[GH-ISSUE #2233] [Feature Request]: New Standard for Cross-tenant access settings #1149

Closed
opened 2026-03-02 13:41:59 +03:00 by kerem · 4 comments
Owner

Originally created by @gwenner-endsight on GitHub (Mar 19, 2024).
Original GitHub issue: https://github.com/KelvinTegelaar/CIPP/issues/2233

Originally assigned to: @kris6673 on GitHub.

Description of the new feature - must be an in-depth explanation of the feature you want, reasoning why, and the added benefits for MSPs as a whole.

When M365 guests authenticate to our clients' tenants, by default they are subject to "double MFA" because our client's tenant doesn't trust the MFA of the guest's Entra tenant. This is now a configurable option in the Cross-tenant access settings, and we'd like it to be in the Standards. The settings in the M365 GUI are described here: https://techcommunity.microsoft.com/t5/microsoft-entra-blog/cross-tenant-access-settings-notes-from-the-field/ba-p/4081841

I think having a choice in CIPP to enable or disable this setting explicitly would be preferred.

Specifically, our organization would like to check the box to "Trust multifactor authentication from Microsoft Entra tenants", under the trust settings. The PowerShell to do this should be available via the graph endpoint linked in the later question.

PowerShell commands you would normally use to achieve above request

https://learn.microsoft.com/en-us/graph/api/crosstenantaccesspolicyconfigurationdefault-update?view=graph-rest-1.0&tabs=powershell

Using this resource type: https://learn.microsoft.com/en-us/graph/api/resources/crosstenantaccesspolicyinboundtrust?view=graph-rest-1.0

And the isMfaAccepted property

Originally created by @gwenner-endsight on GitHub (Mar 19, 2024). Original GitHub issue: https://github.com/KelvinTegelaar/CIPP/issues/2233 Originally assigned to: @kris6673 on GitHub. ### Description of the new feature - must be an in-depth explanation of the feature you want, reasoning why, and the added benefits for MSPs as a whole. When M365 guests authenticate to our clients' tenants, by default they are subject to "double MFA" because our client's tenant doesn't trust the MFA of the guest's Entra tenant. This is now a configurable option in the Cross-tenant access settings, and we'd like it to be in the Standards. The settings in the M365 GUI are described here: https://techcommunity.microsoft.com/t5/microsoft-entra-blog/cross-tenant-access-settings-notes-from-the-field/ba-p/4081841 I think having a choice in CIPP to enable or disable this setting explicitly would be preferred. Specifically, our organization would like to check the box to "_Trust multifactor authentication from Microsoft Entra tenants_", under the trust settings. The PowerShell to do this should be available via the graph endpoint linked in the later question. ### PowerShell commands you would normally use to achieve above request https://learn.microsoft.com/en-us/graph/api/crosstenantaccesspolicyconfigurationdefault-update?view=graph-rest-1.0&tabs=powershell Using this resource type: https://learn.microsoft.com/en-us/graph/api/resources/crosstenantaccesspolicyinboundtrust?view=graph-rest-1.0 And the **isMfaAccepted** property
kerem 2026-03-02 13:41:59 +03:00
Author
Owner

@KelvinTegelaar commented on GitHub (Mar 19, 2024):

I like it. Planned.

<!-- gh-comment-id:2007717071 --> @KelvinTegelaar commented on GitHub (Mar 19, 2024): I like it. Planned.
Author
Owner

@kris6673 commented on GitHub (Mar 26, 2024):

I would like to work on this please!

<!-- gh-comment-id:2021234875 --> @kris6673 commented on GitHub (Mar 26, 2024): I would like to work on this please!
Author
Owner

@github-actions[bot] commented on GitHub (Mar 26, 2024):

Great! I assigned you (@kris6673) to the issue. Have fun working on it!

<!-- gh-comment-id:2021235267 --> @github-actions[bot] commented on GitHub (Mar 26, 2024): Great! I assigned you (@kris6673) to the issue. Have fun working on it!
Author
Owner

@KelvinTegelaar commented on GitHub (Mar 26, 2024):

added in dev

<!-- gh-comment-id:2021370241 --> @KelvinTegelaar commented on GitHub (Mar 26, 2024): added in dev
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/CIPP#1149
No description provided.