Skip to main content

βš™οΈπŸͺŸπŸ§‘β€πŸ’ΌπŸ”“CP - OneDrive - Allow other tenant signin

What this policy is for πŸͺ„​

This is the counter-policy to βš™οΈπŸͺŸπŸ§‘β€πŸ’ΌCP - OneDrive - Block other tenant signin.

While that one slams the door shut on signing into OneDrive with external tenant accounts, this one says:

β€œOkay, but only for a select few β€” and only if we can explain it.”

Why? Because in real-world scenarios, not everything is black and white:

  • You might be merging companies
  • You might be sharing workloads between tenants
  • Or a user just happens to still be active across both environments

This policy re-enables that specific functionality β€” but only for those assigned to the
πŸ›‘οΈπŸ§‘β€πŸ’ΌπŸ‘ˆπŸ”“Group - Multi tenant OneDrive Allowed users


πŸ› οΈ Configuration​

SettingValue
Allow syncing OneDrive accounts for only specific organizationsDisabled

This effectively unlocks the ability to sign into any tenant from the OneDrive client β€” for users that receive this policy.


πŸ’‘ SuperVision Tip​

This policy depends entirely on the correct group assignment.

With SuperVision, you can:

No device tags or tenant ID logic needed β€” just IAM done right.


πŸ‘₯ Group Assignments​

βœ… Included:​

❌ Excluded:​


πŸ“ Governance Check​

If you enable this policy without understanding why a user needs it, you're just creating shadow IT with extra steps.

Always combine this with:

  • A written approval from the customer
  • Internal documentation of purpose
  • Regular review of who's in the group

πŸ§žβ€β™‚οΈ Just because you can allow cross-tenant syncing, doesn’t mean you should.

Use this policy with care. It's a scalpel β€” not a sledgehammer.