Skip to content
English
  • There are no suggestions because the search field is empty.

Configuring Guest Request Policies

In this article, learn how to setup guest request policies in the Orchestry admin

    Guest request policies are intended to add control and governance around how guests are requested and then granted access to Microsoft 365 groups. 

    Check out this quick video to get started:

     

    The Guest Request End User Experience

    When a Guest Request policy is assigned to a workspace, the group/workspace owners must use Orchestry's "Team Information" channel tab, or the Workspace Information web part to submit guest requests.

     

    GIF of a guest request submission

    Only workspace owners can submit guest requests. Once submitted, the request will await approval before the guest is sent the (Microsoft default) email invitation to the workspace.

     

    To learn more about the end-user experience for requesting guests, check out the article: Using a Guest Request Policy

    Creating a Guest Request Policies.  

    On the Guest policies page, you can create new policies and manage your existing ones.  Orchestry comes with a few request policies out of the box, but we encourage you to create your own that are designed for your organizations needs.

    To create a new guest policy, click the "New Guest Request Policy" button on the Guest Policies page.

     

    Complete all required fields across the NAME, GUEST REQUEST, POLICY EXECUTION AND NOTIFICATION FORMAT tabs and then SAVE your changes.

    GIF of a brief click-through of a Guest Request policy in Orchestry

     

    Your new policy can then be assigned to any existing workspace of the same type (i.e.: teams workspace).  You can also proactively assign guest request policies by attaching them to your workspace templates.

     

    Guest Request Policies - The NAME Tab

    On the first tab of your policy, give it a clear name and description.  

    TIP: In the NAME field, include a brief summary of what the policy does.  This can help other admins know what each policy does at a glance.

    Guest Request Policies - The GUEST REQUESTS Tab

     

    The Guest Requests Section

    On this tab, the two most important (and required) fields are (1) "Allow Guests Access for Workspaces" and (2) "Require Guest Justification":

    1. Allow Guest Access for Workspaces
    • Choose "YES - ALL DOMAINS" to configure this policy to allow guests from any domain allowed in your tenant
    • Choose "YES - SPECIFIC DOMAINS" to configure this policy to a subset of the domains allowed in your tenant
    • Choose "NO" to configure this policy to NOT allow guests into workspaces
    2. Require Guest Justification Adds a required text field to the Guest Request form for users to include the reason for adding the guest.

    Allowing Guests from Specific Domains

    By choosing the "YES - SPECIFIC DOMAINS" option, you can restrict who can be invited to workspaces assigned the Guest Request policy.   When you select the option, enter each domain that should be ALLOWED in the workspace. 

    KB-GuestMGMT-settings1

    Note that 'Guest Request' policies CANNOT be used to permit blocked domains.

    Want to learn how to BLOCK and ALLOW domains for guest users?
    Check out the article: Guest Management Settings

    The Guest Details Section

    Capture additional details about your guest users by adding  fields to the Guest Request form.  All fields are part of the Guest's Entra ID profile.

     

    NOTE: the fields "First Name", "Last Name" and "Email" are mandatory for setting up a guest profile and cannot be disabled in the policy.

    The Guest Name Configuration Section

    GIF demonstrating how to configure guest names in a Guest Request policy

    This section allows you to configure how guest names are displayed when added via this policy.  You can use a mix of the Entra ID fields and string/text fields.

    TIP: Reference the yellow box to see a live sample of your naming configuration

    Guest Request Policies - The POLICY EXECUTION Tab

    Policy Approvers 

    All Guest Request policy workflows include an approval step before the guest is invited to the workspace. 

    When configuring a policy, you can (A) designate the workspace owner as the approver, or (B) designate a specific users/groups.

    APPROVERS WHAT HAPPENS..
    Delegate to Workspace Owners: Guest request approval is automatically approved.  Workspace owners do not need to approve their own requests.
    Specific users/Groups: Guest request is sent to the designated individuals and/or security groups you specify.

     

    Assigning Specific Users/Groups as Guest Request Policy Approvers

    If you need to assign specific people in your organization as Guest Request approvers, a few extra fields must be completed in your policy.

    1. Add Users and Groups: Identify any licensed users in your organization to be an approver.   You can also add security groups to ensure multiple people are notified.

    Only one person needs to approve the request.
    2. Notification Text: Customize the notification approvers receive.
    3. Notification Cadence: Configure how many times the approvers will be notified before the approval is escalated
    4. If No Action Taken Choose individuals or a security group to escalate pending guest requests after the reminder cadence ends. 

    The request will remain here until it's approved to rejected.

    Call Webhook:

    Add a custom webhook to extend the functionality of this Guest Request policy.   To learn more, check out our API documentation.

    Guest Request Policies - The NOTIFICATION FORMAT Tab

    Ensure your policy approvers are notified where they work.  Choose to send the notification via email and/or Microsoft Teams.

    Guest Request Policies VS Native M365 Controls

    When you add a Guest Request policy to a workspace, Orchestry will automatically disable the native means to add guests to the group, including Outlook, Teams, and SharePoint.   

    This means that Orchestry becomes the one-true way to add guests into workspaces. You don't need to worry about users bypassing the request process.

    NOTE:  The graph call used to disable native methods for adding GUEST users also blocks B2B external users.  If your workspace has Shared Channels in Microsoft Teams that are configured for external membership, we recommend NOT applying a Guest Request policy.

    To learn about the Graph call we use to prevent users from adding guests, please check out this article: https://learn.microsoft.com/en-us/microsoft-365/solutions/per-group-guest-access?view=o365-worldwide#change-group-settings-using-microsoft-graph-powershell

    To learn how to now apply these policies to workspaces, check out Applying Guest Request and Review Policies.