📋 Microsoft Entra Documentation Changes

Daily summary for changes since January 25th 2026, 7:53 PM PST

Report generated on January 26th 2026, 7:53 PM PST

📊 Summary

22
Total Commits
0
New Files
129
Modified Files
0
Deleted Files
11
Contributors

📝 Modified Documentation Files

+3 / -7 lines changed
Commit: GA update.
Changes:
Before
After
---
title: Customize the sign-in experience for your application with branding themes in external tenants (Preview)
description: Learn about how to create branding themes and apply them to the sign-in experience for your application in Microsoft External ID for external tenants.
author: rolyon
manager: pmwongera
ms.author: rolyon
ms.date: 10/30/2025
ms.reviewer:
ms.service: identity-platform
ms.topic: how-to
 
---
 
# Customize the sign-in experience for your application with branding themes in external tenants (Preview)
 
[!INCLUDE [applies-to-external-only](../includes/applies-to-external-only.md)]
 
> [!IMPORTANT]
> Branding themes for applications are currently in PREVIEW.
> This information relates to a prerelease product that might be substantially modified before it's released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.
---
title: Customize the sign-in experience for your application with branding themes in external tenants
description: Learn about how to create branding themes and apply them to the sign-in experience for your application in Microsoft External ID for external tenants.
author: rolyon
manager: pmwongera
ms.author: rolyon
ms.date: 01/26/2026
ms.reviewer:
ms.service: identity-platform
ms.topic: how-to
 
---
 
# Customize the sign-in experience for your application with branding themes in external tenants
 
[!INCLUDE [applies-to-external-only](../includes/applies-to-external-only.md)]
 
You can create unique authentication experiences for applications in your tenant. Each application can have its own theme that you can customize with a background image or color, favicon, layout, header, and footer. This customization overrides any configurations made to the default branding. If you don't make any changes to the elements, the default elements are displayed.
 
This article describes how you can create multiple branding themes for different applications in your tenant.
+1 / -8 lines changed
Commit: Update date and remove outdated traffic log instructions
Changes:
Before
After
description: "Discover how to configure network content filtering with Global Secure Access to enforce data protection policies and secure sensitive files in real time."
ms.service: global-secure-access
ms.topic: how-to
ms.date: 11/07/2025
ms.author: jayrusso
author: HULKsmashGithub
manager: dougeby
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Reports Reader](/azure/active-directory/roles/permissions-reference#reports-reader).
1. Select **Global Secure Access** > **Monitor** > **Traffic logs**.
 
To show all traffic subject to Netskope inspection:
1. Go to the Transactions tab.
1. Select Add filter.
1. Search for or scroll to find the appropriate filter (for example, Action, policyName). 
1. Select Apply.
1. Check the filteringProfileName and policyName to identify the policies responsible for the applied action.
 
## Related content
 
- [Learn about Microsoft Purview Network Data Security](https://learn.microsoft.com/purview/dlp-network-data-security-learn)
description: "Discover how to configure network content filtering with Global Secure Access to enforce data protection policies and secure sensitive files in real time."
ms.service: global-secure-access
ms.topic: how-to
ms.date: 01/26/2026
ms.author: jayrusso
author: HULKsmashGithub
manager: dougeby
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Reports Reader](/azure/active-directory/roles/permissions-reference#reports-reader).
1. Select **Global Secure Access** > **Monitor** > **Traffic logs**.
 
## Related content
 
- [Learn about Microsoft Purview Network Data Security](https://learn.microsoft.com/purview/dlp-network-data-security-learn)
 
 
 
 
 
 
 
+5 / -3 lines changed
Commit: ca-update-012626
Changes:
Before
After
 
> [!NOTE]
> The Windows Azure Service Management API application applies to [Azure PowerShell](/powershell/azure/what-is-azure-powershell), which calls the [Azure Resource Manager API](/azure/azure-resource-manager/management/overview). It doesn't apply to [Microsoft Graph PowerShell](/powershell/microsoftgraph/overview), which calls the [Microsoft Graph API](/graph/overview).
 
> [!TIP]
> For Azure Government, you should target the Azure Government Cloud Management API application.
 
### Microsoft Admin Portals
 
We're continually adding more administrative portals to the list.
 
### Other applications
 
Admins can add any Microsoft Entra registered application to Conditional Access policies. These applications might include:
- Applications that use [password based single sign-on](~/identity/enterprise-apps/configure-password-single-sign-on-non-gallery-applications.md)
 
> [!NOTE]
> Since Conditional Access policy sets the requirements for accessing a service, you aren't able to apply it to a client (public/native) application. In other words, the policy isn't set directly on a client (public/native) application, but is applied when a client calls a service. For example, a policy set on SharePoint service applies to all clients calling SharePoint. A policy set on Exchange applies to the attempt to access the email using Outlook client. That is why client (public/native) applications aren't available for selection in the app picker and Conditional Access option isn't available in the application settings for the client (public/native) application registered in your tenant.
 
Some applications don't appear in the picker at all. The only way to include these applications in a Conditional Access policy is to include **All resources (formerly 'All cloud apps')** or add the missing service principal using the [New-MgServicePrincipal](/powershell/module/microsoft.graph.applications/new-mgserviceprincipal) PowerShell cmdlet or by using the [Microsoft Graph API](/graph/api/serviceprincipal-post-serviceprincipals).
 
> [!NOTE]
> The Windows Azure Service Management API application applies to [Azure PowerShell](/powershell/azure/what-is-azure-powershell), which calls the [Azure Resource Manager API](/azure/azure-resource-manager/management/overview). It doesn't apply to [Microsoft Graph PowerShell](/powershell/microsoftgraph/overview), which calls the [Microsoft Graph API](/graph/overview).
>
> For Azure Government, you should target the Azure Government Cloud Management API application.
 
### Microsoft Admin Portals
 
We're continually adding more administrative portals to the list.
 
> [!NOTE]
> Block policies that target the Microsoft Admin Portals will block end users from accessing the Microsoft 365 self-install page, as this page is currently located in the Microsoft 365 admin center. For information on alternative deployment options, see [Plan your enterprise deployment of Microsoft 365 Apps](/microsoft-365-apps/deploy/plan-microsoft-365-apps).
 
### Other applications
 
Admins can add any Microsoft Entra registered application to Conditional Access policies. These applications might include:
- Applications that use [password based single sign-on](~/identity/enterprise-apps/configure-password-single-sign-on-non-gallery-applications.md)
 
> [!NOTE]
> Because Conditional Access policy sets the requirements for accessing a service, you aren't able to apply it to a client (public/native) application. In other words, the policy isn't set directly on a client (public/native) application, but is applied when a client calls a service. For example, a policy set on SharePoint service applies to all clients calling SharePoint. A policy set on Exchange applies to the attempt to access the email using Outlook client. That is why client (public/native) applications aren't available for selection in the app picker and Conditional Access option isn't available in the application settings for the client (public/native) application registered in your tenant.
+2 / -2 lines changed
Commit: Updating titles
Changes:
Before
After
> [!NOTE]
> You can use other audit log event properties to differentiate between these flows.
 
You can use `ServicePrincipalProvisioningType` to separate Microsoft-driven provisioning (for example, `defaultMicrosoft`, `subscription`, `AzureResourceProvider`, `managerApplications`) from tenant-driven provisioning (for example, Other). Separating Microsoft-driven provisioning from tenant-driven provisioning helps you quickly decide whether a new service principal resulted from a Microsoft platform process or from admins, users, or custom apps in your tenant. See [View service principal details in audit log properties](howto-view-service-principal-details-in-audit-log-properties.md) for more information on creating detections for new service principals in your tenant.
 
### SubscribedSkus
 
This reduces the need to call Microsoft Graph separately to retrieve `appOwnerOrganizationId` for every new service principal creation event.
 
## Next steps
[View service principal details in audit log properties](howto-view-service-principal-details-in-audit-log-properties.md)
 
> [!NOTE]
> You can use other audit log event properties to differentiate between these flows.
 
You can use `ServicePrincipalProvisioningType` to separate Microsoft-driven provisioning (for example, `defaultMicrosoft`, `subscription`, `AzureResourceProvider`, `managerApplications`) from tenant-driven provisioning (for example, Other). Separating Microsoft-driven provisioning from tenant-driven provisioning helps you quickly decide whether a new service principal resulted from a Microsoft platform process or from admins, users, or custom apps in your tenant. See [View service principal details in audit log properties](howto-view-service-principal-creation-with-audit-log-properties.md) for more information on creating detections for new service principals in your tenant.
 
### SubscribedSkus
 
This reduces the need to call Microsoft Graph separately to retrieve `appOwnerOrganizationId` for every new service principal creation event.
 
## Next steps
[View service principal details in audit log properties](howto-view-service-principal-creation-with-audit-log-properties.md)
 
+3 / -1 lines changed
Commit: Add missing metadata to all RBAC include files
Changes:
Before
After
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 11/19/2025
ms.custom: include file, agent-id-ignite
---
 
[![Privileged label icon.](../media/permissions-reference/privileged-label.png)](../privileged-roles-permissions.md)
 
 
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 01/26/2026
ms.custom: include file, agent-id-ignite
author: FaithOmbongi
ms.author: ombongifaith
---
 
[![Privileged label icon.](../media/permissions-reference/privileged-label.png)](../privileged-roles-permissions.md)
Modified by Faith Moraa Ombongi on Jan 26, 2026 12:44 PM
📖 View on learn.microsoft.com
+3 / -1 lines changed
Commit: Add missing metadata to all RBAC include files
Changes:
Before
After
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 11/19/2025
ms.custom: include file, agent-id-ignite
---
 
Assign the Agent ID Developer role to users who need to do the following:
 
 
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 01/26/2026
ms.custom: include file, agent-id-ignite
author: FaithOmbongi
ms.author: ombongifaith
---
 
Assign the Agent ID Developer role to users who need to do the following:
+3 / -1 lines changed
Commit: Add missing metadata to all RBAC include files
Changes:
Before
After
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 11/19/2025
ms.custom: include file, agent-id-ignite
---
 
Assign the Agent Registry Administrator role to users who need to do the following tasks:
 
 
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 01/26/2026
ms.custom: include file, agent-id-ignite
author: FaithOmbongi
ms.author: ombongifaith
---
 
Assign the Agent Registry Administrator role to users who need to do the following tasks:
Modified by Faith Moraa Ombongi on Jan 26, 2026 12:44 PM
📖 View on learn.microsoft.com
+3 / -1 lines changed
Commit: Add missing metadata to all RBAC include files
Changes:
Before
After
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 01/20/2026
ms.custom: include file
---
 
Assign the AI Administrator role to users who need to do the following tasks:
 
 
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 01/26/2026
ms.custom: include file
author: FaithOmbongi
ms.author: ombongifaith
---
 
Assign the AI Administrator role to users who need to do the following tasks:
+3 / -1 lines changed
Commit: Add missing metadata to all RBAC include files
Changes:
Before
After
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 07/09/2025
ms.custom: include file
---
 
[![Privileged label icon.](../media/permissions-reference/privileged-label.png)](../privileged-roles-permissions.md)
 
 
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 01/26/2026
ms.custom: include file
author: FaithOmbongi
ms.author: ombongifaith
---
 
[![Privileged label icon.](../media/permissions-reference/privileged-label.png)](../privileged-roles-permissions.md)
+3 / -1 lines changed
Commit: Add missing metadata to all RBAC include files
Changes:
Before
After
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 07/09/2025
ms.custom: include file
---
 
[![Privileged label icon.](../media/permissions-reference/privileged-label.png)](../privileged-roles-permissions.md)
 
 
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 01/26/2026
ms.custom: include file
author: FaithOmbongi
ms.author: ombongifaith
---
 
[![Privileged label icon.](../media/permissions-reference/privileged-label.png)](../privileged-roles-permissions.md)
+3 / -1 lines changed
Commit: Add missing metadata to all RBAC include files
Changes:
Before
After
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 07/09/2025
ms.custom: include file
---
 
Users in this role can create attack payloads but not actually launch or schedule them. Attack payloads are then available to all administrators in the tenant who can use them to create a simulation. Access to reports is limited to simulations executed by the user, and this role doesn't grant access to aggregate reports such as Training efficacy, Repeat offenders, Training completion, or User coverage.
 
 
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 01/26/2026
ms.custom: include file
author: FaithOmbongi
ms.author: ombongifaith
---
 
Users in this role can create attack payloads but not actually launch or schedule them. Attack payloads are then available to all administrators in the tenant who can use them to create a simulation. Access to reports is limited to simulations executed by the user, and this role doesn't grant access to aggregate reports such as Training efficacy, Repeat offenders, Training completion, or User coverage.
+3 / -1 lines changed
Commit: Add missing metadata to all RBAC include files
Changes:
Before
After
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 07/09/2025
ms.custom: include file
---
 
Users in this role can create and manage all aspects of attack simulation creation, launch/scheduling of a simulation, and the review of simulation results. Members of this role have this access for all simulations in the tenant.
 
 
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 01/26/2026
ms.custom: include file
author: FaithOmbongi
ms.author: ombongifaith
---
 
Users in this role can create and manage all aspects of attack simulation creation, launch/scheduling of a simulation, and the review of simulation results. Members of this role have this access for all simulations in the tenant.
+3 / -1 lines changed
Commit: Add missing metadata to all RBAC include files
Changes:
Before
After
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 07/09/2025
ms.custom: include file
---
 
Users with this role can assign and remove custom security attribute keys and values for supported Microsoft Entra objects such as users, service principals, and devices.
 
 
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 01/26/2026
ms.custom: include file
author: FaithOmbongi
ms.author: ombongifaith
---
 
Users with this role can assign and remove custom security attribute keys and values for supported Microsoft Entra objects such as users, service principals, and devices.
+3 / -1 lines changed
Commit: Add missing metadata to all RBAC include files
Changes:
Before
After
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 07/09/2025
ms.custom: include file
---
 
Users with this role can read custom security attribute keys and values for supported Microsoft Entra objects.
 
 
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 01/26/2026
ms.custom: include file
author: FaithOmbongi
ms.author: ombongifaith
---
 
Users with this role can read custom security attribute keys and values for supported Microsoft Entra objects.
+3 / -1 lines changed
Commit: Add missing metadata to all RBAC include files
Changes:
Before
After
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 07/09/2025
ms.custom: include file
---
 
Users with this role can define a valid set of custom security attributes that can be assigned to supported Microsoft Entra objects. This role can also activate and deactivate custom security attributes.
 
 
ms.service: entra-id
ms.subservice: role-based-access-control
ms.topic: include
ms.date: 01/26/2026
ms.custom: include file
author: FaithOmbongi
ms.author: ombongifaith
---
 
Users with this role can define a valid set of custom security attributes that can be assigned to supported Microsoft Entra objects. This role can also activate and deactivate custom security attributes.