External users are collaborators from outside your organization. From an administrative perspective, these are people who have been invited to collaborate on your company’s content. External users can be granted the same collaborator access and sharing rights as managed users, but your control over the content they own and their security settings are limited. The differences between external users and managed users are detailed below. Note Your organization may also have unmanaged users. These are people who are part of your organization but are using unlicensed Box accounts, possibly because they signed up for an account on their own, or already had one, outside of your organization. Unmanaged users may or may not also be external users, but they also represent a potential security risk, as they are not subject to your organization’s Box security and compliance policies. Run a User Details report to identify your unmanaged users.Documentation Index
Fetch the complete documentation index at: https://docs.box.com/llms.txt
Use this file to discover all available pages before exploring further.
Differences Between External and Managed Users
With Box, you can invite collaborators from outside your company into folders you own. These users, known as External Users, can be given the same permission levels and have access to the same Box features as your Managed Users. Here is a quick overview on the differences between managed and external user abilities:| Managed Users | External Users | |
| Enterprise collaborator roles and access levels | X | X |
| Social workflow tools | X | X |
| Ability to sync to desktop | X | X |
| Access to Box app store | X | X |
| Access to Box for mobile | X | X |
| Managed Users | External Users | |
| Admin can create the user | Yes | No |
| Users can be placed in user groups | Yes | No |
| Users can be deleted and their content automatically transferred | Yes | No |
| Admin can instant log-in to user account | Yes | No |
| Admin can enforce device pinning policies | Yes | No |
| Activity appears in Admin Console usage reports | Yes | Yes |
| Subject to the exact configuration of password requirements (numbers, letters, etc.) | Yes | No |
| Subject to strong password requirements | Yes | Yes |
| Subject to SSO requirements | Yes | No |
