Edit

Share via


Microsoft Entra ID Protection for B2B Users

You can use your organizational credentials to sign in to another organization as a guest. This process is referred to business-to-business or B2B collaboration. Organizations can configure Conditional Access policies to block users from signing in if their credentials are considered at risk. Microsoft Entra ID Protection detects compromised credentials for Microsoft Entra users, including B2B users. If your credential is detected as compromised, it means that someone else might have your password and is using it illegitimately. To prevent further risk to your account, it's important to securely reset your password so that the bad actor can no longer use your compromised password.

If your account is at risk and you're blocked from signing in to another organization as a guest, you might be able to self-remediate your account using the steps in this article.

Unblock your account

If you're attempting to sign in to another organization as a guest and are blocked due to risk, you see the following block message: "Your account is blocked. We've detected suspicious activity on your account."

Screenshot of error message showing guest account blocked, contact your organization's administrator.

If your organization enables it, you can use self-service password reset to unblock your account and get your credentials back to a safe state.

  1. Go to the Password reset portal and initiate the password reset. If self-service password reset isn't enabled for your account and you can't proceed, reach out to your IT administrator with the following information.
  2. If self-service password reset is enabled for your account, you're prompted to verify your identity using security methods before changing your password. For assistance, see the Reset your work or school password article.
  3. Once you have successfully and securely reset your password, your user risk is remediated. You can now try again to sign in as a guest user.

If after resetting your password you're still blocked as a guest due to risk, reach out to your organization's IT administrator.

How to remediate a user's risk as an administrator

ID Protection automatically detects risky users for Microsoft Entra tenants. If you haven't checked the ID Protection reports before, there might be a large number of users with risk. Since resource tenants can apply user risk policies to guest users, your users can be blocked due to risk even if they were previously unaware of their risky state. If your user reports they're blocked as a guest user in another tenant due to risk, it's important to remediate the user to protect their account and enable collaboration.

Reset the user's password

From the Risky users report in Microsoft Entra ID Protection, search for the impacted user with the 'User' filter. Select the impacted user in the report and select Reset password in the top toolbar. The user will be assigned a temporary password that must be changed on the next sign-in. This process remediates their user risk and brings their credentials back to a safe state.

Manually dismiss user's risk

If password reset isn't an option for you, you can choose to manually dismiss user risk. Dismissing user risk doesn't have any effect on the user's existing password, but this process changes the user's Risk State from At Risk to Dismissed. It's important that you change the user's password using whatever means are available to you in order to bring the identity back to a safe state.

To dismiss user risk, go to the Risky users report in the Microsoft Entra Security menu. Search for the impacted user using the 'User' filter and select the user. Select the Dismiss user risk option from the toolbar. This action might take a few minutes to complete and update the user risk state in the report.

To learn more about Microsoft Entra ID Protection, see What is ID Protection.

How does ID Protection work for B2B users?

The user risk for B2B collaboration users is evaluated at their home directory. The real-time sign-in risk for these users is evaluated at the resource directory when they try to access the resource. With Microsoft Entra B2B collaboration, organizations can enforce risk-based policies for B2B users using ID Protection. These policies be configured in two ways:

  • Administrators can configure their Conditional Access policies, using sign-in risk as a condition, and includes guest users.
  • Administrators can configure the built-in ID Protection risk-based policies, that apply to all apps, and include guest users.

Limitations of ID Protection for B2B collaboration users

There are limitations in the implementation of ID Protection for B2B collaboration users in a resource directory, due to their identity existing in their home directory. The main limitations include:

  • If a guest user triggers the ID Protection user risk policy to force password reset, they will be blocked. This block is due to the inability to reset passwords in the resource directory.
  • Guest users do not appear in the risky users report. This limitation is due to the risk evaluation occurring in the B2B user's home directory.
  • Administrators cannot dismiss or remediate a risky B2B collaboration user in their resource directory. This limitation is due to administrators in the resource directory not having access to the B2B user's home directory.