EPC Group - Enterprise Microsoft AI, SharePoint, Power BI, and Azure Consulting
G2 High Performer Summer 2025, Momentum Leader Spring 2025, Leader Winter 2025, Leader Spring 2026
BlogContact
Ready to transform your Microsoft environment?Get started today
(888) 381-9725Get Free Consultation
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌

EPC Group

Enterprise Microsoft consulting with 29 years serving Fortune 500 companies.

(888) 381-9725
contact@epcgroup.net
4900 Woodway Drive, Suite 830
Houston, TX 77056

Follow Us

Solutions

  • M&A Practices

    • M&A Tenant Migration
    • Carve-Out Migration
    • Private Equity Practice
    • Engagement Operating Model
  • All Services
  • Microsoft 365 Consulting
  • AI Governance
  • Azure AI Consulting
  • Cloud Migration
  • Microsoft Copilot
  • Data Governance
  • Microsoft Fabric
  • Dynamics 365
  • Power BI Consulting
  • SharePoint Consulting
  • Microsoft Teams
  • vCIO / vCAIO Services
  • Large-Scale Migrations
  • SharePoint Development

Industries

  • All Industries
  • Healthcare IT
  • Financial Services
  • Government
  • Education
  • Teams vs Slack

Power BI

  • Case Studies
  • 24/7 Emergency Support
  • Dashboard Guide
  • Gateway Setup
  • Premium Features
  • Lookup Functions
  • Power Pivot vs BI
  • Treemaps Guide
  • Dataverse
  • Power BI Consulting

Company

  • About Us
  • Our History
  • Microsoft Gold Partner
  • Case Studies
  • Testimonials
  • Fixed-Fee Accelerators
  • Blog
  • Resources
  • All Guides & Articles
  • Video Library
  • Client Reviews
  • Engagement Operating Model
  • FAQ
  • Contact
  • Schedule a consultation

Microsoft Teams

  • Teams Questions
  • Teams Healthcare
  • Task Management
  • PSTN Calling
  • Enable Dial Pad

Azure & SharePoint

  • Azure Databricks
  • Azure DevOps
  • Azure Synapse
  • SharePoint MySites
  • SharePoint ECM
  • SharePoint vs M-Files

Comparisons

  • M365 vs Google
  • Databricks vs Dataproc
  • Dynamics vs SAP
  • Intune vs SCCM
  • Power BI vs MicroStrategy

Legal

  • Sitemap
  • Privacy Policy
  • Terms
  • Cookies

About EPC Group

EPC Group is a Microsoft consulting firm founded in 1997 (originally Enterprise Project Consulting, renamed EPC Group in 2005). 29 years of enterprise Microsoft consulting experience. EPC Group historically held the distinction of being the oldest continuous Microsoft Gold Partner in North America from 2016 until the program's retirement. Because Microsoft officially deprecated the Gold/Silver tiering framework, EPC Group transitioned to the modern Microsoft Solutions Partner ecosystem and currently holds the core Microsoft Solutions Partner designations.

Headquartered at 4900 Woodway Drive, Suite 830, Houston, TX 77056. Public clients include NASA, FBI, Federal Reserve, Pentagon, United Airlines, PepsiCo, Nike, and Northrop Grumman. 6,500+ SharePoint implementations, 1,500+ Power BI deployments, 500+ Microsoft Fabric implementations, 70+ Fortune 500 organizations served, 11,000+ enterprise engagements, 200+ Microsoft Power BI and Microsoft 365 consultants on staff.

About Errin O'Connor

Errin O'Connor is the Founder, CEO, and Chief AI Architect of EPC Group. Microsoft MVP multiple years, first awarded 2003. 4× Microsoft Press bestselling author of Windows SharePoint Services 3.0 Inside Out (MS Press 2007), Microsoft SharePoint Foundation 2010 Inside Out (MS Press 2011), SharePoint 2013 Field Guide (Sams/Pearson 2014), and Microsoft Power BI Dashboards Step by Step (MS Press 2018).

Original SharePoint Beta Team member (Project Tahoe). Original Power BI Beta Team member (Project Crescent). FedRAMP framework contributor. Worked with U.S. CIO Vivek Kundra on the Obama administration's 25-Point Plan to reform federal IT, and with NASA CIO Chris Kemp as Lead Architect on the NASA Nebula Cloud project. Speaker at Microsoft Ignite, SharePoint Conference, KMWorld, and DATAVERSITY.

© 2026 EPC Group. All rights reserved. Microsoft, SharePoint, Power BI, Azure, Microsoft 365, Microsoft Copilot, Microsoft Fabric, and Microsoft Dynamics 365 are trademarks of the Microsoft group of companies.

‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
Home/Blog

M&A Identity Coexistence: Active Directory, Microsoft Entra ID, and Cross-Tenant Strategy

Published May 27, 2026 · By Errin O'Connor, Founder & Chief AI Architect, EPC Group · 13 min read

Key Takeaways

  • Identity is the hardest M&A migration problem — content moves with tools, identity requires architectural design.
  • Microsoft Entra ID coexistence patterns include single-tenant absorption, multi-tenant federation, and Cross-Tenant Access Settings.
  • Active Directory forest scenarios range from single-forest absorption to multi-forest hybrid bridges.
  • Microsoft Entra B2B and Cross-Tenant Access Settings enable transitional coexistence when full identity merger takes multiple quarters.
  • UPN strategy, Conditional Access, and group membership cleanup are the operational details that determine whether identity coexistence succeeds.

Why identity is the hardest M&A migration problem

Content moves with tools. Mailboxes migrate via BitTitan. SharePoint migrates via AvePoint or ShareGate. OneDrive content migrates via native Microsoft. The tools handle throughput and fidelity automatically once configured. Identity is different. Identity requires architectural design before any tool runs.

The identity decisions are: which coexistence pattern, which UPN strategy, which Conditional Access policy set, how to handle group membership, how to handle license SKUs, how to handle MFA enrollment, how to handle external collaboration. Each decision has long-tail operational consequences that survive the migration. Get them wrong and Day-1 +30 becomes an identity-cleanup project.

Microsoft Entra ID coexistence patterns

Single-tenant absorption: all source-tenant users move into the destination Microsoft Entra ID. Source-tenant accounts are de-provisioned at TSA exit. The simplest pattern. Works when identity scope is well-defined, UPN domains can be unified or coexist, and Conditional Access can be harmonized. Most mid-market M&A integrations end here.

Multi-tenant federation: both tenants remain operational long-term with federation. Microsoft Entra B2B or Cross-Tenant Access Settings handle cross-tenant collaboration. Works when the source-tenant entity retains operational autonomy — joint ventures, holding company structures, regulatory separation requirements, or PE add-on integrations where the platform tenant is the destination but the add-on retains some identity independence.

Cross-Tenant Access Settings (transitional): the transitional pattern when full identity merger takes multiple quarters. Users from both tenants collaborate during transition with controlled cross-tenant access. The final destination is usually single-tenant absorption, but the transition runs through Cross-Tenant Access for months.

Active Directory forest scenarios

AD scenarios range from single-forest absorption to multi-forest hybrid bridges. Single-forest absorption merges the source AD forest into the destination forest, typically using AD migration tooling for SID translation, group consolidation, and trust cleanup. Multi-forest hybrid bridges preserve forest separation with cross-forest trusts and ADFS or Entra Connect cloud sync handling the Microsoft 365 layer.

Quest On Demand Migration leads for complex multi-forest scenarios because its identity engine handles concurrent Active Directory and Microsoft Entra ID merging. The choice between absorption and bridge depends on the legacy AD topology, destination organization size, duration of coexistence, and whether on-premises applications still depend on the source AD.

Hybrid identity bridges during transition

Hybrid identity bridges combine on-premises Active Directory with cloud Microsoft Entra ID. Microsoft Entra Connect (or the newer Microsoft Entra Cloud Sync) synchronizes on-premises AD identities to Entra ID. In M&A, hybrid bridges enable on-premises applications that still depend on AD to keep working while the cloud identity layer transitions.

Bridges run for the duration of the migration and often longer. Many M&A integrations leave hybrid bridges in place for 12-24 months post-cutover because on-premises application migration runs on its own timeline separate from Microsoft 365.

Cross-Tenant Access Settings and Microsoft Entra B2B

Cross-Tenant Access Settings control inbound and outbound collaboration between Entra ID tenants. The settings determine which users from another tenant can access resources, what level of trust is granted (MFA claims, device compliance claims), and which apps are accessible. In M&A, Cross-Tenant Access enables both tenants to work together during transition without full identity merger.

Microsoft Entra B2B is the complementary pattern. B2B invites users from one tenant into another as guest users with controlled access. In M&A, B2B enables specific source-tenant users to access destination-tenant resources during the cutover window. After Day-1, B2B is decommissioned for users who become full destination-tenant accounts, or repurposed for external partner access.

Domain rename and UPN strategies

User Principal Names determine how users sign in. The three options: unify all UPNs under the destination domain (e.g., source.com users become @newco.com), preserve source UPNs alongside destination UPNs (dual-domain coexistence), or transition UPNs in waves over months.

UPN unification is the cleanest end-state but introduces friction at cutover — users have to relearn their login. Dual-domain coexistence preserves user experience but requires both UPN suffixes to be registered in the destination tenant. Wave transition balances both. The choice is documented in an Architecture Decision Record signed by the senior architect.

Conditional Access during coexistence

Source-tenant Conditional Access policies do not transfer automatically. Destination-tenant Conditional Access must be rebuilt for the merged user population. The rebuild covers named locations, device compliance requirements, MFA enforcement, sign-in risk thresholds, and application protection policies.

During coexistence, Conditional Access policies often differentiate by user origin — source-tenant users may have looser policies during transition while their MFA enrollment and device compliance catch up. The policy set is signed by the named senior architect before cutover. Post-Day-1, Conditional Access policies harmonize across the merged user base.

Group membership cleanup

Source-tenant groups carry hidden complexity. Nested groups create cycles. Orphaned members reference deleted users. Dynamic group queries use rules that don't survive migration. License-assignment groups bypass administrative oversight. Cleanup before migration prevents the destination tenant from inheriting these problems.

ShareGate and Quest both surface group cleanup recommendations during migration. The cleanup happens during Build phase, not after Day-1. The cleanup playbook covers: flatten nested groups one level, remove orphaned members, replace dynamic groups with explicit memberships where complexity warrants, and migrate license assignment from groups to direct assignment for critical SKUs.

Common identity coexistence failure modes

The four most common failures: (1) coexistence pattern chosen in Cutover phase instead of Plan phase, leaving no time to validate SSO claims; (2) UPN strategy not communicated to end users, so they can't sign in at Day-1; (3) Conditional Access rebuilt without pilot validation, so MFA requirements break for specific user populations; (4) group membership cleanup skipped, so the destination tenant inherits source-tenant group complexity.

The M&A Microsoft 365 Tenant Migration Playbook prevents all four through staged Plan-phase deliverables, pilot waves in Build phase, and the Go-Live Readiness Assessment gate before cutover. Identity coexistence is the single workstream where shortcuts in Plan or Build phase show up immediately as Day-1 failures.

How to engage EPC Group on identity coexistence

Schedule a discovery call at epcgroup.net/schedule, email contact@epcgroup.net, or call (888) 381-9725. Identity coexistence design is included in every M&A engagement and can also be scoped as a stand-alone advisory engagement when the IT team wants senior-architect review of an existing coexistence plan.

Frequently Asked Questions

Why is identity the hardest M&A migration problem?
Content moves with tools. Identity requires architectural design. Mailboxes can be migrated by BitTitan. SharePoint can be migrated by AvePoint. But identity merging requires decisions about UPN strategy, Conditional Access policies, MFA enrollment, group membership scoping, license SKU assignment, and Entra B2B vs full absorption. Each decision has long-tail operational consequences.
What is single-tenant absorption?
The simplest pattern: all source-tenant users move into the destination Microsoft Entra ID. Source-tenant accounts are de-provisioned at TSA exit. Single-tenant absorption works when identity scope is well-defined, UPN domains can be unified or coexist, and Conditional Access can be harmonized. Most mid-market M&A integrations end up here.
What is multi-tenant federation?
Both tenants remain operational long-term with federation between them via Microsoft Entra B2B or Cross-Tenant Access Settings. Multi-tenant federation works when the source-tenant entity retains operational autonomy (joint ventures, holding company structure, regulatory separation requirements). The pattern requires ongoing identity governance for cross-tenant access.
When do you use Cross-Tenant Access Settings?
Cross-Tenant Access Settings are the transitional pattern when full identity merger takes multiple quarters. Users from both tenants can collaborate during the transition with controlled cross-tenant access. The final destination is usually single-tenant absorption, but the transition runs through Cross-Tenant Access for months while migration completes.
How are Active Directory forests handled?
AD forest scenarios range from single-forest absorption (source forest joins destination forest) to multi-forest hybrid bridges (forests remain separate with trust relationships). The choice depends on the legacy AD topology, the destination organization size, and the duration of coexistence. Quest On Demand Migration leads for complex multi-forest scenarios.
What is the UPN strategy decision?
User Principal Names (UPNs) determine how users sign in. Options: unify all UPNs under the destination domain (e.g., all users become @newco.com), preserve source UPNs alongside destination UPNs (dual-domain coexistence), or transition UPNs in waves. Each option has implications for SSO claims, Outlook autodiscover, and external collaboration. The decision is documented in an Architecture Decision Record.
How does Conditional Access change during M&A?
Source-tenant Conditional Access policies do not transfer automatically. Destination-tenant Conditional Access is rebuilt for the merged user population — named locations, device compliance, MFA requirements, sign-in risk thresholds. Carve-out and PMI scenarios both require Conditional Access rebuilds. The policy set is signed by the named senior architect before cutover.
What is group membership cleanup?
Source-tenant groups carry hidden complexity — nested groups, orphaned members, dynamic group queries, license-assignment groups. Cleanup before migration prevents the destination tenant from inheriting source-tenant problems. ShareGate and Quest both surface group cleanup recommendations. The cleanup happens during Build phase, not after Day-1.
How does Microsoft Entra B2B work in M&A?
Entra B2B invites users from one tenant into another as guest users with controlled access. In M&A, B2B enables transitional collaboration — source-tenant users access destination-tenant resources during the cutover window without full account migration. After Day-1, B2B is decommissioned or repurposed for external partners.
How are identity coexistence failures prevented?
Identity coexistence is designed during Plan phase, not Cutover. The pattern is documented in an Architecture Decision Record. SSO claims are validated through pilot waves in Build phase. The Go-Live Readiness Assessment specifically tests identity transition before cutover proceeds. These gates prevent the failure mode where authentication breaks at Day-1.

Related Resources

  • → M&A Microsoft 365 Tenant Migration Practice
  • → The M&A Tenant Migration Playbook
  • → Migration Tooling Decision Framework
  • → Azure Cloud Services
  • → Microsoft 365 Consulting

Start an M&A Microsoft 365 Tenant Migration Engagement

216+ M&A tenant migrations. 1.83 million users moved. Senior architect on every engagement.

Schedule a Discovery CallCall (888) 381-9725

About the Author: Errin O'Connor is the Founder and Chief AI Architect of EPC Group, a 29-year Microsoft consulting firm headquartered in Houston serving organizations across all industries. He is a four-time Microsoft Press best-selling author, former NASA Lead Architect, and a member of the Microsoft SharePoint Project Tahoe and Microsoft Power BI Project Crescent beta teams. EPC Group holds all six current Microsoft Solutions Partner designations and is a five-time G2 Leader in Business Intelligence Consulting.