đź“‹ Microsoft Entra Documentation Changes

Daily summary for changes since March 4th 2026, 8:15 PM PST

Report generated on March 5th 2026, 8:15 PM PST

📊 Summary

27
Total Commits
0
New Files
22
Modified Files
0
Deleted Files
10
Contributors

📝 Modified Documentation Files

Modified by Ortagus Winfrey on Mar 5, 2026 2:03 PM
đź“– View on learn.microsoft.com
+140 / -1 lines changed
Commit: Move July 2025 release notes to archive
Changes:
Before
After
author: owinfreyATL
manager: dougeby
ms.topic: whats-new
ms.date: 02/03/2026
ms.author: owinfrey
ms.reviewer: dhanyahk
ms.custom: it-pro, has-adal-ref, has-azure-ad-ps-ref, sfi-ga-nochange
 
---
 
## June 2025
### General Availability – Update to Microsoft Entra Work or School Default Background Image
 
 
 
 
 
 
 
author: owinfreyATL
manager: dougeby
ms.topic: whats-new
ms.date: 03/05/2026
ms.author: owinfrey
ms.reviewer: dhanyahk
ms.custom: it-pro, has-adal-ref, has-azure-ad-ps-ref, sfi-ga-nochange
 
---
 
## July 2025
 
### General Availability - Microsoft Entra External ID: Custom 3rd party email OTP provider
 
**Type:** New feature
**Service category:** B2C - Consumer Identity Management
**Product capability:** 3rd Party Integration
 
Use a 3rd Party Email OTP Provider to customize the Email OTP notifications for sign-in and sign-up flows for Microsoft Entra External ID. A new "Custom Email OTP Provider" Custom Authentication Extension allows you to use Azure Communication Service (ACS) or a 3rd party provider, such as SendGrid, to maintain branding consistency through your end user authentication experiences. For more information, see: [Configure a custom email provider for one time passcode send events](../identity-platform/custom-extension-email-otp-get-started.md).
 
Modified by Ortagus Winfrey on Mar 5, 2026 2:03 PM
đź“– View on learn.microsoft.com
+0 / -130 lines changed
Commit: Move July 2025 release notes to archive
Changes:
Before
After
**Note:** Currently, the new Bulk Operations service supports **Groups**, **Devices**, and **User Export** only. Support for additional entities, such as **Enterprise Applications**, is coming soon. For more information, see: [Bulk operations in Microsoft Entra ID (Preview)](../fundamentals/bulk-operations.md).
 
---
 
 
 
## July 2025
 
### General Availability - Microsoft Entra External ID: Custom 3rd party email OTP provider
 
**Type:** New feature
**Service category:** B2C - Consumer Identity Management
**Product capability:** 3rd Party Integration
 
Use a 3rd Party Email OTP Provider to customize the Email OTP notifications for sign-in and sign-up flows for Microsoft Entra External ID. A new "Custom Email OTP Provider" Custom Authentication Extension allows you to use Azure Communication Service (ACS) or a 3rd party provider, such as SendGrid, to maintain branding consistency through your end user authentication experiences. For more information, see: [Configure a custom email provider for one time passcode send events](../identity-platform/custom-extension-email-otp-get-started.md).
 
 
 
### General Availability - Application Based Authentication on Microsoft Entra Connect Sync
 
**Note:** Currently, the new Bulk Operations service supports **Groups**, **Devices**, and **User Export** only. Support for additional entities, such as **Enterprise Applications**, is coming soon. For more information, see: [Bulk operations in Microsoft Entra ID (Preview)](../fundamentals/bulk-operations.md).
 
---
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
+15 / -23 lines changed
Commit: Updating the provisioning docs template
Changes:
Before
After
author: jeevansd
manager: pmwongera
ms.topic: how-to
ms.date: 03/25/2025
ms.author: jeedes
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to CybSafe so that I can streamline the user management process and ensure that users have the appropriate access to CybSafe.
 
![Provisioning tab](common/provisioning.png)
 
4. Set the **Provisioning Mode** to **Automatic**.
 
![Provisioning tab automatic](common/provisioning-automatic.png)
 
5. Under the **Admin Credentials** section, input your CybSafe Tenant URL and Secret Token. Select **Test Connection** to ensure Microsoft Entra ID can connect to CybSafe. If the connection fails, ensure your CybSafe account has Admin permissions and try again.
 
![Token](common/provisioning-testconnection-tenanturltoken.png)
 
6. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
 
author: jeevansd
manager: pmwongera
ms.topic: how-to
ms.date: 03/05/2026
ms.author: jeedes
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to CybSafe so that I can streamline the user management process and ensure that users have the appropriate access to CybSafe.
 
![Provisioning tab](common/provisioning.png)
 
1. Set **+ New configuration**.
 
![Screenshot of Provisioning tab automatic.](common/application-provisioning.png)
 
1. In the **Tenant URL** field, input your CybSafe Tenant URL and Secret Token. Select **Test Connection** to ensure Microsoft Entra ID can connect to CybSafe. If the connection fails, ensure your CybSafe account has the required admin permissions and try again.
 
![Screenshot of Provisioning test connection.](common/provisioning-test-connection.png)
 
1. Select **Create** to create your configuration.
 
+14 / -22 lines changed
Commit: Updating the provisioning docs template
Changes:
Before
After
author: jeevansd
manager: pmwongera
ms.topic: how-to
ms.date: 03/25/2025
ms.author: jeedes
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to Dagster Cloud so that I can streamline the user management process and ensure that users have the appropriate access to Dagster Cloud.
 
![Screenshot of Provisioning tab.](common/provisioning.png)
 
1. Set the **Provisioning Mode** to **Automatic**.
 
![Screenshot of Provisioning tab automatic.](common/provisioning-automatic.png)
 
1. Under the **Admin Credentials** section, input your Dagster Cloud Tenant URL and Secret Token. The Tenant URL is `https://*your-org-name*.dagster.cloud/scim/v2` and the Secret Token is the SCIM token you created in step 2 above. Select **Test Connection** to ensure Microsoft Entra ID can connect to Dagster Cloud.
 
![Screenshot of Token.](common/provisioning-testconnection-tenanturltoken.png)
 
1. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
 
author: jeevansd
manager: pmwongera
ms.topic: how-to
ms.date: 03/05/2026
ms.author: jeedes
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to Dagster Cloud so that I can streamline the user management process and ensure that users have the appropriate access to Dagster Cloud.
 
![Screenshot of Provisioning tab.](common/provisioning.png)
 
1. Set **+ New configuration**.
 
![Screenshot of Provisioning tab automatic.](common/application-provisioning.png)
 
1. In the **Tenant URL** field, input your Dagster Cloud Tenant URL and Secret Token. Select **Test Connection** to ensure Microsoft Entra ID can connect to Dagster Cloud. If the connection fails, ensure your Dagster Cloud account has the required admin permissions and try again.
 
![Screenshot of Provisioning test connection.](common/provisioning-test-connection.png)
 
1. Select **Create** to create your configuration.
 
+14 / -22 lines changed
Commit: Updating the provisioning docs template
Changes:
Before
After
author: jeevansd
manager: pmwongera
ms.topic: how-to
ms.date: 03/25/2025
ms.author: jeedes
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to Datadog so that I can streamline the user management process and ensure that users have the appropriate access to Datadog.
 
![Screenshot of Provisioning tab.](common/provisioning.png)
 
1. Set the **Provisioning Mode** to **Automatic**.
 
![Screenshot of Provisioning tab automatic.](common/provisioning-automatic.png)
 
1. Under the **Admin Credentials** section, input your Datadog Tenant URL and Secret Token. Select **Test Connection** to ensure Microsoft Entra ID can connect to Datadog. If the connection fails, ensure your Datadog account has Admin permissions and try again.
 
![Screenshot of Token.](common/provisioning-testconnection-tenanturltoken.png)
 
1. In the **Notification Email** field, enter the email address of a person who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
 
author: jeevansd
manager: pmwongera
ms.topic: how-to
ms.date: 03/05/2026
ms.author: jeedes
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to Datadog so that I can streamline the user management process and ensure that users have the appropriate access to Datadog.
 
![Screenshot of Provisioning tab.](common/provisioning.png)
 
1. Set **+ New configuration**.
 
![Screenshot of Provisioning tab automatic.](common/application-provisioning.png)
 
1. In the **Tenant URL** field, input your Datadog Tenant URL and Secret Token. Select **Test Connection** to ensure Microsoft Entra ID can connect to Datadog. If the connection fails, ensure your Datadog account has the required admin permissions and try again.
 
![Screenshot of Provisioning test connection.](common/provisioning-test-connection.png)
 
1. Select **Create** to create your configuration.
 
+15 / -20 lines changed
Commit: Updating the provisioning docs template
Changes:
Before
After
description: Learn how to configure Microsoft Entra ID to automatically provision and de-provision user accounts to Dialpad.
author: jeevansd
ms.topic: how-to
ms.date: 03/25/2025
ms.author: jeedes
ms.custom: sfi-image-nochange
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to Dialpad so that I can streamline the user management process and ensure that users have the appropriate access to Dialpad.
 
![Screenshot of the Manage options with the Provisioning option called out.](common/provisioning.png)
 
4. Set the **Provisioning Mode** to **Automatic**.
 
![Screenshot of the Provisioning Mode dropdown list with the Automatic option called out.](common/provisioning-automatic.png)
 
5. Under the **Admin Credentials** section, input `https://dialpad.com/scim` in **Tenant URL**. Input the value that you retrieved and saved earlier from Dialpad in **Secret Token**. Select **Test Connection** to ensure Microsoft Entra ID can connect to Dialpad. If the connection fails, ensure your Dialpad account has Admin permissions and try again.
 
![Tenant URL + Token](common/provisioning-testconnection-tenanturltoken.png)
 
6. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and check the checkbox - **Send an email notification when a failure occurs**.
 
description: Learn how to configure Microsoft Entra ID to automatically provision and de-provision user accounts to Dialpad.
author: jeevansd
ms.topic: how-to
ms.date: 03/05/2026
ms.author: jeedes
ms.custom: sfi-image-nochange
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to Dialpad so that I can streamline the user management process and ensure that users have the appropriate access to Dialpad.
 
![Screenshot of the Manage options with the Provisioning option called out.](common/provisioning.png)
 
1. Set **+ New configuration**.
 
![Screenshot of Provisioning tab automatic.](common/application-provisioning.png)
 
5. Under the **Admin Credentials** section, input `https://dialpad.com/scim` in **Tenant URL**. Input the value that you retrieved and saved earlier from Dialpad in **Secret Token**. Select **Test Connection** to ensure Microsoft Entra ID can connect to Dialpad. If the connection fails, ensure your Dialpad account has Admin permissions and try again.
 
![Screenshot of Provisioning test connection.](common/provisioning-test-connection.png)
 
1. Select **Create** to create your configuration.
 
+13 / -21 lines changed
Commit: Updating the provisioning docs template
Changes:
Before
After
manager: pmwongera
 
ms.topic: how-to
ms.date: 03/25/2025
ms.author: jeedes
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to Diffchecker so that I can streamline the user management process and ensure that users have the appropriate access to Diffchecker.
 
![Screenshot of Provisioning tab.](common/provisioning.png)
 
1. Set the **Provisioning Mode** to **Automatic**.
 
![Screenshot of Provisioning tab automatic.](common/provisioning-automatic.png)
 
1. Under the **Admin Credentials** section, input your Diffchecker Tenant URL and Secret Token. Select **Test Connection** to ensure Microsoft Entra ID can connect to Diffchecker. If the connection fails, ensure your Diffchecker account has Admin permissions and try again.
 
![Screenshot of Token.](common/provisioning-testconnection-tenanturltoken.png)
 
1. In the **Notification Email** field, enter the email address of a person who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
 
manager: pmwongera
 
ms.topic: how-to
ms.date: 03/05/2026
ms.author: jeedes
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to Diffchecker so that I can streamline the user management process and ensure that users have the appropriate access to Diffchecker.
 
![Screenshot of Provisioning tab.](common/provisioning.png)
 
1. Set **+ New configuration**.
 
![Screenshot of Provisioning tab automatic.](common/application-provisioning.png)
 
1. In the **Tenant URL** field, input your Diffchecker Tenant URL and Secret Token. Select **Test Connection** to ensure Microsoft Entra ID can connect to Diffchecker. If the connection fails, ensure your Diffchecker account has the required admin permissions and try again.
 
![Screenshot of Provisioning test connection.](common/provisioning-test-connection.png)
 
1. Select **Create** to create your configuration.
 
Modified by Ken Withee on Mar 5, 2026 10:49 PM
đź“– View on learn.microsoft.com
+3 / -3 lines changed
Commit: Fix broken links across multiple docs
Changes:
Before
After
`https://<tenantname>.peoplecart.com/SignIn.aspx`
 
> [!NOTE]
> These values aren't real. Update these values with the actual Identifier and Sign on URL. Contact [Peoplecart Client support team](https://peoplecart.com/ContactUs.aspx) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section.
 
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, select **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
 
 
## Configure Peoplecart SSO
 
To configure single sign-on on **Peoplecart** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from the application configuration to [Peoplecart support team](https://peoplecart.com/ContactUs.aspx). They set this setting to have the SAML SSO connection set properly on both sides.
 
### Create Peoplecart test user
 
In this section, you create a user called Britta Simon in Peoplecart. Work with [Peoplecart support team](https://peoplecart.com/ContactUs.aspx) to add the users in the Peoplecart platform. Users must be created and activated before you use single sign-on.
 
## Test SSO
 
`https://<tenantname>.peoplecart.com/SignIn.aspx`
 
> [!NOTE]
> These values aren't real. Update these values with the actual Identifier and Sign on URL. Contact the Peoplecart Client support team to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section.
 
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, select **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
 
 
## Configure Peoplecart SSO
 
To configure single sign-on on **Peoplecart** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from the application configuration to the Peoplecart support team. They set this setting to have the SAML SSO connection set properly on both sides.
 
### Create Peoplecart test user
 
In this section, you create a user called Britta Simon in Peoplecart. Work with the Peoplecart support team to add the users in the Peoplecart platform. Users must be created and activated before you use single sign-on.
 
## Test SSO
 
Modified by Barclay Neira on Mar 5, 2026 8:33 PM
đź“– View on learn.microsoft.com
+4 / -1 lines changed
Commit: Update date and add note in bulk delete users doc
Changes:
Before
After
---
title: Bulk delete users in Microsoft Entra ID
description: Delete users in bulk in Microsoft Entra ID
ms.date: 02/24/2026
ms.topic: how-to
ms.custom: it-pro, sfi-image-nochange
ms.reviewer: jeffsta
 
## To bulk delete users
 
 
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](~/identity/role-based-access-control/permissions-reference.md#user-administrator).
1. Select Microsoft Entra ID.
 
 
 
---
title: Bulk delete users in Microsoft Entra ID
description: Delete users in bulk in Microsoft Entra ID
ms.date: 03/05/2026
ms.topic: how-to
ms.custom: it-pro, sfi-image-nochange
ms.reviewer: jeffsta
 
## To bulk delete users
 
>[!IMPORTANT]
> We are making updates to bulk operations. While we address the issue, you may experience problems deleting users assigned to privileged roles. This problem is temporary and we are working to address it as soon as possible.
 
 
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](~/identity/role-based-access-control/permissions-reference.md#user-administrator).
1. Select Microsoft Entra ID.
+2 / -2 lines changed
Commit: Fix broken links across multiple docs
Changes:
Before
After
`https://<subdomain>.blackboard.com/auth-saml/saml/SSO/entity-id/SAML_AD`
 
> [!NOTE]
> These values aren't real. Update these values with the actual Sign on URL and Identifier. Contact [Blackboard Learn Client support team](https://www.blackboard.com/support/index.aspx) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section.
 
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
 
 
## Configure Blackboard Learn SSO
 
To configure single sign-on on **Blackboard Learn** side, follow the [link](https://help.blackboard.com/Learn/Administrator/SaaS/Authentication/Implement_Authentication/SAML_Authentication_Provider_Type). If you're facing any problem while configuring, contact [Blackboard Learn support team](https://www.blackboard.com/support/index.aspx).
 
 
### Create Blackboard Learn test user
`https://<subdomain>.blackboard.com/auth-saml/saml/SSO/entity-id/SAML_AD`
 
> [!NOTE]
> These values aren't real. Update these values with the actual Sign on URL and Identifier. Contact [Blackboard Learn Client support team](https://www.blackboard.com/support) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section.
 
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
 
 
## Configure Blackboard Learn SSO
 
To configure single sign-on on **Blackboard Learn** side, follow the [link](https://help.blackboard.com/Learn/Administrator/SaaS/Authentication/Implement_Authentication/SAML_Authentication_Provider_Type). If you're facing any problem while configuring, contact [Blackboard Learn support team](https://www.blackboard.com/support).
 
 
### Create Blackboard Learn test user
+2 / -2 lines changed
Commit: final-edits
Changes:
Before
After
- For detailed steps on how to register your device, see [Register your personal device on your work or school network](https://support.microsoft.com/account-billing/register-your-personal-device-on-your-work-or-school-network-8803dd61-a613-45e3-ae6c-bd1ab25bf8a8).
 
**Apple (Preview)**:
- macOS 11.0 or later. Requires the Microsoft Enterprise SSO plug-in. Alternatively, you can also use Platform SSO. Only MDM-managed devices are supported.
- iOS / iPadOS 14.0 or later. Requires the Microsoft Enterprise SSO plug-in. Only MDM-managed devices are supported.
- For detailed steps on how to setup, see [Enabling Microsoft Enterprise SSO plug-in](../../identity-platform/apple-sso-plugin.md) and configuring [Platform SSO for macOS](/intune/intune-service/configuration/platform-sso-macos).
 
## Deployment
- For detailed steps on how to register your device, see [Register your personal device on your work or school network](https://support.microsoft.com/account-billing/register-your-personal-device-on-your-work-or-school-network-8803dd61-a613-45e3-ae6c-bd1ab25bf8a8).
 
**Apple (Preview)**:
- macOS 14.0 or later. Requires the Microsoft Enterprise single sign-on (SSO) plug-in. Alternatively, you can also use Platform SSO. Only MDM-managed devices are supported.
- iOS / iPadOS 16.0 or later. Requires the Microsoft Enterprise SSO plug-in. Only MDM-managed devices are supported.
- For detailed steps on how to setup, see [Enabling Microsoft Enterprise SSO plug-in](../../identity-platform/apple-sso-plugin.md) and configuring [Platform SSO for macOS](/intune/intune-service/configuration/platform-sso-macos).
 
## Deployment
Modified by Ken Withee on Mar 5, 2026 10:49 PM
đź“– View on learn.microsoft.com
+1 / -1 lines changed
Commit: Fix broken links across multiple docs
Changes:
Before
After
The following scenarios are supported when collaborating with an organization from a different Microsoft cloud:
 
- Use B2B collaboration to invite a user in the partner tenant to access resources in your organization, including web line-of-business apps, SaaS apps, and SharePoint Online sites, documents, and files.
- Use B2B collaboration to [share Power BI content to a user in the partner tenant](/power-bi/enterprise/service-admin-azure-ad-b2b#cross-cloud-b2b).
- Apply Conditional Access policies to the B2B collaboration user and opt to trust multifactor authentication or device claims (compliant claims and Microsoft Entra hybrid joined claims) from the user’s home tenant.
 
> [!NOTE]
The following scenarios are supported when collaborating with an organization from a different Microsoft cloud:
 
- Use B2B collaboration to invite a user in the partner tenant to access resources in your organization, including web line-of-business apps, SaaS apps, and SharePoint Online sites, documents, and files.
- Use B2B collaboration to [share Power BI content to a user in the partner tenant](/fabric/enterprise/powerbi/service-admin-entra-b2b).
- Apply Conditional Access policies to the B2B collaboration user and opt to trust multifactor authentication or device claims (compliant claims and Microsoft Entra hybrid joined claims) from the user’s home tenant.
 
> [!NOTE]
+1 / -1 lines changed
Commit: Fix broken links across multiple docs
Changes:
Before
After
 
Yet another common error you might face is `consent_required`, which occurs when permissions required for obtaining an access token for a protected resource aren't consented by the user. As in `interaction_required`, the solution for `consent_required` error is often initiating an interactive token acquisition prompt, using either `acquireTokenPopup` or `acquireTokenRedirect`.
 
See for more: [Common MSAL.js errors and how to handle them](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-browser/docs/errors.md)
 
## Use the Events API
 
 
Yet another common error you might face is `consent_required`, which occurs when permissions required for obtaining an access token for a protected resource aren't consented by the user. As in `interaction_required`, the solution for `consent_required` error is often initiating an interactive token acquisition prompt, using either `acquireTokenPopup` or `acquireTokenRedirect`.
 
See for more: [Common MSAL.js errors and how to handle them](~/identity-platform/msal-error-handling-js.md)
 
## Use the Events API
 
Modified by Ken Withee on Mar 5, 2026 10:49 PM
đź“– View on learn.microsoft.com
+1 / -1 lines changed
Commit: Fix broken links across multiple docs
Changes:
Before
After
});
```
 
For more information, please refer to the [ADAL Node to MSAL Node migration sample](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-node-samples/refresh-token).
 
> [!NOTE]
> We recommend you to destroy the older ADAL Node token cache once you utilize the still valid refresh tokens to get a new set of tokens using the MSAL Node's `acquireTokenByRefreshToken` method as shown above.
});
```
 
For more information, please refer to the [MSAL Node samples](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-node-samples).
 
> [!NOTE]
> We recommend you to destroy the older ADAL Node token cache once you utilize the still valid refresh tokens to get a new set of tokens using the MSAL Node's `acquireTokenByRefreshToken` method as shown above.
Modified by Ken Withee on Mar 5, 2026 10:49 PM
đź“– View on learn.microsoft.com
+1 / -1 lines changed
Commit: Fix broken links across multiple docs
Changes:
Before
After
 
- B2B users are unable to manage certain Microsoft 365 services in remote tenants (such as Exchange Online), as there's no directory picker.
- To learn about Azure Virtual Desktop support for B2B users, see [Prerequisites for Azure Virtual Desktop](/azure/virtual-desktop/prerequisites?tabs=portal).
- For the latest status on Power BI support for external member users, see [Distribute Power BI content to external guest users with Microsoft Entra B2B](/power-bi/enterprise/service-admin-azure-ad-b2b#who-can-you-invite)
::: zone-end
 
## Authorization
 
- B2B users are unable to manage certain Microsoft 365 services in remote tenants (such as Exchange Online), as there's no directory picker.
- To learn about Azure Virtual Desktop support for B2B users, see [Prerequisites for Azure Virtual Desktop](/azure/virtual-desktop/prerequisites?tabs=portal).
- For the latest status on Power BI support for external member users, see [Distribute Power BI content to external guest users with Microsoft Entra B2B](/fabric/enterprise/powerbi/service-admin-entra-b2b)
::: zone-end
 
## Authorization