Hey folks, I have to start with a massive shout-out to Morten Knudsen and his entire team at Experts Live Denmark where I’m just returning from.
Organizing an event for over 1,200+ attendees is no small feat, and they pulled it off with incredible energy and precision. It was easily one of the most impressive community gatherings I’ve been a part of.
Amidst that massive crowd, I had the privilege of co-leading a deep-dive Identity Masterclass alongside four exceptional Microsoft MVPs: Jan Vidar Elven, Pim Jacobs, Thomas Naunheim, and Klaus Bierschenk.
We weren’t sure what to expect, but the response was overwhelming. We had over 120 dedicated attendees who stayed with us for the full 7-hour session - diving deep into the weeds of Entra ID, governance, privileged access, Agent ID and more. Instead of theory-heavy slides, we built a practical, end-to-end governance story.
Because we believe this knowledge should be accessible, we are now giving away the labs for free so everyone can skill up, learn, and implement these patterns in their own environments.
Here’s the core of what we covered, and what you will learn in this podcast walk through of the labs and what you can try out yourself today!
Links to GitHub repo and YouTube video below.
Sponsored by:
If you’re a systems administrator, you already know – patching is painful. It’s time-consuming, risky, and one small mistake can mean downtime. So, it gets postponed. Again. And again. What if patching was just… Easy?
Introducing Action1, a cloud-native patch management platform for Windows, macOS, Linux, and third-party apps. You’ll be up and running in five minutes. No infrastructure to maintain. No complexity.
And here’s the best part: you can use Action1 on your first 200 endpoints for free. Forever. No feature limits. No credit card. No hidden tricks. Seriously, It’s NOT a disguised free trial. Too good to be true? Too good and actually true! Check for yourself, go to: on.action1.com/entrachat
So, if you’re looking for an easy-to-use patching tool that would help you save weeks, if not months of your time, go to on.action1.com/entrachat and sign up for “Patching That Just Works”.
1️⃣ Inbound Provisioning: Start with a Source of Truth
Most identity problems start with one issue:
There is no clean, authoritative identity source.
We demonstrated how to use Inbound Provisioning in Entra to:
* Accept identity payloads via Microsoft Graph
* Create users in a disabled state
* Capture attributes like hire date, leave date, department
* Treat HR (or another system) as the lifecycle authority
Why this matters
If identities are manually created:
* Joiners are inconsistent
* Leavers are missed
* Privileged accounts become orphaned
Inbound provisioning allows you to:
* Standardize creation
* Attach lifecycle automation immediately
* Reduce manual admin overhead
Key concept:Provision first. Enable later. Automate everything in between.
2️⃣ Lifecycle Workflows: Automate Joiner / Mover / Leaver
Once a user is provisioned, lifecycle workflows take over.
We implemented:
* Pre-hire workflow
* Day-one onboarding workflow
* Post-onboarding actions
Triggers included:
* Employee hire date
* Creation time
* Group membership
* Attribute changes
Real-world onboarding pattern
* Account is created disabled
* Workflow enables the account at the correct time
* Temporary Access Pass (TAP) is generated
* TAP is sent securely
* Access is assigned automatically
This reduces:
* Manual enablement
* Helpdesk load
* Security gaps
Design principle:Automation should enforce timing — not people.
3️⃣ Privileged Account Design: Separate the Identities
We had a strong opinion in the session:
Admin accounts should be separate and cloud-only.
Why?
* Syncing privileged accounts from on-prem introduces risk
* HR systems should not directly control privileged identities
* Governance features work best with cloud-native identities
We explored three creation patterns:
* Inbound provisioning for privileged accounts
* Access Packages (with auto-assignment or request model)
* Lifecycle workflows + custom Logic Apps
Each has trade-offs.
What matters most:Privileged identities must be:
* Separately authenticated
* Phishing-resistant (FIDO2 or passkeys)
* Independently governed
* Linked for offboarding
4️⃣ Linking Identities for Investigation
One challenge in Entra:
There’s no native “this person owns these 3 accounts” view.
We explored identity linking in Microsoft Defender XDR, where:
* Multiple accounts can be associated to one identity
* Incident investigations become clearer
* Privileged activity can be correlated with user context
This becomes critical during:
* Compromise investigations
* Insider threat analysis
* Lateral movement tracking
Security takeaway:If you can’t correlate identities, you can’t fully investigate them.
5️⃣ Backup & Restore: The Truth About Entra
There is no traditional backup system in Entra.
Instead, you have:
* Soft-delete (with recycle bin)
* Hard-delete (irreversible)
* API-based recovery
* Configuration export strategies
We discussed:
* Protecting deleted items with Protected Actions
* Using Conditional Access to restrict destructive operations
* Exporting configuration JSON regularly
* Monitoring configuration drift
Reality:If you aren’t exporting your tenant configuration, recovery becomes manual and painful.
Governance is not just about creation — it’s about resilience.
6️⃣ Protected Actions + Conditional Access
A powerful but underused feature:
Protected Actions.
You can require Conditional Access enforcement before allowing:
* Hard deletes
* Sensitive configuration changes
Example:
* Only allow permanent deletion from a compliant device
* Only allow from a trusted location
* Require phishing-resistant authentication
Even Global Admins must pass policy.
Security mindset shift:Admin role ≠ unlimited ability.
7️⃣ Agent ID & Blueprints: The Future of Identity for AI
We also explored Agent ID — one of the newer capabilities in Entra.
Why not just use a service principal?
Because agents:
* Need stronger guardrails
* Must support per-user instances
* Require conditional access enforcement
* Must be auditable at scale
Blueprints allow:
* A parent definition of permissions
* Individual agent instances per user
* Centralized governance over many agents
As AI agents scale, identity must scale securely with them.
Forward-looking insight:Agent governance will soon be as important as user governance.
8️⃣ Design Philosophy Behind the Lab
The entire masterclass was built around one principle:
Identity is a lifecycle, not a login.
We covered:
Provision → Enable → Assign → Elevate → Monitor → Protect → Offboard → Recover
If any step is manual, inconsistent, or undocumented — risk increases.
The labs give you a complete pattern you can implement in your own tenant.
🎯 What You Should Do Next
* Watch/listen to the full podcast where we walk you through the labs.
* Go try out the labs at github.com/IdentityMan/MasterclassELDK26 in your own tenant.
Subscribe with your favorite podcast player or watch on YouTube 👇
About us
* Jan Vidar Elven, Security MVP - https://www.linkedin.com/in/janvidarelven
* Pim Jacobs, Security MVP - https://www.linkedin.com/in/pimjacobs89
* Thomas Naunheim, Security MVP - https://www.linkedin.com/in/thomasnaunheim
* Klaus Bierschenk, Security MVP - https://www.linkedin.com/in/klabier
🔗 Related Links
* https://github.com/IdentityMan/MasterclassELDK26
* https://discord.entra.news
* https://on.action1.com/entrachat
📗 Chapters
00:00 Intro
00:50 Open Sourcing the Entra Lab
03:42 Entra ID Inbound Provisioning
08:05 Lifecycle Workflows and Governance
10:57 Securing Privileged Admin Accounts
16:21 Offboarding and Linked Identities
19:51 Sponsor: ActionOne
21:02 Entra ID Backup, Restore & Protected Actions
26:08 Exploring Agent ID and Blueprints
30:28 How to Access the Open Source Lab
Podcast Apps
🎙️ Entra.Chat - https://entra.chat
🎧 Apple Podcast → https://entra.chat/apple
📺 YouTube → https://entra.chat/youtube
📺 Spotify → https://entra.chat/spotify
🎧 Overcast → https://entra.chat/overcast
🎧 Pocketcast → https://entra.chat/pocketcast
🎧 Others → https://entra.chat/rss
Merill’s socials
📺 YouTube → youtube.com/@merillx
👔 LinkedIn → linkedin.com/in/merill
🐤 Twitter → twitter.com/merill
🕺 TikTok → tiktok.com/@merillf
🦋 Bluesky → bsky.app/profile/merill.net
🐘 Mastodon → infosec.exchange/@merill
🧵 Threads → threads.net/@merillf
🤖 GitHub → github.com/merill
Get full access to Entra.News - Your weekly dose of Microsoft Entra at entra.news/subscribe