You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/introduction-entra-agent-id/includes/1-introduction.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,11 @@ Each of these agents needs an identity to authenticate and access resources secu
15
15
16
16
Microsoft Entra Agent ID addresses these challenges by providing specialized identity types designed for AI agents.
17
17
18
+
## Availability
19
+
20
+
> [!NOTE]
21
+
> Microsoft Entra Agent ID is part of **Microsoft Agent 365**.
22
+
18
23
## Content description
19
24
20
25
In this module, you learn about Microsoft Entra Agent ID and how it differs from other identity types like service principals and managed identities. You explore which Microsoft products automatically create agent identities and how to view and manage them through the Microsoft Entra admin center. You also learn about the roles required to manage agent identities and how to query them programmatically using Microsoft Graph.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/introduction-entra-agent-id/includes/4-navigate-admin-center-view-agents.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,8 @@
1
1
The Microsoft Entra admin center provides a centralized interface to view and manage your agent identities. This experience allows you to search, filter, sort, and take actions on agent identities across your organization.
2
2
3
+
> [!IMPORTANT]
4
+
> The **Agent ID** menu in the Microsoft Entra admin center is only visible if your tenant has Microsoft Entra Agent ID enabled through **Microsoft Agent 365**. This requires a Microsoft 365 Copilot license with the Frontier program enabled. If you don't see the Agent ID section, contact your administrator to verify licensing and Frontier access.
5
+
3
6
## Prerequisites for viewing agent identities
4
7
5
8
To view agent identities in your Microsoft Entra tenant, you need:
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/introduction-entra-agent-id/includes/5-understand-access-permissions.md
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,9 +21,11 @@ To manage agent identities (create, update, disable, delete), you need one of th
21
21
22
22
### Roles for creating agent identity blueprints
23
23
24
-
To create agent identity blueprints, you need:
25
-
-**Agent ID Developer** role or **Agent ID Administrator** role
26
-
-**Privileged Role Administrator** role (required to grant certain permissions to blueprints)
24
+
Creating agent identity blueprints requires different roles depending on the type of permissions being configured:
25
+
26
+
-**Agent ID Developer** or **Agent ID Administrator** — to create blueprints and blueprint principals
27
+
-**Privileged Role Administrator** — required to grant Microsoft Graph **application** permissions to the blueprint (used for autonomous, app-only agent scenarios)
28
+
-**Cloud Application Administrator** or **Application Administrator** — required to grant Microsoft Graph **delegated** permissions to the blueprint (used for interactive agents acting on behalf of a user)
|**Blueprint**|`agentIdentityBlueprint`| v1.0 (GA) | Template defining the agent identity type and permissions |
21
+
|**Blueprint principal**|`agentIdentityBlueprintPrincipal`| v1.0 (GA) | Record of blueprint's addition to a tenant |
22
+
|**Agent identity**|`agentIdentity`| v1.0 (GA) | Primary identity for authentication |
23
+
|**Agent user**|`agentUser`| Beta only | Optional account for scenarios requiring a user object |
24
+
|**Agent registry**|`agentRegistry`| Beta only | Centralized repository for agent management |
25
+
26
+
> [!WARNING]
27
+
> The `agentUser` and `agentRegistry` resources are only available under the Microsoft Graph `/beta` endpoint. Beta APIs are subject to change and are not supported for use in production applications.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/introduction-entra-agent-id/index.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ metadata:
4
4
title: Introduction to Microsoft Entra Agent ID
5
5
description: "Learn about Microsoft Entra Agent ID, a specialized identity type designed for AI agents. Understand how agent identities differ from other identity types, which Microsoft products use them, and how to view and manage them in the Microsoft Entra admin center."
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/plan-implement-administer-conditional-access/includes/1-introduction.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
Conditional Access gives a fine granularity of control over which users can perform specific activities, access resources, and ensure data and systems are safe.
1
+
Conditional Access gives a fine granularity of control over which users and identities can perform specific activities, access resources, and ensure data and systems are safe. With the introduction of Microsoft Entra Agent ID control, now extends to AI agents—you apply the same Zero Trust principles to agent identities that you apply to users and workload identities.
2
2
3
3
## Learning objectives
4
4
@@ -11,3 +11,4 @@ In this module, you will:
11
11
- Implement application controls.
12
12
- Implement session management.
13
13
- Configure continuous access evaluation.
14
+
- Identify how agent identities are protected using Conditional Access.
Managing security can be difficult with common identity-related attacks like password spray, replay, and phishing becoming more and more popular. Security defaults provide secure default settings that Microsoft manages on behalf of organizations to keep customers safe until organizations are ready to manage their own identity security story. Security defaults provide preconfigured security settings, such as:
1
+
Managing security can be difficult with common identity-related attacks like password spray, replay, and phishing becoming more popular. Security defaults provide secure default settings that Microsoft manages on behalf of organizations to keep customers safe until organizations are ready to manage their own identity security story. Security defaults provide preconfigured security settings, such as:
2
2
3
3
- Requiring all users to register for multifactor authentication.
4
4
- Requiring administrators to perform multifactor authentication.
@@ -10,53 +10,62 @@ Managing security can be difficult with common identity-related attacks like pas
10
10
11
11
## Availability
12
12
13
-
Microsoft security defaults are available to everyone. The goal is to ensure that all organizations have a basic level of security enabled at no extra cost. You turn on security defaults in the Azure portal. If your tenant was created on or after October 22, 2019, it is possible security defaults are already enabled in your tenant. To protect all of our users, the security defaults feature is being rolled out to all new tenants created.
13
+
Microsoft security defaults are available to everyone. The goal is to ensure that all organizations have a basic level of security enabled at no extra cost. If your tenant was created on or after October 22, 2019, security defaults might already be enabled. To protect all users, security defaults are enabled on all new tenants at creation.
14
+
15
+
To enable or disable security defaults, sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a Conditional Access Administrator, then browse to **Entra ID** > **Overview** > **Properties**, and select **Manage security defaults**.
14
16
15
17
### Who's it for?
16
18
17
19
|**Who should use security defaults?**|**Who shouldn't use security defaults?**|
| Organizations that want to increase their security posture but don't know how or where to start | Organizations currently using Conditional Access policies to bring signals together, make decisions, and enforce organizational policies |
20
-
| Organizations utilizing the free tier of Microsoft Entra ID Licensing |Organizations with Microsoft Entra ID Premium licenses |
22
+
| Organizations utilizing the free tier of Microsoft Entra ID Licensing |Organization with Microsoft Entra ID Premium licenses |
21
23
|| Organizations with complex security requirements that warrant using Conditional Access |
All users in your tenant must register for multifactor authentication (MFA) in the form of the Multifactor Authentication. Users have 14 days to register for multifactor authentication within Microsoft Entra ID by using the Microsoft Authenticator app. After the 14 days have passed, the user won't be able to sign in until registration is completed. A user's 14-day period begins after their first successful interactive sign-in after enabling security defaults.
29
+
All users in your tenant must register for multifactor authentication (MFA) using the Microsoft Authenticator app. Registration is required immediately—there's no grace period. When users sign in after security defaults are enabled, they're prompted to register before they can access any resources. The MFA prompt uses number matching, where users enter a number displayed on screen into the Microsoft Authenticator app, which helps prevent MFA fatigue attacks.
28
30
29
31
### Protecting administrators
30
32
31
-
Users with privileged access have increased access to your environment. Due to the power these accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification for sign-in. In Microsoft Entra ID, you can get a stronger account verification by requiring multifactor authentication.
33
+
Users with privileged access often increase access to your environment. Due to the power these accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification for sign-in. In Microsoft Entra ID, you can get a stronger account verification by requiring multifactor authentication.
32
34
33
-
After registration with Multifactor Authentication is finished, the following nine Microsoft Entra administrator roles will be required to perform additional authentication every time they sign in:
35
+
After registration with multifactor authentication is finished, the following Microsoft Entra administrator roles are required to perform other authentication every time they sign in:
34
36
35
37
- Global Administrator
36
-
- SharePoint Administrator
37
-
- Exchange Administrator
38
+
- Application Administrator
39
+
- Authentication Administrator
40
+
- Authentication Policy Administrator
41
+
- Billing Administrator
42
+
- Cloud Application Administrator
38
43
- Conditional Access Administrator
39
-
-Security Administrator
44
+
-Exchange Administrator
40
45
- Helpdesk Administrator
41
-
- Billing Administrator
46
+
- Identity Governance Administrator
47
+
- Password Administrator
48
+
- Privileged Authentication Administrator
49
+
- Privileged Role Administrator
50
+
- Security Administrator
51
+
- SharePoint Administrator
42
52
- User Administrator
43
-
- Authentication Administrator
44
53
45
54
### Protecting all users
46
55
47
56
We tend to think that administrator accounts are the only accounts that need extra layers of authentication. Administrators have broad access to sensitive information and can make changes to subscription-wide settings. But attackers frequently target end users.
48
57
49
58
After these attackers gain access, they can request access to privileged information on behalf of the original account holder. They can even download the entire directory to perform a phishing attack on your whole organization.
50
59
51
-
One common method to improve protection for all users is to require a stronger form of account verification, such as multifactor authentication, for everyone. After users complete Multifactor Authentication registration, they'll be prompted for additional authentication whenever necessary. This functionality protects all applications registered with Microsoft Entra ID, including SaaS applications.
60
+
One common method to improve protection for all users is to require a stronger form of account verification, such as multifactor authentication, for everyone. After users complete Multifactor Authentication registration, they'll be prompted for extra authentication whenever necessary. This functionality protects all applications registered with Microsoft Entra ID, including SaaS applications.
52
61
53
62
### Blocking legacy authentication
54
63
55
-
To give your users easy access to your cloud apps, Microsoft Entra ID supports a variety of authentication protocols, including legacy authentication. *Legacy authentication* is an authentication request made by:
64
+
To give your users easy access to your cloud apps, Microsoft Entra ID supports various authentication protocols, including legacy authentication. *Legacy authentication* is an authentication request made by:
56
65
57
66
- Clients that don't use modern authentication (for example, an Office 2010 client). Modern authentication encompasses clients that implement protocols, such as OAuth 2.0, to support features like multifactor authentication and smart cards. Legacy authentication typically only supports less secure mechanisms like passwords.
58
67
- Client that uses mail protocols such as IMAP, SMTP, or POP3.
59
68
60
-
Today, the majority of compromising sign-in attempts come from legacy authentication. Legacy authentication does not support multifactor authentication. Even if you have a multifactor authentication policy enabled on your directory, an attacker can authenticate by using an older protocol and bypass multifactor authentication.
69
+
Today, most compromising sign-in attempts come from legacy authentication. Legacy authentication doesn't support multifactor authentication. Even if you have a multifactor authentication policy enabled on your directory, an attacker can authenticate by using an older protocol and bypass multifactor authentication.
61
70
62
71
After security defaults are enabled in your tenant, all authentication requests made by an older protocol will be blocked. Security defaults blocks Exchange Active Sync basic authentication.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/plan-implement-administer-conditional-access/includes/4-plan-conditional-access-policies.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,6 +34,8 @@ Some common questions about assignments, access controls, and session controls:
34
34
- Access controls: Do you want to grant access to resources by implementing requirements such as MFA, devices marked as compliant, or Microsoft Entra hybrid joined devices?
35
35
- Session controls: Do you want to control access to cloud apps by implementing requirements such as app enforced permissions or Conditional Access App Control?
36
36
37
+
With the introduction of Microsoft Entra Agent ID, agent identities are now first-class principals in Microsoft Entra ID. Like users or service principals, agents can be targeted by Conditional Access policies — allowing you to apply the same Zero Trust controls to AI agents that you apply to human identities. You treat agent identities similarly to how you treat workload identities: scope policies by identity type, enforce appropriate access controls, and exclude emergency or trusted agents where necessary.
38
+
37
39
### Access token issuance
38
40
39
41
Access tokens enable clients to securely call protected web APIs, and they're used by web APIs to perform authentication and authorization. Per the OAuth specification, access tokens are opaque strings without a set format. Some identity providers (IDPs) use GUIDs; others use encrypted blobs. The Microsoft identity platform uses a variety of access token formats depending on the configuration of the API that accepts the token.
0 commit comments