Microsoft Entra ID logo
Directory & Identity

Microsoft Entra ID

Manage Entra ID users, groups, licenses, and sign-in risk through Microsoft Graph.

Dex connects to Microsoft Entra ID (formerly Azure AD) via Microsoft Graph and lets admins and employees run day-to-day identity operations — creating users, managing group memberships, resetting passwords and MFA, unblocking risky sign-ins, updating profile photos — with policy gates driven by directory roles and IT security groups.

Book a Demo

What Dex does with Microsoft Entra ID

Dex handles both admin workflows and employee self-service — all policy-guardrailed and audit-logged.

A

For admins (CoAdmin)

  • Create Entra ID users with full profile (name, department, job title, manager, office, phones, usage location)
  • Search users by name, UPN, email, department, job title, or account status
  • List and remediate locked (disabled) user accounts in bulk
  • Update any user property — job info, contact info, account enabled flag, password policies
  • Manage membership of security groups and Microsoft 365 groups (add, remove, check)
  • Reset user passwords with auto-generated strong passwords and forceChangePasswordNextSignIn
  • Reset MFA methods and unblock users blocked by Identity Protection risk
  • Update profile photo, phone, office location, and job title on behalf of users
  • Discover directory roles (Global Admin, Helpdesk Admin, User Admin) and infer approver groups
E

For employees (self-service)

  • Reset your own Entra ID password
  • Unblock your own sign-in when flagged by risk detection
  • Reset your own MFA methods (authenticator app, phone) when you replace your device
  • Update your own profile photo, phone number, office location, and job title
  • Request to join a security group or Microsoft 365 group
  • View your own profile, directory roles, and group memberships

Just ask Dex

Your team types a request in plain language. Dex investigates, plans, and executes — with the right guardrails.

Admin prompts

  • >Create a new Entra user for noa.levi@acme.com as Software Engineer in R&D, manager is david@acme.com, send credentials to david
  • >Show me every locked Entra account in the Sales department and unlock the ones on this list
  • >Add sarah@acme.com to the "Finance-Admins" security group and the "Finance-M365" group
  • >Reset the password for a user named "John Smith" — generate a strong one and force change on next login
  • >Who belongs to the "IT Support" group? And which groups is alice@acme.com a member of?
  • >Reset MFA for tom@acme.com — he got a new phone and can't sign in

Employee prompts

  • >Reset my Microsoft 365 password
  • >I got a new phone, reset my MFA so I can set up the authenticator again
  • >Change my profile picture to the one I just attached
  • >Update my mobile number to +1 415 555 0123 and office to "SF HQ - Floor 4"
  • >Request access to the "All-Engineering" Teams group

Policy actions

Every action Dex can take on Microsoft Entra ID is declared, scoped, and guardrailed. Admins control which apply, who approves them, and whether they're limited to self-service.

ActionWhat it does
password_resetReset an Entra ID user password
unblock_signinUnblock a sign-in blocked by Identity Protection risk
mfa_resetReset a user's MFA methods (excludes privileged admins)
update_photoUpdate a user's profile photo (Teams, Outlook, SharePoint sync)
update_user_profileUpdate profile fields: phone, office, job title, department
grant_accessAdd a user to a security group, M365 group, or enterprise app

How to configure Microsoft Entra ID

Onboarding takes minutes. Dex validates your credentials before saving them.

Setup steps

  1. 1
    In Dex, start the Microsoft 365 integration flow and click "Connect Microsoft 365".
  2. 2
    Sign in with a Global Administrator (or Privileged Role Administrator) account of your tenant.
  3. 3
    Review the consent screen — Dex requests User.ReadWrite.All, Group.ReadWrite.All, GroupMember.ReadWrite.All, Directory.ReadWrite.All, and UserAuthenticationMethod.ReadWrite.All.
  4. 4
    Click "Accept" to grant admin consent — this provisions the Dex enterprise application in your tenant.
  5. 5
    Dex validates the token with a GET /me call and caches the refresh token. No manual tenant ID, client ID, or secret to copy.
  6. 6
    Run Entra ID discovery in Dex — it enumerates security groups, directory roles, enterprise apps, and subscribed licenses, then proposes approver groups from Global Admin and Helpdesk Admin members.

No extra credentials

This integration is covered by your Microsoft 365 tenant authorization to Dex. There are no per-app credentials to create or rotate.

Requirements

  • Microsoft 365 tenant with Entra ID P1 or P2 licenses recommended (P2 required for risk-based sign-in and MFA policies)
  • Global Administrator or Privileged Role Administrator needed to grant tenant-wide admin consent
  • Credentials are inherited from the Dex Microsoft 365 Graph connection — there is no app-specific setup
  • Password reset and MFA reset require Authentication Administrator or Helpdesk Administrator role on the Dex service principal
  • Self-service password reset requires Entra ID SSPR to be enabled in the tenant

See Dex run Microsoft Entra ID

Book a 30-minute walkthrough with our team and see how autonomous IT works in your environment — or get started for free.