A cloud-based identity and access management service for securing user authentication and resource access
Use Microsoft Entra ID as the single identity provider for the app and rely on its SSO and access-control capabilities, then scope access based on the specific Microsoft 365 account that received the invitation.
A standard enterprise pattern is:
- Centralize identity and SSO in Microsoft Entra ID
- Register the application in Microsoft Entra ID and enable SSO using OpenID Connect/OAuth 2.0 or SAML, depending on the app.
- This ensures users authenticate once with Entra ID and then access Microsoft 365 resources (such as email) with a single identity, while still supporting multiple accounts.
- SSO via Entra ID lets administrators enforce MFA, Conditional Access, and centralized audit logging across all apps and users.
- Use the invitation target address as the identity key
- When sending invitations, store the invited email address and bind it to the app’s access control logic.
- After Entra ID signs the user in, compare the signed-in user’s UPN/email (from the ID token/claims) with the invited address.
- Grant access only if they match (or match a mapped identity in a directory group or role). This ensures that even if a user has multiple Microsoft or M365 accounts, only the account that corresponds to the invited address is accepted.
- Leverage Entra SSO and group/role assignment
- Assign access to the app via Entra groups or app roles that correspond to the invited accounts.
- For shared or functional mailboxes, use Entra’s account sharing and password-based SSO where appropriate, so users never see or reuse the shared password but can still access the mailbox through orchestrated SSO.
- Use hybrid or cloud-only identity consistently
- If using hybrid identity, synchronize on-premises AD DS accounts with Entra ID using Microsoft Entra Connect and use a single sign-on method (password hash sync, pass-through authentication, or federation).
- This keeps the same identity across on-premises and Microsoft 365, reducing the chance that users sign in with the “wrong” account.
- Enforce Conditional Access and MFA
- Apply Conditional Access policies in Entra ID to ensure that only compliant, authenticated sessions from the correct tenant and account can reach the app and its associated Microsoft 365 resources.
This approach uses Entra ID as the enterprise-wide identity system, provides SSO, and then enforces that only the specific invited Microsoft 365 identity (UPN/email) is allowed to access the app and its associated mailbox.
References: