS | Managed by your organization (no extra password) |
| MFA | GDOTS-specific Authenticator setup | Your organization's existing MFA |
| SharePoint access | All granted sites | Same (all permissions preserved) |
| Bookmarks/saved links | Work | Still work (same URLs) |
All your SharePoint site access and permissions stay exactly the same. The only thing that changes is how you sign in.
@guest.gdots.com credentials will no longer work. This is expectedIf your browser auto-fills your old @guest.gdots.com credentials, clear the saved password or use a private/incognito window for your first sign-in after conversion.
Your browser may have cached your old sign-in. Try these steps:
Sign out of all Microsoft accounts in your browser:
This usually means the MFA trust setting hasn't propagated yet, or wasn't enabled during the B2B setup. Your organization's IT admin should verify that MFA trust is enabled in the cross-tenant access settings for GDOTS. See Step 5 of the configuration above.
Contact your GDOTS point of contact for assistance with tenant ID, test resources, or troubleshooting the B2B connection.