πŸ“‹ Microsoft Entra Documentation Changes

Daily summary for changes since February 16th 2026, 8:27 PM PST

Report generated on February 17th 2026, 8:27 PM PST

πŸ“Š Summary

50
Total Commits
0
New Files
29
Modified Files
0
Deleted Files
14
Contributors

πŸ“ Modified Documentation Files

+22 / -22 lines changed
Commit: Fixes build issues.
Changes:
Before
After
 
| Restriction name | Description | Security value | Availability |
| :-------------------------- | :---------------------------------------------------------------------- | :-------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------- |
| asymmetricKeyLifetime | Enforce a max lifetime range for an asymmetric key (certificate). | Reduces security risk from long-lived credentials | Can be configured through [app management policy APIs](https://learn.microsoft.com/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta) and the [Microsoft Entra admin center](https://aka.ms/app-mgmt-policy-ux). Referred to as `Restrict max certificate lifetime` in the Microsoft Entra admin center. |
| audiences | Restricts creation or promotion of apps based on signInAudience values. | Prevents unsanctioned multitenant or consumer-facing applications | Can be configured through [app management policy APIs](https://learn.microsoft.com/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta) |
| customPasswordAddition | Restrict a custom password secret on application or service principal. | Prevents new user-provided app passwords, which are more easily compromised than system-generated ones | Can be configured through [app management policy APIs](https://learn.microsoft.com/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta) and the [Microsoft Entra admin center](https://aka.ms/app-mgmt-policy-ux). Referred to as `Block custom passwords` in the Microsoft Entra admin center. |
| nonDefaultUriAddition | Block new identifier URIs for apps unless they're one of the default formats `api://{appId}` or `api://{tenantId}/{appId}`. | Reduces security risk from improper audience validation | Can be configured through [app management policy APIs](https://learn.microsoft.com/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta) and the [Microsoft Entra admin center](https://aka.ms/app-mgmt-policy-ux). Referred to as `Block custom identifier URIs` in the Microsoft Entra admin center. |
| uriAdditionWithoutUniqueTenantIdentifier | Block new identifier URIs for apps unless they're one of the [secure formats](https://aka.ms/identifier-uri-policy). | Reduces security risk from audience overlap | Can be configured through [app management policy APIs](https://learn.microsoft.com/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta) and the [Microsoft Entra admin center](https://aka.ms/app-mgmt-policy-ux). Referred to as `Block identifier URIs without unique tenant identifier` in the Microsoft Entra admin center. |
| passwordAddition | Block the addition of new passwords (also referred to as secrets) on applications altogether. | Prevents new passwords, which are the most easily compromised form of credential | Can be configured through [app management policy APIs](https://learn.microsoft.com/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta) and the [Microsoft Entra admin center](https://aka.ms/app-mgmt-policy-ux). In the Microsoft Entra admin center, combined with the `symmetricKeyAddition` restriction under the `Block password addition` setting. |
| passwordLifetime | Enforce a max lifetime range for a password secret. | Reduces security risk from long-lived credentials | Can be configured through [app management policy APIs](https://learn.microsoft.com/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta) and the [Microsoft Entra admin center](https://aka.ms/app-mgmt-policy-ux). In the Microsoft Entra admin center, combined with the `symmetricKeyLifetime` restriction under the `Restrict max password lifetime` setting. |
| symmetricKeyAddition | Restrict symmetric keys on applications. | Prevents new symmetric keys, which are effectively passwords - the most easily compromised form of credential | Can be configured through [app management policy APIs](https://learn.microsoft.com/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta) and the [Microsoft Entra admin center](https://aka.ms/app-mgmt-policy-ux). In the Microsoft Entra admin center, combined with the `passwordAddition` restriction under the `Block password addition` setting. |
| symmetricKeyLifetime | Enforce a max lifetime range for a symmetric key. | Reduces security risk from long-lived credentials | Can be configured through [app management policy APIs](https://learn.microsoft.com/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta) and the [Microsoft Entra admin center](https://aka.ms/app-mgmt-policy-ux). In the Microsoft Entra admin center, combined with the `passwordLifetime` restriction under the `Restrict max password lifetime` setting. |
| trustedCertificateAuthority | Block new certificate credentials if the issuer isn't listed in the trusted certificate authority list. | Ensures only trusted CAs are used by apps in your tenant | Can be configured through [app management policy APIs](https://learn.microsoft.com/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta). |
 
To learn more about how the app management policy API works, visit the [API documentation](https://learn.microsoft.com/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta).
 
## Prerequisites
 
To configure app management policies, you need:
 
 
| Restriction name | Description | Security value | Availability |
| :-------------------------- | :---------------------------------------------------------------------- | :-------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------- |
| asymmetricKeyLifetime | Enforce a max lifetime range for an asymmetric key (certificate). | Reduces security risk from long-lived credentials | Can be configured through [app management policy APIs](/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta&preserve-view=true) and the [Microsoft Entra admin center](https://aka.ms/app-mgmt-policy-ux). Referred to as `Restrict max certificate lifetime` in the Microsoft Entra admin center. |
| audiences | Restricts creation or promotion of apps based on signInAudience values. | Prevents unsanctioned multitenant or consumer-facing applications | Can be configured through [app management policy APIs](/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta&preserve-view=true) |
| customPasswordAddition | Restrict a custom password secret on application or service principal. | Prevents new user-provided app passwords, which are more easily compromised than system-generated ones | Can be configured through [app management policy APIs](/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta&preserve-view=true) and the [Microsoft Entra admin center](https://aka.ms/app-mgmt-policy-ux). Referred to as `Block custom passwords` in the Microsoft Entra admin center. |
| nonDefaultUriAddition | Block new identifier URIs for apps unless they're one of the default formats `api://{appId}` or `api://{tenantId}/{appId}`. | Reduces security risk from improper audience validation | Can be configured through [app management policy APIs](/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta&preserve-view=true) and the [Microsoft Entra admin center](https://aka.ms/app-mgmt-policy-ux). Referred to as `Block custom identifier URIs` in the Microsoft Entra admin center. |
| uriAdditionWithoutUniqueTenantIdentifier | Block new identifier URIs for apps unless they're one of the [secure formats](https://aka.ms/identifier-uri-policy). | Reduces security risk from audience overlap | Can be configured through [app management policy APIs](/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta&preserve-view=true) and the [Microsoft Entra admin center](https://aka.ms/app-mgmt-policy-ux). Referred to as `Block identifier URIs without unique tenant identifier` in the Microsoft Entra admin center. |
| passwordAddition | Block the addition of new passwords (also referred to as secrets) on applications altogether. | Prevents new passwords, which are the most easily compromised form of credential | Can be configured through [app management policy APIs](/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta&preserve-view=true) and the [Microsoft Entra admin center](https://aka.ms/app-mgmt-policy-ux). In the Microsoft Entra admin center, combined with the `symmetricKeyAddition` restriction under the `Block password addition` setting. |
| passwordLifetime | Enforce a max lifetime range for a password secret. | Reduces security risk from long-lived credentials | Can be configured through [app management policy APIs](/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta&preserve-view=true) and the [Microsoft Entra admin center](https://aka.ms/app-mgmt-policy-ux). In the Microsoft Entra admin center, combined with the `symmetricKeyLifetime` restriction under the `Restrict max password lifetime` setting. |
| symmetricKeyAddition | Restrict symmetric keys on applications. | Prevents new symmetric keys, which are effectively passwords - the most easily compromised form of credential | Can be configured through [app management policy APIs](/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta&preserve-view=true) and the [Microsoft Entra admin center](https://aka.ms/app-mgmt-policy-ux). In the Microsoft Entra admin center, combined with the `passwordAddition` restriction under the `Block password addition` setting. |
| symmetricKeyLifetime | Enforce a max lifetime range for a symmetric key. | Reduces security risk from long-lived credentials | Can be configured through [app management policy APIs](/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta&preserve-view=true) and the [Microsoft Entra admin center](https://aka.ms/app-mgmt-policy-ux). In the Microsoft Entra admin center, combined with the `passwordLifetime` restriction under the `Restrict max password lifetime` setting. |
| trustedCertificateAuthority | Block new certificate credentials if the issuer isn't listed in the trusted certificate authority list. | Ensures only trusted CAs are used by apps in your tenant | Can be configured through [app management policy APIs](/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta&preserve-view=true). |
 
To learn more about how the app management policy API works, visit the [API documentation](/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta&preserve-view=true).
 
## Prerequisites
 
To configure app management policies, you need:
 
+14 / -8 lines changed
Commit: add more code review feedback
Changes:
Before
After
- One of the following Microsoft Entra roles:
- [Cloud Application Administrator](../role-based-access-control/permissions-reference.md#cloud-application-administrator)
- [Application Administrator](../role-based-access-control/permissions-reference.md#application-administrator)
- Both of these Role-based access control actions:
- `microsoft.directory/applications/disablement/update`
- The following API permissions if using Microsoft Graph:
- `Application.ReadWrite.All` (delegated or application)
- `Application.ReadWrite.OwnedBy` (application, for owned apps only)
 
## [Microsoft Graph API](#tab/graph-api)
 
1. Get the application ID if you don't have it
 
```http
GET https://graph.microsoft.com/v1.0/applications?$filter=displayName eq 'Your App Name'
```
 
1. Deactivate the application
 
```http
- One of the following Microsoft Entra roles:
- [Cloud Application Administrator](../role-based-access-control/permissions-reference.md#cloud-application-administrator)
- [Application Administrator](../role-based-access-control/permissions-reference.md#application-administrator)
- The following API permissions if using Microsoft Graph:
- `Application.ReadWrite.All` (delegated or application)
- `Application.ReadWrite.OwnedBy` (application, for owned apps only)
 
## [Microsoft Graph API](#tab/graph-api)
 
1. Deactivate the application
 
```http
PATCH https://graph.microsoft.com/beta/applications/{applicationObjectId}
Content-Type: application/json
 
{
"isDisabled": true
}
```
```http
Modified by Ken Withee on Feb 17, 2026 8:12 PM
πŸ“– View on learn.microsoft.com
+6 / -6 lines changed
Commit: Fixes build issues.
Changes:
Before
After
 
To learn more, see:Β 
- [Microsoft Entra documentation](https://learn.microsoft.com/entra/)Β 
 
- [Microsoft Entra Global Secure Access](https://learn.microsoft.com/entra/global-secure-access/)Β 
 
- [Microsoft Defender for Cloud Apps overview](https://learn.microsoft.com/defender-cloud-apps/)
 
---
 
 
**Introduction**
 
Starting Oct 28, 2026, all applications and scripts making calls to Microsoft Entra Privileged Identity Management (PIM) [Iteration 2](/graph/api/resources/privilegedidentitymanagement-root?view=graph-rest-beta) (beta) APIs for Azure resources, Microsoft Entra roles and Groups will fail.
 
**How this will affect your organization**
 
Learn more:Β 
 
 
To learn more, see:Β 
- [Microsoft Entra documentation](/entra/)
 
- [Microsoft Entra Global Secure Access](/entra/global-secure-access/)
 
- [Microsoft Defender for Cloud Apps overview](/defender-cloud-apps/)
 
---
 
 
**Introduction**
 
Starting Oct 28, 2026, all applications and scripts making calls to Microsoft Entra Privileged Identity Management (PIM) [Iteration 2](/graph/api/resources/privilegedidentitymanagement-root?view=graph-rest-beta&preserve-view=true) (beta) APIs for Azure resources, Microsoft Entra roles and Groups will fail.
 
**How this will affect your organization**
 
Learn more:Β 
 
Modified by Gearoid O'Donnell on Feb 17, 2026 3:10 PM
πŸ“– View on learn.microsoft.com
+7 / -4 lines changed
Commit: Updating post migration considerations
Changes:
Before
After
Learn more: [Invite internal users to B2B collaboration](~/external-id/invite-internal-users.md)
 
## Post-migration considerations
 
If external user local accounts were synced from on-premises, reduce their on-premises footprint and use B2B guest accounts. You can:
 
- Transition external user local accounts to Microsoft Entra B2B and stop creating local accounts
- Invite external users in Microsoft Entra ID
- Randomize external user's local-account passwords to prevent authentication to on-premises resources
- This action ensures authentication and user lifecycle is connected to the external user home identity
 
## Next steps
 
 
 
 
Learn more: [Invite internal users to B2B collaboration](~/external-id/invite-internal-users.md)
 
## Post-migration considerations
After you verify external authentication is working, complete the transition:
- Transition external user local accounts to Microsoft Entra B2B and stop creating local accounts
- Invite external users in Microsoft Entra ID
- Change or randomize local account passwords to phase out legacy authentication
- This action ensures authentication and user lifecycle is connected to the external user home identity
- For on-premises accounts, coordinate with your directory services team to disable local credentials.
 
> [!IMPORTANT]
> During conversion, both local and external credentials work simultaneously. This dual authentication period is necessary because external authentication isn't available until invitation acceptance.
 
## Next steps
 
+4 / -4 lines changed
Commit: Fixes build issues.
Changes:
Before
After
1. Select **Create**.
 
 
You can also create an access review programmatically using Microsoft Graph. For more information, see [Create a single stage access review on a catalog](/graph/api/accessreviewset-post-definitions?view=graph-rest-beta&tabs=http#example-6-create-a-single-stage-access-review-on-a-catalog).
 
## Get Access Review Object and Instance ID
 
|PermissionType | Indicates the category of permission. |
 
 
You can also upload custom data via Graph by creating an upload session and then uploading a CSV file. For more information, see [customDataProvidedResourceUploadSession](/graph/api/resources/customdataprovidedresourceuploadsession?view=graph-rest-beta).
 
## Active review state
 
## Applying stage
 
 
In the **Applying** stage, you can get a list of denied users by making the [list decisions](/graph/api/accessreviewinstance-list-decisions?view=graph-rest-beta&tabs=http) API call:
 
``` http
1. Select **Create**.
 
 
You can also create an access review programmatically using Microsoft Graph. For more information, see [Create a single stage access review on a catalog](/graph/api/accessreviewset-post-definitions?view=graph-rest-beta&tabs=http&preserve-view=true#example-6-create-a-single-stage-access-review-on-a-catalog).
 
## Get Access Review Object and Instance ID
 
|PermissionType | Indicates the category of permission. |
 
 
You can also upload custom data via Graph by creating an upload session and then uploading a CSV file. For more information, see [customDataProvidedResourceUploadSession](/graph/api/resources/customdataprovidedresourceuploadsession?view=graph-rest-beta&preserve-view=true).
 
## Active review state
 
## Applying stage
 
 
In the **Applying** stage, you can get a list of denied users by making the [list decisions](/graph/api/accessreviewinstance-list-decisions?view=graph-rest-beta&tabs=http&preserve-view=true) API call:
 
``` http
+7 / -1 lines changed
Commit: Enhance documentation with mobile app support details
Changes:
Before
After
> * Internet resources with Global Secure Access
> * Microsoft apps with Global Secure Access
> * All private resources with Global Secure Access
> * ZTNA Policy Service
 
### User exclusions
 
 
 
 
 
 
 
> * Internet resources with Global Secure Access
> * Microsoft apps with Global Secure Access
> * All private resources with Global Secure Access
> * ZTNA Policy Service
 
### Mobile app support
 
The Global Secure Access mobile app is part of the Defender app. Exclusions are required to ensure the Defender client isn't blocked from accessing the resources it needs. To exclude Defender resources from Conditional Access policies, see [Microsoft Defender mobile app exclusion from Conditional Access policies](/defender-endpoint/mobile-resources-defender-endpoint#microsoft-defender-mobile-app-exclusion-from-conditional-access-ca-policies).
 
For more information, see [Mobile resources for Microsoft Defender for Endpoint](/defender-endpoint/mobile-resources-defender-endpoint).
 
### User exclusions
 
+2 / -2 lines changed
Commit: Fixes build issues.
Changes:
Before
After
 
:::image type="content" source="media/entitlement-management-dynamic-approval/native-support-diagram.png" alt-text="Screenshot of native support of approvers in Entitlement management." lightbox="media/entitlement-management-dynamic-approval/native-support-diagram.png":::
With the introduction of [custom extensions](entitlement-management-logic-apps-integration.md) calling out to [Azure Logic Apps](/azure/logic-apps/logic-apps-overview) you are now able to dynamically determine approval requirements for each access package assignment request based on your organizations specific business logic. The access package assignment request process will pause until your business logic hosted in Azure Logic Apps returns a [approval stage](/graph/api/resources/accesspackageapprovalstage?view=graph-rest-1.0) which will then be leveraged in the subequent approval process via the [My Access portal](https://myaccess.microsoft.com). For example, if access requests must be approved by the department head of the person requesting an access package this feature allows you to query an external system, such as your human resources (HR) system, to on-the-fly look up the current department head and assign them as the approver for the given access request.
 
:::image type="content" source="media/entitlement-management-dynamic-approval/dynamic-extensibility-diagram.png" alt-text="Screenshot of example of determining approvers using custom extensions." lightbox="media/entitlement-management-dynamic-approval/dynamic-extensibility-diagram.png":::
 
 
 
> [!NOTE]
> Although the example uses a user ID, the primaryApprovers and escalationApprovers section can contain valid [subjectSets](/graph/api/resources/subjectset) supported by Entitlement Management. In Public Preview the resume call must be performed against Microsoft Graph's beta endpoint. However, the [approval stage](/graph/api/resources/accesspackageapprovalstage?view=graph-rest-1.0) provided in the resume call body must follow the [v1.0 convention](/graph/api/resources/accesspackageapprovalstage?view=graph-rest-1.0) and not the [beta convention](/graph/api/resources/approvalstage?view=graph-rest-beta).
 
## Related content
 
 
:::image type="content" source="media/entitlement-management-dynamic-approval/native-support-diagram.png" alt-text="Screenshot of native support of approvers in Entitlement management." lightbox="media/entitlement-management-dynamic-approval/native-support-diagram.png":::
With the introduction of [custom extensions](entitlement-management-logic-apps-integration.md) calling out to [Azure Logic Apps](/azure/logic-apps/logic-apps-overview) you are now able to dynamically determine approval requirements for each access package assignment request based on your organizations specific business logic. The access package assignment request process will pause until your business logic hosted in Azure Logic Apps returns a [approval stage](/graph/api/resources/accesspackageapprovalstage) which will then be leveraged in the subequent approval process via the [My Access portal](https://myaccess.microsoft.com). For example, if access requests must be approved by the department head of the person requesting an access package this feature allows you to query an external system, such as your human resources (HR) system, to on-the-fly look up the current department head and assign them as the approver for the given access request.
 
:::image type="content" source="media/entitlement-management-dynamic-approval/dynamic-extensibility-diagram.png" alt-text="Screenshot of example of determining approvers using custom extensions." lightbox="media/entitlement-management-dynamic-approval/dynamic-extensibility-diagram.png":::
 
 
 
> [!NOTE]
> Although the example uses a user ID, the primaryApprovers and escalationApprovers section can contain valid [subjectSets](/graph/api/resources/subjectset) supported by Entitlement Management. In Public Preview the resume call must be performed against Microsoft Graph's beta endpoint. However, the [approval stage](/graph/api/resources/accesspackageapprovalstage) provided in the resume call body must follow the [v1.0 convention](/graph/api/resources/accesspackageapprovalstage) and not the [beta convention](/graph/api/resources/approvalstage?view=graph-rest-beta&preserve-view=true).
 
## Related content
 
Modified by Ken Withee on Feb 17, 2026 9:52 PM
πŸ“– View on learn.microsoft.com
+2 / -2 lines changed
Commit: Fixes build issues.
Changes:
Before
After
 
### Add a Microsoft Entra role as a resource in an access package using Graph
 
First, call [Create accessPackageResourceRequest](/graph/api/entitlementmanagement-post-resourcerequests?view=graph-rest-1.0&tabs=http) to add the Microsoft Entra role as a resource to the catalog.
 
Then, to add that Microsoft Entra role to an access package as a resource role, use the following payload for [Create resourceRoleScope](/graph/api/accesspackage-post-resourcerolescopes?view=graph-rest-1.0&tabs=http):
 
```json
{
 
### Add a Microsoft Entra role as a resource in an access package using Graph
 
First, call [Create accessPackageResourceRequest](/graph/api/entitlementmanagement-post-resourcerequests?tabs=http) to add the Microsoft Entra role as a resource to the catalog.
 
Then, to add that Microsoft Entra role to an access package as a resource role, use the following payload for [Create resourceRoleScope](/graph/api/accesspackage-post-resourcerolescopes?tabs=http):
 
```json
{
+2 / -2 lines changed
Commit: Fixes build issues.
Changes:
Before
After
There are three possible ways that you can add an identifier URI to your app. We recommend them in the following order:
 
1. Use one of the [secure URI patterns](#secure-patterns)
1. If you encountered this error, it means your API currently uses v1.0 tokens. You can unblock yourself by updating your service to accept v2.0 tokens. V2.0 tokens are similar to v1.0, but there are some [differences](https://learn.microsoft.com/entra/identity-platform/access-token-claims-reference). Once your service is able to handle v2.0 tokens, you can update your app configuration so that Microsoft Entra sends them v2.0 tokens. An easy way to do this is through the manifest editor in the [Microsoft Entra admin center App registrations experience](https://aka.ms/ra/prod):
 
:::image type="content" source="media/identifier-uri-restrictions/update-access-token-version-cropped.png" alt-text="Screenshot of update token version experience." lightbox="media/identifier-uri-restrictions/update-access-token-version.png":::
 
 
### How do these policies work?
 
The enforcements are turned on by configuring an organization's [app management policies](https://learn.microsoft.com/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta). A tenant administrator can turn it on or off. Microsoft is enabling it by default in some organizations during the months of June and July 2025.
 
[Learn how to check if the protection has been enabled in your organization](https://aka.ms/check-identifier-uri-protection-state)
 
There are three possible ways that you can add an identifier URI to your app. We recommend them in the following order:
 
1. Use one of the [secure URI patterns](#secure-patterns)
1. If you encountered this error, it means your API currently uses v1.0 tokens. You can unblock yourself by updating your service to accept v2.0 tokens. V2.0 tokens are similar to v1.0, but there are some [differences](/entra/identity-platform/access-token-claims-reference). Once your service is able to handle v2.0 tokens, you can update your app configuration so that Microsoft Entra sends them v2.0 tokens. An easy way to do this is through the manifest editor in the [Microsoft Entra admin center App registrations experience](https://aka.ms/ra/prod):
 
:::image type="content" source="media/identifier-uri-restrictions/update-access-token-version-cropped.png" alt-text="Screenshot of update token version experience." lightbox="media/identifier-uri-restrictions/update-access-token-version.png":::
 
 
### How do these policies work?
 
The enforcements are turned on by configuring an organization's [app management policies](/graph/api/resources/applicationauthenticationmethodpolicy?view=graph-rest-beta&preserve-view=true). A tenant administrator can turn it on or off. Microsoft is enabling it by default in some organizations during the months of June and July 2025.
 
[Learn how to check if the protection has been enabled in your organization](https://aka.ms/check-identifier-uri-protection-state)
 
+2 / -2 lines changed
Commit: link-fix
Changes:
Before
After
manager: pmwongera
ms.reviewer: jodah
 
ms.date: 02/13/2026
 
ms.update-cycle: 180-days
ms.service: entra-id
- Allow the agent to [send notifications](conditional-access-agent-optimization-settings.md#notifications) through Microsoft Teams
- Allow the agent to create [phased rollout plans](conditional-access-agent-optimization-phased-rollout.md)
- Enable [integration with ServiceNow](conditional-access-agent-optimization-settings.md#servicenow-integration-preview) for automatic ticket creation
- Provide [instructions](conditional-access-agent-optimization-settings.md#custom-instructions) and [knowledge artifacts]() to the agent
 
## Remove agent
 
manager: pmwongera
ms.reviewer: jodah
 
ms.date: 02/17/2026
 
ms.update-cycle: 180-days
ms.service: entra-id
- Allow the agent to [send notifications](conditional-access-agent-optimization-settings.md#notifications) through Microsoft Teams
- Allow the agent to create [phased rollout plans](conditional-access-agent-optimization-phased-rollout.md)
- Enable [integration with ServiceNow](conditional-access-agent-optimization-settings.md#servicenow-integration-preview) for automatic ticket creation
- Provide [instructions](conditional-access-agent-optimization-settings.md#custom-instructions) and [knowledge base files](conditional-access-agent-optimization-knowledge-base.md) to the agent
 
## Remove agent
 
+2 / -1 lines changed
Commit: Enhance Private DNS support section in documentation
Changes:
Before
After
> You can add up to 500 application segments to your Quick Access app.
 
### Add private DNS suffixes
Private DNS support for Microsoft Entra Private Access lets you query your own internal DNS servers to resolve IP addresses for internal domain names. Let’s look at an example. Let’s say you have an internal IP range of `10.8.0.0` to `10.8.255.255`. You configure this range in your Quick Access application definition. You want users to access a web application responding on IP `10.8.0.5` when they type
`https://benefits` in their web browser. But you don’t want to configure a FQDN for the application. Using Private DNS, you configure a corresponding DNS Suffix so that the Global Secure Access client knows how to route the request correctly.
 
Additionally, you can provide a single sign-on (SSO) experience for Kerberos resources by configuring Kerberos Authentication to domain controllers using Private DNS. To learn more about creating an SSO experience, see [Use Kerberos for single sign-on (SSO) to your resources with Microsoft Entra Private Access](how-to-configure-kerberos-sso.md).
 
> You can add up to 500 application segments to your Quick Access app.
 
### Add private DNS suffixes
 
[Private DNS support for Microsoft Entra Private Access](concept-private-name-resolution.md) lets you query your own internal DNS servers to resolve IP addresses for internal domain names. Let’s look at an example. Let’s say you have an internal IP range of `10.8.0.0` to `10.8.255.255`. You configure this range in your Quick Access application definition. You want users to access a web application responding on IP `10.8.0.5` when they type
`https://benefits` in their web browser. But you don’t want to configure a FQDN for the application. Using Private DNS, you configure a corresponding DNS Suffix so that the Global Secure Access client knows how to route the request correctly.
 
Additionally, you can provide a single sign-on (SSO) experience for Kerberos resources by configuring Kerberos Authentication to domain controllers using Private DNS. To learn more about creating an SSO experience, see [Use Kerberos for single sign-on (SSO) to your resources with Microsoft Entra Private Access](how-to-configure-kerberos-sso.md).
+1 / -1 lines changed
Commit: Fixes build issues.
Changes:
Before
After
 
# Administrative relationships in Microsoft Entra Agent ID (Owners, sponsors, and managers)
 
The Microsoft agent identity platform introduces an administrative model that separates technical administration from business accountability, ensuring operational control and compliance oversight without excessive permissions. This document explains the administrative relationships for Microsoft Entra Agent ID identity types. This guidance applies to [agent identities](/graph/api/resources/agentidentity?view=graph-rest-beta), [agent identity blueprints](/graph/api/resources/agentidentityblueprint?view=graph-rest-beta), [agent identity blueprint principals](/graph/api/resources/agentidentityblueprintprincipal?view=graph-rest-beta), and [agent users](/graph/api/resources/agentuser?view=graph-rest-beta). The article covers owners, sponsors, and managers and their importance in maintaining secure operations.
 
The administrative relationships available in Agent ID include:
 
 
# Administrative relationships in Microsoft Entra Agent ID (Owners, sponsors, and managers)
 
The Microsoft agent identity platform introduces an administrative model that separates technical administration from business accountability, ensuring operational control and compliance oversight without excessive permissions. This document explains the administrative relationships for Microsoft Entra Agent ID identity types. This guidance applies to [agent identities](/graph/api/resources/agentidentity?view=graph-rest-beta&preserve-view=true), [agent identity blueprints](/graph/api/resources/agentidentityblueprint?view=graph-rest-beta&preserve-view=true), [agent identity blueprint principals](/graph/api/resources/agentidentityblueprintprincipal?view=graph-rest-beta&preserve-view=true), and [agent users](/graph/api/resources/agentuser?view=graph-rest-beta&preserve-view=true). The article covers owners, sponsors, and managers and their importance in maintaining secure operations.
 
The administrative relationships available in Agent ID include:
 
+1 / -1 lines changed
Commit: Fixes build issues.
Changes:
Before
After
 
Agents can then be assigned access packages through three different request pathways.
 
- The agent identity itself can programmatically request an access package when needed for its operations, by creating an [accessPackageAssignmentRequest](/graph/api/entitlementmanagement-post-assignmentrequests?view=graph-rest-1.0&tabs=http).
- The agent's sponsor can request access on behalf of the agent ID, providing human oversight in the access request process. For more information, see [Request an access package on behalf of an agent identity (Preview)](/entra/id-governance/entitlement-management-request-behalf#request-an-access-package-on-behalf-of-an-agent-identity-preview).
- An administrator can [directly assign the agent identity or agent user to the access package](/entra/id-governance/entitlement-management-access-package-assignments#directly-assign-an-identity).
 
 
Agents can then be assigned access packages through three different request pathways.
 
- The agent identity itself can programmatically request an access package when needed for its operations, by creating an [accessPackageAssignmentRequest](/graph/api/entitlementmanagement-post-assignmentrequests?tabs=http).
- The agent's sponsor can request access on behalf of the agent ID, providing human oversight in the access request process. For more information, see [Request an access package on behalf of an agent identity (Preview)](/entra/id-governance/entitlement-management-request-behalf#request-an-access-package-on-behalf-of-an-agent-identity-preview).
- An administrator can [directly assign the agent identity or agent user to the access package](/entra/id-governance/entitlement-management-access-package-assignments#directly-assign-an-identity).
 
+1 / -1 lines changed
Commit: Fixes build issues.
Changes:
Before
After
Applications often need more than authentication and authorization (such as access to the tenant's directory data). Access may include getting attributes of the user, groups, group members, applications, and governance.
[Microsoft Graph](https://developer.microsoft.com/graph) provides access to the tenant's [identity and access](/graph/api/resources/identity-network-access-overview?view=graph-rest-1.0), [users](/graph/api/resources/users?view=graph-rest-1.0&preserve-view=true), [groups](/graph/api/resources/groups-overview?view=graph-rest-1.0&tabs=http&preserve-view=true), and [applications](/graph/api/resources/application?view=graph-rest-1.0&preserve-view=true). Microsoft Graph is the gateway to data and intelligence in Microsoft 365. You can use its unified programmability model to access the tremendous amount of data in Microsoft 365, Windows, and Enterprise Mobility + Security (EMS).
## Next steps
Applications often need more than authentication and authorization (such as access to the tenant's directory data). Access may include getting attributes of the user, groups, group members, applications, and governance.
[Microsoft Graph](https://developer.microsoft.com/graph) provides access to the tenant's [identity and access](/graph/api/resources/identity-network-access-overview), [users](/graph/api/resources/users?view=graph-rest-1.0&preserve-view=true), [groups](/graph/api/resources/groups-overview?view=graph-rest-1.0&tabs=http&preserve-view=true), and [applications](/graph/api/resources/application?view=graph-rest-1.0&preserve-view=true). Microsoft Graph is the gateway to data and intelligence in Microsoft 365. You can use its unified programmability model to access the tremendous amount of data in Microsoft 365, Windows, and Enterprise Mobility + Security (EMS).
## Next steps
Modified by Ken Withee on Feb 17, 2026 9:52 PM
πŸ“– View on learn.microsoft.com
+1 / -1 lines changed
Commit: Fixes build issues.
Changes:
Before
After
 
### How can I see which reviewers were notified for an access review?
 
Once an access review starts, you can use the [contactedReviewers](/graph/api/resources/accessreviewreviewer?view=graph-rest-1.0) API to retrieve the list of all users who were, or would have been, notified via email to perform reviews. Even in scenarios where notifications were turned off, the API still provides the list of reviewers along with timestamps indicating when notification would happen.
 
 
## Next steps
 
### How can I see which reviewers were notified for an access review?
 
Once an access review starts, you can use the [contactedReviewers](/graph/api/resources/accessreviewreviewer) API to retrieve the list of all users who were, or would have been, notified via email to perform reviews. Even in scenarios where notifications were turned off, the API still provides the list of reviewers along with timestamps indicating when notification would happen.
 
 
## Next steps