πŸ“‹ Microsoft Entra Documentation Changes

Daily summary for changes since April 14th 2026, 9:57 PM PDT

Report generated on April 15th 2026, 9:57 PM PDT

πŸ“Š Summary

20
Total Commits
0
New Files
12
Modified Files
0
Deleted Files
11
Contributors

πŸ“ Modified Documentation Files

Modified by Ken Withee on Apr 15, 2026 7:12 PM
πŸ“– View on learn.microsoft.com
+24 / -12 lines changed
Commit: Update license usage insights article with new UI features
Changes:
Before
After
title: Microsoft Entra license usage insights
description: Learn how to use the license usage insights page in the Microsoft Entra admin center to monitor license usage and entitlements.
ms.topic: concept-article
ms.date: 03/11/2026
ms.reviewer: jadedsouza
ai-usage: ai-assisted
#Customer Intent: As an IT admin, I want to understand license usage insights so that I can monitor and optimize license allocation in my organization.
 
## License entitlements
 
The license entitlements section shows how many licenses you've purchased for the current month. Entitlements are calculated by looking at all Microsoft Entra products you've purchased, including:
 
- Microsoft Entra ID P1
- Microsoft Entra ID P2
The entitlement count reflects the total number of licenses across all products that include each tier of Microsoft Entra ID functionality.
 
 
## Feature usage metrics
 
The license usage insights page uses a single representative metric (hero metric) for each license tier to measure usage. This approach simplifies the view by focusing on the most meaningful indicator of paid feature adoption.
title: Microsoft Entra license usage insights
description: Learn how to use the license usage insights page in the Microsoft Entra admin center to monitor license usage and entitlements.
ms.topic: concept-article
ms.date: 04/15/2026
ms.reviewer: jadedsouza
ai-usage: ai-assisted
#Customer Intent: As an IT admin, I want to understand license usage insights so that I can monitor and optimize license allocation in my organization.
 
## License entitlements
 
The license entitlements section shows how many licenses you've purchased for the current month. Amounts for other months might change based on license agreement renewals, non-renewals, or additional purchases. Entitlements are calculated by looking at all Microsoft Entra products you've purchased, including:
 
- Microsoft Entra ID P1
- Microsoft Entra ID P2
The entitlement count reflects the total number of licenses across all products that include each tier of Microsoft Entra ID functionality.
 
 
## Product usage insights
 
The **Product usage insights** section helps you monitor license usage to maximize your Microsoft Entra plan. Data shows last month's feature usage based on your entitled licenses and might take up to three days to update.
+2 / -2 lines changed
Commit: Fix capitalization and enhance ISV guidance on certificates
Changes:
Before
After
You receive the notification email from azure-noreply@microsoft.com. To avoid the email going to your spam location, add this email to your contacts.
 
> [!NOTE]
> If notification email address configuration is completed programmatically using Microsoft Graph or PowerShell, administrators should open the Single Sign-On blade for the application in the Microsoft Entra admin center to ensure expiration notifications are enabled.
> Failure to initialize SAML settings in the admin center may result in certificate expiration notification emails not being sent."
 
 
If your app lacks certificate expiration validation and the certificate matches both Microsoft Entra ID and your app, it remains accessible. This condition is true even if the certificate is expired. Ensure your application can validate certificate expiration.
 
## Guidance and best practices for ISVs on rotating certificates
This section will outline best practices independent software vendors (ISV’s) can adopt to enable automated certificate rollover when SAML certificates are near expiry and when applications federated with Microsoft Entra ID. SAML certificates in Entra ID are used for signing assertions in federated single sign-on (SSO). These certificates expire (typically every 1-3 years) and rotation requires a Customer and SaaS ISV coordination to update a mutual certificate in both systems without downtime. Industry trends are shortening certificate lifetimes, manual rollover processes increasingly create operational burden and risk service disruption β€” especially in large organizations with many SAML enterprise applications.
 
At a high level, the recommended rollover model relies on customers generating (or uploading) a new signing certificate in Microsoft Entra ID, and the SAML application automatically discovering it via the application’s federation metadata endpoint. The application should download metadata on a regular cadence, add newly discovered certificates as a secondary signing certificate while the new key is still inactive, and then seamlessly promote it to primary after the customer activates it in Microsoft Entra ID. Once the new certificate is in use, the old certificate can be safely removed from both Microsoft Entra ID and the application, completing the rotation without downtime.
 
You receive the notification email from azure-noreply@microsoft.com. To avoid the email going to your spam location, add this email to your contacts.
 
> [!NOTE]
> If notification email address configuration is completed programmatically using Microsoft Graph or PowerShell, administrators should open the single sign-on blade for the application in the Microsoft Entra admin center to ensure expiration notifications are enabled.
> Failure to initialize SAML settings in the admin center may result in certificate expiration notification emails not being sent."
 
 
If your app lacks certificate expiration validation and the certificate matches both Microsoft Entra ID and your app, it remains accessible. This condition is true even if the certificate is expired. Ensure your application can validate certificate expiration.
 
## Guidance and best practices for ISVs on rotating certificates
This section will outline best practices independent software vendors (ISVs) can adopt to enable automated certificate rollover when SAML certificates are near expiry and when applications federated with Microsoft Entra ID. SAML certificates in Entra ID are used for signing assertions in federated single sign-on (SSO). These certificates expire (typically every 1-3 years) and rotation requires a Customer and SaaS ISV coordination to update a mutual certificate in both systems without downtime. Industry trends are shortening certificate lifetimes, manual rollover processes increasingly create operational burden and risk service disruption β€” especially in large organizations with many SAML enterprise applications.
 
At a high level, the recommended rollover model relies on customers generating (or uploading) a new signing certificate in Microsoft Entra ID, and the SAML application automatically discovering it via the application’s federation metadata endpoint. The application should download metadata on a regular cadence, add newly discovered certificates as a secondary signing certificate while the new key is still inactive, and then seamlessly promote it to primary after the customer activates it in Microsoft Entra ID. Once the new certificate is in use, the old certificate can be safely removed from both Microsoft Entra ID and the application, completing the rotation without downtime.
 
+1 / -1 lines changed
Commit: Update ms.date to 04/15/2026 on all changed files
Changes:
Before
After
description: Learn how remote network connectivity in Global Secure Access allows users to connect to your corporate network from a remote location, such as a branch office.
ms.topic: concept-article
ms.reviewer: abhijeetsinha
ms.date: 04/06/2026
ai-usage: ai-assisted
---
 
description: Learn how remote network connectivity in Global Secure Access allows users to connect to your corporate network from a remote location, such as a branch office.
ms.topic: concept-article
ms.reviewer: abhijeetsinha
ms.date: 04/15/2026
ai-usage: ai-assisted
---
 
+1 / -1 lines changed
Commit: Update ms.date to 04/15/2026 on all changed files
Changes:
Before
After
description: "Assign remote networks to traffic forwarding profiles through the Microsoft Entra admin center or Microsoft Graph API to route branch office traffic through Global Secure Access."
ms.topic: how-to
ms.reviewer: abhijeetsinha
ms.date: 04/06/2026
ai-usage: ai-assisted
---
# Assign a remote network to a traffic forwarding profile for Global Secure Access
description: "Assign remote networks to traffic forwarding profiles through the Microsoft Entra admin center or Microsoft Graph API to route branch office traffic through Global Secure Access."
ms.topic: how-to
ms.reviewer: abhijeetsinha
ms.date: 04/15/2026
ai-usage: ai-assisted
---
# Assign a remote network to a traffic forwarding profile for Global Secure Access
+1 / -1 lines changed
Commit: Update ms.date to 04/15/2026 on all changed files
Changes:
Before
After
title: Simulate remote network connectivity using Azure vWAN
description: Use Global Secure Access to configure Azure and Microsoft Entra resources to create a virtual wide area network to connect to your resources in Azure.
ms.topic: how-to
ms.date: 04/06/2026
ms.author: jayrusso
author: HULKsmashGithub
ms.reviewer: abhijeetsinha
title: Simulate remote network connectivity using Azure vWAN
description: Use Global Secure Access to configure Azure and Microsoft Entra resources to create a virtual wide area network to connect to your resources in Azure.
ms.topic: how-to
ms.date: 04/15/2026
ms.author: jayrusso
author: HULKsmashGithub
ms.reviewer: abhijeetsinha
+1 / -1 lines changed
Commit: Update ms.date to 04/15/2026 on all changed files
Changes:
Before
After
ms.author: jayrusso
author: HULKsmashGithub
ms.topic: how-to
ms.date: 04/06/2026
ms.reviewer: abhijeetsinha
ms.custom: sfi-image-nochange
# Customer intent: As an IT admin, I need to be able to create a remote network for a remote office so that my organization can connect to the Global Secure Access service.
ms.author: jayrusso
author: HULKsmashGithub
ms.topic: how-to
ms.date: 04/15/2026
ms.reviewer: abhijeetsinha
ms.custom: sfi-image-nochange
# Customer intent: As an IT admin, I need to be able to create a remote network for a remote office so that my organization can connect to the Global Secure Access service.
+1 / -1 lines changed
Commit: Update ms.date to 04/15/2026 on all changed files
Changes:
Before
After
title: Simulate remote network connectivity using Azure VNG
description: Configure Azure resources to simulate remote network connectivity to Microsoft's Security Edge Solutions with Global Secure Access.
ms.topic: how-to
ms.date: 04/06/2026
ms.reviewer: abhijeetsinha
ai-usage: ai-assisted
ms.custom: sfi-image-nochange
title: Simulate remote network connectivity using Azure VNG
description: Configure Azure resources to simulate remote network connectivity to Microsoft's Security Edge Solutions with Global Secure Access.
ms.topic: how-to
ms.date: 04/15/2026
ms.reviewer: abhijeetsinha
ai-usage: ai-assisted
ms.custom: sfi-image-nochange
+1 / -1 lines changed
Commit: Update ms.date to 04/15/2026 on all changed files
Changes:
Before
After
title: What is Global Secure Access?
description: Learn how Microsoft's Security Service Edge (SSE) solution, Global Secure Access, provides network access control and visibility to users and devices inside and outside a traditional office.
ms.topic: overview
ms.date: 04/06/2026
ms.custom: references_regions
ai-usage: ai-assisted
 
title: What is Global Secure Access?
description: Learn how Microsoft's Security Service Edge (SSE) solution, Global Secure Access, provides network access control and visibility to users and devices inside and outside a traditional office.
ms.topic: overview
ms.date: 04/15/2026
ms.custom: references_regions
ai-usage: ai-assisted
 
+1 / -1 lines changed
Commit: Update ms.date to 04/15/2026 on all changed files
Changes:
Before
After
author: HULKsmashGithub
ms.topic: reference
ms.author: jayrusso
ms.date: 04/01/2026
ms.custom: agent-id-ignite
 
 
author: HULKsmashGithub
ms.topic: reference
ms.author: jayrusso
ms.date: 04/15/2026
ms.custom: agent-id-ignite
 
 
+1 / -1 lines changed
Commit: Update ms.date to 04/15/2026 on all changed files
Changes:
Before
After
manager: dougeby
ms.service: global-secure-access
ms.topic: include
ms.date: 04/06/2026
ms.custom: include file
 
---
manager: dougeby
ms.service: global-secure-access
ms.topic: include
ms.date: 04/15/2026
ms.custom: include file
 
---
+1 / -1 lines changed
Commit: Update ms.date to 04/15/2026 on all changed files
Changes:
Before
After
manager: dougeby
ms.service: global-secure-access
ms.topic: include
ms.date: 04/06/2026
ms.custom: include file
 
---
manager: dougeby
ms.service: global-secure-access
ms.topic: include
ms.date: 04/15/2026
ms.custom: include file
 
---
Modified by owinfreyATL on Apr 15, 2026 2:56 PM
πŸ“– View on learn.microsoft.com
+1 / -1 lines changed
Commit: Update Whats New date
Changes:
Before
After
- clicktale
ms.assetid: 06a149f7-4aa1-4fb9-a8ec-ac2633b031fb
ms.topic: reference
ms.date: 04/01/2026
ms.author: owinfrey
ms.reviewer: dhanyahk
ms.custom: it-pro, has-azure-ad-ps-ref, sfi-ga-nochange
- clicktale
ms.assetid: 06a149f7-4aa1-4fb9-a8ec-ac2633b031fb
ms.topic: reference
ms.date: 04/15/2026
ms.author: owinfrey
ms.reviewer: dhanyahk
ms.custom: it-pro, has-azure-ad-ps-ref, sfi-ga-nochange