An Azure service that provides an integrated environment for bot development.
Hi Jumeaux, Coline, Microsoft has deprecated the creation of multi-tenant bots as of July 31, 2025. Organizations migrating their existing multi-tenant Azure Bots to single-tenant configurations need to follow updated best practices and architecture patterns. Single-tenant bots restrict authentication to users within their own Azure Active Directory (Azure AD) tenant, which means the bot only directly serves users in that tenant. To allow users from other tenants to use the bot, these external users must be invited as guest users into the home tenant, or the bot must be published through the Microsoft Teams App Store (AppSource), where Microsoft facilitates consent and provisioning across tenants. This shift replaces the previous multi-tenant model where bots could be accessed directly by multiple tenants without additional consent workflows. The migration process involves several critical steps beginning with the Azure AD app registration changes. In the Azure portal, the bot app’s “Supported account types” setting must be changed from multi-tenant (“Accounts in any organizational directory”) to single-tenant (“Accounts in this organizational directory only”). A new client secret should be generated under the “Certificates & secrets” section to replace the one used in multi-tenant setup. The OAuth redirect URI for Bot Framework authentication must be confirmed or set to https://token.botframework.com/.auth/web/redirect. These updates ensure that the app registration aligns with single-tenant restrictions and authentication flows. On the bot backend side, code changes are essential to handle authentication and token acquisition correctly in single-tenant mode. The OAuth token request endpoint must specify the tenant ID, for example, using URLs such as https://login.microsoftonline.com/{tenant-id}/oauth2/v2.0/token replacing the generic multi-tenant endpoints. The Microsoft App ID and password (client secret) used by the bot must match the single-tenant app registration. Any OAuth prompt flows or token handling in the Bot Framework SDK code should be updated accordingly. Importantly, testing with Bot Framework Emulator requires configuring it to use the single-tenant bot credentials and the appropriate tenant URLs to avoid unauthorized errors. Simply bypassing OAuth or mixing multi-tenant credentials will cause token validation failures and unauthorized errors both locally and during Teams deployment. For deployment to Microsoft Teams, single-tenant bots can only serve users within their tenant boundary unless published externally. The recommended approach for broader user access is to package the bot as a Teams app and publish it through the Microsoft Teams App Store (AppSource). This publication enables external tenants to find, consent, and install the bot app, effectively enabling cross-tenant usage. This is the supported and future-proof model replacing the old multi-tenant bot usage pattern. Teams app manifest files and Azure Bot channel settings must be updated to reference the single-tenant app registration and permissions to avoid deployment errors related to unauthorized identities. For reference: Connect a bot to Microsoft Teams https://learn.microsoft.com/en-us/answers/questions/5492711/migrating-from-multi-tenant-to-single-tenant-azure https://learn.microsoft.com/en-us/answers/questions/5495938/bot-depreciated-july-31st