Grant the Everyone claim to external users in Office 365
Starting on March 23, 2018, we are updating the behavior and governance of access by external users in Office 365.
After this change is made, an external user will see only the content that is shared with that user or with groups to which the user belongs. External users will no longer see content that is shared to the Everyone, All Authenticated Users, or All Forms Users groups. By default, content that is granted permissions to these groups will be visible only to your organization's users.
Administrators can change the default behavior to enable external users to see content that is shared to Everyone, All Authenticated Users, or All Forms Users.
In on-premises Active Directory domains, the Everyone special group represents all identities in the Active Directory domain. This includes the domain's guest account, which is disabled by default. By default, the Everyone group includes all user accounts that are added by delegated administrators to the domain.
Before this change, Office 365 shared the behavior of on-premises Active Directory domains: Every user in a tenant's Azure Active Directory (Azure AD) was effectively considered a member of the Everyone group after you added an Everyone claim to the user's security context. This included external users. This claim enables a user to access any content that is shared with the Everyone group.
Similarly, the All Authenticated Users and All Forms Users claims were added automatically to each user's security context. This included external users who have accounts in the tenant's Azure AD. These claims enable users to access any content that is shared with the All Authenticated Users or All Forms Users groups.
Office 365 enables users to share and collaborate seamlessly with users inside and outside their organizations. When a user in your organization adds an external user to an Office 365 group or shares content with an external user and requires authentication ("sign-in") for access, an account is automatically created in Azure AD to represent the external guest user. It isn't necessary for a delegated administrator to create the account for the external user.
Updates to the default access for external users
To better support user-driven sharing, we are updating the behavior and governance of access by external users in Office 365.
Starting on March 23, 2018, external users will no longer be granted the Everyone, All Authenticated Users, or All Forms Users claims by default. External users will be granted access only to content that is shared with the group to which the external user belongs, and to content that is shared directly with the external user. External users will not have access to content that is shared with these three special groups.
New option to govern access for external users
Use the following guidelines to grant access to external users for the selected groups.
|Everyone||Configure your tenant to grant the Everyone claim to external users by running the Set-SPOTenant -ShowEveryoneClaim $true Windows PowerShell cmdlet.||External users who are granted the Everyone claim have access to content that is shared to the Everyone group.|
|All Authenticated Users and All Forms Users||Configure your tenant to grant the All Authenticated Users and All Forms Users claims to external users by running the Set-SPOTenant -ShowAllUsersClaim $true Windows PowerShell cmdlet||External users who are granted the All Authenticated Users and All Forms Users claims have access to content that is shared to the All Authenticated Users and All Forms Users groups.|
Use Azure AD groups and dynamic membership instead of default claims
Although we continue to support sharing with the Everyone, Everyone Except External Users, All Authenticated Users, and All Forms Users groups, we encourage you to implement role-based access management by using customer-defined groups in Azure AD. This includes Office 365 groups.
Office 365 groups define the membership and access to content across Office 365 services and experiences. Many Office 365 services already support Azure AD dynamic groups, and these services are defined as a set of rules that are based on Azure AD properties and business logic.
Dynamic groups are the best way to make sure that the appropriate users have access to the correct content. Dynamic groups let you define a group one time by using a definition that is based on rules. By having this ability, you do not have to add or remove members as your organization changes.
Q: Is it currently possible to opt out your tenant from receiving this change?
A: Currently, there is no official "opt out" process. If you continue to use these groups to share to external users, you can run the following cmdlet in PowerShell before March 23, 2018:
Set-SPOTenant -ShowEveryoneClaim $true
By default, the -ShowEveryoneClaim property value is set to True. However, to make sure that the property value is not null, run this command to fully update the setting. If you want to verify that the setting is updated, please contact Microsoft Support.
Identifying resources permissioned to all external users in the tenancy
Download the SharePoint Search Query Tool.
The queries in the following "Process" section can also be run in web browsers.
Create a consumer account at Outlook.com. This account is external to your organization.This exampleassumes that the account is email@example.com.
- YourOffice 365 organization is Contoso. Your organization uses contoso.sharepoint.com for SharePoint sites and groups, and contoso-my.sharepoint.com for OneDrive storage.
- You are an administrator for the organization. Youridentity firstname.lastname@example.org.
- Configureyour tenant to grant the Everyone claim to external users by How to determine resources to which all external users have access.