Skip to main content

βš™οΈπŸͺŸπŸ§‘β€πŸ’ΌCP - Teams - Block other tenant sign-in

What this policy is about πŸ›‘β€‹

We love Microsoft Teams.
We don’t love when users suddenly log in with an account from some completely unrelated tenant β€œbecause it was convenient.”

This policy says:

β€œIf you’re not one of us, you’re not logging in.”

The result: no random tenants in your Teams client, no unexplained chats with unmanaged environments, and no β€œaccidental” data leaks.


Why? πŸ€¨β€‹

Cross-tenant logins might look harmless, but:

  • You don’t know who manages that other tenant (if anyone)
  • You can’t enforce compliance or logging
  • You lose all visibility into where your data ends up

Unless you’re in the middle of a merger, acquisition, or cross-tenant migration, there’s simply no reason to keep this door open.


πŸ› οΈ Configuration​

Type: Settings Catalog

SettingStateDetails
Microsoft Teams β†’ Restrict sign in to Teams to accounts in specific tenants (User)EnabledTenant IDs (User): ${SUPERVISION_TENANTID}

Only our own tenant ID is allowed. Period.


πŸ’‘ SuperVision Tip​

Never hardcode a tenant ID.
With ${SUPERVISION_TENANTID}, SuperVision will automatically inject the correct value for each customer environment.
That makes your blueprint instantly multi-tenant ready and prevents awkward β€œoops, wrong tenant” moments.


πŸ‘₯ Group Assignments​

βœ… Included:​

  • All Users

❌ Excluded:​


Need to temporarily allow someone to log into another tenant?
Use the βš™οΈπŸͺŸπŸ§‘β€πŸ’ΌπŸ”“CP - Teams - Allow other tenant sign-in.
With approval. And a good reason. And probably a raised eyebrow.


Governance Check βœ…β€‹

Shadow IT is like mold: it grows in the dark, and when you notice it, it’s usually too late.
Document your exceptions, get them approved, and remove them when they’re no longer needed.