ArtikelRahmen V5 MS365 Teams 2025

Microsoft is rolling out the “Start Chat with Email Address” feature in February 2026.

On paper, this sounds harmless … a Teams user types in an email address, and communication begins. Technically, however, a significant architectural shift is taking place here, which directly attacks your identity governance if you’re not careful.

Learn more -> https://www.microsoft.com/en-IE/microsoft-365/roadmap?filters=&searchterms=513271

image 5

The problem is not the chat itself. The problem is the identity creation mechanism that runs in the background. If your user starts a chat with you partner@externe-firma.de , Microsoft will automatically create a B2B guest account in your Entra ID as soon as the other party accepts.

Here’s how this “ad-hoc” federation works technically, why it undermines your guest access policies, and how to take back control.

Architecture: Implicit vs. Explicit Guest Creation

Until now, the process for guest access has usually been explicit: a team owner invites someone to a team, or an admin creates the guest in the Entra ID. That was controllable.

With the new feature (Roadmap ID 513271), the trigger changes.

  1. Initiation: Your user enters an email address in the Teams chat that does not exist in the directory.
  2. Invitation: Teams sends an email invitation to the external partner.
  3. Provisioning: As soon as the external clicks, an Entra ID Guest User object is created in the background.

Why is this critical? Because the hurdle is lowering. There is no longer any need to “join the team”. A fleeting chat creates a permanent identity object in your tenant. These “Orphaned Guests” accumulate, potentially have access to other shared resources (depending on your Guest User Access Restrictions), and bloat your directory.

While the process respects your global Entra ID External Collaboration Settings (B2B guidelines), it democratizes guest creation to the level of a simple chat message.

Guest Access and External Access Comparison Table:

Summary in advance:

  • Guest Access is like a visitor badge: the person comes to your house (your tenant), gets an account and can work on projects.
  • External access is like a phone call: the person stays outside in their own house, but you can talk to each other (chat/calls).
:
External Access (Federation)
Main purposecollaboration (files, projects).Communication (chat, calls).
Identity / AccountA guest account is created in your Azure AD (Entra ID) (B2B user).No account in your system. The person is purely using his or her own identity.
Teams & ChannelsYes. Can be a member of Teams and see/lead channel conversations.No. No access to teams or channels.
Share files: Yes. Access to files in Teams (SharePoint) and OneDrive possible.No. File sending in chat is usually blocked.
ChatFull functionality (gifs, emojis, file attachments, editing).Restricted (plain text/emojis only; no files).
User experienceThe guest has to change tenants in the Teams client (top right) to access.The external stays in their own tenant and sees your chat there (“Native Experience”).
Apps & TabsYes. Can (depending on the setting) use tabs and apps in the team.No. No access to apps or tabs.
SearchYou can find the guest in the directory (after they’ve been added).You need to know the full email address to start the chat.
Groupchats Yes, can participate in group chats.Yes, can participate in group chats (but cannot share files).
Security / ControlSubject to your policies (MFA, Conditional Access, expiration date possible).Subject to the guidelines of the external’s own home organization.

Control | Pull the brake

Although Microsoft has developed this feature primarily for SMB (Business Basic/Standard) customers, it is also enabled by default in enterprise tenants (“Enabled by Default”). To prevent an uncontrolled increase in guest identities (identity sprawl), proactive action is required.

Since Microsoft does not yet offer a graphical interface for this setting in the Teams admin center, the configuration is mandatory via PowerShell.

1. Checking the status quo

First, validate which messaging policies have enabled the feature

Get-CsTeamsMessagingPolicy | Format-Table Identity, UseB2BInvitesToAddExternalUsers

2. Deactivation by Policy

To prevent “shadow guesting”, set the attribute UseB2BInvitesToAddExternalUsers to $false. This prevents a guest object from being generated from a chat request.

Set-CsTeamsMessagingPolicy -Identity "Global" -UseB2BInvitesToAddExternalUsers $false

Note: Replace “Global” with your specific policy names if you have differentiated roles (e.g. “Marketing allowed, Finance not”).

3. The alternative: Use external access (federation)

It’s important to understand the difference:

  • Guest Access (B2B): The user is an object in your AD. (This is what happens with the new feature).
  • External Access (Federation): The user stays in his AD, you just trust each other.

For pure chats without file exchange, External Access is architecturally cleaner, as there is no identity garbage in your tenant. Therefore, check your federation settings.



Conclusion: Comfort vs. hygiene

The “Chat with Email” feature is a classic example of the conflict between user experience and system hygiene. For the end user, the “annoyance factor” of first creating a team or asking IT for a guest account is eliminated.

image 4

From an architect’s point of view, however, you open another gateway for identities that you have to manage.

Recommendation: In strict enterprise environments, you should disable the feature globally (UseB2BInvitesToAddExternalUsers $false) and only allow it to specific “power user” groups that understand what a guest account implies. Identity Sprawl is tomorrow’s technical debt… Avoid them today.

This post is also available in: Deutsch English

Be the first to comment

Leave a Reply

Your email address will not be published.


*