πŸ“‹ Microsoft Entra Documentation Changes

Daily summary for changes since April 23rd 2026, 9:42 PM PDT

Report generated on April 24th 2026, 9:42 PM PDT

πŸ“Š Summary

19
Total Commits
0
New Files
12
Modified Files
0
Deleted Files
8
Contributors

πŸ“ Modified Documentation Files

+17 / -16 lines changed
Commit: userstory538971
Changes:
Before
After
title: Customize the browser language
description: Learn about how to customize the browser language for your app's authentication experience to provide a personalized sign-in.
ms.topic: how-to
ms.date: 09/16/2025
ms.custom: it-pro
 
#Customer intent: As a dev, devops, or it admin, I want to learn about how to add customized browser languages to my app's authentication experience.
---
# Customize browser language for authentication experience
 
1. If you have access to multiple tenants, use the **Settings** icon :::image type="icon" source="media/common/admin-center-settings-icon.png" border="false"::: in the top menu to switch to the external tenant you created earlier from the **Directories + subscriptions** menu.
1. Browse to **Company branding** > **Browser language customizations** > **Add browser language**.
 
:::image type="content" source="media/how-to-customize-languages-customers/company-branding-add-browser-language.png" alt-text="Screenshot of the browser language customizations tab." lightbox="media/how-to-customize-languages-customers/company-branding-add-browser-language.png":::
 
4. On the **Basics** tab, under **Language specific UI Customization**, select the browser language you want to customize from the menu.
 
:::image type="content" source="media/how-to-customize-languages-customers/language-selection.png" alt-text="Screenshot of selecting a language." lightbox="media/how-to-customize-languages-customers/language-selection.png":::
 
The following languages are supported in the external tenant:
title: Customize the browser language
description: Learn about how to customize the browser language for your app's authentication experience to provide a personalized sign-in.
ms.topic: how-to
ms.date: 04/24/2026
ms.custom: it-pro
ai-usage: ai-assisted
 
# Customer intent: As a developer, DevOps engineer, or IT admin, I want to add customized browser languages to my app's authentication experience.
---
# Customize browser language for authentication experience
 
1. If you have access to multiple tenants, use the **Settings** icon :::image type="icon" source="media/common/admin-center-settings-icon.png" border="false"::: in the top menu to switch to the external tenant you created earlier from the **Directories + subscriptions** menu.
1. Browse to **Company branding** > **Browser language customizations** > **Add browser language**.
 
:::image type="content" source="media/how-to-customize-languages-customers/company-branding-add-browser-language.png" alt-text="Screenshot of Company branding with Browser language customizations and the Add browser language action." lightbox="media/how-to-customize-languages-customers/company-branding-add-browser-language.png":::
 
1. On the **Basics** tab, under **Language specific UI Customization**, select the browser language you want to customize from the menu.
 
:::image type="content" source="media/how-to-customize-languages-customers/language-selection.png" alt-text="Screenshot of the language selector on the Basics tab for browser language customization." lightbox="media/how-to-customize-languages-customers/language-selection.png":::
 
Modified by TheWriteDoc on Apr 24, 2026 6:38 PM
πŸ“– View on learn.microsoft.com
+8 / -7 lines changed
Commit: userstory538971
Changes:
Before
After
title: Add sponsors to a guest user in the Microsoft Entra admin center - External ID
description: Shows how an admin can add sponsors to guest users in Microsoft Entra B2B collaboration.
ms.topic: how-to
ms.date: 12/12/2024
ms.collection: M365-identity-device-management
ms.custom: sfi-image-nochange
# Customer intent: As a B2B organization administrator, I want to track and manage sponsors for guest users, so that I can ensure accountability and proper governance of external partners in my directory.
---
# Sponsors field for B2B users
The **Sponsors** field on the user object refers to the person or group who manages and monitors the lifecycle of the user, ensuring they have access to the right resources.
Being a sponsor doesn't grant administrative powers for the sponsor user or the group, but it can be used for approval processes in entitlement management. You can also use it for custom solutions, but it doesn't offer any other built-in directory powers.
 
:::image type="content" source="media/b2b-sponsors/single-sponsor.png" alt-text="Screenshot of the sponsors' name.":::
 
## Who can be a sponsor?
 
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](~/identity/role-based-access-control/permissions-reference.md#user-administrator).
1. Browse to **Entra ID** > **Users**.
1. Select **New user** > **Invite external user** from the menu.
1. Entered the details on the Basics tab and select **Next: Properties**.
title: Add sponsors to a guest user in the Microsoft Entra admin center - External ID
description: Shows how an admin can add sponsors to guest users in Microsoft Entra B2B collaboration.
ms.topic: how-to
ms.date: 04/24/2026
ms.collection: M365-identity-device-management
ms.custom: sfi-image-nochange
ai-usage: ai-assisted
# Customer intent: As a B2B organization administrator, I want to track and manage sponsors for guest users, so that I can ensure accountability and proper governance of external partners in my directory.
---
# Sponsors field for B2B users
The **Sponsors** field on the user object refers to the person or group who manages and monitors the lifecycle of the user, ensuring they have access to the right resources.
Being a sponsor doesn't grant administrative powers for the sponsor user or the group, but it can be used for approval processes in entitlement management. You can also use it for custom solutions, but it doesn't offer any other built-in directory powers.
 
:::image type="content" source="media/b2b-sponsors/single-sponsor.png" alt-text="Screenshot of a guest user profile showing one sponsor listed in the Sponsors field.":::
 
## Who can be a sponsor?
 
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](~/identity/role-based-access-control/permissions-reference.md#user-administrator).
1. Browse to **Entra ID** > **Users**.
1. Select **New user** > **Invite external user** from the menu.
Modified by TheWriteDoc on Apr 24, 2026 6:38 PM
πŸ“– View on learn.microsoft.com
+8 / -7 lines changed
Commit: userstory538971
Changes:
Before
After
title: Language customization in Microsoft Entra user flows
description: Learn about customizing the language experience in your user flows in Microsoft Entra External ID.
ms.topic: how-to
ms.date: 11/17/2025
 
ms.collection: M365-identity-device-management
ms.custom:
#customer intent: As a B2B collaboration user, I want to customize the language of the authentication experience in Microsoft Entra External ID, so that I can accommodate different languages for my users and provide a personalized user flow.
---
 
# Language customization in Microsoft Entra External ID
> [!TIP]
> This article applies to B2B collaboration user flows in workforce tenants. For information about external tenants, see [Customize the language of the authentication experience](customers/how-to-customize-languages-customers.md).
 
Language customization in Microsoft Entra External ID allows your user flow to accommodate different languages to suit your user's needs. Microsoft provides the translations for [36 languages](#supported-languages). In this article, you learn how to customize the attribute names on the [attribute collection page](self-service-sign-up-user-flow.yml#select-the-layout-of-the-attribute-collection-form), even if your experience is provided for only a single language.
 
## How language customization works
 
 
These steps give you a JSON file that you can use to start editing your strings.
title: Language customization in Microsoft Entra user flows
description: Learn about customizing the language experience in your user flows in Microsoft Entra External ID.
ms.topic: how-to
ms.date: 04/24/2026
 
ms.collection: M365-identity-device-management
ms.custom:
ai-usage: ai-assisted
# Customer intent: As a B2B collaboration user flow administrator, I want to customize the language of the authentication experience in Microsoft Entra External ID so that I can accommodate different languages for my users and provide a personalized user flow.
---
 
# Language customization in Microsoft Entra External ID
> [!TIP]
> This article applies to B2B collaboration user flows in workforce tenants. For information about external tenants, see [Customize the language of the authentication experience](customers/how-to-customize-languages-customers.md).
 
Language customization in Microsoft Entra External ID allows your user flow to accommodate different languages to suit your users' needs. Microsoft provides translations for [36 languages](#supported-languages). In this article, you learn how to customize attribute names on the [attribute collection page](self-service-sign-up-user-flow.yml#select-the-layout-of-the-attribute-collection-form), even if your experience is provided in only a single language.
 
## How language customization works
 
 
Modified by TheWriteDoc on Apr 24, 2026 6:38 PM
πŸ“– View on learn.microsoft.com
+6 / -5 lines changed
Commit: userstory538971
Changes:
Before
After
---
title: Grant B2B users access to your on-premises apps
description: Shows how to give cloud B2B users access to on premises apps with Microsoft Entra B2B collaboration.
ms.topic: how-to
ms.date: 12/10/2024
 
ms.collection: M365-identity-device-management
 
# Customer intent: As an organization using Microsoft Entra B2B collaboration, I want to grant B2B users access to our on-premises applications, so that they can authenticate and access these apps using SAML-based authentication or integrated Windows authentication with Kerberos constrained delegation.
---
 
- Enable Application Proxy and install a connector. For instructions, see [Publish applications using Microsoft Entra application proxy](~/identity/app-proxy/application-proxy-add-on-premises-application.md).
- Publish the on-premises SAML-based application through Microsoft Entra application proxy by following the instructions in [SAML single sign-on for on-premises applications with Application Proxy](~/identity/app-proxy/conceptual-sso-apps.md).
- Assign Microsoft Entra B2B Users to the SAML Application.
 
When you've completed the steps above, your app should be up and running. To test Microsoft Entra B2B access:
1. Open a browser and navigate to the external URL that you created when you published the app.
 
The following diagram provides a high-level overview of how Microsoft Entra application proxy and the generation of the B2B user object in the on-premises directory work together to grant B2B users access to your on-premises IWA and KCD apps. The numbered steps are described in detail below the diagram.
 
---
title: Grant B2B users access to your on-premises apps
description: Learn how to give cloud B2B users access to on-premises apps with Microsoft Entra B2B collaboration.
ms.topic: how-to
ms.date: 04/24/2026
 
ms.collection: M365-identity-device-management
ai-usage: ai-assisted
 
# Customer intent: As an organization using Microsoft Entra B2B collaboration, I want to grant B2B users access to our on-premises applications, so that they can authenticate and access these apps using SAML-based authentication or integrated Windows authentication with Kerberos constrained delegation.
---
 
- Enable Application Proxy and install a connector. For instructions, see [Publish applications using Microsoft Entra application proxy](~/identity/app-proxy/application-proxy-add-on-premises-application.md).
- Publish the on-premises SAML-based application through Microsoft Entra application proxy by following the instructions in [SAML single sign-on for on-premises applications with Application Proxy](~/identity/app-proxy/conceptual-sso-apps.md).
- Assign Microsoft Entra B2B users to the SAML application.
 
When you've completed the steps above, your app should be up and running. To test Microsoft Entra B2B access:
1. Open a browser and navigate to the external URL that you created when you published the app.
 
The following diagram provides a high-level overview of how Microsoft Entra application proxy and the generation of the B2B user object in the on-premises directory work together to grant B2B users access to your on-premises IWA and KCD apps. The numbered steps are described in detail below the diagram.
+5 / -4 lines changed
Commit: userstory538971
Changes:
Before
After
author: garrodonnell
ms.author: godonnell
ms.topic: how-to
ms.date: 11/17/2025
ms.custom: developer
 
#Customer intent: As a dev, devops, I want to learn how to use the Azure REST API to manage my external tenant.
---
# Manage an external tenant with Azure REST API (Preview)
 
[!INCLUDE [applies-to-external-only](../includes/applies-to-external-only.md)]
 
You can manage your external tenant using the Azure REST API. The management of resources related to tenant management supports the following API operations. Each link in the following sections targets the corresponding page within the Microsoft Graph API reference for that operation.
 
## Tenant Management operations
 
You can perform tenant management operations with your external tenant with the following operations:
 
- [Create or Update](/rest/api/activedirectory/ciam-tenants/create)
- [Delete](/rest/api/activedirectory/ciam-tenants/delete)
author: garrodonnell
ms.author: godonnell
ms.topic: how-to
ms.date: 04/24/2026
ms.custom: developer
ai-usage: ai-assisted
 
# Customer intent: As a developer or DevOps engineer, I want to use the Azure REST API to manage my external tenant.
---
# Manage an external tenant with Azure REST API (Preview)
 
[!INCLUDE [applies-to-external-only](../includes/applies-to-external-only.md)]
 
You can manage your external tenant by using the Azure REST API. Tenant management resources support the following API operations. Each link in the following sections targets the corresponding page in the Azure REST API reference for that operation.
 
## Tenant Management operations
 
You can perform tenant management operations for your external tenant by using the following operations:
 
- [Create or Update](/rest/api/activedirectory/ciam-tenants/create)
Modified by TheWriteDoc on Apr 24, 2026 7:40 PM
πŸ“– View on learn.microsoft.com
+4 / -3 lines changed
Commit: userstory538972
Changes:
Before
After
title: Sync local partner accounts to cloud as B2B users
description: Give locally managed external partners access to both local and cloud resources using the same credentials with Microsoft Entra B2B collaboration.
ms.topic: how-to
ms.date: 11/17/2025
ms.custom: it-pro
ms.collection: M365-identity-device-management
# Customer intent: As an IT admin managing partner accounts in a hybrid organization, I want to sync partner accounts from our on-premises directory to the cloud using Microsoft Entra Connect, so that our partners can access the resources they need with the same sign-in credentials for both on-premises and cloud resources.
---
 
 
Before Microsoft Entra ID, organizations with on-premises identity systems have managed partner accounts in their on-premises directory. In such an organization, when you start to move apps to Microsoft Entra ID, you want to make sure your partners can access the resources they need. It shouldn't matter whether the resources are on-premises or in the cloud. Also, you want your partner users to be able to use the same sign-in credentials for both on-premises and Microsoft Entra resources.
 
If you create accounts for your external partners in your on-premises directory (for example, you create an account with a sign-in name of "msullivan" for an external user named Maria Sullivan in your partners.contoso.com domain), you can now sync these accounts to the cloud. Specifically, you can use [Microsoft Entra Connect](~/identity/hybrid/connect/whatis-azure-ad-connect.md) to sync the partner accounts to the cloud, which creates a user account with UserType = Guest. This configuration enables your partner users to access cloud resources using the same credentials as their local accounts, without giving them more access than they need. For more information about converting local guest accounts, see [Convert local guest accounts to Microsoft Entra B2B guest accounts](~/architecture/10-secure-local-guest.md).
 
> [!NOTE]
> See also how to [invite internal users to B2B collaboration](invite-internal-users.md). With this feature, you can invite internal guest users to use B2B collaboration, regardless of whether you've synced their accounts from your on-premises directory to the cloud. Once the user accepts the invitation to use B2B collaboration, they'll be able to use their own identities and credentials to sign in to the resources you want them to access. You won’t need to maintain passwords or manage account lifecycles.
 
## Identify unique attributes for UserType
 
 
title: Sync local partner accounts to cloud as B2B users
description: Give locally managed external partners access to both local and cloud resources using the same credentials with Microsoft Entra B2B collaboration.
ms.topic: how-to
ms.date: 04/24/2026
ms.custom: it-pro
ms.collection: M365-identity-device-management
ai-usage: ai-assisted
# Customer intent: As an IT admin managing partner accounts in a hybrid organization, I want to sync partner accounts from our on-premises directory to the cloud using Microsoft Entra Connect, so that our partners can access the resources they need with the same sign-in credentials for both on-premises and cloud resources.
---
 
 
Before Microsoft Entra ID, organizations with on-premises identity systems have managed partner accounts in their on-premises directory. In such an organization, when you start to move apps to Microsoft Entra ID, you want to make sure your partners can access the resources they need. It shouldn't matter whether the resources are on-premises or in the cloud. Also, you want your partner users to be able to use the same sign-in credentials for both on-premises and Microsoft Entra resources.
 
If you create accounts for your external partners in your on-premises directory (for example, you create an account with a sign-in name of "msullivan" for an external user named Maria Sullivan in your partners.contoso.com domain), you can now sync these accounts to the cloud. Specifically, you can use [Microsoft Entra Connect](~/identity/hybrid/connect/whatis-azure-ad-connect.md) to sync partner accounts to the cloud, which creates a user account with UserType = Guest. This configuration enables partner users to access cloud resources by using the same credentials as their local accounts, without giving them more access than they need. For more information about converting local guest accounts, see [Convert local guest accounts to Microsoft Entra B2B guest accounts](~/architecture/10-secure-local-guest.md).
 
> [!NOTE]
> See also [Invite internal users to B2B collaboration](invite-internal-users.md). With this feature, you can invite internal guest users to use B2B collaboration, regardless of whether you've synced their accounts from your on-premises directory to the cloud. Once the user accepts the invitation, they can use their own identities and credentials to sign in to the resources you want them to access. You won't need to maintain passwords or manage account lifecycles.
 
## Identify unique attributes for UserType
 
+0 / -6 lines changed
Commit: remove the licensing requirements from the page
Changes:
Before
After
- **Managed identities**: Configuring token lifetimes for [managed identity service principals](~/identity/managed-identities-azure-resources/overview.md) isn't supported.
- **Refresh & session token lifetimes**: Refresh and session token lifetimes are no longer configurable through token lifetime policies. Microsoft Entra ID uses only the default values described below. To control how frequently users are required to sign in, use [Conditional Access sign-in frequency](~/identity/conditional-access/howto-conditional-access-session-lifetime.md) instead.
 
## License requirements
 
Using this feature requires a Microsoft Entra ID P1 license. To find the right license for your requirements, see [Comparing generally available features of the Free and Premium editions](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing).
 
Customers with [Microsoft 365 Business licenses](/office365/servicedescriptions/office-365-service-descriptions-technet-library) also have access to Conditional Access features.
 
## Token lifetime policies for access, SAML, and ID tokens
 
You can set token lifetime policies for access tokens, SAML tokens, and ID tokens.
- **Managed identities**: Configuring token lifetimes for [managed identity service principals](~/identity/managed-identities-azure-resources/overview.md) isn't supported.
- **Refresh & session token lifetimes**: Refresh and session token lifetimes are no longer configurable through token lifetime policies. Microsoft Entra ID uses only the default values described below. To control how frequently users are required to sign in, use [Conditional Access sign-in frequency](~/identity/conditional-access/howto-conditional-access-session-lifetime.md) instead.
 
## Token lifetime policies for access, SAML, and ID tokens
 
You can set token lifetime policies for access tokens, SAML tokens, and ID tokens.
 
 
 
 
 
 
Modified by TheWriteDoc on Apr 24, 2026 7:40 PM
πŸ“– View on learn.microsoft.com
+3 / -2 lines changed
Commit: userstory538972
Changes:
Before
After
title: Limitations of B2B collaboration
description: Current limitations for Microsoft Entra B2B collaboration
ms.topic: concept-article
ms.date: 04/15/2025
 
ms.collection: content-health, M365-identity-device-management
 
#Customer intent: As a user of Microsoft Entra B2B collaboration, I want to understand the limitations and potential issues with the platform, so that I can effectively manage and troubleshoot any authentication or replication problems that may arise.
---
 
# Limitations of Microsoft Entra B2B collaboration
 
title: Limitations of B2B collaboration
description: Current limitations for Microsoft Entra B2B collaboration
ms.topic: concept-article
ms.date: 04/24/2026
 
ms.collection: content-health, M365-identity-device-management
ai-usage: ai-assisted
 
# Customer intent: As a user of Microsoft Entra B2B collaboration, I want to understand the current platform limitations so that I can effectively manage and troubleshoot authentication or replication issues.
---
 
# Limitations of Microsoft Entra B2B collaboration
Modified by TheWriteDoc on Apr 24, 2026 7:40 PM
πŸ“– View on learn.microsoft.com
+3 / -2 lines changed
Commit: userstory538972
Changes:
Before
After
title: Microsoft Entra External ID Overview
description: Compare solutions for using Microsoft Entra External ID to work with people outside your organization, including B2B collaboration and Azure AD B2C.
ms.topic: overview
ms.date: 01/30/2026
 
ms.collection: M365-identity-device-management
#customer intent: As a developer who creates apps for consumers and business customers, I want to understand the capabilities of Microsoft Entra External ID so that I can manage my customers' identity experiences and allow them to use their own credentials to sign in.
---
 
# Introduction to Microsoft Entra External ID
 
title: Microsoft Entra External ID Overview
description: Compare solutions for using Microsoft Entra External ID to work with people outside your organization, including B2B collaboration and Azure AD B2C.
ms.topic: overview
ms.date: 04/24/2026
 
ms.collection: M365-identity-device-management
ai-usage: ai-assisted
# Customer intent: As a developer who creates apps for consumers and business customers, I want to understand the capabilities of Microsoft Entra External ID so that I can manage my customers' identity experiences and allow them to use their own credentials to sign in.
---
 
# Introduction to Microsoft Entra External ID
Modified by Dickson Mwendia on Apr 24, 2026 6:11 AM
πŸ“– View on learn.microsoft.com
+2 / -2 lines changed
Commit: Add recommendations for using form_post
Changes:
Before
After
| `redirect_uri` | Recommended | The redirect URI of your app, where authentication responses can be sent and received by your app. It must exactly match one of the redirect URIs you registered in the portal, except that it must be URL-encoded. If not present, the endpoint picks one registered `redirect_uri` at random to send the user back to. |
| `scope` | Required | A space-separated list of scopes. For OpenID Connect, it must include the scope `openid`, which translates to the **Sign you in** permission in the consent UI. You might also include other scopes in this request for requesting consent. |
| `nonce` | Required | A value generated and sent by your app in its request for an ID token. The same `nonce` value is included in the ID token returned to your app by the Microsoft identity platform. To mitigate token replay attacks, your app should verify the `nonce` value in the ID token is the same value it sent when requesting the token. The value is typically a unique, random string. |
| `response_mode` | Recommended | Specifies the method that should be used to send the resulting authorization code back to your app. Can be `form_post` or `fragment`. For web applications, we recommend using `response_mode=form_post`, to ensure the most secure transfer of tokens to your application. |
| `state` | Recommended | A value included in the request that is also returned in the token response. It can be a string of any content you want. A randomly generated unique value typically is used to [prevent cross-site request forgery attacks](https://tools.ietf.org/html/rfc6749#section-10.12). The state also is used to encode information about the user's state in the app before the authentication request occurred, such as the page or view the user was on. |
| `prompt` | Optional | Indicates the type of user interaction that is required. The only valid values at this time are `login`, `none`, `consent`, and `select_account`. The `prompt=login` claim forces the user to enter their credentials on that request, which negates single sign-on. The `prompt=none` parameter is the opposite, and should be paired with a `login_hint` to indicate which user must be signed in. These parameters ensure that the user isn't presented with any interactive prompt at all. If the request can't be completed silently via single sign-on, the Microsoft identity platform returns an error. Causes include no signed-in user, the hinted user isn't signed in, or multiple users are signed in but no hint was provided. The `prompt=consent` claim triggers the OAuth consent dialog after the user signs in. The dialog asks the user to grant permissions to the app. Finally, `select_account` shows the user an account selector, negating single sign-out but allowing the user to pick which account they intend to sign in with, without requiring credential entry. You can't use both `login_hint` and `select_account`.|
| `login_hint` | Optional | You can use this parameter to prefill the username and email address field of the sign-in page for the user, if you know the username ahead of time. Often, apps use this parameter during reauthentication, after already extracting the `login_hint` [optional claim](./optional-claims.md) from an earlier sign-in. |
client_id=00001111-aaaa-2222-bbbb-3333cccc4444 // Your app registration's Application (client) ID
&response_type=id_token%20token // Requests both an ID token and access token
&redirect_uri=http%3A%2F%2Flocalhost%2Fmyapp%2F // Your application's redirect URI (URL-encoded)
&response_mode=form_post // 'form_post' or 'fragment'
&scope=openid+profile+email // 'openid' is required; 'profile' and 'email' provide information in the UserInfo endpoint as they do in an ID token.
&state=12345 // Any value - provided by your app
&nonce=678910 // Any value - provided by your app
| `redirect_uri` | Recommended | The redirect URI of your app, where authentication responses can be sent and received by your app. It must exactly match one of the redirect URIs you registered in the portal, except that it must be URL-encoded. If not present, the endpoint picks one registered `redirect_uri` at random to send the user back to. |
| `scope` | Required | A space-separated list of scopes. For OpenID Connect, it must include the scope `openid`, which translates to the **Sign you in** permission in the consent UI. You might also include other scopes in this request for requesting consent. |
| `nonce` | Required | A value generated and sent by your app in its request for an ID token. The same `nonce` value is included in the ID token returned to your app by the Microsoft identity platform. To mitigate token replay attacks, your app should verify the `nonce` value in the ID token is the same value it sent when requesting the token. The value is typically a unique, random string. |
| `response_mode` | Recommended | Specifies the method that should be used to send the resulting authorization code back to your app. Can be `form_post` or `fragment`. For web applications, we recommend using `response_mode=form_post`, to ensure the most secure transfer of tokens to your application. <br><br> Using `form_post` is also recommended for reliability. When you use `fragment`, the response is returned in the URL, which is subject to a 2,048-character length limit. If the token payload exceeds this limit, the response can be truncated, causing authentication failures. Using `form_post` avoids this limitation because tokens are sent in the HTTP request body instead of the URL. |
| `state` | Recommended | A value included in the request that is also returned in the token response. It can be a string of any content you want. A randomly generated unique value typically is used to [prevent cross-site request forgery attacks](https://tools.ietf.org/html/rfc6749#section-10.12). The state also is used to encode information about the user's state in the app before the authentication request occurred, such as the page or view the user was on. |
| `prompt` | Optional | Indicates the type of user interaction that is required. The only valid values at this time are `login`, `none`, `consent`, and `select_account`. The `prompt=login` claim forces the user to enter their credentials on that request, which negates single sign-on. The `prompt=none` parameter is the opposite, and should be paired with a `login_hint` to indicate which user must be signed in. These parameters ensure that the user isn't presented with any interactive prompt at all. If the request can't be completed silently via single sign-on, the Microsoft identity platform returns an error. Causes include no signed-in user, the hinted user isn't signed in, or multiple users are signed in but no hint was provided. The `prompt=consent` claim triggers the OAuth consent dialog after the user signs in. The dialog asks the user to grant permissions to the app. Finally, `select_account` shows the user an account selector, negating single sign-out but allowing the user to pick which account they intend to sign in with, without requiring credential entry. You can't use both `login_hint` and `select_account`.|
| `login_hint` | Optional | You can use this parameter to prefill the username and email address field of the sign-in page for the user, if you know the username ahead of time. Often, apps use this parameter during reauthentication, after already extracting the `login_hint` [optional claim](./optional-claims.md) from an earlier sign-in. |
client_id=00001111-aaaa-2222-bbbb-3333cccc4444 // Your app registration's Application (client) ID
&response_type=id_token%20token // Requests both an ID token and access token
&redirect_uri=http%3A%2F%2Flocalhost%2Fmyapp%2F // Your application's redirect URI (URL-encoded)
&response_mode=form_post // 'form_post' (recommended) or 'fragment'. form_post avoids URL length limits.
&scope=openid+profile+email // 'openid' is required; 'profile' and 'email' provide information in the UserInfo endpoint as they do in an ID token.
&state=12345 // Any value - provided by your app
&nonce=678910 // Any value - provided by your app
Modified by Carolyn McSharry on Apr 24, 2026 9:45 AM
πŸ“– View on learn.microsoft.com
+1 / -1 lines changed
Commit: Correct login instruction for Shopify Plus admin
Changes:
Before
After
 
## Step 2: Configure Shopify Plus to support provisioning with Microsoft Entra ID
 
1. Login to [Shopify Plus organization admin](https://shopify.plus). Navigate to **Users > Security**.
 
1. Navigate to the **SCIM Integration** section, select **Generate API token**.
 
 
## Step 2: Configure Shopify Plus to support provisioning with Microsoft Entra ID
 
1. Log in to [Shopify Plus organization admin](https://shopify.plus). Navigate to **Users > Security**.
 
1. Navigate to the **SCIM Integration** section, select **Generate API token**.
 
Modified by Carolyn McSharry on Apr 24, 2026 9:43 AM
πŸ“– View on learn.microsoft.com
+1 / -1 lines changed
Commit: Change 'allowlist' to 'allow list' in tutorial
Changes:
Before
After
 
If you still can't resolve your problem, contact ServiceNow support, and ask them to turn on SOAP debugging to help troubleshoot.
 
- The Microsoft Entra provisioning service currently operates under particular [IP ranges](~/identity/app-provisioning/use-scim-to-provision-users-and-groups.md#ip-ranges). If necessary, you can restrict other IP ranges and add these particular IP ranges to the allowlist of your application. That technique will allow traffic flow from the Microsoft Entra provisioning service to your application.
 
- Self-hosted ServiceNow instances aren't supported.
 
 
If you still can't resolve your problem, contact ServiceNow support, and ask them to turn on SOAP debugging to help troubleshoot.
 
- The Microsoft Entra provisioning service currently operates under particular [IP ranges](~/identity/app-provisioning/use-scim-to-provision-users-and-groups.md#ip-ranges). If necessary, you can restrict other IP ranges and add these particular IP ranges to the allow list of your application. That technique will allow traffic flow from the Microsoft Entra provisioning service to your application.
 
- Self-hosted ServiceNow instances aren't supported.