Skip to content

Commit e49c1e0

Browse files
Merge pull request #53392 from MicrosoftDocs/main
Auto Publish – main to live - 2026-02-08 00:00 UTC
2 parents 2b431c4 + 244b3af commit e49c1e0

142 files changed

Lines changed: 4796 additions & 1138 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -115,6 +115,11 @@
115115
"redirect_url": "https://learn.microsoft.com/azure/?product=popular",
116116
"redirect_document_id": false
117117
},
118+
{
119+
"source_path": "learn-pr/device-partner-university/introduction-to-entra-id/9-entra-id-autopilot.yml",
120+
"redirect_url": "/training/modules/introduction-to-entra-id/9-tenant-id",
121+
"redirect_document_id": false
122+
},
118123
{
119124
"source_path_from_root": "/learn-pr/azure/gain-insights-data-kusto-query-language/10-knowledge-check.yml",
120125
"redirect_url": "https://learn.microsoft.com/azure/?product=popular",

learn-pr/device-partner-university/introduction-to-entra-id/9-entra-id-autopilot.yml renamed to learn-pr/device-partner-university/introduction-to-entra-id/9-tenant-id.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
### YamlMime:ModuleUnit
2-
uid: learn.dpu.introduction-to-entra-id.entra-id-autopilot
3-
title: Entra ID and Autopilot
2+
uid: learn.dpu.introduction-to-entra-id.tenant-id
3+
title: Microsoft Entra tenants and tenant IDs
44
metadata:
5-
title: Entra ID And Autopilot
5+
title: Microsoft Entra Tenants and Tenant IDs
66
description: This content is part of the "Introduction to Microsoft Entra ID" module.
77
ms.date: 08/28/2025
88
author: Stephanie-Rosenzweig
99
ms.author: v-stephanier
1010
ms.topic: unit
1111
durationInMinutes: 1
1212
content: |
13-
[!include[](includes/9-entra-id-autopilot.md)]
13+
[!include[](includes/9-tenant-id.md)]

learn-pr/device-partner-university/introduction-to-entra-id/includes/10-device-identities.md

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ There are three primary methods for acquiring a device identity. These methods c
88

99
### Entra registration
1010

11-
[Entra registration](/entra/identity/devices/concept-device-registration) enables employees to securely connect personal devices to organizational resources. This method is intended for bring-your-own-device (BYOD) scenarios. Devices can be registered with Entra ID without requiring an organizational account for device sign-in.
11+
[Entra registration](/entra/identity/devices/concept-device-registration) enables employees to securely connect personal devices to organizational resources. This method is intended for bring-your-own-device (BYOD) scenarios. Devices can be registered with Entra ID without requiring users to sign in to the device with an organizational account. The device is still associated with the organization and can be managed through Entra ID and Conditional Access policies.
1212

1313
Instead, users may sign in using a local account, such as a Microsoft account, on Windows 10 or later. Once registered, the device is associated with an Entra account, which governs access to organizational resources. Access can be restricted based on Conditional Access policies applied to the device identity.
1414

@@ -21,14 +21,26 @@ Entra registration can occur automatically when a user accesses a work applicati
2121
2222
### Entra join
2323

24-
[Entra Join](/entra/identity/devices/concept-directory-join) allows organizations to deployed devices that are recognized and managed by Entra ID. This method is suitable for organizations of any size or industry and is compatible with hybrid environments.
24+
[Entra Join](/entra/identity/devices/concept-directory-join) allows organizations to register devices with Microsoft Entra ID, so the devices are recognized as part of the organization. This method is suitable for organizations of any size or industry and is compatible with hybrid environments.
2525

2626
Entra joined devices authenticate through Entra ID rather than a traditional domain controller. Access to resources is governed by the Entra account and Conditional Access policies applied to the device.
2727

28-
For implementation guidance, refer to [implementing Entra join](/entra/identity/devices/device-join-plan) on Microsoft Docs.
28+
For implementation guidance, refer to [implementing Entra join](/entra/identity/devices/device-join-plan) on Microsoft Learn.
29+
30+
> [!NOTE]
31+
> Entra Join itself does not manage device settings or policies. Management of the device’s configuration and security is handled by tools such as Microsoft Intune or Configuration Manager.
32+
33+
### Autopilot device registration
34+
35+
When a device is registered through Windows Autopilot, it's recognized as a corporate-owned device. This ensures that Autopilot profiles that mandate settings, like device naming conventions and whether the user is a local administrator, are applied automatically during provisioning.
36+
37+
> [!NOTE]
38+
> Autopilot registration does not by itself control access to apps or services—it simply identifies the device as corporate‑owned and applies the assigned Autopilot provisioning settings.
39+
40+
Without a valid Entra device identity—whether through Entra Join, Entra Hybrid Join, or Entra registration—features such as multifactor authentication (MFA) and single sign-on (SSO) won’t function properly. As a result, users may be unable to authenticate or access organizational resources.
2941

3042
### Entra hybrid join
3143

32-
[Entra hybrid join](/entra/identity/devices/concept-hybrid-join) is a transitional approach for organizations with existing Active Directory (AD) infrastructures are connected to an on-premises AD and registered with Entra ID, enabling access to selected cloud capabilities. These devices require periodic network connectivity to on-premises domain controllers. If maintaining this connection is a concern, organizations should consider transitioning to Entra join.
44+
[Entra hybrid joined devices](/entra/identity/devices/concept-hybrid-join) are connected to an on-premises Active Directory (AD) and registered with Microsoft Entra ID. This transitional approach enables organizations to maintain existing on-premises processes while gaining access to selected cloud capabilities. These devices require periodic network connectivity to on-premises domain controllers. Organizations should consider accelerating their journey to cloud-native Windows and adopting Entra join sooner rather than later, even if maintaining connectivity to on-premises Active Directory is not a concern.
3345

3446
For implementation guidance, refer to [implementing Entra hybrid join](/entra/identity/devices/hybrid-join-plan).

learn-pr/device-partner-university/introduction-to-entra-id/includes/11-how-use-entra-id.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ For more information, refer to the documentation on [member and guest users](/en
5353

5454
## Directions for groups
5555

56-
Microsoft Entra groups are used to manage collections of users who require the same access permissions to organizational resources, such as restricted applications and services. Group-based access management allows resource owners or Entra directory administrators to assign a consistent set of permissions to all members of a group.
56+
Microsoft Entra groups can include users or devices and are used to simplify access and management. For users, groups allow administrators or resource owners to assign consistent access permissions to organizational resources, such as applications and services. For devices, groups are primarily used to target policies from tools like Microsoft Intune, Microsoft Defender for Endpoint (MDE), or Microsoft Purview. User groups can also be used to target management policies, just like device groups.
5757

5858
Administrators can also delegate group membership management to designated individuals, such as department managers or help desk personnel. These delegated users can add or remove group members as needed.
5959

learn-pr/device-partner-university/introduction-to-entra-id/includes/3-strong-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Single sign-on (SSO) enables users to authenticate once and gain access to multiple applications without repeated credential entry. This approach simplifies access and reduces password fatigue, contributing to improved security and user efficiency.
22

3-
Multifactor authentication (MFA) enhances security by requiring two or more verification factors during sign-in. For example, users may be prompted to provide both a password and a biometric identifier or a time-based code from an authenticator application. MFA mitigates risks associated with compromised credentials by enforcing additional verification steps.
3+
Multifactor authentication (MFA) enhances security by requiring two or more verification factors during sign-in. For example, users might enter a password and then confirm the sign-in using the Microsoft Authenticator app on their smartphone or a FIDO2 security key, or a biometric factor such as a fingerprint or facial recognition. MFA helps reduce the risk of compromised credentials by requiring additional verification beyond a username and password.
44

55
Microsoft Entra ID supports passwordless authentication through alternative methods such as biometrics via Windows Hello for Business, time-based codes from the Microsoft Authenticator app, and FIDO2 security keys. These methods reduce reliance on passwords and lower the risk of credential theft.
66

learn-pr/device-partner-university/introduction-to-entra-id/includes/4-risk-based-conditional-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
1-
Conditional Access in Microsoft Entra ID uses signals from various sources—including IP location and real-time risk detection—to evaluate access requests and enforce organizational policies. Based on these signals, the system can grant or deny access or require additional verification steps to ensure that only authorized users under appropriate conditions can access sensitive resources.
1+
Conditional Access in Microsoft Entra ID uses signals from various sources—including IP location, device compliance status, and real-time risk detection—to evaluate access requests and enforce organizational policies. Based on these signals, the system can grant or deny access or require additional verification steps to ensure that only authorized users under appropriate conditions can access sensitive resources.
22

33
## Define access criteria
44

5-
Conditional Access policies operate as logical if-then statements. For example, if a user attempts to access a resource such as Microsoft 365, then they must complete a specified action, such as multifactor authentication (MFA).
5+
Conditional Access policies operate as logical if-then statements. For example, if a user attempts to access a resource such as Microsoft 365, then they—or the device they are using—must meet specific, pre-defined criteria, such as completing multifactor authentication (MFA), using a compliant device, or accessing from a trusted location.
66

77
Administrators can configure these policies manually or use predefined templates available in the Microsoft Entra admin center. Policies can also be created programmatically using the Microsoft Graph API.
88

learn-pr/device-partner-university/introduction-to-entra-id/includes/6-recommendations.md

Lines changed: 21 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,10 @@ Organizations aren't required to replace all existing devices immediately. Howev
44

55
As a transitional step toward full cloud enablement, existing devices can be enrolled in co-management and connected to cloud identities using Entra hybrid join.
66

7-
Entra hybrid joined devices are simultaneously connected to an on-premises Active Directory (AD) and registered with Microsoft Entra ID. This configuration allows organizations to use selected cloud features while maintaining compatibility with existing infrastructure.
7+
> [!NOTE]
8+
> Co-management is when a device is managed simultaneously by both Microsoft Configuration Manager and Microsoft Intune. This allows organizations to gradually shift device management to the cloud while maintaining existing on-premises controls. Co-management provides flexibility to choose which workloads are managed by Intune versus Configuration Manager, enables pilot testing with select devices, and unlocks cloud-powered capabilities such as Conditional Access and modern provisioning with Windows Autopilot.
9+
10+
Entra hybrid joined devices are simultaneously connected to an on-premises Active Directory (AD) and registered with Microsoft Entra ID. This configuration allows organizations to use selected cloud features while maintaining existing processes and progressing on their cloud journey.
811

912
When organizations are ready to upgrade hardware, they can transition to new or refurbished cloud-native devices.
1013

@@ -16,33 +19,22 @@ These devices are provisioned using Windows Autopilot, joined directly to Entra
1619
>
1720
>The recommended approach is to integrate devices with Microsoft Entra ID and manage them using cloud-based tools. This enables organizations to optimize resource management, improve operational efficiency, and maintain competitiveness.
1821
22+
The recommended approach is to integrate devices with Microsoft Entra ID and manage them using cloud-based tools. This enables organizations to optimize resource management, improve operational efficiency, and maintain competitiveness. Entra join doesn't prevent access to on-premises resources, and organizations transitioning to cloud-native Windows can continue to use on-premises Active Directory for applications or services that require it.
23+
1924
## User scenarios
2025

21-
Use Entra join when you're:
22-
23-
- Transitioning to cloud-based infrastructure using Microsoft Entra ID and Microsoft Intune.
24-
- Managing mobile devices such as tablets and smartphones where on-premises domain join isn't feasible.
25-
- Providing access for users who primarily utilize Microsoft 365 or other SaaS applications integrated with Entra ID.
26-
- Managing user groups directly in Entra ID rather than Active Directory (AD), which is beneficial for roles such as seasonal workers, contractors, or students.
27-
- Enabling device join capabilities for remote or home-based workers with limited access to on-premises infrastructure.
28-
- Provisioning new or reset devices using Windows Autopilot, supporting scenarios such as drop-shipping, self-service setup, and accelerated deployment timelines.
29-
30-
Use Entra hybrid join when you:
31-
32-
- Require continued use of Group Policy for device configuration management.
33-
- Intend to maintain existing imaging-based deployment processes.
34-
- Have legacy Win32 applications that rely on AD-based machine authentication.
35-
36-
| Feature / aspect | Entra Join (Azure AD Join) | Entra Hybrid Join (Hybrid Azure AD Join) |
37-
|----------------------------------|----------------------------------------------------------|------------------------------------------------------------|
38-
| Target devices | Devices owned by the organization, typically cloud-first | Domain-joined devices managed on-premises |
39-
| Primary use case | Cloud-native environments | Organizations with existing on-premises Active Directory |
40-
| Device ownership | Organization-owned or BYOD | Organization-owned |
41-
| Directory dependency | Microsoft Entra ID only | Requires both on-premises AD and Microsoft Entra ID |
42-
| Join process | Joined directly to Entra ID during setup | Joined to on-premises AD first, then registered with Entra ID |
43-
| Management tools | Intune, Endpoint Manager | Group Policy, SCCM, Intune |
44-
| User sign-in experience | Entra ID credentials | AD credentials (with Entra ID token sync) |
45-
| SSO (single sign-on) | Full SSO to cloud resources | SSO to both on-premises and cloud resources |
46-
| Conditional access support | Full support | Full support |
47-
| Windows Autopilot support | Fully supported | Limited (requires additional configuration) |
48-
| Best for | Cloud-first or cloud-only organizations | Hybrid environments transitioning to cloud |
26+
Entra join is the preferred choice for connecting devices to Microsoft Entra ID. It supports cloud-first management, enables modern provisioning with Windows Autopilot, and integrates seamlessly with Microsoft Intune and Microsoft 365 applications.
27+
28+
That said, some devices or environments might require on-premises or hybrid join, such as:
29+
30+
- Air-gapped networks or devices.
31+
- Devices running applications with nonstandard authentication mechanisms that depend on on-premises Active Directory.
32+
- Organizational or regulatory requirements that mandate on-premises management.
33+
34+
Using on-premises or hybrid join for a subset of devices doesn't limit your entire environment. Organizations can mix device join types as needed while keeping Entra join as the default.
35+
36+
| Feature / aspect | Entra Join (Azure AD Join) | Entra Hybrid Join (Hybrid Azure AD Join) |
37+
| -------------------------- | -------------------------- | ----------------------------------------- |
38+
| User sign-in experience | Entra ID credentials | AD credentials (with Entra ID token sync) |
39+
| Conditional Access support | Full support | Full support |
40+
| Windows Autopilot support | Fully supported | Limited (generally **not recommended**) |

learn-pr/device-partner-university/introduction-to-entra-id/includes/9-entra-id-autopilot.md

Lines changed: 0 additions & 13 deletions
This file was deleted.
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
Azure subscriptions have a trust relationship with Microsoft Entra ID, which authenticates users, services, and devices. Each subscription is linked to a specific Microsoft Entra tenant, identified by a unique tenant ID. There are several ways to [find the tenant ID](/entra/fundamentals/how-to-find-tenant#find-tenant-id-through-the-microsoft-entra-admin-center) associated with an Azure subscription. For guidance on [how to create a new tenant](/entra/identity-platform/quickstart-create-new-tenant#create-a-new-microsoft-entra-tenant), refer to the Microsoft Entra documentation.
2+
3+
## Helpful definitions
4+
5+
An [Entra tenant](/microsoft-365/education/deploy/intro-azure-active-directory#what-is-a-microsoft-entra-tenant) is a security boundary under an organization’s control. Within this boundary, administrators can manage directory objects (such as users and groups) and configure tenant-wide settings.
6+
7+
A [service principal](/entra/identity-platform/app-objects-and-service-principals?toc=%2Fazure%2Factive-directory%2Fworkload-identities%2Ftoc.json&bc=%2Fazure%2Factive-directory%2Fworkload-identities%2Fbreadcrumb%2Ftoc.json&tabs=browser#service-principal-object) represents an application’s identity in a Microsoft Entra tenant. It defines the permissions and access policies the application uses to authenticate and access resources. Service principals are commonly used when apps or automation tools need to securely access Microsoft cloud services without requiring a user to sign in.

0 commit comments

Comments
 (0)