From the documentation on Azure AD, yes. The token you obtained against a specific tenant is only good enough to communicate with endpoints that are configured/permissioned to access by that Tenant.
If you want a multi-tenant approach, you need to follow multi-tenant application flow which specifically mention about /common
endpoint.
From documentation
Update your code to send requests to /common
In a single tenant application, sign-in requests are sent to the
tenant’s sign-in endpoint. For example, for contoso.onmicrosoft.com
the endpoint would be:
https://login.microsoftonline.com/contoso.onmicrosoft.com. Requests
sent to a tenant’s endpoint can sign in users (or guests) in that
tenant to applications in that tenant.
With a multi-tenant application, the application doesn’t know up front
what tenant the user is from, so you can’t send requests to a tenant’s
endpoint. Instead, requests are sent to an endpoint that multiplexes
across all Azure AD tenants: https://login.microsoftonline.com/common