LemonBits

  • Home
  • About
  • Contact me
Microsoft Teams

Microsoft Teams Shared Channels

Frane Borozan - April 27, 2022

I received a few requests on how Microsoft Teams shared channels get enabled at all in the tenant.

Below is the most precise cheat sheet to get Shared Channels enabled ASAP in your tenant:

  1. Set the Update policy in Teams admin center https://admin.teams.microsoft.com/dashboard
    a. Go to Teams > Teams Update policies
    b. Add (we don’t want preview to be available for all users)
    c. Name the update policy “Teams Preview” and set value to Enabled
    d. go to Users > manage users > select user you want to receive Teams Preview policy > select tab Policies
    e. click on “edit” on the right of assigned policies
    f. for the update policy select “Teams preview”
  2. Enable public preview in Teams client
    a. On the top right in Teams client select three dots
    b. About > Public Preview
    c. Select public preview
    d. Click Switch to public preview, if successful you will receive letter P on top right of your picture
  3. Add an External identity in your Home Azure AD where you want to have shared channel https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/CompanyRelationshipsMenuBlade/CrossTenantAccessSettings
    a. Add organization
    b. enter domain name or the tenant ID
    c. click on domain name > inbound access (inherited from default)
    d. click on B2B direct connect
    e. customize settings
    f. External users and group > Access status > Allow Access
    g. Also do the same on the “External applications” tab > Allow access
  4. Add External identity in the second tenant Azure AD https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/CompanyRelationshipsMenuBlade/CrossTenantAccessSettings
    a. Add organization
    b. enter Domain name or tenant ID
    c. click Add
    d. click on domain name > outbound access (inherited from default)
    e. click on B2B direct connect
    f. customize settings
    g. External users and group > Access status > Allow Access
    h. Also do the same on the “External applications” tab > Allow access
    i. now wait, this takes 5-30 minutes before you can add them on the shared channels
  5. create Shared channel
    a. click on the team, then Add channel
    b. name it as you wish, click create
    c. in the share the “channel name” enter external user with the email address like AdeleV@M365x96785567.OnMicrosoft.com
    d. voila! chaos starts!
 0 0
Share Now

Frane Borozan

Helping SBC administrators kick-ass Google+

Leave a Reply Cancel Reply

Your email address will not be published. Required fields are marked *

Previous Post How to collaborate with guests and external users in Microsoft 365 and Teams
Next Post Do you know what is the Azure B2B direct connect?

Connect with me on

Latest Posts

  • How to invite guest users to Microsoft shared channels

    How to invite guest users to Microsoft shared channels

  • Creating a secure Microsoft Teams and Shared Channels environment for guest users

    Creating a secure Microsoft Teams and Shared Channels environment for guest users

  • How to create a shared channel and add teams and members?

    How to create a shared channel and add teams and members?

  • Microsoft Syntex Advanced Management’s first capabilities

  • 5 Microsoft Teams management pro-user tips

  • What are roles and permissions in Microsoft Teams?

  • How do you create a team from scratch in Microsoft Teams?

  • Teams governance

  • External sharing in SharePoint

  • SharePoint governance

Recent Comments

  • Frane Borozan on Downloads folder slow to load/sort in Windows 10
  • güvenlik kamerası on Downloads folder slow to load/sort in Windows 10
  • Laki Lakovic on Opening group policy editor on a remote computer and forcing GP Update
  • Diane on Opening group policy editor on a remote computer and forcing GP Update
  • Manoj B on Differences between L1, L2, L3 system administrator guidlines
  • Travis Vroman on Teams slow
  • Yossi B on Remote Desktop Services Manager 2016
  • astha on SharePoint audit logs
  • Frane Borozan on Installing Remote Desktop Services 2016
  • Joe Zhou on Installing Remote Desktop Services 2016
  • Pino on Installing standalone Remote Desktop Gateway on the Windows Server 2012 R2 without complete Remote Desktop Services infrastructure
  • Eddy Wilson on Windows 10: Share a VPN Connection
  • haleybri.com on Remote Desktop Services Manager 2016
  • Atif on Remote Desktop Services Manager 2016
  • Tan Vu on KB2919355 The update is not applicable to your computer
  • Vinay on Installing Remote Desktop Services 2016
  • JOEL FERDY FEUBI TABOUE on KB2919355 The update is not applicable to your computer
  • Delmar on Installing standalone Remote Desktop Gateway on the Windows Server 2012 R2 without complete Remote Desktop Services infrastructure
  • Luke Welden on KB2919355 The update is not applicable to your computer
  • LM on Installing standalone Remote Desktop Gateway on the Windows Server 2012 R2 without complete Remote Desktop Services infrastructure
  • Anonymous987 on KB2919355 The update is not applicable to your computer
  • ANonyommus987 on KB2919355 The update is not applicable to your computer
  • Alan on Remote Desktop Services Manager 2016
  • Jagz on Installing Remote Desktop Services 2016
  • VG on SharePoint audit logs
  • VG on SharePoint audit logs
  • Kalle on SharePoint audit logs
  • 3 pandas on SQL Server security best practices
  • Kalle on SharePoint audit logs
  • Frane Borozan on Installing standalone Remote Desktop Gateway on the Windows Server 2012 R2 without complete Remote Desktop Services infrastructure
  • Erin Platt on Installing standalone Remote Desktop Gateway on the Windows Server 2012 R2 without complete Remote Desktop Services infrastructure
  • Tad Benoit on Remote Desktop Services Manager 2016
  • Dean Hufford on Installing standalone Remote Desktop Gateway on the Windows Server 2012 R2 without complete Remote Desktop Services infrastructure
  • Peter on Remote Desktop Services Manager 2016
  • Chris on Remote Desktop Services Manager 2016

Copyright © 2019 Frane Borozan. All rights reserved