| Status | |
| Owner | Eric Triffaux |
| Stakeholders | James Kyndt, Damien Avril, Frank Bolata, Boris Foiselle, Owen Pettiford |
The Challenge: Outdated and Unsecure Collaboration
Historically, our approach to external collaboration relied on simple domain whitelisting. While this allowed some level of interaction with partners, it came with significant limitations and risks:
The Opportunity: Embracing B2B Guest Collaboration
As we migrate from Google Workspace to Microsoft 365, we have a unique opportunity to modernize how we collaborate externally. B2B Guest Collaboration offers a structured, secure, and flexible way to work with partners, suppliers, and customers:
The Vision: Towards Entitlement Management
Our long-term goal is to implement Entitlement Management—a system that automates and governs access rights for both internal and external users. This will allow us to:
Conclusion
By moving away from unsecure, manual processes and embracing B2B Guest Collaboration, Syensqo positions itself as a modern, agile, and secure organization—ready to drive scientific breakthroughs through seamless and trusted partnerships.
Guests Are external users outside of Syensqo who only require access to content shared in M365 (e.g. Sharepoint), and to collaborate with Syensqo users on this content. Their work is generally not carried out using Syensqo IT systems, and their work is generally not directed by Syensqo employees or governed by Syensqo policies and procedures.
Examples of External Users could be:
Contingent workers are non-employee workers who are represented in the SuccessFactors org structure and may fulfil a number of different roles at Syensqo. They do require access to IT systems beyond M365 in order to perform their work, and their work is generally directed by Syensqo personnel and carried out in accordance with Syensqo policies and procedures.
Examples of External Users could be:
By definition, Guest users and Contingent workers are non-overlapping sets. All, or the vast majority of, the ~3,966 people in SuccessFactors flagged as 'External' are by definition not External users as per above.
Because they perform work in Syensqo systems other than M365, and are subject to Syensqo policies (thus requiring access to learning systems, The Hub intranet, etc.), they will require a proper Syensqo EntraID account and some kind of M365 license.
The exact type of license can be determined based on need, and we should not assume that an E5 license is needed by default. Lower-cost licenses such as F3 may suffice for their work.
Scenario 5: B2B + Entitlement Management
No information on Google personal MyDrive document sharing with externals.
154 domains whitelisted between AODocs and Shared Drive.
That represent External sharing with 1572 users, not covered by contingent worker identity (Guests)
.
In addition 2368 contingent worker users covered by a microsoft license.


Human Identity type | AD/ EntraID | Syensqo MFA | Mailbox | On-premise applications | TPA / Workstation | SaaS applications | M365 workload | Comment |
Employee | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Same as today |
Contingent worker* | Yes | Yes | Yes | Yes | Yes if non Saas application. | Yes | Yes | Mandatory for external requiring access to on-premise application or applications integrated with SSO, except M365 |
Guest for collaboration | No | Maybe – depending if default guest authentication flow is acceptable in terms of security – need to deep dive | No | No | No | No | Yes (under condition: effective license management, secured authentication with MFA or at least security approval, access management/ACL/process) | For external collaboration – not to replace all contingent workers, equivalent to Google external sharing |
*some contingent worker might be eligible to Guest, while only using GWS / M365 platform.
No need to provide a workstation.
No need to access other Syensqo applications.

Option 1: no external sharing → Solution by default without consensus
Option 2: TODAY in GWS (uncontrolled sharing and domain whitelisting*)
Option 3: External using contingent worker identity only
Option 4: B2B + DLP Integration
Option 5: B2B + Entitlement Management
The decision was made to select Option 5, as it ensures the same level of security and collaboration. Additionally, during the transition from GWS to M365, we will be able to achieve stronger security through measures such as disabling anonymous sharing, blocking external sharing, and enforcing sharing link expiration.
This is only the beginning of the external collaboration journey, referred as Phase 1: Foundation & Risk Mitigation, and it serves as a directional guide for the future.
The subsequent phases — Phase 2: Controlled B2B Pilot, Phase 3: Operationalization & Governance, and Phase 4: Expansion & Application Access — represents the path toward the target operating model and require deeper and broader analysis, which is outside the scope of the M365 Migration project.
Phase 1: Foundation & Risk Mitigation Objective: Replace legacy domain whitelisting Actions:
|
|---|
Phase 2: Controlled B2B Pilot
Objective: Enable secure collaboration for Guest
Actions:
Phase 3: Operationalization & Governance
Objective: Institutionalize B2B collaboration
Extend to (RFP/project-based)
Actions:
Phase 4: Expansion & Application Access
Objective: Broaden guest access to additional apps
Actions:




The following section describes relevant documentation:
Description | Repository | ||
| TDA External Collaboration Slide deck | |||
| M365 Key Decision - External Collaboration - meeting minutes | |||
LM01_KDD001 - Migration Strategy