πŸ“‹ Microsoft Entra Documentation Changes

Daily summary for changes since March 1st 2026, 8:21 PM PST

Report generated on March 2nd 2026, 8:21 PM PST

πŸ“Š Summary

20
Total Commits
0
New Files
10
Modified Files
0
Deleted Files
12
Contributors

πŸ“ Modified Documentation Files

+42 / -46 lines changed
Commit: Updated the content
Changes:
Before
After
---
title: Configure AWS IAM Identity Center(successor to AWS single sign-On) for automatic user provisioning with Microsoft Entra ID
description: Learn how to automatically provision and de-provision user accounts from Microsoft Entra ID to AWS IAM Identity Center.
 
 
author: jeevansd
manager: pmwongera
 
ms.topic: how-to
ms.date: 03/25/2025
ms.author: jeedes
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to AWS IAM Identity Center so that I can streamline the user management process and ensure that users have the appropriate access to AWS IAM Identity Center.
---
 
# Configure AWS IAM Identity Center(successor to AWS single sign-On) for automatic user provisioning with Microsoft Entra ID
 
This article describes the steps you need to perform in both AWS IAM Identity Center(successor to AWS single sign-On) and Microsoft Entra ID to configure automatic user provisioning. When configured, Microsoft Entra ID automatically provisions and de-provisions users and groups to [AWS IAM Identity Center](https://console.aws.amazon.com/singlesignon) using the Microsoft Entra provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Microsoft Entra ID](~/identity/app-provisioning/user-provisioning.md). You can then use those users and groups in AWS IAM Admin Center for user access to other Amazon Web Services (AWS) applications or accounts.
 
 
---
title: Configure AWS IAM Identity Center (successor to AWS single sign-on) for automatic user provisioning with Microsoft Entra ID
description: Learn how to automatically provision and de-provision user accounts from Microsoft Entra ID to AWS IAM Identity Center.
 
author: jeevansd
manager: pmwongera
 
ms.service: entra-id
ms.subservice: saas-apps
 
ms.topic: how-to
ms.date: 02/26/2026
ms.author: jeedes
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to AWS IAM Identity Center so that I can streamline the user management process and ensure that users have the appropriate access to AWS IAM Identity Center.
---
 
# Configure AWS IAM Identity Center (successor to AWS single sign-on) for automatic user provisioning with Microsoft Entra ID
 
This article describes the steps you need to perform in both AWS IAM Identity Center (successor to AWS single sign-on) and Microsoft Entra ID to configure automatic user provisioning. When configured, Microsoft Entra ID automatically provisions and de-provisions users and groups to [AWS IAM Identity Center](https://console.aws.amazon.com/singlesignon) using the Microsoft Entra provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Microsoft Entra ID](~/identity/app-provisioning/user-provisioning.md).
Modified by Sudhakaran-S-micro on Mar 2, 2026 10:18 AM
πŸ“– View on learn.microsoft.com
+29 / -30 lines changed
Commit: Updated the content
Changes:
Before
After
author: jeevansd
manager: pmwongera
 
ms.topic: how-to
ms.date: 03/25/2025
ms.author: jeedes
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to Autodesk SSO so that I can streamline the user management process and ensure that users have the appropriate access to Autodesk SSO.
<a name='step-2-configure-autodesk-sso-to-support-provisioning-with-azure-ad'></a>
 
## Step 2: Configure Autodesk SSO to support provisioning with Microsoft Entra ID
1. Login to [Autodesk management portal](https://manage.autodesk.com/).
1. From the left navigation menu, navigate to **User Management > By Group**. Select the required team from the drop-down list and select the team settings gear icon.
 
[![Navigation](media/autodesk-sso-provisioning-tutorial/step2-1-navigation.png)](media/autodesk-sso-provisioning-tutorial/step2-1-navigation.png#lightbox)
 
![Set Up Directory Sync](media/autodesk-sso-provisioning-tutorial/step2-2-set-up-directory-sync.png)
 
3. Copy and save the Base URL and API token. These values are entered in the Tenant URL * field and Secret Token * field respectively in the Provisioning tab of your Autodesk application.
 
author: jeevansd
manager: pmwongera
 
ms.service: entra-id
ms.subservice: saas-apps
 
ms.topic: how-to
ms.date: 02/26/2026
ms.author: jeedes
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to Autodesk SSO so that I can streamline the user management process and ensure that users have the appropriate access to Autodesk SSO.
<a name='step-2-configure-autodesk-sso-to-support-provisioning-with-azure-ad'></a>
 
## Step 2: Configure Autodesk SSO to support provisioning with Microsoft Entra ID
1. Sign in to [Autodesk management portal](https://manage.autodesk.com/).
1. From the left navigation menu, navigate to **User Management > By Group**. Select the required team from the drop-down list and select the team settings gear icon.
 
[![Navigation](media/autodesk-sso-provisioning-tutorial/step2-1-navigation.png)](media/autodesk-sso-provisioning-tutorial/step2-1-navigation.png#lightbox)
 
![Set Up Directory Sync](media/autodesk-sso-provisioning-tutorial/step2-2-set-up-directory-sync.png)
Modified by Sudhakaran-S-micro on Mar 2, 2026 10:18 AM
πŸ“– View on learn.microsoft.com
+28 / -28 lines changed
Commit: Updated the content
Changes:
Before
After
author: jeevansd
manager: pmwongera
 
ms.topic: how-to
ms.date: 03/25/2025
ms.author: jeedes
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to Atmos so that I can streamline the user management process and ensure that users have the appropriate access to Atmos.
 
## Step 5: Configure automatic user provisioning to Atmos
 
This section guides you through the steps to configure the Microsoft Entra provisioning service to create, update, and disable users and groups in Atmos based on user and/or group assignments in Microsoft Entra ID.
 
<a name='to-configure-automatic-user-provisioning-for-atmos-in-azure-ad'></a>
 
### To configure automatic user provisioning for Atmos in Microsoft Entra ID:
 
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](~/identity/role-based-access-control/permissions-reference.md#cloud-application-administrator).
1. Browse to **Entra ID** > **Enterprise apps**
 
author: jeevansd
manager: pmwongera
 
ms.service: entra-id
ms.subservice: saas-apps
 
ms.topic: how-to
ms.date: 02/26/2026
ms.author: jeedes
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to Atmos so that I can streamline the user management process and ensure that users have the appropriate access to Atmos.
 
## Step 5: Configure automatic user provisioning to Atmos
 
This section guides you through the steps to configure the Microsoft Entra provisioning service to create, update, and disable users and/or groups in Atmos based on user and/or group assignments in Microsoft Entra ID.
 
<a name='to-configure-automatic-user-provisioning-for-atmos-in-azure-ad'></a>
 
### To configure automatic user provisioning for Atmos in Microsoft Entra ID:
 
Modified by Sudhakaran-S-micro on Mar 2, 2026 10:18 AM
πŸ“– View on learn.microsoft.com
+28 / -27 lines changed
Commit: Updated the content
Changes:
Before
After
author: jeevansd
manager: pmwongera
 
ms.topic: how-to
ms.date: 03/25/2025
ms.author: jeedes
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to AuditBoard so that I can streamline the user management process and ensure that users have the appropriate access to AuditBoard.
 
## Step 5: Configure automatic user provisioning to AuditBoard
 
This section guides you through the steps to configure the Microsoft Entra provisioning service to create, update, and disable users in TestApp based on user and/or group assignments in Microsoft Entra ID.
 
<a name='to-configure-automatic-user-provisioning-for-auditboard-in-azure-ad'></a>
 
### To configure automatic user provisioning for AuditBoard in Microsoft Entra ID:
 
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](~/identity/role-based-access-control/permissions-reference.md#cloud-application-administrator).
1. Browse to **Entra ID** > **Enterprise apps**
 
author: jeevansd
manager: pmwongera
 
ms.service: entra-id
ms.subservice: saas-apps
 
ms.topic: how-to
ms.date: 02/26/2026
ms.author: jeedes
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to AuditBoard so that I can streamline the user management process and ensure that users have the appropriate access to AuditBoard.
 
## Step 5: Configure automatic user provisioning to AuditBoard
 
This section guides you through the steps to configure the Microsoft Entra provisioning service to create, update, and disable users and/or groups in AuditBoard based on user and/or group assignments in Microsoft Entra ID.
 
<a name='to-configure-automatic-user-provisioning-for-auditboard-in-azure-ad'></a>
 
### To configure automatic user provisioning for AuditBoard in Microsoft Entra ID:
 
Modified by Sudhakaran-S-micro on Mar 2, 2026 10:18 AM
πŸ“– View on learn.microsoft.com
+25 / -25 lines changed
Commit: Updated the content
Changes:
Before
After
 
author: jeevansd
manager: pmwongera
ms.topic: how-to
ms.date: 03/25/2025
ms.author: jeedes
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to Axiad Cloud so that I can streamline the user management process and ensure that users have the appropriate access to Axiad Cloud.
 
## Step 5: Configure automatic user provisioning to Axiad Cloud
 
This section guides you through the steps to configure the Microsoft Entra provisioning service to create, update, and disable users and/or groups in TestApp based on user and/or group assignments in Microsoft Entra ID.
 
<a name='to-configure-automatic-user-provisioning-for-axiad-cloud-in-azure-ad'></a>
 
### To configure automatic user provisioning for Axiad Cloud in Microsoft Entra ID:
 
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](~/identity/role-based-access-control/permissions-reference.md#cloud-application-administrator).
1. Browse to **Entra ID** > **Enterprise apps**
 
 
author: jeevansd
manager: pmwongera
 
ms.service: entra-id
ms.subservice: saas-apps
 
ms.topic: how-to
ms.date: 02/26/2026
ms.author: jeedes
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to Axiad Cloud so that I can streamline the user management process and ensure that users have the appropriate access to Axiad Cloud.
 
## Step 5: Configure automatic user provisioning to Axiad Cloud
 
This section guides you through the steps to configure the Microsoft Entra provisioning service to create, update, and disable users and/or groups in Axiad Cloud based on user and/or group assignments in Microsoft Entra ID.
 
<a name='to-configure-automatic-user-provisioning-for-axiad-cloud-in-azure-ad'></a>
 
### To configure automatic user provisioning for Axiad Cloud in Microsoft Entra ID:
+8 / -1 lines changed
Commit: PM-updates
Changes:
Before
After
 
## Administrator executes the approved rollout plan
 
You're provided several options to manage the phased rollout during deployment. During each phase, the agent monitors activity related to the policy to make sure there's no errors or issues. You can adjust the groups for phases that haven't started yet. Moving between phases or completing the deployment is done using the buttons at the top of the page.
 
- Select **Move to next phase** to advance each phase of the rollout.
- Select **Roll back to previous phase** to cancel the current phase and return to the previous phase.
## Related content
 
- [Learn more about Microsoft Security Copilot](/copilot/security/microsoft-security-copilot)
- [Conditional Access Optimization Agent overview](./conditional-access-agent-optimization.md)
 
 
 
 
 
 
 
 
## Administrator executes the approved rollout plan
 
Once you start a phased rollout, the agent helps you progress. The phased rollout suggestion is present throughout the rollout process and can show no action needed, suggest progressing to the next phase, or suggest rolling back.
The guidance appears in both the Conditional Access Optimization Agent suggestion list and the Conditional Access - Policies list. Both policies indicate that the phased rollout deployment is in progress.
You're provided several options to manage the phased rollout during deployment. During each phase, the agent monitors activity related to the policy to make sure there's no errors or issues. You can adjust the groups for phases that haven't started yet. Moving between phases or completing the deployment is done using the buttons at the top of the page.
- Select **Move to next phase** to advance each phase of the rollout.
- Select **Roll back to previous phase** to cancel the current phase and return to the previous phase.
- Select **Mark rollout as complete** to apply the new policy to all groups and complete the deployment.
 
- Select **Move to next phase** to advance each phase of the rollout.
- Select **Roll back to previous phase** to cancel the current phase and return to the previous phase.
## Related content
 
- [Learn more about Microsoft Security Copilot](/copilot/security/microsoft-security-copilot)
- [Conditional Access Optimization Agent overview](./conditional-access-agent-optimization.md)
+1 / -4 lines changed
Commit: Remove duplicated Source IP restoration include
Changes:
Before
After
description: Improve your security posture with the Microsoft Entra Zero Trust assessment to protect networks.
 
ms.topic: concept-article
ms.date: 02/11/2026
 
ms.author: sarahlipsey
author: shlipsey
### Conditional Access policies use compliant network controls
[!INCLUDE [25379](../includes/secure-recommendations/25379.md)]
 
### Source IP restoration is enabled
[!INCLUDE [25370](../includes/secure-recommendations/25370.md)]
 
### Global Secure Access signaling for Conditional Access is enabled
[!INCLUDE [25380](../includes/secure-recommendations/25380.md)]
 
description: Improve your security posture with the Microsoft Entra Zero Trust assessment to protect networks.
 
ms.topic: concept-article
ms.date: 03/02/2026
 
ms.author: sarahlipsey
author: shlipsey
### Conditional Access policies use compliant network controls
[!INCLUDE [25379](../includes/secure-recommendations/25379.md)]
 
### Global Secure Access signaling for Conditional Access is enabled
[!INCLUDE [25380](../includes/secure-recommendations/25380.md)]
 
 
 
 
Modified by Alexander Filipin on Mar 2, 2026 6:27 PM
πŸ“– View on learn.microsoft.com
+3 / -0 lines changed
Commit: Update access-review-agent.md
Changes:
Before
After
---
 
# Access Review Agent
Say goodbye to time-consuming research and the uncertainty of rushed decisions. The Access Review Agent works for your reviewers by automatically gathering insights and generating recommendations. It then guides reviewers through the review process in Microsoft Teams with natural language, with simple summaries and proposed decisions, so they can make the final call with confidence and clarity.
 
 
 
 
 
---
 
# Access Review Agent
> [!NOTE]
> Microsoft is reassessing the Access Review Agent public preview based on customer feedback received during the preview, and it will not move to general availability. The public preview will be removed on Marchβ€―27,β€―2026. We sincerely thank the customers who partnered with us during the preview to explore how agentic AI can be used to improve access review quality. Additional details are available in the Microsoft 365 Message Center. We look forward to incorporating customer feedback and AI learnings from the preview into the core Access Review experience.
 
Say goodbye to time-consuming research and the uncertainty of rushed decisions. The Access Review Agent works for your reviewers by automatically gathering insights and generating recommendations. It then guides reviewers through the review process in Microsoft Teams with natural language, with simple summaries and proposed decisions, so they can make the final call with confidence and clarity.
 
 
Modified by Jay on Mar 2, 2026 5:30 PM
πŸ“– View on learn.microsoft.com
+1 / -2 lines changed
Commit: Remove duplicated Source IP restoration include
Changes:
Before
After
description: Learn how to improve your security posture with Microsoft Entra.
 
ms.topic: reference
ms.date: 02/25/2026
 
ms.author: joflore
author: MicrosoftGuyJFlo
| [Universal tenant restrictions block unauthorized external tenant access](zero-trust-protect-networks.md#universal-tenant-restrictions-block-unauthorized-external-tenant-access) | Microsoft Entra ID P1 or Microsoft Entra Suite Add-on for Microsoft Entra ID P2 |
| [External collaboration is governed by explicit cross-tenant access policies](zero-trust-protect-networks.md#external-collaboration-is-governed-by-explicit-cross-tenant-access-policies) | Microsoft Entra ID P1 |
| [Conditional Access policies use compliant network controls](zero-trust-protect-networks.md#conditional-access-policies-use-compliant-network-controls) | Microsoft Entra ID P1 |
| [Source IP restoration is enabled](zero-trust-protect-networks.md#source-ip-restoration-is-enabled) | Microsoft Entra Suite Add-on for Microsoft Entra ID P2 |
| [Global Secure Access signaling for Conditional Access is enabled](zero-trust-protect-networks.md#global-secure-access-signaling-for-conditional-access-is-enabled) | Microsoft Entra ID P1, Microsoft Entra Suite Add-on for Microsoft Entra ID P2 |
| [Network traffic is routed through Global Secure Access for security policy enforcement](zero-trust-protect-networks.md#network-traffic-is-routed-through-global-secure-access-for-security-policy-enforcement) | Microsoft Entra Suite Add-on for Microsoft Entra ID P2 |
| [Traffic forwarding profiles are scoped to appropriate users and groups for controlled deployment](zero-trust-protect-networks.md#traffic-forwarding-profiles-are-scoped-to-appropriate-users-and-groups-for-controlled-deployment) | Microsoft Entra Suite Add-on for Microsoft Entra ID P2 |
description: Learn how to improve your security posture with Microsoft Entra.
 
ms.topic: reference
ms.date: 03/02/2026
 
ms.author: joflore
author: MicrosoftGuyJFlo
| [Universal tenant restrictions block unauthorized external tenant access](zero-trust-protect-networks.md#universal-tenant-restrictions-block-unauthorized-external-tenant-access) | Microsoft Entra ID P1 or Microsoft Entra Suite Add-on for Microsoft Entra ID P2 |
| [External collaboration is governed by explicit cross-tenant access policies](zero-trust-protect-networks.md#external-collaboration-is-governed-by-explicit-cross-tenant-access-policies) | Microsoft Entra ID P1 |
| [Conditional Access policies use compliant network controls](zero-trust-protect-networks.md#conditional-access-policies-use-compliant-network-controls) | Microsoft Entra ID P1 |
| [Global Secure Access signaling for Conditional Access is enabled](zero-trust-protect-networks.md#global-secure-access-signaling-for-conditional-access-is-enabled) | Microsoft Entra ID P1, Microsoft Entra Suite Add-on for Microsoft Entra ID P2 |
| [Network traffic is routed through Global Secure Access for security policy enforcement](zero-trust-protect-networks.md#network-traffic-is-routed-through-global-secure-access-for-security-policy-enforcement) | Microsoft Entra Suite Add-on for Microsoft Entra ID P2 |
| [Traffic forwarding profiles are scoped to appropriate users and groups for controlled deployment](zero-trust-protect-networks.md#traffic-forwarding-profiles-are-scoped-to-appropriate-users-and-groups-for-controlled-deployment) | Microsoft Entra Suite Add-on for Microsoft Entra ID P2 |
 
+1 / -0 lines changed
Commit: Remove duplicated Source IP restoration include
Changes:
Before
After
# userimpact: Low
# implementationcost: Low
---
When organizations deploy Global Secure Access as their cloud-based network proxy, Microsoft's Secure Service Edge infrastructure routes user traffic. If you don't enable source IP restoration, all authentication requests come from the proxy's IP address instead of the user's actual public egress IP.
 
Without this protection:
 
# userimpact: Low
# implementationcost: Low
---
<!-- This file is a duplicate of 25380.md. Docs files reference 25380.md.-->
When organizations deploy Global Secure Access as their cloud-based network proxy, Microsoft's Secure Service Edge infrastructure routes user traffic. If you don't enable source IP restoration, all authentication requests come from the proxy's IP address instead of the user's actual public egress IP.
 
Without this protection: