📋 Microsoft Entra Documentation Changes

Daily summary for changes since May 10th 2026, 10:45 PM PDT

Report generated on May 11th 2026, 10:45 PM PDT

📊 Summary

12
Total Commits
0
New Files
5
Modified Files
0
Deleted Files
7
Contributors

📝 Modified Documentation Files

Modified by Ken Withee on May 11, 2026 2:29 PM
📖 View on learn.microsoft.com
+4 / -6 lines changed
Commit: Don't require advanced query parameters in unfiltered list-users custom security attributes example
Changes:
Before
After
---
title: Assign, update, list, or remove custom security attributes for a user
description: Assign, update, list, or remove custom security attributes for a user in Microsoft Entra ID.
ms.date: 04/27/2026
ms.topic: how-to
ms.custom: it-pro, no-azure-ad-ps-ref, sfi-image-nochange
ai-usage: ai-assisted
 
### List all users and any custom security attribute assignments
 
The following example lists all users and any custom security attribute assignments. You must add `ConsistencyLevel=eventual` in the request or the header. You must also include `$count=true` to ensure the request is routed correctly.
 
# [PowerShell](#tab/ms-powershell)
 
[Get-MgUser](/powershell/module/microsoft.graph.users/get-mguser)
 
```powershell
$userAttributes = Get-MgUser -All -CountVariable CountVar -Property "id,displayName,customSecurityAttributes" -ConsistencyLevel eventual
$userAttributes | select Id,DisplayName,CustomSecurityAttributes
$userAttributes.CustomSecurityAttributes.AdditionalProperties | Format-List
---
title: Assign, update, list, or remove custom security attributes for a user
description: Assign, update, list, or remove custom security attributes for a user in Microsoft Entra ID.
ms.date: 05/11/2026
ms.topic: how-to
ms.custom: it-pro, no-azure-ad-ps-ref, sfi-image-nochange
ai-usage: ai-assisted
 
### List all users and any custom security attribute assignments
 
The following example lists all users and any custom security attribute assignments. Because this example uses only `$select` (no `$filter`, `$search`, `$count`, or `$orderby`), advanced query parameters aren't required. The List examples later in this article that use `$filter` on `customSecurityAttributes` do require `ConsistencyLevel=eventual` and `$count=true`. For more information, see [Advanced query capabilities on directory objects](/graph/aad-advanced-queries).
 
# [PowerShell](#tab/ms-powershell)
 
[Get-MgUser](/powershell/module/microsoft.graph.users/get-mguser)
 
```powershell
$userAttributes = Get-MgUser -All -Property "id,displayName,customSecurityAttributes"
$userAttributes | select Id,DisplayName,CustomSecurityAttributes
$userAttributes.CustomSecurityAttributes.AdditionalProperties | Format-List
Modified by cagautham on May 11, 2026 10:20 AM
📖 View on learn.microsoft.com
+1 / -1 lines changed
Commit: Update EnableGSA key description in iOS client guide
Changes:
Before
After
 
|Key |Value |Details |
|---------|---------|---------|
|`EnableGSA` |No value | Global Secure Access isn't enabled and the tile isn't visible. |
| |`0` | Global Secure Access isn't enabled and the tile isn't visible.|
| |`1` | Global Secure Access tile is visible and defaults to a disabled state. The user can enable or disable the tile by using the toggle.|
| |`2` | Global Secure Access tile is visible and defaults to an enabled state. The user can enable or disable the tile by using the toggle from the app. |
 
|Key |Value |Details |
|---------|---------|---------|
|`EnableGSA` |No value | Global Secure Access defaults to value 1 behavior. |
| |`0` | Global Secure Access isn't enabled and the tile isn't visible.|
| |`1` | Global Secure Access tile is visible and defaults to a disabled state. The user can enable or disable the tile by using the toggle.|
| |`2` | Global Secure Access tile is visible and defaults to an enabled state. The user can enable or disable the tile by using the toggle from the app. |
+1 / -1 lines changed
Commit: Update Global Secure Access configuration details
Changes:
Before
After
 
| Configuration key | Value | Details |
|----------------------------------|----------|-----------|
| `Global Secure Access` | No value | Global Secure Access isn't enabled and the tile isn't visible. |
| | `0` | Global Secure Access isn't enabled and the tile isn't visible. |
| | `1` | The tile is visible and defaults to `false` (disabled state). The user can enable or disable Global Secure Access by using the toggle in the app. |
| | `2` | The tile is visible and defaults to `true` (enabled state). The user can override Global Secure Access. The user can enable or disable Global Secure Access by using the toggle in the app. |
 
| Configuration key | Value | Details |
|----------------------------------|----------|-----------|
| `Global Secure Access` | No value | Global Secure Access defaults to value 1 behavior. |
| | `0` | Global Secure Access isn't enabled and the tile isn't visible. |
| | `1` | The tile is visible and defaults to `false` (disabled state). The user can enable or disable Global Secure Access by using the toggle in the app. |
| | `2` | The tile is visible and defaults to `true` (enabled state). The user can override Global Secure Access. The user can enable or disable Global Secure Access by using the toggle in the app. |
Modified by Carolyn McSharry on May 11, 2026 9:56 AM
📖 View on learn.microsoft.com
+1 / -1 lines changed
Commit: Fix duplicate words in provisioning tutorial title
Changes:
Before
After
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to Atlassian Cloud so that I can streamline the user management process and ensure that users have the appropriate access to Atlassian Cloud.
---
 
# Configure Configure Atlassian Cloud for for automatic user provisioning with Microsoft Entra ID
 
This article describes the steps you need to perform in both Atlassian Cloud and Microsoft Entra ID to configure automatic user provisioning. When configured, Microsoft Entra ID automatically provisions and de-provisions users and groups to [Atlassian Cloud](https://www.atlassian.com/cloud) using the Microsoft Entra provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Microsoft Entra ID](~/identity/app-provisioning/user-provisioning.md).
 
# Customer intent: As an IT administrator, I want to learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to Atlassian Cloud so that I can streamline the user management process and ensure that users have the appropriate access to Atlassian Cloud.
---
 
# Configure Atlassian Cloud for automatic user provisioning with Microsoft Entra ID
 
This article describes the steps you need to perform in both Atlassian Cloud and Microsoft Entra ID to configure automatic user provisioning. When configured, Microsoft Entra ID automatically provisions and de-provisions users and groups to [Atlassian Cloud](https://www.atlassian.com/cloud) using the Microsoft Entra provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Microsoft Entra ID](~/identity/app-provisioning/user-provisioning.md).
 
Modified by Carolyn McSharry on May 11, 2026 9:52 AM
📖 View on learn.microsoft.com
+1 / -1 lines changed
Commit: Update askspoke-provisioning-tutorial.md
Changes:
Before
After
The scenario outlined in this article assumes that you already have the following prerequisites:
 
- [A Microsoft Entra tenant](~/identity-platform/quickstart-create-new-tenant.md)
- One of the following roles: [Application Administrator](/entra/identity/role-based-access-control/permissions-reference#application-administrator), [Cloud Application Administrator](/entra/identity/role-based-access-control/permissions-reference#cloud-application-administrator), or [Application Owner](/entra/fundamentals/users-default-permissions#owned-enterprise-applications)..
- A user account in askSpoke with admin permissions.
 
## Step 1: Plan your provisioning deployment
The scenario outlined in this article assumes that you already have the following prerequisites:
 
- [A Microsoft Entra tenant](~/identity-platform/quickstart-create-new-tenant.md)
- One of the following roles: [Application Administrator](/entra/identity/role-based-access-control/permissions-reference#application-administrator), [Cloud Application Administrator](/entra/identity/role-based-access-control/permissions-reference#cloud-application-administrator), or [Application Owner](/entra/fundamentals/users-default-permissions#owned-enterprise-applications).
- A user account in askSpoke with admin permissions.
 
## Step 1: Plan your provisioning deployment