📋 Microsoft Entra Documentation Changes

Daily summary for changes since April 13th 2026, 9:51 PM PDT

Report generated on April 14th 2026, 9:51 PM PDT

📊 Summary

47
Total Commits
2
New Files
18
Modified Files
1
Deleted Files
15
Contributors

🆕 New Documentation Files

+141 lines added
Commit: ca-improved-enforcement-041426
+132 lines added
Commit: Add alt FAQ version of improved enforcement article

📝 Modified Documentation Files

Modified by Ortagus Winfrey on Apr 14, 2026 5:43 PM
📖 View on learn.microsoft.com
+0 / -36 lines changed
Commit: Remove Catalog privilege levels (Preview) section
Changes:
Before
After
 
This article shows you how to create and manage a catalog of resources and access packages in entitlement management. Catalogs are also used in [access reviews (preview)](catalog-access-reviews.md).
 
## Catalog privilege levels (Preview)
 
Microsoft Entra ID Governance catalogs have two privilege levels that determine their security and management requirements:
 
### Privilege levels
 
- **Standard catalog**
- The default type for most catalogs.
- Remains standard as long as it doesn't contain privileged resources.
- Supports all catalog management actions and access patterns.
 
- **Privileged catalog**
- Automatically assigned when a catalog contains resources that grant elevated permissions, such as:
- Microsoft Entra roles
- Application API permissions
- These catalogs apply stricter access and governance controls due to their security‑sensitive nature, such as more restrictive application permissions, tighter role requirements for catalog modification, and limits on automation to reduce the risk of unintended privileged access assignments.
 
 
This article shows you how to create and manage a catalog of resources and access packages in entitlement management. Catalogs are also used in [access reviews (preview)](catalog-access-reviews.md).
 
## Create a catalog
 
A catalog is a container of resources and access packages. You create a catalog when you want to group related resources and access packages. An administrator can create a catalog. In addition, a user delegated to the [catalog creator](entitlement-management-delegate.md) role can create a catalog for resources that they own. A nonadministrator who creates the catalog becomes the first catalog owner. A catalog owner can add more users, groups of users, or application service principals as catalog owners.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
+17 / -17 lines changed
Commit: Fix Acrolinx Score
Changes:
Before
After
 
# Clear on-premises attributes from migrated Microsoft Entra ID users
 
After you've migrated your users and groups to Microsoft Entra ID, you may be ready to decommission your on-premises Active Directory and uninstall sync tools. After turning off directory synchronization, you can manage these objects directly in Microsoft Entra ID.
 
However, you may encounter issues in Windows, Intune, and Outlook due to legacy values remaining in the user attributes that were previously synchronized from on-premises. For example, hybrid device joining may fail because the system pulls the username and domain from these outdated attributes.
 
 
## How to update these attributes
You can update these attributes via Microsoft Graph Beta with [Update User](/graph/api/user-update) API call. These attributes can only be updated in Entra ID for native Cloud-Only users or for previously synced users that have been converted to Cloud-Only users after turning off synchronization in Entra ID.
 
 
### Required roles
- [Windows PowerShell 7](/powershell/scripting/install/installing-powershell-on-windows)
- [Microsoft Graph SDK PowerShell module](/powershell/microsoftgraph/installation)
 
In order to use [ADSyncTools](reference-connect-adsynctools.md) you need to install the module from PowerShell Gallery, as follows:
 
``` powershell
 
# Clear on-premises attributes from migrated Microsoft Entra ID users
 
After migrating your users and groups to Microsoft Entra ID, you may be ready to decommission your on-premises Active Directory and uninstall sync tools. After turning off directory synchronization, you can manage these objects directly in Microsoft Entra ID.
 
However, you may encounter issues in Windows, Intune, and Outlook due to legacy values remaining in the user attributes that were previously synchronized from on-premises. For example, hybrid device joining may fail because the system pulls the username and domain from these outdated attributes.
 
 
## How to update these attributes
You can update these attributes via Microsoft Graph Beta with [Update User](/graph/api/user-update) API call. You can update these attributes in Entra ID only for Cloud‑Only users. This includes users that were previously synchronized and later converted to Cloud‑Only when tenant synchronization was disabled.
 
 
### Required roles
- [Windows PowerShell 7](/powershell/scripting/install/installing-powershell-on-windows)
- [Microsoft Graph SDK PowerShell module](/powershell/microsoftgraph/installation)
 
Install the [ADSyncTools](reference-connect-adsynctools.md) module from PowerShell Gallery:
 
``` powershell
+14 / -16 lines changed
Commit: revisions
Changes:
Before
After
---
title: FAQ - Improved enforcement for Conditional Access policies with resource exclusions
description: Frequently asked questions about the improved Conditional Access enforcement behavior for policies that target All resources with resource exclusions.
ms.topic: faq
ms.date: 04/14/2026
ai-usage: ai-assisted
---
 
# FAQ: Improved enforcement for policies with resource exclusions
 
This article answers frequently asked questions about the improved Conditional Access enforcement for policies that target **All resources** with resource exclusions.
 
 
### What is the upcoming Conditional Access behavior change for baseline scopes?
 
Today, Conditional Access policies that target All resources aren't enforced if the policy has one or more resource exclusions when:
 
1. A user signs in through a **public client application** (for example, desktop apps such as Microsoft Teams desktop client) that requests only the baseline scopes (OIDC or directory). Examples:
- A user signs into Visual Studio Code desktop client, which requests `openid` and `profile` scopes.
- A user signs in using Azure CLI, which requests only `User.Read`.
---
title: FAQs for the improved enforcement for Conditional Access policies with resource exclusions
description: Frequently asked questions about the improved Conditional Access enforcement behavior for policies that target All resources with resource exclusions.
ms.topic: faq
ms.date: 04/14/2026
ai-usage: ai-assisted
---
 
# FAQs: Improved enforcement for policies with resource exclusions
 
This article answers frequently asked questions about the improved Conditional Access enforcement for policies that target **All resources** with resource exclusions.
 
 
### What is the upcoming Conditional Access behavior change for baseline scopes?
 
Currently, Conditional Access policies that target **All resources** aren't enforced if the policy has* one or more* resource exclusions when:
 
1. A user signs in through a **public client application** (for example, desktop apps such as Microsoft Teams desktop client) that requests only the baseline scopes (OIDC or directory). Examples:
- A user signs into Visual Studio Code desktop client, which requests `openid` and `profile` scopes.
- A user signs in using Azure CLI, which requests only `User.Read`.
Modified by Tracey Torble on Apr 14, 2026 10:08 AM
📖 View on learn.microsoft.com
+8 / -8 lines changed
Commit: Alt text
Changes:
Before
After
 
1. Sign in to your [Leapsome Admin Console](https://www.Leapsome.com/app/#/login). Navigate to **Settings > Admin Settings**.
 
![Screenshot of Leapsome Admin Console](media/Leapsome-provisioning-tutorial/leapsome-admin-console.png)
 
1. Navigate to **Integrations > SCIM User provisioning**.
 
![Screenshot of Leapsome Add SCIM](media/Leapsome-provisioning-tutorial/leapsome-add-scim.png)
 
1. Copy the **SCIM Authentication Token**. This value is entered in the Secret Token field in the Provisioning tab of your Leapsome application.
 
![Screenshot of Leapsome Create Token](media/Leapsome-provisioning-tutorial/leapsome-create-token.png)
 
## Add Leapsome from the gallery
 
1. Browse to **Entra ID** > **Enterprise apps** > **New application**.
1. In the **Add from the gallery** section, type **Leapsome**, select **Leapsome** in the search box.
1. Select **Leapsome** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
![Screenshot of Leapsome in the results list](common/search-new-app.png)
 
 
1. Sign in to your [Leapsome Admin Console](https://www.Leapsome.com/app/#/login). Navigate to **Settings > Admin Settings**.
 
![Screenshot of Leapsome Admin Console.](media/Leapsome-provisioning-tutorial/leapsome-admin-console.png)
 
1. Navigate to **Integrations > SCIM User provisioning**.
 
![Screenshot of Leapsome Add SCIM.](media/Leapsome-provisioning-tutorial/leapsome-add-scim.png)
 
1. Copy the **SCIM Authentication Token**. This value is entered in the Secret Token field in the Provisioning tab of your Leapsome application.
 
![Screenshot of Leapsome Create Token.](media/Leapsome-provisioning-tutorial/leapsome-create-token.png)
 
## Add Leapsome from the gallery
 
1. Browse to **Entra ID** > **Enterprise apps** > **New application**.
1. In the **Add from the gallery** section, type **Leapsome**, select **Leapsome** in the search box.
1. Select **Leapsome** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
![Screenshot of Leapsome in the results list.](common/search-new-app.png)
 
Modified by Sudhakaran-S-micro on Apr 14, 2026 5:06 AM
📖 View on learn.microsoft.com
+6 / -6 lines changed
Commit: worked on suggestions
Changes:
Before
After
 
### Automation account
 
Before you begin, you’ll need to create an **Automation user** in your Jostle intranet. This are the account you’ll use to configure with Azure. Automation users can be created in Admin **Settings > User accounts and data > Manage Automation users**.
 
For more details on Automation users and how to create one, see [this article](https://forum.jostle.us/hc/en-us/articles/360057364073).
 
1. Under **User data to/from other systems** select **Manage user provisioning** .If you don't see "Manage user provisioning" here and have verified that your account includes SSO/user provisioning, contact Support <[email protected]> to have this page enabled in your Admin Settings).
1. In the **User Provisioning API details** section, go to **Your Base URL** field, select the Copy button and save the URL somewhere you can easily access it later.
 
![Provisioning](media/jostle-provisioning-tutorial/manage-user-provisioning.png)
1. Next, select the **Add a new key**... button
1. On the following screen, go to the **Automation User** field and use the drop-down menu to select your Automation user account.
 
![Integration Account](media/jostle-provisioning-tutorial/select-integration-account.png)
1. In the **Provisioning API key description** field give your key a name (such as `Azure`) and then select the **Add** button.
 
1. Once your key is generated, **make sure to copy it right away** and save it where you saved your URL (since it's the only time your key appears).
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](~/identity/role-based-access-control/permissions-reference.md#cloud-application-administrator).
 
### Automation account
 
Before you begin, you’ll need to create an **Automation user** in your Jostle intranet. This is the account you’ll use to configure with Azure. Automation users can be created in Admin **Settings > User accounts and data > Manage Automation users**.
 
For more details on Automation users and how to create one, see [this article](https://forum.jostle.us/hc/en-us/articles/360057364073).
 
1. Under **User data to/from other systems** select **Manage user provisioning** .If you don't see "Manage user provisioning" here and have verified that your account includes SSO/user provisioning, contact Support <[email protected]> to have this page enabled in your Admin Settings).
1. In the **User Provisioning API details** section, go to **Your Base URL** field, select the Copy button and save the URL somewhere you can easily access it later.
 
![Screenshot of User Provisioning API details](media/jostle-provisioning-tutorial/manage-user-provisioning.png)
1. Next, select the **Add a new key**... button
1. On the following screen, go to the **Automation User** field and use the drop-down menu to select your Automation user account.
 
![Screenshot of Integration Account](media/jostle-provisioning-tutorial/select-integration-account.png)
1. In the **Provisioning API key description** field give your key a name (such as `Azure`) and then select the **Add** button.
 
1. Once your key is generated, **make sure to copy it right away** and save it where you saved your URL (since it's the only time your key appears).
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](~/identity/role-based-access-control/permissions-reference.md#cloud-application-administrator).
+3 / -3 lines changed
Commit: Add (Preview) to MCP logging article title and preview notice
Changes:
Before
After
---
title: How to view Model Context Protocol (MCP) traffic logs in Global Secure Access
description: Learn how to monitor and analyze Model Context Protocol (MCP) traffic between AI agents and remote MCP servers using the Global Secure Access Generative AI Insights page.
author: jenniferf-skc
ms.author: jfields
 
---
 
# How to view MCP traffic logs in Global Secure Access
 
Global Secure Access [Model Context Protocol (MCP)](https://modelcontextprotocol.io/) logging provides advanced monitoring and analysis capabilities for MCP traffic between client MCP on devices and remote MCP servers. This feature provides thorough visibility into which MCP servers are being used, what tools and resources they expose, and how those tools are invoked. MCP Logging helps you discover shadow MCP servers in your organization and enforce stronger security and governance controls on AI agent communications and helps in understanding what tool is exposed and what tools are used. MCP logging also monitors a client MCP that is used by the Copilot Studio agent and a remote MCP server in case you have enabled [GSA MCP integration for Copilot Studio agents](/power-platform/admin/security/secure-web-ai-gateway-agents#enable-network-controls-for-copilot-studio-agents).
 
MCP Logging uses deep packet inspection to identify MCP traffic based on the protocol itself, rather than a predefined cloud app catalog. This approach enables discovery of previously unknown or private MCP servers that employees might be using.
 
This article describes how to access and interpret MCP traffic logs in the Global Secure Access Generative AI Insights page.
 
## Prerequisites
 
---
title: How to view Model Context Protocol (MCP) traffic logs in Global Secure Access (Preview)
description: Learn how to monitor and analyze Model Context Protocol (MCP) traffic between AI agents and remote MCP servers using the Global Secure Access Generative AI Insights page.
author: jenniferf-skc
ms.author: jfields
 
---
 
# How to view MCP traffic logs in Global Secure Access (Preview)
 
Global Secure Access [Model Context Protocol (MCP)](https://modelcontextprotocol.io/) logging provides advanced monitoring and analysis capabilities for MCP traffic between client MCP on devices and remote MCP servers. This feature provides thorough visibility into which MCP servers are being used, what tools and resources they expose, and how those tools are invoked. MCP Logging helps you discover shadow MCP servers in your organization and enforce stronger security and governance controls on AI agent communications and helps in understanding what tool is exposed and what tools are used. MCP logging also monitors a client MCP that is used by the Copilot Studio agent and a remote MCP server in case you have enabled [GSA MCP integration for Copilot Studio agents](/power-platform/admin/security/secure-web-ai-gateway-agents#enable-network-controls-for-copilot-studio-agents).
 
MCP Logging uses deep packet inspection to identify MCP traffic based on the protocol itself, rather than a predefined cloud app catalog. This approach enables discovery of previously unknown or private MCP servers that employees might be using.
 
This article describes how to access and interpret MCP traffic logs in the Global Secure Access Generative AI Insights page. MCP logging is currently in preview.
 
## Prerequisites
 
+2 / -2 lines changed
Commit: fix
Changes:
Before
After
You can preview the improved enforcement behavior before the rollout begins:
 
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/) as at least a [Conditional Access administrator](../role-based-access-control/permissions-reference.md#conditional-access-administrator).
1. Access the [Baseline scopes settings](https://aka.ms/BaselineScopesSettings) in Conditional Access. This direct link is required to view the preview settings.
1. Choose **default target resource** (Windows Azure Active Directory).
1. Select **Save**.
 
 
### How can I preview the enforcement change ahead of the rollout?
 
Go to <https://aka.ms/BaselineScopesSettings>, choose the **default target resource** (Windows Azure Active Directory), and select **Save**. This setting immediately enforces the improved behavior. To revert back, select **reset**. For more information, see [Preview the enforcement change](#preview-the-enforcement-change).
 
### How can I retain the legacy behavior after the rollout?
 
You can preview the improved enforcement behavior before the rollout begins:
 
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/) as at least a [Conditional Access administrator](../role-based-access-control/permissions-reference.md#conditional-access-administrator).
1. Access the [Baseline scopes settings](https://aka.ms/BaselineScopesSettingsUX) in Conditional Access. This direct link is required to view the preview settings.
1. Choose **default target resource** (Windows Azure Active Directory).
1. Select **Save**.
 
 
### How can I preview the enforcement change ahead of the rollout?
 
Go to <https://aka.ms/BaselineScopesSettingsUX>, choose the **default target resource** (Windows Azure Active Directory), and select **Save**. This setting immediately enforces the improved behavior. To revert back, select **reset**. For more information, see [Preview the enforcement change](#preview-the-enforcement-change).
 
### How can I retain the legacy behavior after the rollout?
 
+2 / -2 lines changed
Commit: revisions
Changes:
Before
After
 
## Overview
 
Starting May 13, 2026, Microsoft Entra ID is rolling out an improved enforcement model for Conditional Access policies that target **All resources** and include one or more **resource exclusions**. This change ensures that sign-ins requesting only baseline scopes receive the same Conditional Access protections as other resource access.
 
Previously, certain low-privilege scopes were automatically excluded from policy enforcement when a resource exclusion existed. With this change, those scopes are now evaluated as directory access and are subject to your Conditional Access policies.
 
 
## What is changing
 
After the rollout, the following scenarios might now trigger Conditional Access challenges (such as MFA or device compliance) where previously access was granted without enforcement:
 
- **Public client applications** (like desktop apps) that request only baseline scopes. For example, a user signs into Visual Studio Code desktop client, which requests `openid` and `profile` scopes, or Azure CLI, which requests only `User.Read`.
- **Confidential client applications** (like web apps) that are excluded from an All resources policy and request only baseline directory scopes. For example, a web application excluded from the policy that requests only `User.Read` and `People.Read`.
 
## Overview
 
Microsoft Entra ID is rolling out an improved enforcement model for Conditional Access policies that target **All resources** and include one or more **resource exclusions**. This change ensures that sign-ins requesting only baseline scopes receive the same Conditional Access protections as other resource access.
 
Previously, certain low-privilege scopes were automatically excluded from policy enforcement when a resource exclusion existed. With this change, those scopes are now evaluated as directory access and are subject to your Conditional Access policies.
 
 
## What is changing
 
After the rollout, the following scenarios might now trigger Conditional Access challenges (such as MFA or device compliance) where access was previously granted without enforcement:
 
- **Public client applications** (like desktop apps) that request only baseline scopes. For example, a user signs into Visual Studio Code desktop client, which requests `openid` and `profile` scopes, or Azure CLI, which requests only `User.Read`.
- **Confidential client applications** (like web apps) that are excluded from an All resources policy and request only baseline directory scopes. For example, a web application excluded from the policy that requests only `User.Read` and `People.Read`.
+2 / -2 lines changed
Commit: Fix stray backslashes in Workday termination lookahead expressions AB#543837
Changes:
Before
After
 
```python
Switch([StatusTerminationLastDayOfWork], 
  Switch([Active\], "True",
"0", "False", 
"1", IIF(DateDiff("d", DateAdd("h","9",Now()),CDate(
    Switch([StatusTerminationLastDayOfWork],[StatusTerminationLastDayOfWork],
  Switch([Active], "False",
"0", "True", 
"1", IIF(DateDiff("d", DateAdd("h","9",Now()),CDate(
    Switch([StatusTerminationLastDayOfWork\],[StatusTerminationLastDayOfWork],
"","9999-12-31")
    )
  ) <= 0, "True", "False")
 
```python
Switch([StatusTerminationLastDayOfWork], 
  Switch([Active], "True",
"0", "False", 
"1", IIF(DateDiff("d", DateAdd("h","9",Now()),CDate(
    Switch([StatusTerminationLastDayOfWork],[StatusTerminationLastDayOfWork],
  Switch([Active], "False",
"0", "True", 
"1", IIF(DateDiff("d", DateAdd("h","9",Now()),CDate(
    Switch([StatusTerminationLastDayOfWork],[StatusTerminationLastDayOfWork],
"","9999-12-31")
    )
  ) <= 0, "True", "False")
Modified by Ken Withee on Apr 14, 2026 2:48 PM
📖 View on learn.microsoft.com
+3 / -0 lines changed
Commit: Clarify DID vs traditional authentication in Verified ID introduction AB#566916
Changes:
Before
After
 
The issuer is an organization that creates an issuance solution requesting information from a user. The information is used to verify the user’s identity. For example, Woodgrove, Inc. has an issuance solution that enables them to create and distribute verifiable credentials (VCs) to all their employees. The employee uses the Authenticator app to sign in with their username and password, which passes an ID token to the issuing service. Once Woodgrove, Inc. validates the ID token submitted, the issuance solution creates a VC that includes claims about the employee and is signed with Woodgrove, Inc. DID. The employee now has an employer signed verifiable credential which includes the employee's DID as the subject DID.
 
### User
 
The user is the person or entity that is requesting a VC. For example, Alice is a new Woodgrove employee and was previously issued her proof of employment verifiable credential. When Alice needs to provide proof of employment to get a discount at Proseware, she can grant access to the credential in her Authenticator app by signing a verifiable presentation that proves Alice is the owner of the DID. Proseware is able to validate Woodgrove-issued credentials and Alice's verifiable credential ownership.
 
 
 
 
The issuer is an organization that creates an issuance solution requesting information from a user. The information is used to verify the user’s identity. For example, Woodgrove, Inc. has an issuance solution that enables them to create and distribute verifiable credentials (VCs) to all their employees. The employee uses the Authenticator app to sign in with their username and password, which passes an ID token to the issuing service. Once Woodgrove, Inc. validates the ID token submitted, the issuance solution creates a VC that includes claims about the employee and is signed with Woodgrove, Inc. DID. The employee now has an employer signed verifiable credential which includes the employee's DID as the subject DID.
 
> [!NOTE]
> The sign-in step uses traditional authentication (such as username and password) to verify the employee's identity with the issuer. This is separate from the verifiable credential itself. The verifiable credential is a portable, cryptographically signed proof that the employee can later present to any verifier without the verifier needing to contact Woodgrove or any central authority.
 
### User
 
The user is the person or entity that is requesting a VC. For example, Alice is a new Woodgrove employee and was previously issued her proof of employment verifiable credential. When Alice needs to provide proof of employment to get a discount at Proseware, she can grant access to the credential in her Authenticator app by signing a verifiable presentation that proves Alice is the owner of the DID. Proseware is able to validate Woodgrove-issued credentials and Alice's verifiable credential ownership.
+1 / -1 lines changed
Commit: remove-dupe
Changes:
Before
After
 
Conditional Access policies that target All resources with one or more resource exclusions, or policies that explicitly target Azure AD Graph, are enforced in user sign-in flows where the client application requests only these scopes. There is no change in behavior when an application requests any additional scope beyond those listed above.
 
For guidance on assessing impact, identifying affected applications, and retaining legacy behavior, see [Improved enforcement for policies with resource exclusions](improved-enforcement-resource-exclusions.md).
 
> [!NOTE]
> The [Azure AD Graph retirement](https://techcommunity.microsoft.com/blog/microsoft-entra-blog/important-update-azure-ad-graph-retirement/4364990) does not affect the Azure AD Graph (Windows Azure Active Directory) resource registered in your tenant.
 
Conditional Access policies that target All resources with one or more resource exclusions, or policies that explicitly target Azure AD Graph, are enforced in user sign-in flows where the client application requests only these scopes. There is no change in behavior when an application requests any additional scope beyond those listed above.
 
For guidance on assessing impact, identifying affected applications, and retaining legacy behavior, see [Improved enforcement for policies with resource exclusions](concept-enforcement-resource-exclusions.md).
 
> [!NOTE]
> The [Azure AD Graph retirement](https://techcommunity.microsoft.com/blog/microsoft-entra-blog/important-update-azure-ad-graph-retirement/4364990) does not affect the Azure AD Graph (Windows Azure Active Directory) resource registered in your tenant.
+1 / -1 lines changed
Commit: Replace outdated IE reference with Edge guidance in SCIM provisioning article AB#497965
Changes:
Before
After
8. Leave the portal and open the provisioning agent installer, agree to the terms of service, and select **Install**.
9. Wait for the Microsoft Entra provisioning agent configuration wizard and then select **Next**.
10. In the **Select Extension** step, select **On-premises application provisioning** and then select **Next**.
11. The provisioning agent uses the operating system's web browser to display a popup window for you to authenticate to Microsoft Entra ID, and potentially also your organization's identity provider. If you're using Internet Explorer as the browser on Windows Server, then you may need to add Microsoft web sites to your browser's trusted site list to allow JavaScript to run correctly.
12. Provide credentials for a Microsoft Entra administrator when you're prompted to authorize. The user is required to have at least the [Hybrid Identity Administrator](/entra/identity/role-based-access-control/permissions-reference#hybrid-identity-administrator) role.
13. Select **Confirm** to confirm the setting. Once installation is successful, you can select **Exit**, and also close the Provisioning Agent Package installer.
 
8. Leave the portal and open the provisioning agent installer, agree to the terms of service, and select **Install**.
9. Wait for the Microsoft Entra provisioning agent configuration wizard and then select **Next**.
10. In the **Select Extension** step, select **On-premises application provisioning** and then select **Next**.
11. The provisioning agent uses the operating system's web browser to display a popup window for you to authenticate to Microsoft Entra ID, and potentially also your organization's identity provider. If you're using Microsoft Edge on Windows Server, ensure that Microsoft sites aren't blocked. If your organization requires legacy browser support, you can use [Microsoft Edge with IE Mode](/deployedge/edge-ie-mode) and add Microsoft sites to the trusted site list.
12. Provide credentials for a Microsoft Entra administrator when you're prompted to authorize. The user is required to have at least the [Hybrid Identity Administrator](/entra/identity/role-based-access-control/permissions-reference#hybrid-identity-administrator) role.
13. Select **Confirm** to confirm the setting. Once installation is successful, you can select **Exit**, and also close the Provisioning Agent Package installer.
 
Modified by Ortagus Winfrey on Apr 14, 2026 5:49 PM
📖 View on learn.microsoft.com
+1 / -1 lines changed
Commit: Fix broken bookmark references to removed privilege levels section
Changes:
Before
After
| access package | A bundle of resources that a team or project needs and is governed with policies. An access package is always contained in a catalog. You would create a new access package for a scenario in which identities need to request access for themselves. |
| access request | A request to access the resources in an access package. A request typically goes through an approval workflow. If approved, the requesting identity receives an access package assignment. |
| assignment | An assignment of an access package to an identity ensures the identity has all the resource roles of that access package. Access package assignments typically have a time limit before they expire. |
| catalog | A container of related resources and access packages. Catalogs are used for delegation, so that nonadministrators can create their own access packages. Catalog owners can add resources they own to a catalog. Catalogs can have a [privilege level](entitlement-management-catalog-create.md#catalog-privilege-levels-preview) of **Standard**, or a catalog with regular resources in it, or **Privileged** where it contains resources that grant elevated permissions. |
| catalog creator | A collection of identities who are authorized to create new catalogs. When a nonadministrator identity who is authorized to be a catalog creator creates a new catalog, they automatically become the owner of that catalog. |
| connected organization | An external Microsoft Entra directory or domain that you have a relationship with. The identities from a connected organization can be specified in a policy as being allowed to request access. |
| policy | A set of rules that defines the access lifecycle, such as how identities get access, who can approve, and how long they have access through an assignment. A policy is linked to an access package. For example, an access package could have two policies - one for employees to request access and a second for external identities to request access. |
| access package | A bundle of resources that a team or project needs and is governed with policies. An access package is always contained in a catalog. You would create a new access package for a scenario in which identities need to request access for themselves. |
| access request | A request to access the resources in an access package. A request typically goes through an approval workflow. If approved, the requesting identity receives an access package assignment. |
| assignment | An assignment of an access package to an identity ensures the identity has all the resource roles of that access package. Access package assignments typically have a time limit before they expire. |
| catalog | A container of related resources and access packages. Catalogs are used for delegation, so that nonadministrators can create their own access packages. Catalog owners can add resources they own to a catalog. |
| catalog creator | A collection of identities who are authorized to create new catalogs. When a nonadministrator identity who is authorized to be a catalog creator creates a new catalog, they automatically become the owner of that catalog. |
| connected organization | An external Microsoft Entra directory or domain that you have a relationship with. The identities from a connected organization can be specified in a policy as being allowed to request access. |
| policy | A set of rules that defines the access lifecycle, such as how identities get access, who can approve, and how long they have access through an assignment. A policy is linked to an access package. For example, an access package could have two policies - one for employees to request access and a second for external identities to request access. |
Modified by Ortagus Winfrey on Apr 14, 2026 5:49 PM
📖 View on learn.microsoft.com
+1 / -1 lines changed
Commit: Fix broken bookmark references to removed privilege levels section
Changes:
Before
After
 
 
> [!NOTE]
> Assigning a Microsoft Entra role to a catalog automatically changes its [privilege level](entitlement-management-catalog-create.md#catalog-privilege-levels-preview) to **Privileged**.
 
## Scenarios for Microsoft Entra role assignment using access packages
 
 
 
> [!NOTE]
> Assigning a Microsoft Entra role to a catalog can change its access and governance controls.
 
## Scenarios for Microsoft Entra role assignment using access packages
 
Modified by Ken Withee on Apr 14, 2026 5:30 PM
📖 View on learn.microsoft.com
+2 / -0 lines changed
Commit: Add Security Copilot cross-reference to lifecycle workflows overview AB#427624
Changes:
Before
After
- Manage user lifecycle at scale. As your organization grows, the need for other resources to manage user lifecycle decreases.
- Reduce or remove manual tasks.
- Apply logic apps to extend workflows for more complex scenarios with your existing logic apps.
 
Those capabilities can help ensure a holistic experience by allowing you to remove other dependencies and applications to achieve the same result. You can then increase efficiency in new employee orientation and in removal of former employees from the system.
 
 
- [Create a custom workflow by using the Microsoft Entra admin center](tutorial-onboard-custom-workflow-portal.md)
- [Create a lifecycle workflow](create-lifecycle-workflow.md)
 
 
- Manage user lifecycle at scale. As your organization grows, the need for other resources to manage user lifecycle decreases.
- Reduce or remove manual tasks.
- Apply logic apps to extend workflows for more complex scenarios with your existing logic apps.
- Use [Microsoft Security Copilot to create and manage lifecycle workflows](../security-copilot/entra-lifecycle-workflows.md) using natural language.
 
Those capabilities can help ensure a holistic experience by allowing you to remove other dependencies and applications to achieve the same result. You can then increase efficiency in new employee orientation and in removal of former employees from the system.
 
 
- [Create a custom workflow by using the Microsoft Entra admin center](tutorial-onboard-custom-workflow-portal.md)
- [Create a lifecycle workflow](create-lifecycle-workflow.md)
- [Manage lifecycle workflows with Microsoft Security Copilot](../security-copilot/entra-lifecycle-workflows.md)

🗑️ Deleted Documentation Files

DELETED docs/identity/conditional-access/improved-enforcement-resource-exclusions-faq.md
Deleted by shlipsey3 on Apr 14, 2026 8:15 PM
📖 Was available at: https://learn.microsoft.com/en-us/entra/identity/conditional-access/improved-enforcement-resource-exclusions-faq
-128 lines removed
Commit: remove-dupe