Hello,
You try to create a separate user account on your Windows computer for your work accounts that are federated across multiple tenants.
Some solutions that maybe solve your problem:
- Create Local Accounts for Each Tenant:
- Instead of using your federated accounts directly, you can create separate local user accounts on your Windows computer and then link each one to the corresponding tenant account. This way, you'll have a dedicated local user profile on your computer for each UPN, making it less likely to run into conflicts.
- Steps:
- Go to Settings → Accounts → Family & other users.
- Select Add someone else to this PC.
- Instead of adding an email address, select I don’t have this person’s sign-in information and then choose Add a user without a Microsoft account.
- Create a local user account.
- After that, log into that local user account and link your sebastian@companyB.com to this new Windows profile by adding it as a Work or School account.
- Use Microsoft Edge Profiles or Browser-Based Separation: If the separation of accounts is primarily for Office 365 or web-based access to different tenants, using Microsoft Edge (or another browser) with distinct profiles for each UPN might solve the problem:
- In Edge, you can create multiple profiles, each signed into different Microsoft 365/Azure accounts. This will allow you to keep your work environments distinct without creating new Windows user accounts.
- This can be particularly useful if you only need the separation for apps like Teams, SharePoint, or Outlook.
- Check Tenant and Federation Setup: Ensure that both Tenant A and Tenant B have the appropriate configurations for cross-tenant access and federation. Sometimes, cross-tenant federation can cause issues with login scenarios. Working with your IT admins to ensure that the accounts are fully federated and allowed in both tenants might help.
- Try Azure AD Join: Instead of using traditional Microsoft Accounts, see if your IT department can set up an Azure AD Join scenario where you can register both tenants separately under the Azure AD identity management system.
Let me know if you need any further details on any of these steps!
Best regards,
Vassilis