You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/id-governance/create-access-review-pim-for-groups.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,6 +33,9 @@ This article describes how to create one or more access reviews for PIM for Grou
33
33
34
34

35
35
36
+
1. On the Access reviews template screen, select **Review access to a resource type**.
37
+
:::image type="content" source="media/catalog-access-reviews/access-review-templates.png" alt-text="Screenshot of the access review templates page.":::
38
+
36
39
1. In the **Select what to review** box, select **Teams + Groups**.
37
40
38
41

Copy file name to clipboardExpand all lines: docs/id-governance/create-access-review.md
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,6 +28,7 @@ This article describes how to create one or more access reviews for group member
28
28
- To review access package assignments, see [configure an access review in entitlement management](entitlement-management-access-reviews-create.md).
29
29
- To review Azure resource or Microsoft Entra roles, see [Create an access review of Azure resource and Microsoft Entra roles in Privileged Identity Management](privileged-identity-management/pim-create-roles-and-resource-roles-review.md).
30
30
- For reviews of PIM for Groups, see [create an access review of PIM for Groups](create-access-review-pim-for-groups.md).
31
+
- For reviews across multiple groups, applications and custom data providers, see [catalog access reviews (preview)](catalog-access-reviews.md).
31
32
32
33
33
34
@@ -55,6 +56,9 @@ If you're reviewing access to an application, then before you create the review,
55
56
56
57

57
58
59
+
1. On the Access reviews template screen, select **Review access to a resource type**.
60
+
:::image type="content" source="media/catalog-access-reviews/access-review-templates.png" alt-text="Screenshot of the access review templates page.":::
61
+
58
62
4. In the **Select what to review** box, select which resource you want to review.
59
63
60
64

@@ -73,19 +77,19 @@ If you're reviewing access to an application, then before you create the review,
73
77
> [!NOTE]
74
78
> Selecting multiple groups or applications results in the creation of multiple access reviews. For example, if you select five groups to review, the result is five separate access reviews.
75
79
76
-
7. Now you can select a scope for the review. Your options are:
80
+
8. Now you can select a scope for the review. Your options are:
77
81
-**Guest users only**: This option limits the access review to only the Microsoft Entra B2B guest users in your directory.
78
82
-**Everyone**: This option scopes the access review to all user objects associated with the resource.
79
83
80
84
> [!NOTE]
81
85
> If you selected **All Microsoft 365 groups with guest users**, your only option is to review **Guest users only**.
82
86
83
-
8. Or if you're conducting group membership review, you can create access reviews for only the inactive users in the group. In the *Users scope* section, check the box next to **Inactive users (on tenant level)**. If you check the box, the scope of the review focuses on inactive users only, those who haven't signed in either interactively or non-interactively to the tenant. Then, specify **Days inactive** with many days inactive up to 730 days (two years). Users in the group inactive for the specified number of days are the only users in the review.
87
+
9. Or if you're conducting group membership review, you can create access reviews for only the inactive users in the group. In the *Users scope* section, check the box next to **Inactive users (on tenant level)**. If you check the box, the scope of the review focuses on inactive users only, those who haven't signed in either interactively or non-interactively to the tenant. Then, specify **Days inactive** with many days inactive up to 730 days (two years). Users in the group inactive for the specified number of days are the only users in the review.
84
88
85
89
> [!NOTE]
86
90
> Recently created users aren't affected when configuring the inactivity time. The Access Review checks if a user has been created in the time frame configured and disregard users who haven’t existed for at least that amount of time. For example, if you set the inactivity time as 90 days and a guest user was created or invited less than 90 days ago, the guest user won't be in scope of the Access Review. This ensures that a user can sign in at least once before being removed.
Copy file name to clipboardExpand all lines: docs/id-governance/delegate-approvals-my-access.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.date: 08/26/2025
15
15
Approval delegation in My Access allows approvers to assign another individual to respond to access package approval requests on their behalf. This feature helps maintain productivity when approvers are unavailable due to leave, travel, or other commitments.
16
16
17
17
> [!NOTE]
18
-
> This feature currently applies only to access package approvals and will be expanded to support access reviews in November 2025.
18
+
> This feature currently applies only to access package approvals and will be expanded to support access reviews.
19
19
20
20
## License requirements
21
21
@@ -25,9 +25,9 @@ Approval delegation in My Access allows approvers to assign another individual t
25
25
26
26
When an approver sets a delegate, the following happens:
27
27
28
-
- All approvals assigned after the delegation are routed to the delegate.
28
+
- All approvals explicitly assigned to an approver (not through a group) after delegation are routed to the specified delegate.
29
29
- The original approver can still respond to approvals during the delegation period.
30
-
- Delegations, prior to November 1 2025, are time-bound. After November 1, 2025, they can be time-bound or indefinite.
30
+
- Delegations can be time-bound or indefinite.
31
31
- Delegates are notified when they're assigned.
32
32
- Requestors are notified when their request is approved by a delegate.
33
33
- Delegation is always bulk; approvers can't delegate specific types of approvals.
@@ -50,6 +50,7 @@ When an approver sets a delegate, the following happens:
50
50
51
51
- Delegation is limited to one level. If User A delegates to User B, and User B delegates to User C, User C won't receive approvals from User A.
52
52
- Delegation isn't restricted. Any user can be selected as a delegate.
53
+
- Delegation only applies to approvals explicitly assigned to an approver, not those assigned through a group.
53
54
- Delegation applies only to approvals assigned after the delegation is configured.
Copy file name to clipboardExpand all lines: docs/identity/multi-tenant-organizations/multi-tenant-organization-known-issues.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ manager: dougeby
6
6
ms.service: entra-id
7
7
ms.subservice: multitenant-organizations
8
8
ms.topic: troubleshooting
9
-
ms.date: 07/05/2024
9
+
ms.date: 11/21/2025
10
10
ms.author: kenwith
11
11
ms.custom: it-pro
12
12
#Customer intent: As a dev, devops, or it admin, I want to
@@ -25,7 +25,7 @@ The limitations described in this article have the following scope.
25
25
| In scope | - Microsoft Entra administrator limitations related to multitenant organizations to support seamless collaboration experiences in new Microsoft Teams, with reciprocally provisioned B2B members<br/>- Microsoft Entra administrator limitations related to multitenant organizations to support seamless collaboration experiences in Microsoft Viva Engage, with centrally provisioned B2B members |
26
26
| Related scope | - Microsoft 365 admin center limitations related to multitenant organizations<br/>- Microsoft 365 multitenant organization people search experiences<br/>- Cross-tenant synchronization limitations related to Microsoft 365 |
27
27
| Out of scope | - Cross-tenant synchronization unrelated to Microsoft 365<br/>- End user experiences in Viva Engage<br/>- Tenant migration or consolidation |
28
-
| Unsupported scenarios | - Multitenant organizations across education tenants involving student scenarios<br/>- Multitenant organizations in Microsoft 365 Government<br/>- Seamless collaboration experience across multitenant organizations in classic Teams<br/>- Self-service for multitenant organizations larger than 100 tenants<br/>- Multitenant organizations in Azure Government or Microsoft Azure operated by 21Vianet<br/>- Cross-cloud multitenant organizations |
28
+
| Unsupported scenarios | - Multitenant organizations across education tenants involving student scenarios<br/>- Multitenant organizations in Microsoft 365 Government<br/>- Seamless collaboration experience across multitenant organizations in classic Teams<br/>- Self-service for multitenant organizations larger than 100 tenants<br/>- Multitenant organizations in Azure Government or Microsoft Azure operated by 21Vianet<br/>- Multitenant organizations is available within GCC, GCC-H, and DOD clouds. However, the multitenant organizations tenants can ONLY have tenants which are within the same cloud. Cross-cloud multitenant organizations isn't supported.|
29
29
30
30
## Create or join a multitenant organization using the Microsoft 365 admin center
31
31
@@ -113,7 +113,7 @@ The limitations described in this article have the following scope.
113
113
114
114
- In Microsoft 365 admin center, [Microsoft Forms](/office365/servicedescriptions/microsoft-forms-service-description), Microsoft OneNote, and Microsoft Planner, B2B member users might not be supported.
115
115
116
-
- In [Microsoft Power BI](/power-bi/enterprise/service-admin-azure-ad-b2b#who-can-you-invite), B2B member support is currently in preview. B2B guest users can continue to access Power BI dashboards.
116
+
- In [Microsoft Power BI](/fabric/enterprise/powerbi/service-admin-entra-b2b#who-can-you-invite), B2B member support is currently in preview. B2B guest users can continue to access Power BI dashboards.
117
117
118
118
- In [Microsoft Power Apps](/power-platform/), [Microsoft Dynamics 365](/dynamics365/), and related workloads, B2B member users might have restricted functionality. For more information, see [Invite users with Microsoft Entra B2B collaboration](/power-platform/admin/invite-users-azure-active-directory-b2b-collaboration).
119
119
@@ -137,6 +137,7 @@ The limitations described in this article have the following scope.
137
137
138
138
- Currently, [SkipOutOfScopeDeletions](../app-provisioning/skip-out-of-scope-deletions.md?toc=/entra/identity/multi-tenant-organizations/toc.json&pivots=cross-tenant-synchronization) works for application provisioning jobs, but not for cross-tenant synchronization. To avoid soft deletion of users taken out of scope of cross-tenant synchronization, set [Target Object Actions for Delete](cross-tenant-synchronization-configure.md#step-8-optional-define-who-is-in-scope-for-provisioning-with-scoping-filters) to disabled.
139
139
140
-
## Next steps
140
+
## Related content
141
141
142
142
-[Known issues for provisioning in Microsoft Entra ID](../app-provisioning/known-issues.md?toc=/entra/identity/multi-tenant-organizations/toc.json&pivots=cross-tenant-synchronization)
Copy file name to clipboardExpand all lines: docs/security-copilot/entra-agents.md
+12-6Lines changed: 12 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,6 +34,12 @@ Each agent works a little differently, but at their core, they first analyze you
34
34
35
35
Administrators can configure the agent to run automatically or trigger the agent to run manually.
36
36
37
+
Because each of the agents perform a specific set of tasks, they need a specific set of configurations to operate within the boundaries of that task. The administrator also needs certain Microsoft Entra roles to set up and manage the agent.
38
+
39
+
-**Agent identity**: A unique agent identity is created when the agent is turned on. Learn more about [agent identities](/entra/agent-id/identity-platform/what-is-agent-id).
40
+
-**Permissions**: The agent identity is granted specific read and write permissions needed to perform its tasks.
41
+
-**Role-based access**: The administrator needs specific roles to set up, manage, and use the agent.
42
+
37
43
## Available Microsoft Entra agents
38
44
39
45
The following agents are currently available for Microsoft Entra. Due to the fast pace at which these agents are released and updated, each agent might have features at various stages of availability. Preview features are added frequently.
@@ -44,7 +50,7 @@ Empower your reviewers to make fast and accurate access decisions. The [Access R
44
50
45
51
| Attribute | Description |
46
52
|---------------------|------------ |
47
-
| Identity |Uses [Microsoft Entra Agent ID](../agent-id/identity-professional/authorization-agent-id.md) for authorization. A unique agent identity is created when the agent is turned on. Learn more about [agent identities]().<br><br>The agent uses this identity to scan your tenant for active access reviews, gather additional insights, and save its recommendations and justifications for the reviewer. For more information, see: [How it works](access-review-agent.md#how-it-works).<br><br>Final decisions, submitted through the Microsoft Teams conversation, use the reviewer's identity. |
53
+
| Identity |A unique [agent identity](../agent-id/identity-professional/authorization-agent-id.md) for authorizationis created when the agent is turned on.<br><br>The agent uses this identity to scan your tenant for active access reviews, gather additional insights, and save its recommendations and justifications for the reviewer. For more information, see: [How it works](access-review-agent.md#how-it-works).<br><br>Final decisions, submitted through the Microsoft Teams conversation, use the reviewer's identity. |
48
54
| Licenses |[Microsoft Entra ID Governance or Microsoft Entra Suite](../id-governance/licensing-fundamentals.md)|
49
55
| Permissions | Get details for access reviews<br>Read details and lifecycle workflow history for users, groups, apps, and access packages. Save access review recommendations and justifications |
Identify, onboard, and monitor applications in your environment with the Application Lifecycle Management Agent. This agent uses application discovery capabilities of Microsoft Entra Internet Access and Microsoft Entra Private Access to find unmanaged applications, recommend onboarding actions, and monitor application security posture over time. This agent is currently being deployed and might not be available in all tenants.
63
+
The App Lifecycle Management Agent (Preview) helps you manage the full lifecycle of apps in Microsoft Entra, from discovery and onboarding to risk remediation and decommissioning. It correlates identity and network signals from Global Secure Access telemetry data to surface unmanaged private apps and Microsoft Entra application data. It provides clear, AI-driven recommendations to reduce app sprawl and enforce governance at scale. This agent is currently being deployed and might not be available in all tenants.
58
64
59
65
| Attribute | Description |
60
66
|---------------------|------------ |
61
-
| Identity |Uses [Microsoft Entra Agent ID](../agent-id/identity-professional/authorization-agent-id.md) for authorization. A unique agent identity is created when the agent is turned on that provides read-only permissions. Agent authentication will expire according to your policies and need to be renewed. |
62
-
| Licenses |[Microsoft Entra ID P2 or Workload Identity Premium P2](/entra/fundamentals/licensing) for **App Risk Remediation** suggestions and/or Microsoft Entra Suite or [Microsoft Entra Private Access](../global-secure-access/overview-what-is-global-secure-access.md#licensing-overview) licenses for **Application Discovery & Onboarding** suggestions |
67
+
| Identity |A unique [agent identity](../agent-id/identity-professional/authorization-agent-id.md) for authorizationis created when the agent is turned on.<br><br>The agent uses this identity to scan your tenant with specific **permissions**to review network logs and application data to provide insights and suggestions for application management. The agent identity includes **role-based access** used for any write actions, such as creating and disabling applications, dismissing suggestions, and sending emails or Teams notifications. |
68
+
| Licenses |[Microsoft Entra ID P2 or Workload Identity Premium P2](/entra/fundamentals/licensing) for **App Risk Remediation** suggestions and/or Microsoft Entra Suite or [Microsoft Entra Private Access](../global-secure-access/overview-what-is-global-secure-access.md#licensing-overview) licenses for **Application Discovery & Onboarding** suggestions |
63
69
| Permissions | Read access for Global Secure Access network logs.<br>Read access for users, applications, and service principals.<br>Read access for Microsoft Entra recommendations. |
| Role requirements|Use any of the following:<br>[Cloud Application Administrator](../identity/role-based-access-control/permissions-reference.md#cloud-application-administrator)<br>[Application Administrator](../identity/role-based-access-control/permissions-reference.md#application-administrator)<br>[Global Secure Access Administrator](../identity/role-based-access-control/permissions-reference.md#global-secure-access-administrator)<br>[Security Administrator](../identity/role-based-access-control/permissions-reference.md#security-administrator)|
72
+
| Role-based access|Set up the agent and manage the agent:<br>[Cloud Application Administrator](../identity/role-based-access-control/permissions-reference.md#cloud-application-administrator)<br>[Application Administrator](../identity/role-based-access-control/permissions-reference.md#application-administrator)<br>[Global Secure Access Administrator](../identity/role-based-access-control/permissions-reference.md#global-secure-access-administrator)<br>[Security Administrator](../identity/role-based-access-control/permissions-reference.md#security-administrator)<br> View the output suggestions from the agent:<br>[Reports Reader](../identity/role-based-access-control/permissions-reference.md#reports-reader)<br>[Security Reader](../identity/role-based-access-control/permissions-reference.md#security-reader)<br>[Globl Reader](../identity/role-based-access-control/permissions-reference.md#global-reader)|
67
73
68
74
### Conditional Access Optimization Agent
69
75
70
76
The [Conditional Access Optimization Agent](./conditional-access-agent-optimization.md) ensures comprehensive user protection by analyzing your Conditional Access policies and recommending improvements. The agent evaluates your current policy configuration against Microsoft best practices and Zero Trust principles.
71
77
72
78
| Attribute | Description |
73
79
|---------------------|------------ |
74
-
| Identity |Uses [Microsoft Entra Agent ID](../agent-id/identity-professional/authorization-agent-id.md) for authorization |
80
+
| Identity |A unique [agent identity](../agent-id/identity-professional/authorization-agent-id.md) for authorization is created when the agent is turned on.<br><br>The agent uses this identity to scan your tenant's Conditional Access policies and configurations for gaps, overlap, and misconfigurations.|
75
81
| Licenses |[Microsoft Entra ID P1](../fundamentals/licensing.md)|
76
82
| Permissions | Review policy configuration<br>Create new policies in report-only mode<br>Suggest policy changes requiring approval |
0 commit comments