Guest access is no longer a “set it and forget it” problem.
Most organizations today collaborate heavily with vendors, partners, auditors, and consultants using Microsoft Entra B2B. Over time, this creates a silent risk: Inactive guest users with persistent access to your tenant.
To address this, Microsoft introduced Guest governance with Monthly Active User (MAU), based billing tied to advanced governance actions, not just guest presence.
In this blog, I’ll break down:
- How guest MAU billing really works
- What triggers billing (and what does NOT)
- What changes are mandatory from January 2026
- And finally, a practical lifecycle workflow use case to automatically offboard inactive guest users
Guest Licensing in Microsoft Entra: MAU Model at a Glance
Microsoft Entra now licenses guest and external users using a Monthly Active User (MAU) model. Instead of assigning licenses upfront, billing is based on actual sign-in activity, making external collaboration more flexible and cost-effective.
The MAU model under Microsoft Entra External ID applies to:
- B2B guest users in workforce tenants (
userType = Guest) - All users in Microsoft Entra External tenants (consumers, business guests, and admins)
Internal users (userType = Member) signing in across multiple tenants are not counted toward MAU usage.
An MAU is counted only when an external user authenticates at least once in a calendar month. Microsoft aggregates MAUs across all tenants linked to the same subscription.
To reduce costs, Microsoft provides a free tier of up to 50,000 MAU, and you only pay as usage grows. This replaces the older 1:5 guest-to-license model, aligning costs with real usage rather than directory size.
To link an Azure subscription to your Microsoft Entra ID tenant and begin MAU billing for external user sign-ins, sign in to the Microsoft Entra admin center, navigate to External Identities, and then select Linked subscriptions.
On the Link Subscription page, select the required Azure subscription and resource group to add the billing unit. Once selected, click Apply to attach the Azure subscription to your Microsoft Entra ID workforce tenant for guest user Billing, first 50000 users won't be billed.
Understanding Guest MAU Billing in Microsoft Entra ID Governance
You are not billed just because a guest exists in your tenant(If you are not exceeding 50,000).
You are billed only when a guest actively uses advanced governance features during a given month.(Even with in 50,000 Free MAU as well)
Who is considered a guest?
A user is treated as billable only if:
- userType = Guest
- Regardless of where they authenticate from
- Regardless of whether they come from another Entra tenant or external IdP
What Actually Triggers Billing for Entra Governance?
Billing is triggered per month, per guest, only when governance-exclusive actions occur.
Some common real-world examples include:
- A guest requests an access package (or someone requests it on their behalf)
- A guest is assigned to an Entra ID role via Entitlement Management
- A guest goes through PIM for Groups via access packages
- A policy uses sponsor approvals, custom extensions, or Verified ID
- A Lifecycle Workflow runs for a guest user
- A guest is included in machine-learning assisted access reviews
- A guest is explicitly marked as governed
If none of these actions happen in a month → no billing for that guest.
What Is Not Billed?
This is where many admins get confused.
Basic Governance features that are already included with Microsoft Entra ID P2 are not billed under the guest MAU model.
That means:
- Basic access reviews
- Standard entitlement management scenarios
- Existing P2-based guest governance
No sudden billing surprises, as long as you’re not using Governance-exclusive features.
No Free Tier for Guest Governance MAU
Unlike some Entra features, there is no free MAU allowance here.
- Governance billing applies to all guest users, even within the first 50,000 MAU
- Billing is action-based, not volume-based
Multitenant Organizations: A Smart Cost Optimization
There’s an important exception worth calling out.
If:
- A Microsoft Entra ID Governance licensed user comes from another Entra tenant
- And is part of a multitenant organization
- And is added with
userType = Member
That user does NOT count toward guest MAU billing
This is a strong architectural option for large partner ecosystems.
However, to use Microsoft Entra ID Governance features, the tenant must have at least one of the following licenses assigned to an administrator:
- Microsoft Entra ID Governance
- Microsoft Entra Suite
Guest users themselves do not require individual (per-user) licenses to be governed under these features.
January 2026: Enforcement Is Coming
Starting January 2026, Microsoft will enforce subscription linking for guest governance.
If your tenant is not linked to an Azure subscription, you will lose access to several governance features for guests.
What you won’t be able to do without the add-on
- Create advanced guest access reviews
- Use sponsor approvals, Verified ID, or custom extensions
- Create guest auto-assignment policies
- Mark guests as governed
- Run Lifecycle Workflows scoped to guests
This is not just a billing change, it’s a functional enforcement.
How to link an Azure subscription for a guest user governance scenario
If an Azure subscription is already linked from the External Identities section, MAU billing is already active guest users but not Governance Billing for Guest users.
For Guest User Governance feature License activation ,Login to the Microsoft Entra admin center, go to Identity Governance, select Guest access governance, and click Get started.
Since the Microsoft Entra Suite add-on is already available in my tenant, governance features will be activated and tenant member users can start using these benefits immediately. The Below steps only required for your Guest users.
In the Identity Governance – Guest access setup, select the required Azure subscription and resource group, then click Turn on billing for Guest Governance.
The billing rate is $0.75 per guest per month will be shown. Once the correct subscription and resource group are selected, click Turn on to start the billing meter for the Guest Governance feature.
Within a few minutes, the subscription will be attached and ready for guest user governance. You will also see a Turn off option if you want to disable Guest Governance billing at any time.
Practical Use Case: Offboarding Inactive Guest Users Automatically
Microsoft Entra ID Governance offers multiple features for managing guest user accounts, as highlighted earlier. Among these, automatically offboarding inactive guest users is a key capability that many enterprises find especially valuable.
This is where things get really interesting.
Let’s walk through a real, practical scenario using Lifecycle Workflows.
Problem
- Guests join for short-term collaboration
- Projects end
- Guests remain inactive, but still have access
- Manual cleanup never happens
Solution
Use the “Offboard inactive users” lifecycle workflow template and extend it to guest users.
Entra Lifecycle workflows in action (Guest User Scenario)
On the Workflow tasks page, we will add two tasks:
- Send an email to the manager or sponsor of the guest user to notify them about the inactivity.
- Disable the guest user account.
You can rearrange the tasks as needed. Click on each task to customize it based on your requirements.
Let’s start by configuring the first task, which sends an email notification about user inactivity. Provide the required name, description, and customize the email notification template accordingly.
The email customization template can be tailored to meet your specific business requirements.
Now, let’s configure the User Disable task.
Now, let’s review the Lifecycle workflow, verify that the schedule is enabled, and then create the workflow.
Now that the workflow is ready for execution,
Now, we will create our second Lifecycle Workflow to remove any group or Teams memberships and delete the guest account that has been disabled and has not signed in for more than 120 days.
Remove Disabled Guest Accounts
Click Create workflow, select the same template used earlier ,Offboard inactive users and then click Select.
Enter the workflow details, including the name, description, and set the trigger type to Sign-in inactivity. Configure the inactivity period to 120 days.
In this scenario, guest accounts are first disabled after 90 days of inactivity, and after 120 days, we will remove any group memberships and delete the guest account.
This timeline can be adjusted based on your business requirements, this is just an example scenario.
Next, in the Scope details and Rules section, set userType to Guest and accountEnabled to False, then continue with the configuration
In the Workflow tasks section, you can add any tasks required, such as removing the guest user from groups or Microsoft Teams channels.
In this example scenario, I’m adding only the task to delete the guest account from the Microsoft Entra ID tenant.
In the next step, review the workflow, ensure the schedule is enabled, and then click Create.
Now both workflows are ready. They will run automatically based on the default schedule (every 1 hour), which cannot be modified. However, you can run the workflows on demand at any time if needed.
Now, let’s review the workflow that disables guest accounts which have not signed in for the past 90 days. You can see the next scheduled run time displayed below.
When you select summary tab, detailed information is displayed. As shown in the screenshot below,
If you click on a specific guest user, you can view detailed information showing whether the workflow execution was successful or failed, along with the related task details.In the below screenshot user experienced a failed execution.
The failure occurred because the email notification task could not run, as no manager/sponsor attribute was configured for the guest user. Since the “Continue on error” option was not enabled for this task, the workflow stopped entirely and did not proceed to execute the second task for this specific user.
Now that the task has been successfully completed, the guest account will no longer appear in the Microsoft Entra ID Users list. Instead, it will be visible under the Deleted users tab.
When we review it there, we should see the account listed as a Guest, with the deletion timestamp matching the workflow execution time.
Dormant guests with no workflow execution → no charge
Why Guest User Lifecycle Workflows Are Worth It
- Reduces standing access risk by automatically offboarding inactive guests
- Meets audit and compliance expectations with consistent, policy-driven governance
- Eliminates manual quarterly cleanup efforts through automation
- Aligns costs directly with real governance activity, ensuring value-based spending
Final Thoughts
Guest access is no longer just an identity feature ,it’s a governance responsibility.
The MAU billing model:
- Encourages intentional governance
- Charges only when advanced controls are used
- Pushes organizations toward automation over sprawl
If you’re already managing guests seriously, Lifecycle Workflows alone justify the model, especially for offboarding inactive external users.
Good governance is not about having more guests.
It’s about knowing when they should no longer be there.



































0 Comments