Overview
What is Microsoft Entra ID?Microsoft Entra ID documentation
Microsoft Azure Active Directory (Azure AD) is being renamed to Microsoft Entra ID. Use Microsoft Entra ID to manage user identities and control access to your apps, data, and resources.
Architecture Center
Manage user identities
Learn basic Microsoft Entra concepts and processes.
Learn basic Microsoft Entra architecture.
Create Microsoft Entra tenants, manage user accounts, roles, and groups, and assign app access.
Manage admin permissions and apply the principle of least privilege using Microsoft Entra role-based access control.
Manage just-in-time role assignments to limit access to secure information and resources.
Collaborate with partners using their own external identities (B2B).
Secure and customize sign-ins for your apps with our new customer identity and access management (CIAM) solution.
Business to consumers identity and access management for your app.
Create and manage user identities in applications by provisioning from Microsoft Entra ID.
Create a user identity that can access both on-premises and cloud resources.
Collaborate across tenants within your organization.
Control access
Control access to resources by enforcing policies based on user, location, device, and more.
Configure sign-in methods and security features like self-service password reset, MFA, and more.
Register and join devices to Microsoft Entra ID for device management and Conditional Access.
Automatically identify and address identity risks in your organization.
Apps, data, and resources
Develop, add, or connect an app to Microsoft Entra ID and manage access.
Build your app on the Microsoft identity platform and use Microsoft Entra ID as your authentication service.
Create an application identity that can connect to resources using Microsoft Entra authentication.
Move legacy apps to managed domains in the cloud while preserving user accounts, groups, and access.
Integrate cloud-enabled, software as a service (SaaS) apps with Microsoft Entra ID.
Monitor and audit
Protect, monitor, and audit access to critical assets throughout the identity and access lifecycles.
Use logs and reports to determine usage of your apps and services, detect risks, and troubleshoot issues.