Why B2B is the preferred way to access GDOTS resources.
A B2B (business-to-business) connection is a trust relationship between your organization's Microsoft tenant and the GDOTS tenant. Once established, your users can access GDOTS resources using their own work credentials, the same username and password they already use every day.
No more separate GDOTS guest accounts. No more extra passwords. No more separate MFA setup.
No separate passwords: Your users sign in with their existing organizational credentials. No need to create, remember, or manage a separate GDOTS guest password.
MFA handled by your organization: Multi-factor authentication is managed through your own organization's existing MFA setup. Users don't need to configure a separate MFA method for GDOTS.
Easier onboarding: When new people in your organization need GDOTS access, they don't need to go through the guest account setup process. They can be granted access and sign in immediately with their work credentials.
More secure: Identity management stays centralized under your organization's control. When someone leaves your organization, their access to GDOTS is automatically revoked when you disable their account. No separate GDOTS account to track.
Seamless experience: One fewer account to manage. Your users access GDOTS resources the same way they access everything else, with their normal work login.
B2B partners must enforce MFA for their users and, for ITAR-controlled sites, verify that users meet U.S. person requirements. See the requirements section below.
| Feature | Guest Account | B2B Connection |
|---|---|---|
| Sign-in credentials | Separate @guest.gdots.com account | Your own work credentials |
| Password management | Managed separately from your org | Managed by your org (no extra password) |
| MFA | Separate MFA setup with GDOTS | Your org's existing MFA |
| New user onboarding | Each user sets up a guest account | Grant access, and they sign in immediately |
| Offboarding | Must notify GDOTS to disable account | Disable their org account, and GDOTS access is revoked automatically |
| SharePoint access | Same | Same (permissions are preserved) |
Setting up a B2B connection is a one-time configuration by your organization's IT administrator:
When the switch happens, your users will:
@guest.gdots.com username and passwordFor details on the conversion process, see Converting from Guest to B2B.
Share the B2B Setup Guide with your IT team.
This section provides informational guidance about requirements for B2B connections with GDOTS. It is not legal advice. Consult your organization's compliance and legal teams for definitive guidance on your specific obligations.
GDOTS operates in Microsoft Azure Government GCC High, an environment built for workloads requiring the highest levels of federal security compliance. Regardless of your organization's own compliance posture, GDOTS maintains these protections on all data in its tenant:
With B2B, your organization provides the identity — GDOTS controls the data and enforces security on its side.
To establish a B2B connection, your organization must meet these requirements:
Some GDOTS SharePoint sites contain data controlled under the International Traffic in Arms Regulations (ITAR). If your users will access these sites, the following apply:
Your GDOTS point of contact can clarify which SharePoint sites contain ITAR data and which do not.
If your organization is a DoD contractor or subcontractor that independently processes, stores, or transmits CUI (Controlled Unclassified Information), you may have compliance obligations under your own contracts that go beyond what GDOTS requires for B2B. These are obligations between your organization and your contracting authority — not requirements imposed by GDOTS.
Common frameworks that may apply to your organization independently:
| Framework | What It Covers |
|---|---|
| DFARS 252.204-7012 | Adequate security for CUI per NIST SP 800-171; 72-hour cyber incident reporting to DoD |
| DFARS 252.204-7021 | CMMC certification at the level specified in your contract |
| NIST SP 800-171 | Security requirements for protecting CUI in nonfederal systems and organizations |
| ITAR (22 CFR 120-130) | Controls on export and access to defense articles and technical data; U.S. persons requirement |
If you are unsure whether these apply to your organization, consult your compliance or legal team.
Follow the B2B Setup Guide to configure the technical connection. Contact your GDOTS point of contact with any questions.