In my previous post, I explained the core components and authentication flows of Microsoft Entra Agent ID. If you haven’t read it yet, I recommend doing so before continuing with Part 02, as those fundamentals provide the foundation for what follows. You can access it using https://www.rebeladmin.com/microsoft-entra-agent-id-part1/
In this blog post, I am going to talk about planning…
Many of you have probably seen Mission: Impossible Ghost Protocol. In the film, Ethan Hunt and his team operate with no official backing, no support, and no traceable authority. If they fail, the government denies their existence meaning there’s no audit trail and no accountability.
That’s how AI agents operated before Microsoft Entra Agent ID. They often relied on shared service…
Entra ID Entitlement Management access packages enable administrators to offer a self-service experience for users, granting access to groups, applications, and sites. With access packages, we can automate the processes of access assignment, reviews, and expiration for the aforementioned resources. Previously, I have written detailed blog posts explaining how to set up access packages. You can…
In my previous blog post, I explained how to use Entra ID lifecycle workflow to trigger actions based on user attribute changes. You can find the step-by-step guide here: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes. In that post, I used an attribute assigned to a set of users to define the workflow scope. Now, we can also use Custom Security Attributes…

