<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Microsoft Entra Blog articles</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/microsoft-entra-blog</link>
    <description>Microsoft Entra Blog articles</description>
    <pubDate>Sun, 26 Apr 2026 22:02:49 GMT</pubDate>
    <dc:creator>microsoft-entra-blog</dc:creator>
    <dc:date>2026-04-26T22:02:49Z</dc:date>
    <item>
      <title>Microsoft’s perspective on agentic identity standards</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/microsoft-s-perspective-on-agentic-identity-standards/ba-p/2111910</link>
      <description>&lt;H2&gt;A new identity inflection point&lt;/H2&gt;
&lt;P&gt;If you’ve gotten past the headline to this first sentence, you’re probably my kind of people. You’re probably a professional in the world of IAM (Identity and Access Management) who’s looking after their own enterprise; and you may even have opinions about what the future holds that range from salty to optimistic. In the world of granting access to enable productivity while preventing fraud, we’ve been supporting impulsive humans and predictable non-human identities… and now we are in the wild and wooly world where the software could be way more YOLO than the employees.&lt;/P&gt;
&lt;P&gt;In the last year, AI agents have moved quickly from experimentation into real business roles, and identity infrastructure is necessarily along for the ride, absorbing new constructs and adapting old ones.&amp;nbsp; The landscape of standards has been evolving rapidly as well, and I believe it's important to share updates with those who may not be immersed in these discussions day-to-day. In this fast-changing environment, staying informed about developments is crucial. My goal here is to talk about what is changing in the industry at large, why it is changing, and how we at Microsoft view this critical architectural identity layer.&lt;/P&gt;
&lt;P&gt;From a standards perspective, I think the biggest industry change has been mental.&amp;nbsp; There were always entities in the standards world that were non-human and needed resource access, but a clear line in the sand existed as to what those non-human entities would be allowed to accomplish. Different kinds of non-human entities were described by their task orientation and given different names that seemed separate – OAuth Clients, SPIFFE workloads, Token Exchange Actors. These standards had different taxonomies partly so that the security promise of non-human and human interactions could be kept straight.&amp;nbsp; If software needed an access token to act on behalf of “something”, the aligned delegation request flows presumed that the “something” in that sentence was a real person; the idea of “user present” transactions became a critical part of our access management threat model and vocabulary.&amp;nbsp; In the absence of a user, different flows and standards apply. Because consent is a human concept, software cannot grant access on behalf of other software, and a separate decision-making mechanism is required. Yet here we are in a world where agents &lt;U&gt;are&lt;/U&gt; delegating, because they have enough reasoning capability to make choices.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You may come to the logical conclusion that the agentic revolution therefore must have caused a standards revolution to match – but no.&amp;nbsp; The mindset change was pretty quick. In my opinion it has been aided in great part by the community developing the Model Context Protocol (MCP). MCP developed an incredible amount of momentum, and their choice to adopt OAuth for MCP authorization created a forcing function that all of us in the Enterprise world will be benefitting from for a long time to come.&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Identity standards innovation&lt;/H2&gt;
&lt;P&gt;There’s a growing set of identity standards we’re paying close attention to, and each merits deeper discussion. For now, I’ll anchor on three broad areas of interest that are shaping how identity standards are evolving for agentic systems: bootstrapping of trust, delegation, and shared secrets. As a broad statement, a lot of work is going on to connect the agentic dots between families of standards, especially in areas for which manual processes could previously bridge automation gaps.&lt;/P&gt;
&lt;P&gt;The first area of work is the bootstrapping of trust between non-human entities. If you are wondering what a non-human entity is, it could be anything from an infrastructure endpoint like an OAuth authorization server to a directory-based service principal representing an application, to a workload identity working within in a hypervisor context, or now an agentic identity such as an LLM harness or an autonomous business agent. In the federation world, SAML standardized an &lt;A href="https://docs.oasis-open.org/security/saml/Post2.0/sstc-saml-idp-discovery.pdf" target="_blank" rel="noopener"&gt;IDP discovery protocol&lt;/A&gt; in 2008, OpenID Connect v1 &lt;A href="https://openid.net/specs/openid-connect-discovery-1_0.html" target="_blank" rel="noopener"&gt;included a discovery spec&lt;/A&gt; in 2014 and OAuth 2.0 Protected Resource Metadata became &lt;A href="https://datatracker.ietf.org/doc/rfc9728/" target="_blank" rel="noopener"&gt;RFC 9728&lt;/A&gt; in 2025.&amp;nbsp; Despite widespread ratification, IAM admins typically uploaded metadata manually from installation guides or app galleries. The data was static, and admins themselves served as the explicit trigger that established a clear starting point of authority for each federation contract. Agents, however, operate at different scale, and the incentive is finally in place to consistently automate a non-human entity announcing itself and requesting access, not just in one identity silo but across the entire technical landscape.&amp;nbsp; The result will be a much more connected and consolidated embrace of all sorts of secure non-human onboarding options, including OAuth CIMD (&lt;A href="https://datatracker.ietf.org/doc/draft-ietf-oauth-client-id-metadata-document/" target="_blank" rel="noopener"&gt;ClientID Metadata Document&lt;/A&gt;), a lot of work in the WIMSE working group at IETF that help &lt;A href="https://datatracker.ietf.org/doc/html/draft-ietf-wimse-workload-identity-practices-03" target="_blank" rel="noopener"&gt;SPIFFE and OAuth work better&lt;/A&gt; (SPIFFE is an open standard that operates similarly to &lt;A href="https://learn.microsoft.com/en-us/entra/identity/managed-identities-azure-resources/overview" target="_blank" rel="noopener"&gt;Managed Identities for Azure&lt;/A&gt;).&amp;nbsp; It’s also worth calling out IoT and identity wallet standards, but those deserve a deeper dive, which we’ll save for later.&lt;/P&gt;
&lt;P&gt;In addition to bootstrapping, the standards world is debating the question of delegation. This is another place where bifurcation between human and non-human identity is breaking down.&amp;nbsp; We have multiple existing concepts in identity standards like token exchange, identity chaining, transaction tokens, OBO (on behalf of), token upscoping/downscoping, and a slew of new IETF proposals all occupying everyone’s minds.&amp;nbsp; Take a look through &lt;A href="https://khaledzaky.com/blog/delegation-is-the-real-identity-problem-in-agentic-ai" target="_blank" rel="noopener"&gt;Khaled Zaky’s blog&lt;/A&gt; on this topic, and stay tuned – this debate has not yet concluded in any way.&lt;/P&gt;
&lt;P&gt;One quieter thread of work is worth calling out here. The standards world is filling those connective tissue gaps around eliminating shared secrets from agentic use.&amp;nbsp; We are already seeing abuse (and perhaps a blurring of the line between what is use and what is abuse) of shared secrets such as API keys in agent contexts – for anyone taking the time to look, bearer token abuse will be next. &amp;nbsp;Looking ahead, there will be a follow-up blog where my colleagues will explore how we’re building critical standards in this area and what that enables next.&lt;/P&gt;
&lt;H2&gt;Perspective on agentic identity standards&lt;/H2&gt;
&lt;P&gt;The deep nature of our Microsoft agentic investment is clear for all to see, but it isn’t always obvious just how much of that investment lies in collaborative spaces such as the standards community. &lt;A href="https://learn.microsoft.com/en-us/entra/agent-id/identity-platform/agent-oauth-protocols" target="_blank" rel="noopener"&gt;We have already created a foundational identity layer&lt;/A&gt; built on open standards, with a continued commitment to a standards‑based approach to trust for AI authentication, authorization, and management - one that can scale across the many industries we work with every day. Participation in communities of interest for agentic identity such as AAIF, MCP, IETF, FIDO Alliance and OpenID Foundation are ways in which we stay relevant, and they are communities I’d encourage you to follow as well.&amp;nbsp; We have a lot of learnings about what works and does not work in our very large environment and I look forward to the writing of my brilliant colleagues as they share that hard-won wisdom. In addition, for anyone who &lt;EM&gt;does&lt;/EM&gt; enjoy the technical complexity of agentic standards, &lt;A href="https://www.linkedin.com/in/pameladingle/" target="_blank" rel="noopener"&gt;follow me on LinkedIn&lt;/A&gt; for much deeper content.&amp;nbsp; One last important perspective – while I have a job title that sounds lofty in this area, the truth is that many people are working on this goal all over the company.&amp;nbsp; It is those contributions, those daily decisions to care about whether any given identity standard serves its purpose, that mean a lasting success.&amp;nbsp; Cheers to them.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-P. Dingle, Director of Identity Standards&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/security-101/what-is-oauth" target="_blank" rel="noopener"&gt;What is OAuth? – Microsoft Security 101&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-agent-id" target="_blank" rel="noopener"&gt;Microsoft Entra Agent ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/surfing-the-ai-wave-manage-govern-and-protect-ai-agents-with-microsoft-entra-age/2464407" target="_blank" rel="noopener"&gt;Surfing the AI Wave: Manage, Govern, and Protect AI Agents with Microsoft Entra Agent ID | Microsoft Community Hub&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-teams="true"&gt; &lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftechcommunity.microsoft.com%2Fblog%2Fmicrosoft-entra-blog%2Fthe-future-of-ai-agents%25E2%2580%2594and-why-oauth-must-evolve%2F3827391&amp;amp;data=05%7C02%7Cdavidellis%40microsoft.com%7Cca26cfb8637b4a18664008dea01158c5%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C639124193516745278%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=ewyvjKrWZyM8tIN5L3JIyqSvBTgXQ1E0yzmOgeRptWo%3D&amp;amp;reserved=0" aria-label="Link The future of AI agents—and why OAuth must evolve | Microsoft Community Hub" target="_blank"&gt;The future of AI agents—and why OAuth must evolve | Microsoft Community Hub&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra Agent ID:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2026 17:54:58 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/microsoft-s-perspective-on-agentic-identity-standards/ba-p/2111910</guid>
      <dc:creator>Pamela Dingle</dc:creator>
      <dc:date>2026-04-24T17:54:58Z</dc:date>
    </item>
    <item>
      <title>Get ahead of agent sprawl: manage and govern AI agents at scale</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/get-ahead-of-agent-sprawl-manage-and-govern-ai-agents-at-scale/ba-p/4513160</link>
      <description>&lt;P&gt;Recently, my team and I met with customers across several industries including finance, retail, telecommunications, and the public sector regarding the topic of agent adoption. During our time with them, several key themes bubbled to the surface. While AI agent adoption is growing rapidly, we need to ensure governance is built-in right from the start and that it is designed for the rapid proliferation of agents. Our customers see agents appearing within their admin portal, but accountability, lifecycle management and access guardrails are lacking, creating situations that could lead to significant security concerns.&lt;/P&gt;
&lt;P&gt;Without clear ownership and access boundaries, risk can build quickly without clear insight about what those agents can access or do.&lt;/P&gt;
&lt;H2&gt;Agents are a new type of identity&lt;/H2&gt;
&lt;P&gt;From an identity perspective, agents can authenticate, access resources, and take action. As outlined in the &lt;A href="https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/bade/documents/products-and-services/en-us/security/secure-access-in-the-age-of-ai-final-2026.pdf" target="_blank" rel="noopener"&gt;Secure Access in the Age of AI&lt;/A&gt; report, security leaders need to find ways to manage, govern, and protect agent identities with the same rigor as human identities, especially as they scale agents across the enterprise. What makes agents different is that they do not fit neatly into existing categories. Sometimes an agent acts as an assistive agent and at other times it behaves more autonomously. Unlike traditional apps, agents are not static. As models and workflows evolve, agents can acquire new capabilities, which in turn can change what they are able to accomplish over time.&lt;/P&gt;
&lt;P&gt;Without a unique agent identity, customers struggle to address key questions such as:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Which agent identity is acting?&lt;/LI&gt;
&lt;LI&gt;What can it access?&lt;/LI&gt;
&lt;LI&gt;What actions did it take?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These questions point to a fundamental gap in how identity has traditionally been applied. As agents take on more responsibilities across multiple workflows, treating them simply as applications or as extensions of a user's identity is no longer sufficient. Agents need to be recognized and managed as first-class identities. &lt;A href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-agent-id" target="_blank" rel="noopener"&gt;Microsoft Entra Agent ID&lt;/A&gt; provides an identity foundation that applications and platforms can integrate with, enabling agents to authenticate, access resources, and be governed using familiar identity controls&lt;/P&gt;
&lt;P&gt;When platforms integrate with Entra as their identity provider, organizations gain clearer visibility into which agent is acting, what it can access, and how its permissions evolve as models and workflows change. Built on this foundation, Microsoft Entra Agent ID organizes agent identity around three pillars, helping organizations manage AI agents at scale, govern agent identities and lifecycle, and protect agent access to resources.&lt;/P&gt;
&lt;H2&gt;Manage AI agents at scale&lt;/H2&gt;
&lt;P&gt;Organizations consistently face the same initial challenge: gaining visibility into the AI agents operating across their environment. According to our study, 80% of leaders report that AI agent usage has increased over the past year. This underscores the need for a clear view of which agents exist throughout the organization. &lt;A href="https://www.microsoft.com/en-us/microsoft-agent-365?msockid=10e782e862dd6fe619ce943963ea6ea1" target="_blank" rel="noopener"&gt;Microsoft Agent 365&lt;/A&gt; was purpose-built to serve as the control plane for AI agents, tackling the challenges of agent management head-on. &lt;SPAN data-teams="true"&gt;With Microsoft Agent 365, organizations can streamline management for AI agents in their environment. Its agent registry provides a unified inventory of all agents operating across the organization, including both Microsoft and non‑Microsoft agents.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Get a complete view of all agents in your organization, including agents built with Microsoft AI platforms, agents from our ecosystem partners, and any agents you register yourself.&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;A key building block in Microsoft Entra Agent ID is the agent blueprint. An agent identity blueprint serves as a reusable template for creating agents. It defines how agents are created, authenticated, and governed, while still allowing individual agents to be provisioned or deprovisioned independently, as needed. &lt;SPAN data-teams="true"&gt;With the agent blueprint, security teams can consistently apply consistent access controls to every agent that is created from that specific template.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;Govern agent identities and lifecycle&lt;/H2&gt;
&lt;P&gt;Once your agents are up and running, one of the biggest challenges organizations face is governing agent identities at scale. As teams experiment and deploy agents across environments, agent proliferation can happen quickly, often without consistent sponsorship, review, or retirement processes.&lt;/P&gt;
&lt;P&gt;Effective identity governance must therefore include automated lifecycle management to address agent sprawl. This means ensuring every agent has a designated sponsor, enforcing policies for how agents are created and reviewed, and automatically removing access when agents are no longer needed. Without automated lifecycle controls, dormant or inactive agents can persist and retain access long after their purpose has ended, increasing security risk and administrative burden.&lt;/P&gt;
&lt;P&gt;Microsoft Entra Agent ID helps organizations apply identity governance practices across the full agent lifecycle, from creation through decommissioning, so agent growth remains intentional, auditable, and manageable as environments become larger and more complex.&lt;/P&gt;
&lt;P&gt;Entra Agent ID supports structured governance by allowing organizations to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Identify orphaned agents and ensure every agent always has an accountable human to ensure accountability is maintained as users move or leave the organization&lt;/LI&gt;
&lt;LI&gt;Automate agent lifecycle management from creation through deactivation to help prevent agent sprawl&lt;/LI&gt;
&lt;LI&gt;Ensure agent's access is intentional, auditable and time bound with access packages&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Identify orphaned agents and automate sponsor assignments.&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;Protect agent access to resources&lt;/H2&gt;
&lt;P&gt;One final, and key, pain point they anticipate is maintaining operational control as agents evolve. Our recent whitepaper, &lt;A href="https://aka.ms/IDProtectionReport" target="_blank" rel="noopener"&gt;Protect Identities in the Era of AI&lt;/A&gt; reveals how identity attacks are rapidly increasing as organizations embrace cloud and AI technologies. As agents gain new capabilities and interact with more resources, organizations need confidence that access is adaptive and secure.&lt;/P&gt;
&lt;P&gt;Entra Agent ID extends familiar identity controls to agents, thereby providing organizations with the ability to&lt;S&gt;:&lt;/S&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Apply Conditional Access policies tailored to agents, enforcing requirements based on the agent identity and access.&lt;/LI&gt;
&lt;LI&gt;Block agent access automatically when risk signals increase and detect anomalous behavior such as unusual sign-in spikes or unfamiliar resource access.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Apply Conditional Access for agents: Enforce Conditional Access policies with custom security attributes, and agent compromise risk assessments.&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;Built for an expanding agent ecosystem&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;Enterprise environments are incredibly diverse, with organizations building agents across Microsoft platforms as well as a broad ecosystem of non‑Microsoft frameworks and tools. To support this reality, the &lt;A href="https://learn.microsoft.com/en-us/microsoft-agent-365/developer/agent-365-sdk?tabs=python" target="_blank" rel="noopener" aria-label="Link Microsoft Agent 365 SDK"&gt;Microsoft Agent 365 SDK&lt;/A&gt; enables developers to extend agents built using any agent SDK or platform with enterprise‑ready identity, observability, security, and governed access to Microsoft 365. By integrating with Microsoft Agent 365, the SDK helps organizations onboard and operate agents from any source using consistent management and identity controls.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;Get started&lt;/H2&gt;
&lt;P&gt;To learn more about Microsoft Entra Agent ID and how it empowers organizations to secure access for AI agents:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Learn: &lt;A href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-agent-id" target="_blank" rel="noopener"&gt;Microsoft Entra Agent ID&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Explore: &lt;A href="https://www.microsoft.com/en-us/microsoft-agent-365?msockid=01e7c8230a52661133cfdf100b696796" target="_blank" rel="noopener"&gt;Microsoft Agent 365&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Watch: &lt;A href="https://www.youtube.com/watch?v=N-B-kD28P2I&amp;amp;t=1s" target="_blank" rel="noopener"&gt;Microsoft Entra Agent ID Explained&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;View a demo: &lt;A href="https://techcommunity.microsoft.com/event/microsoft-security-events/secure-access-for-ai-agents-the-new-frontier-of-identity/4486498" target="_blank" rel="noopener"&gt;Secure access for AI agents, the new frontier of identity&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;-&lt;/STRONG&gt;&lt;STRONG&gt; &lt;/STRONG&gt;Ngozi Nwoko, Director of Product Marketing, IDNA&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Related resources:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Webinar series: &lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/simplify-your-identity-landscape-reduce-risk-and-modernize-access-for-any-identi/4486059" target="_blank" rel="noopener"&gt;Microsoft Entra on-demand&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/surfing-the-ai-wave-manage-govern-and-protect-ai-agents-with-microsoft-entra-age/2464407" target="_blank" rel="noopener"&gt;Surfing the AI Wave: Manage, Govern, and Protect AI Agents with Microsoft Entra Agent ID | Microsoft Community Hub&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;Learn more about Microsoft Entra &lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/agent-id/what-is-microsoft-entra-agent-id" target="_blank" rel="noopener"&gt;Microsoft Entra Agent ID documentation&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/microsoft-agent-365/" target="_blank" rel="noopener"&gt;Microsoft Agent 365 documentation&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 24 Apr 2026 15:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/get-ahead-of-agent-sprawl-manage-and-govern-ai-agents-at-scale/ba-p/4513160</guid>
      <dc:creator>NgoziNwoko</dc:creator>
      <dc:date>2026-04-24T15:00:00Z</dc:date>
    </item>
    <item>
      <title>Tenant Configuration Management APIs are now generally available</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/tenant-configuration-management-apis-are-now-generally-available/ba-p/4513157</link>
      <description>&lt;P&gt;In our &lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/microsoft-entra-tenant-governance-secure-and-manage-multi-tenant-environments-at/4462427" target="_blank" rel="noopener"&gt;previous post&lt;/A&gt;, we introduced &lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/tenant-governance/overview" target="_blank" rel="noopener"&gt;Microsoft Entra Tenant Governance&lt;/A&gt; and how it helps organizations secure and manage multi-tenant environments at scale. Today, we’re excited to announce that the &lt;STRONG&gt;Tenant Configuration Management (TCM) APIs are now generally available&lt;/STRONG&gt;, providing the foundation for managing configuration at scale with greater consistency and control.&lt;/P&gt;
&lt;P&gt;Before we dive deeper, let’s clarify the distinction:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/tenant-governance/overview" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Microsoft Entra Tenant Governance&lt;/STRONG&gt;&lt;/A&gt; is the product experience. It delivers a centralized control plane for visibility, policy enforcement, and governance across tenant configurations.&lt;/LI&gt;
&lt;LI&gt;The &lt;A href="https://learn.microsoft.com/en-us/graph/unified-tenant-configuration-management-concept-overview" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;TCM APIs&lt;/STRONG&gt;&lt;/A&gt; are the underlying Microsoft Graph API that powers Tenant Governance’s configuration management capabilities. It enables organizations to &lt;STRONG&gt;programmatically define, export, monitor, and manage configurations across services&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&lt;STRONG&gt;Why this matters&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;As organizations grow, configuration complexity increases across identity, security, and productivity workloads. Over time, even well-configured environments can drift due to incremental changes, operational overhead, and lack of centralized control.&lt;/P&gt;
&lt;P&gt;The challenge isn’t just setting configurations correctly. &lt;STRONG&gt;It’s maintaining that state continuously&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;The TCM API addresses this by enabling a shift from &lt;STRONG&gt;reactive configuration management &lt;/STRONG&gt;to a&lt;STRONG&gt; declarative and continuous model&lt;/STRONG&gt;, where desired state is defined and automatically validated over time. This helps organizations reduce risk, improve compliance, and simplify operations.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Core concepts of the TCM API&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;At its core, the TCM API brings configuration-as-code to Microsoft Entra. It introduces a model built around four connected concepts: &lt;STRONG&gt;snapshots,&lt;/STRONG&gt; &lt;STRONG&gt;baselines, monitors, and configuration drifts:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Snapshot&lt;/STRONG&gt;&lt;STRONG&gt;:&lt;/STRONG&gt; Captures the current state of tenant configurations at a point in time. This is often the starting point, helping organizations understand what’s deployed today or to establish a “known good” reference.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Baseline:&lt;/STRONG&gt; Represents the desired configuration state. Instead of manually checking settings across portals, organizations can define what compliant configuration looks like in a structured, repeatable way.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Monitor:&lt;/STRONG&gt; Continuously compares the live environment against that baseline. Any deviation is surfaced as configuration drift, giving teams clear insight into where their environment no longer aligns with expectations.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Configuration drifts:&lt;/STRONG&gt; Represents the delta between the desired configuration state and the current configuration state.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Together, these concepts create a closed loop: capture current state, define desired state, and continuously monitor alignment between the two.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;A scalable model for configuration management&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;What makes the TCM API powerful is not just visibility, but &lt;STRONG&gt;repeatability and scale&lt;/STRONG&gt;. Because everything is exposed through Microsoft Graph, configuration management can now be:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Integrated into automation workflows&lt;/LI&gt;
&lt;LI&gt;Connected to existing security and compliance systems&lt;/LI&gt;
&lt;LI&gt;Applied consistently across multiple tenants and services&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This introduces a true configuration-as-code approach, where tenant settings are no longer static or manually enforced, but programmatically defined and continuously evaluated.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;How this fits into Tenant Governance&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;The TCM API is the foundation that enables many of the capabilities within Microsoft Entra Tenant Governance.&lt;/P&gt;
&lt;P&gt;While the API provides raw access to configuration data and state comparison, Tenant Governance builds on top of it to deliver a &lt;STRONG&gt;unified experience for administrators&lt;/STRONG&gt;. This includes surfacing insights, highlighting drift, and enabling governance actions without requiring customers to build their own tooling.&lt;/P&gt;
&lt;P&gt;In the near future, Tenant Governance will provide a single pane of glass for managing multiple tenants centrally, powered by the TCM API. This relationship is key:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Customers&lt;/STRONG&gt; can rely on Tenant Governance for an out-of-the-box solution.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Partners and advanced organizations&lt;/STRONG&gt; can use the TCM API directly to build custom workflows, integrations, or managed services.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&lt;STRONG&gt;Final thoughts&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Tenant configuration is no longer a one-time activity. It is an ongoing process that directly impacts security, compliance, and operational consistency.&lt;/P&gt;
&lt;P&gt;With the &lt;STRONG&gt;general availability of the TCM API&lt;/STRONG&gt;, organizations now have a scalable way to define, monitor, and enforce configuration across their environments. Whether used directly or through Microsoft Entra Tenant Governance, it enables a more proactive and automated approach to managing tenant configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;-Aditya Mukund&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/graph/unified-tenant-configuration-management-concept-overview" aria-label="Link Overview of the Tenant Configuration Management APIs in Microsoft Graph - Microsoft Graph | Microso…" target="_blank"&gt;Overview of the Tenant Configuration Management APIs in Microsoft Graph - Microsoft Graph | Microso…&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/graph/utcm-authentication-setup" aria-label="Link Set up authentication for Tenant Configuration Management APIs - Microsoft Graph | Microsoft Learn" target="_blank"&gt;Set up authentication for Tenant Configuration Management APIs - Microsoft Graph | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 16:57:53 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/tenant-configuration-management-apis-are-now-generally-available/ba-p/4513157</guid>
      <dc:creator>AdityaMukund</dc:creator>
      <dc:date>2026-04-23T16:57:53Z</dc:date>
    </item>
    <item>
      <title>Now generally available: License usage insights in Microsoft Entra</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/now-generally-available-license-usage-insights-in-microsoft/ba-p/4507463</link>
      <description>&lt;P&gt;Organizations rely on Microsoft Entra to secure access in an ever-changing identity threat landscape without sacrificing workforce productivity. As organizations adopt advanced identity and access capabilities, IT teams often need greater transparency into how those capabilities are being used, particularly around licensing. You need to see which identity protections are securing your users and identify gaps from unused controls.&lt;/P&gt;
&lt;P&gt;Today, we’re excited to announce the general availability of&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/concept-license-usage-insights" target="_blank"&gt;Microsoft Entra license usage insights&lt;/A&gt;, a redesigned experience in the Microsoft Entra admin center that helps you better understand your license entitlements and how your security controls are being used across your organization.&lt;/P&gt;
&lt;H2&gt;Why it matters&lt;/H2&gt;
&lt;P data-start="330" data-end="417"&gt;With&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/concept-license-usage-insights" target="_blank"&gt;license usage insights&lt;/A&gt;, you can:&lt;/P&gt;
&lt;UL data-start="419" data-end="974"&gt;
&lt;LI data-section-id="1c8chhy" data-start="419" data-end="560"&gt;&lt;STRONG data-start="421" data-end="457"&gt;Strengthen your security posture&lt;/STRONG&gt;&amp;nbsp;by ensuring critical identity protections are not just licensed, but actively protecting your users.&lt;/LI&gt;
&lt;LI data-section-id="1bga8dg" data-start="561" data-end="670"&gt;&lt;STRONG data-start="563" data-end="595"&gt;Close protection gaps faster&lt;/STRONG&gt;&amp;nbsp;by identifying underutilized controls and bringing them into production.&lt;/LI&gt;
&lt;LI data-section-id="1qs47iv" data-start="671" data-end="830"&gt;&lt;STRONG data-start="673" data-end="718"&gt;Reduce exposure to identity-based attacks&lt;/STRONG&gt;&amp;nbsp;by increasing adoption of capabilities like risk-based access policies.&lt;/LI&gt;
&lt;LI data-section-id="1arllne" data-start="831" data-end="974"&gt;&lt;STRONG data-start="833" data-end="870"&gt;Stay ahead of compliance and risk&lt;/STRONG&gt;&amp;nbsp;with visibility into usage trends, helping you proactively address gaps as your organization evolves.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;What’s new in the GA release&lt;/H2&gt;
&lt;P&gt;Since&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/introducing-microsoft-entra-license-utilization-insights/3796393" target="_blank"&gt;public preview&lt;/A&gt;, we’ve introduced several enhancements to make&amp;nbsp;&lt;STRONG&gt;license entitlement&lt;/STRONG&gt;&amp;nbsp;and&amp;nbsp;&lt;STRONG&gt;feature usage data&lt;/STRONG&gt;&amp;nbsp;easier to find and act on:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Six-month usage trends&lt;/STRONG&gt;: Understand historical patterns for better forecasting.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Clear differentiation between active and guest users&lt;/STRONG&gt;&amp;nbsp;for precise reporting.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Copilot prompt suggestions&lt;/STRONG&gt;&amp;nbsp;to help you explore license usage insights faster.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;The main license usage report view (Billing &amp;gt; Licenses).&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;Where to find the license usage insights&lt;/H2&gt;
&lt;P&gt;Navigate to&amp;nbsp;&lt;STRONG&gt;Billing &amp;gt; Licenses&lt;/STRONG&gt;&amp;nbsp;in the&amp;nbsp;&lt;A href="https://entra.microsoft.com/" target="_blank"&gt;Microsoft Entra admin center&lt;/A&gt;. You’ll see two key widgets: License entitlements and Product usage insights.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;License entitlements&lt;/STRONG&gt;: Displays your total Entra license entitlements, such as Microsoft Entra ID P1, P2, Microsoft Entra Suite, and standalone SKUs. For example,&amp;nbsp;&lt;EM&gt;250 Microsoft Entra Suite licenses entitle your organization to 250 each of Private Access, Internet Access, ID Governance, and Verified ID.&lt;/EM&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;The License entitlements view.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG data-start="179" data-end="206"&gt;Product usage insights:&lt;/STRONG&gt; View product and feature usage over the past six months in one place, giving you a clear picture of which security protections are licensed, in use, and where gaps may exist. Quickly compare licenses in use versus available and spot adoption trends. Hover over the bar chart for more details or contact your Microsoft representative for guidance.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;The Product usage insights view.&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;Next steps&lt;/H2&gt;
&lt;P data-start="347" data-end="716"&gt;Visit&amp;nbsp;&lt;STRONG data-start="353" data-end="375"&gt;Billing &amp;gt; Licenses&lt;/STRONG&gt;&amp;nbsp;in the Microsoft Entra admin center to explore license usage insights today and start identifying where your existing identity protections can be strengthened. With clear visibility into how your controls are being used, you can take action to close gaps, increase adoption of critical safeguards, and improve your overall security posture.&lt;/P&gt;
&lt;P data-start="718" data-end="941"&gt;We’d love your feedback on how this visibility into your Microsoft Entra usage supports your workflows and what additional insights would be most valuable. Share your thoughts in the comments or through the Feedback portal.&lt;/P&gt;
&lt;P&gt;-Joseph Dadzie, Vice President of Product Management&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/concept-license-usage-insights" target="_blank"&gt;Microsoft Entra license usage insights - Microsoft Entra | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/licensing" target="_blank"&gt;Microsoft Entra licensing - Microsoft Entra | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/get-started-premium" target="_blank"&gt;Sign up for Microsoft Entra ID P1 or P2- Microsoft Entra | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 18:13:19 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/now-generally-available-license-usage-insights-in-microsoft/ba-p/4507463</guid>
      <dc:creator>Joseph Dadzie</dc:creator>
      <dc:date>2026-04-23T18:13:19Z</dc:date>
    </item>
    <item>
      <title>What’s new in Microsoft Entra – March 2026</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/what-s-new-in-microsoft-entra-march-2026/ba-p/4502150</link>
      <description>&lt;P&gt;From January through March 2026, Microsoft Entra introduced key updates to help organizations strengthen identity security, simplify governance, and improve user experience. This Q1 roundup highlights the latest feature releases and important changes—organized by product—so you can quickly see what’s new, what’s changing, and what actions you may need to take.&lt;/P&gt;
&lt;H2&gt;Microsoft Entra ID&lt;/H2&gt;
&lt;H3&gt;New releases&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-passkeys-fido2" target="_blank" rel="noopener"&gt;Synced passkeys in Microsoft Entra ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-passkeys-fido2" target="_blank" rel="noopener"&gt;Passkey profiles in Microsoft Entra ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/devices/sso-linux?tabs=password-auth%2Cdebian-install%2Cdebian-update%2Cdebian-uninstall%2Cdebian-sc-example" target="_blank" rel="noopener"&gt;Microsoft Single Sign-On for Linux support for authenticating with Phish-Resistant MFA credentials&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/whats-new#general-availability--improved-readability-for-authentication-methods-policy-update-audit-logs" target="_blank" rel="noopener"&gt;Improved readability for Authentication Methods Policy Update audit logs&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-external-method-manage" target="_blank" rel="noopener"&gt;External MFA is Generally Available&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/whats-new#general-availability---service-principal-creation-audit-logs-for-alerting--monitoring" target="_blank" rel="noopener"&gt;Service Principal creation audit logs for alerting &amp;amp; monitoring&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/concept-conditional-access-cloud-apps?tabs=powershell#new-conditional-access-behavior-when-an-all-resources-policy-has-a-resource-exclusion" target="_blank" rel="noopener"&gt;Improved enforcement for All resources policies with resource exclusions&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/entra/id-protection/concept-risky-user-report" target="_blank" rel="noopener"&gt;New Risky User Reports to elevate identity security in Entra ID Protection&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Change announcements&lt;/H3&gt;
&lt;H4&gt;&lt;STRONG&gt;Security improvements&lt;/STRONG&gt;&lt;/H4&gt;
&lt;H4&gt;Jailbreak detection in Authenticator app&lt;/H4&gt;
&lt;P&gt;&lt;EM&gt;[Action may be required]&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Starting February 2026, Microsoft Authenticator introduced jailbreak/root detection for Microsoft Entra credentials in the Android app. The rollout progresses from warning mode → blocking mode → wipe mode. Users must move to compliant devices to continue using Microsoft Entra accounts in Authenticator. &lt;A href="https://support.microsoft.com/en-us/authenticator/jailbreak-root-detection-in-microsoft-authenticator" target="_blank" rel="noopener"&gt;Learn more&lt;/A&gt;.&lt;/P&gt;
&lt;H4&gt;New risky user reports in Entra ID Protection&lt;/H4&gt;
&lt;P&gt;Elevate your identity security with &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/entra/id-protection/overview-identity-protection" target="_blank" rel="noopener"&gt;Entra ID Protection&lt;/A&gt;. For admins, one question comes up repeatedly: "Why is this user risky?" The redesigned Risky Users report brings &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/blog/2026/03/25/identity-security-is-the-new-pressure-point-for-modern-cyberattacks/" target="_blank"&gt;identity security&lt;/A&gt; to the center of investigations and makes that answer clear, with new visual insights, richer timelines, easier searchability, and more. Identity and security teams can triage faster, understand what’s driving risk, and remediate with clear insights to protect the organization. &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/entra/id-protection/concept-risky-user-report" target="_blank" rel="noopener"&gt;Learn more.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Microsoft Entra Agent ID&lt;/H2&gt;
&lt;H3&gt;Change announcements&lt;/H3&gt;
&lt;H4&gt;&lt;STRONG&gt;Simplifying agent management with Agent 365&amp;nbsp;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;EM&gt;[Action may be required]&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;We’re consolidating agent management experiences to make it easier to observe, govern, and secure all agents in your tenant. Agent 365 will be the single source of truth, offering a unified catalog, consistent visibility, and simplified management.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What’s changing&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The Agent registry and Agent collections blades in the&amp;nbsp;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fentra.microsoft.com%2F&amp;amp;data=05%7C02%7CPadma.Prasad%40microsoft.com%7C8cc5070e107b41c63d5708de94238074%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C639111077437650973%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=msDjpjYrPTm7xeiCy0Pwwj4tMqSOl50iWoCnhatbwzQ%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;Entra admin center&lt;/A&gt;&amp;nbsp;will be retired on May 1, 2026.&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;No action is required by administrators. Agent functionality and management remain unaffected. You can still access the agent inventory in the&amp;nbsp;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fadmin.microsoft.com%2F&amp;amp;data=05%7C02%7CPadma.Prasad%40microsoft.com%7C8cc5070e107b41c63d5708de94238074%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C639111077437667563%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=Ejx5nM%2Fo2oENGi5dtZJTZc2ZHOXvqt%2FbEzrTKtG9pR8%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;All agents view within the Microsoft 365 admin center (MAC)&lt;/A&gt;.&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;With this change:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Agent 365 becomes the unified registry and control plane for agents.&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Microsoft Entra continues to provide the identity foundation through Agent ID.&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;The existing&amp;nbsp;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fgraph%2Fapi%2Fresources%2Fagentregistry%3Fview%3Dgraph-rest-beta&amp;amp;data=05%7C02%7CPadma.Prasad%40microsoft.com%7C8cc5070e107b41c63d5708de94238074%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C639111077437680807%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=qEUrJwo7%2B874c4CTjGGFBcErN9uOzgbnrJyIrBVMDwg%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;registry Graph API&lt;/A&gt; will be deprecated and replaced by a new API powered by Agent 365. Agents registered via the current API will need to be re-registered. You'll be notified soon about the deprecation date and the availability of the new registry Graph API.&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;All agent access and governance capabilities remain fully available through Agent ID and Agent 365.&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Faka.ms%2Fregistry-faq&amp;amp;data=05%7C02%7CPadma.Prasad%40microsoft.com%7C8cc5070e107b41c63d5708de94238074%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C639111077437692926%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=YrFA6YxTcug7TzN0XQUGNQQ39eE9zf2wrWR6mi4JLL0%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;Learn more&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;Microsoft Entra ID Governance&lt;/H2&gt;
&lt;H3&gt;New releases&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/EnableEntraSCIMAPI" target="_blank" rel="noopener"&gt;SCIM 2.0 APIs for Microsoft Entra ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/whats-new#general-availability---new-m365-group-creation-experience-in-my-groups" target="_blank" rel="noopener"&gt;New M365 group creation experience in My Groups&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/troubleshoot/entra/entra-id/ad-dmn-services/enable-support-tls-environment?tabs=azure-monitor" target="_blank" rel="noopener"&gt;Microsoft Entra Connect Health now enforces TLS 1.2&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/graph/unified-tenant-configuration-management-concept-overview" target="_blank" rel="noopener"&gt;Tenant configuration management APIs&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/workflow-custom-triggers" target="_blank" rel="noopener"&gt;Expanded attribute support in Lifecycle Workflows attribute changes trigger&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/manage-delegate-workflow" target="_blank" rel="noopener"&gt;Delegated Workflow Management in Lifecycle Workflows&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/whats-new#general-availability---microsoft-entra-connect-sync-now-supports-windows-server-2025" target="_blank" rel="noopener"&gt;Microsoft Entra Connect Sync now supports Windows Server 2025&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/entitlement-management-request-approve#revoke-a-request-preview" target="_blank" rel="noopener"&gt;Revoke previously approved access package assignments in My Access&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/hybrid/user-source-of-authority-overview" target="_blank" rel="noopener"&gt;Ability to convert Source of Authority of synced on-premises AD users to cloud users is now available&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/microsoft-entra-id-governance-licensing-for-guest-users" target="_blank" rel="noopener"&gt;Microsoft Entra ID Governance guest billing meter enforcement&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Change announcements&lt;/H3&gt;
&lt;H4&gt;Identity Modernization&lt;/H4&gt;
&lt;H4&gt;Microsoft Entra Connect security update to block hard match for users with Microsoft Entra roles&lt;/H4&gt;
&lt;P&gt;&lt;EM&gt;[Action may be required]&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What is hard matching in Microsoft Entra Connect Sync and Cloud Sync?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;When Microsoft Entra Connect or Cloud Sync adds new objects from Active Directory, the Microsoft Entra ID service tries to match the incoming object with a Microsoft Entra object by looking up the incoming object’s sourceAnchor value against the OnPremisesImmutableId attribute of existing cloud managed objects in Microsoft Entra ID. If there's a match, Microsoft Entra Connect or Cloud Sync takes over the source or authority (SoA) of that object and updates it with the properties of the incoming Active Directory object in what is known as a "hard match."&lt;/P&gt;
&lt;P&gt;To strengthen the security posture of your Microsoft Entra ID environment, we are introducing a change that will restrict certain types of hard match operations by default.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What’s changing&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Beginning June 1, 2026, Microsoft Entra ID will block any attempt by Microsoft Entra Connect Sync or Cloud Sync from hard-matching a new user object from Active Directory to an existing cloud-managed Microsoft Entra ID user object that hold&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/permissions-reference" target="_blank" rel="noopener"&gt;Microsoft Entra roles&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;This means:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;If a cloud managed user already has &lt;A href="https://learn.microsoft.com/en-us/entra/identity/hybrid/connect/plan-connect-design-concepts#sourceanchor" target="_blank" rel="noopener"&gt;onPremisesImmutableId (sourceAnchor)&lt;/A&gt; set and is assigned a Microsoft Entra role, Microsoft Entra Connect Sync or Cloud Sync will no longer be able to take over the Source of Authority of that user by hard-matching with an incoming user object from Active Directory.&lt;/LI&gt;
&lt;LI&gt;This safeguard prevents attackers from taking over privileged cloud managed users in Microsoft Entra by manipulating attributes of user objects in Active Directory.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;What’s not changing&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Hard match operations for cloud users without Microsoft Entra roles are not affected.&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/hybrid/connect/how-to-connect-install-existing-tenant?source=recommendations#hard-match-vs-soft-match" target="_blank" rel="noopener"&gt;Soft match&lt;/A&gt; behavior isn't affected.&lt;/LI&gt;
&lt;LI&gt;Ongoing sync from Active Directory to Entra ID for previously hard-matched objects will not be affected.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Customer action required&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you encounter a hard match error after June 1, 2026, see our&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/hybrid/connect/tshoot-connect-sync-errors#existing-admin-role-conflict" target="_blank" rel="noopener"&gt;documentation&lt;/A&gt; for mitigation steps.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/whats-new#upcoming-change--microsoft-entra-connect-security-update-to-block-hard-match-for-users-with-microsoft-entra-roles" target="_blank" rel="noopener"&gt;Learn more&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;Microsoft Entra External ID&lt;/H2&gt;
&lt;H3&gt;New releases&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/whats-new#general-availability---justintime-password-migration-in-microsoft-entra-external-id" target="_blank" rel="noopener"&gt;Just‑in‑Time Password Migration in Microsoft Entra External ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/whats-new#general-availability---device-authorization-grant-flow-in-microsoft-entra-external-id" target="_blank" rel="noopener"&gt;Device authorization grant flow in Microsoft Entra External ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/external-id/customers/how-to-sign-in-alias?tabs=admin-center" target="_blank" rel="noopener"&gt;Sign-in with username/alias in Entra External ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/concept-password-ban-bad#custom-banned-password-list" target="_blank" rel="noopener"&gt;Custom banned password lists supported in Microsoft Entra External ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/whats-new#general-availability---client-credentials-in-microsoft-entra-external-id" target="_blank" rel="noopener"&gt;Client Credentials in Microsoft Entra External ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/external-id/customers/how-to-customize-branding-themes-apps" target="_blank" rel="noopener"&gt;App-based branding via Branding themes in Entra External ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/concept-conditional-access-session" target="_blank" rel="noopener"&gt;Session Control Conditional Access Policies in Entra External ID&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Global Secure Access&lt;/H2&gt;
&lt;H3&gt;New releases&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-customize-block-page" target="_blank" rel="noopener"&gt;Global Secure Access block pages&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-configure-domain-controllers" target="_blank" rel="noopener"&gt;Entra Private Access for Domain Controllers&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;-Shobhit Sahay&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 24 Apr 2026 20:16:41 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/what-s-new-in-microsoft-entra-march-2026/ba-p/4502150</guid>
      <dc:creator>ShobhitSahay</dc:creator>
      <dc:date>2026-04-24T20:16:41Z</dc:date>
    </item>
    <item>
      <title>Microsoft Entra expands SCIM support with new SCIM 2.0 APIs for identity lifecycle operations</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/microsoft-entra-expands-scim-support-with-new-scim-2-0-apis-for/ba-p/4507465</link>
      <description>&lt;P&gt;Modern organizations rely on a growing ecosystem of applications, platforms, and services to run their business. Managing users and groups consistently across these systems is essential for security and operational efficiency. Many teams rely on the System for Cross-domain Identity Management (SCIM) standard to maintain predictable integrations, reduce custom provisioning work, and simplify lifecycle tasks across their environment.&lt;/P&gt;
&lt;P&gt;Microsoft Entra has long supported SCIM‑based provisioning to SaaS applications and API‑driven inbound provisioning from HR systems. Today, we’re extending our support for standards‑based identity lifecycle automation by introducing Microsoft Entra SCIM 2.0 APIs, which allow external SCIM‑compatible identity sources to provision users and groups directly into Microsoft Entra. In this model, Microsoft Entra acts as the SCIM service provider (server), allowing external SCIM‑compatible clients—such as orchestration tools or custom automation frameworks—to provision and manage users and groups in Entra using standard SCIM operations. This is particularly valuable for customers who already use SCIM‑based automation frameworks or identity governance platforms and want to reuse their existing SCIM provisioning patterns when integrating with Microsoft Entra.&lt;/P&gt;
&lt;H2&gt;What you can do with Microsoft Entra SCIM 2.0 APIs&lt;/H2&gt;
&lt;P&gt;Microsoft Entra SCIM 2.0 APIs let identity teams, developers, and partners manage user and group lifecycle operations using a standards‑based approach that aligns with existing SCIM tooling.&lt;/P&gt;
&lt;P&gt;With these APIs, you can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Provision and deprovision users&lt;/STRONG&gt; in Microsoft Entra from HR systems, SaaS platforms, or custom applications.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Update user attributes&lt;/STRONG&gt; using the SCIM schema and supported extensions.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Manage Microsoft Entra ID security groups and Microsoft 365 groups&lt;/STRONG&gt;, including membership.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Integrate with existing SCIM clients and automation frameworks&lt;/STRONG&gt;, reusing established provisioning patterns.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Discover supported schemas and capabilities&lt;/STRONG&gt; through standard SCIM endpoints.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;A common scenario is synchronizing users from an HR system into Microsoft Entra, mapping attributes using the SCIM schema, and managing group membership based on role or department. Teams already using SCIM for other SaaS integrations can extend those same patterns to Microsoft Entra with minimal changes.&lt;/P&gt;
&lt;H2&gt;Get started&lt;/H2&gt;
&lt;P&gt;Follow the Microsoft Learn documentation to &lt;A href="https://aka.ms/EnableEntraSCIMAPI" target="_blank" rel="noopener"&gt;enable SCIM APIs&lt;/A&gt; and begin integrating with your SCIM client.&lt;/P&gt;
&lt;H2&gt;Licensing model&lt;/H2&gt;
&lt;P&gt;The Microsoft Entra SCIM 2.0 APIs follow a consumption-based pricing model. Refer to the &lt;A class="lia-external-url" href="https://aka.ms/EntraSCIMAPIPricing" target="_blank" rel="noopener"&gt;pricing page&lt;/A&gt; for eligibility and pricing details.&lt;/P&gt;
&lt;H2&gt;Learn more&lt;/H2&gt;
&lt;P&gt;The Microsoft Entra SCIM 2.0 APIs are now generally available in the Microsoft Entra public cloud and will be available in Microsoft Entra ID for US Government by the end of June 2026.&lt;/P&gt;
&lt;P&gt;To explore Microsoft Entra SCIM 2.0 APIs in more detail, review the following resources on Microsoft Learn:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/EntraSCIMAPIReference" target="_blank" rel="noopener"&gt;SCIM API reference documentation including endpoints and permissions&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/EntraSCIMAPITroubleshooting" target="_blank" rel="noopener"&gt;SCIM schema documentation with supported attributes and extensions&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://aka.ms/EntraSCIMAPIPricing" target="_blank" rel="noopener"&gt;SCIM 2.0 API provisioning pricing Web Page&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;-Joseph Dadzie&lt;/P&gt;
&lt;P&gt;Vice President, Product Management&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/UnderstandSCIMSupportInEntra" target="_blank" rel="noopener"&gt;Understand SCIM support in Microsoft Entra ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/entra/identity/app-provisioning/user-provisioning" target="_blank" rel="noopener"&gt;App provisioning using SCIM&lt;/A&gt; &amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 09 Apr 2026 18:38:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/microsoft-entra-expands-scim-support-with-new-scim-2-0-apis-for/ba-p/4507465</guid>
      <dc:creator>Joseph Dadzie</dc:creator>
      <dc:date>2026-04-09T18:38:08Z</dc:date>
    </item>
    <item>
      <title>Evolving identity security: How the Conditional Access Optimization Agent helps you adapt</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/evolving-identity-security-how-the-conditional-access/ba-p/4488927</link>
      <description>&lt;P&gt;Organizations are expanding Zero Trust across more users, applications, and now a growing population of AI agent identities, making it even more challenging to maintain visibility and control at scale. As environments grow more complex and change daily, static best-practice approaches can’t keep up. Security teams are left trying to reason across dozens of access policies, shifting conditions, and evolving risks, often without clear visibility into where gaps exist.&lt;/P&gt;
&lt;P&gt;That’s exactly what we’re hearing from customers.&lt;/P&gt;
&lt;P&gt;“The recommendations are great, but they don’t always match how our organization works.”&lt;/P&gt;
&lt;P&gt;With this latest set of enhancements, the Conditional Access Optimization Agent moves beyond static guidance to continuous, context-aware identity posture optimization. The agent now understands your organization’s business context, surfaces gaps that manual reviews miss, helps you act on insights safely, and proves the impact of your improvements—all as part of a new operating model for identity security.&lt;/P&gt;
&lt;P&gt;Here’s a quick look at what’s new in the Conditional Access Optimization Agent, now in public preview:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Context-aware recommendations&lt;/STRONG&gt; tailored to your environment.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Continuous deep gap analysis&lt;/STRONG&gt; to identify persistent or emerging policy gaps.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Automated least-privilege enforcement&lt;/STRONG&gt; to reduce unnecessary permissions.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enhanced phased rollout &lt;/STRONG&gt;for gradual, controlled deployment.&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Passkey deployment campaigns &lt;/STRONG&gt;that streamline phishing-resistant authentication rollout.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Zero Trust posture reporting &lt;/STRONG&gt;that helps demonstrate measurable improvements.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These new capabilities are designed to work together as part of a continuous operating model for identity security.&lt;/P&gt;
&lt;P&gt;To make this concrete, let’s walk through how the agent works in practice across four key steps – from tailoring recommendations to your environment, to identifying gaps, safely deploying changes, and measurable impact.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;This is a view of the agent overview dashboard, showing analyzed coverage, identified gaps, and recommended actions to strengthen your access policies.&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;Step 1: Make recommendations match your reality&lt;/H2&gt;
&lt;P&gt;Every organization runs Conditional Access a little differently. Naming conventions, policy design patterns, and exception processes – these all vary across environments.&lt;/P&gt;
&lt;P&gt;Until now, the agent's recommendations were based on industry and Microsoft best practices, sign-in data, and your Conditional Access policies. However, guidance needs to reflect how your organizations actually operate.&lt;/P&gt;
&lt;H3&gt;Context-aware policy recommendations – teach the agent your standards&lt;/H3&gt;
&lt;P&gt;With context-aware policy recommendations, you can upload internal documentation directly to the agent. Think about the guidance your team already relies on, such as documents that outline authentication strength requirements, device compliance baselines, and internal or external policy standards. These often live as PDFs, wiki pages, or long policy docs that admins manually cross-reference during periodic reviews.&lt;/P&gt;
&lt;P&gt;The agent securely uses that context to tailor recommendations for your organization, so they align with how your team designs and manages Conditional Access.&lt;/P&gt;
&lt;P&gt;For example, the Australian government publishes &lt;A href="https://blueprint.asd.gov.au/design/platform/identity/conditional-access/" target="_blank" rel="noopener"&gt;Conditional Access guidance&lt;/A&gt; for organizations operating in regulated environments. The agent is able to reason over this guidance and produce recommendations aligned to Australian compliance standards.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;In the agent’s settings page, you can u&lt;/EM&gt;&lt;EM&gt;pload organization-specific policies and guidance so the agent can tailor recommendations to your environment&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;Step 2: Surface gaps humans can’t easily see&lt;/H2&gt;
&lt;P&gt;As environments grow more complex, Conditional Access policies become increasingly difficult to reason over. &amp;nbsp;Organizations often manage dozens, or even hundreds, of policies across user groups, applications, authentication strengths, and device requirements, making it hard to fully understand how they interact.&lt;/P&gt;
&lt;H3&gt;Continuous deep gap analysis&lt;/H3&gt;
&lt;P&gt;Enterprise customers average 83 Conditional Access policies. The number of possible interactions between those policies – layers, overlaps, and coverage gaps – is challenging to reason over.&amp;nbsp; Manual review typically focuses on recently changed policies. But some of the most critical gaps have been there all along. They are persistent configuration issues that have existed for years.&lt;/P&gt;
&lt;P&gt;The agent evaluates how policies interact with one another, understands how authentication requirements are enforced across the policies, and identifies gaps where coverage falls short. This means it can detect:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;newly introduced gaps caused by policy changes or configuration drift&lt;/LI&gt;
&lt;LI&gt;persistent structural gaps cause by policy overlap, constantly evolving exceptions, and more&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Instead of reviewing policies one by one, the agent evaluates the entire access control system as a whole.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;The agent identifies uncovered users and policy gaps by analyzing how Conditional Access policies interact across your environment.&lt;/EM&gt;&lt;/P&gt;
&lt;H3&gt;Zero Trust least-privileged enforcement for agent identities&lt;/H3&gt;
&lt;P&gt;Nowadays, access is no longer just about people. Gartner stated that by 2029, most secure access requests will come from non-human identities—up from less than 5% today.&lt;/P&gt;
&lt;P&gt;As AI agents become a rapidly growing part of the workforce, they also introduce new risks. Many of these identities can be over-privileged, making them attractive targets for attackers!&lt;/P&gt;
&lt;P&gt;The Conditional Access Optimization Agent identifies agent identities with excessive or unused permissions and recommends least-privilege adjustments.&lt;/P&gt;
&lt;P&gt;This extends continuous Zero Trust enforcement beyond workforce identities to the fastest-growing population in your environment.&lt;/P&gt;
&lt;H2&gt;Step 3: Turn insight into action without breaking things&lt;/H2&gt;
&lt;P&gt;Finding gaps is important. Fixing them safely is where the real operational challenge begins.&lt;/P&gt;
&lt;P&gt;We all know the risk of making access policy changes without understanding their real-world impact. A single misconfigured policy can lock out users or disrupt critical applications.&lt;/P&gt;
&lt;P&gt;These enhancements help your teams move from insight to execution with confidence.&lt;/P&gt;
&lt;H3&gt;Phased rollout for any Conditional Access policy&lt;/H3&gt;
&lt;P&gt;With our updated Phased Rollout capability, you can now deploy any Conditional Access policy gradually, not &lt;EM&gt;only&lt;/EM&gt; agent-recommended ones like in our previous release.&lt;/P&gt;
&lt;P&gt;For each rollout, the agent proposes low-impact phases, monitors real user impact at every stage, and intelligently suggests progression or roll back so you can easily deploy policies while minimizing end-user impact. This means your team no longer needs to manually move policies from report only to enabled. The agent handles that progression for you.&lt;/P&gt;
&lt;P&gt;This allows your team to strengthen access protections in a way that works for your business, without widespread lockouts, helpdesk spikes, or disruption to critical workflows.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;The agent &lt;/EM&gt;&lt;EM&gt;creates a phased rollout plan, allowing policies to be deployed gradually while monitoring user impact and minimizing disruption.&lt;/EM&gt;&lt;/P&gt;
&lt;H3&gt;Passkey deployment campaigns – structured adoption of phishing-resistant authentication&lt;/H3&gt;
&lt;P&gt;Phishing-resistant authentication is one of the most important steps organizations can take to strengthen identity security – and passkeys deliver both security and usability. The challenge isn't &lt;EM&gt;whether &lt;/EM&gt;to adopt passkeys, but how to roll them out without creating operational friction.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/msc/documents/presentations/CSR/Microsoft-Digital-Defense-Report-2025.pdf#page=1" target="_blank" rel="noopener"&gt;Microsoft data&lt;/A&gt; shows consumer users are 3× more successful signing in with passkeys compared to legacy authentication methods. That's where the agent's passkey campaign experience comes in, helping you run structured adoption campaigns across your organization.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Start with your highest-impact users such as administrators, executives, or employees most targeted by phishing. The agent tracks registration progress, identifies users that haven’t enrolled yet, communicates with them via teams, and helps you expand adoption wave by wave.&lt;/P&gt;
&lt;P&gt;No more ad hoc enforcement or spreadsheet-driven tracking across teams.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;The agent &lt;/EM&gt;&lt;EM&gt;guides passkey adoption with structured campaigns, targeting users, tracking progress, and expanding rollout in stages.&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;Step 4: Prove progress and communicate impact&lt;/H2&gt;
&lt;P&gt;Closing gaps is only just a piece of the whole story. Security leaders increasingly need to demonstrate measurable progress, to both internal stakeholders and your executive leadership.&lt;/P&gt;
&lt;P&gt;The built-in reporting dashboard provides a clear summary of posture improvements driven by you and the agent. You can track:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Exactly how many Conditional Access policy gaps the agent has discovered&lt;/LI&gt;
&lt;LI&gt;Users, Apps, and Agent IDs you have improved policy coverage for&lt;/LI&gt;
&lt;LI&gt;Remaining users, apps, and agent IDs requiring additional coverage&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This makes it easier to demonstrate the value of your Zero Trust investments and communicate progress to your leadership.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;The reporting dashboard tracks Conditional Access posture improvements, showing gaps closed, coverage gained, and remaining areas to address.&lt;/EM&gt;&lt;/P&gt;
&lt;H1&gt;The new operating model for identity security&lt;/H1&gt;
&lt;P&gt;These enhancements aren't incremental improvements to a recommendation engine.&lt;/P&gt;
&lt;P&gt;They represent a shift in how identity security operations work. Moving from static rule management to continuous, context-aware optimization leveraging the power of AI.&lt;/P&gt;
&lt;P&gt;Identity security is no longer a periodic audit exercise. It becomes a continuous operational capability - helping you secure both human and non-human identities across authentication, access, and risk.&lt;/P&gt;
&lt;H2&gt;Get started today&lt;/H2&gt;
&lt;P&gt;If you have Microsoft 365 E5, the Conditional Access Optimization Agent will become available through a phased rollout. Once available in your tenant, you can enable it directly in the Microsoft Entra admin center and start using it right away.&lt;/P&gt;
&lt;P&gt;We are continuing to expand these capabilities and will evolve the agent based on your feedback.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;STRONG&gt;Enable the Conditional Access Optimization Agent → &lt;/STRONG&gt;&lt;/EM&gt;&lt;A href="https://entra.microsoft.com/#view/Microsoft_Entra_Copilot/AgentsLibrary.ReactView" target="_blank" rel="noopener"&gt;Security Copilot agents - Microsoft Entra admin center&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Swaroop Krishnamurthy&lt;/P&gt;
&lt;P&gt;Principal Product Manager, Microsoft Entra&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.linkedin.com/in/swaroopk/" target="_blank" rel="noopener"&gt;Swaroop Krishnamurthy | LinkedIn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/security-copilot/conditional-access-agent-optimization" target="_blank" rel="noopener"&gt;Microsoft Entra Conditional Access optimization agent | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/security-copilot/conditional-access-agent-optimization-knowledge-base" target="_blank" rel="noopener"&gt;Conditional Access Optimization Agent knowledge base (Preview) | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/security-copilot/conditional-access-agent-optimization-phased-rollout" target="_blank" rel="noopener"&gt;Conditional Access Optimization Agent phased rollout | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 31 Mar 2026 20:17:05 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/evolving-identity-security-how-the-conditional-access/ba-p/4488927</guid>
      <dc:creator>Swaroop Krishnamurthy</dc:creator>
      <dc:date>2026-03-31T20:17:05Z</dc:date>
    </item>
    <item>
      <title>Microsoft Entra Tenant Governance: Secure and manage multi-tenant environments at scale</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/microsoft-entra-tenant-governance-secure-and-manage-multi-tenant/ba-p/4462427</link>
      <description>&lt;P&gt;Managing identity across multiple tenants is a growing challenge for organizations of all sizes. Mergers, acquisitions, and the rise of shadow IT often lead to a fragmented tenant landscape—creating security and compliance blind spots that attackers are quick to exploit. Even a single poorly secured tenant can put your entire organization at risk.&lt;/P&gt;
&lt;P&gt;Many of these shadow tenants may lack critical controls like MFA, Conditional Access, or privileged role protections. &lt;A href="https://www.microsoft.com/en-us/security/blog/2024/01/25/midnight-blizzard-guidance-for-responders-on-nation-state-attack/" target="_blank" rel="noopener"&gt;Recent high-profile incidents&lt;/A&gt; have reinforced an important reality: attackers can move laterally from an unmanaged tenant into production environments, bypassing controls organizations assumed were in place.&lt;/P&gt;
&lt;P&gt;Microsoft Entra Tenant Governance addresses this challenge by providing a centralized, risk-informed way to discover, govern, and continuously secure all related tenants—without relying on custom scripts or fragmented administrative models. From small tenant estates to large enterprises, Entra Tenant Governance enables least-privilege access, enforces configuration baselines, and maintains continuous visibility from a single control plane.&lt;/P&gt;
&lt;H2&gt;Why Tenant Governance Matters&lt;/H2&gt;
&lt;P&gt;Built on Microsoft’s own experience securing a large and complex tenant estate, Entra Tenant Governance is designed to make tenant relationships visible, governance enforceable, and security posture continuously verifiable—at scale. Tenant Governance provides a centralized model for managing tenants with different workloads, security requirements, and operational owners, enabling consistent governance across tenants without forcing a one-size-fits-all approach.&lt;/P&gt;
&lt;P&gt;With Entra Tenant Governance, organizations can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Discover and inventory all related tenants&lt;/STRONG&gt;, including production, non-production, and employee-created tenants.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Establish governance relationships&lt;/STRONG&gt; for least-privilege cross-tenant access.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Monitor and enforce consistent tenant policies&lt;/STRONG&gt; to maintain a strong security and compliance posture.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Securely create new tenants&lt;/STRONG&gt; with governance applied from day one.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;So what does this look like in the real world? Let’s walk through four scenarios.&lt;/P&gt;
&lt;H2&gt;Real-World Scenarios&lt;/H2&gt;
&lt;H3&gt;1. Discovering Related Tenants&lt;/H3&gt;
&lt;P&gt;An organization is trying to reduce tenant-to-tenant risk across a growing identity estate shaped by mergers, acquisitions, and shadow IT. The security team recognizes that effective mitigation starts with visibility, so they begin by identifying which other tenants are connected to their production tenant and what exposure those connections might create.&lt;/P&gt;
&lt;P&gt;Related Tenants experience automatically generates a continuously updated list of tenants that have observable connections to the organization’s tenant. This is not intended to be a definitive ownership or organizational inventory, but a risk-informed discovery view designed to surface tenants that may warrant governance attention. The tenant governance service keeps this inventory current by detecting relationships based on discovery signals for&amp;nbsp;&lt;STRONG&gt;B2B access&lt;/STRONG&gt;, &lt;STRONG&gt;multi-tenant applications&lt;/STRONG&gt;, and &lt;STRONG&gt;Microsoft billing&lt;/STRONG&gt;. In practice, the organization finds that tenants requiring governance attention typically leave these discoverable “traces” in production environments, making it possible to identify and prioritize them without relying on a manual inventory.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Screenshot of related tenants discovery view.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Next, the organization uses the metrics associated with each discovery signal to triage. These metrics help determine which related tenants should be brought into governance and whether any existing relationships represent immediate security exposure that needs to be mitigated.&lt;/P&gt;
&lt;P&gt;When the team drills into a specific related tenant, the experience consolidates signals into a single view that clarifies how the tenant is connected and what risks the relationship may introduce. For example, the organization may see users using &lt;STRONG&gt;B2B&lt;/STRONG&gt; to access administrative experiences in the related tenant. The team may also see a &lt;STRONG&gt;Microsoft billing&lt;/STRONG&gt; relationship indicating that a billing account in the organization’s tenant is paying for an Azure subscription in the other tenant. Together, these signals suggest the tenant should likely be governed as part of the organization’s tenant landscape. If the related tenant also hosts a &lt;STRONG&gt;multi-tenant app&lt;/STRONG&gt; with access to the organization’s tenant data, that becomes a priority indicator. The team can then validate and strengthen security controls to reduce the risk of data exposure if the related tenant or its applications are not adequately secured.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Screenshot of related tenants discovery signals.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://aka.ms/TenantGovernance/RelatedTenants" target="_blank" rel="noopener"&gt;Learn more about related tenants&lt;/A&gt;.&lt;/P&gt;
&lt;H3&gt;2. Creating Tenant Governance Relationships&lt;/H3&gt;
&lt;P&gt;After identifying tenants that require governance, an organization needs reliable administrative access across those tenants to perform resource management and governance tasks. The identity team wants to avoid the overhead and risk of managing separate local admin accounts or managing permissions of B2B accounts in every tenant.&lt;/P&gt;
&lt;P&gt;Using Microsoft Entra Tenant Governance, the organization establishes &lt;STRONG&gt;tenant governance relationships&lt;/STRONG&gt; between its central governing tenant and each governed tenant. Each relationship is set up through a &lt;STRONG&gt;request and approval workflow&lt;/STRONG&gt; that formalizes which tenant is governing and which is governed, and the degree of access that the governing tenant has to the governed tenant. This approach scales so that as the organization’s tenant landscape grows, the governing tenant can manage relationships with many governed tenants with different security, compliance, and organizational requirements.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Screenshot of governed tenants view.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Once relationships are established, the organization assigns &lt;STRONG&gt;least-privilege delegated administration&lt;/STRONG&gt; by mapping security groups in the governing tenant to built-in Entra roles in each governed tenant. Administrators can then sign in from the governing tenant and manage resources in governed tenants across Microsoft administration experiences, without requiring a B2B guest account or a local user account in those tenants. This creates a more streamlined and consistent admin experience across environments.&lt;/P&gt;
&lt;P&gt;Centralized access administration also improves control. The organization can view, audit, and manage administrative access in one place, and keep permissions aligned to job changes by updating group membership in the governing tenant.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Screenshot of tenant governance policy template details.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://aka.ms/TenantGovernance/GovernanceRelationships/Docs" target="_blank" rel="noopener"&gt;Learn more about tenant governance relationships&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Administrators of Microsoft Defender and Sentinel are also able to leverage delegated access in the Defender multi-tenant management experience. To learn more about this, read the &lt;A href="https://aka.ms/GDAPNews26" target="_blank" rel="noopener"&gt;Defender blog post&lt;/A&gt;.&lt;/P&gt;
&lt;H3&gt;3. Tenant Configuration Management&lt;/H3&gt;
&lt;P&gt;An organization has established administrative access to the tenants it governs, and the next priority is keeping those tenants aligned with security and compliance requirements over time. The challenge is consistency. Settings often drift as admins make changes, new policies are introduced, or service configurations evolve. The identity and security teams need a repeatable way to define what “good” looks like across different tenants in its estate, and to detect when a tenant deviates.&lt;/P&gt;
&lt;P&gt;With tenant configuration management, the organization defines a&amp;nbsp;&lt;STRONG&gt;configuration baseline&lt;/STRONG&gt; that represents the desired state of tenant resources. The baseline is expressed in a standard &lt;STRONG&gt;.json&lt;/STRONG&gt; format and can cover more than 200 resource types across Microsoft services, including items like Conditional Access policies in Entra and transport rules in Exchange, as well as supported resources in Intune, Defender, Purview, and Teams. The organization can use different configuration baselines depending on the workloads and requirements in a particular tenant.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Screenshot of tenant configuration baseline view.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;To accelerate adoption, the organization uses &lt;STRONG&gt;configuration snapshots&lt;/STRONG&gt; to capture settings from a known-good tenant and uses that output as a starting point for the baseline, rather than authoring everything from scratch.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Screenshot of tenant configuration monitors.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;The organization then sets up &lt;STRONG&gt;configuration monitors&lt;/STRONG&gt; that run automatically on a schedule and validate the actual state of resources against the baseline. The results provide recent run summaries, and a configuration drift report highlights where configurations differ from the desired state so teams can prioritize remediation.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Screenshot of tenant configuration drift report.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;To match operational ownership, the organization creates up to 30 monitors and commonly aligns them by service, such as one monitor for Entra and another for Exchange. Each monitor can include as many resources as the organization is licensed to monitor.&lt;/P&gt;
&lt;P&gt;Organizations that are currently leveraging the open-source Microsoft365DSC solution can easily migrate to Entra tenant configuration management. The Entra solution offers several improvements over the open-source project, is fully supported by Microsoft, and is the recommended approach for organizations looking to manage their tenants’ configuration with declarative code.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://aka.ms/TenantGovernance/ConfigurationManagement/Docs" target="_blank" rel="noopener"&gt;Learn more about configuration management&lt;/A&gt;. To see the full list of resource types that are supported for tenant configuration management, see our documentation: &lt;A href="https://learn.microsoft.com/en-us/graph/utcm-entra-resources" target="_blank" rel="noopener"&gt;Entra&lt;/A&gt;, &lt;A href="https://learn.microsoft.com/en-us/graph/utcm-exchange-resources" target="_blank" rel="noopener"&gt;Exchange&lt;/A&gt;, &lt;A href="https://learn.microsoft.com/en-us/graph/utcm-intune-resources" target="_blank" rel="noopener"&gt;Intune&lt;/A&gt;, &lt;A href="https://learn.microsoft.com/en-us/graph/utcm-securityandcompliance-resources" target="_blank" rel="noopener"&gt;Defender and Purview&lt;/A&gt;, and &lt;A href="https://learn.microsoft.com/en-us/graph/utcm-teams-resources" target="_blank" rel="noopener"&gt;Teams&lt;/A&gt;.&lt;/P&gt;
&lt;H3&gt;4. Secure Tenant Creation&lt;/H3&gt;
&lt;P&gt;Now that the organization has discovered its related tenants and brought them under governance, the next priority is ensuring that any new tenants created in the future follow the same governed pattern from day one. The organization still needs flexibility to support real business needs, so the identity team designs a controlled process that allows only approved users, in the engineering group, to create add-on tenants for testing new capabilities in a test environment.&lt;/P&gt;
&lt;P&gt;With secure tenant creation, the organization can enable this delegated creation model while helping ensure governance from the start. When an approved user creates a new tenant, it is configured to be well-governed from day one. The new tenant is created with a built-in tenant governance relationship to the organization’s governing tenant, ensuring the governing tenant has the cross-tenant administrative access needed to apply governance and perform ongoing management without delay.&lt;/P&gt;
&lt;P&gt;Newly created tenants are also linked to the organization’s &lt;STRONG&gt;Microsoft billing account&lt;/STRONG&gt; at creation time. This provides proof of commercial ownership and reduces operational risk. If administrative access to the tenant is lost, the billing linkage helps streamline tenant recovery, so the environment does not become orphaned.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Screenshot of secure tenant creation process.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://aka.ms/TenantGovernance/SecureTenantCreation/Docs" target="_blank" rel="noopener"&gt;Learn more about secure tenant creation&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;Licensing and Availability&lt;/H2&gt;
&lt;P&gt;Microsoft Entra Tenant Governance capabilities are available in Entra ID P1 (also included in Microsoft 365 E3), Entra ID P2 (also included in Microsoft 365 E5), and Microsoft Entra ID Governance (also included in Entra Suite and Microsoft 365 E7). See the &lt;A class="lia-external-url" href="https://docs.azure.cn/en-us/entra/fundamentals/licensing" target="_blank" rel="noopener"&gt;Microsoft&amp;nbsp;Entra licensing &lt;/A&gt;page for&amp;nbsp;more details.&lt;/P&gt;
&lt;P&gt;Tenant configuration management APIs are generally available. Other tenant governance experiences are in public preview. These new capabilities are now rolling out, with deployment expected to complete over the next few days.&lt;/P&gt;
&lt;H2&gt;How to Get Started&lt;/H2&gt;
&lt;P&gt;To get started, read our &lt;A href="https://aka.ms/TenantGovernance/Docs" target="_blank" rel="noopener"&gt;Tenant Governance documentation&lt;/A&gt; to learn more about these features and how they enable you to address important security and compliance scenarios.&lt;/P&gt;
&lt;P&gt;High-quality tenant governance tooling and operational processes are foundational for organizations to achieve their security and compliance objectives. We’re eager to get your feedback on these new Entra capabilities that empower you to achieve your goals – feel free to drop a note below in the comments section of this article.&lt;/P&gt;
&lt;P&gt;-Joseph Dadzie&lt;BR /&gt;Vice President, Product Management&lt;/P&gt;
&lt;H3&gt;Additional Resources&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/TenantGovernance/Docs" target="_blank" rel="noopener"&gt;Microsoft Entra tenant governance documentation&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/EntraRSAC2026" target="_blank" rel="noopener"&gt;Microsoft Entra innovations announced at RSAC 2026&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/RSAC26_frontierblog" target="_blank" rel="noopener"&gt;Secure agentic AI end-to-end&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Learn More About Microsoft Entra&lt;/H3&gt;
&lt;P&gt;Prevent identity attacks, ensure least-privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 31 Mar 2026 20:18:20 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/microsoft-entra-tenant-governance-secure-and-manage-multi-tenant/ba-p/4462427</guid>
      <dc:creator>Joseph Dadzie</dc:creator>
      <dc:date>2026-03-31T20:18:20Z</dc:date>
    </item>
    <item>
      <title>Strengthen identity resilience: Recover with confidence using Microsoft Entra Backup and Recovery</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/strengthen-identity-resilience-recover-with-confidence-using/ba-p/4462426</link>
      <description>&lt;P&gt;Identity is the backbone of modern security. When identity systems fail, access breaks down, productivity stops, and security controls weaken across the organization. That is why &lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/leading-the-way-in-resilience-at-scale/4094703" target="_blank" rel="noopener"&gt;Microsoft invests deeply in resilience&lt;/A&gt; across Microsoft Entra, designing the service not only to meet a 99.99% availability SLA, but also to continue supporting sign-ins even when parts of the cloud experience disruption.&lt;/P&gt;
&lt;P&gt;This resilience is built into the foundation of the service. Microsoft Entra is hardened at the core, supported by a parallel backup authentication system, and reinforced through resilient SDKs and applications. Together, these layers help ensure that critical identity scenarios continue to function during service level incidents.&lt;/P&gt;
&lt;P&gt;However, resilience is not only about keeping the service available. It is also about recovering when changes inside your tenant do not go as planned. Identity environments evolve constantly as policies are updated, integrations expand, and administrative responsibilities shift. Without a reliable way to understand, validate, and recover those changes, even routine updates can introduce significant risk.&lt;/P&gt;
&lt;P&gt;A misaligned policy can block user or administrator access. A provisioning error can overwrite thousands of user attributes leading to increased support calls. A compromised privileged account can quietly modify critical group memberships in ways that are difficult to detect and even harder to reverse at scale. While service resilience keeps Microsoft Entra available, Microsoft Entra Backup and Recovery helps organizations recover when changes inside their environment introduce risk or disrupt users.&lt;/P&gt;
&lt;H2&gt;Microsoft Entra Backup and Recovery now available in Public Preview&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Entra Backup and Recovery&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;helps you build identity resilience into daily operations using an always‑on, Microsoft‑managed solution that rapidly restores critical identity objects to a known‑good state. It provides automatic backups, point‑in‑time visibility into configuration changes, and backups are protected by a built‑in safeguard that prevents them from being disabled, deleted, or altered. This helps reduce recovery time and maintain business continuity.&lt;/P&gt;
&lt;P&gt;For Public Preview, we are announcing new capabilities that &lt;STRONG&gt;help you recover with confidence&lt;/STRONG&gt;: Restoring core directory objects 1 backup a day within the last 5 days, including&amp;nbsp;&lt;STRONG&gt;users, groups, applications, service principals, Conditional Access policies, authentication method policy, authorization policy, and named locations.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Entra Backup and Recovery strengthens the core of your identity resilience strategy, helping you minimize downtime, protect your tenant, and recover quickly from both accidental changes and security compromises while maintaining confidence in the integrity of your environment.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt; Microsoft Entra Backup and Recovery is available today and requires an Entra ID P1 or P2 license. Learn more on the &lt;/EM&gt;&lt;A href="https://learn.microsoft.com/entra/backup/overview" target="_blank" rel="noopener"&gt;&lt;EM&gt;Microsoft Entra Backup and Recovery learn docs page.&lt;/EM&gt;&lt;/A&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;&amp;nbsp;Get started today by navigating to Microsoft Entra Backup and Recovery under the Entra ID blade in the Microsoft Entra admin center.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;Next, let’s explore how &lt;STRONG&gt;Entra Backup and Recovery helps organizations respond quickly and confidently &lt;/STRONG&gt;by examining three common disaster recovery scenarios. These include an erroneous Conditional Access update that blocks user access, widespread user‑attribute corruption caused by an HR system issue, and malicious modifications to identity configurations.&lt;/P&gt;
&lt;H2&gt;Scenario 1: Recovering from an erroneous Conditional Access change that locks out users&lt;/H2&gt;
&lt;P&gt;Conditional Access policies are central to enforcing Zero Trust, and many organizations rely on them to control access across users, applications, and locations. While safeguards such as report-only mode and change validation help reduce risk, organizations need a reliable way to quickly recover from mistakes that can have an outsized impact.&lt;/P&gt;
&lt;P&gt;In this scenario, an identity team is updating an existing Conditional Access policy as part of routine maintenance. During the update, an exclusion group is unintentionally removed from the policy assignments. The change applies right away. Some users are no longer able to sign-in, authentication failures increase, and helpdesk tickets begin to spike.&lt;/P&gt;
&lt;P&gt;To restore access without prolonged disruption, the identity team turns to Microsoft Entra Backup and Recovery. Using the Backup and Recovery experience in the Microsoft Entra admin center, they &lt;STRONG&gt;review available backups&lt;/STRONG&gt; and select a recent snapshot that reflects the last known-good configuration.&lt;/P&gt;
&lt;H3&gt;Identify the right backup to restore&lt;/H3&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;You can easily view available backups in the Microsoft Entra Admin center and take action on accidental changes.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Next, the team generates a&amp;nbsp;&lt;STRONG&gt;Difference Report&lt;/STRONG&gt; scoped to Conditional Access policies. The report clearly shows what changed, including the removal of the exclusion group from the affected policy. This allows the team to confirm the root cause before taking action and to ensure no unrelated policies are included in the recovery scope.&lt;/P&gt;
&lt;P&gt;After validating the changes, the team runs a targeted recovery job to restore the affected Conditional Access policy to its previous state. Within minutes, access is restored for impacted users, without requiring manual policy edits or custom scripts.&lt;/P&gt;
&lt;P&gt;By using Microsoft Entra Backup and Recovery to identify the exact change and revert only the affected configuration, the organization resolves the incident quickly, limits disruption, and maintains confidence in its identity controls.&lt;/P&gt;
&lt;H2&gt;Scenario 2: Restoring user attributes after an HR system error pushes incorrect data at scale&lt;/H2&gt;
&lt;P&gt;Many organizations rely on an HR system as the authoritative source for user identity data. Attributes such as job title, department, and manager name often flow automatically into Microsoft Entra and downstream applications to power access decisions, workflows, and reporting.&lt;/P&gt;
&lt;P&gt;In this scenario, a configuration issue in the HR system causes incorrect attribute values to be pushed to multiple user accounts during a scheduled provisioning cycle. Job titles and departments are overwritten at scale, reporting structures become inaccurate, and applications that depend on consistent identity data begin to behave unpredictably. To prevent further impact, the identity team pauses inbound provisioning while they assess the situation.&lt;/P&gt;
&lt;P&gt;To investigate, the identity team uses Microsoft Entra Backup and Recovery to compare the current state of user attributes with a backup taken two days prior.&lt;/P&gt;
&lt;H3&gt;Validate configuration changes with a Difference Report&lt;/H3&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Admins can use the Difference Report to gain visibility into attribute changes, with a clear, itemized view across affected users.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;The generated &lt;STRONG&gt;Difference Report &lt;/STRONG&gt;clearly shows which users were affected and exactly which attributes changed, giving the team an immediate, actionable view of the impact.&lt;/P&gt;
&lt;P&gt;To ensure the correct scope before recovery, the team &lt;STRONG&gt;applies granular filters&lt;/STRONG&gt; to narrow the recovery to the affected users and attributes. This allows them to precisely target the recovery job without overwriting unrelated or valid updates made elsewhere in the directory.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;You can apply granular filters in the difference report to quickly pinpoint the exact object that needs recovery. &lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;After examining the changes and applying the right filters, administrators&amp;nbsp;&lt;STRONG&gt;initiate the recovery job&lt;/STRONG&gt;. Throughout execution, they monitor progress from the recovery history page, which surfaces real‑time status through the modified objects column, giving teams clear visibility into recovery progress and scope.&lt;/P&gt;
&lt;P&gt;Once the HR system configuration is corrected, inbound provisioning is resumed with confidence, knowing the directory has been returned to a previously known good state and the organization can trust the accuracy of its identity data going forward, and normal operations continue without prolonged disruption.&lt;/P&gt;
&lt;H3&gt;Scenario 3: Recovering after malicious changes to identity configurations&lt;/H3&gt;
&lt;P&gt;In this scenario, a compromised privileged account is used to make malicious changes to identity configurations. &amp;nbsp;MFA requirements are weakened and sensitive group memberships tied to critical applications are altered. Security teams detect suspicious activity and escalate the incident for investigation and remediation.&lt;/P&gt;
&lt;P&gt;Once the immediate threat is contained, the identity team must determine exactly what changed and restore trusted configurations as quickly as possible. Manually reviewing and rebuilding identity settings across multiple objects would be time consuming and increases the risk of missing subtle but impactful changes. In addition to malicious configuration changes, malicious actors may also delete critical identity objects, which Microsoft Entra Backup and Recovery can restore by integrating with soft‑deletion as part of the same recovery process.&lt;/P&gt;
&lt;P&gt;To assess the impact, the team uses Microsoft Entra Backup and Recovery to compare the current tenant state with a backup that reflects the last known good configuration prior to the compromise.&lt;/P&gt;
&lt;H3&gt;Execute the recovery job with confidence&lt;/H3&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;You can quickly verify configuration changes and execute the recovery job with Microsoft Entra Backup and Recovery. &lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Once admins identify which directory object they want to recover, they select&amp;nbsp;&lt;STRONG&gt;Recover this object&lt;/STRONG&gt;, to remove the attacker’s malicious modifications and restore the trusted configuration. After running the recovery job, trusted configurations are reinstated and malicious modifications are removed, and the team verifies that MFA enforcement, access conditions, and group memberships have been returned to their expected state without requiring manual cleanup or reconstruction.&lt;/P&gt;
&lt;P&gt;By using Microsoft Entra Backup and Recovery to quickly identify and revert malicious changes, the organization limits the blast radius of the incident, restores confidence in its identity environment, and resumes normal operations with minimal disruption.&lt;/P&gt;
&lt;H2&gt;Getting started with Microsoft Entra Backup and Recovery&lt;/H2&gt;
&lt;P&gt;Microsoft Entra Backup and Recovery is available today in Public Preview. If you’re a Microsoft Entra customer with Entra ID P1 or P2 license, you can start using these capabilities immediately in the Microsoft Entra admin center.&lt;/P&gt;
&lt;P&gt;Microsoft Entra Backup and Recovery is built as an API‑first, extensible platform that gives customers the flexibility to design backup and recovery workflows aligned to their operational needs. These same APIs enable independent software vendors (ISVs) to integrate and deliver complementary solutions that extend Entra with their domain expertise.&lt;/P&gt;
&lt;P&gt;To get started, sign-in to the Microsoft Entra Admin center as an Entra &lt;STRONG&gt;Backup Administrator&lt;/STRONG&gt; role. In the left navigation, select Backup and Recovery to explore your automatic backups, generate Difference Reports, and run recovery jobs. From here, you can review your snapshot history, investigate configuration changes across your directory, and begin restoring objects as needed.&lt;/P&gt;
&lt;P&gt;Identity resilience isn’t optional—it’s essential. With Microsoft Entra Backup and Recovery, you can minimize downtime, protect your tenant, and recover confidently from accidental changes or security compromises. &lt;STRONG&gt;Start using Entra Backup and Recovery in Public Preview&lt;/STRONG&gt; today and join the conversation in the Microsoft Entra Tech Community.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Joseph Dadzie&lt;/P&gt;
&lt;P&gt;Vice President, Product Management&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/entra/backup/" target="_blank" rel="noopener"&gt;Learn more about Microsoft Entra Backup and Recovery&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-occasion" href="https://techcommunity.microsoft.com/event/microsoft-security-events/recover-with-confidence-using-microsoft-entra-backup-and-recovery/4504269" target="_blank" rel="noopener" data-lia-auto-title="Register for our upcoming webinar: Recover with Confidence using Entra Backup and Recovery" data-lia-auto-title-active="0"&gt;Register for our upcoming webinar: Recover with Confidence using Entra Backup and Recovery&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/leading-the-way-in-resilience-at-scale/4094703" target="_blank" rel="noopener"&gt;Read more about Microsoft's commitment to resiliency&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/microsoft-entra-innovations-announced-at-rsac-2026/4502146" target="_blank" rel="noopener"&gt;Read more about Microsoft Entra Innovations announced at RSAC 2026&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;Learn more about Microsoft Entra &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 31 Mar 2026 20:31:16 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/strengthen-identity-resilience-recover-with-confidence-using/ba-p/4462426</guid>
      <dc:creator>Joseph Dadzie</dc:creator>
      <dc:date>2026-03-31T20:31:16Z</dc:date>
    </item>
    <item>
      <title>External MFA in Microsoft Entra ID is now generally available</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/external-mfa-in-microsoft-entra-id-is-now-generally-available/ba-p/4488926</link>
      <description>&lt;P&gt;Multifactor authentication remains a foundational control for securing user identities, especially as organizations adopt Zero Trust and respond to increasingly targeted identity attacks.&lt;/P&gt;
&lt;P&gt;Microsoft’s research shows that MFA reduces the risk of account compromise by more than 99 percent. Microsoft Entra ID already offers a broad set of native MFA options.&lt;/P&gt;
&lt;P&gt;Now, with the GA of external multifactor authentication (external MFA)—previously known as external authentication methods—you can integrate trusted third-party MFA providers while continuing to rely on Microsoft Entra ID as your central identity control plane.&lt;/P&gt;
&lt;H2&gt;Why External MFA matters&lt;/H2&gt;
&lt;P&gt;External MFA is designed for organizations that:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Use a third-party MFA solution to meet regulatory or business requirements&lt;/LI&gt;
&lt;LI&gt;Need to support specific scenarios, such as mergers and acquisitions&lt;/LI&gt;
&lt;LI&gt;Want to unify MFA experiences under a modern identity system&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Built on the OpenID Connect (OIDC) standard, external MFA allows you to integrate your preferred MFA provider into Microsoft Entra ID without sacrificing security or policy enforcement.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Figure 1: Configure external MFA in Microsoft Entra ID&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;How it works&lt;/H2&gt;
&lt;P&gt;Once configured, external MFA is managed alongside native Microsoft Entra ID authentication methods—giving administrators a single pane of glass for all authentication methods.&lt;/P&gt;
&lt;P&gt;Every sign-in still goes through full policy evaluation, including real-time risk assessment and &lt;STRONG&gt;Conditional Access&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Figure 2: Sign-in with external MFA&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Integrating external MFA with Conditional Access allows administrators to align authentication prompts with their organization’s security and business objectives by using sign-in frequency and session controls. When these policies are properly tuned, they strike the right balance between reauthentication and user productivity. However, overly frequent reauthentication can degrade user experience and can even increase phishing risk by conditioning users to approve prompts without careful review. To avoid these issues, we recommend following&amp;nbsp;&lt;A href="https://aka.ms/Mfaprompts" target="_blank" rel="noopener"&gt;Microsoft’s reauthentication guidance&lt;/A&gt; when configuring your Conditional Access policies.&lt;/P&gt;
&lt;H2&gt;Migration from Custom Controls&lt;/H2&gt;
&lt;P&gt;External MFA replaces &lt;A href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/controls" target="_blank" rel="noopener"&gt;Custom Controls&lt;/A&gt;, which will be &lt;STRONG&gt;deprecated on September 30, 2026&lt;/STRONG&gt;. Existing configurations will continue to work during the transition period. We’ll share detailed migration guidance soon to help you move to external MFA before the retirement date.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Start integrating external MFA today&lt;/STRONG&gt; by following our step-by-step guide on &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-external-method-manage" target="_blank" rel="noopener"&gt;Microsoft Learn.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Thank you to our customers and MFA solution partners for your feedback during the preview phase. Your input helped shape this release.&lt;/P&gt;
&lt;P&gt;-Swaroop Krishnamurthy&lt;/P&gt;
&lt;P&gt;Principal Product Manager &lt;BR /&gt;Microsoft Entra ID&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-external-method-manage" target="_blank" rel="noopener"&gt;How to manage external MFA in Microsoft Entra ID - Microsoft Entra ID | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra&amp;nbsp;&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2026 20:33:33 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/external-mfa-in-microsoft-entra-id-is-now-generally-available/ba-p/4488926</guid>
      <dc:creator>Swaroop Krishnamurthy</dc:creator>
      <dc:date>2026-03-31T20:33:33Z</dc:date>
    </item>
    <item>
      <title>Microsoft Entra innovations announced at RSAC 2026</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/microsoft-entra-innovations-announced-at-rsac-2026/ba-p/4502146</link>
      <description>&lt;P&gt;Agentic AI is reshaping how organizations work, and it is fundamentally changing how we must think about protecting identity and access. As AI accelerates innovation, the number of users, devices, apps, and agents is exploding, creating an unprecedented number of digital identities across disparate systems. Every new identity, whether human or non-human, represents another potential entry point for attackers and another potential gap in visibility. In the &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/secure-access-in-the-age-of-ai-key-findings-from-our-2026-report/4486060" target="_blank" rel="noopener" data-lia-auto-title="2026 Secure Access report" data-lia-auto-title-active="0"&gt;2026 Secure Access report&lt;/A&gt;, 97% of organizations experienced an identity or network access incident in the past year, and 70% reported incidents tied to AI-related activity.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The attack surface is growing faster than traditional security approaches can keep up, forcing organizations to rethink how they protect their identities and data at scale. This is why security must start with an &lt;A href="https://www.microsoft.com/en-us/security/blog/2025/12/17/access-fabric-a-modern-approach-to-identity-and-network-access/" target="_blank" rel="noopener"&gt;access fabric&lt;/A&gt;, which creates a common identity foundation for employees, workloads, and AI agents, continuously shares signals and evaluates risk, and enforces access decisions in real time across every identity and session.&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-olk-copy-source="MessageBody"&gt;The latest Microsoft Entra innovations advance this vision, so you can protect access for people and agents and strengthen your Zero Trust posture. With those new capabilities you can&lt;/SPAN&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Protect agent identities &lt;/STRONG&gt;&lt;SPAN data-olk-copy-source="MessageBody"&gt;with the same rigor as users, apps and devices, using familiar protections like identity governance and Conditional Access in Microsoft Entra Agent ID, the identity foundation of Microsoft Agent 365&lt;/SPAN&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Secure employee access in the AI era, &lt;/STRONG&gt;&lt;SPAN data-olk-copy-source="MessageBody"&gt;from shadow AI discovery and prompt injection protection to strong phishing-resistant authentication enabled by flexible passkey deployments, extensibility to the broad range external MFA providers, and adaptive risk remediation&lt;/SPAN&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Strengthen your identity foundation &lt;/STRONG&gt;&lt;SPAN data-olk-copy-source="MessageBody"&gt;by protecting your multi-tenant environments with Tenant governance, adding a layer of resilience with Backup and Recovery, making it possible to restore critical identity objects with confidence and accelerating Identity Security by improved identity risk detection, analytics and remediation, connecting identity and SecOps team to respond faster and proactively improve your identity security posture.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Supercharge your identity team &lt;/STRONG&gt;with&amp;nbsp;new Conditional Access agent capabilities, including context-aware recommendations, phased rollout for any policy, and automated least-privilege enforcement. You&amp;nbsp;can&amp;nbsp;also discover and extend identity integrations with Microsoft Security Store.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Throughout the week at RSAC, we’ll be demonstrating these capabilities and sharing practical guidance on how to build a more resilient, comprehensive identity and access security strategy. Below is a closer look at the innovations and where to see them in action at the RSAC.&lt;/P&gt;
&lt;H2&gt;Protect agent identities&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;As organizations adopt AI agents at scale, many are deployed without consistent controls. As &lt;A href="https://www.microsoft.com/en-us/security/blog/2026/03/09/secure-agentic-ai-for-your-frontier-transformation/" target="_blank" rel="noopener"&gt;shared earlier this month&lt;/A&gt;, Microsoft Entra Agent ID, the identity foundation of Microsoft Agent 365, helps secure agent identities and their access to resources by assigning a unique ID to AI agents built with Microsoft Foundry, Microsoft Copilot Studio and our Agent 365 ecosystem partners. This gives identity teams a consistent way to apply the same rigor they use for users, apps and devices identities.&lt;/P&gt;
&lt;P&gt;With that foundation in place, we are integrating ID Governance access packages into Microsoft Agent 365 Security Policy Templates, so agents can start secure as they are onboarded. We are also extending existing Conditional Access user policies to secure agents that work on behalf of users. These protections help make real-time access decisions based on risk signals and custom security attributes. Together, they help prevent compromise and reduce the risk of misuse by malicious actors.&lt;/P&gt;
&lt;H2&gt;Secure employee access in the AI era&lt;/H2&gt;
&lt;P&gt;As AI becomes embedded in daily work, organizations need consistent controls governing access to apps, data, and AI services. Microsoft Entra Suite unifies identity and network access under a single policy framework to help deliver Zero Trust access to any resource, including AI applications and agents. &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/securing-the-ai-era-starts-with-identity/4478952" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Microsoft Entra Internet Access &lt;/STRONG&gt;&lt;/A&gt;extends identity-based Zero Trust controls to web, SaaS, and AI traffic. It provides visibility into AI tools and agents and helps secure employee access as usage grows.&lt;/P&gt;
&lt;P&gt;Key innovations in Internet Access include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/global-secure-access/overview-application-usage-analytics" target="_blank" rel="noopener"&gt;Shadow AI detection &lt;/A&gt;complementing Microsoft Defender for Cloud Apps to discover and monitor unsanctioned AI applications, track usage, and instantly enforce Conditional Access to allow or block those apps (generally available).&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-ai-prompt-shield" target="_blank" rel="noopener"&gt;Prompt injection protection &lt;/A&gt;to block malicious AI prompts (generally available).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Microsoft Entra continues to advance passwordless authentication experiences, strengthening how users prove who they are and ensuring secure, low‑friction access as AI usage accelerates:&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-synced-passkeys" target="_blank" rel="noopener"&gt;Synced passkeys&lt;/A&gt; and &lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-passkey-profiles" target="_blank" rel="noopener"&gt;passkey profiles&lt;/A&gt; to enable seamless, phishing‑resistant sign‑in and deployment across your organization (generally available).&lt;/LI&gt;
&lt;LI&gt;Microsoft Entra Passkeys on Windows to extend Windows Hello experiences, making passkeys even more seamless for users on Windows devices (preview).&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/external-mfa-in-microsoft-entra-id-is-now-generally-available/4488926" target="_blank" rel="noopener" data-lia-auto-title="External MFA" data-lia-auto-title-active="0"&gt;External MFA&lt;/A&gt; (formerly called External Authentication Methods) to enable integration of MFA providers directly with Microsoft Entra ID and your existing Conditional Access policies (generally available).&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-policies#user-risk-based-conditional-access-policy" target="_blank" rel="noopener"&gt;Adaptive risk remediation&lt;/A&gt; enables passwordless users to securely regain access without help-desk friction. Entra ID Protection supports appropriate automatic self-remediation across all authentication methods, passwordless and those that still use passwords, adapting to where customers are in their modern authentication journey (generally available in April 2026).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These updates help protect identities and access points while moving organizations closer to a passwordless future.&lt;/P&gt;
&lt;H2&gt;Strengthen your identity foundation&lt;/H2&gt;
&lt;P&gt;Organizations require the ability to proactively govern multi-tenant environments and recover quickly from misconfigurations or compromises. To address this need, we're introducing new capabilities that strengthen identity resilience and minimize risk of managing complex, multitenant environments:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/strengthen-identity-resilience-recover-with-confidence-using-microsoft-entra-bac/4462426" target="_blank" rel="noopener" data-lia-auto-title="Microsoft Entra Backup and Recovery" data-lia-auto-title-active="0"&gt;Microsoft Entra Backup and Recovery&lt;/A&gt; enables confident recovery of critical directory objects to a known good state after accidental changes or security compromises. Automated, high-performance backups and point-in-time restore capabilities help reduce recovery time and support operational continuity (preview).&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/microsoft-entra-tenant-governance-secure-and-manage-multi-tenant-environments-at/4462427" target="_blank" rel="noopener" data-lia-auto-title="Microsoft Entra Tenant Governance" data-lia-auto-title-active="0"&gt;Microsoft Entra Tenant Governance&lt;/A&gt; helps you centrally govern multi-tenant environments, reduce risk from shadow IT tenants, and enforce a consistent security posture. You can discover and inventory tenants, establish governance relationships, monitor tenant configurations, and securely create new tenants (preview). The tenant configuration API helps you simplify and standardize how tenant settings are managed across Microsoft workloads with JSON-based configuration baselines (generally available).&lt;/LI&gt;
&lt;LI&gt;Microsoft Entra &lt;A href="https://learn.microsoft.com/entra/identity/multi-tenant-organizations/cross-tenant-synchronization-configure?pivots=same-cloud-synchronization" target="_blank" rel="noopener"&gt;cross-tenant group synchronization&lt;/A&gt; helps organizations securely manage access across related tenants by enabling governed, policy-driven group sharing without duplicating identities or increasing administrative overhead. By centralizing group lifecycle management and enforcing consistent governance controls across tenants, organizations can reduce access sprawl, simplify collaboration, and maintain least‑privilege access in complex multi-tenant environments (preview).&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Accelerate your identity security&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;But resilience alone isn’t enough. Modern identity security means stopping attacks before they escalate. And, as identities expand beyond human users, organizations need to extend their identity security tools to protect users, apps, and agentic identities across their identity fabric.&lt;/P&gt;
&lt;P&gt;We're advancing identity security with&amp;nbsp;&lt;STRONG&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/entra/id-protection/concept-risky-user-report#unified-risk-signals-preview" target="_blank" rel="noopener"&gt;unified risk and enhanced detections across Entra and Defender&lt;/A&gt;.&lt;/STRONG&gt; Powered by trillions of signals across Microsoft Security, risk-based Conditional Access can now make more informed and intelligent access decisions based on aggregated risk across identity accounts. This improves &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/blog/2026/03/25/identity-security-is-the-new-pressure-point-for-modern-cyberattacks/" target="_blank" rel="noopener"&gt;identity protection&lt;/A&gt; for high-impact scenarios like lateral movement and privilege escalation and strengthens protection across cloud and hybrid environments. With shared visibility across Identity and Security Operations teams, admins gain a deeper understanding of their risky identities and can respond more efficiently across their cloud and hybrid infrastructure.&lt;/P&gt;
&lt;H2&gt;Supercharge your identity team&lt;/H2&gt;
&lt;P&gt;Conditional Access is central to Zero Trust architecture, but policies can drift as environments change. The &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/evolving-identity-security-how-the-conditional-access-optimization-agent-helps-y/4488927" target="_blank" rel="noopener" data-lia-auto-title="Conditional Access Agent" data-lia-auto-title-active="0"&gt;Conditional Access Agent&lt;/A&gt; in Microsoft Entra helps continuously analyze access policies and deliver recommendations aligned to your unique environment. It identifies persistent gaps and helps strengthen protections without disrupting productivity.&lt;/P&gt;
&lt;P&gt;We’re introducing new capabilities that make the Conditional Access Agent more intelligent, personalized, and actionable (preview):&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Context-aware recommendations tailored to your environment.&lt;/LI&gt;
&lt;LI&gt;Enhanced phased rollout for gradual, controlled deployment.&lt;/LI&gt;
&lt;LI&gt;&lt;S&gt; &lt;/S&gt;Continuous deep gap analysis to identify persistent or emerging policy gaps.&lt;/LI&gt;
&lt;LI&gt;Automated least-privilege enforcement to reduce unnecessary permissions.&lt;/LI&gt;
&lt;LI&gt;Zero Trust posture reporting that helps demonstrate measurable improvements.&lt;/LI&gt;
&lt;LI&gt;Passkey deployment campaigns that streamline phishing-resistant authentication rollout.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Discover and extend identity integrations with Microsoft Security Store&lt;/H2&gt;
&lt;P&gt;Security Copilot agents help teams optimize and act, while the Microsoft Security Store helps them extend and scale. As identity environments expand, organizations increasingly rely on partner capabilities to address specialized needs. By bringing the &lt;A href="https://securitystore.microsoft.com/" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Microsoft Security Store&lt;/STRONG&gt;&lt;/A&gt; directly into Microsoft Entra, teams can now find trusted, Microsoft Entra‑ready agents and integrations within the product experience.&lt;/P&gt;
&lt;P&gt;The Microsoft Security Store helps customers discover identity solutions from Microsoft and partners, including integrations with Entra External ID and Entra Verified ID, plus more than 15 identity agents powered by Security Copilot that surface identity posture gaps, strengthen identity verification, reduce fraud across workforce, consumer, and external identities,&lt;EM&gt; and &lt;/EM&gt;more&lt;EM&gt;. &lt;/EM&gt;&amp;nbsp;This centralized discovery and purchasing experience reduces friction and helps teams deploy solutions more quickly through the Microsoft Security Store. &lt;A href="https://aka.ms/SecurityStoreRSAC2026Blogpost" target="_blank" rel="noopener"&gt;Read more&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;Where to find Microsoft Entra at RSAC 2026&lt;/H2&gt;
&lt;P&gt;Before RSAC begins, Microsoft Security product leaders will host a pre-day session on Sunday, March 22 at 4:00pm PST in the Palace Hotel to share how security is the foundation of Frontier Transformation. Learn more about our security vision, top threat intelligence trends, and product demos ahead of the event. &lt;A href="http://microsoftsecurityevents.eventbuilder.com/RSACMicrosoftEvents26?ref=blog_RSACpreevent" target="_blank" rel="noopener"&gt;Secure your spot today.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;During the week, come connect with the Microsoft Entra team at RSAC. Visit the &lt;STRONG&gt;Microsoft booth #5744&lt;/STRONG&gt; to experience live product demonstrations and participate in our expert-led theater sessions.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;Executive Lunch and Learn Session at the Palace Hotel&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 87.4074%; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Session Title&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Session Description&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Date &amp;amp; Time (PT)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Microsoft Entra Secure Access Lunch&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Join us for a special lunch and learn focused on Microsoft Entra and how it helps organizations modernize identity and network security and move toward a more resilient access fabric. This discussion will provide insights on how to secure access for all identities across your Zero Trust journey – whether human or agentic. You don’t want to miss this! &lt;A href="https://microsoftsecurityevents.eventbuilder.com/events/11f0faeff190c5d0af62159fbd1fe445" target="_blank" rel="noopener"&gt;Sign up for the session here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;·&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Date: March 23&lt;SPAN style="font-size: 12px;"&gt;,&lt;/SPAN&gt;&amp;nbsp;2026&lt;/P&gt;
&lt;P&gt;·&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Time: 12pm – 1:30pm&lt;/P&gt;
&lt;P class="lia-align-center"&gt;·&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Location: Twin Peaks Room in the&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Palace Hotel&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Entra Theater Sessions in booth #5744&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 87.8704%; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Session Title&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Session Description&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Date &amp;amp; Time (PT)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Control agent sprawl and secure access with Microsoft Entra&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Learn how to control agent sprawl and secure AI agent access to apps, resources and other agents. This technical review and real-world demo of &lt;STRONG&gt;Microsoft Entra Agent ID&lt;/STRONG&gt;—the identity foundation of the Microsoft Agent 365 control plane for agents—demonstrates how familiar tools like Conditional Access, access governance, and lifecycle workflows extend to agent identities, enforcing least privilege access (or Zero Trust access) for AI agents in your enterprise.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Date: March 23, 2026&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time: 6:40- 7:00PM&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Location: Booth #5744&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;From Crisis to Control: Governance, Backup, and Recovery with Microsoft Entra&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Learn how to protect your organization from service misconfigurations, operational errors, and security compromises using Microsoft Entra. This session shows how &lt;STRONG&gt;Microsoft Entra Tenant Governance &lt;/STRONG&gt;enables continuous discovery, configuration insight, and tenant‑level oversight, while &lt;STRONG&gt;Microsoft Entra &lt;/STRONG&gt;&lt;STRONG&gt;Backup and Recovery&lt;/STRONG&gt; provides rapid restoration of critical identity objects including users, groups, and Conditional Access policies and more.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Date: March 24,&lt;SUP&gt;&amp;nbsp;&lt;/SUP&gt;&amp;nbsp;2026&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time: 11:30-11:50 AM&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Location: Booth #5744&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Accelerate your Identity Security for Modern Identity Defense&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Identity underpins every interaction in the modern enterprise but protecting the vast ecosystem of human users, non-human entities and agents can be a daunting task. Join our experts to hear how Microsoft is leveraging its expertise in identity (IAM) and security (XDR) to provide seamless &lt;STRONG&gt;Identity Security &lt;/STRONG&gt;protection comprehensively across our customers unique identity footprint.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Date:&amp;nbsp; March 25, 2026&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time: 3:30-3:50pm&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Location: Booth #5744&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Secure Workforce Access to AI with Microsoft Entra Suite&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Your workforce is already using AI. In this theater session, see how &lt;STRONG&gt;Microsoft Entra Suite&lt;/STRONG&gt; secures access to AI so your workforce can stay productive while protected from new risks like prompt injection and unsanctioned AI tools. We will show unified identity and network controls and risk‑based session policies, plus how Global Secure Access and AI Gateway expose and block risky connections in real time.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Date: March 25&lt;SPAN style="font-size: 12px;"&gt;,&lt;/SPAN&gt;&amp;nbsp;2026&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time: 4:30-4:50 PM&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Location: Booth #5744&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Defend identity autonomously with agentic AI in Microsoft Entra&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Learn how agentic AI is transforming identity security workflows from investigation to remediation. This review and real-world demo of &lt;STRONG&gt;Security Copilot in Microsoft Entra&lt;/STRONG&gt; and agents shows how identity teams are using AI to surface risk, close policy gaps, and continuously govern access across users, apps, and devices, reducing manual effort while strengthening Zero Trust at scale.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Date: March 26&lt;SPAN style="font-size: 12px;"&gt;,&lt;/SPAN&gt;&amp;nbsp;2026&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time: 12-12:20 PM&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Location: Booth #5744&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We look forward to seeing you in March at RSAC 2026. Visit the Microsoft booth, join our theater sessions, and explore how Microsoft Entra helps secure your access fabric in the age of AI.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Irina Nechaeva&lt;/P&gt;
&lt;P&gt;General Manager, Identity and Network Access Product Marketing&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="http://aka.ms/RSAC26_frontierblog" target="_blank" rel="noopener"&gt;Microsoft Security at RSAC Announcements&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/blog/2026/03/09/secure-agentic-ai-for-your-frontier-transformation/" target="_blank" rel="noopener"&gt;Secure agentic AI for your Frontier Transformation&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 30 Mar 2026 15:54:53 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/microsoft-entra-innovations-announced-at-rsac-2026/ba-p/4502146</guid>
      <dc:creator>Irina_Nechaeva</dc:creator>
      <dc:date>2026-03-30T15:54:53Z</dc:date>
    </item>
    <item>
      <title>As AI adoption scales, is your access strategy still viable?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/as-ai-adoption-scales-is-your-access-strategy-still-viable/ba-p/4486060</link>
      <description>&lt;P&gt;As AI moves from experimentation into everyday workflows and AI agents begin operating more autonomously across systems, access environments are changing in scale, complexity, and speed. Our latest research, &lt;A class="lia-external-url" href="http://aka.ms/SecureAccessReport" target="_blank" rel="noopener"&gt;Secure access in the age of AI ,&lt;/A&gt; looks at how security leaders are navigating one of the fastest shifts in enterprise technology adoption, and where existing access models are starting to show strain.&lt;/P&gt;
&lt;P&gt;For organizations, AI brings meaningful opportunity. But every new AI tool or agent also introduces additional identities, permissions, and access paths.&amp;nbsp; As a result, identity and network access are no longer just foundational controls. They are central to how organizations manage risk in the age of AI.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;AI Is Expanding the Access Landscape&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Every AI tool, integration, or agent introduces new identities, permissions, and pathways to systems and data. In many cases, these identities don’t behave like traditional users. They operate continuously, interact with multiple systems, and often require broad access to function as intended.&lt;/P&gt;
&lt;P&gt;Security leaders are already seeing the effects of this expansion. In our research, &lt;STRONG&gt;97% of organizations experienced an identity or network access incident in the past year, and 70% reported incidents tied to AI&lt;/STRONG&gt;&lt;STRONG&gt;‑related activity.&lt;/STRONG&gt; Threats such as AI‑assisted phishing and agent privilege escalation are now part of the real‑world threat landscape, not edge cases.&lt;/P&gt;
&lt;P&gt;What’s notable is that these incidents aren’t always driven by novel attack techniques. Just as often, they stem from environments that have grown complex faster than governance and controls can keep up. As AI adoption scales, that gap becomes increasingly visible.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt; 6 in 10 leaders anticipate more access incidents due to AI agents and employee use of GenAI.&lt;/EM&gt;&lt;/img&gt;
&lt;H4&gt;&lt;STRONG&gt;Fragmentation Was Already a Challenge. AI Raises the Stakes.&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Long before AI entered the picture, many organizations were already managing fragmented identity and network access environments. Multiple identity providers, overlapping network access tools, and point solutions from different vendors are common, especially in large enterprises.&lt;/P&gt;
&lt;P&gt;The research shows that this fragmentation is persistent. On average, &lt;STRONG&gt;organizations use five identity solutions and four network access solutions,&lt;/STRONG&gt; often from different vendors. &lt;STRONG&gt;Nearly half of security leaders say they are overwhelmed by vendor sprawl, a figure that has increased year over year.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;That fragmentation has real consequences:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Visibility becomes partial and delayed&lt;/LI&gt;
&lt;LI&gt;Policy changes take longer to propagate&lt;/LI&gt;
&lt;LI&gt;Gaps emerge between tools, creating opportunities for misuse and attack&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These gaps don’t just create operational overhead. They slow decision‑making and make it harder to respond consistently as risk changes. In an environment where AI systems and attackers alike can move quickly, those delays matter more than they used to.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt; 32% of organizations say their access management solutions are duplicative, 40% say they have too many different vendors.&lt;/EM&gt;&lt;/img&gt;
&lt;H4&gt;&lt;STRONG&gt;Access Incidents Are Not Always Malicious&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Another important takeaway from the research is that access‑related incidents are not solely the result of attacks. &lt;STRONG&gt;Organizations report a near‑even&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt; split between malicious incidents (53%) and accidental ones (47%).&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This points to risk driven by complexity, unclear ownership, and misaligned controls, not just adversarial behavior. As employees adopt generative AI tools and teams deploy agents faster than policies can be updated, unintentional misuse becomes more likely.&lt;/P&gt;
&lt;P&gt;AI doesn’t create these conditions on its own, but it does amplify them. When permissions are broad, visibility is limited, and enforcement is inconsistent, even small mistakes can escalate quickly.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt; Top causes of identity and network access incidents.&lt;/EM&gt;&lt;/img&gt;&lt;img&gt;&lt;EM&gt; 97% of organizations have had an incident in the past 12 months.&lt;/EM&gt;&lt;/img&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&lt;STRONG&gt;Why an Access Fabric Matters Now&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;As access environments grow more complex, security leaders are rethinking how access decisions are made and enforced across the enterprise. The research suggests that organizations using fewer, more integrated access tools have better visibility into activity and can respond more quickly as risk changes.&lt;/P&gt;
&lt;P&gt;This shift is often described as moving toward an &lt;A href="https://www.bing.com/ck/a?!&amp;amp;&amp;amp;p=e846bd50a2d6a7a181153f77ffd87efe30edc7141b39ae8bd315cd3046b8c44fJmltdHM9MTc3Mzc5MjAwMA&amp;amp;ptn=3&amp;amp;ver=2&amp;amp;hsh=4&amp;amp;fclid=1da3b11f-9fdc-6580-2aea-a21c9e906454&amp;amp;psq=igor+access+fabric+blog&amp;amp;u=a1aHR0cHM6Ly93d3cubWljcm9zb2Z0LmNvbS9lbi11cy9zZWN1cml0eS9ibG9nLzIwMjUvMTIvMTcvYWNjZXNzLWZhYnJpYy1hLW1vZGVybi1hcHByb2FjaC10by1pZGVudGl0eS1hbmQtbmV0d29yay1hY2Nlc3MvP21zb2NraWQ9MWRhM2IxMWY5ZmRjNjU4MDJhZWFhMjFjOWU5MDY0NTQ" target="_blank" rel="noopener"&gt;&lt;EM&gt;access fabric&lt;/EM&gt;&lt;/A&gt;. An access fabric is not a single product or control layer. It is an architectural approach that treats access as a continuous, end‑to‑end system – using identity as the consistent decision point and enforcing those decisions across environments in near real time.&lt;/P&gt;
&lt;P&gt;In practice, an access fabric enables:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;A common identity foundation for employees, workloads, and AI agents&lt;/LI&gt;
&lt;LI&gt;More immediate enforcement of access decisions across the network&lt;/LI&gt;
&lt;LI&gt;Continuous signal sharing across identity, network, and security tools&lt;/LI&gt;
&lt;LI&gt;Faster propagation of policy and risk changes without manual stitching&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This model matters because AI systems and automated attacks operate at machine speed. Static access decisions or delayed enforcement create gaps that are difficult to detect and harder to close.&lt;/P&gt;
&lt;P&gt;As a result, &lt;STRONG&gt;64% of security leaders say they are consolidating identity and network access tools&lt;/STRONG&gt;, citing complexity, visibility gaps, and slower response times in fragmented environments. Fewer, better‑integrated tools make it easier to apply consistent policy and adapt as new identities and access paths are introduced.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;64% of organizations are consolidating tools across identity and network access.&lt;/EM&gt;&lt;/img&gt;&lt;img&gt;&lt;EM&gt; 94% of organizations prefer a comprehensive and integrated identity and access management platform.&lt;/EM&gt;&lt;/img&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;A href="https://techcommunity.microsoft.com/t5/aka.ms/SecureAccessReport" target="_blank" rel="noopener"&gt;Read the full report&lt;/A&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;H6&gt;To explore the full research, including practical insights and recommendations for building a unified access strategy, read the &lt;A class="lia-external-url" href="http://aka.ms/SecureAccessReport" target="_blank" rel="noopener"&gt;Secure access in the age of AI report.&lt;/A&gt;&lt;/H6&gt;
&lt;P&gt;-&lt;EM&gt; Kaitlin Murphy&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 16:19:33 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/as-ai-adoption-scales-is-your-access-strategy-still-viable/ba-p/4486060</guid>
      <dc:creator>Kaitlin_Murphy</dc:creator>
      <dc:date>2026-04-09T16:19:33Z</dc:date>
    </item>
    <item>
      <title>Upcoming Conditional Access change: Improved enforcement for policies with resource exclusions</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/upcoming-conditional-access-change-improved-enforcement-for/ba-p/4488925</link>
      <description>&lt;P&gt;&lt;SPAN data-teams="true"&gt;In alignment with &lt;A href="https://www.microsoft.com/en-us/trust-center/security/secure-future-initiative?msockid=22346ecb805f631739b27a6e81726266" target="_blank" rel="noopener" aria-label="Link Microsoft’s Secure Future Initiative"&gt;Microsoft’s Secure Future Initiative&lt;/A&gt;, we are taking the following proactive security measures for defense-in-depth. Please review the changes and take any required actions to prepare.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: We’ve adjusted the rollout timeline, with enforcement now starting on &lt;STRONG&gt;May 13, 2026&lt;/STRONG&gt;. To support a smooth transition, customers will receive additional details and guidance through &lt;STRONG&gt;Microsoft 365 Message Center&lt;/STRONG&gt; messages.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;What is changing?&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Today&lt;/STRONG&gt;, when a user signs in through a client application that requests &lt;STRONG&gt;only &lt;/STRONG&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/entra/identity-platform/scopes-oidc#openid-connect-scopes" target="_blank" rel="noopener"&gt;OIDC scopes&lt;/A&gt; or a &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/concept-conditional-access-cloud-apps?tabs=powershell#legacy-conditional-access-behavior-when-an-all-resources-policy-has-a-resource-exclusion" target="_blank" rel="noopener"&gt;limited set of directory scopes&lt;/A&gt;, Conditional Access policies that target &lt;EM&gt;All resources&lt;/EM&gt; are not enforced &lt;STRONG&gt;if the policy has one or more resource exclusions.&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;After this change&lt;/STRONG&gt;, Conditional Access policies that target &lt;EM&gt;All resources&lt;/EM&gt; will be enforced for these sign-ins, &lt;STRONG&gt;even when resource exclusions are present&lt;/STRONG&gt;. This ensures that policies are consistently applied regardless of the scope set requested by the application. &lt;A href="https://aka.ms/CAforLowValueScopes" target="_blank" rel="noopener"&gt;Read more about this change&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;When will you see this change?&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;We’ve adjusted the rollout timeline, with enforcement now starting on &lt;STRONG&gt;May 13, 2026&lt;/STRONG&gt;. To support a smooth transition, customers will receive additional details and guidance through &lt;STRONG&gt;Microsoft 365 Message Center&lt;/STRONG&gt; messages.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;Who will be affected by this change?&lt;/H2&gt;
&lt;P&gt;This change only affects tenants that have a Conditional Access policy targeting &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/concept-conditional-access-cloud-apps?tabs=powershell#legacy-conditional-access-behavior-when-an-all-resources-policy-has-a-resource-exclusion" target="_blank" rel="noopener"&gt;All resources with one or more resource exclusions&lt;/A&gt;,&lt;STRONG&gt; &lt;/STRONG&gt;and these tenants will be notified through &lt;A href="https://learn.microsoft.com/en-us/microsoft-365/admin/manage/message-center?view=o365-worldwide" target="_blank" rel="noopener"&gt;M365 Message Center messages&lt;/A&gt;. Tenants without this policy configuration will not be impacted.&lt;/P&gt;
&lt;H2&gt;How will this affect your organization?&lt;/H2&gt;
&lt;P&gt;When a user signs in through a client application that requests only the scopes listed above, they may now receive Conditional Access challenges (such as MFA or device compliance) where previously they were allowed access without enforcement. The specific challenge depends on the access controls configured in your policies that target &lt;EM&gt;All resources&lt;/EM&gt; or explicitly target &lt;EM&gt;Azure AD Graph&lt;/EM&gt;&lt;STRONG&gt; &lt;/STRONG&gt;as the resource.&lt;/P&gt;
&lt;H2&gt;What do you need to do to prepare?&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;✔&lt;/STRONG&gt;&lt;STRONG&gt; Most customers: No action required&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Most applications request additional scopes beyond the scopes listed above and are already subject to Conditional Access enforcement. In such cases, there is no change in behavior. We’re working with popular software vendors where updates may be needed to ensure their applications handle Conditional Access challenges appropriately.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;⚠&lt;/STRONG&gt;&lt;STRONG&gt; Apps registered in your tenant and requesting only these scopes: Review recommended&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you have custom applications that are intentionally designed to request &lt;STRONG&gt;only&lt;/STRONG&gt; the scopes listed above, evaluate whether they can handle Conditional Access challenges such as MFA or device compliance.&lt;/P&gt;
&lt;P&gt;If they &lt;STRONG&gt;already handle Conditional Access challenges&lt;/STRONG&gt;: no changes are required. If they &lt;STRONG&gt;do not&lt;/STRONG&gt;, updates may be needed. Refer to the &lt;A href="https://learn.microsoft.com/en-us/entra/identity-platform/v2-conditional-access-dev-guide" target="_blank" rel="noopener"&gt;Microsoft Conditional Access developer guidance&lt;/A&gt; on how to update your application appropriately.&lt;/P&gt;
&lt;P&gt;-&lt;EM&gt;Swaroop Krishnamurthy&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/concept-conditional-access-cloud-apps#conditional-access-behavior-when-an-all-resources-policy-has-an-app-exclusion" target="_blank" rel="noopener"&gt;Conditional Access behavior when an “All cloud apps” policy has an app exclusion&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity-platform/v2-conditional-access-dev-guide" target="_blank" rel="noopener"&gt;Developer guidance for Microsoft Entra Conditional Access - Microsoft identity platform | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity-platform/scopes-oidc" target="_blank" rel="noopener"&gt;Scopes and permissions in the Microsoft identity platform - Microsoft identity platform | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/troubleshoot-conditional-access#audience-reporting" target="_blank" rel="noopener"&gt;Troubleshoot Conditional Access and view audience reporting&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 17 Mar 2026 17:10:54 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/upcoming-conditional-access-change-improved-enforcement-for/ba-p/4488925</guid>
      <dc:creator>Swaroop Krishnamurthy</dc:creator>
      <dc:date>2026-03-17T17:10:54Z</dc:date>
    </item>
    <item>
      <title>Simplify your identity landscape, reduce risk, and modernize access for any identity</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/simplify-your-identity-landscape-reduce-risk-and-modernize/ba-p/4486059</link>
      <description>&lt;P&gt;Organizations everywhere want easier ways to manage identities, reduce risk, and update access for people, apps, devices, and even agents. In her recent &lt;A href="https://aka.ms/2026JoyPriorities" target="_blank" rel="noopener"&gt;identity priorities blog, Joy Chik&lt;/A&gt; shared a clear direction for the future: identity isn’t only about security—it’s becoming the foundation for everything. The path ahead includes uniting identity and network access with an Access Fabric, improving governance, and bringing AI-powered protection and operations to every team. The possibilities have never been greater.&lt;/P&gt;
&lt;P&gt;But vision only becomes impact when teams can do something with it.&lt;/P&gt;
&lt;P&gt;That’s why we’re launching a new &lt;STRONG&gt;Microsoft Entra Access Priorities Series: &lt;/STRONG&gt;a new, practitioner‑focused webinar series designed to help you turn Joy’s strategic guidance into actionable, demos-first steps you can take immediately.&lt;/P&gt;
&lt;P&gt;Think of this series as your guided path to making the most of your Microsoft Entra portfolio: secure foundations, quick wins, and repeatable patterns you can put into practice to strengthen your access strategy and make the most of the Microsoft Entra portfolio.&lt;/P&gt;
&lt;P&gt;In four sessions, our experts will show you how to build secure identity and network access, move away from legacy VPNs, enable secure AI access, and simplify operations with Copilot in Microsoft Entra. Each session includes demos and templates to speed up your identity strategy.&lt;/P&gt;
&lt;H2&gt;All sessions are now available on demand&lt;/H2&gt;
&lt;H3&gt;&lt;A href="https://aka.ms/Entra/UnifiedAccessFoundation" target="_blank" rel="noopener"&gt;Build a unified access foundation&lt;/A&gt;&lt;/H3&gt;
&lt;P&gt;&lt;EM&gt;Levent Besik, VP of Product Management; Melanie Maynes, Director of Product Marketing; and Rahul Prakash, Principal Product Manager&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;In &lt;A href="https://aka.ms/2026JoyPriorities" target="_blank" rel="noopener"&gt;her 2026 identity priorities blog&lt;/A&gt;, Joy Chik outlines the Access Fabric as the future of access security, but how do organizations get there? Find out why establishing a strong access foundation is critical, starting with phishing‑resistant authentication, adaptive access, and consistent, continuous and contextual identity controls that reduce risk from the outset. &lt;BR /&gt;&lt;BR /&gt;We will walk through the foundational steps your organization can take to prepare for an Access Fabric that extends seamlessly across users, apps, devices, and AI workloads. Leave with a clear, actionable Zero Trust checklist you can apply immediately.&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-occasion" href="https://techcommunity.microsoft.com/event/microsoft-security-events/build-a-unified-access-foundation/4486493" data-lia-auto-title="Watch on demand" data-lia-auto-title-active="0" target="_blank"&gt;Watch on demand&lt;/A&gt;&lt;/P&gt;
&lt;H3&gt;&lt;A href="https://aka.ms/Entra/WorkforceAccessWebinar" target="_blank" rel="noopener"&gt;Secure access for the workforce in the AI era&lt;/A&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;EM&gt;Sanjay Shah, Global Black Belt and Josh Lanier, Global Black Belt&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;AI has fundamentally changed how attackers target employees, making identity compromise faster, more convincing, and harder to detect. Explore why unifying identity and network access is critical to protecting the workforce in the era of AI. See practical demos across three real‑world scenarios: enforcing least privilege access, securing employee access to AI, and modernizing access to all resources with the Microsoft Entra Suite.&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-occasion" href="https://techcommunity.microsoft.com/event/microsoft-security-events/secure-access-for-the-workforce-in-the-ai-era/4486496" data-lia-auto-title="Watch on demand" data-lia-auto-title-active="0" target="_blank"&gt;Watch on demand&lt;/A&gt;&lt;/P&gt;
&lt;H3&gt;&lt;A href="https://aka.ms/Entra/AccessforAIAgents" target="_blank" rel="noopener"&gt;Secure access for AI agents, the new frontier of identity&lt;/A&gt;&lt;/H3&gt;
&lt;P&gt;&lt;EM&gt;Nick Wryter, Principal Product Manager and Leandro Iwase, Senior Product Marketing Manager&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Once your workforce is secured, it’s essential to extend the same protection to their newest colleagues: AI agents. Tune in to explore the shift beyond human identities and see how Microsoft Entra Agent ID and unified access policies bring Zero Trust to non‑human identity in your environment. Get practical tips to help you register, govern, and protect AI agents with the same rigor as employees, ensuring your access strategy keeps pace with how work is truly getting done.&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-occasion" href="https://techcommunity.microsoft.com/event/microsoft-security-events/secure-access-for-ai-agents-the-new-frontier-of-identity/4486498" data-lia-auto-title="Watch on demand" data-lia-auto-title-active="0" target="_blank"&gt;Watch on demand&lt;/A&gt;&lt;/P&gt;
&lt;H3&gt;&lt;A href="https://aka.ms/Entra/ProductivitywAIAgents" target="_blank" rel="noopener"&gt;Increase security and productivity with AI agents&lt;/A&gt;&lt;/H3&gt;
&lt;P&gt;&lt;EM&gt;Chad Hasbrook, Senior Product Manager and Mamta Kumar, Senior Product Manager&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Strong access strategy isn’t about initial setup: it’s about keeping operations fast, safe, and scalable as environments constantly change. Learn how Microsoft Security Copilot agent can be used within Microsoft Entra to help you move from manual, reactive workflows to AI-driven identity operations. Dive in to real scenarios where agents assist with Conditional Access, identity risk investigation, and access troubleshooting, working alongside admins to turn signals into action.&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-occasion" href="https://techcommunity.microsoft.com/event/microsoft-security-events/increase-security-and-productivity-with-ai-agents/4486499" data-lia-auto-title="Watch on demand" data-lia-auto-title-active="0" target="_blank"&gt;Watch on demand&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Ready to take the next step?&lt;STRONG&gt; &lt;BR /&gt;&lt;/STRONG&gt;Visit the session pages to watch the Microsoft Entra Access Priorities Series, now available on demand.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Laura Viarengo &lt;BR /&gt;Product Marketing Manager&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 16 Mar 2026 16:50:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/simplify-your-identity-landscape-reduce-risk-and-modernize/ba-p/4486059</guid>
      <dc:creator>Kaitlin_Murphy</dc:creator>
      <dc:date>2026-03-16T16:50:00Z</dc:date>
    </item>
    <item>
      <title>Securing the AI era starts with identity</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/securing-the-ai-era-starts-with-identity/ba-p/4478952</link>
      <description>&lt;P&gt;Generative AI (GenAI) is quickly transforming how organizations innovate, collaborate, and compete. Adoption rates are impressive, with 75% of knowledge workers already using it. Yet only one in four enterprise AI initiatives are properly secured.&lt;/P&gt;
&lt;P&gt;Identity and Security leaders cite data leakage to GenAI tools as their top concern, and just 9% of organizations feel prepared to address risks like prompt injection attacks, Shadow AI, and fragmented security controls. Without a cohesive approach to securing AI, enterprises risk losing control of sensitive data.&lt;/P&gt;
&lt;H2&gt;Introducing the first identity-centric secure web &amp;amp; AI gateway&lt;/H2&gt;
&lt;P&gt;At Ignite 2025, Microsoft unveiled a breakthrough in AI security: Microsoft Entra Internet Access now includes a &lt;STRONG&gt;secure web and AI gateway&lt;/STRONG&gt;. This&lt;STRONG&gt; &lt;/STRONG&gt;brings &lt;STRONG&gt;AI-aware protections&lt;/STRONG&gt; into the network layer to close security gaps introduced by the shift to modern work that traditional tools can’t address.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key capabilities in Public Preview:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/global-secure-access/overview-application-usage-analytics#cloud-application-analytics" target="_blank" rel="noopener"&gt;Shadow AI Detection&lt;/A&gt;&lt;/STRONG&gt;&amp;nbsp;helps you discover unsanctioned AI tools through Cloud Application Analytics, Defender for Cloud Apps risk scoring, and Microsoft’s Cloud App Catalog. This empowers security teams to monitor usage trends and apply Conditional Access policies to control access to AI apps or to block high-risk apps instantly.&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-network-content-filtering" target="_blank"&gt;Network File Filtering&lt;/A&gt; blocks uploads or downloads based on file type. It can also inspect file content and metadata in transit, integrating with Microsoft Purview to enforce Sensitive Information Types and Exact Data Match policies. This prevents uploading of regulated or confidential data to unsanctioned AI services.&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-ai-prompt-shield" target="_blank" rel="noopener"&gt;Prompt Injection Protection&lt;/A&gt; inspects AI traffic inline and blocks malicious prompts in real time by extending Azure AI Prompt Shields to the network layer. This ensures consistent protection across all AI apps, agents, and LLMs without requiring you to rewrite your applications.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;With these capabilities, you can give employees the freedom to experiment with GenAI while maintaining compliance and reducing risk.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Figure 1: Secure access and protect AI with a secure web and AI gateway.&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;Extend universal run-time protection to any AI application&lt;/H2&gt;
&lt;P&gt;Microsoft Entra Internet Access doesn’t just secure connectivity, it enables responsible, accelerated adoption of GenAI. Because Internet Access brings AI-aware protections directly into the network, they seamlessly extend to any AI app in use—no re-coding necessary.&lt;/P&gt;
&lt;H2&gt;Stop prompt injection before it reaches the model&lt;/H2&gt;
&lt;P&gt;Imagine an attacker crafting a manipulative prompt that overrides safeguards to extract sensitive data. Traditional tools like endpoint protection or app-level filters often fail to stop this kind of attack because they weren’t built to inspect AI-specific traffic or to enforce policies across diverse AI services. Since they operate at the device or application level, these tools leave openings when employees use multiple GenAI apps across browsers and clouds.&lt;/P&gt;
&lt;P&gt;The secure web &amp;amp; AI gateway changes the game by extending &lt;A href="https://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/jailbreak-detection" target="_blank" rel="noopener"&gt;Azure AI Prompt Shields&lt;/A&gt; to the network layer, building on proven Microsoft AI security. It intercepts and blocks malicious prompts before they ever reach the model, enforcing policies across every device, OS, and browser. Protection works across on-premises, multi-cloud, and hybrid environments, delivering uniform security—no SDKs, updates, or retrofitting required. Every app, including Microsoft 365 Copilot, is protected as-is.&lt;/P&gt;
&lt;H2&gt;Prevent sensitive data leakage to AI services&lt;/H2&gt;
&lt;P&gt;Employees who upload files to AI tools or websites risk data exfiltration, IP leakage, and compliance violations. Network File Filtering addresses this by blocking uploads or downloads based on file type—such as executable, spreadsheet, or PDF—and by inspecting files for sensitive information through integration with Microsoft Purview. Purview applies Sensitive Information Types and Exact Data Match policies to stop transfers of regulated or confidential data, preventing exposure.&lt;/P&gt;
&lt;H2&gt;Detect and control shadow AI&lt;/H2&gt;
&lt;P&gt;New application insights and analytics capabilities help identify GenAI tools observed in network traffic to address the risk of Shadow AI bypassing corporate policies. They work hand-in-hand with Microsoft Defender for Cloud Apps, which matches any app discovered against Microsoft’s Cloud App Catalog and applies a risk score based on compliance, security posture, and usage patterns. Security teams can apply Conditional Access policies to sanction or block apps instantly based on these risk scores, on usage trends, or even on geo-political considerations.&lt;/P&gt;
&lt;H2&gt;Secure AI agents and MCP servers&lt;/H2&gt;
&lt;P&gt;AI agents connecting to external MCP servers can open doors to data exfiltration. &lt;A href="https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-secure-web-ai-gateway-agents" target="_blank" rel="noopener"&gt;Secure Web and AI Gateway&lt;/A&gt; enforces strict boundaries at the network layer with URL filtering that allows approved agent connections and blocks unsanctioned MCP servers. Combining this capability with identity-centric controls from Microsoft Entra, organizations can apply fine-grained policies—such as requiring MFA for access to certain AI tools or enforcing geo-restrictions—across Windows, macOS, iOS, and Android. The result is uniform, identity-driven protection across every AI interaction, closing gaps that device-level controls simply can’t.&lt;/P&gt;
&lt;P&gt;Fully integrated into Microsoft’s SASE solution, Secure Web and AI Gateway provides a seamless, unified experience for administrators.&lt;/P&gt;
&lt;div data-video-id="https://www.youtube.com/watch?v=Ze0v1HkIk-o&amp;amp;t=2s/1766088499347" data-video-remote-vid="https://www.youtube.com/watch?v=Ze0v1HkIk-o&amp;amp;t=2s/1766088499347" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FZe0v1HkIk-o%3Fstart%3D2%26feature%3Doembed%26start%3D2&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DZe0v1HkIk-o&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FZe0v1HkIk-o%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;&lt;EM class="lia-align-center"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Figure 2: Microsoft Entra Suite Ignite Session video.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Along with AI security advancements, we’re also strengthening the broader foundation of Microsoft Entra Internet Access with:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-configure-threat-intelligence" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Threat intelligence filtering&lt;/STRONG&gt;&lt;/A&gt; blocks known malicious sites using continuously updated threat intelligence.&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-create-remote-networks?tabs=microsoft-entra-admin-center" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Remote networks for Internet traffic&lt;/STRONG&gt;&lt;/A&gt; extends Microsoft Entra Internet Access protections to branch offices and remote sites without requiring the Global Secure Access client.&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-configure-cloud-firewall" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Cloud firewall for remote networks&lt;/STRONG&gt;&lt;/A&gt; applies centrally-managed, identity-driven firewall policies, adding advanced threat filtering at the network edge.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Beyond Secure Web and AI Gateway: Microsoft Entra Suite innovations that transform identity security&lt;/H2&gt;
&lt;P&gt;Identity is the most strategic control point for security and governance in a world of AI-driven, hybrid work. Microsoft Entra Suite brings automation, intelligence, and context-aware access to every identity, app, and environment. This helps organizations advance beyond static policy controls to dynamic, identity-driven security that adapts to risk, reduces operational overhead, and secures access everywhere.&lt;/P&gt;
&lt;H3&gt;Automate least privilege&lt;/H3&gt;
&lt;P&gt;New Microsoft Entra Identity Governance capabilities make least-privilege enforcement more automated, contextual, and adaptive across the identity lifecycle:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/catalog-access-reviews" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;User-centric access reviews&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt; &lt;/STRONG&gt;evaluate access across critical apps and resources to pinpoint excessive or outdated privileges for each individual user. This makes it easier to reduce privilege creep and improve remediation accuracy.&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/entitlement-management-configure-id-protection-approvals" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Identity and insider risk-based entitlement management&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt; &lt;/STRONG&gt;automatically initiates an additional approval workflow to access request when identity risk or insider threat indicators are detected, mitigating threats before they escalate.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;My Access enhancements&lt;/STRONG&gt;,&lt;STRONG&gt; &lt;/STRONG&gt;such as &lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/entitlement-management-suggested-access-packages" target="_blank" rel="noopener"&gt;suggested access packages&lt;/A&gt;,&lt;STRONG&gt; &lt;/STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/entitlement-management-dynamic-approval" target="_blank" rel="noopener"&gt;dynamic approval&lt;/A&gt;, &lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/entitlement-management-request-behalf" target="_blank" rel="noopener"&gt;on-behalf of request&lt;/A&gt;, and the ability to &lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/delegate-approvals-my-access" target="_blank" rel="noopener"&gt;delegate approvals&lt;/A&gt;, empower managers and delegates to review, approve, and act on access requests directly with built-in accountability. This shifts responsibility for governance from IT to business owners while ensuring decisions remain auditable and policy-driven.&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/manage-workflow-custom-security-attribute" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Lifecycle workflows via custom security attributes&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt; &lt;/STRONG&gt;automatically align access to job changes, compliance needs, and security requirements, triggering automated onboarding, offboarding, or job-change actions based on role, clearance, or custom security attributes.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These new least-privilege capabilities transform governance from an overly manual process into one that’s smarter and self-regulating. Least privilege enforcement becomes dynamic and identity-aware, continuously tightening access based on user behavior, business context, and risk.&lt;/P&gt;
&lt;H3&gt;Modernize access for all apps&lt;/H3&gt;
&lt;P&gt;New Microsoft Entra capabilities simplify and secure access to every application—SaaS, cloud-native, and on-premises—by extending Zero Trust principles beyond the network perimeter:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/global-secure-access/enable-intelligent-local-access" target="_blank" rel="noopener"&gt;Intelligent local access&lt;/A&gt; &lt;/STRONG&gt;routes access to on-premises apps and resources using smart, identity-based controls—without VPNs or manual configurations—providing a seamless user experience.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/concept-account-recovery-overview" target="_blank" rel="noopener"&gt;Passwordless remediation&lt;/A&gt; &lt;/STRONG&gt;enables secure, self-service recovery for lost passkeys, so users can stay productive without compromising security.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These capabilities help organizations modernize access with frictionless a user experience, intelligent routing, and identity at the core—enabling secure, adaptive connectivity for every app, device, and location.&lt;/P&gt;
&lt;H2&gt;Ready to secure AI and modernize identity?&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Watch the Ignite breakout session&lt;/STRONG&gt;: &lt;A href="https://youtu.be/Ze0v1HkIk-o" target="_blank" rel="noopener"&gt;&lt;EM&gt;Accelerate Zero Trust &amp;amp; Secure AI Access&lt;/EM&gt; for live demos and customer stories&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Watch the &lt;/STRONG&gt;&lt;A href="https://www.youtube.com/watch?v=LaDSrwAOszQ" target="_blank" rel="noopener"&gt;Microsoft Entra Mechanics video&lt;/A&gt; for a deep dive into AI-aware protections&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Start your journey today&lt;/STRONG&gt;: &lt;A href="https://techcommunity.microsoft.com/t5/aka.ms/EntraSuiteTrial" target="_blank" rel="noopener"&gt;Entra Suite Trial&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Igor Sakhnov&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Corporate Vice President, Deputy CISO, Identity&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra &lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community &lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Dec 2025 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/securing-the-ai-era-starts-with-identity/ba-p/4478952</guid>
      <dc:creator>isakhnov</dc:creator>
      <dc:date>2025-12-19T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Surfing the AI Wave: Manage, govern, and protect AI agents with Microsoft Entra Agent ID</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/surfing-the-ai-wave-manage-govern-and-protect-ai-agents-with/ba-p/2464407</link>
      <description>&lt;P&gt;Last month, when I blogged about &lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/riding-the-ai-wave-how-microsoft-entra-is-evolving-for-the-agentic-era/4460536" target="_blank" rel="noopener"&gt;riding the AI wave&lt;/A&gt;, I reviewed the reality of AI Agent adoption, basic information about agents, and the challenge of managing them at scale. I could only hint about what we’d announce at Microsoft Ignite: a huge update for the &lt;A href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-agent-id" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Microsoft Entra Agent ID public preview&lt;/STRONG&gt;&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;I’d like to thank customers and partners who’ve been paddling out to the deep waters of agent visibility and security with us. Your feedback has been crucial in this journey, and it was super cool to feature a few of you in my Agent ID Ignite session. Thank you.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;🎥 Watch &lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK265" target="_blank" rel="noopener"&gt;the replay of Alex’s session at Microsoft Ignite&lt;/A&gt; to see Agent ID in action.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;The challenge organizations are facing is crystal clear:&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;STRONG&gt;&lt;EM&gt;How do we harness the power of AI agents securely and at scale?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Every CISO I talk to shares similar concerns:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;How will I get observability to the growing sprawl of AI agents?&lt;/LI&gt;
&lt;LI&gt;How will I ensure agents only access what they need?&lt;/LI&gt;
&lt;LI&gt;How will I track all the things agents are doing?&lt;/LI&gt;
&lt;LI&gt;How can I protect my organization if an agent goes rogue or gets compromised?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These concerns must be addressed - not only so CISOs can sleep better at night, but also to help your organization create value with all the incredibly cool AI agents being built now and for the foreseeable future. And this is why we introduced &lt;STRONG&gt;Agent ID.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This blog kicks off a series that will dive deeper into the three solution areas that Agent ID unlocks: the ability to register and manage AI agents, govern agent identities and lifecycle, and protect agent access to resources.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Get to know Microsoft Entra Agent ID&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Agent ID is the heartbeat of &lt;A class="lia-external-url" href="https://www.microsoft.com/microsoft-365/blog/2025/11/18/microsoft-agent-365-the-control-plane-for-ai-agents" target="_blank" rel="noopener"&gt;Microsoft Agent 365&lt;/A&gt;, the control plane for all your agents. No matter where they’re built—on Microsoft platforms, open-source frameworks, or third-party solutions—Agent 365 gives you a single, secure way to deploy, organize, and govern them. Think of it as the next evolution of the systems you already trust to run your enterprise, now extended to the agentic era.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Access controls for agents&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;As the number of AI agents in your environment skyrockets, access control isn’t just important—it’s mission-critical. By requiring every agent to have its own unique Agent ID, you can manage agents confidently and make sure they only touch the resources they truly need. And for IT, this means putting strong guardrails in place—clear policies for who can create, onboard, and manage agents—so you stay in control while enabling innovation.&lt;/P&gt;
&lt;div data-video-id="https://youtu.be/kjwx1f3MAv4?si=OUoBkXGLLRsie4D1/1765933297834" data-video-remote-vid="https://youtu.be/kjwx1f3MAv4?si=OUoBkXGLLRsie4D1/1765933297834" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2Fkjwx1f3MAv4%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dkjwx1f3MAv4&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2Fkjwx1f3MAv4%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;We’ve designed Agent ID so you can manage AI agent identities using the same tools that you use to secure access for users. If you know how to use conditional access, identity protection, identity governance, and network controls in the Entra admin center, you have the skills to manage agents. Plus, you can use &lt;A class="lia-external-url" href="https://learn.microsoft.com/entra/security-copilot/entra-agents" target="_blank" rel="noopener"&gt;Entra agents&lt;/A&gt; to automate quite a few of these tasks now.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A comprehensive inventory of agents &amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In addition to the identity and network access foundations, we think there's one key challenge that's harder with agents than the rest, which is discovery. So we've added a whole new layer to Entra that we call &lt;A href="https://learn.microsoft.com/en-us/entra/agent-id/identity-platform/what-is-agent-registry" target="_blank" rel="noopener"&gt;Agent Registry&lt;/A&gt;. This brand-new capability is an extensible metadata repository that delivers a unified view of agents deployed in your organization.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Agent ID works with Microsoft agent-building platforms and a rapidly growing ecosystem of partners. And for folks building outside Microsoft platforms, we offer our &lt;A href="https://learn.microsoft.com/en-us/entra/agent-id/identity-platform/" target="_blank" rel="noopener"&gt;agent identity platform for developers&lt;/A&gt; to make integration simple.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Exploring the benefits of Agent ID for your organization&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;IDC says there’ll be &lt;STRONG&gt;1.3 billion AI agents in the next three years&lt;/STRONG&gt;. All the CISOs I talk with say agents are already being deployed at some level in their organizations. To take on this wave and safeguard against risks, I hope you’ll join &lt;A href="https://adoption.microsoft.com/copilot/frontier-program/" target="_blank" rel="noopener"&gt;the Frontier program&lt;/A&gt; to pilot Agent ID and the rest of the Agent 365 early access capabilities.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Your Agent ID overview&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The first step is getting visibility to how many agents are already deployed in your organization. In the Entra admin center, Agent ID is listed just below Users, Groups, and Devices in the left nav. Clicking it brings you to an overview of agents in your tenant, where you can monitor trends and drill down on the agent identities, blueprints, and collections that need your attention.&lt;/P&gt;
&lt;img /&gt;
&lt;H4&gt;&lt;STRONG&gt;✅&lt;/STRONG&gt;&lt;STRONG&gt; Manage: Bring AI Agents Into Your Identity Framework&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Managing AI agents starts with treating them like first-class citizens in your identity system. With &lt;STRONG&gt;Agent ID&lt;/STRONG&gt;, you can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Get visibility to agents&lt;/STRONG&gt; built on Microsoft platforms like Copilot Studio, Microsoft Foundry, and Security Copilot, and our ecosystem of partners and agent developers in &lt;A href="https://learn.microsoft.com/en-us/entra/agent-id/identity-platform/what-is-agent-registry" target="_blank" rel="noopener"&gt;Agent Registry&lt;/A&gt;, an extensible data repository for agent information.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Assign a unique identity to an agent&lt;/STRONG&gt;—just as you can for users, apps, and devices.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Manage agents at scale &lt;/STRONG&gt;with &lt;A href="https://learn.microsoft.com/entra/agent-id/identity-platform/agent-blueprint" target="_blank" rel="noopener"&gt;agent identity blueprints&lt;/A&gt;, the templates that define permissions, roles, and governance policies for classes of agents. Approve a blueprint once, and every agent created from it inherits those settings. If something goes wrong, disabling the blueprint instantly shuts down all associated agents.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Manage agent identities across their lifecycle&lt;/STRONG&gt; using tools you know in Entra Admin Center.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Agents created through Microsoft platforms can automatically get an Agent ID. It’s like stamping a VIN on each car that rolls off the factory floor. This means you’ll be able to apply many of the same controls you already trust for users and workloads, starting with identity governance.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;gt; Learn how &lt;/STRONG&gt;to &lt;A href="https://learn.microsoft.com/entra/agent-id/identity-platform/agent-lists" target="_blank" rel="noopener"&gt;view and manage agent identities in your Microsoft Entra tenant&lt;/A&gt;.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;✅ Govern: Control Access and Automate Lifecycle Management&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;You can’t care for and feed AI agents with the individual attention you give a pet—they’re more like a school of fish. You’ll have thousands, maybe millions, operating in your environment, so manual oversight isn’t possible. Governance must be &lt;STRONG&gt;automated, scalable, and policy-driven&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Here are some of the features in Entra Agent ID Public Preview that can help:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Lifecycle Workflows &lt;/STRONG&gt;automate sponsor updates and deactivation. Every agent needs a human sponsor, and workflows ensure that when a sponsor leaves or changes roles, you’re notified and can reassign responsibility.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Access Packages &lt;/STRONG&gt;bundle permissions, roles, and resource access into a single approval process. This helps enforce least privilege at scale and ensures every assignment is deliberate, auditable, and time-bound.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;gt; Learn more &lt;/STRONG&gt;about &lt;A href="https://learn.microsoft.com/entra/id-governance/agent-id-governance-overview" target="_blank" rel="noopener"&gt;governing agent identities.&lt;/A&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;✅ Protect: Apply Conditional Access and Risk-Based Policies&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Identity security is where Microsoft Entra shines, and we’ve extended its capabilities to AI agents. With Agent ID, you can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Use Conditional Access for agents&lt;/STRONG&gt;, whether they’re actors or resources.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Leverage Identity Protection&lt;/STRONG&gt; to flag high-risk agents based on behavior and risk signals. Combine this with Conditional Access to automatically block compromised agents.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Apply custom security attributes&lt;/STRONG&gt; to tag agents by type or sensitivity, then enforce policies based on those tags. For example: Only HR-approved agents can access HR resources.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;With these protections, you can enable innovation while keeping your organization secure.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;gt; Learn more&lt;/STRONG&gt; about &lt;A href="https://learn.microsoft.com/entra/identity/conditional-access/agent-id?tabs=custom-security-attributes" target="_blank" rel="noopener"&gt;Conditional Access capabilities for agents&lt;/A&gt; and &lt;A href="https://learn.microsoft.com/en-us/entra/id-protection/concept-risky-agents" target="_blank" rel="noopener"&gt;risky agent reports for agents&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;🚀&lt;/STRONG&gt;&lt;STRONG&gt; Get Started Today&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;All the capabilities discussed above are available in public preview. Turn on &lt;A class="lia-external-url" href="https://learn.microsoft.com/microsoft-agent-365/overview" target="_blank" rel="noopener"&gt;early access for Microsoft Agent 365&lt;/A&gt; and start experimenting with &lt;A href="https://entra.microsoft.com/#view/Microsoft_AAD_RegisteredApps/AllAgents.MenuView/~/overview" target="_blank" rel="noopener"&gt;Agent ID in the Entra admin center&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;And if you’re a developer, now’s the time to get engaged. Get started with the &lt;A href="https://learn.microsoft.com/en-us/entra/agent-id/identity-platform/" target="_blank" rel="noopener"&gt;Microsoft Entra Agent Identity Platform for Developers&lt;/A&gt;.&lt;/P&gt;
&lt;H4 class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;How to get started with Microsoft Entra Agent ID:&amp;nbsp;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;🎥 Watch &lt;A href="https://ignite.microsoft.com/sessions/BRK265" target="_blank" rel="noopener"&gt;the replay of the Agent ID session at Microsoft Ignite&lt;/A&gt; to see Agent ID in action.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;📚 Learn more in our &lt;A href="https://learn.microsoft.com/en-us/entra/agent-id/" target="_blank" rel="noopener"&gt;Agent ID documentation on Microsoft Learn&lt;/A&gt;.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;🔍&lt;/STRONG&gt; See how many agents are in your tenant today: &lt;A href="https://entra.microsoft.com/#view/Microsoft_AAD_RegisteredApps/AllAgents.MenuView/~/overview" target="_blank" rel="noopener"&gt;Agent ID in the Microsoft Entra admin center&lt;/A&gt;.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;🚀&lt;/STRONG&gt; Try what’s next in AI—including Microsoft Agent 365—with the &lt;A href="https://adoption.microsoft.com/copilot/frontier-program/" target="_blank" rel="noopener"&gt;Frontier early access program&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;🌊What’s Next?&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Folks, this will be my final blog here. &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;After 34 years at Microsoft working on everything from Encarta to MSN to Dynamics CRM to Windows 7 to Entra I’ve made the decision to retire from Microsoft to start a 2&lt;SUP&gt;nd&lt;/SUP&gt; career as a college volleyball coach. The last 14 years leading the identity and access business have been an amazing ride and I want to thank all the customers, partners and my colleagues for making it a wonderful experience. It’s been a privilege to work with all of you!&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;This is just the beginning&lt;/STRONG&gt; of shaping the future of secure AI adoption, and I’m grateful to have so many awesome teammates who’ll be continuing the journey with you. Upcoming blogs here will dive deeper into our Agent ID solutions themes—&lt;STRONG&gt;Manage&lt;/STRONG&gt;, &lt;STRONG&gt;Govern&lt;/STRONG&gt;, and &lt;STRONG&gt;Protect&lt;/STRONG&gt;—with practical guidance, demos, and best practices. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Farewell, and keep up the great work.&lt;/P&gt;
&lt;P&gt;Alex&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Resources: &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;🎥 Watch &lt;A class="lia-external-url" href="https://ignite.microsoft.com/sessions/BRK265" target="_blank" rel="noopener"&gt;the replay of Alex’s session at Microsoft Ignite&lt;/A&gt; to see Agent ID in action.&lt;/P&gt;
&lt;P&gt;📚 Learn more in our &lt;A class="lia-external-url" href="https://learn.microsoft.com/entra/agent-id/" target="_blank" rel="noopener"&gt;Agent ID documentation on Microsoft Learn&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;STRONG&gt;🚀&lt;/STRONG&gt; Get started with &lt;A class="lia-external-url" href="https://learn.microsoft.com/microsoft-agent-365/overview" target="_blank" rel="noopener"&gt;Microsoft Agent 365 early access&lt;/A&gt;.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 100.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2026 20:34:52 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/surfing-the-ai-wave-manage-govern-and-protect-ai-agents-with/ba-p/2464407</guid>
      <dc:creator>Alex_Simons</dc:creator>
      <dc:date>2026-03-31T20:34:52Z</dc:date>
    </item>
    <item>
      <title>Synced passkeys and high assurance account recovery</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/synced-passkeys-and-high-assurance-account-recovery/ba-p/3627343</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Almost half of Microsoft Entra ID users are now protected with Multi-Factor Authentication (MFA), per the latest&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="http://aka.ms/mddr" target="_blank" rel="noopener"&gt;Microsoft Digital Defense Report&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Yet many organizations still face high costs because of training needs, usability challenges and productivity loss.  At&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK243?source=/speakers/e2667b7f-b37f-4aee-8ac9-18c3a1b658f9" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Ignite 2025&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, we&amp;nbsp;introduced&amp;nbsp;two new features&amp;nbsp;in Entra ID&amp;nbsp;to address those challenges for existing MFA deployments and&amp;nbsp;to&amp;nbsp;increase adoption&amp;nbsp;of MFA&amp;nbsp;across users and organizations:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6}"&gt; synced passkeys and account recovery.&lt;/SPAN&gt;&lt;EM class="lia-align-justify"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;Public preview of&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="lia-align-justify"&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-passkey-profiles" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;synced passkeys&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;brings&amp;nbsp;the security benefits&amp;nbsp;of&amp;nbsp;MFA with simpler usability,&amp;nbsp;while&amp;nbsp;avoiding&amp;nbsp;the security risks of weaker MFA options like SMS.&amp;nbsp;However, even the simplest MFA can fail when credentials are&amp;nbsp;lost,&amp;nbsp;making&amp;nbsp;account&amp;nbsp;recovery a critical part of the user experience.&amp;nbsp;To improve usability&amp;nbsp;in such cases, we are introducing&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;public&amp;nbsp;preview&amp;nbsp;for&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/concept-account-recovery-overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;account recovery&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; with&amp;nbsp;AI-powered&amp;nbsp;biometric match against government issued&amp;nbsp;IDs&amp;nbsp;across 192 countries.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Refining the MFA experience for mass adoption:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;Over the past year, synced passkeys have become the default sign-in method f&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;or hundreds of &lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;millions of people&amp;nbsp;to&amp;nbsp;sign into&amp;nbsp;their&amp;nbsp;personal&amp;nbsp;email, cloud&amp;nbsp;storage,&amp;nbsp;and countless other apps and services.&amp;nbsp;In fact,&amp;nbsp;Microsoft&amp;nbsp;consumer&amp;nbsp;users are&amp;nbsp;3x more successful&amp;nbsp;when&amp;nbsp;signing-in with passkeys&amp;nbsp;than legacy authentication methods&amp;nbsp;(95% vs 30%).&amp;nbsp;Sign-ins are 14x faster&amp;nbsp;compared to&amp;nbsp;password&amp;nbsp;plus code-based MFA.&amp;nbsp;Best of all,&amp;nbsp;synced&amp;nbsp;passkeys are natively supported by all major operating&amp;nbsp;systems.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We’ve built deep connections across our consumer and enterprise platforms, enabling cross-pollination of learnings and rapid delivery of usability enhancements. Every improvement now benefits Microsoft accounts, Entra ID, and External ID together, bringing a consistent, intuitive experience to both consumers and enterprises. This unified approach means enhancements reach users faster, and at scale. The&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;public prev&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;iew of synced passkeys&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;with these improvements brings MFA simplicity at scale for all enterprise&amp;nbsp;users.&amp;nbsp;And we’re just getting started.&amp;nbsp;As these improvements reach general availability,&amp;nbsp;we’re&amp;nbsp;focused on making passkeys and high-assurance recovery the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;default for all enterprise customers&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;—so usability&amp;nbsp;isn’t&amp;nbsp;an afterthought,&amp;nbsp;it’s&amp;nbsp;the foundation.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Let’s&amp;nbsp;explore&amp;nbsp;the end-user experience&amp;nbsp;for both capabilities&amp;nbsp;and how&amp;nbsp;organizations can easily deploy&amp;nbsp;them.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Simpler MFA experience with synced passkeys&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Synced passkeys&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;represent&amp;nbsp;a newer, more user-centric approach to authentication that removes the password entirely,&amp;nbsp;works&amp;nbsp;across devices via&amp;nbsp;services&amp;nbsp;like iCloud Keychain&amp;nbsp;and&amp;nbsp;Google Password Manager. This method offers a seamless experience: users authenticate with biometrics or device PINs, without needing to remember or enter passwords or codes.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;Sign in experience with synced passkeys&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;“&lt;EM&gt;It’s the future. Focus on passkeys. Now you have a truly fast username-less and passwordless authentication method protected against phishing.&lt;/EM&gt;” &lt;BR /&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;- &lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN data-contrast="auto"&gt;Customer in leading global retail&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Easy to deploy synced passkeys:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Our enterprise customers want a better MFA experience with passkeys. Many customers worry about the enrollment process, usability problems, and higher helpdesk costs when rolling out new authentication methods.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;Passkey profiles for granular admin control&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Admins can now allow granular group-based configuration for passkey authentication. Instead of a single tenant-wide setting, admins can&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-passkey-profiles" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;choose specific requirements&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; such as attestation, passkey type (device-bound or synced) and the specific passkey from a specific provider that they want their users to use, and apply them to different user groups in the enterprise.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:120,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Convenient high assurance account recovery&amp;nbsp;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Even the simplest MFA can fail when credentials are lost - making recovery a critical part of user experience. &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;When users can’t access their normal sign-in info or are unable to access their passkeys, proving one’s identity becomes a real headache. Not only is the experience clunky (e.g. knowledge-based questions or round-trip codes) and frustrating, it’s ripe for impersonation attacks. &amp;nbsp;As a result, analysts and major government agencies such as &lt;/SPAN&gt;&lt;A href="https://pages.nist.gov/800-63-4/sp800-63b.html#recovery" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;NIST&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; recommend&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;using government issued ID and biometric verification for high assurance recovery. However, there are &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;challenges with verification at scale.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; Most enterprises are unable to implement such a solution because of custom business contracts and complicated technical implementation with ID verification (IDV) providers, and regulatory compliance. &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:120,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Setting up account recovery is as easy as 1-2-3&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Entra account recovery in Microsoft Entra helps users regain access quickly and securely, leveraging government issued ID and biometric verification to deliver high assurance. Securing account recovery is simple in a few steps.&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;Our new approach makes it secure, compliant, and integrated with a consumer-grade user experience, without custom business contracts or technical integrations. What used to take months can now be done in minutes.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;Account recovery admin setup&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As shown above, admins can simulate the account recovery process before activating use for production, as well as configure specific groups of users and the preferred IDV provider to enable a seamless flow.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:120,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Entra ID customers&amp;nbsp;can choose amongst the leading&amp;nbsp;IDV&amp;nbsp;providers&amp;nbsp;via&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://securitystore.microsoft.com/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Security Store&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;:&amp;nbsp;Idemia, Lexis Nexis&amp;nbsp;and&amp;nbsp;Au10tix. These&amp;nbsp;providers&amp;nbsp;offer coverage across 192 countries and remote verification&amp;nbsp;for&amp;nbsp;most&amp;nbsp;government&amp;nbsp;issued&amp;nbsp;ID&amp;nbsp;documents,&amp;nbsp;including&amp;nbsp;driver’s licenses and passports.&amp;nbsp;Entra Verified ID Face Check, powered by Azure AI services, adds a critical layer of trust by matching a user’s real-time selfie and the photo from their identity document.&amp;nbsp;By&amp;nbsp;only&amp;nbsp;sharing the match results and not any sensitive identity data, Face Check improves user privacy while allowing&amp;nbsp;organizations&amp;nbsp;to be sure the person claiming an identity is really them.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:120,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:120,&amp;quot;335559740&amp;quot;:278}"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Convenient recovery for all your users&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Once enabled,&amp;nbsp;this public preview&amp;nbsp;capability&amp;nbsp;enables&amp;nbsp;a&amp;nbsp;natively integrated end-to-end flow&amp;nbsp;for&amp;nbsp;users to&amp;nbsp;easily and&amp;nbsp;securely&amp;nbsp;regain access&amp;nbsp;to their accounts.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:120,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;Account recovery user flow&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The Entra sign in experience now includes a new option to 'Recover my account'. Once users initiate the flow, they will be guided through the steps to verify their identity by providing their driver’s license or other government issued documents with the IDV provider preferred by the organization. Users will do a quick face check to ensure the rightful owner is verifying their government issued ID with the IDV provider, by matching liveness with the photo from the ID document. Entra ID then matches information (such as, name, or address) returned in the Verified ID from the IDV provider with the information in the organization's directory and HR system. Once the verification is complete, user is offered to register a synced passkey to reduce further lockouts.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:120,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;A href="https://innspark.in/" target="_blank" rel="noopener"&gt;Inspark, a leading cybersecurity company&lt;/A&gt; shares, "&lt;EM&gt;Identity is the top attack vector and AI makes it easier to exploit. Verified ID enables convenient account recovery, reduces our recovery-related service desk costs by 72%, and protects against social engineering. No passwords. No weak authentication. Just secure, verifiable access.&lt;/EM&gt;"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:120,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Licensing requirements&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 71.7593%; height: 141px; border-width: 1px;"&gt;&lt;colgroup&gt;&lt;col style="width: 24.6817%" /&gt;&lt;col style="width: 75.3183%" /&gt;&lt;/colgroup&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td class="lia-align-left"&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Passkeys&lt;/SPAN&gt;&lt;/EM&gt;&lt;/td&gt;&lt;td&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Included for all Microsoft Entra ID customers&lt;/SPAN&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-align-left"&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Account recovery&lt;/SPAN&gt;&lt;/EM&gt;&lt;/td&gt;&lt;td&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Included with Microsoft Entra ID P1 license&lt;/SPAN&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-align-left"&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Face Check&lt;/SPAN&gt;&lt;/EM&gt;&lt;/td&gt;&lt;td&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Available as an add-on per verification or as part of Microsoft Entra Suite&lt;/SPAN&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-align-left"&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Government ID check&lt;/SPAN&gt;&lt;/EM&gt;&lt;/td&gt;&lt;td class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Pay-per-verification via Microsoft Security Store&lt;/SPAN&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;Resources&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-enable-passkey-fido2" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Enable passkeys for your organization -&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;M&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;icrosoft Entra ID | Microsoft Learn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:360,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/concept-account-recovery-overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Enable high assurance account recovery – Microsoft ID | Microsoft Learn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:360,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Continuously improving usability for every authentication and recovery experience is foundational.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Get started today and&amp;nbsp;share your feedback with us.&amp;nbsp;We love hearing from you!&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;Ankur&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&lt;A href="https://www.linkedin.com/in/4ankurpatel/" target="_blank" rel="noopener"&gt;Ankur Patel | LinkedIn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions for workforce, customers, and non-human identities.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 16 Dec 2025 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/synced-passkeys-and-high-assurance-account-recovery/ba-p/3627343</guid>
      <dc:creator>AnkurPatel</dc:creator>
      <dc:date>2025-12-16T16:00:00Z</dc:date>
    </item>
    <item>
      <title>What’s new in Microsoft Entra – November 2025</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/what-s-new-in-microsoft-entra-november-2025/ba-p/4352577</link>
      <description>&lt;P&gt;November was an exciting month for Microsoft Entra customers, with news of significant enhancements to strengthen your security posture in the AI era. Our announcements included:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;New capabilities for managing, governing, and protecting agents with the &lt;A href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-agent-id" target="_blank" rel="noopener"&gt;public preview of Microsoft Entra Agent ID&lt;/A&gt;, part of the new &lt;A href="https://www.microsoft.com/en-us/microsoft-365/blog/2025/11/18/microsoft-agent-365-the-control-plane-for-ai-agents" target="_blank" rel="noopener"&gt;Agent 365 control plane for agents&lt;/A&gt;;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/copilot/security/security-copilot-inclusion" target="_blank" rel="noopener"&gt;Security Copilot inclusion in Microsoft 365 E5 subscription&lt;/A&gt;, which ensures more admins can utilize Copilot in Entra and the &lt;A href="https://learn.microsoft.com/en-us/entra/security-copilot/entra-agents" target="_blank" rel="noopener"&gt;four new Microsoft Entra agents;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;The Microsoft Entra Suite public preview of Prompt Shield, enabling you to &lt;A href="https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-ai-prompt-shield" target="_blank" rel="noopener"&gt;protect enterprise GenAI apps against prompt injection attacks;&lt;/A&gt; and&lt;/LI&gt;
&lt;LI&gt;The public preview of &lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-synced-passkeys" target="_blank" rel="noopener"&gt;synced passkeys&lt;/A&gt; and &lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/concept-account-recovery-overview" target="_blank" rel="noopener"&gt;self-service account recovery for all authentication methods&lt;/A&gt; in Microsoft Entra, making it easier for end users to embrace phishing-resistant authentication.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For more details, check out &lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/microsoft-entra-what%E2%80%99s-new-in-secure-access-on-the-ai-frontier/4468732" target="_blank" rel="noopener"&gt;Joy Chik’s blog post&lt;/A&gt; and watch the &lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/icymi-watch-replays-of-microsoft-entra-sessions-at-microsoft-ignite-2025/4427989" target="_blank" rel="noopener"&gt;recordings of our breakout sessions from Microsoft Ignite.&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This article shares security improvements and innovations across Microsoft Entra from October and November 2025, organized by product.&lt;/P&gt;
&lt;H2&gt;Microsoft Entra ID&lt;/H2&gt;
&lt;H3&gt;New releases&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/whats-new#general-availability---granular-least-privileged-permissions-for-userauthenticationmethod-apis" target="_blank" rel="noopener"&gt;Granular, Least-Privileged Permissions for UserAuthenticationMethod APIs&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Change announcements&lt;/H3&gt;
&lt;H3&gt;Security improvements&lt;/H3&gt;
&lt;H5&gt;Jailbreak Detection in Authenticator App&lt;/H5&gt;
&lt;P&gt;&lt;EM&gt;[Action may be required]&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;What is changing?&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;Starting February 2026&lt;/STRONG&gt;, we'll introduce&amp;nbsp;&lt;STRONG&gt;Jailbreak/Root detection for Microsoft Entra credentials in the Authenticator app&lt;/STRONG&gt;. This update boosts security by disabling Microsoft Entra credentials on jail-broken or rooted devices, wiping any existing credentials automatically. It applies to both iOS and Android, requires no admin setup, and does not affect personal or third-party accounts.&lt;/P&gt;
&lt;P&gt;Action required&lt;/P&gt;
&lt;P&gt;Notify end users about this upcoming change. Authenticator will become unusable for Microsoft Entra accounts on jail-broken or rooted devices. For more information, read&amp;nbsp;&lt;A href="https://support.microsoft.com/account-billing/about-microsoft-authenticator-9783c865-0308-42fb-a519-8cf666fe0acc" target="_blank" rel="noopener"&gt;About Microsoft Authenticator&lt;/A&gt;.&lt;/P&gt;
&lt;H5&gt;Block External Script Injection in Microsoft Entra ID Sign-in&lt;/H5&gt;
&lt;P&gt;&lt;EM&gt;[Action may be required]&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;What is changing?&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;In November 2025, Microsoft Entra ID rolled out a stricter Content Security Policy (CSP) for browser-based sign-ins on login.microsoftonline.com. This update blocks unauthorized scripts and only allows scripts from trusted Microsoft domains, enhancing protection against cross-site scripting (XSS) attacks.&lt;/P&gt;
&lt;P&gt;Action required&lt;/P&gt;
&lt;P&gt;Admins should ensure that no browser extensions or tools inject scripts into the sign-in experience. Any existing tools that do so must be replaced, and sign-in flows should be tested to identify and fix violations.&lt;/P&gt;
&lt;H5&gt;Update to Revoke Multifactor Authentication Sessions&lt;/H5&gt;
&lt;P&gt;&lt;EM&gt;[Action may be required]&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;What is changing?&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;Starting February 2026, we are replacing the current &lt;STRONG&gt;Revoke multifactor authentication sessions&lt;/STRONG&gt; button with the &lt;STRONG&gt;Revoke sessions&lt;/STRONG&gt; button in the Microsoft Entra portal. The legacy &lt;STRONG&gt;Revoke MFA sessions&lt;/STRONG&gt; action only applies to per-user MFA enforcement, which has led to confusion. To simplify and ensure consistent behavior, the new &lt;STRONG&gt;Revoke sessions&lt;/STRONG&gt; button will invalidate all user sessions, including MFA, regardless of whether MFA is enforced via Conditional Access or per-user policies.&lt;/P&gt;
&lt;P&gt;Action required&lt;/P&gt;
&lt;P&gt;Admins should update workflows and guidance to use &lt;STRONG&gt;Revoke sessions&lt;/STRONG&gt; instead of &lt;STRONG&gt;Revoke MFA sessions&lt;/STRONG&gt;. The &lt;STRONG&gt;Revoke MFA sessions&lt;/STRONG&gt; option will be removed from the portal after this change.&lt;/P&gt;
&lt;H2&gt;Microsoft Entra ID Governance&lt;/H2&gt;
&lt;H3&gt;New releases&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/whats-new#general-availability---conversion-of-external-users-to-internal-members" target="_blank" rel="noopener"&gt;Conversion of external users to internal members&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/hybrid/concept-source-of-authority-overview" target="_blank" rel="noopener"&gt;Ability to convert Source of Authority of synced on-premises AD groups to cloud groups&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/saas-apps/sap-cloud-platform-identity-authentication-provisioning-tutorial" target="_blank" rel="noopener"&gt;New SCIM 2.0 SAP CIS connector available, with support for group provisioning&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/entitlement-management-access-package-eligible" target="_blank" rel="noopener"&gt;Support for eligible group memberships and ownerships in Entitlement Management access packages&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/reprocess-workflow" target="_blank" rel="noopener"&gt;Reprocess failed users and workflows in Lifecycle Workflows&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/workflow-sensitivity-labels?branch=main" target="_blank" rel="noopener"&gt;Groups Purview sensitivity label support in Lifecycle Workflows&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/lifecycle-workflow-inactive-users" target="_blank" rel="noopener"&gt;Trigger workflows for inactive employees and guests in Lifecycle Workflows&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Change announcements&lt;/H3&gt;
&lt;H3&gt;Identity Modernization&lt;/H3&gt;
&lt;H5&gt;Retirement of Iteration 2 (beta) Privileged Identity Management (PIM) API &amp;nbsp;&lt;/H5&gt;
&lt;P&gt;&lt;EM&gt;[Action may be required]&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;What is changing?&lt;/P&gt;
&lt;P&gt;Iteration 2 (beta) PIM API for&amp;nbsp;&lt;STRONG&gt;Azure resources&lt;/STRONG&gt;&amp;nbsp;and&amp;nbsp;&lt;STRONG&gt;Microsoft Entra roles&lt;/STRONG&gt;&amp;nbsp;is deprecated and will stop returning data on October 28, 2026.&lt;/P&gt;
&lt;P&gt;Action required&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Migrate to the&lt;/STRONG&gt;&amp;nbsp;&lt;STRONG&gt;Iteration 3 (GA) APIs:&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Begin migration planning and testing as soon as possible.&lt;/LI&gt;
&lt;LI&gt;Halt any new development using Iteration 2 APIs.&lt;/LI&gt;
&lt;LI&gt;Review documentation for Iteration 3 APIs to ensure compatibility.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Learn more:&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/graph/api/resources/privilegedidentitymanagement-root?view=graph-rest-beta#migrate-from-pim-iteration-2-apis-to-pim-iteration-3-apis" target="_blank" rel="noopener"&gt;Migrate from PIM iteration 2 APIs to PIM iteration 3 APIs&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-apis" target="_blank" rel="noopener"&gt;API concepts in Privileged Identity management - Microsoft Entra ID Governance | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/graph/api/resources/privilegedidentitymanagement-root?view=graph-rest-beta" target="_blank" rel="noopener"&gt;Privileged Identity Management iteration 2 APIs&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Microsoft Entra External ID&lt;/H2&gt;
&lt;H3&gt;New releases&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/data-residency" target="_blank" rel="noopener"&gt;External ID regional expansion to Australia and Japan&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/external-id/customers/how-to-azure-monitor?tabs=diagnostic-settings" target="_blank" rel="noopener"&gt;Seamless setup experience for Azure Monitor/Sentinel with external tenants&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/external-id/customers/how-to-integrate-fraud-protection?pivots=arkose" target="_blank" rel="noopener"&gt;Sign up Fraud Protection with Arkose Labs and HUMAN Security for Microsoft Entra External ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/external-id/customers/how-to-configure-waf-integration?tabs=admin-center" target="_blank" rel="noopener"&gt;Edge protection using Cloudflare and Akamai WAF for Microsoft Entra External ID&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Global Secure Access&lt;/H2&gt;
&lt;H3&gt;New releases&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/global-secure-access/concept-netskope-integration?tabs=free-trial" target="_blank" rel="noopener"&gt;GSA + Netskope ATP &amp;amp; DLP integration&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/global-secure-access/concept-transport-layer-security" target="_blank" rel="noopener"&gt;Microsoft Entra Internet Access TLS Inspection&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Shobhit Sahay&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Dec 2025 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/what-s-new-in-microsoft-entra-november-2025/ba-p/4352577</guid>
      <dc:creator>ShobhitSahay</dc:creator>
      <dc:date>2025-12-10T16:00:00Z</dc:date>
    </item>
    <item>
      <title>ICYMI: Watch replays of Microsoft Entra sessions at Microsoft Ignite 2025</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/icymi-watch-replays-of-microsoft-entra-sessions-at-microsoft/ba-p/4427989</link>
      <description>&lt;P&gt;At Microsoft Ignite 2025, Microsoft Security took center stage with a clear message: secure access is foundational for the AI-driven future. Across keynotes, breakout sessions, and demos, we showcased innovations that help organizations confidently expand Zero Trust strategies to include AI agents, apps, and identities. We hope you were able to be there or tune in live; but if not, we’ve pulled this article together with all the best replay links for identity and network access professionals.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;👀 ICYMI: &lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/microsoft-entra-what%E2%80%99s-new-in-secure-access-on-the-ai-frontier/4468732" target="_blank" rel="noopener"&gt;Read the news about Microsoft Entra announcements at Ignite 2025&lt;/A&gt;.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;To get started, watch this innovation session from Microsoft Security leaders Charlie Bell and Vasu Jakkalr—&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK1712" target="_blank" rel="noopener"&gt;Security in the Agentic Era – the Core Primitive&lt;/A&gt; (45 minutes)—to see how Microsoft builds security into every layer for a world woven with AI and agents, and get actionable steps to secure AI innovation at scale.&lt;/P&gt;
&lt;P&gt;Once you're ready to deep dive into what’s new with Microsoft Entra, here’s your playlist. Each of these 45-minute sessions are loaded with demos that you haven’t seen unless you were watching live.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK243" target="_blank" rel="noopener"&gt;Microsoft Entra: What's new in secure access on the AI frontier&lt;/A&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Your identity and network access approach for AI doesn’t need a revolution—just an expansion. Learn how to strengthen your Zero Trust foundation, manage and govern the rising tide of agents, and enable AI to accelerate your success. &amp;nbsp;&lt;/P&gt;
&lt;div data-video-id="https://www.youtube.com/watch?v=ptMM56u6Ay0/1764124342645" data-video-remote-vid="https://www.youtube.com/watch?v=ptMM56u6Ay0/1764124342645" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FptMM56u6Ay0%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DptMM56u6Ay0&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FptMM56u6Ay0%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK260" target="_blank" rel="noopener"&gt;Microsoft Entra Suite: Accelerate Zero Trust and secure AI access&lt;/A&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;In the era of AI, empowering your workforce with secure access to AI and agents is essential. Microsoft Entra Suite protects every connection using identity-driven controls, adaptive policies, secure web and AI Gateway, so your organization can innovate without compromise.&lt;/P&gt;
&lt;div data-video-id="https://youtu.be/Ze0v1HkIk-o?si=ye0_1vSJT4pa4Jlx/1764100181111" data-video-remote-vid="https://youtu.be/Ze0v1HkIk-o?si=ye0_1vSJT4pa4Jlx/1764100181111" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FZe0v1HkIk-o%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DZe0v1HkIk-o&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FZe0v1HkIk-o%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK265" target="_blank" rel="noopener"&gt;Secure access for AI agents with Microsoft Entra&lt;/A&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Learn to discover, manage, govern, and protect agent identities and access to resources—just as you do for human identities—with enterprise-grade secure access for agents from Microsoft Entra Agent ID. &amp;nbsp;&lt;/P&gt;
&lt;div data-video-id="https://youtu.be/rBRwT0E0jQA?si=zfnPjvSgPbJwiVUq/1764100288580" data-video-remote-vid="https://youtu.be/rBRwT0E0jQA?si=zfnPjvSgPbJwiVUq/1764100288580" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FrBRwT0E0jQA%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DrBRwT0E0jQA&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FrBRwT0E0jQA%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK237" target="_blank" rel="noopener"&gt;Identity under siege: Modern ITDR from Microsoft&lt;/A&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Your identities are under attack. Join experts from Microsoft Entra and Defender to learn how you can streamline collaboration across teams and better protect, detect, and respond to threats targeting your identity fabric.&lt;/P&gt;
&lt;div data-video-id="https://youtu.be/J_PKZb6D_VE?si=R0yEQnWYsY4hbG37/1764100626623" data-video-remote-vid="https://youtu.be/J_PKZb6D_VE?si=R0yEQnWYsY4hbG37/1764100626623" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FJ_PKZb6D_VE%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DJ_PKZb6D_VE&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FJ_PKZb6D_VE%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK242" target="_blank" rel="noopener"&gt;Top essentials for an Integrated, AI-ready security foundation​&lt;/A&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;To stay ahead, organizations need a secure, identity-based foundation for your digital landscape. Learn what Microsoft Entra and Intune bring across the Microsoft 365 stack to help you reach a Zero Trust security posture with more compliance and control in the era of AI. This session dives into top scenarios that bring to life what you need to maximize your Microsoft investment.&lt;/P&gt;
&lt;div data-video-id="https://youtu.be/tHnILyOs_8I?si=Ez9Z9DAfhBMDqnFd/1764100757451" data-video-remote-vid="https://youtu.be/tHnILyOs_8I?si=Ez9Z9DAfhBMDqnFd/1764100757451" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FtHnILyOs_8I%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DtHnILyOs_8I&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FtHnILyOs_8I%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK238" target="_blank" rel="noopener"&gt;Security Copilot: Your agentic workforce for smarter, faster defense&lt;/A&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Automate tasks, strengthen defense, and accelerate response with Security Copilot agents - built by Microsoft, partners, or tailored by you for the unique challenges of your environment. Check out the demo of the Conditional Access Optimization Agent in Microsoft Entra in this session!&lt;/P&gt;
&lt;div data-video-id="https://youtu.be/ZUoQE5UJNyk?si=oVkEpJ4vkjX4_fHZ/1764100853321" data-video-remote-vid="https://youtu.be/ZUoQE5UJNyk?si=oVkEpJ4vkjX4_fHZ/1764100853321" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FZUoQE5UJNyk&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DZUoQE5UJNyk&amp;amp;image=http%3A%2F%2Fi.ytimg.com%2Fvi%2FZUoQE5UJNyk%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As organizations adopt AI, identity becomes the access fabric for trust. Microsoft Entra is leading the way with innovations that secure every connection—human, app, or agent—without compromising agility.&lt;/P&gt;
&lt;H2&gt;Learn more about securing and governing AI agents&lt;/H2&gt;
&lt;P&gt;This year at Ignite, AI agents were the hottest topic. Managing, governing, and protecting agent identities is central to any organization’s strategy for adopting agents. Therefore, Microsoft Entra Agent ID is included in the newly announced Microsoft Agent 365, the control plane for agents, and works natively with Microsoft Foundry (formerly Azure AI Foundry). Learn more by watching these Microsoft Ignite sessions.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK306" target="_blank" rel="noopener"&gt;Innovation session: Introducing Microsoft Agent 365: the control plane for AI agents&lt;/A&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Discover how to hire, onboard, and train AI-powered digital labor that acts with autonomy, adapts to evolving business needs, and operates securely across environments. This session explores how intuitive tools and built-in controls enable you to manage these agents like real team members—scaling productivity while maintaining oversight and trust.&lt;/P&gt;
&lt;div data-video-id="https://youtu.be/-LSrJtikrh8?si=3ty50QZpz2IDWU3y/1764101133716" data-video-remote-vid="https://youtu.be/-LSrJtikrh8?si=3ty50QZpz2IDWU3y/1764101133716" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F-LSrJtikrh8%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D-LSrJtikrh8&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F-LSrJtikrh8%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK269" target="_blank" rel="noopener"&gt;Explore Microsoft Agent 365 security and governance capabilities&lt;/A&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Confidently activate your AI agent estate with Microsoft Agent 365. Whether an assistive agent or fully autonomous digital worker, learn how Agent 365 provides comprehensive security and governance to help you manage AI access and agent sprawl, prevent data oversharing and leaks, defend against AI threats and vulnerabilities, and comply with AI regulations.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK269" target="_blank" rel="noopener"&gt;Watch now&lt;/A&gt; (45 minutes)&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK268" target="_blank" rel="noopener"&gt;Secure agents in Microsoft Foundry with Microsoft Security&lt;/A&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;As organizations rapidly build AI and innovation accelerates, so do the risks. Deep dive to learn how to safeguard AI agents across their lifecycle by managing identity, data access, posture, and applying governance at scale.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK268" target="_blank" rel="noopener"&gt;Watch now&lt;/A&gt; (45 minutes)&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK261" target="_blank" rel="noopener"&gt;Build secure AI agents: Microsoft’s stack, your innovation&lt;/A&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Learn how Microsoft secures agentic AI systems across the lifecycle. Discover design strategies and real-world tool examples—from Microsoft Security and Microsoft Foundry—to build safe, resilient agents aligned with Secure Future Initiative principles.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK261" target="_blank" rel="noopener"&gt;Watch now&lt;/A&gt; (45 minutes)&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK186" target="_blank" rel="noopener"&gt;Entra Agent ID and other enterprise superpowers in Microsoft Foundry&lt;/A&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Hear how Commerzbank drives agentic AI at scale and discover how agents in Microsoft Foundry meet enterprise standards for identity, connectivity, extensibility, and lifecycle management. We’ll dive into Entra Agent ID, networking configuration, full agent lifecycle support, custom tool integration, and provisioning of tenant-level tool and agent catalogs. If you're deploying agents across your organization, this session is your blueprint for secure, scalable, and governable solutions.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK186" target="_blank" rel="noopener"&gt;Watch now&lt;/A&gt; (40 minutes)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Expand your capabilities with Microsoft Security partners&lt;/H2&gt;
&lt;P&gt;Last week we also &lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/building-defense-in-depth-simplifying-identity-security-with-new-partner-integra/4468733" target="_blank" rel="noopener"&gt;announced the General Availability of powerful new partner integrations&lt;/A&gt; in Microsoft Entra that take identity security to the next level, including news from Cloudflare, Akamai, Arkose Labs, HUMAN security, Grit Software Systems, WhoIAM, Au10tix, IDEMIA, and TrueCredential (LexisNexis).&lt;/P&gt;
&lt;P&gt;Here, we’re highlighting informative Ignite replays from our partners for Microsoft Entra customers.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRKSP487" target="_blank" rel="noopener"&gt;Voices you can’t trust: Stop AI-powered impersonation attacks&lt;/A&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Jeremy Nelson | Insight&lt;/P&gt;
&lt;P&gt;AI deepfakes are enabling fraud now, not in the future. Jeremy Nelson shares real cases, including a $25M scam from a fake video call, showing how threat actors bypass identity checks. Learn how Verified ID secures support desk interactions and get practical steps to protect your organization from AI-driven impersonation attacks.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRKSP487" target="_blank" rel="noopener"&gt;Watch now&lt;/A&gt; (45 minutes)&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/ODSP1403" target="_blank" rel="noopener"&gt;Closing the gaps of Microsoft Entra and Intune&lt;/A&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Stefan Schoenleber | glueckkanja AG&lt;/P&gt;
&lt;P&gt;Discover how RealmJoin and glueckkanja's NAC bundle SCEPman + RADIUSaaS close key gaps in Microsoft 365. RealmJoin streamlines app lifecycle management for Windows and macOS, detects outdated/user-installed software, supports advanced LAPS, and enables UHD teams to safely perform routine tasks. The glueckkanja NAC solution enables certificate-based network authentication (CBA) for Intune managed clients, replacing NPS and NDES with scalable, cloud-native services, and supports certificate issuance for clients and servers.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/ODSP1403" target="_blank" rel="noopener"&gt;Watch now&lt;/A&gt; (13 minutes)&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/ODSP1466" target="_blank" rel="noopener"&gt;Microsoft Entra ID environments: Replacing GPP with ProfileUnity&lt;/A&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Jason Smith | Liquidware&lt;/P&gt;
&lt;P&gt;As organizations shift to Microsoft Entra ID–joined or hybrid environments, traditional Group Policy Preferences no longer apply. Tasks like drive mappings, printers, shortcuts, and registry settings often require complex scripting or limited Intune workarounds, creating gaps in consistency and user experience. Learn how to modernize user environment management and deliver scalable, policy-driven control across cloud workspaces.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/ODSP1466" target="_blank" rel="noopener"&gt;Watch now&lt;/A&gt; (37 minutes)&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/ODSP1502" target="_blank" rel="noopener"&gt;Accelerate enterprise passkey deployment with HID and Microsoft Entra&lt;/A&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Eric Williams | HID&lt;/P&gt;
&lt;P&gt;Discover how HID is helping enterprises scale passkey adoption with Microsoft Entra ID—seamlessly and securely. In this demo, we showcase how HID’s FIDO credentials with converged access, combined with enterprise-grade passkey management and enhanced capabilities amplify your existing Azure and Microsoft Entra investments. Whether you're exploring what's next, seeking fast implementation wins, or learning from industry best practices, this session will show you how to deploy passkeys at scale.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/ODSP1502" target="_blank" rel="noopener"&gt;Watch now&lt;/A&gt; (&amp;lt;3 minutes)&lt;/P&gt;
&lt;H2&gt;Thanks for your ongoing feedback and collaboration&lt;/H2&gt;
&lt;P&gt;It was incredible to meet so many of you in person, whether it was after one of our sessions, at the Microsoft Security party, or at our Expert Meetup for a 1:1 conversation. Our Microsoft Entra community really leaned in last week—not just to learn, but also to teach, by sharing your experience with early-in-career practitioners who were grateful to hear your suggestions. Thank you so much for looking out for each other in this rapidly changing world.&lt;/P&gt;
&lt;img&gt;Highlights from our Microsoft Entra sessions at Microsoft Ignite 2025.&lt;/img&gt;
&lt;P&gt;To our community in the United States, we wish you a Happy Thanksgiving. And for everyone around the world, we wish you a restful winter season with your loved ones.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Take the next step in exploring the products demonstrated at Microsoft Ignite.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/try-microsoft-entra-suite" target="_blank"&gt;Try Microsoft Entra Suite for free | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/agent-id/" target="_blank"&gt;Microsoft Entra Agent ID documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-agent-365/" target="_blank"&gt;Microsoft Agent 365 documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/security-copilot/security-copilot-in-entra" target="_blank"&gt;Security Copilot in Microsoft Entra | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 26 Nov 2025 03:16:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/icymi-watch-replays-of-microsoft-entra-sessions-at-microsoft/ba-p/4427989</guid>
      <dc:creator>Kaitlin_Murphy</dc:creator>
      <dc:date>2025-11-26T03:16:12Z</dc:date>
    </item>
    <item>
      <title>Enhance protection of Microsoft Entra ID authentication by blocking external script injection</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/enhance-protection-of-microsoft-entra-id-authentication-by/ba-p/4435200</link>
      <description>&lt;P&gt;As part of Microsoft’s &lt;A href="https://www.microsoft.com/en-us/trust-center/security/secure-future-initiative?msockid=22346ecb805f631739b27a6e81726266" target="_blank" rel="noopener"&gt;Secure Future Initiative&lt;/A&gt;, we’re making an important update to our &lt;A class="lia-external-url" href="https://aka.ms/entracontentsecuritypolicy" target="_blank" rel="noopener"&gt;Content Security Policy (CSP)&lt;/A&gt; that will enhance the security of the Microsoft Entra ID sign-in experience. This update strengthens security and adds an extra layer of protection by allowing only scripts from trusted Microsoft domains to run during authentication, blocking unauthorized or injected code from executing during the sign-in experience.&lt;/P&gt;
&lt;P&gt;This is a proactive measure that further shields your users against current security risks, such as &lt;A href="https://www.microsoft.com/en-us/msrc/blog/2025/09/why-xss-still-matters-msrcs-perspective-on-a-25-year-old-threat" target="_blank" rel="noopener"&gt;cross-site scripting (XSS)&lt;/A&gt;, where attackers can insert malicious code into websites. As a result, you can be assured that your users receive stronger protection, and your organization remains ahead of new security challenges.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Megna Kokkalera&lt;/STRONG&gt;, Product Manager II leading this effort, will walk us through this update.&lt;/P&gt;
&lt;H2&gt;When will you see this change?&lt;/H2&gt;
&lt;P&gt;Microsoft Entra ID will enforce CSP globally starting &lt;STRONG&gt;mid-to-late October 2026&lt;/STRONG&gt;. Periodic communications will be sent prior to release.&lt;/P&gt;
&lt;H2&gt;How will this affect your organization?&lt;/H2&gt;
&lt;P&gt;We're adding a new Content Security Policy header to the Microsoft Entra sign-in experience to enhance security and harden against unauthorized script injection.&lt;/P&gt;
&lt;P&gt;Here’s what we’re specifically changing on &lt;STRONG&gt;login.microsoftonline.com&lt;/STRONG&gt;:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Only allow script downloads from Microsoft trusted CDN domains. See the &lt;A href="https://content-security-policy.com/script-src/" target="_blank" rel="noopener"&gt;CSP script src guide&lt;/A&gt; for examples and guidance.&lt;/LI&gt;
&lt;LI&gt;Only allow inline script execution from Microsoft trusted source. See the &lt;A href="https://content-security-policy.com/nonce/" target="_blank" rel="noopener"&gt;CSP nonce guide&lt;/A&gt; for information on inline script execution.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Note that the updated Content Security Policy will only apply to browser-based sign-in experiences, only for URLs that start with login.microsoftonline.com. &lt;STRONG&gt;Microsoft Entra External ID will see &lt;U&gt;no&lt;/U&gt; impact.&lt;/STRONG&gt;&lt;/P&gt;
&lt;H2&gt;What do you need to do to prepare?&lt;/H2&gt;
&lt;P&gt;Microsoft recommends not using browser extensions or tools that inject code or script into the Microsoft Entra sign-in experience. If you follow this advice, your experience will remain unchanged, and no further action is needed.&lt;/P&gt;
&lt;P&gt;If you use tools or browser extensions that inject code or script into the Microsoft Entra sign-in page, switch to alternative tools that don’t inject code. Code and script injection will no longer be supported, and these tools will stop working, though users can still sign in.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;You can identify the exact impact in your tenant using the instructions below:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Go through a sign-in flow with the dev console open to identify any violations.&lt;/LI&gt;
&lt;LI&gt;Information about the violation will be displayed in red. (If a specific team or person is causing the violation, it will only show up in their flows. Accordingly, it is recommended to thoroughly assess different sign-in scenarios within your organization.)&lt;/LI&gt;
&lt;LI&gt;Here is an example of how the violation would show up in the console:&lt;/LI&gt;
&lt;/OL&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This update to our Content Security Policy adds an additional layer of protection by blocking unauthorized scripts, further helping safeguard your organization against evolving security threats. To ensure a smooth rollout, please test your sign-in flows thoroughly ahead of time. This will help you catch and address any issues early, so your users stay protected, and your sign-in experience remains seamless.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Megna Kokkalera&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Product Manager II&lt;/P&gt;
&lt;P&gt;Microsoft Identity, Authentication Experiences&lt;/P&gt;
&lt;P&gt;LinkedIn: &lt;A href="https://www.linkedin.com/in/megnakokkalera/" target="_blank" rel="noopener"&gt;Megna Kokkalera | LinkedIn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://aka.ms/entracontentsecuritypolicy" target="_blank" rel="noopener"&gt;Content Security Policy overview for Microsoft Entra ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/trust-center/security/secure-future-initiative?msockid=22346ecb805f631739b27a6e81726266" target="_blank" rel="noopener"&gt;Microsoft Secure Future Initiative (SFI)&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://content-security-policy.com/script-src/" target="_blank" rel="noopener"&gt;CSP script src guide&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://content-security-policy.com/nonce/" target="_blank" rel="noopener"&gt;CSP nonce guide&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 25 Nov 2025 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/enhance-protection-of-microsoft-entra-id-authentication-by/ba-p/4435200</guid>
      <dc:creator>AnkurPatel</dc:creator>
      <dc:date>2025-11-25T16:00:00Z</dc:date>
    </item>
  </channel>
</rss>

