Entra Fundamentals
Entra Fundamentals
e OVERVIEW
p CONCEPT
Get started
f QUICKSTART
c HOW-TO GUIDE
c HOW-TO GUIDE
c HOW-TO GUIDE
c HOW-TO GUIDE
Microsoft Entra is a family of identity and network access products. It enables organizations to
implement a Zero Trust security strategy and create a trust fabric that verifies identities,
validates access conditions, checks permissions, encrypts connection channels, and monitors
for compromise.
Microsoft Entra ID
Microsoft Entra ID is the foundational product of Microsoft Entra. It provides the essential
identity, authentication, policy, and protection to secure employees, devices, and enterprise
apps and resources.
For example, organizations with services that require access to Kerberos authentication can
create a managed domain where the core service components are deployed and maintained by
Microsoft as a managed domain experience.
Microsoft Entra Private Access secures access to all private apps and resources, including
corporate networks and multicloud environments. It enables remote users to connect to
internal resources from any device and network without a virtual private network (VPN).
For example, an employee can securely access a corporate network printer while working from
home or even a cafe.
For example, organizations can enable web content filtering to regulate access to websites
based on content categories and domain names.
For example, administrators can automatically assign user accounts and Microsoft 365 licenses
to new employees, and remove those assignments from employees that are no longer with the
company.
For example, organizations can create risk-based Conditional Access policies that require
multifactor authentication when the sign-in risk level is reported as medium or high.
In addition to identities that are used for authentication, there are decentralized identities
(DIDs) used for information verification.
Microsoft Entra Verified ID is a credential verification service based on open DID standards. It
enables organizations to issue a verifiable credential (digital signature proving the validity of
information) to a user who stores the credential on their personal device. After they receive the
verifiable credential, the user can present it to a company or organization that wants to verify
something about their identity.
For example, a recent college graduate can ask the university to issue a digital copy of their
diploma to their DID. They can then choose to present the diploma to a potential employer
who can independently verify the issuer of the diploma, the time of issuance, and its status.
For example, organizations can set up self-service registration for customers to sign-in to a
web application using methods such as one-time passcodes, or social accounts from Google or
Facebook.
In addition to human and device identities, workload identities such as applications, services,
and containers require authentication and authorization policies.
Microsoft Entra Workload ID is the identity and access management solution for workload
identities. It enables organizations to secure access to resources using adaptive policies and
custom security attributes for apps.
For example, GitHub Actions need a workload identity to access Azure subscriptions to
automate, customize, and execute software development workflows.
Architecture
Deployment plans
Operations reference
Operations guide
Next steps
Licensing
What is Microsoft Entra ID?
06/20/2025
Microsoft Entra ID is a cloud-based identity and access management service that your
employees can use to access external resources. Example resources include Microsoft 365, the
Azure portal, and thousands of other SaaS applications.
Microsoft Entra ID also helps them access internal resources like apps on your corporate
intranet, and any cloud apps developed for your own organization. To learn how to create a
tenant, see Quickstart: Create a new tenant in Microsoft Entra ID.
To learn the differences between Active Directory and Microsoft Entra ID, see Compare Active
Directory to Microsoft Entra ID. You can also refer to Microsoft Cloud for Enterprise Architects
Series posters to better understand the core identity services in Azure like Microsoft Entra ID
and Microsoft-365.
IT admins use Microsoft Entra ID to control access to apps and app resources, based on
business requirements. For example, as an IT admin, you can use Microsoft Entra ID to
require multifactor authentication when accessing important organizational resources.
You could also use Microsoft Entra ID to automate user provisioning between your
existing Windows Server AD and your cloud apps, including Microsoft 365. Finally,
Microsoft Entra ID gives you powerful tools to automatically help protect user identities
and credentials and to meet your access governance requirements. To get started, sign up
for a free 30-day Microsoft Entra ID P1 or P2 trial .
Microsoft 365, Office 365, Azure, or Dynamics CRM Online subscribers already use
Microsoft Entra ID as every Microsoft 365, Office 365, Azure, and Dynamics CRM Online
tenant is automatically a Microsoft Entra tenant. You can immediately start managing
access to your integrated cloud apps.
What are the Microsoft Entra ID licenses?
Microsoft Online business services, such as Microsoft 365 or Microsoft Azure, use Microsoft
Entra ID for sign-in activities and to help protect your identities. If you subscribe to any
Microsoft Online business service, you automatically get access to Microsoft Entra ID Free .
To enhance your Microsoft Entra implementation, you can also add paid features by upgrading
to Microsoft Entra ID P1 or P2 licenses, or adding on licenses for products such as Microsoft
Entra ID Governance. You can also license Microsoft Entra paid licenses are built on top of your
existing free directory. The licenses provide self-service, enhanced monitoring, security
reporting, and secure access for your mobile users.
7 Note
For the pricing options of these licenses, see Microsoft Entra pricing .
For more information about Microsoft Entra pricing, contact the Microsoft Entra Forum .
Microsoft Entra ID Free. Provides user and group management, on-premises directory
synchronization, basic reports, self-service password change for cloud users, and single
sign-on across Azure, Microsoft 365, and many popular SaaS apps.
Microsoft Entra ID P1. In addition to the Free features, P1 also lets your hybrid users
access both on-premises and cloud resources. It also supports advanced administration,
such as dynamic membership groups, self-service group management, Microsoft Identity
Manager, and cloud write-back capabilities, which allow self-service password reset for
your on-premises users.
Microsoft Entra ID P2. includes features in addition to the features included in Free and
P1. P2 includes Microsoft Entra ID Protection to help provide risk-based Conditional
Access to your apps and critical company data and Privileged Identity Management to
help discover, restrict, monitor administrators, their access to resources and to provide
just-in-time access when needed.
In addition to Microsoft Entra ID licenses, you can enable additional identity management
capabilities with licenses for other Microsoft Entra products, including:
"Pay as you go" feature licenses. You can also get licenses for features such as Microsoft
Entra Domain Services, and Microsoft Entra customer identity and access management
solution (CIAM). CIAM can help you provide identity and access management solutions
for your customer-facing apps. For more information, see our next-generation solution
for external identities, Microsoft Entra External ID.
) Important
Effective May 1, 2025, Azure AD B2C will no longer be available to purchase for new
customers. To learn more, please see Is Azure AD B2C still available to purchase? in our
FAQ.
For more information on the Microsoft Entra product family, see Microsoft Entra .
For more information about associating an Azure subscription to Microsoft Entra ID, see
Associate or add an Azure subscription to Microsoft Entra ID. For more information about
assigning licenses to your users, see How to: Assign or remove Microsoft Entra ID licenses.
ノ Expand table
Category Description
Application Manage your cloud and on-premises apps using Application Proxy, single sign-on,
management the My Apps portal, and Software as a Service (SaaS) apps. For more information,
see How to provide secure remote access to on-premises applications and
Application Management documentation.
Microsoft Entra ID Build apps that sign in all Microsoft identities, get tokens to call Microsoft Graph,
for developers other Microsoft APIs, or custom APIs. For more information, see Microsoft identity
platform (Microsoft Entra ID for developers).
Business-to- Manage your guest users and external partners, while maintaining control over your
Business (B2B) own corporate data. For more information, see Microsoft Entra B2B documentation.
Business-to- Customize and control how users sign up, sign in, and manage their profiles when
Customer (B2C) using your apps. For more information, see Azure Active Directory B2C
documentation.
Conditional Access Manage access to your cloud apps. For more information, see Microsoft Entra
Category Description
Device Manage how your cloud or on-premises devices access your corporate data. For
Management more information, see Microsoft Entra Device Management documentation.
Domain services Join Azure virtual machines to a domain without using domain controllers. For more
information, see Microsoft Entra Domain Services documentation.
Enterprise users Manage license assignments, access to apps, and set up delegates using groups and
administrator roles. For more information, see Microsoft Entra user management
documentation.
Hybrid identity Use Microsoft Entra Connect and Connect Health to provide a single user identity
for authentication and authorization to all resources, regardless of location (cloud or
on-premises). For more information, see Hybrid identity documentation.
Identity Microsoft Entra ID P2 includes basic capabilities for privileged identity management
governance (PIM), access reviews and entitlement management. Microsoft Entra ID Governance
customers can manage their organization's identities and access through
comprehensive employee, business partner, vendor, service, and app controls. For
more information, see Microsoft Entra ID Governance documentation and features
by license.
Microsoft Entra ID Detect potential vulnerabilities affecting your organization's identities, configure
Protection policies to respond to suspicious actions, and then take appropriate action to
resolve them. For more information, see Microsoft Entra ID Protection.
Managed Provide your Azure services with an automatically managed identity in Microsoft
identities for Entra ID that can authenticate any Microsoft Entra-supported authentication service,
Azure resources including Key Vault. For more information, see What is managed identities for Azure
resources?.
Privileged identity Manage, control, and monitor access within your organization. This feature includes
management access to resources in Microsoft Entra ID and Azure, and other Microsoft Online
(PIM) Services, like Microsoft 365 or Intune. For more information, see Microsoft Entra
Privileged Identity Management.
Monitoring and Gain insights into the security and usage patterns in your environment. For more
health information, see Microsoft Entra monitoring and health.
Workload Give an identity to your software workload (such as an application, service, script, or
identities container) to authenticate and access other services and resources. For more
information, see workload identities faqs.
Terminology
To better understand Microsoft Entra ID and its documentation, we recommend reviewing the
following terms.
ノ Expand table
Term or Description
concept
Identity A thing that can get authenticated. An identity can be a user with a username and
password. Identities also include applications or other servers that might require
authentication through secret keys or certificates.
Account An identity that has data associated with it. You can’t have an account without an
identity.
Microsoft Entra An identity created through Microsoft Entra ID or another Microsoft cloud service, such
account as Microsoft 365. Identities are stored in Microsoft Entra ID and accessible to your
organization's cloud service subscriptions. This account is also sometimes called a Work
or school account.
Account This classic subscription administrator role is conceptually the billing owner of a
Administrator subscription. This role enables you to manage all subscriptions in an account. For more
information, see Azure roles, Microsoft Entra roles, and classic subscription
administrator roles.
Service This classic subscription administrator role enables you to manage all Azure resources,
Administrator including access. This role has the equivalent access of a user who is assigned the
Owner role at the subscription scope. For more information, see Azure roles, Microsoft
Entra roles, and classic subscription administrator roles.
Owner This role helps you manage all Azure resources, including access. This role is built on a
newer authorization system called Azure role-based access control (Azure RBAC) that
provides fine-grained access management to Azure resources. For more information,
see Azure roles, Microsoft Entra roles, and classic subscription administrator roles.
Microsoft Entra By default, the user who creates a Microsoft Entra tenant is automatically assigned the
Global Global Administrator role. You can have multiple accounts with this role, but anyone
Administrator with at least Privileged Role Administrator can assign administrator roles to users. For
more information about the various administrator roles, see Administrator role
permissions in Microsoft Entra ID.
Azure Used to pay for Azure cloud services. You can have many subscriptions and they're
subscription linked to a credit card.
Tenant A dedicated and trusted instance of Microsoft Entra ID. The tenant is automatically
created when your organization signs up for a Microsoft cloud service subscription.
These subscriptions include Microsoft Azure, Microsoft Intune, or Microsoft 365. This
tenant represents a single organization and is intended for managing your employees,
business apps, and other internal resources. For this reason, it's considered a workforce
tenant configuration. By contrast, you can create a tenant in an external configuration,
which is used in customer identity and access management (CIAM) solutions for your
consumer-facing apps (learn more about Microsoft Entra External ID).
Term or Description
concept
Single tenant Azure tenants that access other services in a dedicated environment are considered
single tenant.
Multitenant Azure tenants that access other services in a shared environment, across multiple
organizations, are considered multitenant.
Microsoft Entra Each Azure tenant has a dedicated and trusted Microsoft Entra directory. The Microsoft
directory Entra directory includes the tenant's users, groups, and apps and is used to perform
identity and access management functions for tenant resources.
Custom Every new Microsoft Entra directory comes with an initial domain name, for example
domain domainname.onmicrosoft.com . In addition to that initial name, you can also add your
organization's domain names. Your organization's domain names include the names
you use to do business and your users use to access your organization's resources, to
the list. Adding custom domain names helps you to create user names that are familiar
to your users, such as alain@contoso.com.
Microsoft Personal accounts that provide access to your consumer-oriented Microsoft products
account (also and cloud services. These products and services include Outlook, OneDrive, Xbox LIVE,
called, MSA) or Microsoft 365. Your Microsoft account is created and stored in the Microsoft
consumer identity account system that's run by Microsoft.
Next steps
Sign up for Microsoft Entra ID P1 or P2
The Microsoft Entra admin center is a web-based identity portal for Microsoft Entra products.
It provides a unified administrative experience for organizations to configure and manage their
Microsoft Entra solutions in a centralized location.
Home includes at-a-glance information about your tenant, recent activities, and other helpful
resources, including shortcuts and deployment guides.
The following sections provide a high-level overview of the product interfaces and links to
learn more about the features.
Entra ID
Entra ID gives administrators and developers access to Microsoft Entra ID and Microsoft Entra
External ID solutions, including tenants, users, groups, devices, applications, roles, and
licensing.
For more information about configuring and managing Microsoft Entra ID solutions, see the
following documentation:
ID Protection
ID Protection gives administrators and developers access to Microsoft Entra ID Protection
solutions, including the protection dashboard, risk-based access policies, risky users report,
multifactor authentication, and password reset.
For more information about configuring and managing Microsoft Entra ID Protection solutions,
see the following documentation:
Identity governance
Identity Governance gives administrators and developers access to Microsoft Entra ID
Governance solutions, including entitlement management, access reviews, and lifecycle
workflows.
For more information about configuring and managing Microsoft Entra ID Governance
solutions, see the following documentation:
Verified ID
Verified ID gives administrators and developers access to Microsoft Entra Verified ID solutions,
including credentials and organization settings.
For more information about configuring and managing Microsoft Entra Verified ID solutions,
see the following documentation:
Credentials
Need help?
Diagnose & solve problems provides troubleshooting resources to fix common problems, and
the option to contact our support team by opening a New support request.
Related content
Find your tenant
Create a new tenant
Trial user guide: Microsoft Entra Suite
Article • 04/02/2025
Welcome to the Microsoft Entra Suite trial user guide. Make the most of your free trial
by discovering the robust and comprehensive capabilities of Microsoft Entra.
Tip
Save this trial user guide to your browser favorites. When links in the trial user
guide take you away from this location, it'll be easier to return to this guide to
continue.
When you start a trial or purchase Microsoft Entra Suite, your first step is to determine
which licensing option is best suited for your organization. Special pricing is available for
Microsoft Entra ID P2/E5 customers. For more information about pricing, see Microsoft
Entra plans & pricing .
Microsoft Entra Internet Access: Secures global access to all internet, SaaS, and
Microsoft 365 apps and resources while protecting organizations against internet
threats, malicious network traffic, and unsafe or noncompliant content with an identity-
centric Secure Web Gateway (SWG).
Microsoft Entra ID Governance: Manages user identities, access rights, and entitlements
across IT environments to ensure proper access controls, mitigate risk, and maintain
compliance with regulatory requirements.
Microsoft Entra ID Protection: Blocks identity takeover in real time by analyzing user
and sign-in patterns based on integrated risk scores from various sources. Protects
against identity-based attacks, such as phishing, infected devices, and leaked
credentials.
Microsoft Entra Verified ID: Validate users with secure verification methods to ensure
secure identity authentication scenarios like user onboarding, and secure access to
sensitive resources and account recovery processes.
To view the complete how-to guide, see Plan a Microsoft Entra ID Protection
deployment.
To view the complete how-to guide, see Plan a Microsoft Entra access reviews
deployment.
To view the complete how-to guide, see Deployment guide for Microsoft Entra Internet
Access.
To view the complete how-to guide, see Deployment guide for Microsoft Entra Private
Access.
To view the complete how-to guide, see Automate employee onboarding tasks with
Microsoft Entra.
To get the most out of your trial, get started by walking through the following user
scenarios.
Scenario 1: Automate user onboarding and lifecycle with access to all apps
Scenario 2: Modernize remote access to on-premises apps with MFA per app
Scenario 3: Secure internet access based on business needs
Take advantage of the better together security strategy during your Microsoft Entra
Suite’s trial period. Implement automated user onboarding and lifecycle management,
modernize from traditional VPN to on-premises resources with multifactor
authentication (MFA) down to the app level, and secure internet access based on your
business rules.
The following table shows which of the five Microsoft Entra Suite products are covered
in each scenario.
ノ Expand table
Customer Microsoft Microsoft Microsoft Microsoft Microsoft
scenario Entra Entra Entra ID Entra ID Entra
Private Internet Governance Protection Verified ID
Access Access
Provide remote employees with secure and seamless access to necessary apps and
resources.
Collaborate with external users by providing them with access to relevant apps and
resources.
The step-by-step guidance focuses on Microsoft Entra Verified ID, Microsoft Entra ID
Governance, Microsoft Entra ID Protection, and Microsoft Entra Conditional Access. For
more information, see Microsoft Entra deployment scenario - Workforce and guest
lifecycle.
The step-by-step guidance focuses on Microsoft Entra Private Access, Microsoft Entra ID
Protection, and Microsoft Entra ID Governance. For more information, see Microsoft
Entra deployment scenario - Modernize remote access.
Augment existing strict default internet access policies with Microsoft Entra
Internet Access control.
The step-by-step guidance focuses on Microsoft Entra Internet Access, Microsoft Entra
ID Governance, Microsoft Entra Conditional Access, and Global Secure Access. For more
information, see Microsoft Entra deployment scenario - Secure internet access.
Related content
Microsoft Entra Suite now generally available - Microsoft Community Hub
Microsoft Entra plans & pricing
Learn how to simplify your Zero Trust strategy with the Microsoft Entra Suite
Simplified Zero Trust security with the Microsoft Entra Suite
Feedback
Was this page helpful? Yes No
This article provides fundamental concepts and terminology to help you understand
identity and access management (IAM).
Here are some fundamental concepts to help you understand identity and access
management:
Identity
A digital identity is a collection of unique identifiers or attributes that represent a
human, software component, machine, asset, or resource in a computer system. An
identifier can be:
An email address
Sign-in credentials (username/password)
Bank account number
Government issued ID
MAC address or IP address
Identities are used to authenticate and authorize access to resources, communicate with
other humans, conduct transactions, and other purposes.
Authentication
Authentication is the process of challenging a person, software component, or hardware
device for credentials in order to verify their identity, or prove they're who or what they
claim to be. Authentication typically requires the use of credentials (like username and
password, fingerprints, certificates, or one-time passcodes). Authentication is sometimes
shortened to AuthN.
Single sign-on (SSO) allows users to authenticate their identity once and then later
silently authenticate when accessing various resources that rely on the same identity.
Once authenticated, the IAM system acts as the source of identity truth for the other
resources available to the user. It removes the need for signing on to multiple, separate
target systems.
Authorization
Authorization validates that the user, machine, or software component has been granted
access to certain resources. Authorization is sometimes shortened to AuthZ.
ノ Expand table
Authentication Authorization
Verifies whether a user, machine, or software is Determines if the user, machine, or software
who or what they claim to be. is allowed to access a particular resource.
Challenges the user, machine, or software for Determines what level of access a user,
verifiable credentials (for example, passwords, machine, or software has.
biometric identifiers, or certificates).
Often uses the OpenID Connect (OIDC) (which is Often uses the OAuth 2.0 protocol.
built on the OAuth 2.0 protocol) or SAML
protocols.
Example
Suppose you want to spend the night in a hotel. You can think of authentication and
authorization as the security system for the hotel building. Users are people who want
to stay at the hotel, resources are the rooms or areas that people want to use. Hotel
staff is another type of user.
If you're staying at the hotel, you first go to reception to start the "authentication
process". You show an identification card and credit card and the receptionist matches
your ID against the online reservation. After the receptionist has verified who you are,
the receptionist grants you permission to access the room you've been assigned. You're
given a keycard and can go now to your room.
The doors to the hotel rooms and other areas have keycard sensors. Swiping the
keycard in front of a sensor is the "authorization process". The keycard only lets you
open the doors to rooms you're permitted to access, such as your hotel room and the
hotel exercise room. If you swipe your keycard to enter any other hotel guest room, your
access is denied.
Individual permissions, such as accessing the exercise room and a specific guest room,
are collected into roles which can be granted to individual users. When you're staying at
the hotel, you're granted the Hotel Patron role. Hotel room service staff would be
granted the Hotel Room Service role. This role permits access to all hotel guest rooms
(but only between 11am and 4pm), the laundry room, and the supply closets on each
floor.
Identity provider
An identity provider creates, maintains, and manages identity information while offering
authentication, authorization, and auditing services.
With modern authentication, all services, including all authentication services, are
supplied by a central identity provider. Information that's used to authenticate the user
with the server is stored and managed centrally by the identity provider.
Feedback
Was this page helpful? Yes No
In this article, you learn some of the fundamental concepts of Identity and Access
Management (IAM), why it's important, and how it works.
Identity and access management ensures that the right people, machines, and software
components get access to the right resources at the right time. First, the person,
machine, or software component proves they're who or what they claim to be. Then, the
person, machine, or software component is allowed or denied access to or use of certain
resources.
To learn about the basic terms and concepts, see Identity fundamentals.
Identity federation - You can allow users who already have passwords elsewhere
(for example, in your enterprise network or with an internet or social identity
provider) to get access to your system.
Reports and monitoring - Generate reports after actions taken on the platform
(like sign-in time, systems accessed, and type of authentication) to ensure
compliance and assess security risks. Gain insights into the security and usage
patterns of your environment.
1. The user (resource owner) initiates an authentication request with the identity
provider/authorization server from the client application.
2. If the credentials are valid, the identity provider/authorization server first sends an
ID token containing information about the user back to the client application.
3. The identity provider/authorization server also obtains end-user consent and
grants the client application authorization to access the protected resource.
Authorization is provided in an access token, which is also sent back to the client
application.
OAuth 2.0
With the release of the OpenID Connect (which uses public-key encryption), OpenID
became a widely adopted authentication layer for OAuth. Like SAML, OpenID Connect
(OIDC) is widely used for single sign-on (SSO), but OIDC uses REST/JSON instead of
XML. OIDC was designed to work with both native and mobile apps by using REST/JSON
protocols. The primary use case for SAML, however, is web-based apps. To learn more,
read about OpenID Connect protocol.
JWTs are an open standard that defines a compact and self-contained way for securely
transmitting information between parties as a JSON object. JWTs can be verified and
trusted because they’re digitally signed. They can be used to pass the identity of
authenticated users between the identity provider and the service requesting the
authentication. They also can be authenticated and encrypted. To learn more, read JSON
Web Tokens.
WS-Fed was developed by Microsoft and used extensively in their applications, this
standard defines the way security tokens can be transported between different entities
to exchange identity and authorization information. To learn more, read Web Services
Federation Protocol.
Next steps
To learn more, see:
You can perform all of your administrative tasks using the Microsoft Entra admin center,
including creating a new tenant for your organization.
In this quickstart article, you learn how to create a basic tenant for your organization.
7 Note
Only paid customers can create a new Workforce tenant in Microsoft Entra ID. Customers
using a free tenant, or a trial subscription won't be able to create additional tenants from
the Microsoft Entra admin center. Customers facing this scenario who need a new tenant
can sign up for a free account .
7 Note
If you're unable to create a Microsoft Entra ID or Azure AD B2C tenant, review your
user settings page to ensure that tenant creation isn't switched off. If it is not
enabled you must be assigned at least the Tenant Creator role.
This article doesn't cover creating an external tenant configuration for consumer-
facing apps; learn more about using Microsoft Entra External ID for your customer
identity and access management (CIAM) scenarios.
) Important
Effective May 1, 2025, Azure AD B2C will no longer be available to purchase for new
customers. To learn more, please see Is Azure AD B2C still available to purchase? in our
FAQ.
To create a new tenant
1. Sign in to the Azure portal .
4. Select Create.
5. On the Basics tab, select the type of tenant you want to create, either Microsoft Entra ID
or Microsoft Entra ID (B2C).
8. Select Next: Review + Create. Review the information you entered and if the information
is correct, select Create in the lower left corner.
By default, you're also listed as the technical contact for the tenant. Technical contact
information is something you can change in Properties .
Microsoft recommends that organizations have two cloud-only emergency access accounts
permanently assigned the Global Administrator role. These accounts are highly privileged and
aren't assigned to specific individuals. The accounts are limited to emergency or "break glass"
scenarios where normal accounts can't be used or all other administrators are accidentally
locked out. These accounts should be created following the emergency access account
recommendations.
Clean up resources
If you're not going to continue to use this application, you can delete the tenant using the
following steps:
Ensure that you're signed in to the directory that you want to delete through the
Directory + subscription filter in the Azure portal. Switch to the target directory if
needed.
Select Microsoft Entra ID, and then on the Contoso - Overview page, select Delete
directory.
Add groups and members, see Create a basic group and add members.
Learn about Azure role-based access control (RBAC) and Conditional Access to help
manage your organization's application and resource access.
Learn about Microsoft Entra ID, including basic licensing information, terminology, and
associated features.
Configure your company branding
06/26/2025
When users authenticate into your corporate intranet or web-based applications, Microsoft
Entra ID provides the identity and access management (IAM) service. You can add company
branding that applies to all these experiences to create a consistent sign-in experience for your
users.
The default sign-in experience is the global look and feel that applies across all sign-ins to your
tenant. Before you customize any settings, the default Microsoft branding appears in your sign-
in pages. You can customize this default experience with a custom background image or color,
favicon, layout, header, and footer. You can also upload a custom CSS file.
Prerequisites
Adding custom branding requires one of the following licenses:
Microsoft Entra ID P1 or P2
Microsoft 365 Business Standard
SharePoint (Plan 1)
Microsoft Entra ID P1 or P2 editions are available for customers in China using the worldwide
instance of Microsoft Entra ID. Microsoft Entra ID P1 or P2 editions aren't currently supported
in the Azure service operated by 21Vianet in China.
The Organizational Branding Administrator role is the minimum role required to customize
company branding.
Images have different image and file size requirements. We recommend you review the
company branding process in the Microsoft Entra admin center to gather the image
requirements you need. You might need to use a photo editor to create the right size images.
The preferred image type for all images is PNG, but JPG is accepted.
External URLs aren't supported in the sign-in experience. For example, if you add an external
URL for your internal help desk to the footer, that URL is displayed explicitly but isn't clickable.
Users must copy the URL and navigate to it directly.
The Azure Active Directory B2C (Azure AD B2C) company branding options are different.
Azure AD B2C branding is currently limited to background image, banner logo, and
background color customization. For more information, see Customize the UI in the Azure AD
B2C documentation.
) Important
Effective May 1, 2025, Azure AD B2C will no longer be available to purchase for new
customers. To learn more, please see Is Azure AD B2C still available to purchase? in our
FAQ.
Use Microsoft Graph with Microsoft Entra company branding. Company branding can be
viewed and managed using Microsoft Graph on the /beta endpoint and the
organizationalBranding resource type. For more information, see the organizational branding
API documentation.
The branding elements are called out in the following example. Text descriptions are provided
following the image.
1. Favicon: Small icon that appears on the left side of the browser tab.
2. Header: Space across the top of the sign-in page, behind the header log.
3. Header logo: Logo that appears in the upper-left corner of the sign-in page.
4. Background image: The entire space behind the sign-in box.
5. Page background color: The entire space behind the sign-in box.
6. Banner logo: Logo that appears at the top of the sign-in box
7. Sign-in page title: Larger text that appears below the banner logo.
8. Sign-in page description: Text to describe the sign-in page.
9. Username hint and text: The text that appears before a user enters their information.
10. Self-service password reset: A link you can add below the sign-in page text for password
resets.
11. Sign-in page text: Text you can add below the username field.
12. Footer link: Privacy & Cookies: Link you can add to the lower-right corner for privacy
information.
13. Footer: Terms of Use: Text in the lower-right corner of the page where you can add Terms
of use information.
14. Footer: Space across the bottom of the page for privacy and Terms of Use information.
15. Template: The layout of the page and sign-in boxes.
If you currently have a customized sign-in experience, the Edit button is available.
The sign-in experience process is grouped into sections. At the end of each section, select the
Review + create button to review what you selected and submit your changes or the Next
button to move to the next section.
Basics
Favicon: Select a PNG or JPG of your logo that appears in the web browser tab.
Image size: 32x32 px
Max file size: 5 KB
Background image: Select a PNG or JPG to display as the main image on your sign-in
page. This image scales and crops according to the window size, but the sign-in prompt
might partially block it.
Image size: 1920x1080 px
Max file size: 300 KB
Page background color: If the background image isn't able to load because of a slower
connection, your selected background color appears instead.
Layout
Visual Templates: Customize the layout of your sign-in page using templates or a custom
CSS file.
Choose one of two Templates: Full-screen or partial-screen background. The full-
screen background could obscure your background image, so choose the partial-
screen background if your background image is important.
The details of the Header and Footer options are set on the next two sections of the
process.
Custom CSS: Upload a custom CSS file to replace the Microsoft default style of the page.
Download the CSS template .
View the CSS template reference guide.
Header
If you haven't enabled the header, go to the Layout section and select Show header. Once
enabled, select a PNG or JPG to display in the header of the sign-in page.
Show 'Privacy & Cookies': This option is selected by default and displays the Microsoft
'Privacy & Cookies' link.
Uncheck this option to hide the default Microsoft link.
Optionally provide your own Display text and URL. The text and links don't have to be
related to privacy and cookies.
Custom URLs are displayed as text and aren't clickable.
Show 'Terms of Use': This option is also selected by default and displays the Microsoft
'Terms of Use' link.
Uncheck this option to hide the default Microsoft link. Optionally provide your own
Display text and URL.
The text and links don't have to be related to your terms of use.
) Important
The default Microsoft 'Terms of Use' link isn't the same as the Conditional Access
Terms of Use. Seeing the terms here doesn't mean you accepted those terms and
conditions.
Sign-in form
Banner logo: Select a PNG or JPG image file of a banner-sized logo (short and wide) to
appear on the sign-in pages.
Image size: 245x36 px
Max file size: 50 KB
Square logo (light theme): Select a square PNG or JPG image file of your logo to be used
in browsers that are using a light color theme. This logo is used to represent your
organization on the Microsoft Entra web interface and in Windows.
Image size: 240x240 px
Max file size: 50 KB
Square logo (dark theme) Select a square PNG or JPG image file of your logo to be used
in browsers that are using a dark color theme. This logo is used to represent your
organization on the Microsoft Entra web interface and in Windows. If your logo looks
good on light and dark backgrounds, there's no need to add a dark theme logo.
Image size: 240x240 px
Max file size: 50 KB
Username hint text: Enter hint text for the username input field on the sign-in page. If
guests use the same sign-in page, we don't recommend using hint text here.
Sign-in page text: Enter text that appears on the bottom of the sign-in page. You can use
this text to communicate additional information, such as the phone number to your help
desk or a legal statement. This page is public, so don't provide sensitive information here.
This text must be Unicode and can't exceed 1,024 characters.
To begin a new paragraph, press the Enter key twice. You can also change text formatting
to include bold, italics, an underline, or clickable link. Use the following syntax to add
formatting to text:
Hyperlink: [text](link)
Bold: **text** or __text__
Italics: *text* or _text_
Underline: ++text++
) Important
Hyperlinks that are added to the sign-in page text render as text in native
environments, such as desktop and mobile applications.
Review
All of the available options appear in one list so you can review everything you customized or
left at the default setting. When you're done, select the Create button.
Once your default sign-in experience is created, select the Edit button to make any changes.
You can't delete a default sign-in experience after it's created, but you can remove all custom
settings.
The time it takes for changes to appear in the sign-in experience vary based on the tenant's
geographical location.
The process for customizing the experience is the same as the default sign-in experience
process, except you must select a language from the dropdown list in the Basics section. We
recommend adding custom text in the same areas as your default sign-in experience.
Microsoft Entra ID supports right-to-left functionality for languages such as Arabic and Hebrew
that are read right-to-left. The layout adjusts automatically, based on the user's browser
settings.
User experience
There are some scenarios for you to consider when you customize the sign-in pages for your
organization's tenant-specific applications.
The current background image is on the left and the new background image is on the right.
For customers who access applications from a custom URL, the whr query string parameter, or
a domain variable, can be used to apply company branding at the initial sign-in screen, not just
after adding the email or phone number. For example, whr=contoso.com would appear in the
custom URL for the app. With the Home Realm Discover and domain parameter included, the
company branding appears immediately in the first sign-in step. Other domain hints can be
included.
In the following examples, replace the contoso.com with your own tenant name, or verified
domain name:
B2B scenarios
For B2B collaboration end-users who perform cross-tenant sign-ins, their home tenant
branding appears, even if there isn't custom branding specified.
In the following example, the company branding for Woodgrove Groceries appears on the left,
with the Woodgrove logo, fonts, and custom text. The example on the right displays the
default branding for the user's home tenant. The default branding displays the Microsoft logo,
fonts, and text.
Next steps
View the CSS template reference guide
Learn more about default user permissions in Microsoft Entra ID
Manage the 'stay signed in' prompt
What are the default user permissions in
Microsoft Entra ID?
Article • 03/05/2025
In Microsoft Entra ID, all users are granted a set of default permissions. A user's access consists
of the type of user, their role assignments, and their ownership of individual objects.
This article describes those default permissions and compares the member and guest user
defaults. The default user permissions can be changed only in user settings in Microsoft Entra
ID.
Member users can register applications, manage their own profile photo and mobile
phone number, change their own password, and invite B2B guests. These users can also
read all directory information (with a few exceptions).
Guest users have restricted directory permissions. They can manage their own profile,
change their own password, and retrieve some information about other users, groups,
and apps. However, they can't read all directory information.
For example, guest users can't enumerate the list of all users, groups, and other directory
objects. Guests can be added to administrator roles, which grant them full read and write
permissions. Guests can also invite other guests.
Users and Enumerate the list of Read their own Read their own
contacts all users and properties properties
contacts Read display name, Change their own
Read all public email, sign-in name, password
properties of users photo, user principal Manage their own
and contacts name, and user type mobile phone
Invite guests properties of other number
Change their own users and contacts
password Change their own
Manage their own password
mobile phone Search for another user
number by object ID (if allowed)
Manage their own Read manager and
photo direct report
Invalidate their own information of other
refresh tokens users
administrative units
Terms of use Read terms of use a user Read terms of use a user has Read terms of use a user
has accepted. accepted. has accepted.
You can restrict default permissions for member users in the following ways:
U Caution
Using the Restrict access to Microsoft Entra administration portal switch is NOT a
security measure. For more information on the functionality, see the following table.
ノ Expand table
Register applications Setting this option to No prevents users from creating application
registrations. You can then grant the ability back to specific individuals, by
adding them to the application developer role.
Allow users to connect Setting this option to No prevents users from connecting their work or school
work or school account with their LinkedIn account. For more information, see LinkedIn
account with LinkedIn account connections data sharing and consent.
Create security groups Setting this option to No prevents users from creating security groups. Those
users assigned at least the User Administrators role can still create security
groups. To learn how, see Microsoft Entra cmdlets for configuring group
settings.
Permission Setting explanation
Create Microsoft 365 Setting this option to No prevents users from creating Microsoft 365 groups.
groups Setting this option to Some allows a set of users to create Microsoft 365
groups. Anyone assigned at least the User Administrator role can still create
Microsoft 365 groups. To learn how, see Microsoft Entra cmdlets for
configuring group settings.
How do I grant only a specific non-administrator users the ability to use the
Microsoft Entra administration portal?
Set this option to Yes, then assign them a role like global reader.
Restrict non-admin Users can create tenants in the Microsoft Entra ID and Microsoft Entra
users from creating administration portal under Manage tenant. The creation of a tenant is
tenants recorded in the Audit log as category DirectoryManagement and activity
Create Company. By default, the user who creates a Microsoft Entra tenant is
automatically assigned the Global Administrator role. The newly created tenant
doesn't inherit any settings or configurations.
Restrict users from This setting can be found in the Microsoft Entra admin center in the Device
recovering the Settings. Setting this option to Yes restricts users from being able to self-
BitLocker key(s) for service recover BitLocker key(s) for their owned devices. Users must contact
their owned devices their organization's helpdesk to retrieve their BitLocker keys. Setting this
option to No allows users to recover their BitLocker keys.
Read other users This setting is available in Microsoft Graph and PowerShell only. Setting this
flag to $false prevents all nonadmins from reading user information from the
directory. This flag might prevent reading user information in other Microsoft
services like Microsoft Teams.
The Restricted non-admin users from creating tenants option is shown in the following
screenshot.
7 Note
The Guest user access restrictions setting replaced the Guest users permissions are
limited setting. For guidance on using this feature, see Restrict guest access permissions
in Microsoft Entra ID.
ノ Expand table
Permission Setting explanation
Guest user Setting this option to Guest users have the same access as members grants all
access member user permissions to guest users by default.
restrictions
Setting this option to Guest user access is restricted to properties and memberships
of their own directory objects restricts guest access to only their own user profile by
default. Access to other users is no longer allowed, even when they're searching by user
principal name, object ID, or display name. Access to group information, including
groups memberships, is also no longer allowed.
This setting doesn't prevent access to joined groups in some Microsoft 365 services like
Microsoft Teams. To learn more, see Microsoft Teams guest access.
Guest users can still be added to administrator roles regardless of this permission
setting.
Guests can Setting this option to Yes allows guests to invite other guests. To learn more, see
invite Configure external collaboration settings.
Object ownership
An owner can also add or remove other owners. Unlike those users assigned at least the
Application Administrator role, owners can manage only the applications that they own.
An owner can also add or remove other owners. Unlike those users assigned at least the
Application Administrator role, owners can manage only the applications that they own.
To use Privileged Access Management (PIM) to make a group eligible for a role assignment,
see Use Microsoft Entra groups to manage role assignments.
Ownership permissions
The following tables describe the specific permissions in Microsoft Entra ID that member users
have over objects they own. Users have these permissions only on objects that they own.
ノ Expand table
Action Description
ノ Expand table
Action Description
Owned devices
Users can perform the following actions on owned devices:
ノ Expand table
Action Description
Owned groups
Users can perform the following actions on owned groups.
7 Note
Owners of dynamic membership groups must have the Groups Administrator, Intune
Administrator, or User Administrator role to edit rules for dynamic membership groups.
For more information, see Create or update a dynamic membership group in Microsoft
Entra ID.
ノ Expand table
Action Description
Next steps
To learn more about the Guest user access restrictions setting, see Restrict guest access
permissions in Microsoft Entra ID.
To learn more about how to assign Microsoft Entra administrator roles, see Assign a user
to administrator roles in Microsoft Entra ID.
To learn more about how resource access is controlled in Microsoft Azure, see
Understanding resource access in Azure.
Manage users.
Feedback
Was this page helpful? Yes No
This article provides an overview of how groups and access rights can be used together
to make managing your Microsoft Entra users easier, while also applying security best
practices.
7 Note
Some groups can't be managed in the Azure portal or Microsoft Entra admin
center.
Groups synced from on-premises Active Directory can only be managed on-
premises.
Distribution lists and mail-enabled security groups can only be managed in
the Exchange admin center or the Microsoft 365 admin center . You
must sign in and have the appropriate permissions for that admin center to
manage those groups.
Group types
You can manage two types of groups in the Microsoft Entra admin center:
Security groups: Used to manage access to shared resources.
Members of a security group can include users, devices, service principals.
Groups can be members of other groups, sometimes known as nested groups.
See note.
Users and service principals can be the owner of a security group.
7 Note
When nesting an existing security group to another security group, only members
in the parent group have access to shared resources and applications. For more
info about managing nested groups, see How to manage groups.
Membership types
Assigned groups: Lets you add specific users as members of a group and have
unique permissions.
Dynamic membership group for users: Lets you use rules to automatically add
and remove users as members. If a member's attributes change, the system looks
at your rules for dynamic membership groups for the directory. The system checks
to see whether the member meets the rule requirements (is added), or no longer
meets the rules requirements (is removed).
Dynamic membership group for devices: Lets you use rules to automatically add
and remove devices as members. If a device's attributes change, the system looks
at your rules for dynamic membership groups for the directory to see whether the
device meets the rule requirements (is added) or no longer meets the rules
requirements (is removed).
) Important
You can create a dynamic group for either devices or users, but not for both. You
can't create a device group based on the device owners' attributes. Device
membership rules can only reference device attributions. For more information, see
Create a dynamic group.
Access management
Microsoft Entra ID helps you give access to your organization's resources by providing
access rights to a single user or a group. Using groups lets the resource owner or
Microsoft Entra directory owner assign a set of access permissions to all members of the
group. The resource or directory owner can also grant group management rights to
someone such as a department manager or a help desk administrator, which allows that
person to add and remove members. For more information about how to manage
group owners, see the Manage groups article.
The resources that Microsoft Entra groups can manage access to can be:
Each application, resource, and service that requires access permissions needs to be
managed separately because the permissions for one might not be the same as another.
Grant access using the principle of least privilege to help reduce the risk of attack or a
security breach.
Assignment types
After creating a group, you need to decide how to manage its access.
Direct assignment. The resource owner directly assigns the user to the resource.
Group assignment. The resource owner assigns a Microsoft Entra group to the
resource, which automatically gives all of the group members access to the
resource. Both the group owner and the resource owner manage group
membership, letting either owner add or remove members from the group. For
more information about managing group membership, see the Managed groups
article.
Rule-based assignment. The resource owner creates a group and uses a rule to
define which users are assigned to a specific resource. The rule is based on
attributes that are assigned to individual users. The resource owner manages the
rule, determining which attributes and values are required to allow access the
resource. For more information, see Create a dynamic group.
External authority assignment. Access comes from an external source, such as an
on-premises directory or a SaaS app. In this situation, the resource owner assigns a
group to provide access to the resource and then the external source manages the
group members.
Enable self-service group management: Allow users to search for and join groups
or create and manage their own Microsoft 365 groups.
Empowers teams to organize themselves while reducing the administrative
burden on IT.
Apply a group naming policy to block the use of restricted words and ensure
consistency.
Prevent inactive groups from lingering by enabling group expiration policies,
which automatically deletes unused groups after a specified period, unless
renewed by a group owner.
Configure groups to automatically accept all users that join or require approval.
For more information, see Set up self-service group management in Microsoft
Entra ID.
Leverage sensitivity labels: Use sensitivity labels to classify and govern Microsoft
365 groups based on their security and compliance needs.
Provides fine-grained access controls and ensures that sensitive resources are
protected.
For more information, see Assign sensitivity labels to Microsoft 365 groups in
Microsoft Entra ID
Automate membership with dynamic groups: Implement dynamic membership
rules to automatically add or remove users and devices from groups based on
attributes like department, location, or job title.
Minimizes manual updates and reduces the risk of lingering access.
This feature applies to Microsoft 365 groups and Security Groups.
Conduct Periodic Access Reviews: Use Microsoft Entra Identity Governance
capabilities to schedule regular access reviews.
Ensures that membership in assigned groups remains accurate and relevant
over time.
For more information, see Create or update a dynamic membership group in
Microsoft Entra ID
Manage membership with access packages: Create access packages with
Microsoft Entra Identity Governance to streamline the management of multiple
group memberships. Access packages can:
Include approval workflows for membership
Define criteria for access expiration
Provide a centralized way to grant, review, and revoke access across groups and
applications
For more information, see Create an access package in entitlement
management
Assign multiple group owners: Assign at least two owners to a group to ensure
continuity and reduce dependencies on a single individual.
For more information, see Manage Microsoft Entra groups and group
membership
Use group-based licensing: Group-based licensing simplifies user provisioning
and ensures consistent license assignments.
Use dynamic membership groups to automatically manage licensing for users
meeting specific criteria.
For more information, see What is group-based licensing in Microsoft Entra ID?
Enforce Role Based Access Controls (RBAC): Assign roles to control who can
manage groups.
RBAC reduces the risk of privilege misuse and simplifies group management.
For more information, see Overview of role-based access control in Microsoft
Entra ID
Related content
Create and manage Microsoft Entra groups and group membership
Manage access to SaaS apps using groups
Manage rules for dynamic membership groups
Feedback
Was this page helpful? Yes No
In this quickstart, you set up a new group, assign members to the group, and review its
membership. You can use the user and group you create here in other quickstarts and tutorials.
You can view your organization's existing groups and group members using the Microsoft
Entra admin center. Groups are used to manage users that all need the same access and
permissions for potentially restricted apps and services.
Prerequisites
Before you begin, you need:
5. Select Create.
4. Copy the autogenerated password provided in the Password box and select Create.
The All groups page appears, showing all your active groups.
Search for a group
Search the All groups page to find the MDM policy – West group.
2. From the All groups page, type MDM into the Search box.
The search results appear under the Search box, including the MDM policy - West group.
4. View the group info on the MDM policy - West Overview page, including the number of
members of that group.
View group members
Now that you found the group, you can view all the assigned members.
Select Members from the Manage area, and then review the complete list of member names
assigned to that specific group, including Alain Charon.
Clean up resources
The group you just created is used in other articles in this documentation. If you'd rather not
use this group, you can delete it and its assigned members using the following steps:
2. On the All groups page, search for the MDM policy - West group.
4. Select Delete.
This doesn't delete the user Alain Charon, just his membership in the deleted group.
To delete your test user: Browse to Entra ID > Users select your test user and choose
Delete.
Next steps
Advance to the next article to learn how to associate a subscription to your directory.
7 Note
Starting September 1, 2024, the Microsoft Entra ID Admin Center and the Microsoft
Azure portal no longer supports license assignment through their user interfaces.
To manage license assignments for users and groups, administrators must use the
Microsoft 365 Admin Center. This update is designed to streamline the license
management process within the Microsoft ecosystem. This change is limited to the
user interface. API and PowerShell access remain unaffected. For detailed guidance
on assigning licenses using the Microsoft 365 Admin Center, refer to the following
resources:
Assign or Unassign Licenses for Users in the Microsoft 365 Admin Center
Add Users and Assign Licenses in Microsoft 365
Assign Licenses to a Group Using the Microsoft 365 Admin Center
We encourage all administrators to familiarize themselves with the new
procedures to ensure a smooth transition. For any further assistance or
inquiries, contact our support team .
Microsoft paid cloud services, such as Microsoft 365, Enterprise Mobility + Security,
Dynamics 365, and other similar products, require licenses. These licenses are assigned
to each user who needs access to these services. To manage licenses, administrators use
one of the management portals (Office or Azure) and PowerShell cmdlets. Microsoft
Entra ID is the underlying infrastructure that supports identity management for all
Microsoft Cloud services. Microsoft Entra ID stores information about license
assignment states for users.
Microsoft Entra ID includes group-based licensing, which allows you to assign one or
more product licenses to a group. Microsoft Entra ID ensures that the licenses are
assigned to all members of the group. Any new members who join the group are
assigned the appropriate licenses. When they leave the group, those licenses are
removed. This licensing management eliminates the need for automating license
management via PowerShell to reflect changes in the organization and departmental
structure on a per-user basis.
Licensing requirements
You must have one of the following licenses for every user who benefits from group-
based licensing:
Paid or trial edition of Microsoft 365 Business Premium or Office 365 Enterprise E3
or Office 365 A3 or Office 365 GCC G3 or Office 365 E3 for GCCH or Office 365 E3
for DOD and higher.
Features
Here are the main features of group-based licensing:
Licenses can be assigned to any security group in Microsoft Entra ID. Security
groups can be synced from on-premises, by using Microsoft Entra Connect. You
can also create security groups directly in Microsoft Entra ID (also called cloud-only
groups), or automatically via the Microsoft Entra dynamic group feature.
When a product license is assigned to a group, the administrator can disable one
or more service plans in the product. Typically, this assignment is done when the
organization isn't yet ready to start using a service included in a product. For
example, the administrator might assign Microsoft 365 to a department, but
temporarily disable the Yammer service.
All Microsoft Cloud services that require user-level licensing are supported. This
support includes all Microsoft 365 products, Enterprise Mobility + Security, and
Dynamics 365.
A user can be a member of multiple groups with license policies specified. A user
can also have some licenses that were directly assigned, outside of any groups. The
resulting user state is a combination of all assigned product and service licenses. If
a user is assigned the same license from multiple sources, the license is consumed
only once.
In some cases, licenses can't be assigned to a user. For example, there might not
be enough available licenses in the tenant, or conflicting services might have been
assigned at the same time. Administrators have access to information about users
for whom Microsoft Entra ID couldn't fully process group licenses. They can then
take corrective action based on that information.
Next steps
To learn more about other scenarios for license management through group-based
licensing, see:
Feedback
Was this page helpful? Yes No
7 Note
Starting September 1, 2024, the Microsoft Entra ID Admin Center and the Microsoft
Azure portal no longer supports license assignment through their user interfaces.
To manage license assignments for users and groups, administrators must use the
Microsoft 365 Admin Center. This update is designed to streamline the license
management process within the Microsoft ecosystem. This change is limited to the
user interface. API and PowerShell access remain unaffected. For detailed guidance
on assigning licenses using the Microsoft 365 Admin Center, refer to the following
resources:
Assign or Unassign Licenses for Users in the Microsoft 365 Admin Center
Add Users and Assign Licenses in Microsoft 365
Assign Licenses to a Group Using the Microsoft 365 Admin Center
We encourage all administrators to familiarize themselves with the new
procedures to ensure a smooth transition. For any further assistance or
inquiries, contact our support team .
Group-based licensing (GBL) in Microsoft 365 Admin Portal, introduces the concept of
users in a licensing error state. This article explains the reasons why users might end up
in this state.
When you assign licenses directly to individual users or using group-based licensing (or
both), the assignment operation might fail for reasons that are related to business logic.
Conflict between two service plans that can't be assigned at the same time
Service plans in one license depend on service plans from another license
Find license assignment errors on users
members of a group when using group based
licensing
When you're using group-based licensing, these errors happen in the background while
the service is assigning licenses. For this reason, the errors can't be communicated to
you immediately. Instead, they're recorded on the user object within the group. The
original intent to license the user is never lost, but is recorded in an error state for future
investigation and resolution. You can also use audit logs to monitor group-based
licensing activity.
2. Browse to Billing > Licenses to open a page where you can see and manage all
license products in the organization.
3. Select the affected license and to view the status of each group assigned to the
selected license navigate to the group selection option.
4. A notification appears if there are any users of the group in an error state. The
status of license assignment for each group would be one of the following values:
5. Select the group name to review errors for the affected users in the group.
6. You can also filter the errors using the Filter option on the top right if you have a
large number of affected users.
The following sections give a description of each potential problem and ways to try
resolving it.
7 Note
Azure AD and MSOnline PowerShell modules are deprecated as of March 30, 2024.
To learn more, read the deprecation update . After this date, support for these
modules are limited to migration assistance to Microsoft Graph PowerShell SDK
and security fixes. The deprecated modules will continue to function through
March, 30 2025.
To see how many licenses are available, go to the Entra Admin Portal > Billing >
Licenses > All products.
To see which users and groups are consuming licenses, navigate to the M365 Admin
portal under Billing > Licenses and select a product. Under Users, you see a list of all
users who have licenses assigned directly or via one or more groups. Under Groups, you
see all groups that have that product assigned.
When Microsoft Entra ID assigns group licenses, any users without a specified
usage location inherit the location of the directory. Microsoft recommends that
administrators set the correct usage location values on users before using group-
based licensing to comply with local laws and regulations. - The attributes of First
name, Last name, Other email address, and User type aren't mandatory for license
assignment.
Tip
To see if there's a duplicate proxy address, execute the following PowerShell cmdlet
against Exchange Online:
PowerShell
For more information about this problem, see Proxy address is already being used
error message in Exchange Online.
Other
Other errors are typically the result of an error with another license assigned by the
same group.
To identify the other licensing assigned to the affected user from the same group, you
can review the user licenses from the Microsoft Entra Admin Portal.
In the Entra Admin Portal, navigate to Users – All Users – locate the affected user and
then review their Licenses.
You can review the user's audit logs for more information about the error as long as the
error occurred in the last 30 days in most cases (depending on the number of days
Audit logs available in the tenant, some may have only seven days)
Audit log License Assignment Error Records can be identified using the following details:
Status: failure
Initiated by (actor)
Type: Application
Display Name: Microsoft Entra ID Group-Based Licensing
For example, after you resolve a dependency violation error for an affected user, you
need to trigger the reprocessing of the user. To reprocess a user, navigate back to the
M365 Admin Portal > Billing > Licenses. Select the license and navigate to the group
where one or more affected users show in error, select the user(s) and then select the
Reprocess button on the toolbar.
Alternately, you can use Graph for PowerShell Invoke-MgLicenseUser to reprocess users.
More than one product license assigned to a
group
You can assign more than one product license to a group. For example, you can assign
Office 365 Enterprise E3 and Enterprise Mobility + Security to a group to easily enable
all included services for users.
Problem: Group based licensing processing attempts to assign all specified licenses in
the group to each user within the group. However, if the processing of the licenses
encounters issues such as insufficient licenses or conflicts with other services enabled, it
doesn't assign other licenses in the group either. You need to check which users have
license assignment failures and which products are affected. If a problem occurs during
license assignment, the process may not complete. For example, issues like insufficient
licenses or service plans that can't be assigned at the same time, would prevent the
process from finishing.
Problem: If you try to assign this product on its own to a group, the portal returns a
notification message. To assign this add-on license to a group, you must ensure that the
group contains the prerequisite service plan. It's also possible to create a standalone
group that contains only the minimum required products to make the add-on work. It
can be used to license only selected users for the add-on product. Based on the
previous example, you would assign the following products to the same group:
Office 365 Enterprise E3 with only the Exchange Online (Plan 2) service plan
enabled
Microsoft Workplace Analytics
From now on, any users added to this group consume one license of the E3 product and
one license of the Workplace Analytics product. At the same time, those users can be
members of another group that gives them the full E3 product, and they still consume
only one license for that product.
Tip
You can create multiple groups for each prerequisite service plan. For example, if
you use both Office 365 Enterprise E1 and Office 365 Enterprise E3 for your users,
you can create two groups to license Microsoft Workplace Analytics: one that uses
E1 as a prerequisite and the other that uses E3. This approach lets you distribute
the add-on to E1 and E3 users without consuming other licenses.
When you change an existing static group to a dynamic group, all existing
members are removed from the group, and then the membership rule is processed
to add new members. If the group is used to control access to apps or resources,
the original members might lose access until the membership rule is fully
processed.
We recommend that you test the new membership rule beforehand to make sure that
the new membership in the group is as expected. If you encounter errors during your
test, see Use audit logs to monitor group-based licensing activity.
Next steps
To learn more about other scenarios for license management through groups, see:
Feedback
Was this page helpful? Yes No
Microsoft Entra ID may include preview, beta, or other prerelease features, services,
software, or regions offered by Microsoft to obtain customer feedback ("Previews").
Previews are made available to you under the terms applicable to previews, which are
outlined in the overall Microsoft product terms for online services .
Microsoft may roll out previews in phases to give Microsoft and customers the
opportunity to evaluate and understand potential new features.
7 Note
Not all features that are in preview become generally available. While it isn't the
norm, it is possible that Microsoft might cancel features during preview.
1. Private preview – during this phase we invite a few customers to take part in early
access to new concepts and features. This phase doesn't include formal support.
2. Public preview – during this phase we allow any customer with the proper
Microsoft Entra ID license to evaluate the new feature. Public previews may include
limited customer support and normal service level agreements don't apply. For
new features exposed in the Microsoft Entra admin center, customers can expect
to see information banners in the user interface that draw attention to the new
experience available during the preview. By clicking on the information banner
customers then opt in to the preview experience.
3. Generally available (GA) – during this phase, the feature is open for any licensed
customer to use and is supported via all Microsoft support channels. Be aware
when a new feature impacts existing functionality, it might change the way you or
your users use the functionality.
Each Microsoft Entra ID preview program may have different opt-in requirements and
dependencies.
Feedback
Was this page helpful? Yes No
This article discusses licensing options for the Microsoft Entra product family. It's intended for
security decision makers, identity and network access administrators, and IT professionals who
are considering Microsoft Entra solutions for their organizations.
7 Note
The licensing options on this page aren't comprehensive. You can get detailed information
about the various options at the Microsoft Entra pricing page and at the Compare
Microsoft 365 Enterprise plans and pricing page .
Microsoft Entra ID Free - Included with Microsoft cloud subscriptions such as Microsoft Azure,
Microsoft 365, and others.
Microsoft Entra Suite - The suite combines Microsoft Entra products to secure access for your
employees. It allows administrators to provide secure access from anywhere to any app or
resource whether cloud or on-premises, while ensuring least privilege access. A Microsoft Entra
ID P1 subscription is required. The Microsoft Entra suite includes five products:
) Important
User and group license assignments are managed through the Microsoft 365 Admin
Center. For more information on how to assign or unassign licenses to users and groups,
see this article: - Assign or unassign licenses for users in the Microsoft 365 admin center
App provisioning
Microsoft Entra application proxy requires Microsoft Entra ID P1 or P2 licenses. For more
information about licensing, see Microsoft Entra pricing.
https://dev.azure.com/msft-skilling/Content/_workitems/edit/438678
Authentication
The following table lists features that are available for authentication in the various versions of
Microsoft Entra ID. Plan out your needs for securing user sign-in, then determine which
approach meets those requirements. For example, although Microsoft Entra ID Free provides
security defaults with multifactor authentication, only Microsoft Authenticator can be used for
the authentication prompt, including text and voice calls. This approach might be a limitation if
you can't make sure that Authenticator is installed on a user's personal device.
ノ Expand table
Mobile app as a ✅ ✅ ✅ ✅ ✅
second factor
Phone call as a ✅ ✅ ✅
second factor
SMS as a second ✅ ✅ ✅ ✅
factor
Admin control ✅ ✅ ✅ ✅
over verification
methods
Feature Microsoft Entra ID Microsoft Entra ID Office Microsoft Microsoft
Free - Security Free - Global 365 Entra ID P1 Entra ID P2
defaults (enabled Administrators only
for all users)
Fraud alert ✅ ✅
MFA Reports ✅ ✅
Custom greetings ✅ ✅
for phone calls
Custom caller ID ✅ ✅
for phone calls
Trusted IPs ✅ ✅
Remember MFA ✅ ✅ ✅ ✅
for trusted devices
Conditional Access ✅ ✅
Risk-based ✅
Conditional Access
Self-service ✅ ✅ ✅ ✅ ✅
password reset
(SSPR)
SSPR with ✅ ✅
writeback
Managed identities
There are no licensing requirements for using Managed identities for Azure resources.
Managed identities for Azure resources provide an automatically managed identity for
applications to use when connecting to resources that support Microsoft Entra authentication.
One of the benefits of using managed identities is that you don’t need to manage credentials,
and they can be used at no extra cost. For more information, see What is managed identities
for Azure resources?.
Features by license
The following table shows what features associated with identity governance are available with
each license. For more information on other features, see Microsoft Entra plans and pricing .
Not all features are available in all clouds; see Microsoft Entra feature availability for Azure
Government.
ノ Expand table
API-driven provisioning ✅ ✅ ✅ ✅
HR-driven provisioning ✅ ✅ ✅ ✅
Entitlement management - ✅ ✅ ✅
Capabilities previously generally
available in Microsoft Entra ID P2
Entitlement management - ✅ ✅ ✅
Conditional Access Scoping
Entitlement management ✅ ✅ ✅
MyAccess Search
Entitlement management - ✅ ✅
Custom Extensions (Logic Apps)
Feature Free Microsoft Microsoft Microsoft Entra Microsoft
Entra ID P1 Entra ID P2 ID Governance Entra Suite
Entitlement management - ✅ ✅
Directly Assign Any User
(Preview)
Entitlement management - ✅ ✅ ✅
Manage the lifecycle of external
users
My Access portal ✅ ✅ ✅
Entitlement management - ✅ ✅
Microsoft Entra Roles (Preview)
Entitlement management - ✅ ✅
Request access packages on-
behalf-of (Preview)
Entitlement management - ✅ ✅
Sponsors Policy
Cross-cloud synchronization ✅ ✅
Entitlement Management
Using this feature requires Microsoft Entra ID Governance subscriptions for your organization's
users. Some capabilities within this feature can operate with a Microsoft Entra ID P2
subscription.
ノ Expand table
Access reviews
Using this feature requires Microsoft Entra ID Governance subscriptions for your organization's
users, including for all employees who are reviewing access or having their access reviewed.
Some capabilities within this feature might operate with a Microsoft Entra ID P2 subscription.
ノ Expand table
An administrator creates an access review of Group A 1 license for the group owner as 76
with 75 users and 1 group owner, and assigns the reviewer, and 75 licenses for the
group owner as the reviewer. 75 users.
An administrator creates an access review of Group B 500 licenses for users, and 3 503
with 500 users and 3 group owners, and assigns the 3 licenses for each group owner as
group owners as reviewers. reviewers.
An administrator creates an access review of Group B 500 licenses for each user as self- 500
with 500 users. Makes it a self-review. reviewers
An administrator creates an access review of Group C 50 licenses for each user as self- 50
with 50 member users. Makes it a self-review. reviewers.
An administrator creates an access review of Group D 6 licenses for each user as self- 6
with 6 member users. Makes it a self-review. reviewers. No additional licenses
are required.
Lifecycle Workflows
With Microsoft Entra ID Governance licenses for Lifecycle Workflows, you can:
Using this feature requires Microsoft Entra ID Governance subscriptions for your organization's
users.
A Lifecycle Workflows Administrator creates a workflow to add 1 license for the 401
new hires in the Marketing department to the Marketing teams Lifecycle Workflows
group. 250 new hires are assigned to the Marketing teams group Administrator, and 400
via this workflow once. Other 150 new hires are assigned to the licenses for the users.
Marketing teams group via this workflow later the same year.
Customers with Microsoft 365 Business Premium licenses also have access to Conditional
Access features.
Risk-based policies require access to Microsoft Entra ID Protection, which is a Microsoft Entra
ID P2 feature.
Microsoft Entra Suite includes all Microsoft Entra Conditional Access features.
Other products and features that could interact with Conditional Access policies require
appropriate licensing for those products and features.
When licenses required for Conditional Access expire, policies aren't automatically disabled or
deleted. This grants customers the ability to migrate away from Conditional Access policies
without a sudden change in their security posture. Remaining policies can be viewed and
deleted, but no longer updated.
Security defaults help protect against identity-related attacks and are available for all
customers.
Microsoft External ID
Microsoft Entra External ID core features are free for your first 50,000 monthly active users.
More licensing information is available at the External ID FAQ
ノ Expand table
ノ Expand table
Health No Yes
Users with eligible and/or time-bound assignments to Microsoft Entra ID or Azure roles
managed using PIM
Users with eligible and/or time-bound assignments as members or owners of PIM for
Groups
Users able to approve or reject activation requests in PIM
Users assigned to an access review
Users who perform access reviews
Woodgrove Bank has 10 administrators for different departments Five licenses for the 5
and 2 Privileged Role Administrators that configure and manage administrators who
PIM. They make five administrators eligible. are eligible
Graphic Design Institute has 25 administrators of which 14 are 14 licenses for the 17
managed through PIM. Role activation requires approval and there eligible roles + three
are three different users in the organization who can approve approvers
activations.
Contoso has 50 administrators of which 42 are managed through 42 licenses for the 53
PIM. Role activation requires approval and there are five different eligible roles + five
users in the organization who can approve activations. Contoso also approvers + six
does monthly reviews of users assigned to administrator roles and reviewers
reviewers are the users’ managers of which six aren't in
administrator roles managed by PIM.
Verify and issue organizational credentials for any unique identity attributes.
Empower end-users with ownership of their digital credential and greater visibility
Reduce organizational risk and simplify the audit process
Create user-centric, serverless apps that use Verified ID credentials.
Microsoft Entra Verified ID also provides Face Check as a premium feature available as an add-
on and included in the Microsoft Entra Suite (limited to 8 Face Checks per user per month).
Multitenant organizations
In the source tenant: Using this feature requires Microsoft Entra ID P1 licenses. Each user who is
synchronized with cross-tenant synchronization must have a P1 license in their home/source
tenant. To find the right license for your requirements, see Microsoft Entra ID Plans & Pricing .
In the target tenant: Cross-tenant sync relies on the Microsoft Entra External ID billing model.
To understand the external identities licensing model, see MAU billing model for Microsoft
Entra External ID. You also need at least one Microsoft Entra ID P1 license in the target tenant
to enable autoredemption.
All multitenant organizations features are included as part of Microsoft Entra suite.
Roles
Administrative units
Using administrative units requires a Microsoft Entra ID P1 license for each administrative unit
administrator who is assigned directory roles over the scope of the administrative unit, and a
Microsoft Entra ID Free license for each administrative unit member. Creating administrative
units is available with a Microsoft Entra ID Free license. If you are using rules for dynamic
membership groups for administrative units, each administrative unit member requires a
Microsoft Entra ID P1 license. To find the right license for your requirements, see Comparing
generally available features of the Free and Premium editions .
Features in preview
Licensing information for any features currently in preview is included here when applicable.
For more information about preview features, see Microsoft Entra ID preview features.
Related content
Microsoft Entra pricing
Sign up for Microsoft Entra ID P1 or P2
editions
Article • 03/05/2025
You can purchase and associate Microsoft Entra ID P1 or P2 editions with your Azure
subscription. If you need to create a new Azure subscription, you also need to activate
your licensing plan and your Microsoft Entra ID service access. For information about
obtaining a free trial, see Microsoft Entra ID P2 Trial .
Before you sign up for Active Directory Premium 1 or Premium 2, you must first
determine which of your existing subscription or plan to use:
Sign up options
When you sign up using your Azure subscription with previously purchased and
activated Microsoft Entra ID licenses, automatically activates the licenses in the same
directory. If that's not the case, you must still activate your license plan and your
Microsoft Entra ID service access.
For more information about Microsoft Enterprise Mobility + Security, see Enterprise
Mobility + Security web site .
Join the Microsoft 365 Developer program and if qualified get a free renewable
Microsoft 365 E5 instant sandbox.
For more information about volume licensing purchase options, see How to
purchase through Volume Licensing .
Sign in. Choose this option if you have an existing tenant, and then sign in
using your existing administrator account. You must be a Global
Administrator on the tenant where the licenses are being activated.
Sign up. Choose this option if you want to open the Create Account Profile
page and create a new Microsoft Entra tenant for your licensing plan.
When you're done, you'll receive confirmation of activating the license plan for your
tenant.
Tip
You won't be able to access Microsoft Entra ID for your new tenant until you
activate Microsoft Entra directory access from the welcome email.
2. After successfully signing in, you'll go through two-step verification using a mobile
device.
The activation process typically takes only a few minutes and then you can use your
Microsoft Entra tenant.
Next steps
Now that you have Microsoft Entra ID P1 or P2, you can customize your domain, add
your corporate branding, create a tenant, and add groups and users.
Feedback
Was this page helpful? Yes No
In Microsoft Entra, we group our security recommendations into several main areas. This
structure allows organizations to logically break up projects into related consumable chunks.
Tip
Some organizations might take these recommendations exactly as written, while others
might choose to make modifications based on their own business needs. In our initial
release of this guidance, we focus on traditional workforce tenants. These workforce
tenants are for your employees, internal business apps, and other organizational
resources.
We recommend that all of the following controls be implemented where licenses are available.
This helps to provide a foundation for other resources built on top of this solution. More
controls will be added to this document over time.
Privileged access
If privileged cloud accounts are synchronized with on-premises accounts, an attacker who
acquires credentials for on-premises can use those same credentials to access cloud resources
and move laterally to the cloud environment.
Remediation action
Review the users that have onPremisesImmutableId and onPremisesSyncEnabled set. See
Microsoft Graph API user resource type.
Create cloud-only user accounts for those individuals and remove their hybrid identity
from privileged roles.
Remediation action
Use Microsoft Entra Privileged Identity Management (PIM) to provide time-bound just-in-time
access to privileged role assignments. Use access reviews in Microsoft Entra ID Governance to
regularly review privileged access to ensure continued need.
Remediation action
Remediation action
Enable the Restrict non-admin users from creating tenants setting. For users that need the
ability to create tenants, assign them the Tenant Creator role. You can also review tenant
creation events in the Microsoft Entra audit logs.
Remediation action
Ensure that privileged accounts register and use phishing resistant methods
Deploy Conditional Access policy to target privileged accounts and require phishing
resistant credentials using authentication strengths
Remediation action
The Global Administrator role provides access to administrative features in Microsoft Entra ID
and services that use Microsoft Entra identities, including Microsoft Defender XDR, Microsoft
Purview, Exchange Online, and SharePoint Online. Without approval gates, threat actors can
rapidly escalate to complete tenant takeover, exfiltrating sensitive data, compromising all user
accounts, and establishing long-term backdoors through service principals or federation
modifications that persist even after the initial compromise is detected.
Remediation action
When threat actors obtain access through compromised guest accounts with elevated
privileges, they can escalate their own privilege to create other backdoor accounts, modify
security policies, or assign themselves permanent roles within the organization. The
compromised privileged guest accounts enable threat actors to establish persistence and then
make all the changes they need to remain undetected. For example they could create cloud-
only accounts, bypass Conditional Access policies applied to internal users, and maintain access
even after the guest's home organization detects the compromise. Threat actors can then
conduct lateral movement using administrative privileges to access sensitive resources, modify
audit settings, or disable security monitoring across the entire tenant. Threat actors can reach
complete compromise of the organization's identity infrastructure while maintaining plausible
deniability through the external guest account origin.
Remediation action
If this check passes, your tenant has a Conditional Access policy that restricts privileged role
access to PAW devices, but it isn't the only control required to fully enable a PAW solution. You
also need to configure an Intune device configuration and compliance policy and a device
filter.
Remediation action
Credential management
Attackers might use these accounts as entry points into the tenant. By using intercepted user
sessions, attackers can disguise their activities as legitimate user actions, evade detection, and
continue their attack without raising suspicion. From there, they might attempt to manipulate
MFA settings to establish persistence, plan, and execute further attacks based on the privileges
of compromised accounts.
Remediation action
Microsoft announced the deprecation of legacy MFA and SSPR policies, with a retirement date
set for September 30, 2025. Organizations are advised to complete the migration to the
Authentication Methods policy before this date to avoid potential disruptions and to benefit
from the enhanced security and management capabilities of the unified policy.
Remediation action
Remediation action
Remediation action
Remediation action Give users the context they need to make informed approval decisions.
Configure Microsoft Authenticator notifications by setting the Authentication methods policy
to include the application name and geographic location.
Access control
When an attacker successfully gains unauthorized access to credentials, they can use them to
access linked services, using the weak authentication method as an entry point. Attackers who
gain access through legacy authentication might make changes to Microsoft Exchange, such as
configuring mail forwarding rules or changing other settings, allowing them to maintain
continued access to sensitive communications.
Legacy authentication also provides attackers with a consistent method to reenter a system
using compromised credentials without triggering security alerts or requiring reauthentication.
From there, attackers can use legacy protocols to access other systems that are accessible via
the compromised account, facilitating lateral movement. Attackers using legacy protocols can
blend in with legitimate user activities, making it difficult for security teams to distinguish
between normal usage and malicious behavior.
Remediation action
Remediation action
Remediation action
Create a Conditional Access policy to require a secure password change for elevated user
risk.
Use Microsoft Entra ID Protection to further investigate risk.
Remediation action
Remediation action
Remediation action
Migrate from federation to cloud authentication like Microsoft Entra Password hash
synchronization (PHS).
Remediation action
Configure named locations to define trusted IP ranges and geographic regions for
enhanced location-based risk detection and Conditional Access policy enforcement
Application management
Remediation action
Remediation action
Applications and service principals that have permissions for Microsoft Graph APIs or other
APIs have a higher risk because an attacker can potentially exploit these additional permissions.
Remediation action
Move applications away from shared secrets to managed identities and adopt more
secure practices.
Use managed identities for Azure resources
Deploy Conditional Access policies for workload identities
Implement secret scanning
Deploy application authentication policies to enforce secure authentication practices
Create a least-privileged custom role to rotate application credentials
Ensure you have a process to triage and monitor applications
Remediation action
Query all of your service principals and application registrations that have certificate
credentials. Make sure the certificate start date is less than 180 days.
Remediation action
Attackers can use service principals to blend in with legitimate system processes and activities.
Because service principals often perform automated tasks, malicious activities carried out under
these accounts might not be flagged as suspicious.
Remediation action
Block nonprivileged users from creating apps
Without strict validation of redirect URIs, attackers can bypass security controls, impersonate
legitimate applications, and escalate their privileges. This misconfiguration enables persistence,
unauthorized access, and lateral movement, as adversaries exploit weak OAuth enforcement to
infiltrate protected resources undetected.
Remediation action
Check the redirect URIs for your application registrations. Make sure the redirect URIs
don't have localhost, *.azurewebsites.net, wildcards, or URL shorteners.
Without strict validation of redirect URIs, attackers can bypass security controls, impersonate
legitimate applications, and escalate their privileges. This misconfiguration enables persistence,
unauthorized access, and lateral movement, as adversaries exploit weak OAuth enforcement to
infiltrate protected resources undetected.
Remediation action
Check the redirect URIs for your application registrations. Make sure the redirect URIs
don't have localhost, *.azurewebsites.net, wildcards, or URL shorteners.
Remediation action
For admin consent requests, set the Users can request admin consent to apps they are unable
to consent to setting to Yes. Specify other settings, such as who can review requests.
Remediation action
Remediation action Create a risk-based Conditional Access policy for workload identities.
Remediation action Enable the app instance property lock for all multitenant applications and
specify the properties to lock.
When credentials (like client secrets or certificates) are configured for these service principals in
your tenant, it means someone - either an administrator or a malicious actor - enabled them to
authenticate independently within your environment. These credentials should be investigated
to determine their legitimacy and necessity. If they're no longer needed, they should be
removed to reduce the risk.
If this check doesn't pass, the recommendation is to "investigate" because you need to identify
and review any applications with unused credentials configured.
Remediation action
Confirm if the credentials added are still valid use cases. If not, remove credentials from
Microsoft service applications to reduce security risk.
In the Microsoft Entra admin center, browse to Entra ID > App registrations and select
the affected application.
Go to the Certificates & secrets section and remove any credentials that are no longer
needed.
External collaboration
Allowing external users to onboard other external users increases the risk of unauthorized
access. If an attacker compromises an external user's account, they can use it to create more
external accounts, multiplying their access points and making it harder to detect the intrusion.
Remediation action
Restrict who can invite guests to only users assigned to specific admin roles
External accounts with permissions to read directory object permissions provide attackers with
broader initial access if compromised. These accounts allow attackers to gather additional
information from the directory for reconnaissance.
Remediation action
Attackers might gain access with external user accounts, if multifactor authentication (MFA)
isn't universally enforced or if there are exceptions in place. They might also gain access by
exploiting the vulnerabilities of weaker MFA methods like SMS and phone calls using social
engineering techniques, such as SIM swapping or phishing, to intercept the authentication
codes.
Once an attacker gains access to an account without MFA or a session with weak MFA
methods, they might attempt to manipulate MFA settings (for example, registering attacker
controlled methods) to establish persistence to plan and execute further attacks based on the
privileges of the compromised accounts.
Remediation action
Without vetting the security of organizations you collaborate with, malicious external accounts
can persist undetected, exfiltrate confidential data, and inject malicious payloads. This type of
exposure can weaken organizational control and enable cross-tenant attacks that bypass
traditional perimeter defenses and undermine both data integrity and operational resilience.
Cross-tenant settings for outbound access in Microsoft Entra provide the ability to block
collaboration with unknown organizations by default, reducing the attack surface.
Remediation action
Implementing TRv2 enforces policies that restrict access to specified tenants, mitigating these
risks by ensuring that authentication and data access are confined to authorized tenants only.
If this check passes, your tenant has a TRv2 policy configured but more steps are required to
validate the scenario end-to-end.
Remediation action
If logs aren't regularly archived or sent to a SIEM tool for querying, it's challenging to
investigate sign-in issues. The absence of historical logs means that security teams might miss
patterns of failed sign-in attempts, unusual activity, and other indicators of compromise. This
lack of visibility can prevent the timely detection of breaches, allowing attackers to maintain
undetected access for extended periods.
Remediation action
When an attacker successfully gains unauthorized access to credentials, they can use them to
access linked services, using the weak authentication method as an entry point. Attackers who
gain access through legacy authentication might make changes to Microsoft Exchange, such as
configuring mail forwarding rules or changing other settings, allowing them to maintain
continued access to sensitive communications.
Legacy authentication also provides attackers with a consistent method to reenter a system
using compromised credentials without triggering security alerts or requiring reauthentication.
From there, attackers can use legacy protocols to access other systems that are accessible via
the compromised account, facilitating lateral movement. Attackers using legacy protocols can
blend in with legitimate user activities, making it difficult for security teams to distinguish
between normal usage and malicious behavior.
Remediation action
Attackers might use these accounts as entry points into the tenant. By using intercepted user
sessions, attackers can disguise their activities as legitimate user actions, evade detection, and
continue their attack without raising suspicion. From there, they might attempt to manipulate
MFA settings to establish persistence, plan, and execute further attacks based on the privileges
of compromised accounts.
Remediation action
A lack of triage of these risky users allows for expanded reconnaissance activities and lateral
movement, with anomalous behavior patterns continuing to generate uninvestigated alerts.
Threat actors become emboldened as security teams show they aren't actively responding to
risk indicators.
Remediation action
A lack of response lets attackers execute reconnaissance, attempt to escalate their access, and
blend into normal patterns. When untriaged sign-ins continue to generate alerts and there's no
intervention, security gaps widen, facilitating lateral movement and defense evasion, as
adversaries recognize the absence of an active security response.
Remediation action
Remediation action
Address all high priority recommendations in the Microsoft Entra admin center
Remediation action
Address all active or postponed recommendations in the Microsoft Entra admin center
User sign-in activity uses token protection
A threat actor can intercept or extract authentication tokens from memory, local storage on a
legitimate device, or by inspecting network traffic. The attacker might replay those tokens to
bypass authentication controls on users and devices, get unauthorized access to sensitive data,
or run further attacks. Because these tokens are valid and time bound, traditional anomaly
detection often fails to flag the activity, which might allow sustained access until the token
expires or is revoked.
Token protection, also called token binding, helps prevent token theft by making sure a token
is usable only from the intended device. Token protection uses cryptography so that without
the client device key, no one can use the token.
Remediation action
Create a Conditional Access policy to set up token protection.
Remediation action
Remediation action
Related content
Microsoft Entra deployment plans
Microsoft Entra operations reference guide
What is Identity Secure Score?
06/12/2025
The Identity Secure Score is shown as a percentage that functions as an indicator for how
aligned you are with Microsoft's recommendations for security. Each improvement action in
Identity Secure Score is tailored to your configuration. You can access the score and view
individual recommendations related to your score in Microsoft Entra recommendations. You
can also see how your score changes over time.
Prerequisites
Identity Secure Score is available to free and paid customers.
Some recommendations require a paid license to view and act on. For more information,
see What are Microsoft Entra recommendations.
To view the improvement action but not update, you need at least the Service Support
Administrator role.
To update the status of an improvement action, you need at least the SharePoint
Administrator role.
For a full list of roles, see Least privileged roles by task.
The score and related recommendations are also found at Entra ID > Overview >
Recommendations.
To address - You recognize that the improvement action is necessary and plan to address
it at some point in the future. This state also applies to actions that are detected as
partially, but not fully completed.
Risk accepted - Security should always be balanced with usability, and not every
recommendation works for everyone. When that is the case, you can choose to accept the
risk, or the remaining risk, and not enact the improvement action. You aren't awarded any
points, and the action isn't visible in the list of improvement actions. You can view this
action in history or undo it at any time.
Planned - There are concrete plans in place to complete the improvement action.
Resolved through third party and Resolved through alternate mitigation - The
improvement action was addressed by a non-Microsoft application or software, or an
internal tool. You're awarded the points the action is worth, so your score better reflects
your overall security posture. If a non-Microsoft or internal tool no longer covers the
control, you can choose another status. Keep in mind, Microsoft has no visibility into the
completeness of implementation if the improvement action is marked as either of these
statuses.
Identity
Data
Devices
Infrastructure
Apps
The Identity Secure Score represents the identity part of the Microsoft secure score. This
overlap means that your recommendations for the Identity Secure Score and the identity score
in Microsoft are the same.
Secure your organization's identities with
Microsoft Entra ID
Article • 05/31/2024
It can seem daunting trying to secure your workers in today's world, especially when you have
to respond rapidly and provide access to many services quickly. This article helps provide a
concise list of actions to take, helping you identify and prioritize features based on the license
type you own.
Microsoft Entra ID offers many features and provides many layers of security for your Identities,
navigating which feature is relevant can sometimes be overwhelming. This document is
intended to help organizations deploy services quickly, with secure identities as the primary
consideration.
Each table provides security recommendations to protect identities from common security
attacks while minimizing user friction.
Prerequisites
This guide assumes that your cloud-only or hybrid identities are established in Microsoft Entra
ID already. For help with choosing your identity type see the article, Choose the right
authentication (AuthN) method for your Microsoft Entra hybrid identity solution.
Microsoft recommends that organizations have two cloud-only emergency access accounts
permanently assigned the Global Administrator role. These accounts are highly privileged and
aren't assigned to specific individuals. The accounts are limited to emergency or "break glass"
scenarios where normal accounts can't be used or all other administrators are accidentally
locked out. These accounts should be created following the emergency access account
recommendations.
Guided walkthrough
For a guided walkthrough of many of the recommendations in this article, see the Set up
Microsoft Entra ID guide when signed in to the Microsoft 365 Admin Center. To review best
practices without signing in and activating automated setup features, go to the Microsoft 365
Setup portal .
Office 365 (Office 365 E1, E3, E5, F1, A1, A3, A5)
Microsoft 365 (Business Basic, Apps for Business, Business Standard, Business Premium,
A1)
Microsoft Entra ID Free (included with Azure, Dynamics 365, Intune, and Power Platform)
ノ Expand table
Enable Security Defaults Protect all user identities and applications by enabling multifactor
authentication and blocking legacy authentication.
Enable Password Hash Sync (if Provide redundancy for authentication and improve security
using hybrid identities) (including Smart Lockout, IP Lockout, and the ability to discover
leaked credentials).
Enable AD FS smart lock out (If Protects your users from experiencing extranet account lockout from
applicable) malicious activity.
Enable Microsoft Entra smart Smart lockout helps to lock out bad actors who are trying to guess
lockout (if using managed your users' passwords or use brute-force methods to get in.
identities)
Disable end-user consent to The admin consent workflow gives admins a secure way to grant
applications access to applications that require admin approval so end users don't
expose corporate data. Microsoft recommends disabling future user
consent operations to help reduce your surface area and mitigate this
risk.
Integrate supported SaaS Microsoft Entra ID has a gallery that contains thousands of
applications from the gallery to preintegrated applications. Some of the applications your
Microsoft Entra ID and enable organization uses are probably in the gallery accessible directly from
single sign-on (SSO) the Azure portal. Provide access to corporate SaaS applications
remotely and securely with improved user experience (single sign-on
(SSO)).
Recommended action Detail
Automate user provisioning and Automatically create user identities and roles in the cloud (SaaS)
deprovisioning from SaaS applications that users need access to. In addition to creating user
Applications (if applicable) identities, automatic provisioning includes the maintenance and
removal of user identities as status or roles change, increasing your
organization's security.
Enable Secure hybrid access: Publish and protect your on-premises and cloud legacy
Secure legacy apps with existing authentication applications by connecting them to Microsoft Entra ID
app delivery controllers and with your existing application delivery controller or network.
networks (if applicable)
Enable self-service password This ability reduces help desk calls and loss of productivity when a
reset (applicable to cloud only user can't sign in to their device or an application.
accounts)
Use least privileged roles where Give your administrators only the access they need to only the areas
possible they need access to.
Enable Microsoft's password Stop requiring users to change their password on a set schedule,
guidance disable complexity requirements, and your users are more apt to
remember their passwords and keep them something that is secure.
Microsoft Entra ID P1
Microsoft Enterprise Mobility + Security E3
Microsoft 365 (E3, A3, F1, F3)
ノ Expand table
Enable combined registration Allow your users to register from one common experience for both
experience for Microsoft Entra Microsoft Entra multifactor authentication and self-service
multifactor authentication and SSPR password reset.
to simplify user registration
experience
Configure multifactor authentication Ensure accounts are protected from being compromised with
settings for your organization multifactor authentication.
Enable self-service password reset This ability reduces help desk calls and loss of productivity when a
Recommended action Detail
Implement Password Writeback (if Allow password changes in the cloud to be written back to an on-
using hybrid identities) premises Windows Server Active Directory environment.
Create and enable Conditional Multifactor authentication for admins to protect accounts that are
Access policies assigned administrative rights.
Enable Password Hash Sync (if using Provide redundancy for authentication and improve security
hybrid identities) (including Smart Lockout, IP Lockout, and the ability to discover
leaked credentials.)
Enable AD FS smart lock out (If Protects your users from experiencing extranet account lockout
applicable) from malicious activity.
Enable Microsoft Entra smart Smart lockout helps to lock out bad actors who are trying to guess
lockout (if using managed your users' passwords or use brute-force methods to get in.
identities)
Disable end-user consent to The admin consent workflow gives admins a secure way to grant
applications access to applications that require admin approval so end users
don't expose corporate data. Microsoft recommends disabling
future user consent operations to help reduce your surface area
and mitigate this risk.
Enable remote access to on- Enable Microsoft Entra application proxy and integrate with legacy
premises legacy applications with apps for users to securely access on-premises applications by
Application Proxy signing in with their Microsoft Entra account.
Enable Secure hybrid access: Secure Publish and protect your on-premises and cloud legacy
legacy apps with existing app authentication applications by connecting them to Microsoft Entra
delivery controllers and networks (if ID with your existing application delivery controller or network.
applicable).
Integrate supported SaaS Microsoft Entra ID has a gallery that contains thousands of
applications from the gallery to preintegrated applications. Some of the applications your
Microsoft Entra ID and enable single organization uses are probably in the gallery accessible directly
sign-on from the Azure portal. Provide access to corporate SaaS
Recommended action Detail
Automate user provisioning and Automatically create user identities and roles in the cloud (SaaS)
deprovisioning from SaaS applications that users need access to. In addition to creating user
Applications (if applicable) identities, automatic provisioning includes the maintenance and
removal of user identities as status or roles change, increasing
your organization's security.
Enable Conditional Access – Device- Improve security and user experiences with device-based
based Conditional Access. This step ensures users can only access from
devices that meet your standards for security and compliance.
These devices are also known as managed devices. Managed
devices can be Intune compliant or Microsoft Entra hybrid joined
devices.
Enable Password Protection Protect users from using weak and easy to guess passwords.
Use least privileged roles where Give your administrators only the access they need to only the
possible areas they need access to.
Enable Microsoft's password Stop requiring users to change their password on a set schedule,
guidance disable complexity requirements, and your users are more apt to
remember their passwords and keep them something that is
secure.
Create an organization specific Prevent users from creating passwords that include common
custom banned password list words or phrases from your organization or area.
Deploy passwordless authentication Provide your users with convenient passwordless authentication
methods for your users methods.
Create a plan for guest user access Collaborate with guest users by letting them sign in to your apps
and services with their own work, school, or social identities.
Microsoft Entra ID P2
Microsoft Enterprise Mobility + Security E5
Microsoft 365 (E5, A5)
ノ Expand table
Recommended action Detail
Enable combined registration Allow your users to register from one common experience for both
experience for Microsoft Entra Microsoft Entra multifactor authentication and self-service
multifactor authentication and SSPR password reset.
to simplify user registration
experience
Configure multifactor authentication Ensure accounts are protected from being compromised with
settings for your organization multifactor authentication.
Enable self-service password reset This ability reduces help desk calls and loss of productivity when a
user can't sign in to their device or an application.
Implement Password Writeback (if Allow password changes in the cloud to be written back to an on-
using hybrid identities) premises Windows Server Active Directory environment.
Enable Microsoft Entra ID Protection Manage the roll-out of Microsoft Entra multifactor authentication.
policies to enforce multifactor
authentication registration
Enable user and sign-in risk-based The recommended sign-in policy is to target medium risk sign-ins
Conditional Access policies and require multifactor authentication. For User policies, you
should target high risk users requiring the password change
action.
Create and enable Conditional Multifactor authentication for admins to protect accounts that are
Access policies assigned administrative rights.
Enable Password Hash Sync (if using Provide redundancy for authentication and improve security
hybrid identities) (including Smart Lockout, IP Lockout, and the ability to discover
leaked credentials.)
Enable AD FS smart lock out (If Protects your users from experiencing extranet account lockout
applicable) from malicious activity.
Enable Microsoft Entra smart Smart lockout helps to lock out bad actors who are trying to guess
lockout (if using managed your users' passwords or use brute-force methods to get in.
identities)
Disable end-user consent to The admin consent workflow gives admins a secure way to grant
applications access to applications that require admin approval so end users
don't expose corporate data. Microsoft recommends disabling
Recommended action Detail
Enable remote access to on- Enable Microsoft Entra application proxy and integrate with legacy
premises legacy applications with apps for users to securely access on-premises applications by
Application Proxy signing in with their Microsoft Entra account.
Enable Secure hybrid access: Secure Publish and protect your on-premises and cloud legacy
legacy apps with existing app authentication applications by connecting them to Microsoft Entra
delivery controllers and networks (if ID with your existing application delivery controller or network.
applicable).
Integrate supported SaaS Microsoft Entra ID has a gallery that contains thousands of
applications from the gallery to preintegrated applications. Some of the applications your
Microsoft Entra ID and enable single organization uses are probably in the gallery accessible directly
sign-on from the Azure portal. Provide access to corporate SaaS
applications remotely and securely with improved user experience
(SSO).
Automate user provisioning and Automatically create user identities and roles in the cloud (SaaS)
deprovisioning from SaaS applications that users need access to. In addition to creating user
Applications (if applicable) identities, automatic provisioning includes the maintenance and
removal of user identities as status or roles change, increasing
your organization's security.
Enable Conditional Access – Device- Improve security and user experiences with device-based
based Conditional Access. This step ensures users can only access from
devices that meet your standards for security and compliance.
These devices are also known as managed devices. Managed
devices can be Intune compliant or Microsoft Entra hybrid joined
devices.
Enable Password Protection Protect users from using weak and easy to guess passwords.
Use least privileged roles where Give your administrators only the access they need to only the
possible areas they need access to.
Enable Microsoft's password Stop requiring users to change their password on a set schedule,
guidance disable complexity requirements, and your users are more apt to
remember their passwords and keep them something that is
secure.
Create an organization specific Prevent users from creating passwords that include common
custom banned password list words or phrases from your organization or area.
Deploy passwordless authentication Provide your users with convenient passwordless authentication
methods for your users methods
Create a plan for guest user access Collaborate with guest users by letting them sign in to your apps
Recommended action Detail
Enable Privileged Identity Enables you to manage, control, and monitor access to important
Management (PIM) resources in your organization, ensuring admins have access only
when needed and with approval.
Complete an access review for Work with your security and leadership teams to create an access
Microsoft Entra directory roles in review policy to review administrative access based on your
PIM organization's policies.
Zero Trust
This feature helps organizations to align their identities with the three guiding principles of a
Zero Trust architecture:
Verify explicitly
Use least privilege
Assume breach
To find out more about Zero Trust and other ways to align your organization to the guiding
principles, see the Zero Trust Guidance Center.
Next steps
For detailed deployment guidance for individual features of Microsoft Entra ID, review the
Microsoft Entra ID project deployment plans.
Organizations can use identity secure score to track their progress against other
Microsoft recommendations.
Five steps to integrate your apps with
Microsoft Entra ID
Article • 10/23/2023
Learn to integrate your applications with Microsoft Entra ID, which is a cloud-based
Identity and Access Management (IAM) service. Organizations use Microsoft Entra ID for
secure authentication and authorization so customers, partners, and employees can
access applications.
With Microsoft Entra ID, features such as Conditional Access, Microsoft Entra multifactor
authentication, single sign-on (SSO), and application provisioning make Identity and
Access Management easier to manage and more secure.
Learn more:
If your company has a Microsoft 365 subscription, you likely use Microsoft Entra ID.
However, you can use Microsoft Entra ID for applications. If you centralize application
management, identity management features, tools, and policies for your app portfolio.
The benefit is a unified solution that improves security, reduces costs, increases
productivity, and enables compliance. In addition, there's remote access to on-premises
apps.
Learn more:
Microsoft Entra ID has a gallery of integrated applications to make it easy to get started.
Add a gallery app to your Microsoft Entra organization (see previous link) and learn
about integrating software as a service (SaaS) tutorials.
Integration tutorials
Use the following tutorials to learn to integrate common tools with Microsoft Entra
single sign-on (SSO).
Learn more:
Learn more:
Application migration
After you discover apps in your environment, prioritize the apps to migrate and
integrate. Consider the following parameters:
Learn more:
See the following diagram of app authentication simplified by Microsoft Entra ID.
After Microsoft Entra ID is the central IdP, you might be able to discontinue AD FS.
You can migrate apps that use a different cloud-based IdP. Your organization might
have multiple Identity Access Management (IAM) solutions. Migrating to one Microsoft
Entra infrastructure can reduce dependencies on IAM licenses and infrastructure costs. If
you paid for Microsoft Entra ID with Microsoft 365 licenses, likely you don't have to
purchase another IAM solution.
See: Using Microsoft Entra application proxy to publish on-premises apps for remote
users
The following diagram illustrates Application Proxy Service processing a user request.
See: Tutorial: Add an on-premises application for remote access through Application
Proxy in Microsoft Entra ID
See: Secure hybrid access: Protect legacy apps with Microsoft Entra ID
For the following services, there are Microsoft Entra integration tutorials.
Learn more:
Developers can use the platform for internal and customer-facing apps. For instance,
use Microsoft Authentication Libraries (MSAL) to enable multifactor authentication and
security to access apps.
Learn more:
Next step
Resources for migrating applications to Microsoft Entra ID
Feedback
Was this page helpful? Yes No
Security defaults make it easier to help protect your organization from identity-related
attacks like password spray, replay, and phishing common in today's environments.
Who's it for?
Organizations who want to increase their security posture, but don't know how or
where to start.
Organizations using the free tier of Microsoft Entra ID licensing.
After this setting is enabled, all users in the organization will need to register for
multifactor authentication. To avoid confusion, refer to the email you received and
alternatively you can disable security defaults after it's enabled.
To configure security defaults in your directory, you must be assigned at least the
Conditional Access Administrator role.
By default, the user who creates a Microsoft Entra tenant is automatically assigned the
Global Administrator role.
7 Note
Starting July 29, 2024, new tenants and existing tenants had the 14-day grace
period for users to register for MFA removed. We are making this change to help
reduce the risk of account compromise during the 14-day window, as MFA can
block over 99.2% of identity-based attacks.
When users sign in and are prompted to perform multifactor authentication, they see a
screen providing them with a number to enter in the Microsoft Authenticator app. This
measure helps prevent users from falling for MFA fatigue attacks.
Require administrators to do multifactor authentication
Administrators have increased access to your environment. Because of the power these
highly privileged accounts have, you should treat them with special care. One common
method to improve the protection of privileged accounts is to require a stronger form of
account verification for sign-in, like requiring multifactor authentication.
Tip
Ensure all your admins sign in after enabling security defaults so that they can
register for authentication methods.
Have separate accounts for administration and standard productivity tasks to
significantly reduce the number of times your admins are prompted for MFA.
Global Administrator
Application Administrator
Authentication Administrator
Billing Administrator
Cloud Application Administrator
Conditional Access Administrator
Exchange Administrator
Helpdesk Administrator
Password Administrator
Privileged Authentication Administrator
Privileged Role Administrator
Security Administrator
SharePoint Administrator
User Administrator
After these attackers gain access, they can request access to privileged information for
the original account holder. They can even download the entire directory to do a
phishing attack on your whole organization.
One common method to improve protection for all users is to require a stronger form of
account verification, such as multifactor authentication, for everyone. After users
complete registration, they'll be prompted for another authentication whenever
necessary. Microsoft decides when a user is prompted for multifactor authentication,
based on factors such as location, device, role, and task. This functionality protects all
registered applications, including SaaS applications.
7 Note
Clients that don't use modern authentication (for example, an Office 2010 client)
Any client that uses older mail protocols such as IMAP, SMTP, or POP3
Today, most compromising sign-in attempts come from legacy authentication. Legacy
authentication doesn't support multifactor authentication. Even if you have a multifactor
authentication policy enabled on your directory, an attacker can authenticate by using
an older protocol and bypass multifactor authentication.
After security defaults are enabled in your tenant, all authentication requests made by
an older protocol will be blocked. Security defaults blocks Exchange Active Sync basic
authentication.
2 Warning
Before you enable security defaults, make sure your administrators aren't using
older authentication protocols. For more information, see How to move away from
legacy authentication.
Azure portal
Microsoft Entra admin center
Azure PowerShell
Azure CLI
Using Azure Resource Manager to manage your services is a highly privileged action.
Azure Resource Manager can alter tenant-wide configurations, such as service settings
and subscription billing. Single-factor authentication is vulnerable to various attacks like
phishing and password spray.
It's important to verify the identity of users who want to access Azure Resource Manager
and update configurations. You verify their identity by requiring more authentication
before you allow access.
After you enable security defaults in your tenant, any user accessing the following
services must complete multifactor authentication:
Azure portal
Microsoft Entra admin center
Azure PowerShell
Azure CLI
This policy applies to all users who are accessing Azure Resource Manager services,
whether they're an administrator or a user. This policy applies to Azure Resource
Manager APIs such as accessing your subscription, VMs, storage accounts, and so on.
This policy doesn't include Microsoft Entra ID or Microsoft Graph.
7 Note
7 Note
The Microsoft Entra Connect / Microsoft Entra Cloud Sync synchronization accounts
(or any security principal assigned to the "Directory Synchronization Accounts" role)
are excluded from security defaults and will not be prompted to register for or
perform multifactor authentication. Organizations should not be using this account
for other purposes.
Deployment considerations
Authentication methods
Security defaults users are required to register for and use multifactor authentication
using the Microsoft Authenticator app using notifications. Users might use verification
codes from the Microsoft Authenticator app but can only register using the notification
option. Users can also use any third party application using OATH TOTP to generate
codes.
2 Warning
Do not disable methods for your organization if you are using security defaults.
Disabling methods may lead to locking yourself out of your tenant. Leave all
Methods available to users enabled in the MFA service settings portal.
B2B users
Any B2B guest users or B2B direct connect users that access your directory are treated
the same as your organization's users.
ノ Expand table
Organizations who would like to test out the features of Conditional Access can sign up
for a free trial to get started.
Next steps
Blog: Introducing security defaults
More information about licensing can be found on the Microsoft Entra pricing
page .
Feedback
Was this page helpful? Yes No
Microsoft Security Copilot is a platform that brings together the power of AI and human
expertise to help administrators and security teams respond to attacks faster and more
effectively. Security Copilot is embedded in Microsoft Entra so you can investigate and resolve
identity risks, assess identities and access with AI-driven intelligence, and complete complex
tasks quickly. Copilot in Microsoft Entra (Copilot) gets insights from your Microsoft Entra users,
groups, sign-in logs, audit logs, and more.
You can explore sign-ins and risky users and get contextualized insights on how to resolve
incidents and what to do to protect the accounts in natural language. Built on top of real-time
machine learning, Copilot can help you find gaps in access policies, generate identity
workflows, and troubleshoot faster. You can also unlock new skills that allow admins at all
levels to complete complex tasks such as incident investigation, sign-in log analysis, and more,
to gain savings in time and resources.
Give me all user details for karita@woodgrovebank.com and extract the user Object ID.
Does karita@woodgrovebank.com have any registered devices in Microsoft Entra?
List the recent risky sign-ins for karita@woodgrovebank.com.
Can you give me sign-in logs for karita@woodgrovebank.com for the past 48 hours? Put
this information in a table format.
Get Microsoft Entra audit logs for karita@woodgrovebank.com for the past 72 hours. Put
information in table format.
Provide feedback
Copilot in Microsoft Entra uses AI and machine learning to process data and generate
responses for each of the key features. However, AI might misinterpret some data, which
sometimes cause a mismatch in responses. Your feedback on the generated responses helps
improve the accuracy of Copilot and Microsoft Entra over time.
All key features have an option for providing feedback. To provide feedback, perform the
following steps:
1. Select the thumb up icon located at the bottom of any response card in the Copilot pane.
2. Answer the question What did you like?
3. Select Yes, share samples or No, don't share samples.
4. Select Submit.
Or
1. Select the thumb down icon located at the bottom of any response card in the Copilot
pane.
2. Select Inaccurate if any detail is incorrect or incomplete based on your assessment. Select
Offensive or inappropriate if it contains potentially harmful, questionable, or ambiguous
information. Select Other for some other reason.
3. Whenever possible, write a few words explaining what can be done to improve the
outcome in the What went wrong? text box.
4. Select Yes, share samples or No, don't share samples.
5. Select Submit.
Next steps
Learn more about risky user summarization.
Investigate security incidents using the Microsoft Entra skills in Microsoft Security Copilot.
Investigate risky apps using the Microsoft Entra skills in Microsoft Security Copilot.
See also
Get started with Microsoft Security Copilot
What is Security Copilot?
Privacy and data security in Security Copilot
Responsible AI FAQs
Microsoft Security Copilot scenarios in
Microsoft Entra
06/09/2025
Microsoft Security Copilot is a powerful tool that can help you manage and secure your
Microsoft Entra identity environment. This article describes how to use Microsoft Security
Copilot with Microsoft Entra in identity related scenarios to enhance your identity protection
efforts. Using this feature requires a tenant with Microsoft Security Copilot enabled.
Specific scenarios supported by Security Copilot embedded in Microsoft Entra skills include:
Investigate recommendations
Recommendations in Microsoft Entra help you improve the security posture of your tenant by
providing actionable insights and guidance. These recommendations cover the many features,
best practices, and settings of Microsoft Entra, such as using least privileged administrator
roles, configuring Self-Service Password Reset, and protecting your tenant with Conditional
Access policies. Some recommendations factor into your Identity Secure Score, which can help
you monitor and improve the security of your tenant. Using the capabilities of Microsoft
Security Copilot, you can now interact with these recommendations using natural language,
enabling your security team to quickly investigate how to evolve your tenant to a secure and
healthy state.
This feature is available using a free Microsoft Entra ID license, or a Microsoft Entra ID P1 or P2
license. It's also available in Microsoft Entra Workload ID.
Application Administrator
Identity Governance Administrator
Privileged Role Administrator
Conditional Access Administrator
Security Administrator
Hybrid Identity Administrator
Authentication Policy Administrator
Authentication Administrator
Using this feature requires the Identity Governance Administrator role in Microsoft Entra ID and
a Microsoft Entra ID P2 license.
Investigate access reviews
Administrators can use Microsoft Security Copilot with Microsoft Entra ID Governance Access
Reviews to extract and analyze access review data. This integration allows admins to explore,
track, and analyze access reviews at scale.
Using this feature requires a minimum of the Identity Governance Administrator role in
Microsoft Entra ID, a Microsoft Entra ID P2 license and a tenant with access reviews configured.
Use the following example prompts to extract access reviews data in Microsoft Entra:
ノ Expand table
Explore current configured access reviews in the Show me the top 10 pending access reviews
tenant
Get detailed info on a specific access review Get access review details for Finance Microsoft 365
Groups Q2
View access review decisions for a specific instance Who approved or denied access in the Q2 finance
review?
Track reviews assigned to a specific reviewer List reviews where Alex Chen is the assigned reviewer
Identify decisions that went against AI Which access review decisions overrode AI-suggested
recommendations actions?
View assigned reviewers for a specific access Who are the reviewers for the Sales App Access Q2
review review?
Using this feature requires a minimum of the Identity Governance Administrator role in
Microsoft Entra ID and a Microsoft Entra ID P2 licenses.
You can use the following example prompts to investigate insights within entitlements
management in Microsoft Entra:
Using this feature requires Microsoft Entra ID P2 licenses and a public cloud tenant.
Reports Reader
Helpdesk Administrator
Security Reader
Security Operator
Security Administrator
Global Reader
The following example prompts can be used to investigate alerts in Scenario Health
Monitoring:
Using this feature requires a minimum of the Domain Name Administrator role in Microsoft
Entra ID, and can be used with any tenant and Microsoft Entra ID license.
The following example prompts can be used to investigate alerts in Scenario Health
Monitoring:
This feature requires a minimum of the Global Reader role in Microsoft Entra ID, and can be
used with any tenant and Microsoft Entra ID license.
The following example prompts can be used to investigate alerts in Scenario Health
Monitoring:
Directory Reader
Global Reader
The following example prompts can be used to investigate roles in Microsoft Entra:
License Usage
Managing license purchases and usage across your Microsoft Entra tenant can be challenging.
Microsoft Security Copilot simplifies this process by allowing administrators to ask natural
language questions about license usage, such as “How many Microsoft Entra P2 licenses are in
use?” or “How many users are using Conditional Access?” Security Copilot provides clear and
actionable answers in seconds, helping your organization optimize license utilization and get
the most value from your Microsoft Entra investment.
This feature requires a minimum of the Global Reader role in Microsoft Entra ID, and can be
used with any tenant and Microsoft Entra ID license.
The following example prompts can be used to investigate roles in Microsoft Entra:
See also
Get started with Microsoft Security Copilot
Microsoft Security Copilot experiences
Respond to identity threats using risky user summarization
Microsoft Security Copilot agents in
Microsoft Entra
Article • 04/27/2025
Microsoft Entra agents work seamlessly with Microsoft Security Copilot. Microsoft Security
Copilot agents automate repetitive tasks and reduce manual workloads. They enhance security
and IT operations across cloud, data security and privacy, identity, and network security. These
agents handle high-volume, time-consuming tasks by pairing data and code with an AI
language model. They respond to user requests and system events, helping teams work more
efficiently and focus on higher-impact tasks.
Agents fit naturally into existing workflows. You don't need special training or other licensing to
use them. Agents utilize SCUs to operate just like other features in the product. They integrate
seamlessly with Microsoft Security solutions and the broader supported partner ecosystem.
Agents learn based on feedback and keep you in control on the actions it takes. They handle
resource-intensive tasks like threat intelligence briefings, and Conditional Access optimization.
With Microsoft Security Copilot agents, you can scale up your teams, people, and processes.
Microsoft Security Copilot agents offer significant benefits for security teams and IT operations
by automating routine tasks and freeing up valuable time for teams to concentrate on strategic
initiatives and complex problem-solving. This leads to improved operational efficiency,
enhanced security and giving teams the ability to respond more swiftly to emerging threats.
With Security Copilot agents, organizations can achieve greater scalability and resilience in
their security and IT processes.
Available agents
Trigger
The agent runs every 24 hours but can also run manually.
Permissions
The agent reviews your policy configuration but acts only with your approval of the
suggestions.
Identity
It runs in the context of the administrator who configured the agent.
Products
Microsoft Entra Conditional Access and Security Copilot
Plugins
Microsoft Entra
Role-based access
Administrators need the Security Administrator or Global Administrator role during the
preview.
Respond to identity threats using risky user
summarization
Article • 04/25/2025
Risk summary: summarize in natural language why the user risk level was elevated.
Recommendations: get guidance on how to mitigate and respond to these types of
attacks, with quick links to help and documentation.
This article describes how to access the risky user summary capability of Microsoft Entra ID
Protection and Copilot in Microsoft Entra. Using this feature requires Microsoft Entra ID P2
licenses.
Summary by Copilot: summarizes in natural language why ID Protection flagged the user
for risk.
What to do: lists the next steps to investigate this incident and prevent future incidents.
Help and documentation: lists resources for help and documentation.
Create sign-in risk and user risk based Conditional Access policies.
Next steps
Learn more about risky users.
Manage employee lifecycle using
Microsoft Security Copilot (Preview)
Article • 02/19/2025
This article describes how to work with lifecycle workflows using Security Copilot in the
Microsoft Entra admin center. Using this feature requires Microsoft Entra ID Governance
licenses.
Launch Security Copilot from the Copilot button in the Microsoft Entra admin center.
Use natural language questions or prompts to:
Create a lifecycle workflow for new hires in the Marketing department that sends a
welcome email and a TAP and adds them to the "All Users in My Tenant" group. Also,
provide the option to enable the schedule of the workflow.
Review the returned results to see what the workflow includes and then follow the steps
to create a new workflow in the Microsoft Entra admin center. After the workflow is
created, you can perform verification testing before enabling the schedule.
For example:
For example:
For example:
Next steps
Learn more about lifecycle workflows.
Create a lifecycle workflow.
Run a workflow on demand.
Feedback
Was this page helpful? Yes No
Microsoft Security Copilot gets insights from your Microsoft Entra data through many different
skills, such as Get Entra Risky Users and Get Audit Logs. IT admins and security operations
center (SOC) analysts can use these skills and others to gain the right context to help
investigate and remediate identity-based incidents using natural language prompts.
This article describes how a SOC analyst or IT admin could use the Microsoft Entra skills to
investigate a potential security incident.
Scenario
Natasha, a security operations center (SOC) analyst at Woodgrove Bank, receives an alert about
a potential identity-based security incident. The alert indicates suspicious activity from a user
account that has been flagged as a risky user.
Investigate
Natasha starts her investigation and signs in to Microsoft Security Copilot . In order to view
user, group, risky user, sign-in logs, audit-logs, and diagnostic logs details, she signs in as at
least a Security Reader.
She uses the following prompts to get the information she needs:
Give me all user details for karita@woodgrovebank.com and extract the user Object ID.
Is this user's account enabled?
When was the password last changed or reset for karita@woodgrovebank.com?
Does karita@woodgrovebank.com have any registered devices in Microsoft Entra?
What are the authentication methods that are registered for karita@woodgrovebank.com if
any?
Get risky user details
To understand why karita@woodgrovebank.com was flagged as a risky user, Natasha starts
looking at the risky user details. She reviews the risk level of the user (low, medium, high, or
hidden), the risk detail (for example, sign-in from unfamiliar location), and the risk history
(changes in risk level over time). She also checks the risk detections and the recent risky sign-
ins, looking for suspicious sign-in activity or impossible travel activity.
She uses the following prompts to get the information she needs:
What is the risk level, state, and risk details for karita@woodgrovebank.com?
What is the risk history for karita@woodgrovebank.com?
List the recent risky sign-ins for karita@woodgrovebank.com.
List the risk detections details for karita@woodgrovebank.com.
She uses the following prompts to get the information she needs:
Can you give me sign-in logs for karita@woodgrovebank.com for the past 48 hours? Put
this information in a table format.
Show me failed sign-ins for karita@woodgrovebank.com for the past 7 days and tell me
what the IP addresses are.
She uses the following prompts to get the information she needs:
Get Microsoft Entra audit logs for karita@woodgrovebank.com for the past 72 hours. Put
information in table format.
Show me audit logs for this event type.
Get group details
Natasha then reviews the groups that karita@woodgrovebank.com is a part of to see if Karita is
a member of any unusual or sensitive groups. She reviews the group memberships and
permissions associated with Karita's user ID. She checks the group type (security, distribution,
or Office 365), membership type (assigned or dynamic), and the group’s owners in the group
details. She also reviews the group’s roles to determine what permissions it has for managing
resources.
She uses the following prompts to get the information she needs:
Get the Microsoft Entra user groups that karita@woodgrovebank.com is a member of. Put
information in table format.
Tell me more about the Finance Department group.
Who are the owners of the Finance Department group?
What roles does this group have?
Remediate
By using Security Copilot, Natasha is able to gather comprehensive information about the user,
sign-in activities, audit logs, risky user detections, group memberships, and system diagnostics.
After completing her investigation, Natasha needs to take action to remediate the risky user or
unblock them.
She reads about risk remediation, unblocking users, and response playbooks to determine
possible actions to take next.
Next steps
Learn more about:
Risky users
What is risk in ID Protection?
Risk-based Access Policies
Assess application risks using Microsoft
Security Copilot in Microsoft Entra
(Preview)
Article • 12/12/2024
Microsoft Security Copilot gets insights from your Microsoft Entra data through many
different skills, such as Investigate identity risks with Entra ID Protection and Explore
Microsoft Entra audit log details. App risk skills allow identity admins and security
analysts who manage applications or workload identities in Microsoft Entra to identify
and understand risks through natural language prompts. By using prompts like, "List
risky app details for my tenant", the analyst gets a better picture of the risk from
application identities and can discover other application details in Microsoft Entra -
including permissions granted (especially those that might be considered high
privileged), unused apps in their tenant, and apps from outside their tenant. Security
Copilot then uses prompt context to respond, such as with a list of apps or permissions,
then surface links to the Microsoft Entra admin center so that admins can see a full list
and take the appropriate remediation actions for their risky apps. IT admins and security
operations center (SOC) analysts can use these skills and others to gain the right context
to help investigate and remediate identity-based incidents using natural language
prompts.
This article describes how a SOC analyst or IT admin could use the Microsoft Entra skills
to investigate a potential security incident.
7 Note
These app risk skills provide data on single tenant, third party SaaS, and multi-
tenant apps that are applications or service principals in Microsoft Entra. Managed
identities are not currently in scope.
Scenario
Jason, an IT admin at Woodgrove Bank, is proactively trying to identify and understand
any risky apps in their tenant.
Investigate
Jason starts his assessment and signs in to Microsoft Security Copilot or the Microsoft
Entra admin center. In order to view application and service principal details, he signs in
as at least a Security Reader and needs an Microsoft Entra role assignment of
Application Administrator, Cloud Application Administrator, or similar Microsoft Entra
administrator role that has permissions to manage application/workload identities in
Microsoft Entra.
Identity admins using Security Copilot as a part of the Microsoft Entra admin center can
choose from a set of app risk starter prompts that appear at the top of the Security
Copilot window. Select from suggested prompts that may appear after a response. App
risk starter prompts will appear in application-related admin center blades: Enterprise
applications, App Registrations, and Identity Protection Risky workload identities.
) Important
You must use an account that is authorized to administer ID Protection for this skill
to return risk information. Your tenant must also be licensed for Workload
Identities Premium .
Jason can also identify high privilege permissions granted on a service principal, based
on Microsoft’s risk assessment. These are currently scoped to application permissions
that generally enable tenant-wide access without user context and highly privileged
Microsoft Entra administrator roles.
) Important
This skill currently only looks at API permissions and Entra administrator roles. It
doesn’t currently look at non-directory permissions granted in places like Azure
RBAC or other authorization systems. High privileged permissions are limited to a
static list of maintained by Microsoft that might evolve over time and it is not
currently viewable or customizable by customers.
1. Removing an unused app addresses many other risks with a single remediation
action.
2. You can often address unused apps aggressively through central action while
keeping the risk of outage or business disruption low, since users aren’t actually
using the apps.
Using the Copilot skill integrated with the existing Microsoft Entra recommendation for
unused apps, Jason pulls the relevant data to investigate further or work with his team
to improve their tenant security posture. The response includes links to specific apps for
easier remediation. The analyst can also ask about a specific app’s details directly in
Security Copilot.
7 Note
The Copilot response returns a list of app registration or applications that are
unused in past 90 days, which haven't been issued any tokens in that timeframe.
7 Note
Jason can get a partial app list in Security Copilot and full list via a link to the
Microsoft Graph Explorer query at the bottom of the response.
Remediate
By using Security Copilot, Jason is able to gather comprehensive risk and basic
information about the applications and service principals in their Microsoft Entra tenant.
After completing his assessment, Jason takes action to remediate the risky applications.
Security Copilot surfaces links to the Microsoft Entra admin center in responses for
administrators to take the appropriate remediation actions.
He reads about managing access and security for applications, security workload
identities, protecting against consent phishing, and response playbooks to determine
possible actions to take next.
Next steps
Learn more about:
Feedback
Was this page helpful? Yes No
Sign-in troubleshooting
Inspect sign-in logs, uncover the cause of failed sign-ins including policies
evaluated for MFA and Conditional Access.
Identity Protection for users and workload identities
Identify and mitigate risks of compromise for users, service principals, and
workload identities
Identity administration
Find user account information, group ownership and membership details, and
changes to users, apps, groups, and roles from Microsoft Entra audit logs.
Now that it's released, user feedback is critical in helping Microsoft improve the system.
You have the option of providing feedback whenever you receive output from Security
Copilot embedded in Microsoft Entra. When a response is inaccurate, incomplete, or
unclear, give it a thumbs down and indicate one or more categories to flag any
objectionable output. You can also confirm when responses are useful and accurate by
giving it a thumbs up. These buttons appear at the bottom of every Security Copilot
response and your feedback goes directly to Microsoft to help us improve.
Like any AI-powered technology, Security Copilot doesn’t get everything right. However,
you can help improve its responses by providing your observations using the feedback
tool, which is built into the platform.
The system might not be able to process long prompts, such as hundreds of thousands
of characters.
Use of Security Copilot embedded in Microsoft Entra might be subject to usage limits or
capacity throttling. Even short prompts can take time (up to several minutes) and
require a high number of security consumption units.
You can also choose from a set of prompts provided in Security Copilot in Microsoft
Entra and select from a set of suggested prompts to continue a conversation.
You can provide feedback about a response, including reporting anything unacceptable
to Microsoft.
Feedback
Was this page helpful? Yes No
Microsoft documentation and learning content provide quality support and troubleshooting
information, but if you have a problem not covered in our content, there are several options to
get help and support for Microsoft Entra.
This article provides the options to find support from the Microsoft community and how to
submit a support request with Microsoft.
Explore how-to information, quickstarts, and code samples for IT professionals and
developers with our technical documentation at learn.microsoft.com.
Post a question to Microsoft Q&A to get answers to your identity and access questions
directly from Microsoft engineers, Most Valuable Professionals (MVPs), and other
members of our expert community.
Collaborate, share, and learn from other customers and IT Pro partners in the Microsoft
Technical Community . Join the community to post questions and submit your ideas.
Stay in the loop with announcements, blog posts, ask-me-anything (AMA) interactions
with experts, and more.
Be your own administrator and prototype apps and solutions on your fully pre-
provisioned sandbox subscription with the Azure Developer Program.
Questions: The main page for technical questions and answers at Microsoft.
Tags: Use tags, which are keywords that categorize your question with other similar
questions.
Help: Get answers to frequently asked questions, troubleshoot common issues, and
discover features related to Microsoft Q&A.
To ask a question, choose the Ask a question button at the top right of any Q&A page. You can
also get your questions answered faster by using AI Assist .
View the Questions and Tags pages first to search for product and service-related
keywords, as you might find a previously posted solution. Use the filter to narrow the
search results.
Submit your questions in the language of the Q&A site you are on. This helps ensure that
our community of experts can provide accurate and helpful answers to your question.
Use tags when posting a question. You can select up to five tags to describe your
question. Choose tags that relate most closely to your scenario to increase discoverability
of your question among the community experts on Q&A.
Include all the details of your issue in the Question details field. Start by asking one
question in the body to ensure the highest quality answers. Next, include the following
details in your request:
A summary of what you are attempting to accomplish
Any steps that you already took
Any relevant error messages
Unique aspects of your scenario or configuration
Any other pertinent information
Search for or select Diagnose and solve problems from the navigation menu.
Some of the diagnostic tools require specific roles to use the tool. For example, you need to be
at least a Billing administrator to use the sign-in diagnostic tool. Contact your local
administrator for assistance or to get the necessary permissions.
Online support requests can be created from several places in the admin center:
7 Note
If you're using Microsoft Entra External ID in an external tenant, the support request
feature is currently unavailable for external tenant technical issues. Instead, use the
Give Feedback link on the New support request page. Or, switch to your Microsoft
Entra workforce tenant and open a support request .
If you're using Azure AD B2C, open a support ticket by first switching to a Microsoft
Entra tenant that has an Azure subscription associated with it. Typically, this is your
employee tenant or the default tenant created for you when you signed up for an
Azure subscription. To learn more, see how an Azure subscription is related to
Microsoft Entra.
These solutions are written by Azure engineers and technical content developers
and should resolve most common problems.
If you're still unable to resolve the issue, select Next to continue creating the
support request.
5. Provide thorough and detailed information in the Additional details section to help us
route your support request to the right team.
If possible, tell us when the problem started and any steps to reproduce it.
You can upload a file, such as a log file or output from diagnostics. For more
information on file uploads, see File upload guidelines.
A support engineer will contact you using the method you indicated. For information about
initial response times, see Support scope and responsiveness .
If you're not an Azure customer, you can open a support request with Microsoft Support for
business .
Stay informed
Things can change quickly. The following resources provide updates and information on the
latest releases.
What's new in Microsoft Entra: Get to know what's new in Microsoft Entra including the
latest release notes, known issues, bug fixes, deprecated functionality, and upcoming
changes.
Microsoft Entra identity blog : Get news and information about Microsoft Entra.
Azure updates : Learn about important product updates, roadmap, and announcements.
Related content
Post a question to Microsoft Q&A
Join the Microsoft Technical Community
Learn about the diagnostic data Azure identity support can access
Quarantine unsanctioned tenants
Article • 04/15/2025
) Important
Refer to this article only after reviewing the Microsoft Cloud Footprint FAQ to discover
your organization's inventory of tenants. This article outlines the specific existing Microsoft
Entra capabilities administrators can leverage within their primary tenant to quarantine
suspected unsanctioned tenants in their discovered list of tenants.
The administrator of the ContosoTest.com tenant contacts you. At this point, you determine
that the tenant was employee-created and that you should be added as an administrator
within the tenant to regain control. You no longer quarantine the ContosoTest.com tenant.
However, no administrators from the ContosoDemo.com tenant contact you, so you leave the
tenant in the quarantined state.
How can I use Microsoft Entra's capabilities to
quarantine suspected tenants?
Microsoft Entra organizations can use Cross-tenant access with External ID to scope which
users of other external Entra organizations have access to your resources and which users from
your organization have access to other external Entra organizations. These policies let you
restrict inbound or outbound login attempts with a suspect tenant without disrupting
collaboration with other tenants. An administrator can add an organization and configure
customized settings to block inbound and outbound user-sign for the suspected tenant.
Secure-by-default:
An administrator can configure default settings to block all inbound sign-in attempts from
external users of a suspected tenant. Likewise, one can block all outbound user sign-in for
users of your own tenant into a suspected tenant. Then, you can add an organization and
configure customized settings to allow user sign-in only inbound from and outbound to
specified tenants. These settings would enable you to secure your tenant by default and only
allow B2B collaboration with trusted tenants.
Secure-by-default:
As an administrator, you can configure default restrictions and then allow users to sign into
and access specific organizations, Microsoft Entra ID would prevent authentication on to all
other tenants once applying policies using Universal Tenant Restrictions v2 as part of GSA.
Enabling TRv2 in audit mode and applying TRv2 policies with GSA shows all activity including
attempts to access foreign tenants.
Microsoft Entra allows customers to restrict inbound application access for third-party
multitenant apps where the tenant in which the app was registered is considered a suspect
tenant. To restrict access, administrators must find the correct service principal, which
corresponds to the application registered in the suspect tenant. The appOwnerOrganizationId
property on the service principal object lists the tenantId in which the application was
registered. Capturing these service principals can only be done programmatically via MSGraph
API: :
HTTP
GET https://graph.microsoft.com/v1.0/servicePrincipals?
$count=true&$filter=appOwnerOrganizationId eq {tenantId}
After finding the correct service principal, you can either review and revoke permissions
granted to the application or delete the service principal all together. Deleting a service
principal is a restorable action up to 30 days.
For more information on multitenant apps and service principals, see Apps & service principals
in Microsoft Entra ID.
Use the following resources when you discover a tenant based on your billing account
relationships but do not recognize the tenant which the subscription services are provisioned
within. Canceled Azure and Microsoft 365 subscriptions can be reactivated during the grace
period (30 to 90 days after canceling) before being permanently deleted. If needed, contact
support for assistance on canceling and deleting subscriptions.
For more information on quarantining by canceling Azure, see Cancel and delete your
Azure subscription.
For more information on quarantining by canceling Microsoft 365, see Cancel your
Microsoft business subscription in the Microsoft 365 admin center.
Related content
Microsoft Cloud Footprint FAQ
Tenant inaccessible due to inactivity
Article • 01/16/2025
Configured tenants no longer in use may still generate costs for your organization.
Making a tenant inaccessible due to inactivity helps reduce unnecessary expenses. This
article discusses how to handle an inaccessible tenant, reactivation, and guidance for
both administrators and application developers.
If you try to access the tenant, you receive a message similar to the example shown.
Error message Error message: AADSTS5000225: This tenant has been blocked due to
inactivity. To learn more about ... is expected for tenants' inaccessible due to
inactivity.
Take the appropriate steps depending on your goals for the tenant and your role in the
environment.
Administrators
If you need to reactivate your tenant:
The tenant administrator can reach out to Microsoft, see the global support phone
numbers .
Refrain from submitting another assistance request while your existing case is in
process and until you receive a response with a decision on this case.
The tenant is deleted after 20 days of being inaccessible due to inactivity and it
isn't recoverable.
Review Microsoft's data protection policies, here .
Application owners/developers
Minimize the number of authentication requests sent to this deactivated tenant
until the tenant is reactivated.
Refrain from submitting another assistance request. You are contacted once that a
decision is made.
Review Microsoft's data protection policies .
Related content
Quickstart: Create a new tenant in Microsoft Entra ID
Add your custom domain name to your tenant
Feedback
Was this page helpful? Yes No
What's new is an information hub that provides a consolidated view of the Microsoft
Entra roadmap and change announcements. It gives administrators a centralized
location to track, learn, and plan for the releases and changes across the Microsoft Entra
family of products.
The remaining sections describe the features and functionality of the What's new
experience.
Highlights
The Highlights tab summarizes important product releases and impactful changes. From
the Highlights tab, you can select an announcement or release to view its details and
access links to documentation for more information.
Roadmap
The Roadmap tab lists the details of public preview and recent general availability
releases in a sortable table. From the table, you can select a release to view the release
Details which includes an overview and link to learn more.
To find a release, you can customize the table view using the following controls:
The following are the descriptions for the sortable columns in the roadmap table:
ノ Expand table
Column Description
Category The identity and network access category of the product or feature (for example,
Identity Governance, Identity Security & Protection).
Service The Microsoft Entra service of the product or feature (for example, Entitlement
Management, Conditional Access).
Change announcements
The Change announcements tab lists the upcoming changes to existing products and
features in a sortable table. From the table, you can select a change announcement to
view the change Details which includes an overview of what's changing and link to learn
more.
To find a change announcement, you can customize the table view using the following
controls:
ノ Expand table
Column Description
Service The Microsoft Entra service of the product or feature (for example, Entitlement
Management, Conditional Access).
Action Required Indicates whether the change requires a user to take action.
Can I still use the existing RSS feeds and view the public
release notes for What's new information?
Yes, the existing RSS feeds and release notes are still available.
Related content
Microsoft Entra releases and announcements
Feedback
Was this page helpful? Yes No
This article provides information about the latest releases and change announcements across
the Microsoft Entra family of products over the last six months (updated monthly). If you're
looking for information that's older than six months, see: Archive for What's new in Microsoft
Entra.
Get notified about when to revisit this page for updates by copying and pasting this URL:
https://learn.microsoft.com/api/search/rss?search=%22Release+notes+-
+Azure+Active+Directory%22&locale=en-us into your feed reader.
May 2025
Set up a SAML or WS-Fed identity provider to enable users to sign up and sign in to, your
applications using their own account with the identity provider. Users will be redirected to the
identity provider, and then redirected back to Microsoft Entra after successful sign in. For more
information, see: SAML/WS-Fed identity providers.
Use Pre/Post Attribute Collection Custom Extensions to customize your self-service sign-up
flow. This includes blocking sign-up, or prefilling, validating, and modifying attribute values. For
more information, see: Create a custom authentication extension for attribute collection start
and submit events.
Public Preview - Roll out of Application Based Authentication
on Microsoft Entra Connect Sync
Type: New feature
Service category: Microsoft Entra Connect
Product capability: Microsoft Entra Connect
Microsoft Entra Connect creates and uses a Microsoft Entra Connector account to authenticate
and sync identities from Active Directory to Microsoft Entra ID. The account uses a locally
stored password to authenticate with Microsoft Entra ID. To enhance the security of the
Microsoft Entra Connect sync process with the application, we've rolled out support for
"Application based Authentication" (ABA), which uses a Microsoft Entra ID application identity
and Oauth 2.0 client credential flow to authenticate with Microsoft Entra ID. To enable this,
Microsoft Entra Connect creates a single tenant 3rd party application in the customer's
Microsoft Entra ID tenant, registers a certificate as the credential for the application, and
authorizes the application to perform on-premises directory synchronization.
The Microsoft Entra Connect Sync .msi installation file for this change is exclusively available on
Microsoft Entra Admin Center within the Microsoft Entra Connect pane .
Check our version history page for more details of the change.
The policy impact view for individual Conditional Access policies enables admins to understand
how each policy has affected recent sign-ins. The feature provides a clear, built-in graph in the
Microsoft Entra admin center, making it easy to visualize and assess the impact without
needing additional tools and resources, such as Log Analytics. For more information, see: Policy
impact.
Deployment logs feature provide visibility into the status and progress of configuration
changes made in Global Secure Access. Deployment logs publish updates to admins and
monitor the process for any errors. Unlike other logging features, deployment logs focus
specifically on tracking configuration updates. These logs help administrators track and
troubleshoot deployment updates, such as forwarding profile redistributions and remote
network updates, across the global network. For more information, see: How to use the Global
Secure Access deployment logs (preview).
April 2025
Conditional Access Optimization Agent in Microsoft Entra monitors for new users or apps
not covered by existing policies, identifies necessary updates to close security gaps, and
recommends quick fixes for identity teams to apply with a single selection. For more
information, see: Microsoft Entra Conditional Access optimization agent.
Conditional Access What If evaluation API – Leverage the What If tool using the Microsoft
Graph API to programmatically evaluate the applicability of Conditional Access policies in your
tenant on user and service principal sign-ins. For more information, see: conditionalAccessRoot:
evaluate.
Now customers can configure a Lifecycle workflows task to automatically revoke access tokens
when employees move within, or leave, the organization. For more information, see: Revoke all
refresh tokens for user (Preview).
You can now use managed identities as federated credentials for Microsoft Entra apps,
enabling secure, secret-less authentication in both single- and multi-tenant scenarios. This
eliminates the need to store and manage client secrets or certificates when using Microsoft
Entra app to access Azure resources across tenants. This capability aligns with Microsoft’s
Secure Future Initiative pillar of protecting identities and secrets across systems. Learn how
to configure this capability in the official documentation.
What is changing
Microsoft Entra Connect creates and uses a Microsoft Entra Connector account to authenticate
and sync identities from Active Directory to Microsoft Entra ID. The account uses a locally
stored password to authenticate with Microsoft Entra ID. To enhance the security of the
Microsoft Entra Connect application sync process, we will, in the coming week roll out support
for "Application based Authentication" (ABA), which uses a Microsoft Entra ID application
based identity and Oauth 2.0 client credential flow to authenticate with Microsoft Entra ID. To
enable this, Microsoft Entra Connect will create a single tenant 3rd party application in
customer's Microsoft Entra ID tenant, register a certificate as the credential for the application,
and authorize the application to perform on-premises directory synchronization
The Microsoft Entra Connect Sync .msi installation file for this change will be exclusively
available in the Microsoft Entra admin center within the Microsoft Entra Connect pane .
Check our version history page in the next week for more details of the change.
March 2025
Effective April 1, 2025, Microsoft Entra Permissions Management (MEPM) will no longer be
available for sale to new Enterprise Agreement or direct customers. Additionally, starting May
1, it will not be available for sale to new CSP customers. Effective October 1, 2025, we will retire
Microsoft Entra Permissions Management and discontinue support of this product.
Existing customers will retain access to this product until September 30, 2025, with ongoing
support for current functionalities. We have partnered with Delinea to provide an alternative
solution, Privilege Control for Cloud Entitlements (PCCE) , that offers similar capabilities to
those provided by Microsoft Entra Permissions Management. The decision to phase out
Microsoft Entra Permissions Management was done after deep consideration of our innovation
portfolio and how we can focus on delivering the best innovations aligned to our
differentiating areas and partner with the ecosystem on adjacencies. We remain committed to
delivering top-tier solutions across the Microsoft Entra portfolio. For more information, see:
Important change announcement: Microsoft Entra Permissions Management end of sale and
retirement .
Microsoft will standardize the linkable token identifiers, and expose them in both Microsoft
Entra and workflow audit logs. This allows customers to join the logs to track, and investigate,
any malicious activity. Currently linkable identifiers are available in Microsoft Entra sign in logs,
Exchange Online audit logs, and MSGraph Activity logs.
For more information, see: Track and investigate identity activities with linkable identifiers in
Microsoft Entra (preview).
Require reauthentication every time can be used for scenarios where you want to require a
fresh authentication, every time a user performs specific actions like accessing sensitive
applications, securing resources behind VPN, or Securing privileged role elevation in PIM. For
more information, see: Require reauthentication every time.
Custom Attributes for Microsoft Entra Domain Services is now Generally Available. This
capability allows customers to use Custom Attributes in their managed domains. Legacy
applications often rely on custom attributes created in the past to store information, categorize
objects, or enforce fine-grained access control over resources. For example, these applications
might use custom attributes to store an employee ID in their directory and rely on these
attributes in their application LDAP calls. Modifying legacy applications can be costly and risky,
and customers might lack the necessary skills or knowledge to make these changes. Microsoft
Entra Domain Services now supports custom attributes, enabling customers to migrate their
legacy applications to the Azure cloud without modification. It also provides support to
synchronize custom attributes from Microsoft Entra ID, allowing customers to benefit from
Microsoft Entra ID services in the cloud. For more information, see: Custom attributes for
Microsoft Entra Domain Services.
Conditional Access Per-Policy Reporting enables admins to easily evaluate the impact of
enabled and report-only Conditional Access policies on their organization, without using Log
Analytics. This feature surfaces a graph for each policy in the Microsoft Entra Admin Center,
visualizing the policy’s impact on the tenant’s past sign-ins. For more information, see: Policy
impact (Preview).
A new feature has been added to the App Management Policy Framework that allows
restriction on creation or promotion of multitenant applications, providing administrators with
greater control over their app environments.
Administrators can now configure tenant default or custom app policy using the new
'audiences' restriction to block new app creation if the signInAudience value provided in the
app isn't permitted by the policy. In addition, existing apps can be restricted from changing
their signInAudience if the target value isn't permitted by the policy. These policy changes are
applied during app creation or update operations, offering control over application
deployment and usage. For more information, see: audiencesConfiguration resource type.
The Microsoft Entra Connect Sync .msi installation files are also available on Microsoft Entra
admin center within the Microsoft Entra Connect pane . As part of this change, we'll stop
uploading new installation files on the Microsoft Download Center .
As part of our ongoing commitment to enhance security and protect our customers from
evolving cyber threats, we're rolling out two new Microsoft-managed Conditional Access
policies designed to limit device code flow and legacy authentication flows. These policies are
aligned to the secure by default principle of our broader Secure Future Initiative , which aims
to provide robust security measures to safeguard your organization by default.
Deprecated - Upgrade your Microsoft Entra Connect Sync
version to avoid impact on the Sync Wizard
Type: Deprecated
Service category: Microsoft Entra Connect
Product capability: Microsoft Entra Connect
As announced in the Microsoft Entra What's New Blog and in Microsoft 365 Center
communications, customers should upgrade their connect sync versions to at least 2.4.18.0 for
commercial clouds and 2.4.21.0 for non-commercial clouds before April 7, 2025. A breaking
change on the Connect Sync Wizard will affect all requests that require authentication such as
schema refresh, configuration of staging mode, and user sign in changes. For more
information, see: Minimum versions.
February 2025
The authentication methods migration guide in the Microsoft Entra Admin Center lets you
automatically migrate method management from the legacy MFA and SSPR policies to the
converged authentication methods policy. In 2023, it was announced that the ability to manage
authentication methods in the legacy MFA and SSPR policies would be retired in September
2025. Until now, organizations had to manually migrate methods themselves by using the
migration toggle in the converged policy. Now, you can migrate in just a few selections by
using the migration guide. The guide evaluates what your organization currently has enabled in
both legacy policies, and generates a recommended converged policy configuration for you to
review and edit as needed. From there, confirm the configuration, and we set it up for you and
mark your migration as complete. For more information, see: How to migrate MFA and SSPR
policy settings to the Authentication methods policy for Microsoft Entra ID.
Public Preview - Enhanced user management in Admin Center
UX
Type: New feature
Service category: User Management
Product capability: User Management
Admins are now able to multi-select and edit users at once through the Microsoft Entra Admin
Center. With this new capability, admins can bulk edit user properties, add users to groups, edit
account status, and more. This UX enhancement will significantly improve efficiency for user
management tasks in the Microsoft Entra admin center. For more information, see: Add or
update a user's profile information and settings in the Microsoft Entra admin center.
We're thrilled to announce public preview of QR code authentication in Microsoft Entra ID,
providing an efficient and simple authentication method for frontline workers.
You see a new authentication method ‘QR code’ in Microsoft Entra ID Authentication method
Policies. You can enable and add QR code for your frontline workers via Microsoft Entra ID, My
Staff, or MS Graph APIs. All users in your tenant see a new link ‘Sign in with QR code’ on
navigating to https://login.microsoftonline.com > ‘Sign-in options’ > ‘Sign in to an
organization’ page. This new link is visible only on mobile devices (Android/iOS/iPadOS). Users
can use this auth method only if you add and provide a QR code to them. QR code auth is also
available in BlueFletch and Jamf. MHS QR code auth support is generally available by early
March.
The feature has a ‘preview’ tag until it's generally available. For more information, see:
Authentication methods in Microsoft Entra ID - QR code authentication method (Preview).
By setting up federation with a custom-configured identity provider that supports the SAML
2.0 or WS-Fed protocol, you enable your users to sign up and sign in to your applications using
their existing accounts from the federated external provider.
This feature also includes domain-based federation, so a user who enters an email address on
the sign-in page that matches a predefined domain in any of the external identity providers will
be redirected to authenticate with that identity provider.
Support for external auth methods as a supported method begins rolling out at the beginning
of March 2025. When this is live in a tenant where system preferred is enabled and users are in
scope of an external auth methods policy, those users will be prompted for their external
authentication method if their most secure registered method is Microsoft Authenticator
notification. External Authentication Method will appear as third in the list of most secure
methods. If the user has a Temporary Access Pass (TAP) or Passkey (FIDO2) device registered,
they'll be prompted for those. In addition, users in the scope of an external auth methods
policy will have the ability to delete all registered second factor methods from their account,
even if the method being deleted is specified as the default sign in method or is system
preferred. For more information, see: System-preferred multifactor authentication -
Authentication methods policy.
LifecycleWorkflows-Workflow.ReadBasic.All
LifecycleWorkflows-Workflow.Read.All
LifecycleWorkflows-Workflow.ReadWrite.All
LifecycleWorkflows-Workflow.Activate
LifecycleWorkflows-Reports.Read.All
LifecycleWorkflows-CustomExt.Read.All
LifecycleWorkflows-CustomExt.ReadWrite.All
January 2025
Customers can now manage, and customize, Lifecycle Workflows using natural language with
Microsoft Security CoPilot. Our Lifecycle Workflows (LCW) Copilot solution provides step-by-
step guidance to perform key workflow configuration and execution tasks using natural
language. It allows customers to quickly get rich insights to help monitor, and troubleshoot,
workflows for compliance. For more information, see: Manage employee lifecycle using
Microsoft Security Copilot (Preview).
Manage and automate Microsoft Entra resources programmatically with the scenario-focused
Microsoft Entra PowerShell module. For more information, see: Microsoft Entra PowerShell
module now generally available .
General Availability - Improving visibility into downstream
tenant sign-ins
Type: New feature
Service category: Reporting
Product capability: Monitoring & Reporting
Microsoft Security wants to ensure that all customers are aware of how to notice when a
partner is accessing a downstream tenant's resources. Interactive sign-in logs currently provide
a list of sign in events, but there's no clear indication of which logins are from partners
accessing downstream tenant resources. For example, when reviewing the logs, you might see
a series of events, but without any additional context, it’s difficult to tell whether these logins
are from a partner accessing another tenant’s data.
Here's a list of steps that one can take to clarify which logins are associated with partner
tenants:
This filter can be applied to refine the log data. When activated, it immediately
isolates events related to partner logins.
2. Utilize the "Home Tenant ID" and "Resource Tenant ID" Columns:
These two columns identify logins coming from the partner’s tenant to a
downstream tenant.
After seeing a partner logging into a downstream tenant’s resources, an important follow-up
activity to perform is to validate the activities that might have occurred in the downstream
environment. Some examples of logs to look at are Microsoft Entra Audit logs for Microsoft
Entra ID events, Microsoft 365 Unified Audit Log (UAL) for Microsoft 365 and Microsoft Entra ID
events, and/or the Azure Monitor activity log for Azure events. By following these steps, you're
able to clearly identify when a partner is logging into a downstream tenant’s resources and
subsequent activity in the environment, enhancing your ability to manage and monitor cross-
tenant access efficiently.
To increase visibility into the aforementioned columns, Microsoft Entra will begin enabling
these columns to display by default when loading the sign-in logs UX starting on March 7,
2025.
Public Preview - Auditing administrator events in Microsoft
Entra Connect
Type: New feature
Service category: Microsoft Entra Connect
Product capability: Microsoft Entra Connect
We have released a new version of Microsoft Entra Connect, version 2.4.129.0, that supports
the logging of the changes an administrator makes on the Connect Sync Wizard and
PowerShell. For more information, see: Auditing administrator events in Microsoft Entra
Connect Sync (Public Preview).
Where supported, we'll also autoupgrade customers to this version of Microsoft Entra Connect
in February 2025. For customers who wish to be autoupgraded, ensure that you have auto-
upgrade configured.
For upgrade-related guidance, see Microsoft Entra Connect: Upgrade from a previous version
to the latest.
Flexible Federated Identity Credentials extend the existing Federated Identity Credential model
by providing the ability to use wildcard matching against certain claims. Currently available for
GitHub, GitLab, and Terraform Cloud scenarios, this functionality can be used to lower the total
number of FICs required to managed similar scenarios. For more information, see: Flexible
federated identity credentials (preview).
Traditionally, password spray attacks are detected post breach or as part of hunting activity.
Now, we’ve enhanced Microsoft Entra ID Protection to detect password spray attacks in real-
time before the attacker ever obtains a token. This reduces remediation from hours to seconds
by interrupting attacks during the sign-in flow.
Risk-based Conditional Access can automatically respond to this new signal by raising session
risk, immediately challenging the sign-in attempt, and stopping password spray attempts in
their tracks. This cutting-edge detection, now Generally Available, works alongside existing
detections for advanced attacks such as Adversary-in-the-Middle (AitM) phishing and token
theft, to ensure comprehensive coverage against modern attacks. For more information, see:
What is Microsoft Entra ID Protection?
Customers can now configure Conditional Access policies to protect against early hard
deletions. Protected action for hard deletion protects hard deletion of users, Microsoft 365
groups, and applications. For more information, see: What are protected actions in Microsoft
Entra ID?.
This feature enables administrators to export and stream Elevate Access events to both first-
party and third-party SIEM solutions via Microsoft Entra Audit logs. It enhances detection and
improves logging capabilities, allowing visibility into who in their tenant has utilized Elevate
Access. For more information on how to use the feature, see: View elevate access log entries.
The Azure AD Graph API service was [deprecated] in 2020. Retirement of the Azure AD Graph
API service began in September 2024, and the next phase of this retirement starts February
1, 2025. This phase will impact new and existing applications unless action is taken. The latest
updates on Azure AD Graph retirement can be found here: Take action by February 1: Azure AD
Graph is retiring .
Starting from February 1, both new and existing applications will be prevented from calling
Azure AD Graph APIs, unless they're configured for an extension. You might not see impact
right away, as we’re rolling out this change in stages across tenants. We anticipate full
deployment of this change around the end of February, and by the end of March for national
cloud deployments.
If you haven't already, it's now urgent to review the applications on your tenant to see which
ones depend on Azure AD Graph API access, and mitigate or migrate these before the February
1 cutoff date. For applications that haven't migrated to Microsoft Graph APIs, an extension can
be set to allow the application access to Azure AD Graph through June 30, 2025.
Microsoft Entra Recommendations are the best tool to identify applications that are using
Azure AD Graph APIs in your tenant and require action. Reference this blog post: Action
required: Azure AD Graph API retirement for step by step guidance.
On January 15, 2025, we released Microsoft Entra Connect Sync Version 2.4.129.0 which
supports auditing administrator events. More details are available in the release notes. We'll
automatically upgrade eligible customers to this latest version of Microsoft Entra Connect in
February 2025. For customers who wish to be autoupgraded, ensure that you have auto-
upgrade configured.
As announced in Microsoft Entra change announcements and in the Microsoft Entra Blog ,
the MSOnline, and Microsoft Azure AD PowerShell modules (for Microsoft Entra ID) retired on
March 30, 2024.
The retirement for MSOnline PowerShell module starts in early April 2025, and ends in late May
2025. If you're using MSOnline PowerShell, you must take action by March 30, 2025 to avoid
impact after the retirement by migrating any use of MSOnline to Microsoft Graph PowerShell
SDK or Microsoft Entra PowerShell.
Key points
MSOnline PowerShell will retire, and stop working, between early April 2025 and late May
2025
AzureAD PowerShell will no longer be supported after March 30, 2025, but its retirement
will happen in early July 2025. This postponement is to allow you time to finish the
MSOnline PowerShell migration
To ensure customer readiness for MSOnline PowerShell retirement, a series of temporary
outage tests will occur for all tenants between January 2025 and March 2025.
For more information, see: Action required: MSOnline and AzureAD PowerShell retirement -
2025 info and resources .
Archive for Microsoft Entra releases and
announcements
06/18/2025
This article includes information about the releases and change announcements across the
Microsoft Entra family of products that are older than six months (up to 18 months). If you're
looking for more current information, see Microsoft Entra releases and announcements.
For a more dynamic experience, you can now find the archive information in the Microsoft
Entra admin center. To learn more, see What's new (preview).
December 2024
What's new in Microsoft Entra offers a comprehensive view of Microsoft Entra product updates
including product roadmap (like Public Previews and recent GAs), and change announcements
(like deprecations, breaking changes, feature changes and Microsoft-managed policies). It's a
one stop shop for Microsoft Entra admins to discover the product updates.
For Microsoft Entra ID Governance users, approvers of access package requests can now
revoke their decision in MyAccess. Only the person who took the approve action is able to
revoke access. To opt into this feature, admins can go to the Identity Governance settings
page , and enable the feature. For more information, see: What is the My Access portal?.
General Availability - Expansion of SSPR Policy Audit Logging
Type: New feature
Service category: Self Service Password Reset
Product capability: Monitoring & Reporting
Starting Mid-January, we are improving the audit logs for changes made to the SSPR Policy.
With this improvement, any change to the SSPR policy configuration, including enablement or
disablement, will result in an audit log entry that includes details about the change made.
Additionally, both the previous values and current values from the change will be recorded
within the audit log. This additional information can be found by selecting an audit log entry
and selecting the Modified Properties tab within the entry.
Phase 1 includes logging for the Authentication Methods, Registration, Notifications, and
Customization configuration settings.
This change occurs automatically, so admins take no action. For more information and details
regarding this change, see: Microsoft Entra audit log categories and activities.
Users can now update their profile photo directly from their MyAccount portal. This change
exposes a new edit button on the profile photo section of the user’s account.
In some environments, it’s necessary to prevent users from making this change. Global
Administrators can manage this using a tenant-wide policy with Microsoft Graph API, following
the guidance in the Manage user profile photo settings in Microsoft 365 document.
Microsoft Entra ID now supports issuing Temporary Access Passes (TAP) to internal guest users.
TAPs can be issued to internal guests just like normal members, through the Microsoft Entra ID
Admin Center, or natively through Microsoft Graph. With this enhancement, internal guests can
now seamlessly onboard, and recover, their accounts with time-bound temporary credentials.
For more information, see: Configure Temporary Access Pass to register passwordless
authentication methods.
We’ve announced the public preview of Microsoft Security Copilot embedded in the Microsoft
Entra admin Center. This integration brings all identity skills previously made generally
available for the Security Copilot standalone experience in April 2024, along with new identity
capabilities for admins and security analysts to use directly within the Microsoft Entra admin
center. We've also added brand new skills to help improve identity-related risk investigation. In
December, we broaden the scope even further to include a set of skills specifically for App Risk
Management in both standalone and embedded experiences of Security Copilot and Microsoft
Entra. These capabilities allow identity admins and security analysts to better identify,
understand, and remediate the risks impacting applications and workload identities registered
in Microsoft Entra.
With Security Copilot now embedded in Microsoft Entra, identity admins get AI-driven, natural-
language summaries of identity context and insights tailored for handling security incidents,
equipping them to better protect against identity compromise. The embedded experience also
accelerates troubleshooting tasks like resolving identity-related risks and sign-in issues, without
ever leaving the admin center.
Identity admins and security analysts managing Microsoft Entra ID registered apps can identify
and understand risks through natural language prompts. Security Copilot has links to the
Microsoft Entra Admin Center for admins to take needed remediation actions. For more
information, see: Assess application risks using Microsoft Security Copilot in Microsoft Entra.
With this feature, customers can automatically provision "custom security attributes" in
Microsoft Entra ID from authoritative HR sources. Supported authoritative sources include:
Workday, SAP SuccessFactors, and any HR system integrated using API-driven provisioning.
This feature allows users to customize their Microsoft default sign in authentication endpoint
with their own brand names. Custom URL Domains help users to change Ext ID endpoint <
tenant-name >.ciamlogin.com to login.contoso.com.
Privileged Identity Management (PIM) capabilities are now integrated into the Azure Role
Based Access Control (Azure RBAC) UI. Before this integration, RBAC admins could only
manage standing access (active permanent role assignments) from the Azure RBAC UI. With
this integration, just-in-time access and timebound access, which are functionalities supported
by PIM, are now brought into the Azure RBAC UI for customers with either a P2, or Identity
Governance, license.
RBAC admins can create assignments of type eligible and timebound duration from the Azure
RBAC add role assignment flow, see the list of different states of role assignment in a single
view, as well as convert the type and duration of their role assignments from the Azure RBAC
UI. In addition, end users now see all their role assignments of different state straight from the
Azure RBAC UI landing page, from where they can also activate their eligible role assignments.
For more information, see: List role assignments at a scope.
General Availability - Dedicated new 1st party resource
application to enable Active Directory to Microsoft Entra ID
sync using Microsoft Entra Connect Sync or Cloud Sync
Type: Changed feature
Service category: Provisioning
Product capability: Directory
November 2024
Continuous Access Evaluation (CAE) revokes, and revalidates, network access in near real-time
whenever Microsoft Entra ID detects changes to the identity. For more information, see:
Universal Continuous Access Evaluation (Preview).
Microsoft Entra ID has a new scalable PKI (Public Key Infrastructure) based CA (Certificate
Authorities) store with higher limits for the number of CAs and the size of each CA file. PKI
based CA store allows CAs within each different PKI to be in its own container object allowing
administrators to move away from one flat list of CAs to more efficient PKI container based
CAs. PKI-based CA store now supports up to 250CAs, 8KB size for each CA and also supports
issuers hints attribute for each CA. Administrators can also upload the entire PKI and all the
CAs using the "Upload CBA PKI" feature or create a PKI container and upload CAs individually.
For more information, see: Step 1: Configure the certificate authorities with PKI-based trust
store (Preview).
On November 13, 2024, users received the ability to update their profile photo directly from
their MyAccount portal. This change exposes a new edit button on the profile photo section
of the user’s account.
In some environments, it’s necessary to prevent users from making this change. Global
Administrators can manage this using a tenant-wide policy with Microsoft Graph API, following
the guidance in the Manage user profile photo settings in Microsoft 365 document.
Microsoft Entra health monitoring, available from the Health pane, includes a set of low-latency
pre-computed health metrics that can be used to monitor the health of critical user scenarios
in your tenant. The first set of health scenarios includes MFA, CA-compliant devices, CA-
managed devices, and SAML authentications. This set of monitor scenarios will grow over time.
These health metrics are now released as general availability data streams with the public
preview of an intelligent alerting capability. For more information, see: What is Microsoft Entra
Health?.
On November 14, 2025, we released Microsoft Entra Connect Sync Version 2.4.27.0 that uses
the OLE DB version 18.7.4 that further hardens our service. Upgrade to this latest version of
connect sync to improve your security. More details are available in the release notes.
In late 2023, Microsoft Entra ID started using WhatsApp as an alternate channel to deliver
multifactor authentication (MFA) one-time passcodes to users in India and Indonesia. We saw
improved deliverability, completion rates, and satisfaction when using the channel in both
countries. The channel was temporarily disabled in India in early 2024. Starting early December
2024, we'll be re-enabling the channel in India, and expanding its use to more countries.
Starting December 2024, users in India, and other countries can start receiving MFA text
messages via WhatsApp. Only users that are enabled to receive MFA text messages as an
authentication method, and already have WhatsApp on their phone, get this experience. If a
user with WhatsApp on their device is unreachable or doesn’t have internet connectivity, we'll
quickly fall back to the regular SMS channel. In addition, users receiving OTPs via WhatsApp for
the first time will be notified of the change in behavior via SMS text message.
If you don’t want your users to receive MFA text messages through WhatsApp, you can disable
text messages as an authentication method in your organization or scope it down to only be
enabled for a subset of users. Note that we highly encourage organizations move to using
more modern, secure methods like Microsoft Authenticator and passkeys in favor of telecom
and messaging app methods. For more information, see: Text message verification.
Microsoft Entra multifactor authentication (MFA) fraud alert allows end users to report MFA
voice calls, and Microsoft Authenticator push requests, they didn't initiate as fraudulent.
Beginning March 1, 2025, MFA Fraud Alert will be retired in favor of the replacement feature
Report Suspicious Activity which allows end users to report fraudulent requests, and is also
integrated with Identity Protection for more comprehensive coverage and remediation. To
ensure users can continue reporting fraudulent MFA requests, organizations should migrate to
using Report Suspicious Activity, and review how reported activity is remediated based on their
Microsoft Entra licensing. For more information, see: Configure Microsoft Entra multifactor
authentication settings.
Intelligent alerts in Microsoft Entra health monitoring notify tenant admins, and security
engineers, whenever a monitored scenario breaks from its typical pattern. Microsoft Entra's
alerting capability watches the low-latency health signals of each scenario, and fires a
notification if an anomaly is detected. The set of alert-ready health signals and scenarios will
grow over time. This alerts feature is now available in Microsoft Entra Health as an API-only
public preview release (UX release is scheduled for February 2025). For more information, see:
How to use Microsoft Entra Health monitoring alerts (preview).
To maintain consistency in our core logging principles, we've addressed a legacy parity issue
where the Azure Log Analytics sign-in logs schema didn't align with the MSGraph sign-in logs
schema. The updates include fields such as ClientCredentialType, CreatedDateTime,
ManagedServiceIdentity, NetworkLocationDetails, tokenProtectionStatus, SessionID, among
others. These changes take effect in the first week of December 2024.
We believe this enhancement provides a more consistent logging experience. As always, you
can perform pre-ingestion transformations to remove any unwanted data from your Azure Log
Analytics storage workspaces. For guidance on how to perform these transformations, see:
Data collection transformations in Azure Monitor.
The hybrid reporting agent, used to send a MIM Service event log to Microsoft Entra to surface
in password reset and self-service group management reports, is deprecated. The
recommended replacement is to use Azure Arc to send the event logs to Azure Monitor. For
more information, see: Microsoft Identity Manager 2016 reporting with Azure Monitor.
October 2024
Microsoft Entra ID users can now use a passkey to sign into Microsoft apps on Android devices
where an authentication broker like Microsoft Authenticator, or Microsoft Intune Company
Portal, is installed. For more information, see: Support for FIDO2 authentication with Microsoft
Entra ID.
Public preview of passkeys in the Microsoft Authenticator will now support additional features.
Admins can now require attestation during registration of a passkey, and Android native apps
now supports signing in with passkeys in the Authenticator. Additionally, users are now
prompted to sign in to the Authenticator app to register a passkey when initiating the flow
from MySignIns. The Authenticator app passkey registration wizard walks the user through
meeting all the prerequisites within the context of the app before attempting registration.
Download the latest version of the Authenticator app and give us feedback as you pilot these
changes in your organization. For more information, see: Enable passkeys in Microsoft
Authenticator (preview).
The authentication methods migration guide (preview) in the Microsoft Entra admin center lets
you automatically migrate method management from the legacy MFA and SSPR policies to the
converged authentication methods policy. In 2023, it was announced that the ability to manage
authentication methods in the legacy MFA and SSPR policies would be retired in September
2025. Until now, organizations had to manually migrate methods themselves by leveraging the
migration toggle in the converged policy. Now, you can migrate in just a few selections by
using the migration guide. The guide evaluates what your organization currently has enabled in
both legacy policies, and generates a recommended converged policy configuration for you to
review and edit as needed. From there, confirm the configuration and we set it up for you and
mark your migration as complete. For more information, see: How to migrate MFA and SSPR
policy settings to the Authentication methods policy for Microsoft Entra ID.
Announcing general availability of SMS as an MFA method in Microsoft Entra External ID with
built-in telecom fraud protection through integrations with the Phone Reputation Platform.
What's new?
SMS sign-in experience that maintains the look and feel of the application users are
accessing.
SMS is an add-on feature. We apply an additional charge per SMS sent to the user which
includes the built-in fraud protection services.
Built-in fraud protection against telephony fraud through our integration with the Phone
Reputation platform. This platform processes telephony activity in real-time and returns
an "Allow", "Block", or "Challenge" based on risk and a series of heuristics.
September 2024
A new Conditional Access template requiring device compliance is now available in Public
Preview. This template restricts access to company resources exclusively to devices enrolled in
mobile device management (MDM) and compliant with company policy. Requiring device
compliance improves data security, reducing risk of data breaches, malware infections, and
unauthorized access. This is a recommended best practice for users and devices targeted by
compliance policy through MDM. For more information, see: Common policy: Create a
Conditional Access policy requiring device compliance.
With Certificate based authentication, a CA can be uploaded without a CRL endpoint, and
certificate-based authentication won't fail if an issuing CA doesn't have a CRL specified.
Beginning with version 6.2408.5807, Microsoft Authenticator for Android is compliant with
Federal Information Processing Standard (FIPS 140-3) for all Microsoft Entra authentications,
including phishing-resistant device-bound passkeys, push multifactor authentication (MFA),
passwordless phone sign-in (PSI), and time-based one-time passcodes (TOTP). No changes in
configuration are required in Microsoft Authenticator or Microsoft Entra ID Admin Portal to
enable this capability. Microsoft Authenticator on iOS is already FIPS 140 compliant, as
announced last year. For more information, see: Authentication methods in Microsoft Entra ID -
Microsoft Authenticator app.
Microsoft Entra External ID Extension for VS Code provides a streamlined, guided experience
to help you kickstart identity integration for customer-facing apps. With this extension, you can
create external tenants, set up a customized and branded sign-in experience for external users,
and quickly bootstrap your projects with preconfigured External ID samples—all within Visual
Studio Code. Additionally, you can view and manage your external tenants, applications, user
flows, and branding settings directly within the extension.
For more information, see: Quickstart: Get started with the Microsoft Entra External ID
extension for Visual Studio Code.
Custom Claims API allows admins to manage and update additional claims for their Enterprise
Applications seamlessly through MS Graph. The Custom Claims API offers a simplified and user
friendly API experience for claims management for our customers. With the introduction of
Custom Claims API, we achieved UX and API interoperability. Admins can now use Microsoft
Entra admin center and MS Graph API interchangeably to manage claims configurations for
their Enterprise Applications. It facilitates admins to execute their automations using the API
while allowing the flexibility to update claims on the Microsoft Entra admin center as required
on the same policy object. For more information, see: Customize claims using Microsoft Graph
Custom Claims Policy (preview).
Support for synchronizing the manager attribute using cross-tenant synchronization is now
generally available. For more information, see: Attributes.
Instead of having new employees navigate the request process, managers can request access
packages for their employees, making onboarding faster and more seamless. To enable this
functionality for managers, admins can select an option when setting up an access package
policy that allows managers to request access on their employees' behalf.
Expanding self-service request flows to allow requests on behalf of employees ensures that
users have timely access to necessary resources, and increases productivity. For more
information, see: Request access package on-behalf-of other users (Preview).
August 2024
As part of our commitment to providing our customers with the highest level of security, we
previously announced that Microsoft requires multifactor authentication (MFA) for users
signing into Azure.
We'd like to share an update that the scope of MFA enforcement includes Microsoft Entra
admin center in addition to the Azure portal and Intune admin center. This change is rolled
out in phases, allowing organizations time to plan their implementation:
Phase 1: Beginning in the second half of the calendar year 2024, MFA is required to sign in to
the Microsoft Entra admin center, Azure portal, and Intune admin center. This enforcement is
gradually rolled out to all tenants worldwide. This phase didn't affect other Azure clients such
as the Azure Command Line Interface, Azure PowerShell, Azure mobile app, and Infrastructure
as Code (IaC) tools.
Phase 2: Beginning in early 2025, gradual enforcement of MFA at sign-in for the Azure CLI,
Azure PowerShell, Azure mobile app, and Infrastructure as Code (IaC) tools commences.
Microsoft sends a 60-day advance notice to all Microsoft Entra Global Administrators by email,
and through Azure Service Health Notifications, to notify them of the start date of enforcement
and required actions. Extra notifications are sent through the Azure portal, Microsoft Entra
admin center, and the Microsoft 365 message center.
We understand that some customers might need extra time to prepare for this MFA
requirement. Therefore, Microsoft allows extended time for customers with complex
environments or technical barriers. The notification from us also includes details about how
customers can postpone specific changes. These changes include the start date of enforcement
for their tenants, the duration of the postponement, and a link to apply changes. Visit here to
learn more.
General Availability - restricted permissions on Directory
Synchronization Accounts (DSA) role in Microsoft Entra
Connect Sync and Microsoft Entra Cloud Sync
Type: Changed feature
Service category: Provisioning
Product capability: Microsoft Entra Connects
As part of ongoing security hardening, Microsoft removes unused permissions from the
privileged Directory Synchronization Accounts role. This role is exclusively used by Microsoft
Entra Connect Sync, and Microsoft Entra Cloud Sync, to synchronize Active Directory objects
with Microsoft Entra ID. There's no action required by customers to benefit from this
hardening, and the revised role permissions are documented here: Directory Synchronization
Accounts.
Starting Mid-October 2024, the Add sign-in method dialog on the My Security-Info page will
be updated with a modern look and feel. With this change, new descriptors will be added
under each method which provides detail to users on how the sign-in method is used (ex.
Microsoft Authenticator – Approve sign-in requests or use one-time codes).
Early next year the Add sign-in method, dialog will be enhanced to show an initially
recommended sign-in method instead of initially showing the full list of sign-in methods
available to register. The recommended sign-in method will default to the strongest method
available to the user based on the organization’s authentication method policy. Users can
select Show more options and choose from all available sign-in methods allowed by their
policy.
We'll start releasing user experience updates for application provisioning, HR provisioning, and
cross-tenant synchronization next month. These updates include a new overview page, user
experience to configure connectivity to your application, and new create provisioning
experience. The new experiences include all functionality available to customers today, and no
customer action is required.
In October 2023 , we shared that, starting June 2024, the existing Self Service Group
Management setting in the Microsoft Entra Admin Center that states restrict user ability to
access groups features in My Groups retires. These changes are under review, and might take
place as originally planned. A new deprecation date will be announced in the future.
Microsoft Entra ID now supports FIDO2 provisioning via API, allowing organizations to pre-
provision security keys (passkeys) for users. These new APIs can simplify user onboarding, and
provide seamless phishing-resistant authentication on day one for employees. For more
information on how to use this feature, see: Provision FIDO2 security keys using Microsoft
Graph API.
Lifecycle Workflows is now able to enable, disable, and delete user accounts that are
synchronized from Active Directory Domain Services (AD DS) to Microsoft Entra. This capability
allows you to complete the employee offboarding process by deleting the user account after a
retention period.
To learn more, see: Manage users synchronized from Active Directory Domain Services with
workflows.
Customers can now use their confidential HR data stored in custom security attributes. They
can do this addition to other attributes to define the scope of their workflows in Lifecycle
Workflows for automating joiner, mover, and leaver scenarios.
With this feature, customers can now monitor workflow health, and get insights for all their
workflows in Lifecycle Workflows including viewing workflow processing data across workflows,
tasks, and workflow categories.
Lifecycle Workflows now supports the ability to trigger workflows based on job change events
like changes to an employee's department, job role, or location, and see them executed on the
workflow schedule. With this feature, customers can use new workflow triggers to create
custom workflows for their executing tasks associated with employees moving within the
organization including triggering:
To learn more, see Automated employee mover tasks when they change jobs using the
Microsoft Entra admin center tutorial.
Since October 2022, users on Ubuntu Desktop 20.04 LTS & Ubuntu 22.04 LTS with Microsoft
Edge browser could register their devices with Microsoft Entra ID, enroll into Microsoft Intune
management, and securely access corporate resources using device-based Conditional Access
policies.
This release extends support to Red Hat Enterprise Linux 8.x and 9.x (LTS) which makes these
capabilities possible:
July 2024
Insider Risk condition, in Conditional Access, is a new feature that uses signals from Microsoft
Purview's Adaptive Protection capability to enhance the detection and automatic mitigation of
Insider threats. This integration allows organizations to more effectively manage, and respond,
to potential insider risks by using advanced analytics and real-time data.
For example, if Purview detects unusual activity from a user, Conditional Access can enforce
extra security measures such as requiring multifactor authentication (MFA) or blocking access.
This feature is a premium and requires a P2 license. For more information, see: Common
Conditional Access policy: Block access for users with insider risk.
Starting late September 2024, applications indicated as SAML applications (via the
preferredSingleSignOnMode property of the service principal) can't be issued JWT tokens. This
change means they can't be the resource application in OIDC, OAuth2.0, or other protocols
using JWTs. This change only affects SAML applications attempting to take a new dependency
on JWT-based protocols; existing SAML applications already using these flows aren't affected.
This update improves the security of apps.
For more information, see: SAML authentication with Microsoft Entra ID.
In February 2024, we added the following 10 new applications in our App gallery with
Federation support:
You can also find the documentation of all the applications from here
https://aka.ms/AppsTutorial .
For listing your application in the Microsoft Entra ID app gallery, read the details here
https://aka.ms/AzureADAppRequest .
The Active Directory Federation Services (AD FS) application migration wizard allows the user
to quickly identify which AD FS relying party applications are compatible with being migrated
to Microsoft Entra ID. This tool shows the migration readiness of each application and
highlights issues with suggested actions to remediate. This tool also guides users through
preparing an individual application for migration and configuring their new Microsoft Entra
application. For more information on how to use this feature, see: Use AD FS application
migration to move AD FS apps to Microsoft Entra ID.
The Attacker in the Middle detection is now Generally Available for users in Identity Protection.
This high precision detection is triggered on a user account compromised by an adversary that
intercepted a user's credentials, including tokens issued. The risk is identified through
Microsoft 365 Defender and raises the user with High risk to trigger the configured Conditional
Access policy.
For more information on this feature, see: What are risk detections?
An improved experience when using Microsoft Entra External ID as an identity provider for
Azure App Service’s built-in authentication, simplifying the process of configuring
authentication and authorization for external-facing apps. You can complete initial
configuration directly from the App Service authentication setup without switching into the
external tenant. For more information, see: Quickstart: Add app authentication to your web app
running on Azure App Service.
June 2024
Starting late July 2024, through end of August 2024, we're rolling out changes to the
registration experience for passkey in Microsoft Authenticator (preview) on the My Security-
Info page. This registration experience change will go from a WebAuthn approach, to guide
users to register by signing into the Microsoft Authenticator app. This change will occur
automatically, and admins won’t need to take any action. Here's more details:
By default, we'll guide users to sign into the Authenticator app to set up passkeys.
If users are unable to sign in, they'll be able to fallback to an improved WebAuthn
experience through a "Having trouble?" link on the page.
Action Recommended: Security Improvements to Microsoft Entra Connect Sync and Connect
Health
Since September 2023, we have been autoupgrading Microsoft Entra Connect Sync and
Microsoft Entra Connect Health customers to an updated build as part of a precautionary
security-related service change. For customers who previously opted out of autoupgrade, or
for whom autoupgrade failed, we strongly recommend that you upgrade to the latest versions
by September 23, 2024.
When you upgrade to the latest versions, you ensure that when the service change takes effect,
you avoid service disruptions for:
See documentation here: Security improvements to the autoupgrade process for upgrade-
related guidance, versioning information, and further details on the expected impacts of the
service change.
Starting June 2024, we're releasing the capability to manage user status (Enforced, Enabled,
Disabled) for per-user multifactor authentication through MS Graph API. This update replaces
the legacy MSOnline PowerShell module that is being retired. The recommended approach to
protect users with Microsoft Entra multifactor authentication is Conditional Access (for licensed
organizations) and security defaults (for unlicensed organizations). For more information, see:
Enable per-user Microsoft Entra multifactor authentication to secure sign-in events.
We improved the experience when using Microsoft Entra External ID as an identity provider for
Azure App Service’s built-in authentication, simplifying the process of configuring
authentication and authorization for external-facing apps. You can complete initial
configuration directly from the App Service authentication setup without switching into the
external tenant. For more information, see: Quickstart: Add app authentication to your web app
running on Azure App Service
In July, enhancements for the Microsoft Authenticator app UX roll-out. The account details
page of a user account is reorganized to help users better understand, and interact with, the
information and buttons on the screen. Key actions that a user can do today are available in
the refactored page, but they're organized in three sections or categories that help better
communicate to users:
In addition to providing global SLA performance, Microsoft Entra ID reports tenant-level SLA
performance for organizations with at least 5,000 monthly active users. This feature entered
general availability in May 2024. The Service Level Agreement (SLA) sets a minimum bar of
99.99% for the availability of Microsoft Entra ID user authentication, reported on a monthly
basis in the Microsoft Entra admin center. For more information, see: What is Microsoft Entra
Health?
We're introducing a new simple way for Frontline Workers to authenticate in Microsoft Entra ID
with a QR code and PIN. This capability eliminates the need for users to enter and reenter long
UPNs and alphanumeric passwords.
Beginning in August 2024, all users in your tenant now see a new link Sign in with QR code
when navigating to https://login.microsoftonline.com > Sign-in options > Sign in to an
organization. This new link, Sign in with QR code, is visible only on mobile devices
(Android/iOS/iPadOS). If you aren't participating in the preview, users from your tenant can't
sign in through this method while we're still in review. They receive an error message if they try
to sign-in.
The feature has a preview tag until it's generally available. Your organization needs to be
enabled to test this feature. Broad testing is available in public preview, to be announced later.
While the feature is in preview, no technical support is provided. Learn more about support
during previews here: Microsoft Entra ID preview program information.
May 2024
Beginning end of June 2024, all organizations utilizing Microsoft Azure China 21Vianet now has
access to My Sign-ins activity reporting. They're required to use the combined security
information registration end-user experience for MFA and SSPR. As a result of this enablement,
users now see a unified SSPR and MFA registration experience when prompted to register for
SSPR or MFA. For more information, see: Combined security information registration for
Microsoft Entra overview.
The long-awaited $select property is now implemented into the signIn API. Utilize the
$select to reduce the number of attributes that are returned for each log. This update should
greatly help customers who deal with throttling issues, and allow every customer to run faster,
more efficient queries.
End users can now enable passwordless phone sign-in for multiple accounts in the
Authenticator App on any supported Android device. Consultants, students, and others with
multiple accounts in Microsoft Entra can add each account to Microsoft Authenticator and use
passwordless phone sign-in for all of them from the same Android device. The Microsoft Entra
accounts can be in the same tenant or different tenants. Guest accounts aren't supported for
multiple account sign-ins from one device. For more information, see: Enable passwordless
sign-in with Microsoft Authenticator.
The Microsoft Graph Bicep extension brings declarative infrastructure-as-code (IaC) capabilities
to Microsoft Graph resources. It allows you to author, deploy, and manage core Microsoft Entra
ID resources using Bicep template files, alongside Azure resources.
Existing Azure customers can now use familiar tools to deploy Azure resources and the
Microsoft Entra resources they depend on, such as applications and service principals, IaC
and DevOps practices.
It also opens the door for existing Microsoft Entra customers to use Bicep templates and
IaC practices to deploy and manage their tenant's Microsoft Entra resources.
For more information, see: Bicep templates for Microsoft Graph resources
Today we’re announcing that Platform SSO for macOS is available in public preview with
Microsoft Entra ID. Platform SSO is an enhancement to the Microsoft Enterprise SSO plug-in
for Apple Devices that makes usage and management of Mac devices more seamless and
secure than ever. At the start of public preview, Platform SSO works with Microsoft Intune.
Other Mobile Device Management (MDM) providers are coming soon. Contact your MDM
provider for more information on support and availability. For more information, see: macOS
Platform Single Sign-on overview (preview).
Public Preview - Workflow History Insights in Lifecycle
Workflows
Type: New feature
Service category: Lifecycle Workflows
Product capability: Identity Lifecycle Management
Customers can now monitor workflow health, and get insights throughout all their workflows in
Lifecycle Workflows including viewing workflow processing data across workflows, tasks, and
workflow categories. For more information, see: Workflow Insights (preview).
Customers can now apply their confidential HR data stored in custom security attributes in
addition to other attributes. This update enables customers to define the scope of their
workflows in Lifecycle Workflows for automating joiner, mover, and leaver scenarios. For more
information, see: Use custom security attributes to scope a workflow.
Lifecycle Workflows can now enable, disable, and delete user accounts that are synchronized
from Active Directory Domain Services (AD DS) to Microsoft Entra. This feature allows you to
ensure that the offboarding processes of your employees are completed by deleting the user
account after a retention period.
For more information, see: Managing synced on-premises users with Lifecycle Workflows.
Public Preview - External authentication methods for
multifactor authentication
Type: New feature
Service category: MFA
Product capability: User Authentication
External authentication methods enable you to use your preferred multifactor authentication
(MFA) solution with Microsoft Entra ID. For more information, see: Manage an external
authentication method in Microsoft Entra ID (Preview).
Due to popular demand and increased confidence in the stability of the properties, the update
adds LastSuccessfulSignIn & LastSuccessfulSigninDateTime into V1. Feel free to take
dependencies on these properties in your production environments now. For more
information, see: signInActivity resource type.
Beginning in August 2024, new Microsoft Entra applications created using any interface
(including the Microsoft Entra admin center, Azure portal, Powershell/CLI, or the Microsoft
Graph application API) has the default value of the requestedAccessTokenVersion property in
the app registration set to 2. This capability is a change from the previous default of null`
(meaning 1). This means that new resource applications receive v2 access tokens instead of v1
by default. This update improves the security of apps. For more information on differences
between token versions, see: Access tokens in the Microsoft identity platform and Access token
claims reference.
General Availability - Windows Account extension is now
Microsoft Single Sign On
Type: Changed feature
Service category: Authentications (Logins)
Product capability: SSO
The Windows Account extension is now the Microsoft Single Sign On extension in docs and
Chrome store. The Windows Account extension is updated to represent the new macOS
compatibility. This capability is now known as the Microsoft Single Sign On (SSO) extension for
Chrome, offering single sign-on and device identity features with the Enterprise SSO plug-in
for Apple devices. This update is only a name change for the extension, there are no software
changes to the extension itself.
Microsoft added the following new applications in our App gallery with Provisioning support.
You can now automate creating, updating, and deleting of user accounts for these newly
integrated apps:
ClearView Trade
For more information about how to better secure your organization by using automated user
account provisioning, see: What is app provisioning in Microsoft Entra ID?.
April 2024
For more information, see: Support for FIDO2 authentication with Microsoft Entra ID.
Security groups provisioning to Active Directory (also known as Group Writeback) is now
generally available through Microsoft Entra Cloud Sync in Azure Global and Azure Government
clouds. With this new capability, you can easily govern Active Directory based on-premises
applications (Kerberos based apps) using Microsoft Entra Governance. For more information,
see: Provision groups to Active Directory using Microsoft Entra Cloud Sync.
The public preview of Group Writeback V2 (GWB) in Microsoft Entra Connect Sync will no
longer be available after June 30, 2024. After this date, Connect Sync will no longer support
provisioning cloud security groups to Active Directory.
Another similar functionality in Microsoft Entra Cloud Sync is Group Provision to AD. You can
use this functionality instead of GWB V2 for provisioning cloud security groups to AD.
Enhanced functionality in Cloud Sync, along with other new features, are being developed.
Customers who use this preview feature in Connect Sync should switch their configuration
from Connect Sync to Cloud Sync. Customers can choose to move all their hybrid sync to Cloud
Sync, if it supports their needs. Customers can also choose to run Cloud Sync side-by-side and
move only cloud security group provisioning to Azure AD onto Cloud Sync.
Customers who use Microsoft 365 groups to AD can continue using GWB V1 for this capability.
Customers can evaluate moving exclusively to Cloud Sync by using this wizard:
https://aka.ms/EvaluateSyncOptions
PIM is now available on the Azure mobile app in both iOS and Android. Customers can now
approve or deny incoming PIM activation requests. Customers can also activate Microsoft Entra
ID and Azure resource role assignments directly from an app on their devices. For more
information, see: Activate PIM roles using the Azure mobile app.
Organizations who enabled password hash synchronization can now allow password changes
on-premises to remediate user risk. You can also use this capability to save hybrid users time
and maintain their productivity with automatic self-service remediation in risk-based
Conditional Access policies. For more information, see: Remediate risks and unblock users.
Custom authentication extensions allow you to customize the Microsoft Entra authentication
experience by integrating with external systems. A custom claims provider is a type of custom
authentication extension that calls a REST API to fetch claims from external systems. A custom
claims provider maps claims from external systems into tokens and can be assigned to one or
many applications in your directory. For more information, see: Custom authentication
extensions overview.
This quota is increased to 15,000. For example, you can now have 15,000 dynamic membership
groups and 10,000 dynamic AUs (or any other combination that adds up to 15k). You don't
need to do anything to take advantage of this change - this update is available right now. For
more information, see: Microsoft Entra service limits and restrictions.
In Lifecycle Workflows, IT admins can now export their workflow history data across users, runs,
and tasks to CSV files for meeting their organization's reporting and auditing needs.
Native authentication empowers developers to take complete control over the design of the
sign-in experience of their mobile applications. It allows them to craft stunning, pixel-perfect
authentication screens that are seamlessly integrated into their apps, rather than relying on
browser-based solutions. For more information, see: Native authentication (preview).
Users can now create device-bound passkeys in the Microsoft Authenticator to access
Microsoft Entra ID resources. Passkeys in the Authenticator app provide cost-effective,
phishing-resistant, and seamless authentications to users from their mobile devices. For more
information, see https://aka.ms/PasskeyInAuthenticator .
The maximum number of workflows that can be configured in Lifecycle workflows increased.
Now IT admins can create up to 100 workflows in Lifecycle workflows. For more information,
see: Microsoft Entra ID Governance service limits.
Lifecycle Workflows now supports the ability to trigger workflows based on job change events
like changes to an employee's department, job role, or location and see them executed on the
workflow schedule. With this feature, customers can use new workflow triggers to create
custom workflows for executing tasks associated with employees moving within the
organization including triggering:
Workflows when a specified attribute changes
Workflows when a user is added or removed from a group's membership
Tasks to notify a user's manager about a move
Tasks to assign licenses or remove selected licenses from a user
To learn more, see the Automate employee mover tasks when they change jobs using the
Microsoft Entra admin center tutorial.
The Microsoft Graph activity logs is now generally available! Microsoft Graph activity logs give
you visibility into HTTP requests made to the Microsoft Graph service in your tenant. With
rapidly growing security threats, and an increasing number of attacks, this log data source
allows you to perform security analysis, threat hunting, and monitor application activity in your
tenant. For more information, see: Access Microsoft Graph activity logs.
Microsoft added the following new applications in our App gallery with provisioning support.
You can now automate creating, updating, and deleting of user accounts for these newly
integrated apps:
For more information about how to better secure your organization by using automated user
account provisioning, see Automate user provisioning to SaaS applications with Microsoft
Entra.
Quick Microsoft Entra Verified ID setup, now generally available, removes several configuration
steps an admin needs to complete with a single select on a Get started button. The quick setup
takes care of signing keys, registering your decentralized ID, and verifying your domain
ownership. It also creates a Verified Workplace Credential for you. For more information, see:
Quick Microsoft Entra Verified ID setup.
By assigning Microsoft Entra roles to employees, and guests, using Entitlement Management,
you can look at a user's entitlements to quickly determine which roles are assigned to that
user. When you include a Microsoft Entra role as a resource in an access package, you can also
specify whether that role assignment is eligible or active.
Assigning Microsoft Entra roles through access packages helps to efficiently manage role
assignments at scale and improves the role. For more information, see: Assign Microsoft Entra
roles (Preview).
Self-service password reset (SSPR) policy for Admins expands to include three extra built-in
admin roles. These extra roles include:
Teams Administrator
Teams Communications Administrator
Teams Devices Administrator
For more information on Self-service password reset for admins, including the full list of in-
scope admin roles, see Administrator reset policy differences.
March 2024
External user conversion enables customers to convert external users to internal members
without needing to delete and create new user objects. Maintaining the same underlying
object ensures the user’s account, and access to resources, isn’t disrupted and that their history
of activities remains intact as their relationship with the host organization changes.
The external to internal user conversion feature includes the ability to convert on-premises
synchronized users as well. For more information, see: Convert external users to internal users
(Preview).
Customer Lockbox for Microsoft Azure is launching a new feature that enables customers to
use alternate email IDs for getting lockbox notifications. This capability enables Lockbox
customers to receive notifications in scenarios where their Azure account isn't email enabled,
or if they have a service principal defined as the tenant admin or subscription owner.
Beginning in mid-April 2024, the Conditional Access Locations condition is moving up.
Locations become the Network assignment, with the new Global Secure Access assignment -
All compliant network locations.
This change occurs automatically, so admins take no action. Here's more details:
The familiar Locations condition is unchanged, updating the policy in the Locations
condition are reflected in the Network assignment, and vice versa.
No functionality changes, existing policies continue to work without changes.
Provide just-in-time access to non-Microsoft applications such as AWS & GCP. This capability
integrates PIM for groups. Application provisioning with PIM reduces the activation time from
40+ minutes to roughly 2 minutes when requesting just-in-time access to a role in non-
Microsoft apps.
AWS
GCP
Customer Lockbox for Microsoft Azure is launching a new built-in Azure Role-based access
control role that enables customers to use a lesser privileged role for users responsible for
approving/rejecting Customer Lockbox requests. This feature is targeted to the customer
admin workflow where a lockbox approver acts on the request from Microsoft Support
engineer to access Azure resources in a customer subscription.
In this first phase, we're launching a new built-in Azure Role-based Access Control role. This
role helps scope down the access possible for an individual with Azure Customer Lockbox
approver rights on a subscription and its resources. A similar role for tenant-scoped requests is
available in subsequent releases.
We added the following new applications in our App gallery with Provisioning support. You can
now automate creating, updating, and deleting of user accounts for these newly integrated
apps:
Astro
Egnyte
MobileIron
SAS Viya SSO
For more information about how to better secure your organization by using automated user
account provisioning, see: What is app provisioning in Microsoft Entra ID?.
We're excited to announce that Microsoft Entra, is rolling out support for Transport Layer
Security (TLS) 1.3 for its endpoints to align with security best practices (NIST - SP 800-52 Rev.
2 ). With this change, the Microsoft Entra ID related endpoints support both TLS 1.2 and TLS
1.3 protocols. For more information, see: TLS 1.3 support for Microsoft Entra services.
With API-driven inbound provisioning, Microsoft Entra ID provisioning service now supports
integration with any system of record. Customers and partners can choose any automation tool
to retrieve workforce data from any system of record for provisioning to Microsoft Entra ID.
This capability also applies to connected on-premises Active Directory domains. IT admins have
full control on how the data is processed and transformed with attribute mappings. Once the
workforce data is available in Microsoft Entra ID, IT admins can configure appropriate joiner-
mover-leaver business processes using Microsoft Entra ID Governance Lifecycle Workflows. For
more information, see: API-driven inbound provisioning concepts.
Now Generally Available, My Sign Ins (My sign-ins (microsoft.com)) supports end users
changing their passwords inline. When a user authenticates with a password and an MFA
credential, they're able to are able to change their password without entering their existing
password. Beginning April 1, through a phased rollout, traffic from the Change password
(windowsazure.com) portal will redirect to the new My Sign Ins change experience. The
Change password (windowsazure.com) will no longer be available after June 2024, but will
continue to redirect to the new experience.
February 2024
With the Risky users report, administrators gain visibility into accounts flagged as
compromised or vulnerable. Actions such as blocking/unblocking sign-ins, confirming the
legitimacy of compromises, or resetting passwords are conveniently accessible, ensuring timely
risk mitigation.
Additionally, the Risky sign-ins report provides a detailed overview of suspicious sign-in
activities, aiding administrators in identifying potential security breaches. While capabilities on
mobile are limited to viewing sign-in details, administrators can take necessary actions through
the portal, such as blocking sign-ins. Alternatively, admins can choose to manage the
corresponding risky user's account until all risks are mitigated.
Stay ahead of identity risks effortlessly with Identity Protection on the Azure Mobile app. These
capabilities are intended to provide user with the tools to maintain a secure environment and
peace of mind for their organization.
Android: https://aka.ms/AzureAndroidWhatsNew
IOS: https://aka.ms/ReferAzureIOSWhatsNew
Starting on March 31, 2024, all "low" risk detections and users in Microsoft Entra ID Identity
Protection that are older than six months will be automatically aged out and dismissed. This
change allows customers to focus on more relevant risk and provide a cleaner investigation
environment. For more information, see: What are risk detections?.
Reauthentication policy lets you require users to interactively provide their credentials again,
typically before accessing critical applications and taking sensitive actions. Combined with
Conditional Access session control of Sign-in frequency, you can require reauthentication for
users and sign-ins with risk, or for Intune enrollment. With this public preview, you can now
require reauthentication on any resource protected by Conditional Access. For more
information, see: Require reauthentication every time.
We released a new premium user risk detection in Identity Protection called Suspicious API
Traffic. This detection is reported when Identity Protection detects anomalous Graph traffic by
a user. Suspicious API traffic might suggest that a user is compromised and conducting
reconnaissance in their environment. For more information about Identity Protection
detections including this one, visit our public documentation at the following link: What are
risks detections?.
Conditional Access policies can now be filtered on actor, target resources, conditions, grant
control, and session control. The granular filtering experience can help admins quickly discover
policies containing specific configurations. For more information, see: What is Conditional
Access?.
End of support - Azure Active Directory Connector for
Forefront Identity Manager (FIM WAAD Connector)
Type: Deprecated
Service category: Microsoft Identity Manager
Product capability: Inbound to Microsoft Entra ID
The Azure Active Directory Connector for Forefront Identity Manager (FIM WAAD Connector)
from 2014 was deprecated in 2021. The standard support for this connector ended in April
2024. Customers must remove this connector from their MIM sync deployment, and instead
use an alternative provisioning mechanism. For more information, see: Migrate a Microsoft
Entra provisioning scenario from the FIM Connector for Microsoft Entra ID.
We added the following new applications in our App gallery with Provisioning support. You can
now automate creating, updating, and deleting of user accounts for these newly integrated
apps:
Alohi
Insightly SAML
Starmind
For more information about how to better secure your organization by using automated user
account provisioning, see: What is app provisioning in Microsoft Entra ID?.
In February 2024, we added the following 10 new applications in our App gallery with
Federation support:
Crosswise, Stonebranch Universal Automation Center (SaaS Cloud), ProductPlan, Bigtincan for
Outlook , Blinktime , Stargo , Garage Hive BC v2 , Avochato , Luscii , LEVR , XM
Discover, Sailsdock , Mercado Electronic SAML, Moveworks, Silbo , Alation Data Catalog,
Papirfly SSO, Secure Cloud User Integration , AlbertStudio , Automatic Email Manager ,
Streamboxy , NewHotel PMS , Ving Room , Trevanna Tracks, Alteryx Server, RICOH Smart
Integration , Genius, Othership Workplace Scheduler, GitHub Enterprise Managed User -
ghe.com,Thumb Technologies , Freightender SSO for TRP (Tender Response Platform),
BeWhere Portal (UPS Access) , Flexiroute , SEEDL , Isolocity , SpotDraft, Blinq, Cisco
Phone OBTJ , Applitools Eyes.
You can also find the documentation of all the applications from here
https://aka.ms/AppsTutorial .
For listing your application in the Microsoft Entra ID app gallery, read the details here
https://aka.ms/AzureADAppRequest .
January 2024
We redesigned the Microsoft Entra admin center's homepage to help you do the following
tasks:
Filters for apps in Conditional Access simplify policy management by allowing admins to tag
applications with custom security, and target them in Conditional Access policies, instead of
using direct assignments. With this feature, customers can scale up their policies, and protect
any number of apps. For more information, see: Conditional Access: Filter for applications
The Suspicious sending patterns risk detection type is discovered using information provided by
Microsoft Defender for Office (MDO). This alert is generated when someone in your
organization sent suspicious email. The alert is because the email is either at risk of being
restricted from sending email, or has been restricted from sending email. This detection moves
users to medium risk, and only fires in organizations that deployed MDO. For more
information, see: What are risk detections?.
We've released a new recommendation in the Microsoft Entra admin center for customers to
move off MFA Server to Microsoft Entra multifactor authentication. MFA Server will be retired
on September 30, 2024. Any customers with MFA Server activity in the last seven days see the
recommendation that includes details about their current usage, and steps on how to move to
Microsoft Entra multifactor authentication. For more information, see: Migrate from MFA Server
to Microsoft Entra multifactor authentication.
We added the following new applications in our App gallery with Provisioning support. You can
now automate creating, updating, and deleting of user accounts for these newly integrated
apps:
Personify Inc
Screensteps
WiggleDesk
For more information about how to better secure your organization by using automated user
account provisioning, see: What is app provisioning in Microsoft Entra ID?.
In January 2024, we added the following new applications in our App gallery with Federation
support:
You can also find the documentation of all the applications from here
https://aka.ms/AppsTutorial .
For listing your application in the Microsoft Entra ID app gallery, read the details here
https://aka.ms/AzureADAppRequest .
December 2023
With configurable redemption, you can customize the order of identity providers that your
guest users can sign in with when they accept your invitation. This option lets your override the
default configuration order set by Microsoft and use your own. This option can be used to help
with scenarios like prioritizing a SAML/WS-fed federation above a Microsoft Entra ID verified
domain. This option disables certain identity providers during redemption, or even only using
something like email one-time pass-code as a redemption option. For more information, see:
Configurable redemption (Preview).
The dynamic group rule builder is updated to no longer include the 'contains' and 'notContains'
operators, as they're less performant. If needed, you can still create rules for dynamic
membership groups with those operators by typing directly into the text box. For more
information, see: Rule builder in the Azure portal.
November 2023
The public preview of Group Writeback V2 (GWB) in Microsoft Entra Connect Sync will no
longer be available after June 30, 2024. After this date, Connect Sync will no longer support
provisioning cloud security groups to Active Directory.
Another similar functionality is offered in Microsoft Entra Cloud Sync, called 'Group Provision to
AD', that maybe used instead of GWB V2 for provisioning cloud security groups to AD.
Enhanced functionality in Cloud Sync, along with other new features, are being developed.
Customers who use this preview feature in Connect Sync should switch their configuration
from Connect Sync to Cloud Sync. Customers can choose to move all their hybrid sync to Cloud
Sync (if it supports their needs). They can also run Cloud Sync side-by-side and move only
cloud security group provisioning to AD onto Cloud Sync.
Customers who provision Microsoft 365 groups to AD can continue using GWB V1 for this
capability.
Customers can evaluate moving exclusively to Cloud Sync by using this wizard:
https://aka.ms/EvaluateSyncOptions
Exchange hybrid capability allows for the coexistence of Exchange mailboxes both on-premises
and in Microsoft 365. Microsoft Entra Cloud Sync synchronizes a specific set of Exchange-
related attributes from Microsoft Entra ID back into your on-premises directory. It also
synchronizes any disconnected forests (no network trust needed between them). With this
capability, existing customers who have this feature enabled in Microsoft Entra Connect sync
can now migrate, and apply, this feature with Microsoft Entra cloud sync. For more information,
see: Exchange hybrid writeback with cloud sync.
Monitor guest accounts at scale with intelligent insights into inactive guest users in your
organization. Customize the inactivity threshold depending on your organization’s needs,
narrow down the scope of guest users you want to monitor, and identify the guest users that
might be inactive. For more information, see: Monitor and clean up stale guest accounts using
access reviews.
An extra property is added to signInActivity API to display the last successful sign in time for a
specific user, regardless if the sign in was interactive or non-interactive. The data won't be
backfilled for this property, so you should expect to be returned only successful sign in data
starting on December 8, 2023.
General Availability - Autorollout of Conditional Access
policies
Type: New feature
Service category: Conditional Access
Product capability: Access Control
1. Multifactor authentication for admin portals: This policy covers privileged admin roles and
requires multifactor authentication when an admin signs into a Microsoft admin portal.
2. Multifactor authentication for per-user multifactor authentication users: This policy covers
users with per-user multifactor authentication and requires multifactor authentication for
all resources.
3. Multifactor authentication for high-risk sign-ins: This policy covers all users and requires
multifactor authentication and reauthentication for high-risk sign-ins.
Changes were made to custom security attribute audit logs for general availability that might
affect your daily operations. If you have been using custom security attribute audit logs during
the preview, there are the actions you must take before February 2024 to ensure your audit log
operations aren't disrupted. For more information, see: Custom security attribute audit logs.
We added the following new applications in our App gallery with Provisioning support. You can
now automate creating, updating, and deleting of user accounts for these newly integrated
apps:
Colloquial
Diffchecker
M-Files
XM Fax and XM SendSecure
Rootly
Simple In/Out
Team Today
YardiOne
For more information about how to better secure your organization by using automated user
account provisioning, see: What is app provisioning in Microsoft Entra ID?.
In November 2023, we added the following 10 new applications in our App gallery with
Federation support:
Citrix Cloud , Freight Audit, Movement by project44, Alohi, AMCS Fleet Maintenance , Real
Links Campaign App , Propely , Contentstack, Jasper AI, IANS Client Portal, Avionic Interface
Technologies LSMA , CultureHQ, Hone, Collector Systems, NetSfere, Spendwise , Stage and
Screen
You can also find the documentation of all the applications from here
https://aka.ms/AppsTutorial .
For listing your application in the Microsoft Entra ID app gallery, read the details here
https://aka.ms/AzureADAppRequest .
7 Note
In new updates from the previous version of the release notes: Microsoft Authenticator is
not yet FIPS 140 compliant on Android. Microsoft Authenticator on Android is currently
pending FIPS compliance certification to support our customers that may require FIPS
validated cryptography.
October 2023
My Sign Ins (My Sign-Ins (microsoft.com) ) now supports end users managing and changing
their passwords. Users are able to manage passwords in My Security Info and change their
password inline. If a user authenticates with a password and an MFA credential, they're able to
are able to change their password without entering their existing password.
For more information, see: Combined security information registration for Microsoft Entra
overview.
For more information, see: Govern on-premises Active Directory based apps (Kerberos) using
Microsoft Entra ID Governance
The Permissions Analytics Report (PAR) lists findings relating to permissions risks across
identities and resources in Permissions Management. The PAR is an integral part of the risk
assessment process where customers discover areas of highest risk in their cloud infrastructure.
This report can be directly viewed in the Permissions Management UI, downloaded in Excel
(XSLX) format, and exported as a PDF. The report is available for all supported cloud
environments: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform
(GCP).
The PAR PDF was redesigned to enhance usability, align with the product UX redesign effort,
and address various customer feature requests. You can download the PAR PDF for up to 10
authorization systems.
Several changes were made to the All Devices list since announcing public preview, including:
Windows MAM is the first step toward Microsoft management capabilities for unmanaged
Windows devices. This functionality comes at a critical time when we need to ensure the
Windows platform is on par with the simplicity and privacy promise we offer end users today
on the mobile platforms. End users can access company resources without needing the whole
device to be MDM managed.
For more information, see: Require an app protection policy on Windows devices.
Microsoft Entra ID is the new name for Azure Active Directory (Azure AD). The rename and new
product icon are now being deployed across experiences from Microsoft. Most updates are
complete by mid-November of this year. As previously announced, it's a new name change,
with no effect on deployments or daily work. There are no changes to capabilities, licensing,
terms of service, or support.
From October 15 to November 15, Azure AD emails previously sent from azure-
noreply@microsoft.com will start being sent from MSSecurity-noreply@microsoft.com. You
might need to update your Outlook rules to match this change.
Additionally, we update email content to remove all references of Azure AD where relevant,
and include an informational banner that announces this change.
Here are some resources to guide you rename your own product experiences or content where
necessary:
Effective November 15, 2023, end users will no longer be able to add password SSO Apps to
their gallery in My Apps. However, admins can still add password SSO apps following these
instructions. Password SSO apps previously added by end users remain available in My Apps.
The ability to create new tenants from the Microsoft Entra admin center allows users in your
organization to create test and demo tenants from your Microsoft Entra ID tenant, Learn more
about creating tenants. When used incorrectly this feature can allow the creation of tenants
that aren't managed or viewable by your organization. We recommend that you restrict this
capability so that only trusted admins can use this feature, Learn more about restricting
member users' default permissions. We also recommend you use the Microsoft Entra audit log
to monitor for the Directory Management: Create Company event that signals a new tenant
created by a user in your organization.
To further protect your organization, Microsoft is now limiting this functionality to only paid
customers. Customers on trial subscriptions are unable to create more tenants from the
Microsoft Entra admin center. Customers in this situation who need a new trial tenant can sign
up for a Free Azure Account .
General Availability - Users can't modify GPS location when
using location based access control
Type: Plan for change
Service category: Conditional Access
Product capability: User Authentication
In the November 2023 release of the Authenticator app, users who are modifying the location
of their device sees a denial message in the app when doing an LBAC authentication. Microsoft
ensures that users aren’t using older app versions to continue authenticating with a modified
location. Beginning January 2024, any users that are on Android Authenticator 6.2309.6329
version or prior and iOS Authenticator version 6.7.16 or prior are blocked from using LBAC. To
determine which users are using older versions of the Authenticator app, you can use our
MSGraph APIs.
Today, when users navigate to myaccess.microsoft.com, they land on a list of available access
packages in their organization. The new Overview page provides a more relevant place for
users to land. The Overview page points them to the tasks they need to complete and helps
familiarize users with how to complete tasks in My Access.
Admins can enable/disable the Overview page preview by signing into the Microsoft Entra
admin center and navigating to Entitlement management > Settings > Opt-in Preview Features
and locating My Access overview page in the table.
We've added the following new applications in our App gallery with Provisioning support. You
can now automate creating, updating, and deleting of user accounts for these newly integrated
apps:
Amazon Business
Bustle B2B Transport Systems
Canva
Cybozu
Forcepoint Cloud Security Gateway - User Authentication
Hypervault
Oneflow
For more information about how to better secure your organization by using automated user
account provisioning, see: What is app provisioning in Microsoft Entra ID?.
The MicrosoftGraphActivityLogs provides administrators full visibility into all HTTP requests
accessing your tenant’s resources through the Microsoft Graph API. These logs can be used to
find activity from compromised accounts, identify anomalous behavior, or investigate
application activity. For more information, see: Access Microsoft Graph activity logs (preview).
September 2023
We expand the existing FIDO2 authentication methods policy, and end user experiences, to
support this preview release. For your organization to opt in to this preview, you need to
enforce key restrictions to allow specified passkey providers in your FIDO2 policy. Learn more
about FIDO2 key restrictions here.
In addition, the existing end user sign-in option for Windows Hello and FIDO2 security keys get
indicated by “Face, fingerprint, PIN, or security key”. The term “passkey” will be mentioned in
the updated sign-in experience to be inclusive of passkey credentials presented from security
keys, mobile devices, and platform authenticators like Windows Hello.
With this release, you can now recover applications along with their original service principals,
eliminating the need for extensive reconfiguration and code changes (Learn more). It
significantly improves the application recovery story and addresses a long-standing customer
need. This change is beneficial to you on:
Faster Recovery: You can now recover their systems in a fraction of the time it used to
take, reducing downtime and minimizing disruptions.
Cost Savings: With quicker recovery, you can save on operational costs associated with
extended outages and labor-intensive recovery efforts.
Preserved Data: Previously lost data, such as SMAL configurations, is now retained,
ensuring a smoother transition back to normal operations.
Improved User Experience: Faster recovery times translate to improved user experience
and customer satisfaction, as applications are backed up and running swiftly.
We've added the following new applications in our App gallery with Provisioning support. You
can now automate creating, updating, and deleting of user accounts for these newly integrated
apps:
Datadog
Litmos
Postman
Recnice
For more information about how to better secure your organization by using automated user
account provisioning, see: What is app provisioning in Microsoft Entra ID?.
We're thrilled to announce that as part of the Windows 11 September moment, we're releasing
a new Web Sign-In experience that will expand the number of supported scenarios and greatly
improve security, reliability, performance, and overall end-to-end experience for our users.
Web Sign-In (WSI) is a credential provider on the Windows lock/sign-in screen for AADJ joined
devices that provide a web experience used for authentication and returns an auth token back
to the operating system to allow the user to unlock/sign-in to the machine.
Web Sign-In was initially intended to be used for a wide range of auth credential scenarios;
however, it was only previously released for limited scenarios such as: Simplified EDU Web
Sign-In and recovery flows via Temporary Access Password (TAP).
The underlying provider for Web Sign-In is rewritten from the ground up with security and
improved performance in mind. This release moves the Web Sign-in infrastructure from the
Cloud Host Experience (CHX) WebApp to a newly written sign in Web Host (LWH) for the
September moment. This release provides better security and reliability to support previous
EDU & TAP experiences and new workflows enabling using various Auth Methods to unlock/sig
in to the desktop.
When a Conditional Access policy targets the Microsoft Admin Portals cloud app, the policy is
enforced for tokens issued to application IDs of the following Microsoft administrative portals:
Azure portal
Exchange admin center
Microsoft 365 admin center
Microsoft 365 Defender portal
Microsoft Entra admin center
Microsoft Intune admin center
Microsoft Purview compliance portal
August 2023
Tenant Restrictions V2 (TRv2) is now generally available for authentication plane via proxy.
TRv2 allows organizations to enable safe and productive cross-company collaboration while
containing data exfiltration risk. With TRv2, you can control what external tenants your users
can access from your devices or network using externally issued identities and provide granular
access control on a per org, user, group, and application basis.
TRv2 uses the cross-tenant access policy, and offers both authentication and data plane
protection. It enforces policies during user authentication, and on data plane access with
Exchange Online, SharePoint Online, Teams, and MSGraph. While the data plane support with
Windows GPO and Global Secure Access is still in public preview, authentication plane support
with proxy is now generally available.
Cross-tenant access settings can be managed with custom roles defined by your organization.
This capability enables you to define your own finely scoped roles to manage cross-tenant
access settings instead of using one of the built-in roles for management. Learn more about
creating your own custom roles.
You can also now protect privileged actions inside of cross-tenant access settings using
Conditional Access. For example, you can require MFA before allowing changes to default
settings for B2B collaboration. Learn more about Protected actions.
Strictly enforce Conditional Access policies in real-time using Continuous Access Evaluation.
Enable services like Microsoft Graph, Exchange Online, and SharePoint Online to block access
requests from disallowed locations as part of a layered defense against token replay and other
unauthorized access. For more information, see blog: Public Preview: Strictly Enforce Location
Policies with Continuous Access Evaluation and documentation: Strictly enforce location
policies using continuous access evaluation (preview).
Airbase
Airtable
Cleanmail Swiss
Informacast
Kintone
O'reilly learning platform
Tailscale
Tanium SSO
Vbrick Rev Cloud
Xledger
For more information about how to better secure your organization by using automated user
account provisioning, see: What is app provisioning in Microsoft Entra ID?.
Real-time enforcement of risk events, revocation events, and Conditional Access location
policies is now generally available for workload identities. Service principals on line of business
(LOB) applications are now protected on access requests to Microsoft Graph. For more
information, see: Continuous access evaluation for workload identities (preview).
Frequently asked questions about
Microsoft Entra ID
Microsoft Entra ID is a cloud-based identity and access management solution. It's a directory
and identity management service that operates in the cloud and offers authentication and
authorization services to various Microsoft services, such as Microsoft 365, Dynamics 365, and
Microsoft Azure.
For more information, see How Azure subscriptions are associated with Microsoft Entra ID.
All users who are set up to use Microsoft services are defined as user accounts in one or more
Microsoft Entra instances, providing these accounts access to Microsoft Entra ID.
For more information, see Microsoft Entra ID Plans & Pricing
Microsoft Entra paid services, such as Enterprise Mobility + Security (Microsoft Enterprise
Mobility + Security) complement other Microsoft services like Microsoft 365, with
comprehensive enterprise-scale development, management, and security solutions.
If others need to sign in and access services by using the same subscription, you can assign
them the appropriate built-in role. For more information, see Assign Azure roles using the
Azure portal.
By default, the user who creates a Microsoft Entra tenant is automatically assigned the Global
Administrator role. This user has access to all Microsoft Entra directory features. Microsoft Entra
ID has a different set of administrator roles to manage the directory and identity-related
features. These administrators have access to various features in the Azure portal. The
administrator's role determines what they can do, like create or edit users, assign
administrative roles to others, reset user passwords, manage user licenses, or manage domains.
For more information, see Assign a user to administrator roles in Microsoft Entra ID and
Assigning administrator roles in Microsoft Entra ID.
*.entra.microsoft.com
*.entra.microsoft.us
*.entra.microsoftonline.cn
For more information, see Using Microsoft Entra application proxy to publish on-premises apps
for remote users. Additional URLs that you should include are listed in the article Allow the
Azure portal URLs on your firewall or proxy server.
For more information, see Integrating your on-premises identities with Microsoft Entra ID.
For more information, see Integrating your on-premises identities with Microsoft Entra ID.
For more information, see Monitor your on-premises identity infrastructure and
synchronization services in the cloud.
This example scenario doesn't require the on-premises password to be tracked in Microsoft
Entra. This is because you don't need to synchronize your Active Directory passwords to
Microsoft Entra ID to enable write-back. In a federated environment, Microsoft Entra single
sign-on (SSO) relies on the on-premises directory to authenticate the user.
How long does it take for a password to be written
back to Active Directory on-premises?
Password write-back operates in real time.
For more answers to password-related questions, see Password management frequently asked
questions.
For Microsoft 365 users, your admin can reset the password by using the steps outlined in
Reset user passwords .
For Microsoft Entra accounts, admins can reset passwords by using one of the following:
For a complete list of the pre-integrated applications, see the Azure Marketplace .
For more information, see Single sign-on SAML protocol and Develop and plan provisioning
for a SCIM endpoint.
For more information, see Identity fundamentals and Single sign-on for applications in
Microsoft Entra ID.
For more information, see How to provide secure remote access to on-premises applications.
How do I require multifactor authentication for users
who access a particular application?
With Microsoft Entra Conditional Access, you can assign a unique access policy for each
application. In your policy, you can require multifactor authentication always, or when users
aren't connected to the local network.
For more information, see Securing access to Microsoft 365 and other apps connected to
Microsoft Entra ID.
For more information, see What is app provisioning in Microsoft Entra ID?.
For more information, see Configure secure LDAP for a Microsoft Entra Domain Services
managed domain.
CSS template reference guide
Article • 12/01/2023
Configuring your company branding for the user sign-in process provides a seamless
experience in your applications that use Microsoft Entra ID as the identity and access
management service. Use this CSS reference guide if you're using the CSS template as
part of the customize company branding process.
HTML selectors
The following CSS styles become the default body and link styles for the whole page.
Applying styles for other links or text override CSS selectors.
background in the vertical split template that contains both a sign-in box and a
background (This style is also known as the Active Directory Federation Services
(ADFS) template.)
Feedback
Was this page helpful? Yes No
Bulk operations in Microsoft Entra ID enable you to perform actions on multiple entities,
such as users, groups, and devices, at once. These actions can include creating, deleting,
or updating multiple records in a single operation. Bulk operations can greatly
streamline administrative tasks and improve efficiency.
Bulk operations in the Microsoft Entra admin portal could time out and fail on large
tenants. This limitation is a known issue due to scaling limitations.
7 Note
When performing bulk operations, such as import or create, you may encounter a
problem if the bulk operation doesn't complete within the hour. To work around
this issue, we recommend splitting the number of records processed per batch. For
example, before starting an export you could limit the result set by filtering on a
group type or user name to reduce the size of the results. By refining your filters,
essentially you are limiting the data returned by the bulk operation.
The following PowerShell code examples are for bulk operations related to:
Users
Groups
Devices
Users
Create users
Azure PowerShell
7 Note
Make sure your CSV file contains the necessary columns (for example; DisplayName ,
UserPrincipalName , and so on). Also, adjust the script to match the actual column
Delete users
Azure PowerShell
7 Note
Make sure your CSV file contains the necessary columns (for example,
UserPrincipalName ). Also, adjust the script to match the actual column names in
your CSV file.
Groups
Import-Module Microsoft.Graph.Groups
Import-Module Microsoft.Graph.Groups
# Set the group ID of the group whose members you want to download
$groupId = "your_group_id"
Import-Module Microsoft.Graph.Groups
Import-Module Microsoft.Graph.Groups
Devices
Import-Module Microsoft.Graph
Feedback
Was this page helpful? Yes No
Microsoft renamed Azure Active Directory (Azure AD) to Microsoft Entra ID to communicate
the multicloud, multiplatform functionality of the products, alleviate confusion with Windows
Server Active Directory, and unify the Microsoft Entra product family.
You can continue to use familiar Azure AD capabilities that you can access through the Azure
portal, Microsoft 365 admin center, and the Microsoft Entra admin center .
All features and capabilities are still available in the product. Licensing, terms, service-level
agreements, product certifications, support and pricing remain the same.
To make the transition seamless, all existing login URLs, APIs, PowerShell cmdlets, and
Microsoft Authentication Libraries (MSAL) stay the same, as do developer experiences and
tooling.
Service plan display names changed on October 1, 2023. Microsoft Entra ID Free, Microsoft
Entra ID P1, and Microsoft Entra ID P2 are the new names of standalone offers, and all
capabilities included in the current Azure AD plans remain the same. Microsoft Entra ID –
previously known as Azure AD – continues to be included in Microsoft 365 licensing plans,
including Microsoft 365 E3 and Microsoft 365 E5. Details on pricing and what’s included are
available on the pricing and free trials page .
For self-service support, look for the topic path of Microsoft Entra or Azure Active
Directory/Microsoft Entra ID .
The product name and icons are changing, and features are now branded as Microsoft Entra
instead of Azure AD. If you're updating the name to Microsoft Entra ID in your own content or
experiences, see How to: Rename Azure AD.
Product name
Microsoft Entra ID is the new name for Azure AD. The names Azure Active Directory, Azure AD,
and AAD are replaced with Microsoft Entra ID.
Microsoft Entra is the name for the product family of identity and network access
solutions.
Microsoft Entra ID is one of the products within that family.
Acronym usage isn't encouraged, but if you must replace AAD with an acronym due to
space limitations, use ME-ID.
Logo/icon
Azure AD product icons are replaced with the Microsoft Entra ID product icon.
ノ Expand table
You can download the Microsoft Entra ID icon here: Microsoft Entra architecture icons
Feature names
Capabilities or services formerly known as "Azure Active Directory <feature name>" or "Azure
AD <feature name>" are branded as Microsoft Entra product family features. This change is
done across our portfolio to avoid naming length and complexity, and because many features
work across all the products. For example:
ノ Expand table
Active Directory Windows Server Active Directory, commonly known as Active Directory, and
related features and services associated with Active Directory aren't branded with
• Windows Server Microsoft Entra.
Active Directory
• Active Directory
Federation Services
(AD FS)
• Active Directory
Domain Services (AD
DS)
• Active Directory
• Any Active Directory
feature(s)
Authentication library Azure Active Directory Authentication Library (ADAL) is deprecated. While
existing apps that use ADAL continue to work, Microsoft no longer releases
• Azure AD security fixes on ADAL. Migrate applications to the Microsoft Authentication
Authentication Library (MSAL) to avoid putting your app's security at risk.
Library (ADAL)
• Microsoft Microsoft Authentication Library (MSAL) - Provides security tokens from the
Authentication Microsoft identity platform to authenticate users and access secured web APIs to
Library (MSAL) provide secure access to Microsoft Graph, other Microsoft APIs, third-party web
APIs, or your own web API.
B2C Azure Active Directory B2C isn't being renamed. We're continuing to invest in
security, availability, and reliability in Azure AD B2C and our next-generation
• Azure Active solution for external identities, Microsoft Entra External ID.
Directory B2C
• Azure AD B2C
Graph Azure Active Directory (Azure AD) Graph is deprecated. There are no further
investments in Azure AD Graph and Azure AD Graph APIs have no SLA or
• Azure Active maintenance commitment beyond security-related fixes. Investments in new
Directory Graph features and functionalities will only be made in Microsoft Graph.
Correct terminology Details
• Azure AD Graph
• Microsoft Graph Microsoft Graph - Grants programmatic access to organization, user, and
application data stored in Microsoft Entra ID.
PowerShell Azure AD PowerShell for Graph is planned for deprecation on March 30, 2024.
For more info on the deprecation plans, see the deprecation update. We
• Azure Active encourage you to migrate to Microsoft Graph PowerShell, which is the
Directory PowerShell recommended module for interacting with Azure AD.
• Azure AD
PowerShell Microsoft Graph PowerShell - Acts as an API wrapper for the Microsoft Graph
• Microsoft Graph APIs and helps administer every Microsoft Entra ID feature that has an API in
PowerShell Microsoft Graph.
Accounts For end user sign-ins and account experiences, follow guidance for work and
school accounts in Sign in with Microsoft branding guidelines.
• Microsoft account
• Work or school
account
Microsoft identity The Microsoft identity platform encompasses all our identity and access
platform developer assets. It continues to provide the resources to help you build
applications that your users and customers can sign in to using their Microsoft
identities or social accounts.
DirSync and Azure AD Sync aren't supported and no longer work. If you're still
• Azure AD Sync using DirSync or Azure AD Sync, you must upgrade to Microsoft Entra Connect to
• DirSync resume your sync process. For more info, see Microsoft Entra Connect.
The Microsoft Entra ID name more accurately represents the multicloud and multiplatform
functionality of the product, alleviates confusion with the on-premises identity solution (Active
Directory), and creates a path to deliver a simpler way to protect every identity and secure
every access point as we expand the Microsoft Entra identity and network access portfolio.
ノ Expand table
Microsoft Entra ID (previously known as Microsoft Entra Verified Microsoft Entra Internet
Azure AD) ID Access
What are the display names for service plans and SKUs?
Licensing, pricing, and functionality aren't changing. Display names were updated October 1,
2023 as follows.
ノ Expand table
Old display name for service plan New display name for service plan
Old display name for product SKU New display name for product SKU
Old display name for service plan New display name for service plan
Azure Active Directory Premium P1 for students Microsoft Entra ID P1 for students
Azure Active Directory Premium P1 for faculty Microsoft Entra ID P1 for faculty
Azure Active Directory Premium P1 for government Microsoft Entra ID P1 for government
Azure Active Directory Premium P2 for students Microsoft Entra ID P2 for students
Azure Active Directory Premium P2 for faculty Microsoft Entra ID P2 for faculty
Azure Active Directory Premium P2 for government Microsoft Entra ID P2 for government
The name for Active Directory remains unchanged. Based on extensive feedback we received
about Microsoft Entra ID as the new name for Azure Active Directory, for many customers the
rename helps to better differentiate between the on-premises (Active Directory) and
multicloud identity (Microsoft Entra ID) solutions.
Many technical components either have low visibility to customers (for example, sign-in URLs),
or usually aren't branded, like APIs.
Microsoft identity platform encompasses all our identity and access developer assets. It
continues to provide the resources to help you build applications that your users and
customers can sign in to using their Microsoft identities or social accounts.
For a detailed list of names that aren't changing, see What names aren't changing?.
In the Azure AD PowerShell for Graph module, AzureAD is in the name of almost all the
cmdlets. These won't change, and you can continue to use these same cmdlets now that the
official product name is Microsoft Entra ID.
Microsoft Graph PowerShell cmdlets aren't branded with Azure AD. We encourage you to plan
your migration from Azure AD PowerShell to Microsoft Graph PowerShell, which is the
recommended module for interacting with Microsoft Entra ID in the future.
Banners, alerts, and message center posts notified users of the name change. The change was
also displayed on the tenant overview page in the portals including Azure, Microsoft 365, and
Microsoft Entra admin center, and Microsoft Learn.
You're not required to use the Microsoft Entra attribution with features. Only use if needed to
clarify whether you're talking about a concept versus the feature in a specific product, or when
comparing a Microsoft Entra feature with a competing feature.
Only official product names are capitalized, plus Conditional Access and My * apps.
ノ Expand table
Azure AD Workload
Identities
Features and Azure AD access token Microsoft Entra access token authentication
functionality authentication
Azure Active Directory access
token authentication
Category Old terminology Correct name as of July 2023
Azure AD admin center Replace with Microsoft Entra admin center and
Azure Active Directory admin update link to entra.microsoft.com
center
Azure AD OAuth and OpenID Microsoft Entra ID OAuth and OpenID Connect
Connect
Azure Active Directory OAuth
and OpenID Connect
service principal
Managed identities in Azure Managed identities in Microsoft Entra for Azure SQL
AD for Azure SQL
Revision history
ノ Expand table
October 12,
2023 •Updated statement about availability of license plans.
• Added three other terms in the glossary: "Azure AD connector", "Azure AD license",
and "Azure AD Premium"
September 15, Added a link to the how-to article on renaming Azure AD, updated the description for
2023 Azure AD B2C, and added more info about why the name Azure AD is changing.
August 29,
2023 • In the glossary, corrected the entry for "Azure AD activity logs" to separate "Azure AD
audit log", which is a distinct type of activity log.
• Added Azure AD Sync and DirSync to the "What names aren't changing" section.
Date Change description
August 18,
2023 • Updated the article to include a new section, "Glossary of updated terminology",
which includes the old and new terminology.
• Updated info and added link to usage of the Microsoft Entra ID icon, and updates to
verbiage in some sections.
July 11, 2023 Published the original guidance as part of the Microsoft Entra moment and related
announcement .
Next steps
How to: Rename Azure AD
Get started using Microsoft Entra ID at the Microsoft Entra admin center
Learn more about the Microsoft Entra family with content from Microsoft Learn
Microsoft Entra ID and data residency
Article • 01/09/2025
Microsoft Entra ID is an Identity as a Service (IDaaS) solution that stores and manages
identity and access data in the cloud. You can use the data to enable and manage access
to cloud services, achieve mobility scenarios, and secure your organization. An instance
of the Microsoft Entra ID service, called a tenant, is an isolated set of directory object
data that the customer provisions and owns.
7 Note
Core Store
The Core Store is made up of tenants stored in scale units, each of which contains
multiple tenants. Update or retrieval data operations in the Microsoft Entra Core Store
relate to a single tenant, based on the user's security token, which achieves tenant
isolation. Scale units are assigned to a geo-location. Each geo-location uses two or more
Azure regions to store the data. In each Azure region, a scale unit data is replicated in
the physical datacenters for resiliency and performance, as described in the Microsoft
Entra architecture.
For more information on the Core Store, see Microsoft Entra Core Store Scale Units .
For more information on Azure regions, see Azure geographies .
Public
China*
US government*
The location selected during tenant creation will map to one of the following geo-
locations:
Australia*
Asia/Pacific
Europe, Middle East, and Africa (EMEA)
Japan*
North America
Worldwide
Microsoft Entra ID handles Core Store data based on usability, performance, residency
or other requirements based on geo-location. Microsoft Entra ID replicates each tenant
through its scale unit, across datacenters, based on the following criteria:
Microsoft Entra Core Store data, stored in datacenters closest to the tenant-
residency location, to reduce latency and provide fast user sign-in times
Microsoft Entra Core Store data stored in geographically isolated datacenters to
assure availability during unforeseen single-datacenter, catastrophic events
Compliance with data residency, or other requirements, for specific customers and
geo-locations
ノ Expand table
Public geo Australia (1), At rest, in the Operated by Create the tenant
located North America, target location. Microsoft. Microsoft in the sign-up
EMEA, Japan (1), Exceptions by datacenter experience.
Asia/Pacific component service personnel must pass Choose the
or feature, listed in a background check. location for data
the next section residency.
Model Locations Data location Operations Put a tenant in
personnel this model
Table references:
(1) These locations aren't currently available for external tenants. (2) Data custodians:
datacenters in the US government cloud are operated by Microsoft. In China, Microsoft
Entra ID is operated through a partnership with 21Vianet.
Learn more:
Customer data storage and processing for European customers in Microsoft Entra
ID
Customer data storage for Australian and New Zealand customers in Microsoft
Entra ID and Identity data storage for Australian and New Zealand customers in
Microsoft Entra ID
Customer data storage for Japan customers in Microsoft Entra ID
Microsoft Trust Center - Where your data is located
7 Note
To understand service data location for other services beyond Microsoft Entra ID,
such as Exchange Online, or Skype for Business, refer to the corresponding service
documentation and the Trust Center .
Microsoft Entra components and data storage location
ノ Expand table
Microsoft Entra This service is stateless. The data for authentication is in the In geo
authentication Microsoft Entra Core Store. It has no directory data. Microsoft location
Service Entra authentication Service generates log data in Azure
Storage, and in the datacenter where the service instance runs.
When users attempt to authenticate using Microsoft Entra ID,
they're routed to an instance in the geographically nearest
datacenter that is part of its Microsoft Entra logical region.
Microsoft Entra User and management experiences: The Microsoft Entra In geo
identity and management experience is stateless and has no directory data. location
Access It generates log and usage data stored in Azure Tables storage.
Management The user experience is like the Azure portal.
(IAM) Services Identity management business logic and reporting services:
These services have locally cached data storage for groups and
users. The services generate log and usage data that goes to
Azure Tables storage, Azure SQL, and in Microsoft Elastic
Search reporting services.
Microsoft Entra See regions where Microsoft Entra Domain Services is In geo
Domain Services published on Products available by region . The service holds location
system metadata globally in Azure Tables, and it contains no
personal data.
Microsoft Entra Microsoft Entra Connect Health generates alerts and reports in In geo
Connect Health Azure Tables storage and blob storage. location
Microsoft Entra Azure Tables storage holds rule definitions for dynamic In geo
dynamic membership groups. location
membership
groups, Microsoft
Entra self-service
group
management
Microsoft Entra Description Data
component storage
location
Microsoft Entra Microsoft Entra application proxy stores metadata about the In geo
application proxy tenant, connector machines, and configuration data in Azure location
SQL.
Microsoft Entra During initial configuration, Microsoft Entra Connect generates In geo
password an asymmetric keypair, using the Rivest–Shamir–Adleman (RSA) location
writeback in cryptosystem. It then sends the public key to the self-service
Microsoft Entra password reset (SSPR) cloud service, which performs two
Connect operations:
1. Creates two Azure Service Bus relays for the Microsoft Entra
Connect on-premises service to communicate securely with the
SSPR service
2. Generates an Advanced Encryption Standard (AES) key, K1
- The AES key (K1) that encrypts the reset payload, or change
requests from the SSPR service to Microsoft Entra Connect, via
the ServiceBus pipeline
- The private key, from the asymmetric key pair that decrypts
the passwords, in reset or change request payloads
- The ServiceBus listener keys
The AES key (K1) and the asymmetric keypair rotate a minimum
of every 180 days, a duration you can change during certain
onboarding or offboarding configuration events. An example is
a customer disables and reenables password writeback, which
might occur during component upgrade during service and
Microsoft Entra Description Data
component storage
location
maintenance.
The writeback keys and data stored in the Microsoft Entra
Connect database are encrypted by data protection application
programming interfaces (DPAPI) (CALG_AES_256). The result is
the master ADSync encryption key stored in the Windows
Credential Vault in the context of the ADSync on-premises
service account. The Windows Credential Vault supplies
automatic secret reencryption as the password for the service
account changes. To reset the service account password
invalidates secrets in the Windows Credential Vault for the
service account. Manual changes to a new service account
might invalidate the stored secrets.
By default, the ADSync service runs in the context of a virtual
service account. The account might be customized during
installation to a least-privileged domain service account, a
managed service account (Microsoft account), or a group
managed service account (gMSA). While virtual and managed
service accounts have automatic password rotation, customers
manage password rotation for a custom provisioned domain
account. As noted, to reset the password causes loss of stored
secrets.
Microsoft Entra Microsoft Entra Device Registration Service has computer and In geo
Device device lifecycle management in the directory, which enable location
Registration scenarios such as device-state Conditional Access, and mobile
Service device management.
Microsoft Entra Microsoft Entra provisioning creates, removes, and updates In geo
provisioning users in systems, such as software as service (software as a location
service (SaaS)) applications. It manages user creation in
Microsoft Entra ID and on-premises Microsoft Windows Server
Active Directory from cloud HR sources, like Workday. The
service stores its configuration in an Azure Cosmos DB
instance, which stores the group membership data for the user
directory it keeps. Azure Cosmos DB replicates the database to
multiple datacenters in the same region as the tenant, which
isolates the data, according to the Microsoft Entra cloud
solution model. Replication creates high availability and
multiple reading and writing endpoints. Azure Cosmos DB has
encryption on the database information, and the encryption
keys are stored in the secrets storage for Microsoft.
Microsoft Entra Microsoft Entra B2B collaboration has no directory data. Users In geo
business-to- and other directory objects in a B2B relationship, with another location
business (B2B) tenant, result in user data copied in other tenants, which might
collaboration have data residency implications.
Microsoft Entra Description Data
component storage
location
Microsoft Entra ID Microsoft Entra ID Protection uses real-time user log-in data, In geo
Protection with multiple signals from company and industry sources, to location
feed its machine-learning systems that detect anomalous
logins. Personal data is scrubbed from real-time log-in data
before it's passed to the machine learning system. The
remaining log-in data identifies potentially risky usernames and
logins. After analysis, the data goes to Microsoft reporting
systems. Risky logins and usernames appear in reporting for
Administrators.
Related resources
For more information on data residency in Microsoft Cloud offerings, see the following
articles:
Next steps
Microsoft Entra ID and data residency (You're here)
Data operational considerations
Data protection considerations
Feedback
Was this page helpful? Yes No
In this article, learn about data operational considerations for your configuration. There's
information about how log files and other features work in relation to Microsoft Entra
ID, such as usage data and operator security. You'll learn about physical security
considerations in addition to guidance on how the Microsoft Entra team defines
deployments and change.
Log files
Microsoft Entra ID generates log files for auditing, investigation, and debugging for
actions and events in the service. Log files might contain data about users, devices, and
Microsoft Entra configuration, for instance policies, apps, and groups. Log files are
created and stored in Azure Storage in the datacenter where the Microsoft Entra service
runs.
Log files are used for local debugging, security, usage analysis, system-health
monitoring, and service-wide analysis. These logs are copied over a Transport Layer
Security (TLS) connection to Microsoft reporting machine learning systems, which are in
Microsoft-owned datacenters in the continental United States.
Usage data
Usage data is metadata generated by the Microsoft Entra service that indicates how the
service is being used. This metadata is used to generate administrator- and user-facing
reports. The Microsoft Entra engineering team uses the metadata to evaluate system
usage and identify opportunities to improve the service. Generally, this data is written to
log files, but in some cases, is collected by our service monitoring and reporting
systems.
Operator security
Access to Microsoft Entra ID by Microsoft personnel, contractors, and vendors (system
admins) is highly restricted. Wherever possible, human intervention is replaced by an
automated, tool-based process, including routine functions such as deployment,
debugging, diagnostic collection, and restarting services.
Administrator access is limited to a subset of qualified engineers and requires
completion of an authentication challenge with phishing-resistant credentials. System
access and update functions are assigned to roles managed by the Microsoft just-in-
time (JIT) privileged-access management system. System administrators request
elevation using the JIT system, which routes the request for manual or automated
approval. Upon approval, JIT elevates the account. Requests for elevation, approval,
elevation into roles, and removal from roles are logged for future debugging or
investigations.
Microsoft personnel can execute operations only from a secure access workstation,
which uses an internal isolated strong authentication identity platform. Access to other
Microsoft identity systems doesn't grant access to the security access workstation. The
identity platform runs separately from other Microsoft identity systems.
Physical security
Physical access to servers that comprise the Microsoft Entra service, and access to
Microsoft Entra back-end systems, is restricted by Azure facility, premises, and physical
security. Microsoft Entra customers have no access to physical assets or locations,
therefore they can't bypass the logical role-based access control (RBAC) policy checks.
Personnel with operator access are authorized to run approved workflows for
maintenance.
Resources
Microsoft Service Trust Documents
Microsoft Azure Trusted Cloud
Office 365 datacenters
Next steps
Microsoft Entra ID and data residency
Data operational considerations (You're here)
Data protection considerations
Data protection considerations
Article • 10/23/2023
The following diagram illustrates how services store and retrieve Microsoft Entra object
data through a role-based access control (RBAC) authorization layer. This layer calls the
internal directory data access layer, ensuring the user's data request is permitted:
Microsoft Entra External Interfaces Access: Microsoft Entra external interface helps
prevent data leakage by using RBAC. When a security principal, such as a user, makes an
access request to read information through Microsoft Entra ID interfaces, a security
token must accompany the request. The token contains claims about the principal
making the request.
The security tokens are issued by the Microsoft Entra authentication Services.
Information about the user's existence, enabled state, and role is used by the
authorization system to decide whether the requested access to the target tenant is
authorized for this user in this session.
Prevent data leakage and access across tenants: Data belonging to Tenant 1 can't
be obtained by users in Tenant 2 without explicit authorization by Tenant 1.
Resource access isolation across tenants: Operations performed by Tenant 1 can't
affect access to resources for Tenant 2.
Tenant isolation
The following information outlines tenant isolation.
The service secures tenants using RBAC policy to ensure data isolation.
To enable access to a tenant, a principal, for example a user or application, needs
to be able to authenticate against Microsoft Entra ID to obtain context and has
explicit permissions defined in the tenant. If a principal isn't authorized in the
tenant, the resulting token won't carry permissions, and the RBAC system rejects
requests in this context.
RBAC ensures access to a tenant is performed by a security principal authorized in
the tenant. Access across tenants is possible when a tenant administrator creates a
security principal representation in the same tenant (for example, provisioning a
guest user account using B2B collaboration), or when a tenant administrator
creates a policy to enable a trust relationship with another tenant. For example, a
cross-tenant access policy to enable B2B Direct Connect. Each tenant is an isolation
boundary; existence in one tenant doesn't equate existence in another tenant
unless the administrator allows it.
Microsoft Entra data for multiple tenants is stored in the same physical server and
drive for a given partition. Isolation is ensured because access to the data is
protected by the RBAC authorization system.
A customer application can't access Microsoft Entra ID without needed
authentication. The request is rejected if not accompanied by credentials as part of
the initial connection negotiation process. This dynamic prevents unauthorized
access to a tenant by neighboring tenants. Only user credential's token, or Security
Assertion Markup Language (SAML) token, is brokered with a federated trust.
Therefore, it's validated by Microsoft Entra ID, based on the shared keys configured
by the application owner.
Because there's no application component that can execute from the Core Store,
it's not possible for one tenant to forcibly breach the integrity of a neighboring
tenant.
Data security
Encryption in Transit: To assure data security, directory data in Microsoft Entra ID is
signed and encrypted while in transit between datacenters in a scale unit. The data is
encrypted and unencrypted by the Microsoft Entra Core Store tier, which resides in
secured server hosting areas of the associated Microsoft datacenters.
Customer-facing web services are secured with the Transport Layer Security (TLS)
protocol.
Secret Storage: Microsoft Entra service back-end uses encryption to store sensitive
material for service use, such as certificates, keys, credentials, and hashes using
Microsoft proprietary technology. The store used depends on the service, the operation,
the scope of the secret (user-wide or tenant-wide), and other requirements.
These stores are operated by a security-focused group via established automation and
workflows, including certificate request, renewal, revocation, and destruction.
For more information about Secret encryption at rest, see the following table.
Algorithms: The following table lists the minimum cryptography algorithms used by
Microsoft Entra components. As a cloud service, Microsoft reassesses and improves the
cryptography, based on security research findings, internal security reviews, key strength
against hardware evolution, and so on.
ノ Expand table
Password hash sync Hash: Password Key Derivation Function 2 (PBKDF2), using
Cloud account passwords hash-based message authentication code (HMAC)-SHA256 @
1,000 iterations
Data/scenario Cryptography algorithm
Resources
Microsoft Service Trust Documents
Microsoft Azure Trust Center
Recover from deletions in Microsoft Entra ID
Next steps
Microsoft Entra ID and data residency
Data operational considerations
Data protection considerations (You're here)
Customer data storage and processing
for European customers in Microsoft
Entra ID
Article • 01/07/2025
Microsoft Entra ID stores customer data in a geographic location based on how a tenant
was created and provisioned. The following list provides information about how the
location is defined:
The following sections provide information about customer data that doesn't meet the
EU Data Residency or EU Data Boundary commitments.
EU Data Residency:
Reason for customer data egress - A few of the tenants are stored outside of the
EU location due one of the following reasons:
The tenants were initially created with a country code that is NOT in Europe and
later the tenant country code was changed to the one in Europe. The Microsoft
Entra directory data location is decided during the tenant creation time and not
changed when the country code for the tenant is updated. Starting March 2019,
Microsoft has blocked updating the country code on a tenant to avoid such
confusion.
There are 13 country codes (Countries include: Azerbaijan, Bahrain, Israel,
Jordan, Kazakhstan, Kuwait, Lebanon, Oman, Pakistan, Qatar, Saudi Arabia,
Türkiye, UAE) that were mapped to Asia region until 2013 and later mapped to
Europe. Tenants that were created before July 2013 from this country code are
provisioned in Asia instead of Europe.
There are seven country codes (Countries include: Armenia, Georgia, Iraq,
Kyrgyzstan, Tajikistan, Turkmenistan, Uzbekistan) that were mapped to Asia
region until 2017 and later mapped to Europe. Tenants that were created before
February 2017 from this country code are provisioned in Asia instead of Europe.
Types of customer data being egressed - User and device account data, and
service configuration (application, policy, and group).
EU Data Boundary:
See more information on Microsoft Entra temporary partial customer data transfers from
the EU Data Boundary Services that temporarily transfer a subset of customer data out
of the EU Data Boundary.
EU Data Residency:
Microsoft Entra ID: When an IP Address or phone number is determined to be used in
fraudulent activities, they're published globally to block access from any workloads
using them.
EU Data Boundary:
See more information on Microsoft Entra permanent partial customer data transfers
from the EU Data Boundary Services that will permanently transfer a subset of customer
data out of the EU Data Boundary.
Other considerations
Some services offer optional features. In some cases, you need a subscription to use
them. As a customer administrator, you can choose to turn these features on or off for
your service accounts. If made available and used by a customer's users, these
capabilities will result in data transfers out of Europe as described in the following
sections in this article.
See more information on optional service capabilities that transfer customer data out of
the EU Data Boundary Optional service capabilities that transfer customer data out of
the EU Data Boundary.
Next steps
For more information about Microsoft services' data residency, see the Where your data
is located section of the Microsoft Trust Center .
Feedback
Was this page helpful? Yes No
Microsoft Entra ID stores identity data in a location chosen based on the address
provided by your organization when subscribing to a Microsoft service like Microsoft
365 or Azure. For information on where your Identity Customer Data is stored, you can
review the Microsoft Trust center section titled Where is your data located? .
7 Note
Services and applications that integrate with Microsoft Entra ID have access to
Identity Customer Data. Evaluate each service and application you use. Determine
how that specific service and application process identity data, and whether they
meet your company's data storage requirements.
For customers who provided an address in Australia or New Zealand, Microsoft Entra ID
keeps identity data for these services within Australian datacenters:
All other Microsoft Entra services store customer data in global datacenters.
Next steps
For more information about Multifactor authentication, see these articles:
Microsoft Entra ID stores identity data in a location chosen based on the address
provided by your organization when subscribing to a Microsoft service like Microsoft
365 or Azure. Microsoft Online services include Microsoft 365 and Azure.
For information about where Microsoft Entra ID and other Microsoft services' data is
located, see the Where your data is located section of the Microsoft Trust Center.
From February 26, 2020, Microsoft began storing Microsoft Entra ID's Customer Data for
new tenants with an Australian or New Zealand billing address within the Australian
datacenters.
Additionally, certain Microsoft Entra features don't yet support storage of Customer
Data in Australia. Go to the Microsoft global datacenters map for information specific
to your region. For example, Microsoft Entra multifactor authentication stores Customer
Data in the US and processes it globally. For more information, see Data residency and
customer data for Microsoft Entra multifactor authentication.
7 Note
Microsoft Entra ID stores its Customer Data in a geographical location based on the
country/region you provided when you signed up for a Microsoft Online service.
Microsoft Online services include Microsoft 365 and Azure.
For information about where Microsoft Entra ID and other Microsoft services' data is
located, see the Where your data is located section of the Microsoft Trust Center.
Additionally, certain Microsoft Entra features do not yet support storage of Customer
Data in Japan. For example, Microsoft Entra multifactor authentication stores Customer
Data in the US and processes it globally. For more information, see Data residency and
customer data for Microsoft Entra multifactor authentication.
7 Note
Feedback
Was this page helpful? Yes No
Provide product feedback
Compare Active Directory to Microsoft
Entra ID
Article • 03/08/2024
Microsoft Entra ID is the next evolution of identity and access management solutions for
the cloud. Microsoft introduced Active Directory Domain Services in Windows 2000 to
give organizations the ability to manage multiple on-premises infrastructure
components and systems using a single identity per user.
Microsoft Entra ID takes this approach to the next level by providing organizations with
an Identity as a Service (IDaaS) solution for all their apps across cloud and on-premises.
Most IT administrators are familiar with Active Directory Domain Services concepts. The
following table outlines the differences and similarities between Active Directory
concepts and Microsoft Entra ID.
ノ Expand table
Users
Entitlement Administrators make users Groups are also available in Microsoft Entra
management members of groups. App and ID and administrators can also use groups
and groups resource owners then give to grant permissions to resources. In
groups access to apps or Microsoft Entra ID, administrators can
resources. assign membership to groups manually or
use a query to dynamically include users to
a group.
Administrators can use Entitlement
management in Microsoft Entra ID to give
users access to a collection of apps and
resources using workflows and, if
necessary, time-based criteria.
Apps
Infrastructure Active Directory forms the basis In a new cloud world, Microsoft Entra ID, is
apps for many infrastructure on- the new control plane for accessing apps
premises components, for versus relying on networking controls.
example, DNS, Dynamic Host When users authenticate, Conditional
Configuration Protocol (DHCP), Access controls which users have access to
Internet Protocol Security which apps under required conditions.
(IPSec), WiFi, NPS, and VPN
access
Concept Windows Server Active Microsoft Entra ID
Directory
Traditional and Most on-premises apps use Microsoft Entra ID can provide access to
legacy apps LDAP, Windows-Integrated these types of on-premises apps using
Authentication (NTLM and Microsoft Entra application proxy agents
Kerberos), or Header-based running on-premises. Using this method
authentication to control access Microsoft Entra ID can authenticate Active
to users. Directory users on-premises using Kerberos
while you migrate or need to coexist with
legacy apps.
SaaS apps Active Directory doesn't SaaS apps supporting OAuth2, Security
support SaaS apps natively and Assertion Markup Language (SAML), and
requires federation system, WS-* authentication can be integrated to
such as AD FS. use Microsoft Entra ID for authentication.
Line of business Organizations can use AD FS LOB apps requiring modern authentication
(LOB) apps with with Active Directory to support can be configured to use Microsoft Entra
modern LOB apps requiring modern ID for authentication.
authentication authentication.
Devices
Windows servers Active Directory provides Windows servers virtual machines in Azure
strong management can be managed with Microsoft Entra
capabilities for on-premises Domain Services. Managed identities can
Windows servers using Group be used when VMs need access to the
Policy or other management identity system directory or resources.
solutions.
Linux/Unix Active Directory doesn't Linux/Unix VMs can use managed identities
workloads natively support non-Windows to access the identity system or resources.
without third-party solutions, Some organizations, migrate these
although Linux machines can workloads to cloud container technologies,
be configured to authenticate which can also use managed identities.
with Active Directory as a
Kerberos realm.
Next steps
What is Microsoft Entra ID?
Compare self-managed Active Directory Domain Services, Microsoft Entra ID, and
managed Microsoft Entra Domain Services
Frequently asked questions about Microsoft Entra ID
What's new in Microsoft Entra ID?
What are custom security attributes in
Microsoft Entra ID?
Article • 10/28/2024
The following example shows several custom security attributes assigned to a user. The
custom security attributes are different data types and have values that are single,
multiple, free-form, or predefined.
ノ Expand table
Capability Extensions Custom security attributes
Restricted access No. Anyone with Yes. Read and write access is restricted
permissions to read the through a separate set of permissions
object can read the and role-based access control (RBAC).
extension data.
For more information about working with extensions, see Add custom data to resources
using extensions.
Check that you are assigned the Attribute Definition Administrator or Attribute
Assignment Administrator roles. If necessary, someone with at least the Privileged
Role Administrator role can assign these roles.
Add attribute sets to group and manage related custom security attributes. Learn
more
3. Manage attribute sets
Specify who can read, define, or assign custom security attributes in an attribute
set. Learn more
4. Define attributes
Add your custom security attributes to your directory. You can specify the date
type (Boolean, integer, or string) and whether values are predefined, free-form,
single, or multiple. Learn more
5. Assign attributes
Assign custom security attributes to Microsoft Entra objects for your business
scenarios. Learn more
6. Use attributes
Filter users and applications that use custom security attributes. Learn more
Add conditions that use custom security attributes to Azure role assignments for
fine-grained access control. Learn more
Terminology
To better understand custom security attributes, you can refer back to the following list
of terms.
ノ Expand table
Term Definition
attribute The schema of a custom security attribute or key-value pair. For example, the
definition custom security attribute name, description, data type, and predefined values.
attribute set A collection of related custom security attributes. Attribute sets can be
delegated to other users for defining and assigning custom security attributes.
attribute name A unique name of a custom security attribute within an attribute set. The
combination of attribute set and attribute name forms a unique attribute for
your tenant.
attribute The assignment of a custom security attribute to a Microsoft Entra object, such
assignment as users and enterprise applications (service principals).
ノ Expand table
Data type ✅ Data type for the custom security attribute values.
Supported types are Boolean , Integer , and String .
ノ Expand table
Special characters not allowed <space> ` ~ ! @ # $ % ^ & * Attribute set name and
for: ( ) _ - + = { [ } ] \| \ : ; attribute name cannot start
Attribute set name " ' < , > . ? / with a number
Attribute name
ノ Expand table
Role Permissions
Attribute Log Reader Read audit logs for custom security attributes
Attribute Log Administrator Read audit logs for custom security attributes
Configure diagnostic settings for custom
security attributes
) Important
You can use an API client such as Graph Explorer to more easily try the Microsoft Graph
API for custom security attributes.
License requirements
Using this feature is free and included in your Azure subscription.
Next steps
Add or deactivate custom security attribute definitions in Microsoft Entra ID
Manage access to custom security attributes in Microsoft Entra ID
Assign, update, list, or remove custom security attributes for a user
Provision custom security attributes from HR sources (preview)
Feedback
Was this page helpful? Yes No
Prerequisites
To add or deactivate custom security attributes definitions, you must have:
) Important
By default, Global Administrator and other administrator roles do not have permissions to
read, define, or assign custom security attributes.
If Add attribute set is disabled, make sure you are assigned the Attribute Definition
Administrator role. For more information, see Troubleshoot custom security attributes.
An attribute set name can be 32 characters with no spaces or special characters. Once
you've specified a name, you can't rename it. For more information, see Limits and
constraints.
3. On the Custom security attributes page, find an existing attribute set or select Add
attribute set to add a new attribute set.
5. Select Add attribute to add a new custom security attribute to the attribute set.
A description can be 128 characters long. If necessary, you can later change the
description.
8. From the Data type list, select the data type for the custom security attribute.
ノ Expand table
Select Yes to allow multiple values to be assigned to this custom security attribute. Select
No to only allow a single value to be assigned to this custom security attribute.
10. For Only allow predefined values to be assigned, select Yes or No.
Select Yes to require that this custom security attribute be assigned values from a
predefined values list. Select No to allow this custom security attribute to be assigned
user-defined values or potentially predefined values.
11. If Only allow predefined values to be assigned is Yes, select Add value to add predefined
values.
An active value is available for assignment to objects. A value that is not active is defined,
but not yet available for assignment.
The new custom security attribute appears in the list of custom security attributes.
13. If you want to include predefined values, follow the steps in the next section.
3. Select the attribute set that includes the custom security attribute you want to edit.
4. In the list of custom security attributes, select the ellipsis for the custom security attribute
you want to edit, and then select Edit attribute.
6. If Only allow predefined values to be assigned is Yes, select Add value to add predefined
values. Select an existing predefined value to change the Is active? setting.
3. Select the attribute set that includes the custom security attribute you want to deactivate.
4. In the list of custom security attributes, add a check mark next to the custom security
attribute you want to deactivate.
The custom security attribute is deactivated and moved to the Deactivated attributes list.
Get-MgDirectoryAttributeSet
PowerShell
Get-MgDirectoryAttributeSet | Format-List
Output
Get-MgDirectoryAttributeSet
PowerShell
Get-MgDirectoryAttributeSet -Top 10
Get-MgDirectoryAttributeSet
PowerShell
Get-MgDirectoryAttributeSet
PowerShell
Output
New-MgDirectoryAttributeSet
PowerShell
$params = @{
Id = "Engineering"
Description = "Attributes for engineering team"
MaxAttributesPerSet = 25
}
New-MgDirectoryAttributeSet -BodyParameter $params
Output
Id Description MaxAttributesPerSet
-- ----------- -------------------
Engineering Attributes for engineering team 25
Update-MgDirectoryAttributeSet
PowerShell
$params = @{
description = "Attributes for engineering team"
maxAttributesPerSet = 20
}
Update-MgDirectoryAttributeSet -AttributeSetId "Engineering" -BodyParameter
$params
Get-MgDirectoryCustomSecurityAttributeDefinition
PowerShell
Get-MgDirectoryCustomSecurityAttributeDefinition | Format-List
Output
AllowedValues :
AttributeSet : Engineering
Description : Target completion date
Id : Engineering_ProjectDate
IsCollection : False
IsSearchable : True
Name : ProjectDate
Status : Available
Type : String
UsePreDefinedValuesOnly : False
AdditionalProperties : {}
AllowedValues :
AttributeSet : Engineering
Description : Active projects for user
Id : Engineering_Project
IsCollection : True
IsSearchable : True
Name : Project
Status : Available
Type : String
UsePreDefinedValuesOnly : True
AdditionalProperties : {}
AllowedValues :
AttributeSet : Marketing
Description : Country where is application is used
Id : Marketing_AppCountry
IsCollection : True
IsSearchable : True
Name : AppCountry
Status : Available
Type : String
UsePreDefinedValuesOnly : True
AdditionalProperties : {}
PowerShell
Output
AllowedValues :
AttributeSet : Engineering
Description : Active projects for user
Id : Engineering_Project
IsCollection : True
IsSearchable : True
Name : Project
Status : Available
Type : String
UsePreDefinedValuesOnly : True
AdditionalProperties : {}
Filter: Attribute set eq 'Engineering' and status eq 'Available' and data type eq 'String'
Get-MgDirectoryCustomSecurityAttributeDefinition
PowerShell
Output
AllowedValues :
AttributeSet : Engineering
Description : Target completion date
Id : Engineering_ProjectDate
IsCollection : False
IsSearchable : True
Name : ProjectDate
Status : Available
Type : String
UsePreDefinedValuesOnly : False
AdditionalProperties : {}
AllowedValues :
AttributeSet : Engineering
Description : Active projects for user
Id : Engineering_Project
IsCollection : True
IsSearchable : True
Name : Project
Status : Available
Type : String
UsePreDefinedValuesOnly : True
AdditionalProperties : {}
Get-MgDirectoryCustomSecurityAttributeDefinition
PowerShell
Get-MgDirectoryCustomSecurityAttributeDefinition -
CustomSecurityAttributeDefinitionId "Engineering_ProjectDate" | Format-List
Output
AllowedValues :
AttributeSet : Engineering
Description : Target completion date
Id : Engineering_ProjectDate
IsCollection : False
IsSearchable : True
Name : ProjectDate
Status : Available
Type : String
UsePreDefinedValuesOnly : False
AdditionalProperties : {[@odata.context,
https://graph.microsoft.com/v1.0/$metadata#directory/customSecurityAttributeDe
finitions/$entity]}
New-MgDirectoryCustomSecurityAttributeDefinition
PowerShell
$params = @{
attributeSet = "Engineering"
description = "Target completion date"
isCollection = $false
isSearchable = $true
name = "ProjectDate"
status = "Available"
type = "String"
usePreDefinedValuesOnly = $false
}
New-MgDirectoryCustomSecurityAttributeDefinition -BodyParameter $params |
Format-List
Output
AllowedValues :
AttributeSet : Engineering
Description : Target completion date
Id : Engineering_ProjectDate
IsCollection : False
IsSearchable : True
Name : ProjectDate
Status : Available
Type : String
UsePreDefinedValuesOnly : False
AdditionalProperties : {[@odata.context,
https://graph.microsoft.com/v1.0/$metadata#directory/customSecurityAttributeDe
finitions/$entity]}
New-MgDirectoryCustomSecurityAttributeDefinition
PowerShell
$params = @{
attributeSet = "Engineering"
description = "Active projects for user"
isCollection = $true
isSearchable = $true
name = "Project"
status = "Available"
type = "String"
usePreDefinedValuesOnly = $true
}
New-MgDirectoryCustomSecurityAttributeDefinition -BodyParameter $params |
Format-List
Output
AllowedValues :
AttributeSet : Engineering
Description : Active projects for user
Id : Engineering_Project
IsCollection : True
IsSearchable : True
Name : Project
Status : Available
Type : String
UsePreDefinedValuesOnly : True
AdditionalProperties : {[@odata.context,
https://graph.microsoft.com/v1.0/$metadata#directory/customSecurityAttributeDe
finitions/$entity]}
The following example adds a new custom security attribute definition with a list of predefined
values.
New-MgDirectoryCustomSecurityAttributeDefinition
PowerShell
$params = @{
attributeSet = "Engineering"
description = "Active projects for user"
isCollection = $true
isSearchable = $true
name = "Project"
status = "Available"
type = "String"
usePreDefinedValuesOnly = $true
allowedValues = @(
@{
id = "Alpine"
isActive = $true
}
@{
id = "Baker"
isActive = $true
}
@{
id = "Cascade"
isActive = $true
}
)
}
New-MgDirectoryCustomSecurityAttributeDefinition -BodyParameter $params |
Format-List
Output
AllowedValues :
AttributeSet : Engineering
Description : Active projects for user
Id : Engineering_Project
IsCollection : True
IsSearchable : True
Name : Project
Status : Available
Type : String
UsePreDefinedValuesOnly : True
AdditionalProperties : {[@odata.context,
https://graph.microsoft.com/v1.0/$metadata#directory/customSecurityAttributeDe
finitions/$entity]}
Update-MgDirectoryCustomSecurityAttributeDefinition
PowerShell
$params = @{
description = "Target completion date (YYYY/MM/DD)"
}
Update-MgDirectoryCustomSecurityAttributeDefinition -
CustomSecurityAttributeDefinitionId "Engineering_ProjectDate" -BodyParameter
$params
The following example updates the predefined values for a custom security attribute definition.
Invoke-MgGraphRequest
7 Note
For this request, you must add the OData-Version header and assign it the value
4.01 .
PowerShell
$params = @{
"allowedValues@delta" = @(
@{
id = "Baker"
isActive = $false
}
@{
id = "Skagit"
isActive = $true
}
)
}
$header = @{
"OData-Version" = 4.01
}
Invoke-MgGraphRequest -Method PATCH -Uri
"https://graph.microsoft.com/v1.0/directory/customSecurityAttributeDefinitions
/Engineering_Project5" -Headers $header -Body $params
Update-MgDirectoryCustomSecurityAttributeDefinition
PowerShell
$params = @{
status = "Deprecated"
}
Update-MgDirectoryCustomSecurityAttributeDefinition -
CustomSecurityAttributeDefinitionId "Engineering_ProjectDate" -BodyParameter
$params
Get all predefined values
The following example gets all predefined values for a custom security attribute definition.
Get-MgDirectoryCustomSecurityAttributeDefinitionAllowedValue
PowerShell
Get-MgDirectoryCustomSecurityAttributeDefinitionAllowedValue -
CustomSecurityAttributeDefinitionId "Engineering_Project" | Format-List
Output
Id : Skagit
IsActive : True
AdditionalProperties : {}
Id : Baker
IsActive : False
AdditionalProperties : {}
Id : Cascade
IsActive : True
AdditionalProperties : {}
Id : Alpine
IsActive : True
AdditionalProperties : {}
The following example gets a predefined value for a custom security attribute definition.
Get-MgDirectoryCustomSecurityAttributeDefinitionAllowedValue
PowerShell
Get-MgDirectoryCustomSecurityAttributeDefinitionAllowedValue -
CustomSecurityAttributeDefinitionId "Engineering_Project" -AllowedValueId
"Alpine" | Format-List
Output
Id : Alpine
IsActive : True
AdditionalProperties : {[@odata.context,
https://graph.microsoft.com/v1.0/$metadata#directory/customSecurityAttributeDe
finitions('Engineering_Project')/al
lowedValues/$entity]}
You can add predefined values for custom security attributes that have
usePreDefinedValuesOnly set to true .
New-MgDirectoryCustomSecurityAttributeDefinitionAllowedValue
PowerShell
$params = @{
id = "Alpine"
isActive = $true
}
New-MgDirectoryCustomSecurityAttributeDefinitionAllowedValue -
CustomSecurityAttributeDefinitionId "Engineering_Project" -BodyParameter
$params | Format-List
Output
Id : Alpine
IsActive : True
AdditionalProperties : {[@odata.context,
https://graph.microsoft.com/v1.0/$metadata#directory/customSecurityAttributeDe
finitions('Engineering_Project')/al
lowedValues/$entity]}
Update-MgDirectoryCustomSecurityAttributeDefinitionAllowedValue
PowerShell
$params = @{
isActive = $false
}
Update-MgDirectoryCustomSecurityAttributeDefinitionAllowedValue -
CustomSecurityAttributeDefinitionId "Engineering_Project" -AllowedValueId
"Alpine" -BodyParameter $params
No, you can't delete custom security attribute definitions. You can only deactivate custom
security attribute definitions. Once you deactivate a custom security attribute, it can no longer
be applied to the Microsoft Entra objects. Custom security attribute assignments for the
deactivated custom security attribute definition are not automatically removed. There is no
limit to the number of deactivated custom security attributes. You can have 500 active custom
security attribute definitions per tenant with 100 allowed predefined values per custom security
attribute definition.
Related content
Manage access to custom security attributes in Microsoft Entra ID
Assign, update, list, or remove custom security attributes for a user
Assign, update, list, or remove custom security attributes for an application
Manage access to custom security
attributes in Microsoft Entra ID
Article • 03/30/2025
For people in your organization to effectively work with custom security attributes, you
must grant the appropriate access. Depending on the information you plan to include in
custom security attributes, you might want to restrict custom security attributes or you
might want to make them broadly accessible in your organization. This article describes
how to manage access to custom security attributes.
Prerequisites
To manage access to custom security attributes, you must have:
) Important
Microsoft Entra role assignments are an additive model, so your effective permissions
are the sum of your role assignments. For example, if you assign a user a role at tenant
scope and assign the same user the same role at attribute set scope, the user will still
have permissions at tenant scope.
The following table provides a high-level comparison of the custom security attributes
roles.
ノ Expand table
Read attribute ✅ ✅
assignments for users
and applications (service
principals)
An administrator that has been assigned the Attribute Definition Administrator and
Attribute Assignment Administrator roles at tenant scope can manage all aspects of
custom security attributes. The following diagram shows how custom security attributes
are defined and assigned by a single administrator.
1. The administrator (Xia) has both the Attribute Definition Administrator and
Attribute Assignment Administrator roles assigned at tenant scope. The
administrator adds attribute sets and defines attributes.
2. The administrator assigns attributes to Microsoft Entra objects.
Managing attributes centrally has the advantage that it can be managed by one or two
administrators. The disadvantage is that the administrator might get several requests to
define or assign custom security attributes. In this case, you might want to delegate
management.
An administrator might not know all the situations of how custom security attributes
should be defined and assigned. Typically it's users within the respective departments,
teams, or projects who know the most about their area. Instead of assigning one or two
administrators to manage all custom security attributes, you can instead delegate the
management at attribute set scope. This also follows the best practice of least privilege
to grant just the permissions other administrators need to do their job and avoid
unnecessary access. The following diagram shows how the management of custom
security attributes can be delegated to multiple administrators.
1. The administrator (Xia) with the Attribute Definition Administrator role assigned at
tenant scope adds attribute sets. The administrator also has permissions to assign
roles to others (Privileged Role Administrator) and delegates who can read, define,
or assign custom security attributes for each attribute set.
2. The delegated Attribute Definition Administrators (Alice and Bob) define attributes
in the attribute sets they have been granted access to.
3. The delegated Attribute Assignment Administrators (Chandra and Bob) assign
attributes from their attribute sets to Microsoft Entra objects.
Admin center
7 Note
Admin center
2. Browse to Identity > Roles & admins > Roles & admins.
Custom security attribute audit logs provide you with the history of activities related to
custom security attributes, such as adding a new definition or assigning an attribute
value to a user. Here are the custom security attribute-related activities that are logged:
For information about how to get the custom security attribute audit logs using the
Microsoft Graph API, see the customSecurityAttributeAudit resource type. For more
information, see Microsoft Entra audit logs.
Diagnostic settings
To export custom security attribute audit logs to different destinations for additional
processing, you use diagnostic settings. To create and configure diagnostic settings for
custom security attributes, you must be assigned the Attribute Log Administrator role.
Tip
Microsoft recommends that you keep your custom security attribute audit logs
separate from your directory audit logs so that attribute assignments are not
revealed inadvertently.
The following screenshot shows the diagnostic settings for custom security attributes.
For more information, see How to configure diagnostic settings.
There is a transition period where custom security audit logs are written to both the
directory and custom security attributes audit log endpoints. Going forward, you must
use the custom security attributes audit log endpoint to find custom security attribute
audit logs.
The following table lists the endpoint where you can find custom security attributes
audit logs during the transition period.
ノ Expand table
Oct 2023 ✅ ✅
Feb 2024 ✅
Next steps
Add or deactivate custom security attribute definitions in Microsoft Entra ID
Assign, update, list, or remove custom security attributes for a user
Troubleshoot custom security attributes in Microsoft Entra ID
Feedback
Was this page helpful? Yes No
Custom security attributes in Microsoft Entra ID, part of Microsoft Entra, are business-
specific attributes (key-value pairs) that you can define and assign to Microsoft Entra
objects. For example, you can assign custom security attribute to filter your employees
or to help determine who gets access to resources. This article describes how to assign,
update, list, or remove custom security attributes for Microsoft Entra ID.
Prerequisites
To assign or remove custom security attributes for a user in your Microsoft Entra tenant,
you need:
) Important
2. Make sure that you have defined custom security attributes. For more information,
see Add or deactivate custom security attribute definitions in Microsoft Entra ID.
4. Find and select the user you want to assign custom security attributes to.
9. Depending on the properties of the selected custom security attribute, you can
enter a single value, select a value from a predefined list, or add multiple values.
10. When finished, select Save to assign the custom security attributes to the user.
3. Find and select the user that has a custom security attribute assignment value you
want to update.
5. Find the custom security attribute assignment value you want to update.
Once you have assigned a custom security attribute to a user, you can only change
the value of the custom security attribute. You can't change other properties of the
custom security attribute, such as attribute set or attribute name.
6. Depending on the properties of the selected custom security attribute, you can
update a single value, select a value from a predefined list, or update multiple
values.
6. For Operator, you can select equals (==), not equals (!=), or starts with.
3. Find and select the user that has the custom security attribute assignments you
want to remove.
5. Add check marks next to all the custom security attribute assignments you want to
remove.
PowerShell
Update-MgUser
PowerShell
$customSecurityAttributes = @{
"Engineering" = @{
"@odata.type" =
"#Microsoft.DirectoryServices.CustomSecurityAttributeValue"
"ProjectDate" = "2024-11-15"
}
}
Update-MgUser -UserId $userId -CustomSecurityAttributes
$customSecurityAttributes
The following example assigns a custom security attribute with a multi-string value to a
user.
PowerShell
Update-MgUser
PowerShell
$customSecurityAttributes = @{
"Engineering" = @{
"@odata.type" =
"#Microsoft.DirectoryServices.CustomSecurityAttributeValue"
"Project@odata.type" = "#Collection(String)"
"Project" = @("Baker","Cascade")
}
}
Update-MgUser -UserId $userId -CustomSecurityAttributes
$customSecurityAttributes
The following example assigns a custom security attribute with an integer value to a
user.
PowerShell
Update-MgUser
PowerShell
$customSecurityAttributes = @{
"Engineering" = @{
"@odata.type" =
"#Microsoft.DirectoryServices.CustomSecurityAttributeValue"
"NumVendors@odata.type" = "#Int32"
"NumVendors" = 4
}
}
Update-MgUser -UserId $userId -CustomSecurityAttributes
$customSecurityAttributes
The following example assigns a custom security attribute with a multi-integer value to a
user.
PowerShell
Update-MgUser
PowerShell
$customSecurityAttributes = @{
"Engineering" = @{
"@odata.type" =
"#Microsoft.DirectoryServices.CustomSecurityAttributeValue"
"CostCenter@odata.type" = "#Collection(Int32)"
"CostCenter" = @(1001,1003)
}
}
Update-MgUser -UserId $userId -CustomSecurityAttributes
$customSecurityAttributes
PowerShell
Update-MgUser
PowerShell
$customSecurityAttributes = @{
"Engineering" = @{
"@odata.type" =
"#Microsoft.DirectoryServices.CustomSecurityAttributeValue"
"Certification" = $true
}
}
Update-MgUser -UserId $userId -CustomSecurityAttributes
$customSecurityAttributes
PowerShell
Update-MgUser
PowerShell
$customSecurityAttributes = @{
"Engineering" = @{
"@odata.type" =
"#Microsoft.DirectoryServices.CustomSecurityAttributeValue"
"NumVendors@odata.type" = "#Int32"
"NumVendors" = 8
}
}
Update-MgUser -UserId $userId -CustomSecurityAttributes
$customSecurityAttributes
PowerShell
Update-MgUser
PowerShell
$customSecurityAttributes = @{
"Engineering" = @{
"@odata.type" =
"#Microsoft.DirectoryServices.CustomSecurityAttributeValue"
"Certification" = $false
}
}
Update-MgUser -UserId $userId -CustomSecurityAttributes
$customSecurityAttributes
Update a custom security attribute assignment with a multi-string
value for a user
The following example updates a custom security attribute assignment with a multi-
string value for a user.
PowerShell
Update-MgUser
PowerShell
$customSecurityAttributes = @{
"Engineering" = @{
"@odata.type" =
"#Microsoft.DirectoryServices.CustomSecurityAttributeValue"
"Project@odata.type" = "#Collection(String)"
"Project" = @("Alpine","Baker")
}
}
Update-MgUser -UserId $userId -CustomSecurityAttributes
$customSecurityAttributes
PowerShell
Get-MgUser
PowerShell
Output
Key : Engineering
Value : {[@odata.type, #microsoft.graph.customSecurityAttributeValue],
[Project@odata.type, #Collection(String)], [Project, System.Object[]],
[ProjectDate, 2024-11-15]…}
Key : Marketing
Value : {[@odata.type, #microsoft.graph.customSecurityAttributeValue],
[EmployeeId, GS45897]}
Key Value
--- -----
@odata.type #microsoft.graph.customSecurityAttributeValue
Project@odata.type #Collection(String)
Project {Baker, Alpine}
ProjectDate 2024-11-15
NumVendors 8
CostCenter@odata.type #Collection(Int32)
CostCenter {1001, 1003}
Certification False
Key Value
--- -----
@odata.type #microsoft.graph.customSecurityAttributeValue
EmployeeId KX45897
If there are no custom security attributes assigned to the user or if the calling
principal does not have access, the response will be empty.
The following example lists all users with a custom security attribute assignment that
equals a value. It retrieves users with a custom security attribute named AppCountry with
a value that equals Canada . The filter value is case sensitive. You must add
ConsistencyLevel=eventual in the request or the header. You must also include
PowerShell
Get-MgUser
PowerShell
Output
Id DisplayName
CustomSecurityAttributes
-- ----------- -----------------------
-
00aa00aa-bb11-cc22-dd33-44ee44ee44ee Jiya
Microsoft.Graph.PowerShell.Models.MicrosoftGraphCustomSecurityAttributeV
alue
11bb11bb-cc22-dd33-ee44-55ff55ff55ff Jana
Microsoft.Graph.PowerShell.Models.MicrosoftGraphCustomSecurityAttributeV
alue
Key : Engineering
Value : {[@odata.type, #microsoft.graph.customSecurityAttributeValue],
[Datacenter@odata.type, #Collection(String)], [Datacenter,
System.Object[]]}
Key : Marketing
Value : {[@odata.type, #microsoft.graph.customSecurityAttributeValue],
[AppCountry@odata.type, #Collection(String)], [AppCountry,
System.Object[]],
[EmployeeId, KX19476]}
Key : Marketing
Value : {[@odata.type, #microsoft.graph.customSecurityAttributeValue],
[AppCountry@odata.type, #Collection(String)], [AppCountry,
System.Object[]],
[EmployeeId, GS46982]}
List all users with a custom security attribute assignment that starts
with a value
The following example lists all users with a custom security attribute assignment that
starts with a value. It retrieves users with a custom security attribute named EmployeeId
with a value that starts with GS . The filter value is case sensitive. You must add
ConsistencyLevel=eventual in the request or the header. You must also include
PowerShell
Get-MgUser
PowerShell
Output
Id DisplayName
CustomSecurityAttributes
-- ----------- -----------------------
-
22cc22cc-dd33-ee44-ff55-66aa66aa66aa Chandra
Microsoft.Graph.PowerShell.Models.MicrosoftGraphCustomSecurityAttributeV
alue
11bb11bb-cc22-dd33-ee44-55ff55ff55ff Jana
Microsoft.Graph.PowerShell.Models.MicrosoftGraphCustomSecurityAttributeV
alue
33dd33dd-ee44-ff55-aa66-77bb77bb77bb Joe
Microsoft.Graph.PowerShell.Models.MicrosoftGraphCustomSecurityAttributeV
alue
Key : Marketing
Value : {[@odata.type, #microsoft.graph.customSecurityAttributeValue],
[EmployeeId, GS36348]}
Key : Marketing
Value : {[@odata.type, #microsoft.graph.customSecurityAttributeValue],
[AppCountry@odata.type, #Collection(String)], [AppCountry,
System.Object[]],
[EmployeeId, GS46982]}
Key : Engineering
Value : {[@odata.type, #microsoft.graph.customSecurityAttributeValue],
[Project@odata.type, #Collection(String)], [Project, System.Object[]],
[ProjectDate, 2024-11-15]…}
Key : Marketing
Value : {[@odata.type, #microsoft.graph.customSecurityAttributeValue],
[EmployeeId, GS45897]}
List all users with a custom security attribute assignment that does
not equal a value
The following example lists all users with a custom security attribute assignment that
does not equal a value. It retrieves users with a custom security attribute named
AppCountry with a value that does not equal Canada . The filter value is case sensitive.
You must add ConsistencyLevel=eventual in the request or the header. You must also
include $count=true to ensure the request is routed correctly.
PowerShell
Get-MgUser
PowerShell
Output
Id DisplayName
CustomSecurityAttributes
-- ----------- ----------
--------------
22cc22cc-dd33-ee44-ff55-66aa66aa66aa Chandra
Microsoft.Graph.PowerShell.Models.MicrosoftGraphCustomSecurityAttributeV
alue
44ee44ee-ff55-aa66-bb77-88cc88cc88cc Isabella
Microsoft.Graph.PowerShell.Models.MicrosoftGraphCustomSecurityAttributeV
alue
00aa00aa-bb11-cc22-dd33-44ee44ee44ee Alain
Microsoft.Graph.PowerShell.Models.MicrosoftGraphCustomSecurityAttributeV
alue
33dd33dd-ee44-ff55-aa66-77bb77bb77bb Joe
Microsoft.Graph.PowerShell.Models.MicrosoftGraphCustomSecurityAttributeV
alue
00aa00aa-bb11-cc22-dd33-44ee44ee44ee Dara
Microsoft.Graph.PowerShell.Models.MicrosoftGraphCustomSecurityAttributeV
alue
PowerShell
Invoke-MgGraphRequest
PowerShell
$params = @{
"customSecurityAttributes" = @{
"Engineering" = @{
"@odata.type" =
"#Microsoft.DirectoryServices.CustomSecurityAttributeValue"
"ProjectDate" = $null
}
}
}
Invoke-MgGraphRequest -Method PATCH -Uri
"https://graph.microsoft.com/v1.0/users/$userId" -Body $params
PowerShell
Update-MgUser
PowerShell
$customSecurityAttributes = @{
"Engineering" = @{
"@odata.type" =
"#Microsoft.DirectoryServices.CustomSecurityAttributeValue"
"Project" = @()
}
}
Update-MgUser -UserId $userId -CustomSecurityAttributes
$customSecurityAttributes
Custom security attribute assignments for users are supported in Microsoft Entra admin
center, PowerShell, and Microsoft Graph APIs. Custom security attribute assignments are
not supported in My Apps or Microsoft 365 admin center.
Only users that have been assigned the Attribute Assignment Administrator or Attribute
Assignment Reader roles at tenant scope can view custom security attributes assigned
to any users in the tenant. Users cannot view the custom security attributes assigned to
their own profile or other users. Guests cannot view the custom security attributes
regardless of the guest permissions set on the tenant.
No, custom security attributes can be assigned to user objects without requiring an
application.
Why do I keep getting an error trying to save custom security attribute assignments?
You don't have permissions to assign custom security attributes to users. Make sure that
you are assigned the Attribute Assignment Administrator role.
Yes, custom security attributes can be assigned to members or guests in your tenant.
Yes, directory synced users from an on-premises Active Directory can be assigned
custom security attributes.
Are custom security attribute assignments available for rules for dynamic
membership groups?
No, custom security attributes assigned to users are not supported for configuring rules
for dynamic membership groups.
Are custom security attributes the same as the custom attributes in B2C tenants?
No, custom security attributes are not supported in B2C tenants and are not related to
B2C features.
Next steps
Add or deactivate custom security attribute definitions in Microsoft Entra ID
Assign, update, list, or remove custom security attributes for an application
Examples: Assign, update, list, or remove custom security attribute assignments
using the Microsoft Graph API
Troubleshoot custom security attributes in Microsoft Entra ID
Feedback
Was this page helpful? Yes No
Prerequisites
To assign or remove custom security attributes for an application in your Microsoft Entra
tenant, you need:
A Microsoft Entra account with an active subscription. Create an account for free .
Attribute Assignment Administrator role.
Make sure you have existing custom security attributes. To learn how to create a
security attribute, see Add or deactivate custom security attributes in Microsoft
Entra ID.
) Important
3. Find and select the application you want to add a custom security attribute to.
8. Depending on the properties of the selected custom security attribute, you can
enter a single value, select a value from a predefined list, or add multiple values.
9. When finished, select Save to assign the custom security attributes to the
application.
5. Find the custom security attribute assignment value you want to update.
Once you assigned a custom security attribute to an application, you can only
change the value of the custom security attribute. You can't change other
properties of the custom security attribute, such as attribute set or custom security
attribute name.
6. Depending on the properties of the selected custom security attribute, you can
update a single value, select a value from a predefined list, or update multiple
values.
If you don't see Add filters, select the banner to enable the Enterprise applications
search preview.
6. For Operator, you can select equals (==), not equals (!=), or starts with.
3. Find and select the application that has the custom security attribute assignments
you want to remove.
5. Add check marks next to all the custom security attribute assignments you want to
remove.
Next steps
Add or deactivate custom security attributes in Microsoft Entra ID
Assign, update, list, or remove custom security attributes for a user
Troubleshoot custom security attributes in Microsoft Entra ID
Feedback
Was this page helpful? Yes No
Cause
You don't have permissions to add an attribute set. To add an attribute set and custom
security attributes, you must be assigned the Attribute Definition Administrator role.
) Important
Solution
Make sure that you're assigned the Attribute Definition Administrator role at either the
tenant scope or attribute set scope. For more information, see Manage access to custom
security attributes in Microsoft Entra ID.
Cause
You don't have permissions to assign custom security attributes. To assign custom
security attributes, you must be assigned the Attribute Assignment Administrator role.
) Important
Solution
Make sure that you're assigned the Attribute Assignment Administrator role at either
the tenant scope or attribute set scope. For more information, see Manage access to
custom security attributes in Microsoft Entra ID.
You don't have permissions to filter custom security attributes. To read and filter custom
security attributes for users or enterprise applications, you must be assigned the
Attribute Assignment Reader or Attribute Assignment Administrator role.
) Important
Solution 1
Make sure that you're assigned one of the following Microsoft Entra built-in roles at
either the tenant scope or attribute set scope. For more information, see Manage access
to custom security attributes in Microsoft Entra ID.
Cause 2
Solution 2
You can delegate the management of custom security attributes at the tenant scope or
at the attribute set scope. Make sure you have been assigned access to an attribute set
at either the tenant scope or attribute set scope. For more information, see Manage
access to custom security attributes in Microsoft Entra ID.
Cause 3
There are no custom security attributes defined and assigned yet for your tenant.
Solution 3
Add and assign custom security attributes to users or enterprise applications. For more
information, see Add or deactivate custom security attribute definitions in Microsoft
Entra ID, Assign, update, list, or remove custom security attributes for a user, or Assign,
update, list, or remove custom security attributes for an application.
Solution
Deactivate the custom security attributes you no longer need. For more information, see
Add or deactivate custom security attribute definitions in Microsoft Entra ID.
Cause
PIM currently doesn't support adding an eligible Microsoft Entra role assignment at an
attribute set scope.
Or when you try to use a PowerShell command, you see a message similar to the
following:
Cause 1
You're using Graph Explorer and you haven't consented to the required custom security
attribute permissions to make the API call.
Solution 1
Open the Permissions panel, select the appropriate custom security attribute permission,
and select Consent. In the Permissions requested window that appears, review the
requested permissions.
Cause 2
You aren't assigned the required custom security attribute role to make the API call.
) Important
Solution 2
Make sure that you're assigned the required custom security attribute role. For more
information, see Manage access to custom security attributes in Microsoft Entra ID.
Cause 3
You're trying to remove a single-valued custom security attribute assignment by setting
it to null using the Update-MgUser or Update-MgServicePrincipal command.
Solution 3
Use the Invoke-MgGraphRequest command instead. For more information, see Remove
a single-valued custom security attribute assignment from a user or Remove custom
security attribute assignments from applications.
Cause
Solution
If required, add ConsistencyLevel=eventual in the request or the header. You might also
need to include $count=true to ensure the request is routed correctly. For more
information, see Examples: Assign, update, list, or remove custom security attribute
assignments using the Microsoft Graph API.
Next steps
Manage access to custom security attributes in Microsoft Entra ID
Troubleshoot Azure role assignment conditions
Feedback
Was this page helpful? Yes No
) Important
APIs under the /beta version in Microsoft Graph are subject to change. Use of these APIs
in production applications is not supported. To determine whether an API is available in
v1.0, use the Version selector.
With Microsoft Graph, you can manage identity and network access capabilities, most of which
are available through Microsoft Entra. The APIs in Microsoft Graph help you to automate
identity and network access management tasks and integrate with any application, and are the
programmatic alternative to the administrator portals such as the Microsoft Entra admin
center.
Microsoft Entra is a family of identity and network access capabilities that are available in the
following products. All these capabilities are available through Microsoft Graph APIs:
Microsoft Entra ID that groups identity and access management (IAM) capabilities.
Microsoft Entra ID Governance
Microsoft Entra External ID
Microsoft Entra Verified ID
Microsoft Entra Permissions Management
Microsoft Entra Internet Access and Network Access
Manage groups
Groups are the containers that allow you to efficiently manage the entitlements for identities as
a unit. For example, through a group, you can grant users access to a resource, such as a
SharePoint site. Or you can grant them licenses to use a service. For more information, see
Working with groups in Microsoft Graph.
Manage applications
You can use Microsoft Graph APIs to register and manage your applications programmatically,
enabling you to use Microsoft's IAM capabilities. For more information, see Manage Microsoft
Entra applications and service principals by using Microsoft Graph.
ノ Expand table
Manage administrative units including the administrativeUnit resource type and its associated APIs
following operations:
Create administrative units
Create and manage members and
membership rules of administrative units
Assign administrator roles that are scoped
to administrative units
Grant, revoke, and retrieve app roles on a appRoleAssignment resource type and its associated
resource application for users, groups, or APIs
service principals
Retrieve BitLocker recovery keys bitlockerRecoveryKey resource type and its associated
APIs
Manage custom security attributes See Overview of custom security attributes using the
Microsoft Graph API
Manage devices in the cloud device resource type and its associated APIs
View local administrator credential information deviceLocalCredentialInfo resource type and its
for all device objects in Microsoft Entra ID that associated APIs
are enabled with Local Admin Password
Solution (LAPS). This feature is the cloud-
based LAPS solution
Directory objects are the core objects in directoryObject resource type and its associated APIs
Microsoft Entra ID, such as users, groups, and
applications. You can use the directoryObject
resource type and its associated APIs to check
memberships of directory objects, track
changes for multiple directory objects, or
validate that a Microsoft 365 group's display
name or mail nickname complies with naming
policies
Administrator roles, including Microsoft Entra directoryRole resource type and directoryRoleTemplate
administrator roles, are one of the most resource type and their associated APIs
sensitive resources in a tenant. You can
manage the lifecycle of their assignment in the roleManagement resource type and its associated APIs
tenant, including creating custom roles, (recommended)
assigning roles, tracking changes to role
assignments, and removing assignees from These APIs allow you to make direct role assignments.
roles Alternatively, you can use Privileged Identity
Management APIs for Microsoft Entra roles and groups
to make just-in-time and time-bound role assignments,
instead of direct forever active assignments.
Define the following configurations that can groupSetting resource type and groupSettingTemplate
be used to customize the tenant-wide and resource type and their associated APIs
object-specific restrictions and allowed
behavior. For more information, see Overview of group settings.
Settings for Microsoft 365 groups such as
guest user access, classifications, and naming
policies
Password rule settings such as banned
password lists and lockout duration
Prohibited names for applications, reserved
words, and blocking trademark violations
Custom conditional access policy URL
Use cases API operations
Domain management operations such as: domain resource type and its associated APIs
associating a domain with your tenant
retrieving DNS records
verifying domain ownership
External admin takeover of unmanaged
domains
associating specific services with specific
domains
deleting domains
Configure and manage staged rollout of featureRolloutPolicy resource type and its associated
specific Microsoft Entra ID features APIs
Monitor licenses and subscriptions for the companySubscription resource type and its
tenant associated APIs
subscribedSku resource type and its associated APIs
Manage the base settings for your Microsoft organization resource type and its associated APIs
Entra tenant
Retrieve the organizational contacts that might orgContact resource type and its associated APIs
be synchronized from on-premises directories
or from Exchange Online
Discover the basic details of other Microsoft tenantInformation resource type and its associated APIs
Entra tenants by querying using the tenant ID
or the domain name
Manage the delegated permissions and their oAuth2PermissionGrant resource type and its associated
assignments to service principals in the tenant APIs
Configure listeners that monitor events that authenticationEventListener resource type and its
should trigger or invoke custom logic, typically associated APIs
defined outside Microsoft Entra ID
Manage authentication methods that are See Microsoft Entra authentication methods API
supported in Microsoft Entra ID overview and Microsoft Entra authentication methods
policies API overview
Manage the authentication methods or See Microsoft Entra authentication strengths API
combinations of authentication methods that overview
you can apply as grant control in Microsoft
Entra Conditional Access
Manage tenant-wide authorization policies authorizationPolicy resource type and its associated
such as: APIs
enable SSPR for administrator accounts
enable self-service join for guests
limit who can invite guests
whether users can consent to risky apps
block the use of MSOL
customize the default user permissions
identity private preview features enabled
Customize the guest user permissions
between User, Guest User, and Restricted Guest
User
Manage Microsoft Entra conditional access conditionalAccessRoot resource type and its associated
policies APIs
Manage cross-tenant access settings and See Cross-tenant access settings API overview
manage outbound restrictions, inbound
restrictions, tenant restrictions, and cross-
tenant synchronization of users in multitenant
organizations
Configure how and which external systems customAuthenticationExtension resource type and its
interact with Microsoft Entra ID during a user associated APIs
authentication session
Manage requests against user data in the dataPolicyOperation resource type and its associated
organization, such as exporting personal data APIs
Detect, investigate, and remediate identity- See Use the Microsoft Graph identity protection APIs
based risks using Microsoft Entra ID Protection
and feed the data into security information and
event management (SIEM) tools for further
investigation and correlation
Manage identity providers for Microsoft Entra identityProviderBase resource type and its associated
ID, Microsoft Entra External ID, and Azure AD APIs
B2C tenants. You can perform the following
operations:
Manage identity providers for external
identities, including social identity providers,
OIDC, Apple, SAML/WS-Fed, and built-in
providers
Manage configuration for federated
domains and token validation
Define a group of tenants belonging to your See Multitenant organization API overview
organization and streamline intra-organization
cross-tenant collaboration
Customize sign-in UIs to match your company organizationalBranding resource type and its
branding, including applying branding that's associated APIs
based on the browser language
User flows for Microsoft Entra External ID in The following resource types and their associated APIs:
workforce tenants b2xIdentityUserFlow to configure the base user flow
and its properties such as identity providers
identityUserFlowAttribute to manage built-in and
custom user flow attributes
identityUserFlowAttributeAssignment to manage
user flow attribute assignments
userFlowLanguageConfiguration resource type to
configure custom languages for user flows
User flows for Microsoft Entra External ID in The following resource types and their associated APIs:
external tenants authenticationEventsFlow resource type and its
associated APIs
identityUserFlowAttribute to manage built-in and
custom user flow attributes
ノ Expand table
User flows for Microsoft Entra External ID in authenticationEventsFlow resource type and its
external tenants and self-service sign-up associated APIs
experiences
Manage identity providers for Microsoft Entra See identityProviderBase resource type and its
External ID. You can identify the identity associated APIs
providers that are supported or configured in
the tenant
Configuring custom URL domains in Microsoft The CustomUrlDomain value for the supportedServices
Entra External ID in external tenants property of domain resource type and its associated
APIs
Customize sign-in UIs to match your company organizationalBranding resource type and its
branding, including applying branding that's associated APIs
based on the browser language
Manage identity providers for Microsoft Entra identityProviderBase resoruce type and its associated
External ID, such as social identities APIs
Manage user profiles in Microsoft Entra External For more information, see Default user permissions in
ID for customers customer tenants
Add your own business logic to the authenticationEventListener resource type and
authentication experiences by integrating with customAuthenticationExtension resource type and
systems that are external to Microsoft Entra ID their associated APIs
ノ Expand table
Manage contracts for the partner with its customers contract resource type
and its associated APIs
Microsoft partners can empower their customers to ensure the partners have See Granular delegated
least privileged access to their customers' tenants. This feature gives extra admin privileges (GDAP)
control to customers over their security posture while allowing them to receive API overview
support from the Microsoft resellers
Zero Trust
This feature helps organizations to align their tenants with the three guiding principles of a
Zero Trust architecture:
Verify explicitly
Use least privilege
Assume breach
To find out more about Zero Trust and other ways to align your organization to the guiding
principles, see the Zero Trust Guidance Center.
Licensing
Microsoft Entra licenses include Microsoft Entra ID Free, P1, P2, and Governance; Microsoft
Entra Permissions Management; and Microsoft Entra Workload ID.
For detailed information about licensing for different features, see Microsoft Entra ID licensing.
Related content
Implement identity standards with Microsoft Entra ID
Microsoft Entra ID Guide for independent software developers
Review the Microsoft Entra deployment plans to help you build your plan to deploy the
Microsoft Entra suite of capabilities.
Add custom data to resources using
extensions
Article • 10/30/2024
Microsoft Graph provides a single API endpoint to access rich people-centric data and
insights through resources such as user and message. You can also extend Microsoft
Graph by adding custom properties to resource instances without requiring an external
data store.
This article describes how Microsoft Graph supports extending its resources, the options
available to add custom properties, and when to use them.
) Important
The extensions mentioned in this article are not similar to the following features:
Extension attributes
Microsoft Entra ID offers a set of 15 extension attributes with predefined names on the
user and device resources. These properties were initially custom attributes provided in
on-premises Active Directory (AD) and Microsoft Exchange. However, they can now be
used for more than syncing on-premises AD and Microsoft Exchange data to Microsoft
Entra ID through Microsoft Graph.
For more information about these attributes in Microsoft Exchange, see Custom
attributes in Exchange Server.
Developer experience
You can use the 15 extension attributes to store String values on user or device resource
instances, through the onPremisesExtensionAttributes and extensionAttributes
properties respectively. You can assign the values while creating a new resource instance
or while updating an existing resource instance. You can also filter by the values.
The following example shows how to store data in extensionAttribute1 and delete
existing data from extensionAttribute13 through an update operation with a PATCH
method.
HTTP
HTTP
PATCH https://graph.microsoft.com/v1.0/users/071cc716-8147-4397-a5ba-
b2105951cc0b
{
"onPremisesExtensionAttributes": {
"extensionAttribute1": "skypeId.adeleVance",
"extensionAttribute13": null
}
}
The request returns a 204 No Content response object.
Request
HTTP
msgraph
GET https://graph.microsoft.com/v1.0/users?
$select=id,displayName,onPremisesExtensionAttributes
Response
HTTP
{
"@odata.context":
"https://graph.microsoft.com/v1.0/$metadata#users(id,displayName,onPremisesE
xtensionAttributes)",
"value": [
{
"id": "071cc716-8147-4397-a5ba-b2105951cc0b",
"displayName": "Adele Vance",
"onPremisesExtensionAttributes": {
"extensionAttribute1": "Contractor",
"extensionAttribute2": "50",
"extensionAttribute3": null,
"extensionAttribute4": "1478354",
"extensionAttribute5": "10239390",
"extensionAttribute6": null,
"extensionAttribute7": null,
"extensionAttribute8": null,
"extensionAttribute9": null,
"extensionAttribute10": "11",
"extensionAttribute11": null,
"extensionAttribute12": "/o=ExchangeLabs/ou=Exchange
Administrative Group
(FYDIBOHF47SPDLT)/cn=Recipients/cn=5ee781fc7egc7aa0b9394bddb44e7f04-Adele
Vance",
"extensionAttribute13": null,
"extensionAttribute14": null,
"extensionAttribute15": null
}
}
]
}
The 15 extension attributes are already predefined in Microsoft Graph and their property
names can't be changed. Therefore, you can't use custom names such as SkypeId for
the extension attributes. Your organization must therefore track the extension attribute
properties in use to avoid inadvertently overwriting their data.
For the list of resource types that can be specified as target objects for a directory
extension, see Comparison of extension types.
Developer experience
Directory extension definitions are managed through the extensionProperty resource
and its associated methods. The data is managed through the REST API requests that
you use to manage the resource instance.
Request
In the following request, 30a5435a-1871-485c-8c7b-65f69e287e7b is the object ID of the
application that owns the directory extension. You can create directory extensions that
store a collection of values.
HTTP
HTTP
POST https://graph.microsoft.com/v1.0/applications/30a5435a-1871-485c-
8c7b-65f69e287e7b/extensionProperties
{
"name": "jobGroupTracker",
"dataType": "String",
"targetObjects": [
"User"
]
}
Response
HTTP
{
"@odata.context":
"https://graph.microsoft.com/v1.0/$metadata#applications('30a5435a-1871-
485c-8c7b-65f69e287e7b')/extensionProperties/$entity",
"id": "4e3dbc8f-ca32-41b4-825a-346215d7d20f",
"deletedDateTime": null,
"appDisplayName": "HR-sync-app",
"dataType": "String",
"isMultiValued": false,
"isSyncedFromOnPremises": false,
"name": "extension_b7d8e648520f41d3b9c0fdeb91768a0a_jobGroupTracker",
"targetObjects": [
"User"
]
}
Add a directory extension property to a target object
After defining the directory extension, you can now add it to an instance of a target
object type. You can store data in the directory extension when creating a new instance
of the target object or when updating an existing object. The following example shows
how to store data in the directory extension when creating a new user object.
HTTP
msgraph
POST https://graph.microsoft.com/v1.0/users
{
"accountEnabled": true,
"displayName": "Adele Vance",
"mailNickname": "AdeleV",
"userPrincipalName": "AdeleV@contoso.com",
"passwordProfile": {
"forceChangePasswordNextSignIn": false,
"password": "xWwvJ]6NMw+bWH-d"
},
"extension_b7d8e648520f41d3b9c0fdeb91768a0a_jobGroupTracker":
"JobGroupN"
}
The request returns a 201 Created response code and a user object in the response
body.
The following example shows how the directory extensions and associated data are
presented on a resource instance. The extension property is returned by default through
the beta endpoint, but only on $select through the v1.0 endpoint.
Request
HTTP
msgraph
GET https://graph.microsoft.com/beta/users?
$select=id,displayName,extension_b7d8e648520f41d3b9c0fdeb91768a0a_jobGro
upTracker,extension_b7d8e648520f41d3b9c0fdeb91768a0a_permanent_pensionab
le
Response
HTTP
HTTP/1.1 200 OK
Content-type: application/json
{
"@odata.context":
"https://graph.microsoft.com/v1.0/$metadata#users(id,displayName,extension_b
7d8e648520f41d3b9c0fdeb91768a0a_jobGroupTracker,extension_b7d8e648520f41d3b9
c0fdeb91768a0a_permanent_pensionable)",
"value": [
{
"id": "63384f56-42d2-4aa7-b1d6-b10c78f143a2",
"displayName": "Adele Vance",
"extension_b7d8e648520f41d3b9c0fdeb91768a0a_jobGroupTracker":
"E4",
"extension_b7d8e648520f41d3b9c0fdeb91768a0a_permanent_pensionable": true
}
]
}
To update or delete the value of the directory extension for a resource instance, use the
PATCH method. To delete the extension property and its associated value, set its value to
null .
The following request updates the value of one directory extension and deletes another
extension property.
HTTP
HTTP
PATCH https://graph.microsoft.com/v1.0/users/63384f56-42d2-4aa7-b1d6-
b10c78f143a2
{
"extension_b7d8e648520f41d3b9c0fdeb91768a0a_permanent_pensionable":
null,
"extension_b7d8e648520f41d3b9c0fdeb91768a0a_jobGroupTracker": "E4"
}
When the definition is deleted before data in the associated extension property is
deleted, there's no way to know the existence of the extension property via Microsoft
Graph - even though the undiscoverable property counts against the 100-limit.
Deleting an owner app in the home tenant makes the associated directory extensions
and their data undiscoverable. When you restore an owner app, it restores the directory
extension definitions but doesn't make the directory extension properties or their data
immediately discoverable; because restoring an app doesn't automatically restore the
associated service principal in the tenant. To make the directory extension properties
and their data discoverable, either create a new service principal or restore the deleted
service principal. NO changes are made to other tenants where the app has been
consented to.
Schema extensions
Microsoft Graph schema extensions are conceptually similar to directory extensions.
First, you define your schema extension. Then, use it to extend supported resource
instances with strongly typed custom properties. In addition, you can control the status
of your schema extension and let it be discoverable by other apps.
For the list of resource types that support schema extensions, see Comparison of
extension types.
https://www.youtube-nocookie.com/embed/3MOAlUFNus0
Developer experience
When creating a schema extension definition, you must provide a unique name for its
id. There are two naming options:
If you already have a vanity .com , .net , .gov , .edu , or a .org domain that's
verified with your tenant, you can use the domain name along with the schema
name to define a unique name, in this format {domainName}_{schemaName}. For
example, if your vanity domain is contoso.com , you can define an id of
contoso_mySchema . This option is highly recommended.
Alternatively, you can set the id to a schema name (without a domain name prefix).
For example, mySchema . Microsoft Graph assigns a string ID for you based on the
supplied name, in this format: ext{8-random-alphanumeric-chars}_{schema-name} .
For example, extkvbmkofy_mySchema .
The id is the name of the complex type that stores your data on the extended resource
instance.
After you register a schema extension, it's available for use by all applications in the
same tenant as the associated owner application (when in the InDevelopment state) or
by all applications in any tenant (when in the Available state). Like directory extensions,
authorized apps have the ability to read and write data on any extensions defined on
the target object.
You manage the schema extension definitions and the data in the corresponding
schema extension property by using separate sets of API operations. To manage the
schema extension data on the extended resource instance, use the same REST request
that you use to manage the resource instance.
Use POST to store data in the schema extension property when you're creating a
new user.
Use PATCH to either store data in the schema extension property or update or
delete the stored data.
To delete data from a property, set its value to null .
To delete data from all properties, set every property to null . If all properties
are null , the schema extension object is also deleted.
To update any property, specify only the changed properties in the request
body. Omitted properties are not updated and retain their previous value.
Use GET to read the schema extension properties for all users or individual users in
the tenant.
HTTP
msgraph
POST https://graph.microsoft.com/v1.0/schemaExtensions
{
"id": "graphLearnCourses",
"description": "Graph Learn training courses extensions",
"targetTypes": [
"user"
],
"properties": [
{
"name": "courseId",
"type": "Integer"
},
{
"name": "courseName",
"type": "String"
},
{
"name": "courseType",
"type": "String"
}
]
}
Response
HTTP
{
"@odata.context":
"https://graph.microsoft.com/beta/$metadata#schemaExtensions/$entity",
"id": "extkmpdyld2_graphLearnCourses",
"description": "Graph Learn training courses extensions",
"targetTypes": [
"user"
],
"status": "InDevelopment",
"properties": [
{
"name": "courseId",
"type": "Integer"
},
{
"name": "courseName",
"type": "String"
},
{
"name": "courseType",
"type": "String"
}
]
}
HTTP
HTTP
POST https://graph.microsoft.com/beta/users
{
"accountEnabled": true,
"displayName": "Adele Vance",
"mailNickname": "AdeleV",
"userPrincipalName": "AdeleV@contoso.com",
"passwordProfile": {
"forceChangePasswordNextSignIn": false,
"password": "xWwvJ]6NMw+bWH-d"
},
"extkmpdyld2_graphLearnCourses": {
"courseId": 100,
"courseName": "Explore Microsoft Graph",
"courseType": "Online"
}
}
The request returns a 201 Created response code and a schemaExtension object in the
response body
The following example deletes the value of the courseId property and updates the
courseType property. To delete the extkmpdyld2_graphLearnCourses extension property
in its entirety, set its value to null .
HTTP
HTTP
PATCH https://graph.microsoft.com/beta/users/0668e673-908b-44ea-861d-
0661297e1a3e
{
"extkmpdyld2_graphLearnCourses": {
"courseType": "Instructor-led",
"courseId": null
}
}
Request
HTTP
msgraph
GET https://graph.microsoft.com/beta/users/0668e673-908b-44ea-861d-
0661297e1a3e?$select=id,displayName,extkmpdyld2_graphLearnCourses
Response
HTTP
HTTP/1.1 200 OK
Content-type: application/json
{
"@odata.context":
"https://graph.microsoft.com/beta/$metadata#users(id,displayName,extkmpdyld2
_graphLearnCourses)/$entity",
"id": "63384f56-42d2-4aa7-b1d6-b10c78f143a2",
"displayName": "Adele Vance",
"extkmpdyld2_graphLearnCourses": {
"@odata.type": "#microsoft.graph.ComplexExtensionValue",
"courseType": "Instructor-led",
"courseName": "Explore Microsoft Graph",
"courseId": null
}
}
Deleting a schema extension definition without setting the schema extension to null
makes the property and its associated user data undiscoverable.
Deleting an owner app in the home tenant doesn't delete the associated schema
extension definition or the property and the data it stores. The schema extension
property can still be read, deleted, or updated for users. However, the schema extension
definition can't be updated.
Open extensions
Microsoft Graph open extensions are open types that offer a simple and flexible way
to add untyped data directly to a resource instance. These extensions aren't strongly
typed, discoverable, or filterable.
For the list of resource types that support Microsoft Graph open extensions, see
Comparison of extension types.
https://www.youtube-nocookie.com/embed/ibdlADb8IZc
Developer experience
Open extensions, together with their data, are accessible through the extensions
navigation property of the resource instance. They allow you to group related properties
for easier access and management.
You define and manage open extensions on the fly on resource instances. They're
considered unique for each object, and you don't need to apply a universally consistent
pattern for all objects. For example, in the same tenant:
The user object for Adele can have an open extension named socialSettings that
has three properties: linkedInProfile, skypeId, and xboxGamertag.
The user object for Bruno can have no open extension property.
The user object for Alex can have an open extension named socialSettings with five
properties: theme, color, language, font, and fontSize.
Additionally, open extension properties can have any valid JSON structure.
HTTP
HTTP
POST https://graph.microsoft.com/v1.0/users/3fbd929d-8c56-4462-851e-
0eb9a7b3a2a5/extensions
{
"@odata.type": "#microsoft.graph.openTypeExtension",
"extensionName": "com.contoso.socialSettings",
"skypeId": "skypeId.AdeleV",
"linkedInProfile": "www.linkedin.com/in/testlinkedinprofile",
"xboxGamerTag": "AwesomeAdele",
"id": "com.contoso.socialSettings"
}
The request returns a 201 Created response code and an openTypeExtension object in
the response body.
To update an open extension, you must specify all its properties in the request body.
Otherwise, the unspecified properties are deleted from the open extension. You can
however explicitly set a property to null to retain it in the open extension.
The following request specifies only the linkedInProfile and xboxGamerTag properties.
The value of the xboxGamerTag property is being updated while the linkedInProfile
property remains the same. This request also deletes the unspecified skypeId property.
HTTP
HTTP
PATCH https://graph.microsoft.com/v1.0/users/3fbd929d-8c56-4462-851e-
0eb9a7b3a2a5/extensions/com.contoso.socialSettings
{
"xboxGamerTag": "FierceAdele",
"linkedInProfile": "www.linkedin.com/in/testlinkedinprofile"
}
HTTP
msgraph
GET https://graph.microsoft.com/v1.0/users/3fbd929d-8c56-4462-851e-
0eb9a7b3a2a5/extensions/com.contoso.socialSettings
{
"@odata.context":
"https://graph.microsoft.com/beta/$metadata#users('3fbd929d-8c56-4462-
851e-0eb9a7b3a2a5')/extensions/$entity",
"@odata.type": "#microsoft.graph.openTypeExtension",
"xboxGamerTag": "FierceAdele",
"linkedInProfile": "www.linkedin.com/in/testlinkedinprofile",
"id": "com.contoso.socialSettings"
}
ノ Expand table
properties and
data
7 Note
1
Due to an existing service limitation, delegates cannot create open extension-
appended events in shared mailbox calendars. Attempts to do so will result in an
ErrorAccessDenied response.
2
These limits on open extensions apply to the following directory resources: user,
group, device, and organization.
3 Each open extension is stored in a MAPI named property, which are a limited
resource in a user's mailbox. This limit applies to the following Outlook resources:
message, event, and contact
You can manage all extensions when you're signed in with a work or school
account. Additionally, you can manage open extensions for the following resources
when signed-in with a personal Microsoft account: event, post, group, message,
contact, and user.
Related content
Tutorial: Add custom data to users using open extensions
Tutorial: Add custom data to groups using schema extensions
Feedback
Was this page helpful? Yes No
Frontline workers account for over 80 percent of the global workforce. Yet because of
high scale, rapid turnover, and fragmented processes, frontline workers often lack the
tools to make their demanding jobs a little easier. Frontline worker management brings
digital transformation to the entire frontline workforce. The workforce might include
managers, frontline workers, operations, and IT.
SMS authentication
My Staff also enables frontline managers to register their team members' phone
numbers for SMS sign-in. In many verticals, frontline workers maintain a local username
and password combination, a solution that is often cumbersome, expensive, and error-
prone. When IT enables authentication using SMS sign-in, frontline workers can sign in
with single sign-on (SSO) for Microsoft Teams and other applications using just their
phone number and a one-time passcode (OTP) sent via SMS. Single sign-on makes
signing in for frontline workers simple and secure, delivering quick access to the apps
they need most.
QR code authentication (preview)
QR code authentication provides a fast and cost-effective way to sign in, improving
productivity and offering a seamless experience for frontline workers. This method uses
a QR code and a user-defined 8-digit PIN. You use the QR code and PIN together to
sign in to a device or application.
The QR code includes a User Principal Name (UPN), tenant ID, and a secret key. You set
the PIN, which replaces the default temporary PIN assigned by the administrator. The
PIN works only with the QR code and not with other identifiers like UPN or phone
numbers. You also can't use the QR code without the PIN.
The QR code authentication method offers two main advantages for frontline workers
compared to traditional methods:
Faster sign-in: QR code authentication eliminates the need for usernames and
passwords, which benefits users who are less tech-savvy or have accessibility
challenges. Scanning a QR code reduces login time by about two seconds,
enhancing worker productivity. It also decreases IT tickets related to forgotten
usernames, as users don't need to remember them for sign-in.
Learn more about QR code authentication and how to enable it for your organization.
Shared devices for frontline workers
Frontline managers can also use Managed Home Screen (MHS) application to allow
workers to have access to a specific set of applications on their Intune-enrolled Android
dedicated devices. The dedicated devices are enrolled with Microsoft Entra shared
device mode. When configured in multiapp kiosk mode in the Microsoft Intune admin
center, MHS is automatically launched as the default home screen on the device and
appears to the end user as the only home screen. To learn more, see how to configure
the Microsoft Managed Home Screen app for Android Enterprise.
Next steps
For more information on delegated user management, see My Staff user
documentation .
To learn more about the frontline worker persona, see this article.
Feedback
Was this page helpful? Yes No