External recipient can't open encrypted email that uses Microsoft Purview Message Encryption – Outlook

Microsoft Technical Article






Technical Guide: Troubleshooting External Recipient Access for Purview Encrypted Emails

🚀 Overview

In modern enterprise environments, Microsoft Purview Message Encryption is a cornerstone for protecting sensitive data. However, IT administrators frequently encounter a scenario where external recipients—those outside the sender’s Exchange organization—are unable to view encrypted content directly within their Microsoft Outlook desktop applications.

Typically, when a user sends an encrypted message, the recipient expects a seamless experience. Instead, they often face one of two roadblocks: the message body appears completely blank, or they are forced out of their desktop workflow and directed to a web-based “Read the message” link via the Microsoft Purview encryption portal. This guide details the underlying authentication mechanics and security policy conflicts that cause these disruptions.

🔍 Key Technical Details

To resolve this issue, it is vital to understand how the Outlook client handles decryption. Unlike web or mobile clients that handle decryption at the service level, the Outlook desktop client must actively communicate with the sender’s infrastructure to verify permissions.

  • 🛡️ The AIP Endpoint Dependency: For the Outlook desktop client to decrypt a message locally, it must establish a secure connection to the Microsoft Azure Information Protection (AIP) endpoint associated with the sender’s Exchange Online tenant.
  • 🚫 Conditional Access (CA) Barriers: If the sender’s tenant has an external-facing Conditional Access policy that restricts access to cloud applications, it may inadvertently block the AIP endpoint. If the recipient’s client cannot “call home” to this endpoint, decryption fails.
  • 🔐 MFA Interference: Multi-factor Authentication (MFA) policies can create a secondary barrier. If the sender’s tenant requires MFA for the AIP endpoint, the external client—which may not have a valid MFA session or trust relationship with the sender’s tenant—will be denied the necessary decryption keys.
  • 🏷️ Sensitivity Label Restrictions: The issue may also stem from the Sensitivity Label applied to the email. If the label is configured with encryption but its scope is limited (e.g., set to “Internal Only”), any recipient outside the organization will be blocked by design, regardless of their client version.
  • 💻 Affected Software: This behavior is observed across a wide range of clients, including:
    • Outlook for Microsoft 365 (Windows & Mac)
    • Outlook 2021, 2019, and 2016
    • Outlook 2021 and 2019 for Mac

⚠️ Impact

For the end-user, this results in a disjointed and often confusing experience. Instead of reading an email natively, they are redirected to a browser-based portal, which can hinder productivity and lead to a surge in IT support tickets. For the administrator, it creates a tension between high-security postures (like “Zero Trust” CA policies) and the need for seamless cross-tenant collaboration. If left unaddressed, it may lead users to seek less secure methods for sharing sensitive information.

⚙️ Resolutions and Remediation

Administrators can implement the following technical solutions based on the specific root cause identified in their environment:

🛠️ Primary Resolutions

  • Modify Conditional Access Policies: If a CA policy is blocking the connection, navigate to the Microsoft Entra admin center and exclude Microsoft Azure Information Protection from the list of blocked cloud apps within your external-facing policies.
  • Audit Sensitivity Labels: Review the settings for the applied label in the Microsoft Purview compliance portal. Ensure that the “Assign permissions now or let users decide” settings do not explicitly exclude external domains or users.

💡 Technical Workarounds

  • Guest User Provisioning: If your CA policies allow Guest Users but block general external users, adding the recipient to your tenant as a Guest User can provide the necessary identity context for the AIP endpoint to allow the connection.
  • Client Redirection: Direct the recipient to use Outlook on the web (OWA), Outlook for iOS, or Outlook for Android. These clients perform decryption within the service itself, bypassing the need for the local client to connect directly to the AIP endpoint.
  • MFA Policy Exclusions: Within Microsoft Entra Identity Protection or your CA policies, consider excluding specific external recipients or verified guest users from MFA requirements when accessing the AIP endpoint specifically.

Official Source: Read the full article on Microsoft.com