Skip to main content

βš™οΈπŸͺŸπŸ§‘β€πŸ’ΌCP - OneDrive - Block other tenant signin

What this policy is about πŸ›‘β€‹

You know the drill by now. We don’t like chaos.
We don’t like data all over the place.
And we really don’t like users signing into OneDrive with accounts from some other tenant they found behind the couch.

This policy says:

β€œYou're either with us, or you're not syncing anything.”

No more mystery accounts. No more β€œI just needed to grab something real quick.”
Only sign in with your organization's account. Period.


Why? πŸ€¨β€‹

Because you don’t know:

  • Where that other tenant is managed
  • If it even is managed
  • Or if Bob from Accounting is syncing your quarterly reports to his old startup's OneDrive

Add a few mergers and acquisitions into the mix β€” and suddenly you've got data going in ten directions with zero accountability.

Let’s not.


πŸ› οΈ Configuration​

SettingValue
Allow syncing OneDrive accounts for only specific organizationsEnabled
Tenant ID${SUPERVISION_TENANTID}

πŸ’‘ SuperVision Tip​

This policy requires a Tenant ID to work.
And while you're technically allowed to paste in your own... don't.

Instead, use the dynamic tag ${SUPERVISION_TENANTID} β€” SuperVision will automatically inject the correct value per environment.

Why this matters:

  • Prevents config mistakes during rollout
  • Avoids syncing devices to the wrong tenant (been there πŸ˜…)
  • Makes your blueprint multi-tenant ready out of the box

πŸ‘₯ Group Assignments​

βœ… Included:​

  • All Users

❌ Excluded:​

This group is reserved for users who are explicitly allowed to sync to another tenant β€” see Allow Policy


If someone really needs to sign into another tenant:
Send them to the βš™οΈπŸͺŸπŸ§‘β€πŸ’ΌπŸ”“CP - OneDrive - Allow other tenant signin .
With written approval. And a raised eyebrow.