Skip to main content
Sometimes, you may want to give access to Neo Agent to an external user, such as a contractor or third-party support engineer. This guide explains how to add them as a Guest User in your Microsoft Entra ID (formerly Azure AD) tenant and limit their access so they can only use the Neo Agent web app.

Add External User as a Guest in Azure AD

1

Access Microsoft Entra Admin Center

Go to the Microsoft Entra admin center: https://entra.microsoft.com
2

Navigate to Users

In the left-hand menu, navigate to: Identity > Users > All users
3

Invite External User

Click on the arrow next to the New user button and select Invite external user
4

Fill Out the Form

Complete the invitation form:
  • Display Name: Full name of the user
  • Email: External email address (e.g., Gmail, or another company domain)
  • You may optionally personalize the invitation message
5

Send Invitation

Click Invite to send the invitation
Microsoft Entra ID interface showing how to invite an external user with form fields for display name and email

Assign Guest User to the Neo Agent App

1

Access Enterprise Applications

In the Entra Admin Center, go to: Applications > Enterprise applications
2

Find Neo Agent App

Search for Neo Agent, and click into the app
  • Application ID: 3da03a86-b850-4c07-96e5-7590022efe11
3

Add User Assignment

Go to: Users and groups > Add user/group
4

Select Guest User

Select the newly added guest user
5

Assign Role (Optional)

If you’ve defined App Roles in your Neo Agent App Registration (e.g., Viewer, Admin), assign the appropriate role here
6

Complete Assignment

Click Assign to complete the process
Microsoft Entra ID Enterprise Applications interface showing how to assign a guest user to the Neo Agent application
When you invite a guest user (external user) into your Microsoft Entra ID tenant, they have zero access by default to your resources. To ensure the guest user only accesses Neo Agent:
  • Do not assign them to any other Azure groups or roles
  • Avoid assigning any Azure roles like Contributor or Reader
Follow the principle of least privilege. Only grant the minimum access necessary for the external user to perform their required tasks in Neo Agent.

Let the Guest User Log In

The guest user will receive an invite email from Microsoft. Once accepted, they can:
  1. Sign in to the Neo Agent web app via your standard login URL: https://dashboard.neoagent.io
  2. Use Microsoft OAuth just like your internal users

Troubleshooting Access Issues

If they encounter an “Access Denied” error:
  • Verify they accepted the invite
  • Check that they are assigned to the Neo Agent enterprise app
  • Review Conditional Access policies that may block them
Test the external user’s access immediately after setup to ensure everything works as expected before they need to use it for actual work.

Frequently Asked Questions

Yes. Microsoft Entra supports any email via its B2B system. If the user doesn’t have a Microsoft account, they’ll be prompted to create one during the invitation acceptance process.
Yes. You can:
  • Remove them from the Neo Agent application assignment
  • Delete the user entirely from your directory if needed
  • Disable their account temporarily if you need to suspend access
No. Guest users only have access to resources you explicitly assign to them. By default, they cannot see or access any other services, applications, or data in your tenant.
You can create Azure AD groups specifically for external Neo Agent users and assign the entire group to the Neo Agent application. This makes management easier when you have multiple contractors or partners.
External users will be subject to the same RBAC permissions within Neo Agent as internal users. You can assign them appropriate roles (Admin, User, Viewer) based on their needs and responsibilities.

Security Best Practices

  • Regular Review: Periodically review all external user accounts and remove those no longer needed
  • Time-Limited Access: Consider setting expiration dates for external user accounts when possible
  • Monitor Activity: Use Azure AD audit logs to monitor external user activity
  • Conditional Access: Apply appropriate Conditional Access policies to external users based on your security requirements
  • Documentation: Maintain records of why each external user was granted access and when their access should be reviewed
External user access is managed entirely through Microsoft Entra ID. Neo Agent inherits the authentication and authorization decisions made by your identity provider, ensuring consistent security policies across all your applications.