The answer is True
With numerous types of users accessing an extranet which is a private network with services and data made available to external users, authorization and entitlement policies must be complete and accurate. Authorization policies not granular enough could easily lead to data and other types of compromise exposures. Extranet entitlement policies should be designed and managed appropriately and enforce authentication security using centralized role-based policies.