Skip to main content
Hit enter to search or ESC to close
Close Search
Libertad Cyber Advisory
Menu
  • About
  • Services
  • Case Studies
  • Updates
  • Contact
    Technical Field Notes

    Why your Microsoft Teams External access is failing

    Handré van der MerweHandré van der Merwe February 8, 2026

    Home » Why your Microsoft Teams External access is failing

    In a recent migration project, we encountered a technical roadblock that appeared to defy the laws of Microsoft 365 configuration. The requirement was simple: enable external federation and chat between our client’s new tenant and their external partners.

    On paper, this is a standard configuration. In reality, it became a deep-dive into the “hidden” logic of Microsoft’s backend.

    The client was receiving the dreaded error: “We can’t set up the conversation because your organizations are not set up to talk to each other.” Despite having External Access set to “Allow all domains” in the Teams Admin Center and External Collaboration Settings in Microsoft Entra (Azure AD) wide open, the tenants remained silent.

    The Troubleshooting Rabbit Hole

    The DNS Audit: We discovered missing records and immediately applied the Microsoft standard DNS configurations. We specifically ensured the SRV records (_sip._tls and _sipfederationtls._tcp) were correctly provisioned. Even with the records propagating, the error persisted.
    External Access Configuration: In the Teams Admin Center, we navigated to Users > External access. We confirmed that “Users can communicate with other Skype for Business and Teams users” was enabled and that no specific domains were being blocked in the allow/deny list.
    PowerShell Force-Commanding: Assuming a UI lag in the Admin Center, we moved to the PowerShell SDK. We ran the commands to force AllowFederatedUsers to $True across the tenant. The output confirmed the settings were active, yet the connection remained blocked.
    Entra ID (Azure) Deep Dive: We cross-referenced the External Collaboration Policies. B2B collaboration, guest inviter roles, and cross-tenant access settings were all meticulously verified.

    After exhausting the documentation and community blogs, we looked at the one variable that isn’t found in a configuration menu: The License Lifecycle.

    The tenant was currently on a Microsoft 365 Trial Subscription.

    And there was the main culprit.

    While Microsoft documentation suggests that trials offer full functionality, there is a “reputation-based” restriction on new trial tenants. To prevent spam and malicious spoofing, Microsoft often restricts external federation for trial tenants.

    The fix wasn’t a setting; it was a conversion.

    • The Action: We converted the trial to a paid production subscription.
    • The Result: Within 24 hours of the billing change, the federation “unlocked” on the backend. No further configuration changes were required.

    The “Unknown User”: A Final Troubleshooting Note

    During this project, we also encountered a secondary visual glitch: several active users were appearing as “Unknown User” within Teams chats and channels.

    If you are seeing this, it’s usually not a configuration failure, but a byproduct of account lifecycle changes. According to Microsoft’s technical documentation, this happens by design when:

    • An account has been recently deleted.
    • An account was disabled and then re-enabled (common during migration testing).

    The Fix: While Microsoft states this can take up to two weeks to resolve automatically, you can force this to the surface faster.

    1. Have the affected user sign out of Teams completely.
    2. Sign back in.
    3. The display name should update within 72 hours instead of 14 days.

    Seems like an obvious issue now once it has been solved, but due to the technical layers of complexity one tends to jump straight into configuration troubleshooting without checking the basics like the subscription status. So if you are experiencing federation issues that bypass DNS and Admin Center logic, don’t forget to first check your subscription status.

    In your experience, when ‘standard’ configurations fail, do you find the solution usually lies in the technical settings or in the underlying licensing and vendor backend?

    Share this:

    • Share on LinkedIn (Opens in new window) LinkedIn
    • Share on WhatsApp (Opens in new window) WhatsApp
    Next Post

    Libertad joins the Okta Partner program to secure Africa’s AI-Driven Identity Perimeter

    Libertad joins the Okta Partner program to secure Africa’s AI-Driven Identity Perimeter

    You May Also Like

    Updates Don’t let the flowers wilt

    Don’t let the flowers wilt

    Handré van der Merwe
    Handré van der MerweJanuary 16, 2026
    Updates Libertad joins the Okta Partner program to secure Africa’s AI-Driven Identity Perimeter

    Libertad joins the Okta Partner program to secure Africa’s AI-Driven Identity Perimeter

    Handré van der Merwe
    Handré van der MerweFebruary 4, 2026
    Updates Why small businesses are paying for security they don’t have

    Why small businesses are paying for security they don’t have

    Handré van der Merwe
    Handré van der MerweJanuary 25, 2026

    Let's Connect

    Connect with me to navigate the friction between agile innovation and rigid corporate compliance, ensuring you secure the trust needed to close deals.

    © Libertad. 2026. Cyber Security Advisory based in Cape Town, South Africa.

    About
    Services
    Contact

    All Rights Reserved.

    Legal notice: Libertad is a registered legal entity operating under the company laws of the Republic of South Africa. Registration Number: 2010/044126/23

    Close Menu
    • About
    • Services
    • Case Studies
    • Updates
    • Contact