Connect up to Five Microsoft 365 Tenants in a Multi-Tenant Organization for Richer Collaboration

When Microsoft introduced shared channels for Teams in 2022, they also introduced Azure B2B Direct Connect, a method of connecting tenants together in a mutual trust arrangement. Cross-tenant access policies are the underpinning of the mutual trust between tenants. As the name suggests, the name dictates how tenants access each other’s resources. Cross-tenant synchronization is another capability controlled by cross-tenant access policies. In this case, it’s to define a trust relationship to synchronize directory objects between tenants.

Now Microsoft has multi-tenant organizations, a new Entra ID solution that’s available in preview. A multi-tenant organization (or MTO) is a set of up to five Entra ID tenants connected together by cross-tenant access policies to make directory synchronization seamless. The solution is directed at organizations that span multiple Microsoft 365 tenants that want to share a common directory and make it easier for users in the connected tenants to share information.

For now, the benefits of easier collaboration only extend to the new Teams 2.1 client, where Microsoft says that users:

  • Receive real-time notifications from all tenants in the MTO.
  • Don’t need to switch tenants before they can collaborate (chat, call, meet) with users in other MTO tenants. Teams supports federated chat with external people from other tenants. In an MTO, users from the tenants in the MTO are no longer considered external, so full chat features are available.
  • Can set a separate status in each tenant.

In addition, the Microsoft 365 user profile card shows the organization name of a user. The Microsoft Teams development group’s blog gives more information about “seamless collaboration in Teams in a multi-tenant organization.”

When generally available, users participating in MTOs will require Entra ID Premium P1 licenses. Given that this is very much an enterprise play, the license requirement shouldn’t be an issue.

Creating a new Multi-tenant Organization

The structure of an MTO is:

  • An owning tenant that creates the MTO. A tenant can only be a member of a single MTO.
  • Up to four additional tenants added to the MTO.
  • Each tenant connects to the other tenants with a cross-tenant synchronization configuration.
  • Each tenant controls what users from their directory synchronizes with the other tenants.
  • A maximum of up to 100,000 users can synchronize from one tenant to another.
  • Tenants can leave an MTO at any time. The MTO is removed when the owning tenant leaves it.

Because this is currently a preview feature, only tenants configured for targeted release can participate in an MTO.

To create a new MTO, go to the Org Settings section of the Microsoft 365 admin center and select the Organization profile tab. Choose Multitenant collaboration to create a new MTO. You can then enter the name of the new MTO, a description, and the tenant identifiers (GUIDs) for the member tenants. I chose to start by connecting with a single tenant (Figure 1).

Creating a new multi-tenant organization
Figure 1: Creating a new multi-tenant organization

Next, configure the synchronization settings for the connection between the owing tenant and the new member tenant. This is similar to the steps taken to create a cross-tenant synchronization configuration in the Entra ID admin center. The operation is more automated and therefore easier in the Microsoft 365 admin center. The two settings exposed in Figure 2 control user synchronization and suppress consent prompts that users would otherwise have to give to allow their information to be shared through cross-tenant synchronization.

Configuring synchronization settings for the new multi-tenant organization
Figure 2: Configuring synchronization settings for the new multi-tenant organization

Move to the next screen to review the configuration of the MTO before clicking the big Create multitenant organization to launch the process of populating Entra ID with the necessary properties. This includes preparing the nominated member tenants to join the MTO. However, because tenants operate on a mutual trust arrangement, the administrators of each member tenant must take explicit action to join the MTO. Essentially, this action, executed through the same option in the Microsoft 365 admin center, accepts an invitation from the owner tenant to participate in the MTO (Figure 3).

 A member tenant joins a multi-tenant organization
Figure 3: A member tenant joins a multi-tenant organization

Entra ID Settings

Microsoft 365 makes use of the information synchronized between directories, but Entra ID controls the synchronization. Go to the External Identities section of the Entra ID admin center and you’ll find that a cross-tenant synchronization configuration now exists named MTO_Sync_tenantidentifier (Figure 4)

The cross-tenant synchronization configuration created in Entra ID
Figure 4: The cross-tenant synchronization configuration created in Entra ID

Configuration settings dictate which users the tenant synchronizes to the other tenant and you can add users and security groups to the configuration to have them synchronize to the other tenant. I found that I had to change the synchronization setting from Manual to Automatic in some tenants, but apart from that, the configuration just worked.

Remember that the MTO is a Microsoft 365 feature built on top of Entra ID, so it’s easier to use the Share users option in the Multitenant collaboration section of the Microsoft 365 admin center to define the users that your tenant is willing to synchronize with all the other tenants in the MTO. In my case, I created a security group and populated it with all the member accounts from the tenant before adding it to the configuration (Figure 5). A dynamic security group also works and is easier to manage in terms of adding new accounts to the synchronize cycle.

Configuring users to synchronize within the multi-tenant organization
Figure 5: Configuring users to synchronize within the multi-tenant organization

If you want control at an individual tenant level (for instance, synchronize some users with one tenant and a different set with another), you can change the provisioning settings of the individual Entra ID configurations for each tenant. Before doing that, reflect that the idea behind the MTO is to have a common directory across the tenants in the MTO. That’s why the default is to synchronize the same users with all tenants.

Members Not Guests

When Entra ID synchronizes accounts from a source tenant to a target tenant, it creates the entries in the target tenant as member accounts, not guest accounts. If you examine the properties of a synchronized account, you can see that the user principal name looks like a guest account but the user type is the same as a regular user account:

Id                : 8dd7fdd3-bc6f-4390-ae0a-5910ea577a7d
DisplayName       : Andy Ruth (Project Director)
UserPrincipalName :
Mail              :
UserType          : Member

Creating synchronized accounts as members with a specific form of UPN means that apps can easily distinguish accounts from an MTO and treat them differently to guest accounts. Quite how that happens within the new Teams client serves a separate article.

At this point, the synchronized accounts have zero impact on other Microsoft 365 apps like Exchange, Planner, Viva Engage, or SharePoint Online. This might change in the future. From a user perspective, the synchronized accounts appear like other member accounts and can be treated as such.

The Start of the MTO Journey

The new multi-tenant organization is a preview feature. As such, we can expect that things might change between now and general availability. However, I don’t think the general structure will change and MTOs will work as described based on top of Entra ID cross-tenant synchronization configurations.

What will be interesting in the future is how this solution will affect ISVs that sell cross-tenant directory synchronization products. I think that MTOs remove the need for some of the needs satisfied by these products, so the market will probably shrink. I’m also interested to see how tenant-to-tenant migration vendors adapt to this new influence. Will MTOs replace the need for some tenant-to-tenant migrations or will an MTO be the opening step for others? We shall see.

And then there’s the question of Microsoft 365 apps. Teams has already said how it will take advantage of being able to distinguish between a synchronized user from a tenant within an MTO and other external accounts. We’ll have to wait and see how Outlook, Viva Engage, Planner, and other apps change, if at all. Overall, the MTO is an interesting prospect to contemplate.

For more information about Microsoft 365 multi-tenant organizations, read this article.

The Experts Conference (TEC) 2023

Where Active Directory & Microsoft experts gather, learn, and innovate. Join us in Atlanta, Georgia, September 19-20.

Register Today!

About the Author

Tony Redmond

Tony Redmond has written thousands of articles about Microsoft technology since 1996. He is the lead author for the Office 365 for IT Pros eBook, the only book covering Office 365 that is updated monthly to keep pace with change in the cloud. Apart from contributing to, Tony also writes at to support the development of the eBook. He has been a Microsoft MVP since 2004.


  1. Stefan

    MTO is for five tenants only ? If I whant to connect like 50 tenants to form a MTO, what should I use then ?


    How would licensing work for the various functions, would a person/user need to be licensed per tenant? Would a sync pull in that person as a member with licenses from the setup of the “home” tenant?

    1. Avatar photo
      Tony Redmond

      You can assign licenses to synchronized member accounts if you really want to, but there’s no need. The synchronized accounts are not there to be used by humans.

  3. Mark Lawton

    Hi Tony – have you seen anything in the pipeline that will allow an org to have 2 separate O365 Tenants, but use a single domain/MX (e.g. if they want to manage in-region but keep a single domain across the org). I do recall something in the roadmap but seems to have gone quiet.


    1. Woody

      Not with multiple tenants, but consider a multi-geo tenant and/or using Administrative Units.

  4. sica

    So, it seems cross tenant sync is just a method to sync attribute and MTO is a complete solution. Is my understanding correct? Cross tenant sync will remain but MTO is a completer solution?

    1. Avatar photo
      Tony Redmond

      MTO is a complete solution for situations where less than five tenants wish to form an organization based on directory synchronization.

  5. Fede Massa

    Is that feautere will replace the Cross-tenant synchronization or it’s totally different? Witch is better to enable for a customer with two separated M365 Tenant?

  6. John

    Hey Tony,
    Do you know if this does anything to address the synced objects appearing the the Teams address book but being not routable, so when choosing it to message, it sends to the internal tenant object which isnt checked?

    Ive raised it with my CSAM and trying to get in touch with the dev team but its slow, its addressed here and a pretty popular issue:

    Anything that you could suggest?

    1. Avatar photo
      Tony Redmond

      The basic issue here is that the original cross-tenant synchronization mechanism wasn’t tailored to support Microsoft 365 apps. The MTO is explicitly engineered to support Microsoft 365, so it looks (from initial tests) that the use objects synchronized to another tenant a) appear in the GAL and b) are routable because their SMTP mail address is valid.

  7. Nathan T W Smith

    Will this allow users from one tenant to log in to computers on another tenant?

    1. Avatar photo
      Tony Redmond

      I’m playing with the different permutations that come available through the MTO and will publish something soon to document my results.

  8. Gediminas

    I guess custom domains stills needs to be unique in each tenant..🤔

    1. Avatar photo
      Tony Redmond

      Certainly the tenant identifiers need to be unique. But I have not played with custom domains that are duplicated across tenants. That seems like a very bad situation to be in.

  9. Joseph Moran

    This is interesting. I manage two tenants for subsidiary companies that were originally conceived as separately operating entities, but over time have increasingly tried to operate as a single organization.

    I set up Cross-Tenant Sync back when it was in preview, and it’s been very helpful in simplifying sharing of OneDrive/SharePoint and some other stuff across tenants.

    Alas, I thought it was a panacea until I realized some of the limitations, such as the fact that when creating a M365 group in tenant A, tenant B users can be members but can’t directly access the group mailbox and calendar.

    Really hoping that MTO will address issues like this. Otherwise, joining the two tenants is where I’m ultimately headed, a task I do not relish…

    1. Avatar photo
      Tony Redmond

      Groups support is obviously a good next step for Microsoft to head toward. Remember, MTO is a preview, so things will change…

  10. Charlie

    Are there plans for cross-cloud (GCCH Commercial) support for MTO?

    1. Avatar photo
      Tony Redmond

      Not that I know of. You could ask your local Microsoft rep.

  11. Jakke

    Would this MTO principle also work in a Hybrid environment?

    1. Avatar photo
      Tony Redmond

      I believe so. However, I think it will only synchronize cloud-based accounts. On-premises accounts remain under the control of Active Directory and are not member accounts in a source Entra ID directory.

  12. Skip

    I am unable to find “Multitenant collaboration” in my tenant as an option to enable. Wondering if this feature hasn’t rolled out yet to some tenants ?

    1. Avatar photo
      Tony Redmond

      It’s definitely only available for tenants configured for targeted (early) release. Is that your state?

      1. Francois

        Hi Tony, do you know if the tenant as to be in “targeted release for everyone” or would “targeted release for select users” would do the trick ? I only have a few admin account in that state.

        1. Avatar photo
          Tony Redmond

          I don’t know. The simple test is to see if the option to establish an MTO is in your organization profile settings. If it is, you’re all set. If not, you’ll have to wait.

        2. Erick

          Targeted release for select users works as long as the admin doing the configuration is included in that targeted release group.

  13. KP

    Very interesting question .. 🙂

    Will MTOs replace the need for some tenant-to-tenant migrations or will an MTO be the opening step for others?

    1. Avatar photo
      Tony Redmond

      That is a very interesting question that we will have to parse out over the coming months…

  14. Bueschu

    Very interesting and helpfull.

Leave a Reply