<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Microsoft Entra topics</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/microsoft-entra</link>
    <description>Microsoft Entra topics</description>
    <pubDate>Sat, 25 Apr 2026 18:06:29 GMT</pubDate>
    <dc:creator>microsoft-entra</dc:creator>
    <dc:date>2026-04-25T18:06:29Z</dc:date>
    <item>
      <title>'Registering user becomes local admin on Joined Devices' - WHAT</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/registering-user-becomes-local-admin-on-joined-devices-what/m-p/4513794#M10317</link>
      <description>&lt;P&gt;Stumbled on a tenant with 'JOIN' available for all users. Haven't worked with this much - most tenants I see only have registration. But then I noticed the horrifying 'Registering user is added as local administrator on the device during Microsoft Entra join' option was ALSO set to ALL.&lt;/P&gt;&lt;img /&gt;&lt;P&gt;This is a tenant we just took on, but I've never seen that control before. This is terrifying, considering AFAIK, there is no real way for a registering user to know if they're registering or joining. Beneath it is an option to 'Manage Additional local administrators on all Microsoft Entra joined devices', which leads to the Role page for Device Administrators, which is empty.&lt;/P&gt;&lt;img /&gt;&lt;P&gt;Under Description, this describes what APPEARS to be to be the same thing mentioned in the previous control - 'Users with this role become local machine administrators on all Windows 10 devices that are joined to Microsoft Entra'. But no one is assigned this.&lt;/P&gt;&lt;img /&gt;&lt;P&gt;Conveniently, on my own tenant, I happened to let someone JOIN yesterday. We have this limited to 2 (now 3) people - most just register... But this user Joined, and the 'Joining user becomes local admin' option was on ALL. But I can't validate that the user ever become local admin. They don't have the role, their device shows as joined, but there's no additional roles. The audit logs don't look weird. They're not in that 'Device Administrators' group, which describes itself as 'Users with this role become local machine administrators on all Windows 10 devices that are joined to Microsoft Entra'.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thoughts? Freaking out, honestly. We have a mix of DC and Cloud users. I've inherited them all, and had the understanding that Join was essentially registration but with Org ownership. I've tried to get some input from Copilot, but he has basically waffled between 'No, this setting is just badly named' and 'no, actually it's this other setting' and 'no, you know what, it all makes sense somehow'.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Does that option actually set the joining user as global admin? Is that really the default setting?&lt;/P&gt;&lt;P&gt;2. can you validate this ANYWHERE in Entra? Or does it just disappear?&lt;/P&gt;&lt;P&gt;3. what is that Device Admin group? A separate group, independent of these two settings, that gives local admin?&lt;/P&gt;&lt;P&gt;4. Is there a graph endpoint that can be used to set this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Apr 2026 20:22:52 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/registering-user-becomes-local-admin-on-joined-devices-what/m-p/4513794#M10317</guid>
      <dc:creator>underQualifried</dc:creator>
      <dc:date>2026-04-22T20:22:52Z</dc:date>
    </item>
    <item>
      <title>MFA Options for Employees without Phones</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/mfa-options-for-employees-without-phones/m-p/4511579#M10310</link>
      <description>&lt;P&gt;Hello everbody,&lt;/P&gt;&lt;P&gt;we're currently trying to implement MFA in our company, but approximately 1/10 of our employees have a workphone and are not allowed to use their personal phone.&lt;/P&gt;&lt;P&gt;Since we also recently introduced Intune, the idea was to just use&amp;nbsp;&lt;STRONG&gt;Windows Hello for Business,&amp;nbsp;&lt;/STRONG&gt;but when trying to provision it, we realized that you need to have MFA active for an account to be able to even activate it? Which kinda defeats the purpose.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So my question is, is there some way to circumvent the MFA requirement for WHfB? Or what other options do we realistically have?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in Advance!&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 12:00:35 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/mfa-options-for-employees-without-phones/m-p/4511579#M10310</guid>
      <dc:creator>FabianUni</dc:creator>
      <dc:date>2026-04-15T12:00:35Z</dc:date>
    </item>
    <item>
      <title>Hybrid Join Lifecycle Model</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/hybrid-join-lifecycle-model/m-p/4511150#M10309</link>
      <description>&lt;P&gt;Microsoft Entra hybrid join is still a common reality in enterprise environments.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For many organizations, it remains necessary because legacy applications still rely on Active Directory machine authentication, Group Policy is still in use, and on-premises operational dependencies have not fully been retired. At the same time, the long-term direction for endpoint identity is increasingly cloud-native.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That creates an important architectural question:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Should hybrid join be treated as a permanent device state, or as a lifecycle stage in a broader modernization journey?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In practice, hybrid join is often discussed as a binary condition: the device is either hybrid joined or it is not. But from an operational perspective, that view is too limited.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In real enterprise environments, hybrid join behaves much more like a lifecycle.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A device moves through provisioning, registration, trust establishment, management attachment, steady-state operation, recovery, retirement, and eventually transition.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That distinction matters because most hybrid join issues do not fail loudly. They usually appear as stale objects, pending registrations, broken trust, inconsistent management ownership, and environments that remain temporarily hybrid far longer than intended.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Why a lifecycle model is useful&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Treating hybrid join as a lifecycle helps explain why so many organizations struggle with it even when the initial implementation appears technically correct.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The challenge is usually not the first successful join. The challenge is everything that happens around it:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Provisioning quality&lt;/LI&gt;&lt;LI&gt;Trust validation&lt;/LI&gt;&lt;LI&gt;Management ownership&lt;/LI&gt;&lt;LI&gt;Drift detection&lt;/LI&gt;&lt;LI&gt;Stale object cleanup&lt;/LI&gt;&lt;LI&gt;Exit criteria for transition to Entra join&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Without that lifecycle view, hybrid join often becomes a static design decision with no clear operational model behind it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The eight phases&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1. Provisioning&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The lifecycle starts when the device is built, imaged, or provisioned.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This stage is more important than it looks. If the device is provisioned from a contaminated image, or if cloning and snapshot practices are not handled carefully, later identity issues are often inherited rather than newly created.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Provisioning should be treated as an identity-controlled event, not just an OS deployment task.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2. Registration&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The device becomes known to Microsoft Entra.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is where many environments confuse visibility with readiness. A device object may exist in the cloud, but that does not automatically mean the hybrid identity state is healthy or operationally usable.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;3. Trust Establishment&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the point where hybrid join becomes real.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A device should not be considered fully onboarded until both sides of trust are present and healthy. In operational terms, this means the device is not only registered, but also capable of supporting the expected sign-in and identity flows.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;4. Management Attachment&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once trust exists, governance becomes the next question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many organizations still balance Group Policy, Configuration Manager, Intune, and legacy application dependencies at the same time. That is exactly why hybrid join often persists.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But if management ownership is not clearly defined, organizations end up with overlapping policy planes, inconsistent control, and unclear accountability.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;5. Operational Steady State&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hybrid join does not stop at successful registration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The device must remain healthy over time, and that means monitoring trust health, registration state, token health, line-of-sight to required infrastructure, and management consistency.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A device that was healthy once is not necessarily healthy now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;6. Recovery&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Every real environment eventually encounters drift.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pending states, broken trust, orphaned records, reimaged devices, and inconsistent registration scenarios should not be treated as unusual edge cases. They should be expected and handled with formal recovery playbooks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Recovery is not an exception to the lifecycle. It is part of the lifecycle.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;7. Retirement&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Retirement is one of the weakest areas in many hybrid environments.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Devices are replaced or decommissioned, but their identity records often remain behind. That leads to stale objects, inventory noise, and administrative confusion.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A proper lifecycle model should include a controlled retirement sequence rather than ad hoc cleanup.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;8. Transition&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the most important strategic phase.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The key question is no longer whether a device can remain hybrid joined, but whether there is still a justified reason to keep it there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hybrid join may still be necessary in many environments today, but in many cases it should be treated as transitional architecture rather than the target end state.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Practical takeaway&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking at hybrid join as a lifecycle creates a more useful framework for architecture decisions, operational ownership, troubleshooting, directory hygiene, governance, and transition planning toward Microsoft Entra join.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That is the real value of this model.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It does not replace technical implementation guidance, but it helps organizations think more clearly about why hybrid join exists, how it should be operated, and when it should eventually be retired.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Final thought&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Hybrid join is still relevant in many enterprise environments, but it should not automatically be treated as a default destination.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In many cases, it works best when it is managed as a lifecycle-driven operating model with defined phases, controls, and exit criteria.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That makes it easier to stabilize operations today, while also creating a clearer path toward a more cloud-native endpoint identity model tomorrow.&lt;/P&gt;&lt;P class="lia-align-left"&gt;Full article:&lt;/P&gt;&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;&lt;a class="lia-embeded-content lia-rich-preview-card-container" href="https://www.modernendpoint.tech/hybrid-join-lifecycle-model" aria-label="Hybrid Join Lifecycle Model" target="_blank" rel="nofollow noopener noreferrer"&gt;&lt;img class="lia-rich-preview-card-image" role="presentation" alt="" src="https://storage.ghost.io/c/18/07/18075d62-c435-4588-bde1-d440868fbdab/content/images/size/w1200/2026/04/ChatGPT-Image-Apr-14--2026--04_40_06-PM.png" /&gt;&lt;div class="lia-rich-preview-card-content"&gt;&lt;div class="lia-rich-preview-card-header"&gt;&lt;h5&gt;Hybrid Join Lifecycle Model&lt;/h5&gt;&lt;/div&gt;&lt;p class="lia-rich-preview-card-description"&gt;Microsoft Entra · Device Identity Hybrid Join Lifecycle Model Hybrid join is not a destination - it is a lifecycle stage. Understanding each phase, from provisioning to retirement, is what separates a stable identity posture from an environment full of stale objects, broken trust, and unresolved dependencies.&lt;/p&gt;&lt;div class="lia-rich-preview-card-provider-name"&gt;&lt;img src="https://storage.ghost.io/c/18/07/18075d62-c435-4588-bde1-d440868fbdab/content/images/size/w256h256/2026/02/ChatGPT-Image-Feb-20--2026--01_59_23-PM-1-1.png" aria-hidden="true" /&gt;www.modernendpoint.tech&lt;/div&gt;&lt;/div&gt;&lt;/a&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2026 11:32:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/hybrid-join-lifecycle-model/m-p/4511150#M10309</guid>
      <dc:creator>Menahem</dc:creator>
      <dc:date>2026-04-14T11:32:08Z</dc:date>
    </item>
    <item>
      <title>Advice required for temp / agency staff</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/advice-required-for-temp-agency-staff/m-p/4510876#M10307</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;I hope you are well.&lt;/P&gt;&lt;P&gt;Anyway, I'm hoping someone can point me in the right direction.&lt;/P&gt;&lt;P&gt;We have Android devices in Entra Shared Device Mode (Multi App) which any of our employees with a valid UPN can logon to.&lt;/P&gt;&lt;P&gt;All good there.&lt;/P&gt;&lt;P&gt;What we need is a solution for temporary or agency staff. This would be staff that could be called on at very short notice and may not stay around for long.&lt;/P&gt;&lt;P&gt;For security and audit reasons, we'd rather not create "userless" accounts.&lt;/P&gt;&lt;P&gt;Is there anything in Entra / Entra Shared Device Mode that can achieve this?&lt;/P&gt;&lt;P&gt;Info greatly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SK&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 15:05:38 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/advice-required-for-temp-agency-staff/m-p/4510876#M10307</guid>
      <dc:creator>StuartK73</dc:creator>
      <dc:date>2026-04-13T15:05:38Z</dc:date>
    </item>
    <item>
      <title>Understand Why a Service Principal Was Created in Your Entra Tenant</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/understand-why-a-service-principal-was-created-in-your-entra/m-p/4509863#M10305</link>
      <description>&lt;P&gt;Are you a tenant admin or member of a security team in your organization and find yourself asking “Why was this service principal created in our tenant?”&lt;/P&gt;
&lt;P&gt;Historically, answering this required correlating audit logs with Microsoft Graph queries or going through long investigations. Microsoft Entra now introduces enhanced audit log properties that make it significantly easier to understand the origin and intent behind newly created service principals directly from tenant audit logs. These new improvements surface additional insights within the&amp;nbsp;&lt;STRONG&gt;Add service principal&lt;/STRONG&gt; activity under the &lt;STRONG&gt;ApplicationManagement&lt;/STRONG&gt; category—helping administrators determine whether a service principal was provisioned automatically by Microsoft services, triggered by a purchased subscription, or explicitly created by user or application activity.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What’s in it for me as an Admins or member of the Security Team&lt;BR /&gt;&lt;/STRONG&gt;When a service principal is created, new metadata is now captured within Microsoft Entra audit logs that enables faster root‑cause analysis. These properties help distinguish between Microsoft‑driven provisioning processes and tenant‑initiated actions, allowing teams to quickly assess whether an event is expected platform behavior or something requiring deeper investigation.&lt;/P&gt;
&lt;P&gt;For example, administrators can now:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Identify provisioning initiated by Microsoft services versus internal users or automation.&lt;/LI&gt;
&lt;LI&gt;Determine which tenant subscription or service plan enabled just‑in‑time provisioning.&lt;/LI&gt;
&lt;LI&gt;Recognize provisioning linked to Azure resource onboarding or managed identities.&lt;/LI&gt;
&lt;LI&gt;Investigate service principal creation without relying on additional Graph lookups.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;By leveraging these enriched audit logs, security teams can streamline investigations into newly created enterprise applications and reduce manual dependency on downstream data sources. This ultimately improves visibility into application onboarding events and supports faster decision‑making when assessing potential risk or unexpected provisioning activity within the tenant.&lt;/P&gt;
&lt;P&gt;Learn more here- &lt;A href="https://learn.microsoft.com/en-us/entra/identity/monitoring-health/understand-service-principal-creation-with-new-audit-log-properties" target="_blank"&gt;Understand why a service principal was created in your tenant - Microsoft Entra ID | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 08:22:36 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/understand-why-a-service-principal-was-created-in-your-entra/m-p/4509863#M10305</guid>
      <dc:creator>milgo</dc:creator>
      <dc:date>2026-04-09T08:22:36Z</dc:date>
    </item>
    <item>
      <title>Entra CBA Preview Bug: Issuer Scoping Policy fails group claim (AADSTS500191)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/entra-cba-preview-bug-issuer-scoping-policy-fails-group-claim/m-p/4508663#M10300</link>
      <description>&lt;P&gt;I am deploying a zero-trust, cloud-native Certificate-Based Authentication (CBA) architecture for a break-glass emergency access account in Microsoft Entra ID. I am intentionally bypassing Intune/MDM to prevent circular dependencies during an outage.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The PKI is generated via OpenSSL (Offline Root CA -&amp;gt; Client Cert). The cryptography is flawless:&lt;/P&gt;&lt;P&gt;- The OpenSSL chain verifies perfectly (openssl verify -CAfile...).&lt;/P&gt;&lt;P&gt;- The Root SKI and Client AKI are a perfect 1:1 hex match.&lt;/P&gt;&lt;P&gt;- The client cert EKU includes TLS Web Client Authentication.&lt;/P&gt;&lt;P&gt;- The client cert SAN includes othername: UPN::[break-glass-UPN].&lt;/P&gt;&lt;P&gt;- The Root CA and CRL are uploaded to Entra and publicly accessible via Azure Blob Storage.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Issue:&lt;/P&gt;&lt;P&gt;When I attempt to restrict the Root CA using the "Certificate issuer scoping policy (Preview)" targeted to a specific Security Group (e.g., sg_cba), the TLS handshake drops and Entra throws:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Error: AADSTS500191: The certificate authority that issued your certificate has not been set up in the tenant.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Troubleshooting Performed:&lt;/P&gt;&lt;P&gt;1. Group Architecture: Verified via Microsoft Graph that the user is a direct, static member of sg_cba (Security Enabled, non-dynamic, not nested).&lt;/P&gt;&lt;P&gt;2. Micro-Group Bypass: Created a brand-new cloud-only micro-group with only the break-glass user. Waited for replication. Same 500191 error.&lt;/P&gt;&lt;P&gt;3. The Control Test (Success): If I completely remove the Preview scoping policy and move the targeting to the Generally Available (GA) tenant-wide trust ("All Users"), the login succeeds immediately. (I am securing this via High-Affinity binding matching the SKI to CertificateUserIDs).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Ask:&lt;/P&gt;&lt;P&gt;Because the tenant-wide GA policy works perfectly, it mathematically proves the certificates, CRL, and bindings are correct. The failure is entirely isolated to the Preview scoping engine failing to correlate the incoming certificate to the Security Group claim fast enough.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Has anyone successfully deployed the "Certificate issuer scoping policy (Preview)" using a targeted security group without it dropping the trust?&lt;/P&gt;&lt;P&gt;- Are there undocumented constraints on group evaluation during the CBA TLS handshake that cause this Preview feature to fail closed?&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2026 14:46:33 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/entra-cba-preview-bug-issuer-scoping-policy-fails-group-claim/m-p/4508663#M10300</guid>
      <dc:creator>alejlw</dc:creator>
      <dc:date>2026-04-04T14:46:33Z</dc:date>
    </item>
    <item>
      <title>Introducing the Entra Helpdesk Portal: A Zero-Trust, Dockerized ITSM Interface for Tier 1 Support</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/introducing-the-entra-helpdesk-portal-a-zero-trust-dockerized/m-p/4508385#M10299</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;If you manage identity in Microsoft Entra ID at an enterprise scale, you know the struggle: delegating day-to-day operational tasks (like password resets, session revocations, and MFA management) to Tier 1 and Tier 2 support staff is inherently risky.&lt;/P&gt;&lt;P&gt;The native Azure/Entra portal is incredibly powerful, but it’s complex and lacks mandatory ITSM enforcement. Giving a helpdesk technician the "Helpdesk Administrator" role grants them access to a portal where a single misclick can cause a major headache.&lt;/P&gt;&lt;P&gt;To solve this, I’ve developed the &lt;STRONG&gt;Entra Helpdesk Portal (Community Edition)&lt;/STRONG&gt;—an open-source, containerized application designed to act as an isolated "airlock" between your support team and your Entra ID tenant.&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;STRONG&gt;Why This Adds Value to Your Tenant&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Instead of having technicians log into the Azure portal, they log into this clean, Material Design web interface. It leverages a backend Service Principal (using MSAL and the Graph API) to execute commands on their behalf.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;Strict Zero Trust:&lt;/STRONG&gt; Logging in via Microsoft SSO isn’t enough. The app intercepts the token and checks the user’s UPN against a hardcoded ALLOWED_ADMINS whitelist in your Docker environment file.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Mandatory ITSM Ticketing:&lt;/STRONG&gt; You cannot enforce ticketing in the native Azure Portal. In this app, every write action prompts a modal requiring a valid ticket number (e.g., INC-123456).&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Local Audit Logging:&lt;/STRONG&gt; All actions, along with the actor, timestamp, and ticket number, are written to an immutable local SQLite database (audit.db) inside the container volume.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Performance:&lt;/STRONG&gt; Heavy Graph API reads are cached in-memory with a Time-To-Live (TTL) and smart invalidation. Searching for users or loading Enterprise Apps takes milliseconds.&lt;/LI&gt;&lt;/OL&gt;&lt;img /&gt;&lt;P&gt;&lt;STRONG&gt;What Can It Do?&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Identity Lifecycle:&lt;/STRONG&gt; Create users, auto-generate secure 16-character passwords, revoke sign-in sessions, reset passwords, and delete specific MFA methods to force re-registration.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Diagnostics:&lt;/STRONG&gt; View a user's last 5 sign-in logs, translating Microsoft error codes into plain English.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Group Management:&lt;/STRONG&gt; Add/remove members to Security and M365 groups.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;App/SPN Management:&lt;/STRONG&gt; Lazy-load raw requiredResourceAccess Graph API payloads to audit app permissions, and instantly rotate client secrets.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Universal Restore:&lt;/STRONG&gt; Paste the Object ID of &lt;EM&gt;any&lt;/EM&gt; soft-deleted item into the Recycle Bin tab to instantly resurrect it.&lt;/LI&gt;&lt;/UL&gt;&lt;img /&gt;&lt;P&gt;&lt;STRONG&gt;How Easy Is It to Setup?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I wanted this to be universally deployable, so I compiled it as a multi-architecture Docker image (linux/amd64 and linux/arm64). It will run on a massive Windows Server or a simple Raspberry Pi.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Setup takes less than 5 minutes:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Create an App Registration in Entra ID and grant it the necessary Graph API Application Permissions (e.g., User.ReadWrite.All, AuditLog.Read.All).&lt;/LI&gt;&lt;LI&gt;Create a docker-compose.yml file.&lt;/LI&gt;&lt;LI&gt;Define your feature toggles. You can literally turn off features (like User Deletion) by setting an environment variable to false.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="yaml"&gt;version: '3.8'

services:
  helpdesk-portal:
    image: jahmed22/entra-helpdesk:latest
    container_name: entra_helpdesk
    restart: unless-stopped
    ports:
      - "8000:8000"
    environment:
      # CORE IDENTITY
      - TENANT_ID=your_tenant_id_here
      - CLIENT_ID=your_client_id_here
      - CLIENT_SECRET=your_client_secret_here
      - BASE_URL=https://entradesk.jahmed.cloud
      - ALLOWED_ADMINS=email address removed for privacy reasons
      
      # CUSTOMIZATION &amp;amp; FEATURE FLAGS
      - APP_NAME=Entra Help Desk
      - ENABLE_PASSWORD_RESET=true
      - ENABLE_MFA_MANAGEMENT=true
      - ENABLE_USER_DELETION=false
      - ENABLE_GROUP_MANAGEMENT=true
      - ENABLE_APP_MANAGEMENT=true

    volumes:
      - entra_helpdesk_data:/app/static/uploads
      - entra_helpdesk_db:/app

volumes:
  entra_helpdesk_data:
  entra_helpdesk_db:&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;4.Run docker compose up -d and you are done!&lt;/P&gt;&lt;P&gt;I built this to give back to the community and help secure our Tier 1 operations. If you are interested in testing it out in your dev tenants or want to see the full architecture breakdown, you can read the complete documentation on my website &lt;A class="lia-external-url" href="https://github.com/jahmed-cloud/entra-helpdesk" target="_blank"&gt;here&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I’d love to hear your thoughts, feedback, or any feature requests you might have!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2026 09:46:13 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/introducing-the-entra-helpdesk-portal-a-zero-trust-dockerized/m-p/4508385#M10299</guid>
      <dc:creator>jahmed_cloud</dc:creator>
      <dc:date>2026-04-03T09:46:13Z</dc:date>
    </item>
    <item>
      <title>Entra ID Private Access - data flow</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/entra-id-private-access-data-flow/m-p/4505180#M10292</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am successfully testing Entra Private Access. From outside, I can easily access my shared permissions.&lt;/P&gt;&lt;P&gt;However, I have one more question. What happens if I my device on the internal network? If I access the shares directly, I get about 1GB/s. What happens if the "Global Secure Access" client is active? Do all the data go through the Entra portal, or just the authentication? If all the data go through the Entra portal, there could be challenges with the internet connection (all data in and out).&lt;/P&gt;&lt;P&gt;Thank you for your support&lt;/P&gt;&lt;P&gt;Stefan&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2026 13:47:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/entra-id-private-access-data-flow/m-p/4505180#M10292</guid>
      <dc:creator>Stefan31</dc:creator>
      <dc:date>2026-03-24T13:47:12Z</dc:date>
    </item>
    <item>
      <title>Challenges with custom data provided resource reviews</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/challenges-with-custom-data-provided-resource-reviews/m-p/4503076#M10291</link>
      <description>&lt;P&gt;I was thrilled to see the ability to review disconnected applications in Entra, and even more thrilled to see that the permission and its description are available to the reviewer, which addresses a significant gap present in group-based reviews.&lt;/P&gt;&lt;P&gt;However, the current decision-tracking approach does not adequately replicate the closed-loop remediation model typically found in traditional IGA access reviews for integrated applications.&lt;/P&gt;&lt;P&gt;Requiring reviewers to upload confirmation that revocations have been completed is problematic. This approach does not mitigate the core risk: access may remain in place due to fulfillment errors or be incorrectly retained, and the reviewer may unknowingly validate an inaccurate state. This can lead to a compliance incident or audit finding.&lt;/P&gt;&lt;P&gt;A more effective solution would allow reviewers to upload a current export of access data, enabling the review system to reconcile intended revocations against the actual state. Any discrepancies could then be flagged for remediation where revocations were missed or have failed, or for validation where access was revoked and immediately reinstated (e.g., due to reviewer misjudgement), ideally supported by corresponding ticketing or justification.&lt;/P&gt;&lt;P&gt;There are currently a lot of gaps in Entra ID access reviews, and while this new feature arguably resolved the worst one, I think it's headed down the wrong path.&lt;/P&gt;&lt;P&gt;I am curious about other people's thoughts.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Mar 2026 18:53:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/challenges-with-custom-data-provided-resource-reviews/m-p/4503076#M10291</guid>
      <dc:creator>ritmo2k</dc:creator>
      <dc:date>2026-03-17T18:53:12Z</dc:date>
    </item>
    <item>
      <title>Entra ID Object Drift – Are We Measuring Tenant Health Correctly?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/entra-id-object-drift-are-we-measuring-tenant-health-correctly/m-p/4500717#M10286</link>
      <description>&lt;P&gt;In many enterprise environments:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Secure Score is green.&lt;/P&gt;&lt;P&gt;Compliance dashboards look healthy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yet directory object inconsistency silently accumulates.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Stale devices.&lt;/P&gt;&lt;P&gt;Hybrid join remnants.&lt;/P&gt;&lt;P&gt;Intune orphan records.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Over time, this becomes governance debt.&lt;/P&gt;&lt;P&gt;In large tenants this often leads to inaccurate compliance reporting and Conditional Access targeting issues.&lt;/P&gt;&lt;P&gt;I recently wrote a breakdown of:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;• Entra ID drift patterns&lt;/P&gt;&lt;P&gt;• Hybrid join inconsistencies&lt;/P&gt;&lt;P&gt;• Intune orphan objects&lt;/P&gt;&lt;P&gt;• Lifecycle-based cleanup architecture&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Curious how others approach object hygiene at scale.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Full article:&lt;/P&gt;&lt;P&gt;&lt;A class="lia-external-url" href="https://www.modernendpoint.tech/entra-id-cleanup-patterns/?utm_source=techcommunity&amp;amp;utm_medium=social&amp;amp;utm_campaign=entra_cleanup_launch&amp;amp;utm_content=discussion" target="_blank" rel="noopener" data-lia-auto-title-active="1"&gt;https://www.modernendpoint.tech/entra-id-cleanup-patterns&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One pattern I keep seeing is duplicate device identities after re-enrollment or Autopilot reset.&lt;/P&gt;&lt;P&gt;Curious how others handle lifecycle cleanup in large Entra ID environments.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 05:35:20 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/entra-id-object-drift-are-we-measuring-tenant-health-correctly/m-p/4500717#M10286</guid>
      <dc:creator>Menahem</dc:creator>
      <dc:date>2026-03-10T05:35:20Z</dc:date>
    </item>
    <item>
      <title>Cloud Kerberos Trust with 1 AD and 6 M365 Tenants?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/cloud-kerberos-trust-with-1-ad-and-6-m365-tenants/m-p/4499034#M10278</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we would like to enable Cloud Kerberos Trust on hybrid joined devices ( via Entra connect sync)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In our local AD wie have 6 OUs and users and devices from each OU have a seperate SCP to differnt M365 Tenants. I found this Article to configure&amp;nbsp; the Cloud Kerberos Trust .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;Set-AzureADKerberosServer&lt;/P&gt;&lt;P&gt;1&lt;/P&gt;&lt;P&gt;2&lt;/P&gt;&lt;P&gt;The Set-AzureADKerberosServer PowerShell cmdlet is used to configure a Microsoft Entra (formerly Azure AD) Kerberos server object. This enables seamless Single Sign-On (SSO) for on-premises resources using modern authentication methods like FIDO2 security keys or Windows Hello for Business.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Steps to Configure the Kerberos Server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Prerequisites&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ensure your environment meets the following: Devices must run Windows 10 version 2004 or later. Domain Controllers must run Windows Server 2016 or later. Install the AzureADHybridAuthenticationManagement module: [Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor [Net.SecurityProtocolType]::Tls12 Install-Module -Name AzureADHybridAuthenticationManagement -AllowClobber&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Create the Kerberos Server Object&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Run the following PowerShell commands to create and publish the Kerberos server object:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Prompt for All Credentials:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;$domain = $env:USERDNSDOMAIN&lt;/P&gt;&lt;P&gt;$cloudCred = Get-Credential -Message 'Enter Azure AD Hybrid Identity Administrator credentials'&lt;/P&gt;&lt;P&gt;$domainCred = Get-Credential -Message 'Enter Domain Admin credentials'&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Set-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred -DomainCredential $domainCred&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I understand the process, a object is created in local AD when running&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Set-AzureADKerberosServer&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What happens, if I run the command multiple times, for each OU/Tenant. Does this ovveride the object, or does it create a new objects?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 13:32:22 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/cloud-kerberos-trust-with-1-ad-and-6-m365-tenants/m-p/4499034#M10278</guid>
      <dc:creator>heinzelrumpel</dc:creator>
      <dc:date>2026-03-03T13:32:22Z</dc:date>
    </item>
    <item>
      <title>Priority between CIDR and FQDN rules in Microsoft Entra Private Access (GSA)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/priority-between-cidr-and-fqdn-rules-in-microsoft-entra-private/m-p/4498150#M10272</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question about prioritization between CIDR and FQDN rules in Microsoft Entra Private Access (GSA) Question: Hello everyone, I have a question about how rules are prioritized in Microsoft Entra Private Access (Global Secure Access). In my environment, I configured the following: I created an Enterprise Application using a broad CIDR range (10.10.0.0/16) to represent the entire data center. Within the same environment, I created other Enterprise Applications using specific FQDNs ( app01.company.local, app02.company.local) with specific ports. All rules are in the same Forwarding Profile. I noticed that in the GSA client rules tab there is a “Priority” field, and apparently the rules are evaluated from top to bottom. My question is: When there is an overlap between a broad CIDR rule and a more specific FQDN-based rule, which one takes precedence? Is there some internal technical criterion (DNS resolution first, longest prefix match,), or is the evaluation purely based on the order displayed? Is there a risk that the CIDR rule will capture traffic before the FQDN rule and impact granular access control? I want to make sure my architecture is correct before expanding its use to production. Could someone clarify the actual technical behavior of this prioritization?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 28 Feb 2026 14:27:17 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/priority-between-cidr-and-fqdn-rules-in-microsoft-entra-private/m-p/4498150#M10272</guid>
      <dc:creator>Kandrik</dc:creator>
      <dc:date>2026-02-28T14:27:17Z</dc:date>
    </item>
    <item>
      <title>Priority Handling in GSA Client Forwarding Profile Rules</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/priority-handling-in-gsa-client-forwarding-profile-rules/m-p/4497712#M10266</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I would like to provide feedback and propose a functional improvement regarding &lt;STRONG&gt;priority control for forwarding rules in Global Secure Access (GSA)&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;In our environment, we are using &lt;STRONG&gt;Microsoft Entra Private Access&lt;/STRONG&gt; with a combination of &lt;STRONG&gt;CIDR-based rules&lt;/STRONG&gt; and &lt;STRONG&gt;FQDN-based rules&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;We understand that it is not possible to create Enterprise Applications with overlapping IP address ranges. Based on this limitation, our current operational model is as follows:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Administrators create Enterprise Applications using &lt;STRONG&gt;CIDR ranges&lt;/STRONG&gt; that broadly cover entire datacenter networks.&lt;/LI&gt;&lt;LI&gt;Access for application owners to &lt;STRONG&gt;specific servers and ports&lt;/STRONG&gt; is defined using &lt;STRONG&gt;FQDN-based rules&lt;/STRONG&gt;.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;With this type of configuration, when reviewing the list of rules shown in the &lt;STRONG&gt;GSA Client → Forwarding Profile → Rules&lt;/STRONG&gt; tab, we can see that each rule is assigned a &lt;STRONG&gt;Priority&lt;/STRONG&gt;, and the rules appear to be evaluated sequentially from top to bottom.&lt;/P&gt;&lt;P&gt;From this behavior, it is clear that:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;DNS rules are evaluated first&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Enterprise Application rules are evaluated next&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Quick Access rules are evaluated last&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;However, between &lt;STRONG&gt;CIDR-based Enterprise Application rules&lt;/STRONG&gt; and &lt;STRONG&gt;FQDN-based Enterprise Application rules&lt;/STRONG&gt;, there does not appear to be a clear or explicit priority model. Instead, the position — and therefore the evaluation order — seems to depend on &lt;STRONG&gt;the order in which the Enterprise Applications were created&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;As a result, even when we intend to apply a more specific &lt;STRONG&gt;FQDN-based rule for a particular host&lt;/STRONG&gt;, the broader &lt;STRONG&gt;CIDR-based administrative rule&lt;/STRONG&gt; may be evaluated first. In such cases, access can be unintentionally blocked, preventing us from achieving the intended access control behavior.&lt;/P&gt;&lt;P&gt;After understanding this mechanism, we have been working around the issue by carefully controlling the &lt;STRONG&gt;creation order&lt;/STRONG&gt; of Enterprise Applications — creating host-specific FQDN-based applications first, followed by broader CIDR-based rules. While this approach avoids the issue, it significantly increases administrative complexity and makes long-term management more difficult.&lt;/P&gt;&lt;P&gt;Based on this experience, we would strongly appreciate enhancements such as:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The ability to &lt;STRONG&gt;manually control rule evaluation order in the UI&lt;/STRONG&gt;, or&lt;/LI&gt;&lt;LI&gt;More intelligent and predictable &lt;STRONG&gt;automatic prioritization between FQDN-based and CIDR-based rules&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Such improvements would greatly enhance usability, predictability, and maintainability of GSA forwarding rule configurations.&lt;/P&gt;&lt;P&gt;Thank you for considering this feedback.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Feb 2026 02:50:53 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/priority-handling-in-gsa-client-forwarding-profile-rules/m-p/4497712#M10266</guid>
      <dc:creator>Shuji_Noguchi</dc:creator>
      <dc:date>2026-02-27T02:50:53Z</dc:date>
    </item>
    <item>
      <title>PIM</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/pim/m-p/4497216#M10263</link>
      <description>&lt;P&gt;Hello, everyone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need some help. We already use PIM for Just-in-Time activation of administrative functions in Entra ID, but we would like something more granular. For example, we want certain administrative actions in Microsoft 365, such as accessing sensitive data or performing critical tasks, to only be possible upon specific request and approval, even if the user has already activated the function in PIM. Is this only possible with PIM, or is there another feature in Microsoft 365 for this type of control?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2026 02:34:05 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/pim/m-p/4497216#M10263</guid>
      <dc:creator>Fernando-Ribeiro</dc:creator>
      <dc:date>2026-02-26T02:34:05Z</dc:date>
    </item>
    <item>
      <title>PIM</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/pim/m-p/4497213#M10262</link>
      <description>&lt;P&gt;Hello, everyone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need some help. We already use PIM for Just-in-Time activation of administrative functions in Entra ID, but we would like something more granular. For example, we want certain administrative actions in Microsoft 365, such as accessing sensitive data or performing critical tasks, to only be possible upon specific request and approval, even if the user has already activated the function in PIM. Is this only possible with PIM, or is there another feature in Microsoft 365 for this type of control?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2026 02:14:04 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/pim/m-p/4497213#M10262</guid>
      <dc:creator>Fernando-Ribeiro</dc:creator>
      <dc:date>2026-02-26T02:14:04Z</dc:date>
    </item>
    <item>
      <title>Federating Two Domains to Single Google Workspace Org — IssuerUri Conflict</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/federating-two-domains-to-single-google-workspace-org-issueruri/m-p/4496785#M10259</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Problem:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I'm federating two custom domains (domainA.com and domainB.com) in the same Entra tenant to Google Workspace as the IdP using New-MgDomainFederationConfiguration. Cloud-only tenant, no on-premises AD.&lt;/P&gt;&lt;P&gt;domainA.com works perfectly. When attempting to federate domainB.com, I get:&lt;/P&gt;&lt;P&gt;409 Conflict — Request_MultipleObjectsWithSameKeyValue&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Root cause:&lt;/STRONG&gt; Both domains are in the same Google Workspace org. Google always sends the same IssuerUri in every SAML response regardless of which SAML app is used. Entra's global IssuerUri uniqueness constraint blocks the second domain.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Workarounds attempted:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Modified IssuerUri with unique query parameter — Google's SAML assertion still contains the original IssuerUri, Entra silently rejects it&lt;/LI&gt;&lt;LI&gt;Second Google SAML app — Google sends identical IdP Entity ID regardless&lt;/LI&gt;&lt;LI&gt;Google Legacy SSO profile with domain-specific issuer — only affects Google authentication, not Microsoft-initiated SAML flows&lt;/LI&gt;&lt;LI&gt;Beta Graph API — same constraints&lt;/LI&gt;&lt;LI&gt;MSOnline module — fails with Negotiate/forbidden error&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Questions:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Is there any supported way to federate two domains in the same tenant to the same Google Workspace org?&lt;/LI&gt;&lt;LI&gt;Is there a Graph API equivalent of the legacy -SupportMultipleDomain switch?&lt;/LI&gt;&lt;LI&gt;domainB.com also returns "No matching stub found. Please reset the federation" on every update attempt — is this a known backend issue?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;We have a support ticket open for 21 days with no engineer response.&lt;/P&gt;&lt;P&gt;Any help appreciated!&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2026 22:39:06 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/federating-two-domains-to-single-google-workspace-org-issueruri/m-p/4496785#M10259</guid>
      <dc:creator>microtech</dc:creator>
      <dc:date>2026-02-24T22:39:06Z</dc:date>
    </item>
    <item>
      <title>MFA catch-22 during onboarding due to registration policy</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/mfa-catch-22-during-onboarding-due-to-registration-policy/m-p/4495582#M10253</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are experiencing a catch-22 scenario during user onboarding related to MFA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;New users are required to install the Microsoft Authenticator app via our Company Portal. However, they are prompted to complete MFA registration before they can access or download anything from the Company Portal. Since they do not yet have the Authenticator app installed, they are effectively blocked from completing the MFA setup.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From our investigation, it appears that the Multi-Factor Authentication registration policy is enforcing MFA registration for new users. In our scenario, this creates a circular dependency.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have attempted to exclude our office network from MFA using Conditional Access, but this does not resolve the issue because the MFA registration policy is triggered before Conditional Access policies are evaluated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our questions:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Is there a recommended way to handle MFA onboarding in this type of scenario?&lt;/LI&gt;&lt;LI&gt;Can Conditional Access policies be used instead of the MFA registration policy for initial MFA enrollment?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 07:40:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/mfa-catch-22-during-onboarding-due-to-registration-policy/m-p/4495582#M10253</guid>
      <dc:creator>Locomotive</dc:creator>
      <dc:date>2026-02-18T07:40:12Z</dc:date>
    </item>
    <item>
      <title>Using managed identities to assign users and groups to app-roles in Enterprise apps</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/using-managed-identities-to-assign-users-and-groups-to-app-roles/m-p/4495077#M10245</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;I'm looking for a way to use managed identities to assign users and groups to app-roles in Enterprise apps via Azure DevOps pipelines (using Workload Identity Federation)&lt;/P&gt;
&lt;P&gt;Currently it seems I can't add a managed identity as an owner on the enterprise app, for example.&lt;/P&gt;
&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Sun, 15 Feb 2026 15:32:10 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/using-managed-identities-to-assign-users-and-groups-to-app-roles/m-p/4495077#M10245</guid>
      <dc:creator>ocarmely</dc:creator>
      <dc:date>2026-02-15T15:32:10Z</dc:date>
    </item>
    <item>
      <title>Local Admin Rights</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/local-admin-rights/m-p/4490917#M10239</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a customer running a Hybrid Azure AD Join environment with all Windows devices enrolled in Intune.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently, Domain Users are being added to the local Administrators group on all devices via an on-premises Group Policy from the Domain Controller (Restricted Groups / Local Admin configuration). This effectively gives all users local admin rights.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to remove Domain Users from the local Administrators group on endpoints while not modifying the Domain Users group itself in Active Directory.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the recommended / best-practice approach to handle this in a Hybrid + Intune setup?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Specifically:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the safest migration strategy to avoid device or admin lockouts?&lt;/P&gt;&lt;P&gt;Any Hybrid-specific gotchas when transitioning from on-prem GPO to Intune?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking for advice from those who’ve implemented this in production environments.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 20:55:42 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/local-admin-rights/m-p/4490917#M10239</guid>
      <dc:creator>AhBAy2335</dc:creator>
      <dc:date>2026-01-30T20:55:42Z</dc:date>
    </item>
    <item>
      <title>Blocking User Mode Installation</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/blocking-user-mode-installation/m-p/4493228#M10238</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a Hybrid Azure AD Join environment with all Windows devices enrolled in Intune.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have removed Domain Users from the local Administrators group on all devices via an on-premises Group Policy from the Domain Controller (Restricted Groups / Local Admin configuration).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But what I observe is users are still able to install application in user move no elevation, how can I block this so that when get get a prompt only IT team can enter their credentials which will allow install.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently apps are being installed in Appdata folder under user profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Feb 2026 20:48:06 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/blocking-user-mode-installation/m-p/4493228#M10238</guid>
      <dc:creator>AhBAy2335</dc:creator>
      <dc:date>2026-02-06T20:48:06Z</dc:date>
    </item>
  </channel>
</rss>

