
Hi @Stephane Fagnan,
Thanks for your detailed explanation, I am more than willing to help you out.
Question 1: /invite endpoint
First of all, license does not affect the response to MS Graph requests.
We suspect that there should be some difference between your two requests causing the response to be different. Here's the official documentation about the difference between "grantedTo" and "grantedToIdentity":
We only distinguish between them when using the /permissions endpoint: grantedTo is used to add user access to a folder or file, while grantedToIdentity is used to add user access to a site.
Reference: Granular permissions for working with files, list items and lists added to the Graph API!
Note: Non-official, just for reference.
If it is convenient, please share your two requests (including the body of the request) with me, we will need to take further research at your request to confirm why the problem is occurring. Please be careful not to disclose your private information.
Question 2: Shared Item Access Workflow
According to the image you provided, your external users are experiencing the Consent experience for the guest prompt.
One possible reason is your tenant might have enabled Microsoft Entra B2B integration, which replaces the one-time passcode experience (SharePoint external authentication). This requires external users to use guest accounts. In this case, I recommend you contact your tenant admin or IT team and check if they have enabled the integration.
This thread documents similar problems and you can see if the solution it offers works.
Question 3: Setting up the MFA prompt.
You are being prompted to set up Multi-Factor Authentication (MFA) because Microsoft has implemented security defaults to enhance account security. These defaults require all users to register for MFA to protect against identity-related attacks like password spray, replay, and phishing.
To disable MFA for a specific user, you can follow these steps:
- Sign in to the Microsoft 365 admin center.
- Select the Users tab, and then select the user you want to change.
- On the user details page, scroll down to the Security & Permissions section.
- Click the Edit button and select Disable in the Multi-Factor Authentication drop-down menu.
- Click the Save Changes button to save your changes.
If you don't have admin access, you'll need to contact your global admin to make these changes for you.
To disable Multi-Factor Authentication (MFA) for your entire tenant, you need to adjust the security settings in the Microsoft Entra admin center (formerly Azure AD).
Here are the steps:
- Sign in to the Microsoft Entra admin center as a security administrator, Conditional Access administrator, or global administrator.
- Navigate to Identity > Overview > Properties.
- Select Manage security defaults.
- Set Security defaults > Manage Conditional Access> Click Multifactor authentication for Microsoft partners and vendors> Off this policy.
- Save your changes.
If you have any questions, please do not hesitate to contact me.
Moreover, if the issue can be fixed successfully, please click "Accept Answer" so that we can better archive the case and the other community members who are suffering the same issue can benefit from it.
Your kind contribution is much appreciated.