📋 Microsoft Entra Documentation Changes

Daily summary for changes since April 9th 2026, 9:27 PM PDT

Report generated on April 10th 2026, 9:27 PM PDT

📊 Summary

19
Total Commits
0
New Files
9
Modified Files
0
Deleted Files
9
Contributors

📝 Modified Documentation Files

+7 / -0 lines changed
Commit: Clarify guest billing in AR with a simple example
Changes:
Before
After
- Tailspin creates a second access review for a security group with 300 guest users with the user-to-group affiliation feature enabled.
- Billing: For May, Tailspin is billed for 500 users – 200 for the inactive guest access review and 300 for the review with user-to-group affiliation.
 
 
### Link your tenant to a subscription
 
 
 
 
 
 
 
- Tailspin creates a second access review for a security group with 300 guest users with the user-to-group affiliation feature enabled.
- Billing: For May, Tailspin is billed for 500 users – 200 for the inactive guest access review and 300 for the review with user-to-group affiliation.
 
**June**:
 
- Contoso has 10,000 guest accounts in their tenant and they want to perform an access review on those guests who are inactive.
- Contoso creates an Access Review scoped to Guests only and to Inactive Users only. The Access Review scans all 10,000 guest users and identifies 240 that are considered inactive. The campaign includes those 240 guest users only.
- There are no other governance-releated events that take place on any of the 10,000 guest users.
- Billing: For June, Contoso is billed for 240 users – only those inactive guests who had an Access Review performed on them.
 
 
### Link your tenant to a subscription
Modified by Carolyn McSharry on Apr 10, 2026 9:53 AM
📖 View on learn.microsoft.com
+3 / -3 lines changed
Commit: Fix typos in Velpic provisioning tutorial
Changes:
Before
After
---
title: Configure Configuring Velpic for for automatic user provisioning with Microsoft Entra ID
description: Learn how to configure Microsoft Entra ID to automatically provision and de-provision user accounts to Velpic.
author: zhchia
ms.topic: how-to
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to Velpic so that I can streamline the user management process and ensure that users have the appropriate access to Velpic.
---
 
# Configure Configuring Velpic for for automatic user provisioning with Microsoft Entra ID
 
The objective of this article is to show you the steps you need to perform in Velpic and Microsoft Entra ID to automatically provision and de-provision user accounts from Microsoft Entra ID to Velpic.
 
This section guides you through connecting your Microsoft Entra ID to Velpic's user account provisioning API, and configuring the provisioning service to create, update, and disable assigned user accounts in Velpic based on user and group assignment in Microsoft Entra ID.
 
> [!TIP]
> You may also choose to enabled SAML-based Single Sign-On for Velpic, following the instructions provided in the [Azure portal](https://portal.azure.com). Single sign-on can be configured independently of automatic provisioning, though these two features complement each other.
 
<a name='to-configure-automatic-user-account-provisioning-to-velpic-in-azure-ad'></a>
 
---
title: Configure Configuring Velpic for automatic user provisioning with Microsoft Entra ID
description: Learn how to configure Microsoft Entra ID to automatically provision and de-provision user accounts to Velpic.
author: zhchia
ms.topic: how-to
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to Velpic so that I can streamline the user management process and ensure that users have the appropriate access to Velpic.
---
 
# Configure Configuring Velpic for automatic user provisioning with Microsoft Entra ID
 
The objective of this article is to show you the steps you need to perform in Velpic and Microsoft Entra ID to automatically provision and de-provision user accounts from Microsoft Entra ID to Velpic.
 
This section guides you through connecting your Microsoft Entra ID to Velpic's user account provisioning API, and configuring the provisioning service to create, update, and disable assigned user accounts in Velpic based on user and group assignment in Microsoft Entra ID.
 
> [!TIP]
> You may also choose to enable SAML-based single sign-on for Velpic, following the instructions provided in the [Azure portal](https://portal.azure.com). Single sign-on can be configured independently of automatic provisioning, though these two features complement each other.
 
<a name='to-configure-automatic-user-account-provisioning-to-velpic-in-azure-ad'></a>
 
+0 / -4 lines changed
Commit: Remove guest billing section from licensing guide
Changes:
Before
After
> [!NOTE]
> These sign-in log filters are provided as guidance for identifying billable guest usage. Contact your Microsoft account team if you need detailed billing validation.
 
## Guest billing in multitenant organizations
 
Guest billing only applies for users with a `userType` of `Guest`. External users, as defined in the [Microsoft Product Terms](https://www.microsoft.com/licensing/news/update-to-external-users-2024), should be labeled with a `userType` of `Guest` in Microsoft Entra ID. If licensed member users are brought into other organization tenants with a `userType` of `Member`, they don't accrue to the billing meter. If these users are brought in with a `userType` of `Guest`, they accrue to the meter. However, you can avoid being charged by setting up or joining a multitenant organization. If the guest user is from a participating organizational tenant, the guest doesn't accrue to the billing meter. For more information, see [Set up a multitenant org in Microsoft 365](/microsoft-365/enterprise/set-up-multi-tenant-org).
 
## Link your tenant to a subscription
 
Your tenants must be linked to an Azure subscription for proper billing and access to features. For steps to link your tenant to a subscription and troubleshoot subscription issues, see [Link a workforce tenant to a subscription](~/external-id/external-identities-pricing.md#link-your-azure-ad-tenant-to-a-subscription).
> [!NOTE]
> These sign-in log filters are provided as guidance for identifying billable guest usage. Contact your Microsoft account team if you need detailed billing validation.
 
## Link your tenant to a subscription
 
Your tenants must be linked to an Azure subscription for proper billing and access to features. For steps to link your tenant to a subscription and troubleshoot subscription issues, see [Link a workforce tenant to a subscription](~/external-id/external-identities-pricing.md#link-your-azure-ad-tenant-to-a-subscription).
 
 
 
 
Modified by Colin Cooper on Apr 10, 2026 10:29 AM
📖 View on learn.microsoft.com
+2 / -2 lines changed
Commit: Update ideo-provisioning-tutorial.md
Changes:
Before
After
ms.date: 04/07/2026
ms.author: jeedes
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to Ideo so that I can streamline the user management process and ensure that users have the appropriate access to Ideo.
---
 
# Configure IDEO for automatic user provisioning with Microsoft Entra ID
|name.givenName|String|
|name.familyName|String|
1. Review the group attributes that are synchronized from Microsoft Entra ID to ideo in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the groups in IDEO for update operations. Select the **Save** button to commit any changes.
 
|Attribute|Type|
|---|---|
ms.date: 04/07/2026
ms.author: jeedes
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to IDEO so that I can streamline the user management process and ensure that users have the appropriate access to IDEO.
---
 
# Configure IDEO for automatic user provisioning with Microsoft Entra ID
|name.givenName|String|
|name.familyName|String|
1. Review the group attributes that are synchronized from Microsoft Entra ID to IDEO in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the groups in IDEO for update operations. Select the **Save** button to commit any changes.
 
|Attribute|Type|
|---|---|
Modified by Carolyn McSharry on Apr 10, 2026 10:00 AM
📖 View on learn.microsoft.com
+2 / -2 lines changed
Commit: Fix typos in Vonage provisioning tutorial
Changes:
Before
After
 
## Step 2: Configure Vonage to support provisioning with Microsoft Entra ID
 
1. Login to [Vonage admin portal](http://admin.vonage.com) with an admin user.
 
![Screenshot of Log in to vonage admin portal.](media/vonage-provisioning-tutorial/log-in.png)
 
 
![Screenshot of Provisioning tab user.](media/vonage-provisioning-tutorial/account-super-user.png)
 
1. In the **Admin Credentials** section, select Authorize , make sure that you enter your Account Super User credentials, if it doesn't ask you to enter credentials make sure that you logged in with the Account Super User (you can check it http://admin.vonage.com/ on the upper left side, bellow your name you need to see "Account Super User"). Select **Test Connection** to ensure Microsoft Entra ID can connect to Vonage. If the connection fails , ensure your Vonage account has Admin permissions and try again.
 
![Screenshot of Token.](media/vonage-provisioning-tutorial/authorize.png)
 
 
## Step 2: Configure Vonage to support provisioning with Microsoft Entra ID
 
1. Log in to [Vonage admin portal](http://admin.vonage.com) with an admin user.
 
![Screenshot of Log in to vonage admin portal.](media/vonage-provisioning-tutorial/log-in.png)
 
 
![Screenshot of Provisioning tab user.](media/vonage-provisioning-tutorial/account-super-user.png)
 
1. In the **Admin Credentials** section, select Authorize, make sure that you enter your Account Super User credentials, if it doesn't ask you to enter credentials make sure that you logged in with the Account Super User (you can check it http://admin.vonage.com/ on the upper left side, bellow your name you need to see "Account Super User"). Select **Test Connection** to ensure Microsoft Entra ID can connect to Vonage. If the connection fails, ensure your Vonage account has Admin permissions and try again.
 
![Screenshot of Token.](media/vonage-provisioning-tutorial/authorize.png)
 
Modified by Carolyn McSharry on Apr 10, 2026 9:49 AM
📖 View on learn.microsoft.com
+2 / -2 lines changed
Commit: Update unifi-provisioning-tutorial.md
Changes:
Before
After
 
![Screenshot of Enterprise Application SSO View.](media/unifi-provisioning-tutorial/enterprise-application-view.png)
 
1. If your identity provider isn't added to UNIFI , then login to UNIFI Portal as a **Company Admin**. Navigate to **Users -> Configure SSO -> add provider** button.
 
![Screenshot of Add Identity Provider View.](media/unifi-provisioning-tutorial/add-identity-provider-view.png)
 
 
![Screenshot of New configuration.](common/application-provisioning.png)
 
1. In the **Admin Credentials** section, enter your UNIFI **Tenant URL** -`https://licensing.inviewlabs.com/api/scim/v2/` and **Secret Token**. Select **Test Connection** to ensure Microsoft Entra ID can connect to UNIFI. If the connection fails , ensure your UNIFI account has Admin permissions and try again.
 
![Screenshot of Provisioning test connection.](common/provisioning-test-connection.png)
 
 
![Screenshot of Enterprise Application SSO View.](media/unifi-provisioning-tutorial/enterprise-application-view.png)
 
1. If your identity provider isn't added to UNIFI, then login to UNIFI Portal as a **Company Admin**. Navigate to **Users -> Configure SSO -> add provider** button.
 
![Screenshot of Add Identity Provider View.](media/unifi-provisioning-tutorial/add-identity-provider-view.png)
 
 
![Screenshot of New configuration.](common/application-provisioning.png)
 
1. In the **Admin Credentials** section, enter your UNIFI **Tenant URL** -`https://licensing.inviewlabs.com/api/scim/v2/` and **Secret Token**. Select **Test Connection** to ensure Microsoft Entra ID can connect to UNIFI. If the connection fails, ensure your UNIFI account has Admin permissions and try again.
 
![Screenshot of Provisioning test connection.](common/provisioning-test-connection.png)
 
+1 / -1 lines changed
Commit: Correct example formatting in TLS inspection doc
Changes:
Before
After
> 1. Client sees a certificate signed by your enterprise CA.
> 1. If allowed by policy, SSE forwards the traffic to the original destination server.
>
> > ```Example:
> User → GSA Client → SSE Proxy → Destination Server
> │
> [TLS Terminated]
> 1. Client sees a certificate signed by your enterprise CA.
> 1. If allowed by policy, SSE forwards the traffic to the original destination server.
>
> ```Example:
> User → GSA Client → SSE Proxy → Destination Server
> │
> [TLS Terminated]
Modified by Colin Cooper on Apr 10, 2026 10:24 AM
📖 View on learn.microsoft.com
+1 / -1 lines changed
Commit: Update h5mag-provisioning-tutorial.md
Changes:
Before
After
 
1. Select the **Save** button to store the generated token.
 
1. If you want to redirect your users to use Microsoft login page when they attempt to log in using H5mag's own system, you can set a SSO redirect on this page as well by selecting **Microsoft 365 / Microsoft Entra ID** in the SSO Provider options.
 
<a name='step-3-add-h5mag-from-the-azure-ad-application-gallery'></a>
 
 
1. Select the **Save** button to store the generated token.
 
1. If you want to redirect your users to use Microsoft login page when they attempt to log in using H5mag's own system, you can set an SSO redirect on this page as well by selecting **Microsoft 365 / Microsoft Entra ID** in the SSO Provider options.
 
<a name='step-3-add-h5mag-from-the-azure-ad-application-gallery'></a>
 
Modified by Colin Cooper on Apr 10, 2026 10:20 AM
📖 View on learn.microsoft.com
+1 / -1 lines changed
Commit: Update gtmhub-provisioning-tutorial.md
Changes:
Before
After
This article describes the steps you need to perform in both Gtmhub and Microsoft Entra ID to configure automatic user provisioning. When configured, Microsoft Entra ID automatically provisions and de-provisions users and groups to [Gtmhub](https://www.gtmhub.com/) using the Microsoft Entra provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Microsoft Entra ID](~/identity/app-provisioning/user-provisioning.md).
 
>[!NOTE]
>Currently, when automatic user provisioning is configured, Microsoft Entra-only automatically de-provisions users and groups to Gtmhub and map users to their respective teams using the Microsoft Entra provisioning service.But in 2021 once SSO is enabled with Gtmhub,users are automatically provisioned when they log in through SSO and is assigned to their respective team.
 
 
## Capabilities Supported
This article describes the steps you need to perform in both Gtmhub and Microsoft Entra ID to configure automatic user provisioning. When configured, Microsoft Entra ID automatically provisions and de-provisions users and groups to [Gtmhub](https://www.gtmhub.com/) using the Microsoft Entra provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Microsoft Entra ID](~/identity/app-provisioning/user-provisioning.md).
 
>[!NOTE]
>Currently, when automatic user provisioning is configured, Microsoft Entra-only automatically de-provisions users and groups to Gtmhub and map users to their respective teams using the Microsoft Entra provisioning service. But in 2021 once SSO is enabled with Gtmhub, users are automatically provisioned when they log in through SSO and is assigned to their respective team.
 
 
## Capabilities Supported