Conceptly
← All Concepts
🔐

Microsoft Entra ID

SecurityCentralized identity, authentication, and access policy for Azure and SaaS

Microsoft Entra ID is a cloud identity platform for users, applications, and services. It issues tokens, applies access policies, and centralizes authentication and authorization across Azure resources and external software.

Architecture Diagram

🔗 Relationship

Dashed line animations indicate the flow direction of data or requests

Why do you need it?

As application count grows, separate login systems create password sprawl, repeated authentication logic, weak offboarding, and poor auditability. Teams need a single identity layer that decides who someone is and what they may access across many systems.

Why did this approach emerge?

Identity used to sit inside each system or inside an on-prem directory. As cloud apps and SaaS spread beyond a single corporate network, trust stopped being primarily a network-boundary problem and became an identity-boundary problem. Cloud identity platforms emerged because access decisions had to follow users and services wherever the applications lived.

How does it work inside?

Entra ID verifies credentials, evaluates policy, and issues tokens that downstream applications trust. Those tokens let applications avoid handling raw passwords directly. Managed identities — Azure-assigned credentials that let services prove their identity without developers storing or rotating secrets — extend the same pattern to services so workloads can authenticate to Azure resources without embedding static secrets.

What is it often confused with?

Entra ID and on-prem Active Directory both manage identity, but they are optimized for different environments. Active Directory is anchored in domain-joined infrastructure and older protocols. Entra ID is centered on cloud apps, APIs, SaaS, and token-based access flows.

When should you use it?

Entra ID becomes the identity control plane when teams want single sign-on, centralized offboarding, conditional access, and token-based application authentication. It works especially well when services and users span Azure, Microsoft 365, custom APIs, and third-party SaaS. It does not replace the need for secret storage or network isolation; it answers a different security question.

Single sign-on across internal apps and SaaS toolsConditional access based on user, device, or location riskRole-based access to Azure resourcesOAuth flows for custom web and API applications