Summary and recommendation
Microsoft Azure / Entra ID user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.
Microsoft Entra ID is the identity backbone for Microsoft 365 and Azure environments, acting as the central directory for users, groups, roles, and licenses. User management lives in the Microsoft Entra admin center under Identity > Users > All users.
Every app that relies on Entra for authentication or provisioning inherits the access state set here, making accurate user records a prerequisite for consistent access across the environment.
Entra ID uses a role-based access control (RBAC) model with over 100 built-in directory roles. The most operationally relevant roles for user management are Global Administrator (full control, Microsoft recommends fewer than 5 per tenant) and User Administrator (create/manage non-admin users, reset passwords, assign licenses).
Custom roles require Premium P1 or P2 and are assembled from individual permission namespaces.
Quick facts
| Admin console path | Microsoft Entra admin center > Identity > Users |
| Admin console URL | Official docs |
| SCIM available | Yes |
| SCIM tier required | Premium P1/P2 |
| SSO prerequisite | Yes |
User types and roles
| Role | Permissions | Cannot do | Plan required | Seat cost | Watch out for |
|---|---|---|---|---|---|
| Global Administrator | Full control over all aspects of Microsoft Entra ID and Microsoft services that use Entra identities. Can manage all users, groups, roles, licenses, and tenant settings. | Cannot be restricted from any Entra ID management task by default. Actions are audited but not blocked by other admins. | Free (role exists in all tiers) | No additional cost for the role itself; underlying license cost applies | Microsoft recommends fewer than 5 Global Administrators per tenant. This role can reset passwords for all users including other Global Admins. |
| User Administrator | Can create and manage users and groups, reset passwords for non-admins, manage licenses, and create support tickets. | Cannot manage users with administrator roles (except Help Desk Administrator and below). Cannot manage Global Administrators. | Free | No additional cost for the role itself | Cannot reset passwords or manage accounts of users assigned to privileged administrator roles. |
| Member user (default) | Can read most directory information, manage their own profile, register applications (if tenant setting allows), and invite guests (if tenant setting allows). | Cannot read other users' full directory properties by default if restricted. Cannot manage groups or roles. | Free | Free tier: no cost. Premium P1: $6.00/user/mo. Premium P2: $9.00/user/mo. | Default member permissions can be restricted by administrators via tenant-level user settings, which may break assumptions about self-service capabilities. |
| Guest user (B2B) | Limited directory read permissions by default. Can access resources explicitly shared with them. Can be assigned roles. | Cannot enumerate the full directory by default. Cannot access resources not explicitly granted. Default guest permissions are more restricted than member users. | Free for basic B2B. Premium P1 required for Conditional Access policies applied to guests. Premium P2 required for Identity Protection for guests. | Free tier allows up to 50,000 monthly active external users. Beyond that, Microsoft Entra External ID pricing applies (approximately $0.00325 per MAU after free tier). | Guest user default permissions changed in 2021; guests can no longer enumerate all users, groups, or other directory objects by default. External collaboration settings control who can invite guests. |
| Privileged Role Administrator | Can manage role assignments in Entra ID, including Privileged Identity Management (PIM) configurations. Can grant any role to any user. | Cannot perform actions outside of role and PIM management without additional roles assigned. | Free (role assignment); PIM features require Premium P2 | No additional cost for the role; PIM requires P2 at $9.00/user/mo | This role is highly sensitive - it can elevate any user to Global Administrator. Should be protected with PIM and MFA. |
Permission model
- Model type: hybrid
- Description: Microsoft Entra ID uses a role-based access control (RBAC) model with over 100 built-in directory roles, each with a fixed set of permissions. Custom roles can be created to combine specific permissions from a defined permission set. Privileged Identity Management (PIM) adds just-in-time and time-bound role activation on top of the base RBAC model. Administrative Units allow scoping of role assignments to subsets of users, groups, or devices.
- Custom roles: Yes
- Custom roles plan: Premium P1 or Premium P2
- Granularity: Permission-level granularity within defined permission namespaces (e.g., microsoft.directory/users/password/update). Custom roles are assembled from individual permissions. Administrative Units allow geographic or departmental scoping of built-in and custom roles.
How to add users
- Sign in to the Microsoft Entra admin center (https://entra.microsoft.com) with at least User Administrator role.
- Navigate to Identity > Users > All users.
- Select 'New user' > 'Create new user'.
- Enter the User principal name (UPN) in the format alias@domain.com.
- Enter the Display name.
- Set a password (auto-generate or manually specify). If manually set, user must change on first sign-in (optional toggle).
- Optionally configure Properties (job title, department, usage location), Assignments (groups, roles), and Settings (block sign-in).
- Select 'Review + create', then 'Create'.
Required fields: User principal name (UPN), Display name, Password (auto-generated or manually set)
Watch out for:
- Usage location must be set on the user before a license can be assigned; this is a hard requirement.
- UPN domain must be a verified domain in the tenant or the default onmicrosoft.com domain.
- Users created via the portal are cloud-only accounts; they do not sync to on-premises Active Directory.
- If the tenant uses hybrid identity (Entra Connect Sync or Cloud Sync), users should be created in on-premises AD and synced, not created directly in Entra ID, to avoid sync conflicts.
- New users are not assigned any licenses automatically; license assignment is a separate step.
- The 'Block sign-in' toggle is available at creation but easy to overlook.
| Bulk option | Availability | Notes |
|---|---|---|
| CSV import | Yes | Identity > Users > All users > Bulk operations > Bulk create > Download CSV template |
| Domain whitelisting | No | Automatic domain-based user add |
| IdP provisioning | Yes | Premium P1 or Premium P2 required for automated app provisioning (SCIM). Entra ID itself acts as the IdP/provisioning source to downstream SaaS apps. |
How to remove or deactivate users
- Can delete users: Yes
- Delete/deactivate behavior: This app exposes delete operations in its API documentation, but the admin-console path may present removal as deactivation, archiving, or deletion depending on tenant configuration. Confirm whether the UI action is reversible before treating removal as recoverable.
- Sign in to the Microsoft Entra admin center with at least User Administrator role.
- Navigate to Identity > Users > All users.
- Select the user to disable.
- Select 'Edit properties' or use the 'Block sign-in' option directly from the user overview.
- Under Settings, set 'Block sign-in' to 'Yes'.
- Save changes. The user's existing sessions are not immediately revoked; use 'Revoke sessions' separately to invalidate active tokens.
| Data impact | Behavior |
|---|---|
| Owned records | User objects, owned applications, and owned groups remain in the directory after disabling. After hard deletion, owned objects may become orphaned. Owned Azure resources (subscriptions, resource groups) are not automatically transferred. |
| Shared content | Files in OneDrive and SharePoint remain accessible to others who had permissions. OneDrive content is retained per the tenant's configured OneDrive retention policy before permanent removal. |
| Integrations | Active sessions and tokens are not immediately revoked on disable; 'Revoke sessions' must be triggered separately. App role assignments and group memberships remain on the disabled account until manually removed or the account is deleted. SCIM-provisioned accounts in downstream apps may be deprovisioned automatically if provisioning is configured. |
| License freed | Licenses are NOT automatically removed when a user is disabled or deleted. Licenses must be manually removed from the user or the user must be removed from a license-assigned group. Licenses assigned to deleted users are freed after the 30-day soft-delete period or when manually unassigned before deletion. |
Watch out for:
- Blocking sign-in does not revoke existing access tokens; tokens remain valid until expiration (up to 1 hour for access tokens, longer for refresh tokens). Use 'Revoke sessions' in addition to blocking sign-in for immediate effect.
- Deleted users in the recycle bin still consume a license until the license is explicitly removed.
- Global Administrators cannot be deleted by other Global Administrators without first removing the Global Administrator role.
- Hybrid-synced users (from on-premises AD) cannot be deleted from Entra ID directly; they must be deleted from on-premises AD and the deletion synced. Attempting to delete a synced user from Entra ID will fail or be overwritten on next sync.
- Deleting a user who owns an Azure subscription or resource group can cause management access issues for those resources.
- After permanent deletion, UPN reuse can still be delayed in some scenarios due to directory object caching; verify availability before planning a same-address rehire.
License and seat management
| Seat type | Includes | Cost |
|---|---|---|
| Microsoft Entra ID Free | Basic user and group management, cloud authentication (password hash sync, pass-through auth), B2B collaboration (up to 50,000 MAU), basic MFA, self-service password reset for cloud users, basic Conditional Access. Included with Microsoft cloud subscriptions (Azure, Microsoft 365). | $0 |
| Microsoft Entra ID P1 | All Free features plus: Conditional Access with named locations and device compliance, hybrid identity (Entra Connect), group-based licensing, self-service group management, dynamic groups, SSPR with writeback, custom roles, administrative units, entitlement management (basic), SCIM-based automated provisioning to SaaS apps, Microsoft Entra application proxy. | $6.00/user/month (standalone). Also included in Microsoft 365 E3, EMS E3, and Microsoft 365 Business Premium. |
| Microsoft Entra ID P2 | All P1 features plus: Privileged Identity Management (PIM), Identity Protection (risk-based Conditional Access, risky user/sign-in reports), access reviews, entitlement management (full). | $9.00/user/month (standalone). Also included in Microsoft 365 E5 and EMS E5. |
| Microsoft Entra ID Governance (add-on) | Advanced lifecycle workflows, advanced entitlement management, access reviews at scale, privileged access management for groups. Requires P1 or P2 as a base. | $7.00/user/month (add-on to P1 or P2) |
| Microsoft Entra Suite | Entra ID P2, Entra ID Governance, Entra Internet Access, Entra Private Access, Entra Verified ID (premium). Bundled offering. | Approximately $12.00/user/month |
- Where to check usage: Microsoft Entra admin center > Billing > Licenses > All products (shows purchased quantity vs. assigned quantity per SKU). Also accessible via Microsoft 365 admin center > Billing > Licenses.
- How to identify unused seats: Navigate to Microsoft Entra admin center > Billing > Licenses > select a license SKU > Licensed users. Filter or export the list to identify users with licenses who have not signed in recently. Entra ID P2 includes 'Usage & insights' reports under Identity > Monitoring & health > Usage & insights, which show inactive users and app usage. The 'Sign-in logs' (retained 30 days for P1/P2, 7 days for Free) can be used to identify users with no recent sign-in activity.
- Billing notes: Licenses are assigned per user, either directly or via group-based licensing (P1 required for group-based licensing). Licenses must be assigned before premium features are available to a user. Overage is not automatically billed for most SKUs; purchasing additional licenses is required when the assigned count exceeds purchased count. Microsoft 365 and EMS bundle licenses include Entra ID P1 or P2 and count toward the same pool. Guest users (B2B) require a license for premium features applied to them; the 1:5 ratio (one paid user license covers up to 5 guest MAUs) was retired in 2023 for new tenants - external users are now billed under Microsoft Entra External ID pricing after the free 50,000 MAU threshold.
The cost of manual management
Automated SCIM provisioning to downstream SaaS apps requires Premium P1 ($6.00/user/month standalone) or P2 ($9.00/user/month standalone). P1 is also included in Microsoft 365 E3 and Microsoft 365 Business Premium; P2 is included in Microsoft 365 E5.
The Free tier covers basic authentication and B2B collaboration but excludes SCIM provisioning, group-based licensing, dynamic groups, and Conditional Access with device compliance.
Group-based licensing (P1 required) and dynamic groups reduce per-user manual overhead at scale. Without P1, license assignment and group membership must be managed per user, which compounds quickly in larger tenants. The Governance add-on ($7.00/user/month on top of P1 or P2) covers advanced lifecycle workflows and access reviews at scale.
What IT admins are saying
The most consistent friction points reported by Entra ID administrators center on provisioning latency and token behavior. Provisioning sync cycles run approximately every 40 minutes by default; near-real-time deprovisioning requires manual on-demand triggering.
Blocking sign-in does not immediately revoke active access tokens - a separate session revocation step is required, and even then, access tokens remain valid until expiry (up to 1 hour).
Nested group membership is not supported for SCIM provisioning or group-based license assignment; only direct group members receive provisioned access or licenses. This is a structural limitation that affects every app provisioned through Entra.
Hybrid identity environments add another layer: users synced from on-premises Active Directory cannot be managed directly in Entra ID - all changes must originate in on-premises AD and sync through Entra Connect, adding latency to every lifecycle event.
License assignment failures due to missing usage location are a common bulk-onboarding issue. The field must be set on each user before any Microsoft 365 license can be assigned; omitting it causes silent failures in automated workflows.
Common complaints:
- Premium P1 or P2 license required for automated SCIM provisioning to downstream SaaS apps, which many organizations consider a basic feature.
- Nested group membership is not supported for SCIM provisioning or group-based license assignment; only direct group members receive provisioned access or licenses.
- Provisioning sync cycles run approximately every 40 minutes by default; near-real-time deprovisioning requires manual triggering or waiting for the next cycle.
- Blocking sign-in does not immediately revoke active tokens; separate session revocation is required, and even then token caching in apps can delay full lockout.
- Hybrid identity (on-premises AD sync) prevents direct user management in Entra ID; all changes must be made in on-premises AD and synced, which adds latency.
- License assignment requires usage location to be set on each user; bulk onboarding without this field set causes license assignment failures.
- Deleted users continue to consume licenses during the 30-day soft-delete period unless licenses are manually removed.
- Administrative Units require P1 and have limitations: they cannot be nested, and not all resource types can be scoped to an Administrative Unit.
- The Entra admin center UI is frequently reorganized, causing navigation paths documented in guides to become outdated quickly.
- Custom role creation requires P1 but the permission namespace documentation is complex and not all permissions are exposed in the UI; some require PowerShell or Graph API.
The decision
Manual Entra ID management is viable for small, stable tenants where user lifecycle events are infrequent and the team already operates within the Microsoft admin center. The interface is functional, and the User Administrator role provides sufficient scope for day-to-day operations without requiring Global Administrator access.
The calculus shifts in larger or faster-moving environments. Every app provisioned through Entra inherits the 40-minute sync delay, the nested group limitation, and the token expiry gap on offboarding - these are not configuration issues but platform behaviors.
Teams managing more than a few dozen users, or operating in hybrid AD environments, will encounter these constraints regularly.
Organizations already licensed at P1 or above should evaluate whether group-based licensing and dynamic groups are configured, as these reduce the per-user manual surface area significantly without additional cost.
Bottom line
Microsoft Entra ID is a capable, enterprise-grade identity platform with a broad feature set, but its manual management experience carries real operational costs at scale.
The 40-minute provisioning cycle, token persistence after sign-in block, nested group limitations, and hybrid AD constraints are not edge cases - they surface in routine offboarding and onboarding workflows.
Teams that invest in P1-level features (group-based licensing, dynamic groups, on-demand provisioning) can reduce manual overhead substantially, but the platform rewards automation over manual administration.
For organizations where every app's access state flows through Entra, the accuracy and timeliness of user records here has downstream consequences across the entire SaaS stack.
Automate Microsoft Azure / Entra ID workflows without one-off scripts
Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.