by Contributed | Aug 29, 2023 | Technology
This article is contributed. See the original author and article here.

We are excited to announce that we are currently rolling out a new feature called SharePoint News for Email. This feature enables you to convert your SharePoint News Posts intro distributions that can be read fully in email inboxes. You can now engage your audience directly in their inbox and track their mail reads.
Four pictures – showing the news article in SharePoint – sending email feature – news in the email client – statistics for the view
To create a News post for email, select a “Made for email” template from the news template picker:
Selection of the templates for new news article – showing the email ready templates.
When you are finished authoring, you can now post your news and send it fully to email in one step.
SharePoint News visible in the SharePoint portal and in the email client.
Sending a page as an email will not change existing site permissions, and sending a page as an email will not give your recipients access to the original page if they don’t already have it. You can think of sending mail by email as making someone a photocopy of a page in a book. They can read that page, but nothing else in the book.
Live video demo on the feature.
Frequently asked questions
When will this happen?
This update will roll out to Targeted Release customers starting August 2023, and to all customers by the end of September.
This message is associated with Microsoft 365 Roadmap ID 124803.
How will this impact your organization?
Authors of SharePoint News will now be able to send news posts as emails.
What you need to do to prepare?
You do not need to do anything to prepare for this update, but you may want to let your users know about this improvement.
Will the view counter for news include the email views?
Yes. View counters for your news articles will include also views of the news article through the email client.
Resources
Thanks for reading. Please let us know any feedback or questions in the comments and we’ll get back to you :thumbs_up::rocket::1st_place_medal:
by Contributed | Aug 28, 2023 | Technology
This article is contributed. See the original author and article here.
On July 11, 2023, we introduced Microsoft’s identity-centric security service edge (SSE) solution and two new services: Microsoft Entra Private Access and Microsoft Entra Internet Access, which are now in public preview. In this blog, we take a deeper look into Microsoft
Entra Private Access.
Figure 1: Traditional network security stacks and legacy VPNs are no longer sufficient
Microsoft Entra Private Access
Traditional network security approaches that use legacy VPNs simply cannot scale to modern demands. Once your remote users connect to your corporate network through VPN, they are granted excessive access to your entire network, all it takes is a single compromised user account, infected device, or open port for an attacker to gain entry, move laterally, and access your most critical assets.
Microsoft Entra Private Access, an identity-centric Zero Trust Network Access (ZTNA), reduces the operational complexity and cost of legacy VPNs, while eliminating excessive access and preventing lateral movement. It modernizes access to private applications and resources, helping users quickly and easily connect to private applications from any device and any network, whether they’re at home, remote, or in their corporate office.
What makes Private Access unique
As part of Microsoft’s SSE solution, Private Access is built on Zero Trust principles. It verifies every user and enforces least privilege, giving users access only to the private applications and resources they need. Private Access significantly expands Entra ID Application Proxy capabilities in Microsoft Entra to a complete ZTNA solution that shares the same connectors but offers so much more, it helps you simplify and secure access to any private resource on any port, and protocol. You can apply policies that enable secure, segmented, and granular access to all your private applications in your corporate network, on-premises, or in the cloud. For customers already using Application Proxy, they can seamlessly transition to Private Access – all existing use-cases and access to existing private web applications would continue to work with no disruption.
You can create and enforce per-app, least privilege access controls based on the granular Conditional Access policies that are enriched with context about users, devices, and their locations. You can also terminate ongoing sessions in response to anomalies or changes in user context or device health. For example, if a user connects from one part of the world and then immediately connects from another part of the world (what we call “impossible travel”), you can enforce re-authorization or step up to a stronger authentication method.
Private Access enables secure access to any application, on-premises or cloud-based, and it works across any port or protocol, including RDP, SSH, SMB, FTP, and anything else that uses TCP or UDP. In addition, you can enable single sign-on (SSO) using SAML or http headers or even legacy Kerberos authentication for both web and non-web applications, without making any changes to those applications.
With Private Access delivered from one of the largest global private networks, Microsoft global network, your private applications are not only more secure, but your employees can also access them faster compared to legacy VPNs. The unmatched scale and vast global network edge presence enables you to optimally connect your users and devices to private resources, especially those who work in a hybrid or remote work environment.
Figure 2: Secure access to all private applications, for users anywhere, with an identity-centric Zero Trust Network Access (ZTNA).
Private Access key capabilities
Microsoft Entra Private Access can help you enable secure access to all your private applications and resources. Key capabilities include:
Fast and easy migration from legacy VPNs with Quick Access. Replacing legacy VPNs with an identity-centric ZTNA minimizes the risk of implicit trust and lateral movement. Using Quick Access, you can easily configure broad private IP ranges and fully qualified domain names (FQDNs) to quickly enable identity-centric, Zero-Trust-based access to all private resources.
Figure 3: Fast and easy migration from legacy VPNs with Quick Access
Enhanced identity-centric security controls for all private applications. With Private Access, you can create Conditional Access policies and multi-factor authentication (MFA) that require modern authentication for accessing any private application, even those using legacy protocols such as Kerberos and NT LAN Manager (NTLM). This brings policies based on the sensitivity of the application, level of user risk, network compliance, and so forth to legacy applications. For example, you can easily require multi-factor authentication (MFA) and device compliance checks for users trying to access remote desktop (RDP), secure shell (SSH) or SMB applications.
Figure 4: Enhanced identity-centric security controls for all private applications
Automatic private application discovery and onboarding. You can discover private applications, including existing App Proxy private web applications, whether the applications are hosted locally in a private network, in an on-premises data center, or in the cloud. You can then onboard them to Microsoft Entra ID, group them, and define granular access policies.
Figure 5: Automatic private application discovery and onboarding
Granular segmented application access. Instead of granting remote users access to your entire network, as traditional VPNs do, you can define granular segmented access policies for each application or group of applications based on user, device, or processes running on the endpoint.
Figure 6: Granular segmented application access
Intelligent local access. Employees need a consistent security posture whether they’re accessing private applications remotely or on-premises. The intelligent local access capability enables fast and seamless ZTNA for users, whether they’re within the corporate network or connecting remotely from anywhere outside corporate network boundaries. For example, a user while on the corporate network can connect to on-premises private applications such as RDP or SMB while CA policies such as MFA are still enforced, and application traffic remains local on the corporate network.
Figure 7: Intelligent local access
Getting started with Entra Private Access
Global Secure Access (preview) is the centralized location in the Microsoft Entra admin center where you can configure and manage Microsoft Entra Private Access. Remote workers don’t need to use a VPN to access these resources if they have the Global Secure Access Client installed. The client quietly and seamlessly connects them with the resources they need. The most current version of the client can be downloaded from the Microsoft Entra admin center. You can install the client interactively, silently with the /quiet switch, or use mobile device management platforms like Microsoft Intune to deploy it to their devices.
QuickAccess makes it very easy to get started with a minimum configuration for Private Access, especially when you are planning to move from legacy VPN to ZTNA. After completing initial configurations, and once you deploy a connector agent on-premises, to enable quick access all you need to do is specify the IP address, IP address range, or FQDN and port number. You can then assign specific conditional access policies, which QuickAccess applies to ALL app segments you configured. For example, you can create a “myRDP app” and assign it an IP address-based app segment. You only need to provide a name for the private app, then select the connector you wish to use with the app, and then specify the IP address/range and port number. You can then access your destination by simply launching an RDP session from your remote client machine.
Figure 8: Configure Quick Access to an RDP application
To learn about different use cases and scenarios, configuration prerequisites and how to enable secure access to your private network resources through the client, remote network connectivity, Quick Access, and more, go to the Global Secure Access documentation page.
You can learn more about Private Access in action via our on-demand Tech Accelerator product deep dive sessions.
Learn more about Microsoft’s SSE solution:
Learn more about Microsoft Entra:
by Contributed | Aug 27, 2023 | Technology
This article is contributed. See the original author and article here.
Summary
Data in ADX (aka Kusto aka RTA in Fabric) almost always has columns that contain datetime values like 2023-08-01 16:45 and sometimes timespan values like 2 hours or 36 minutes.
In this article I’ll describe how these values are represented in ADX in Power Query and in Power BI.
Notice that I don’t just say Power BI because timespan values have different types in Power Query and in Power BI.
Dates and times in ADX
ADX have to relevant data types : datetime and timespan.
In the attached pbix file, there are two basic columns, one is a datetime and one is a timespan.
Datetime values are assumed to be in UTC. They can be converted to local time using the datetime_utc_to_local function.
Here is the query that creates the data in KQL: (You can click on the web Hyperlink to run the query)
Execute in [Web] [Desktop] [cluster(‘help.kusto.windows.net’).database(‘ContosoSales’)]
datatable(Date_and_Time:datetime, Span:timespan ,Spantext:string) [
datetime(2023-09-01), 2m,”2m”,
datetime(2023-09-01 06:00), 2h,”2h”,
datetime(2023-09-01 06:25:33),2d,”2d”,
datetime(2023-09-01 23:55:12.1234), 30s, “30s”,
datetime(2023-09-30),251ms,”251ms”
]
| extend Time_In_New_York=datetime_utc_to_local(Date_and_Time,”America/New_York”)
Table0
Date_and_Time
|
Span
|
Spantext
|
Time_In_New_York
|
2023-09-01T00:00:00Z
|
00:02:00
|
2m
|
2023-08-31T20:00:00Z
|
2023-09-01T06:00:00Z
|
02:00:00
|
2h
|
2023-09-01T02:00:00Z
|
2023-09-01T06:25:33Z
|
2.00:00:00
|
2d
|
2023-09-01T02:25:33Z
|
2023-09-01T23:55:12.1234Z
|
00:00:30
|
30s
|
2023-09-01T19:55:12.1234Z
|
2023-09-30T00:00:00Z
|
00:00:00.2510000
|
251ms
|
2023-09-29T20:00:00Z
|
Dates and time types in Power Query
The datetime columns in ADX are typed as Date/Time/Zone.
Changing the type to datetime will not change the value because the datetime is assumed to be in UTC .

The timespan column is typed as duration.
Date and Time types in the PBI data model
Power BI data types are described here.
The paragraph about Date/time types explains how Power Query types are mapped to the data model.
Some types are converted when moved from Power Query to the data model.
Date/Time/Timezone is converted to Date/Time and Duration is converted to decimal.
The behavior of timespan->duration->decimal needs some explanation.
A timespan of 12h is shown in PQ as 0.12:0:0 and in the model as 0.5.
For those of you with an Excel background, it will make perfect sense.
0.5 is half a day, the decimal is expressed as the decimal parts of a day.
For someone coming from KQL background it looks odd.
The timespan column can be converted in the query to seconds by multiplying it by 24*60*60 which is the number of seconds in 24 hours.
by Contributed | Aug 26, 2023 | Technology
This article is contributed. See the original author and article here.
When building an application, one of the things we have to work alongside with is business requirements but we mostly forget about the users, “Is this application accessible to the users?”
User’s Interaction and accessibility are many of the factors that needs to be discussed when building an application. It’s important to consider how efficient your application is to your users.
Check out this Podcast Episode on A Girl in Love with Tech Podcast where I and Microsoft Snr Program Manager Ilya Fainberg who role is researching market trends and understanding customer needs to formulate product strategy. Helping customers succeed in their journey to the Microsoft Cloud by advising on best practices and product discussed about the importance of User’s Experience in Microsoft Power Platform
In this article, we would learn about simple user’s needs we can easily work on when building a Power apps application but first, let us understand what Power Apps is
What is Microsoft Power Apps?
Microsoft Power Apps is a low-code or no- code tool in the Microsoft Power Platform ecosystem that is used in building business applications with or without the use of programming languages. Microsoft has been able to bridge that gap, where both developers and non-developers have free rays in building solutions. What this means is that, the platform can be extended by code making it a pro code platform for professional developers.
What to look at for
1. Simple icons: it is advisable to use icons in place to help increase space and avoid distractions. Make use of icons that are understandable on what it does.
2. Consistency: When building an application, especially when you have many screens in the application. It’s important to consider the consistency of the controls in your screen especially the width and height.
3. Colours: How well you use your colours is very important, especially to the users, it has to be accessible, not contrasting the other, the colour should not be too dull.
These are the few examples to consider when working with colours
- The font colour and background colour of your screen should be accessible. Check the Colour contrast checker to see which colour works best.
- When using an image in the screen the colour in the background of the image should not contradict the background colour of your screen.
- Use primary colours to point out the main objective. A good example of not working well with colors is using a green colour for the delete icon.
4. Avoiding distractions: Application should always be easy to use. A user should not need a manual to use your application.
5. Performance: Improving how users interact with your applications should be met. A few examples to consider when working in an application:
- Application should not take too long to load or respond to an action.
- When a user clicks on a button they expect that something will happen. Button controls should not be used as a text control.
Check this out to learn more about ways you can improve Performance in your application
6. Size: The font type and size should be readable and accessible. Check here and learn more about accessible fonts.
7.Responsive: Building an application, always think about the use of your application on different devices. When building an application one of the mistakes we make is not having an idea or design of how the application layout will look like on different types of screens.
Check out the learning resources
PowerApps Canvas App Accessibility Guidelines | Microsoft Power Apps
Understand the Power Apps Studio
How to build the UI in a canvas app in Power Apps
How to build a color-contrast-ratio checker for improved accessibility in Power Apps
How to use custom fonts in Power Apps
Power Apps performance optimization guidelines
by Contributed | Aug 25, 2023 | Technology
This article is contributed. See the original author and article here.
With ongoing advancements in technology, there has been a continuous shift in how we learn, network, and interact with each other. Communities in Teams experience enables students and mentors to connect and bring out a true sense of connection among them.
IIT Madras, one of the leading engineering institutions in India, has been using Teams to enable mentorship-led communities along with their Microsoft Learn for Educators (MSLE) effort in their data science program. Mentors connect with the students to help them with course curriculum and technical questions related to various Microsoft certification courses that they are encouraging their students to take up, both asynchronously and with live online office hours, in one place.
In this article, we will explore how IIT Madras created communities for mentorship cohorts and engaged their students to help them easily connect with one another and have a go-to space for upskilling and networking.
Why create mentorship communities on Teams?
Building a strong connection between the mentors and mentees is critical for folks to achieve goals and learn from each other. This is especially true if the students are from diverse geographical locations, ages, roles, and backgrounds. The BS Degree in Data Science and Application Program offered by IIT Madras is born out of the philosophy of democratizing education and has seen wide acceptance both inside and outside the country.
With data science being a buzzword in the industry for quite some time, the BS program aims to provide without compromising the strong academic foundations needed in this arena. Knowledge of cloud computing and use of cloud resources is a significant extracurricular component where IIT Madras is working with Microsoft (through a faculty development program – Microsoft Learn for Educator program) to enable Microsoft Cloud-related certifications, both in Data Science and Application Development, for its students. Communities in Teams provides a single platform for students to connect, engage, and build relationships with their fellow students and mentors before and after their sessions.
This community is the centralized space for students to find information related to their out-of-class mentoring sessions scheduled in the program and address all questions and concerns. Students can
- Find the program schedule
- Engage with the coordinating team
- Track important dates
- Help, interact, and collaborate with peers
- Resolve queries in real time
- One-stop access to all your reading materials
- Connect with your trainers/mentors
- Follow upcoming events
Additionally, since students could potentially use Teams in their colleges, it serves as an excellent opportunity for them to navigate on a single platform.
How is IIT Madras creating and managing mentorship cohorts in Communities in Teams?
IIT Madras has been using Communities in Teams as a platform for all its students and mentors to build relationships, expand their network, and motivate students in finishing their Microsoft certification programs.
For every mentorship session, they share the QR code/ invite link of the community to all its registered participants. Students join the community before/during the course delivery session to connect asynchronously with their peers and discuss key elements discussed during the session.
The mentors/coordinating team shares all the required details of the cloud certification including meeting details, and prerequisites, and supports students by providing them a platform to ask questions, seek guidance, and share their certificates.
These communities also act as a knowledge resource for all the students aiming to get themselves certified with other certifications as IIT Madras leverages the existing community network they have built to cross-promote the upcoming mentorship sessions and certifications.

Here is what IIT Madras has to say about Teams
In the unique context of IIT Madras BS Degree in Data Science and Programming, the mentorship communities through MS Teams help emulate the informal learning environment that is available in the regular on-campus programs for extra-curricular activities. This is a very significant activity as students aiming to get Cloud Certifications not only get guidance from their peers/seniors who have already completed their journey but also promote a strong sense of belonging. We are really happy to be part of this journey with Microsoft Teams and are looking forward to having a strong community built within this space.
Overall, these communities have been helping the students to engage proactively, find easy resolution of queries, and stay motivated to complete their programs and certifications.
Best practices to keep in mind while creating student-mentor communities on Teams
- Set Community Description, Avatar, and Guidelines: Once the community is created, ensure the community description encourages participation and delivers the goal of the community. Additionally, fill out any specific community guidelines you want to communicate to members of the community. Having a community avatar makes the community more real. Learn more about updating the community details.
- Restrict Community Join Link Sharing: To ensure the community remains secure and limited to authorized members, disable the option to share the community join link and enable requests for members to join. This step prevents the link from being shared outside the intended audience, maintaining the privacy and exclusivity of the community. Learn more about how to disable the option to share a community link
- Create an engagement plan: Plan your engagement for 2 weeks beforehand as starters to kick-start conversations in the community. You can have multiple types of posts planned with details on who will post and when.

- Change your profile name so members can uniquely identify you as the mentor. You can use titles such as Your Name – Mentor
- Diversify Communities: Consider creating separate communities for every certification/program type. This segmentation allows for more targeted discussions and networking opportunities within specific cohorts.
- Empower the community to lead: A community becomes strong and sustainable only when leaders are nurtured within the community and empowered. As part of this, there is a cognitive apprenticeship within the community through which students can move up to become Mentors and Community managers.
By following these steps, you can harness the power of Communities in Teams to create vibrant communities that foster connections, facilitate networking, and enhance the overall mentorship experience.
How to send feedback and suggestions?
We are always happy to receive feedback and suggestions to make our product even better. To participate in our feedback program and help us in our endeavor, please follow the steps below:
You can also sign up for a user panel, to get opportunities to connect directly with the product team and help make Teams (free) better. Learn more.
by Contributed | Aug 24, 2023 | Technology
This article is contributed. See the original author and article here.
PIM for Groups
Entra ID (formerly Azure AD) offers the Privileged Identity Management (PIM) for Groups feature, enabling users to attain just-in-time membership and ownership of groups, thus governing access to a range of services. This feature allows the implementation of policies similar to those in PIM for Entra ID Roles and PIM for Azure Resources, allowing the configuration of actions like approval enforcement, multi-factor authentication (MFA), justification requirements, and activation time limits. Each PIM for Groups configured group features two distinct policies, catering to membership and ownership activation. This means that if an account is both an eligible owner and an eligible member of a group, each of them have their own activation.
For more information you can read the official documentation here.
Microsoft 365 Defender RBAC
Microsoft 365 Defender RBAC offers centralized permissions management for the following services:
- Defender for Endpoint
- Defender for Identity
- Defender for Cloud Apps
- Defender for Office 365
- Microsoft Defender Vulnerability Management
- Secure score
When a role is created, the services which the role covers can be selected. The advantage of using the new M365 Defender RBAC as opposed to the legacy RBAC for each individual service is that it is possible to grant permissions to multiple services from just a single role assignment. If you have been using legacy RBAC assignments it’s very simple to import those roles into the new M365 Defender unified RBAC. The steps for importing the roles can be found here.
M365 Defender unified RBAC workloads need to be activated before they are applied. Until the workloads are activated Defender will apply the legacy RBAC model for each individual service.
When creating an M365 Defender role you will need to create an assignment for it. Assignments will have a scope (which Defender data sources the assignment will apply to) and Entra ID users or groups (which users or groups the assignment will be applied to).
For more information you can read the official documentation here.
Putting the two together
As group membership can define getting M365 Defender roles, and group membership can be given in a just-in-time manner, it means that indirectly M365 Defender roles can be given in a just-in-time manner.
The steps to set this up would be the following.
Create the Entra ID group and add members
In the Azure portal go to Azure Active Directory and click on Groups and then New group.

Figure 1 Creating new group
Enter the details as required.

Figure 2 Adding details to group being created
Add Eligible Members to the group
Go to the Azure portal and search for Azure AD Privileged Identity Management in the search bar. Once there, select Groups on the left side of the menu. The group needs to be discovered before eligible members can be added. To discover the group, search the group name and select Discover groups.

Figure 3 Discover groups to manage with PIM
Select the group and click Manage groups.

Figure 4 Manage group using PIM
Click on OK.

Figure 5 Onboarding selected groups
Now the group should be visible. Select the group and click Assignments, then Add assignments in the Eligible assignments tab. If it is not added to this tab, the assignment will be active and not eligible.

Figure 6 Adding assignment to PIM managed group
Select the members to be added to the group.

Figure 7 Selecting members

Figure 8 Selecting members
Select Eligible and enter the start and end dates of the eligibility assignment. Once the correct dates are set click Done. Finish the assignment process.

Figure 9 Setting details of eligible membership
Now there should be the account added in the Eligible assignments tab on the groups membership.

Figure 10 Viewing eligible assignment of groups members
Now the group has PIM eligible members.
Create the M365 Defender Role
M365 Defender roles can be created in the M365 Defender portal. If you have the correct permissions you can click on Permissions on the left side in the menu.

Figure 11 Permissions tab in Defender menu
Under Microsoft 365 Defender select Roles.

Figure 12 Microsoft 365 Defender Roles in permissions page
Click on Create custom role. Enter the name of the role and click Next.

Figure 13 Beginning the creation of a custom role
On the Choose permissions tab click on each permission an select the level of access you want the role to have.

Figure 14 Permissions selection screen

Figure 15 Example permissions for Security Operations
Once the permissions you want are selected click on Next.

Figure 16 Permissions selected for each group
On the next screen assignment are created for the role. The assignments created will determine which account are assigned this role. Click on Add assignment.

Figure 17 Adding assignment to role
Enter the assignment name and select the group created in Step 1. Click Add.

Figure 18 Entering assignment details
Move to the next screen by clicking Next. Review the permissions and click Submit.

Figure 19 Reviewing and submitting the roles settings
As mentioned earlier, the M365 Defender RBAC has to be activated for workloads so that it can be applied. If this hasn’t been done already then it will need to be activated. On the main page for M365 Defender Roles there will be a note if any workload has not been activated. If this note is there then you will need to Activate workloads.


Figure 21 Activating workloads
Users perspective
Once a user has been made an eligible member of the group they can activate their membership and get temporarily assigned to the M365 Defender role. The user will have to follow these steps:
Go to Azure AD Privileged Identity Management and to the Groups tab in the menu on the left. The group should be visible. If the group is not visible, verify that the user is an eligible member of the group and that the group was ‘discovered’ by the admins. These steps can be found in the previous sections. Select Activate role.

Figure 22 Activating group membership
On the next screen select Activate on the group you want to activate the membership for.

Figure 23 Activating group membership
Select the duration the membership should last for and add a reason. Select Activate.

Figure 24 Activating group membership
After activating the role, if the membership status of the group is checked, you will see the account there with details about when the membership was activated.

Figure 25 Viewing the activated group membership
The users view in M365 Defender before and after activating the group membership, and therefore getting assigned the M365 Defender role. Notice that after the role is assigned the user can see menus for Defender related activities.

Figure 26 The Defender menu before activating the group membership

Figure 27 The Defender menu after activating the group membership
Wrapping it up
PIM for Groups paired with M365 Defender RBAC offers a solution for those looking for just-in-time Defender access. These can also be used in combinations. For example, if you want a certain sures to always have read access but access to take device actions should be granted just-in-time, then a read-only Defender role can be assigned permanently and the role for taking device actions can be granted to the group via the steps mentioned above.
by Contributed | Aug 23, 2023 | Technology
This article is contributed. See the original author and article here.
Hello everyone,
I’m thrilled to announce that Microsoft Entra API-driven provisioning is now in public preview!
With today’s announcement, we’re expanding our support for HR-driven provisioning to address the most common customer asks, including:
- Automatically provisioning cloud-only users and hybrid users (users that require an on-premises Active Directory account) from any trusted source
- Importing data from sources like CSV files and SQL staging tables using the automation tool of your choice
- Simplifying the integration by using standard SCIM schema attributes to abstract schema differences across systems and provide a consistent mapping experience
- Leveraging Lifecycle Workflows to automate joiner-mover-leaver workflows for users sourced from any system of record
In one common customer scenario, organizations use a cloud human capital management (HCM) platform for managing employees and extracting nightly flat files/CSVs to manage vendor and contractor data. Both of these sources can send information to Microsoft Entra API-driven provisioning using your automation tool of choice. Then, the provisioning service will automatically determine the right operation to perform for each user, and Microsoft Entra ID Governance Lifecycle Workflows will automate the joiner-mover-leaver processes configured by your IAM admin.
Figure 1: Microsoft Entra API-driven provisioning data flow
Let’s walk through the steps involved in configuring this integration.
Bring identities into your directory from any source in three easy steps
Step 1 – Configure API-driven provisioning app
In the Microsoft Entra Portal, sign in as a user with Application Administrator and Hybrid Identity Administrator role. You will see two new provisioning applications in the Enterprise App gallery:
- API-driven provisioning to Microsoft Entra ID: Configure this app if you’d like to provision cloud-only user accounts from your authoritative source.
- API-driven provisioning to on-premises Active Directory: Configure this app if you’d like to provision user accounts first to your on-premises Active Directory and then sync them into Microsoft Entra ID using Microsoft Entra Cloud Sync / Connect Sync.
If your provisioning target is an on-premises Active Directory domain, download and configure the Microsoft Entra provisioning agent. Once configured, you can select the Active Directory domain in the provisioning app.
Figure 2: Connect to your on-premises Active Directory domain
By default, the provisioning app maps attributes from the standard SCIM Core User schema and the SCIM Enterprise User schema extension to the corresponding Microsoft Entra ID / on-premises Active Directory user attributes.
Figure 3: SCIM schema attributes to on-premises Active Directory attribute mapping
The Microsoft Entra provisioning service creates a unique API endpoint for your provisioning app. You can copy this API endpoint from the “Overview” blade. Select “Start provisioning” to accept inbound provisioning requests at this API endpoint.
Figure 4:API endpoint for your provisioning app
The inbound provisioning API endpoint has the format:
https://graph.microsoft.com/beta/servicePrincipals/{servicePrincipalId}/synchronization/jobs/{jobId}/bulkUpload
where {servicePrincipalId} is the object ID of your provisioning app and {jobId} is the provisioning job id.
Step 2 – Grant permission to your application or service to upload identity data
In this step, you create an entity in Microsoft Entra ID that represents your application or service calling the inbound provisioning API and grant it the necessary permissions. You can use one of the following options:
Grant the following Graph API permissions with admin consent:
- SynchronizationData-User.Upload
- AuditLog.Read.All
Figure 5: Permissions required to perform API-driven provisioning
Step 3 – Upload identity data using any automation tool of your choice
You can now securely upload identity data to the provisioning /bulkUpload API endpoint. The great thing about API-driven provisioning is that you don’t need to implement custom logic to figure out whether an operation in your system of record requires creating or updating an identity. Just upload the data from your source systems and the Microsoft Entra provisioning service will automatically determine the right operation to perform for each user record based on mapping rules configured by your IAM admin.
Unlock more integration scenarios
In the set of steps above, we showed you how to provision to Microsoft Entra ID in the cloud, and to Active Directory on-premises. You can apply these steps to implement several enterprise HR integration scenarios.
Scenario 1: IT teams can import HR data extracts from any source
Flat files, CSV files and SQL staging tables are commonly used in enterprise integration scenarios. Employee, contractor, and vendor information are periodically exported into one of these formats, and an automation tool is used to sync this data with Microsoft Entra ID. With API-driven provisioning, IT teams can use any automation tool of their choice (example: PowerShell scripts or Azure Logic Apps) to modernize and simplify this integration.
Scenario 2: HR ISVs can build direct inbound sync with Microsoft Entra ID
With API-driven provisioning, HR ISVs can ship native synchronization experiences so that changes in the HR system automatically flow into Microsoft Entra ID and connected on-premises Active Directory domains. For example, an HR app or student information systems app can send data to Microsoft Entra ID as soon as a transaction is complete or as end-of-day bulk update.
Scenario 3: System integrators can build more connectors to systems of record
System integrators can build custom HR connectors to meet different integration requirements around identity data flow from systems of record to Microsoft Entra ID.
What customers and partners are telling us
We got some great feedback from customers and partners like you during the previews.
Microsoft Entra API-driven provisioning will allow us to achieve our cloud-first vision by provisioning identity directly in the cloud and on-premises, integrating with our HR application. We will be able to remove legacy infrastructure and automate many fragmented workflows and reduce dependency on on-premises Active Directory infrastructure. This will enhance our security, efficiency, and user experience.
Sachin Desai, Sr. Director at Avanade Inc.
With API-driven provisioning, HR has better control over the identity lifecycle & data in Active Directory and Microsoft Entra ID. When combined with Lifecycle Workflows, onboarding and offboarding becomes easy and seamless, and with that, no more manual work and always an up-to-date identity!
Pim Jacobs, Principal Consultant at InSpark and Microsoft Most Valuable Professional (MVP)
Microsoft Entra API-driven inbound provisioning is a game changer for customers constrained by existing technologies, opening the possibility for any customer to start the journey for joiner, mover, and leaver automation.
Martyn Gill, Senior Architect and Team Lead at Kocho
With API-driven provisioning, our customers can link employee information in SmartHR with Microsoft Entra ID. This will reduce the time and effort required to manage accounts as employees join, move, or leave the company. SmartHR is excited to partner with Microsoft in building this integration!
Takumi Kanzaki, Product Engineer at SmartHR
Rippling gives businesses one place to run HR, IT, and Finance by automating payroll, expenses, and benefits in one integrated platform. With Microsoft Entra API-driven provisioning, we can now extend this automation to streamline access to more workforce apps, regardless of whether it’s in the cloud or on-premises. We look forward to enabling this seamless experience for our customers by partnering with Microsoft!
Sam Gnesin, Product Lead at Rippling
Give it a try
With this new capability, you now have even more flexibility on how to keep identity data in sync with your authoritative sources, regardless of whether they are hosted in the cloud or on-premises. Working with your HR/IT teams, you can select from a range of automation tools like Azure Logic Apps, PowerAutomate, Azure Functions or Azure Data Factory to retrieve, transform and merge HR data and simply upload the data to the new provisioning API endpoint.
To quickly configure and evaluate API-driven provisioning with your favorite API testing tool, refer to one of these tutorials:
To get started with your favorite automation tools, refer to one of these samples:
The API-driven provisioning feature is in preview, and you can start using it if you have Microsoft Entra ID P1 (formerly Azure AD Premium P1) license or above. Licensing terms will be released at general availability.
Have more questions? Check out our frequently asked questions to see if it’s answered there.
We’d love to hear your feedback along the way! Share your feedback through the Azure forum or by tagging @AzureAD on Twitter.
Joseph Dadzie, Partner Director of Product Management
LinkedIn: @joedadzie
Twitter: @joe_dadzie
Learn more about Microsoft Entra:
by Contributed | Aug 22, 2023 | Technology
This article is contributed. See the original author and article here.
Leveraging Microsoft Sentinel workbooks for reporting to leadership is a common use case. A common concern is granting recipients access to Microsoft Sentinel or all of the tables within the workspace. Using some different RBAC components, this can be done.
Components:
- Table-level RBAC
- Resource-level RBAC
How It Works:
Table-level RBAC: Access to the data that is leveraged within the workspace is set at the table level. This prevents the user from being able to read data from the other tables while still being able to see the required data within the workbook.

Resource-level RBAC: Access to just the resource as needed. The resource here is the workbook of interest. Setting access at the resource level prevents the user from being able to see all resources within the resource group.

How to Configure:
Table-level RBAC: Table-level RBAC will leverage a custom role that enables the user to be able to see the workspace and run a query, and a reader role on the table itself. The process is highlighted in the documentation here.
Resource-level RBAC: Resource-level RBAC will limit the scope of visibility to be just to the resource. To set this:
- Go to the Azure Portal.
- Go to the resource group that has Microsoft Sentinel.
- Find the workbook of interest.
- Click on access control.
- Click on add.
- Choose role assignment.
- Select the workbook reader role.
- Select the user that should be able to see the workbook.
- Click review and assign.
Sharing the Workbook
Since the user is unable to see Microsoft Sentinel, the workbook will need to be shared directly with the user. To do so:
- Go to the Azure Portal.
- Go to Microsoft Sentinel or the resource group.
- Find the workbook of interest and open it.
- Click on share and copy the link.


- Share the link with the user who should have limited access.
Anticipated Questions:
- I don’t want the user to see the workspace so that they can’t run a query on the data. Can I do that?
- No. The permission to see and query the workspace is required so that the user can view the data in the workbook, which queries the data.
- How does the user consistently view the workbook without having to use the link?
- The user can configure a dashboard that pins the workbook to the dashboard.
- What if the workbook uses several tables?
- Table-level RBAC will need to be configured for each one.
- What if I have multiple users who need this type of access?
- Consider creating an AAD group that contains these users and assign permissions to the group.
And that’s it. This is a fairly straightforward process that leads to good results. Go ahead and give it a shot and leave comments below if there are any issues.
by Contributed | Aug 21, 2023 | Technology
This article is contributed. See the original author and article here.
Today we are excited to announce the general of Azure Spring Apps (ASA) landing zone accelerator. You can start deploying your spring applications to Azure Spring Apps at scale using the built with industry-proven practices.
Customers on their app modernization or migration journey to cloud may encounter challenges to deploy spring applications at enterprise scale and get it right at the first time. Landing zone accelerators help you address this challenge providing guidance to deploy workloads faster with better security, scalability, availability, reduced cost, operating confidently with better performance.
Landing zone accelerators provide architectural guidance, reference architecture, reference implementations and automation packaged to deploy workload platforms on Azure at scale. The goal of landing zone accelerators is to save you having to reinvent the wheel by building on the lessons we learned working with our strategic customers. This accelerator allows you to establish secure, compliant, and scalable development, test, or production environments within 15-30 minutes.
ASA landing zone accelerator comes with two parts,
- Design Area Guidance providing recommendations and considerations for critical design pillars: Security, Networking, Identity and Access Management and Monitoring
- Reference implementation providing end-to-end guidance for provisioning Azure Spring Apps and deploying workloads to production-grade secure infrastructure.
Build and deploy spring applications at scale
Azure Spring Apps makes it easy to deploy Spring applications to Azure without any code changes. The service manages the infrastructure of Spring applications so developers can focus on their code. Azure Spring Apps provides lifecycle management using comprehensive monitoring and diagnostics, configuration management, service discovery, CI/CD integration, blue-green deployments, and more.
For application teams, the Spring Apps landing zone accelerator offers a significant head start by bundling together the most used backing services, which teams can select as part of their deployment process. This includes Azure Spring Apps Enterprise for Java Spring Boot applications, Azure Application Gateway for efficient web traffic management, Azure Virtual Machines for streamlined management operations, and diverse database services such as Azure MySQL Flexible Server, Azure PostgreSQL Flexible Server, Azure Cosmos Database and Azure SQL Database for adaptable data storage solutions. Teams can further secure and monitor their operations with Azure Key Vault, Azure Monitor Logs, and Azure Application Insights – or using any monitoring tools and platform of their choice. And they can automate from idea to production using any automation tools and platform of their choice.
On the other hand, platform teams benefit from an array of resources designed to maintain security and operational efficiency. The Azure Firewall, Azure Bastion, Azure ExpressRoute, Azure DNS, and Azure VPN Gateway ensure seamless connectivity, secure access management, and effective traffic control across both on-premises and Azure environments. The Landing Zone Accelerator for Spring Apps builds on the Azure Well-Architected Framework, adhering to its five pillars of architectural excellence – reliability, security, cost optimization, operational excellence, and performance efficiency. Furthermore, it integrates seamlessly with Azure landing zones and other accelerators. Rooted in real-world Azure migration projects, this accelerator framework not only ensures consistent governance but also reduces operational overhead, optimizing cost, and establishing a reliable solution for deploying both private and public applications in single or multi cloud environments.
Design Area Guidance
The reference architecture is considered across four key design areas integrated with centralized services.
These design guidelines are based on real-world work with our strategic customers performing large-scale Azure migration and modernization projects, and you can use the architectural guidance to achieve your target technical state with confidence.
MS Learn documentation – Azure Spring Apps landing zone accelerator – Cloud Adoption Framework | Microsoft Learn
Reference Architecture
The reference implementation demonstrates a secure baseline infrastructure architecture to deploy spring and polyglot apps. It uses a hub and spoke architecture with a single spoke hosting Spring Apps. East/West traffic (traffic between resources in the hub and resources in the spoke) is filtered with Network Security Groups and North/South traffic (traffic between the Internet and resources in the hub or spoke) is routed through and mediated with an instance of Azure Firewall.

Core architecture components are below.
- Azure Spring Apps (Enterprise or Standard) is deployed using VNet-injection to allow for mediation inbound and outbound traffic to the Azure Spring Apps Instance and deployed applications.
- The Azure Firewall instance has been configured to write its logs to a Log Analytics Workspace.
- Azure Private DNS zones for Azure Spring Apps and support services deployed with Private Endpoints
- A single Windows Server 2022 Virtual Machine deployed into the spoke Virtual Network for testing access to applications deployed into the Azure Spring Apps instance. This VM is not exposed to the internet and is only accessible via Azure Bastion.
- Log Analytics Workspace where Azure Spring Apps and Azure Firewall deliver logs and metrics.
- Application Insights for monitoring applications deployed to Azure Spring Apps.
- Instance of Azure Key Vault deployed with a Private Endpoint for secrets and certificates storage for applications deployed to Azure Spring Apps.
- Instance of Azure Bastion for connection to the Windows Server 2022 virtual machine running in the virtual network.
Next Steps
For the implementation of this architecture, see the Azure Spring Apps landing zone accelerator repository on GitHub. Deployment options for this architecture include ready-to-go Bicep, Terraform, scripts with automation provided in both Azure DevOps and GitHub Actions.
Lets get started by forking the repo to create a dev, test or production environment in 15-30 minutes using the landing zone accelerator. The artifacts in this repository provide groundwork that you can customize for your environment and automated provisioning pipelines. For any feedback, please use the GitHub Issues.
Meet the Experts
This accelerator was created and maintained by Cloud Solution Architects, Software Engineers, and Program Managers at Microsoft. Check them out under the GitHub repo contributors section.
by Contributed | Aug 20, 2023 | Technology
This article is contributed. See the original author and article here.
In this post collected from https://appsource.microsoft.com/blog, the Microsoft AppSource ecosystem welcomes 112 new offers.
Get it now in our marketplace
|
---|
 |
Advanced People Directory: Advanced People Directory is a SharePoint Framework (SPFx) webpart designed to display people information from across your organization. The webpart lets you search by multiple attributes and return basic information, linked documents, and an organization chart.
|
 |
Agile Retail Analytics Dashboards on Power BI: Agile Analytics Retail dashboards use Microsoft Power BI and Azure services to centralize data from financial, operational, and other business areas and deliver insights into product performance, sales growth, and more.
|
 |
B2B Telecom Sales and Prospecting Dashboard for Schools and Libraries: WCG’s FCC Form 471 dashboard, built on Microsoft Power BI, provides a comprehensive view of telecom contracts and pricing for schools and libraries. |
 |
Commerce 365 for EasyPost: NVision’s Commerce 365 for EasyPost integrates Microsoft Dynamics 365 Business Central with EasyPost, simplifying shipping. The API lets you quickly connect with over 100 carriers, automatically create shipments, and support high volumes through batch processing.
|
 |
Commerce 365 for EasyPost – Tasklet Mobile WMS Module: NVision’s Commerce 365 for EasyPost – Tasklet Mobile WMS app lets EasyPost users create and request carrier labels using Mobile WMS without needing to switch to Microsoft Dynamics 365 Business Central.
|
 |
Commerce 365 for Sendcloud – Tasklet Mobile WMS Module: NVision’s Commerce 365 for Sendcloud – Tasklet Mobile WMS app lets Sendcloud users create and request carrier labels using Mobile WMS without needing to switch to Microsoft Dynamics 365 Business Central.
|
 |
Custom Defined Fields for Purchase Requests: The Custom Defined Fields for Purchase Requests app for Microsoft Dynamics 365 Business Central allows you to add up to 32 custom fields in different cards belonging to purchase requests.
|
 |
Design Engine App for Dynamics 365 Business Central: Design Engine lets you simplify ERP for employees working in production and logistics environments with Microsoft Dynamics 365 Business Central. Employees can easily access ERP data, simplify goods handling, and more.
|
 |
Dynasoft Friendly Banking: Automate banking operations, get real-time statement imports, and eliminate manual tasks with the Dynasoft Friendly Banking app for Microsoft Dynamics 365 Business Central. This app is available in English and Spanish.
|
 |
Easy Item Tracking for Good Looking Documents: Fenwick’s Easy Item Tracking connector extends Microsoft Dynamics 365 Business Central, Good Looking Documents, and Easy Item Tracking to add item tracking information from Good Looking Documents to reports.
|
 |
Inventory Shelf Life: Available in French and English, the Inventory Shelf Life app by FoodCloudPlus lets you use Microsoft Dynamics 365 Business Central to easily create and assign controls to customers and items. Food manufacturers and distributors can reduce the risk of returned products and unhappy customers.
|
 |
Item Restriction Management: Available in Traditional Chinese and English, Item Restriction for Microsoft Dynamics 365 Business Central lets you block the sale of certain items to specific customers and regions based on trade agreements, internal rules, and more.
|
 |
Job Queue Manager: The Job Queue Manager app for Microsoft Dynamics 365 Business Central is designed to run job queue entries in a specific order and email their status. This app is available in English and Dutch.
|
 |
Kani Payments Reporting and Reconciliation: Kani is a Microsoft Azure-based reporting and reconciliation platform designed to help finance technology and payments companies automate back-office tasks such as reconciliation, reporting, and compliance enforcement.
|
 |
Meeteo: Improve Your Microsoft Teams Meetings: Available in French, Meeteo is available as software as a service combined with an add-in for Microsoft Teams, delivering advice before, during, and after meetings through the provision of agendas, surveys, participant lists, and more.
|
 |
Navitec Digitoo Bridge: Available only in Czech, Navitec Digitoo Bridge integrates Microsoft Dynamics 365 Business Central with Digitoo, allowing you to transfer purchase documents and extracted metadata from them into Dynamics 365.
|
 |
NCVV VAT Registration Number Validation: Available in German and English for Austria, the NCVV VAT Registration No. Validation app helps you maintain master data for customers, debtors, and creditors in Microsoft Dynamics 365 Business Central.
|
 |
Notify User: The Notify User app for Microsoft Dynamics 365 Business Central allows you to assign a user to notify while saving a note for any record, such as customer cards and sales orders.
|
 |
Over Shipping: Available in French and English, the Over Shipping app by FoodCloudPlus enhances Microsoft Dynamics 365 Business Central, letting you set and control tolerance percentages for items, customers, and combined levels, allowing for greater customization and control.
|
 |
Pazo: Pazo is mobile-first operations management platform for retail and frontline workforces. Available as software as a service, Pazo lets you ensure all tasks, audits, and inspections are compliant.
|
 |
Powerblox Advanced Pricing and Discounts: The Powerblox Advanced Pricing and Discounts app for Microsoft Dynamics 365 Business Central lets you manage prices and reductions, create discount groups for customers, and always have a clear overview of your margins.
|
 |
Powerblox Inbound Logistics: The Powerblox Inbound Logistics app for Microsoft Dynamics 365 Business Central lets you set advanced warehouse functions. The app lets you manage incoming tracks per gate, manage stock at logistic unit levels, manage outgoing logistics processes, and more.
|
 |
ProE-SCM 365 Workflow: Available in German and English, YAVEON ProE-SCM 365 Workflow enhances Microsoft Dynamics 365 Business Central to simplify management of customer credit, automate system actions, control processes, and more.
|
 |
Quality Inspector: Quality Inspector by Insight Works is a comprehensive quality control app for Microsoft Dynamics 365 Business Central. The customizable entry forms and multiple inspection types enhance product quality, reduce costs, and help maintain compliance.
|
 |
Rillion Connect: Rillion Connect streamlines invoice approval processes for purchase orders (POs) and non-POs by integrating Microsoft Dynamics 365 Business Central with the Rillion invoice automation platform. Reduce invoice processing costs and speed accounts payable approval times.
|
 |
Safe & Smart Audit Management Software: The Safe & Smart Audit Management System is designed to automate various operations and enhance your audit department. The software as a service solution streamlines processes, facilitates collaboration with external auditors, improves internal controls, and more.
|
 |
Safe & Smart Core Insurance System: The Safe & Smart Core Insurance System provides integrated functionality for processing and delivering insurance products. The software as a service solution was designed for a range of insurance industry users and addresses the need for a streamlined and efficient insurance management system.
|
 |
Sales Stage Tracker for Dynamics 365: The Sales Stage Tracker app for Microsoft Dynamics 365 lets you record and analyze time spent in each stage of a sales opportunity. The app helps you identify and optimize slowdowns, shortening time to close, increasing revenue, and enhancing efficiency.
|
 |
Share-Effect Flow Connector: The Share-Effect Flow Connector lets you manage terms in Microsoft 365 as part of your organization-wide enterprise content management strategy. Sync terms with entities from ERP and CRM systems, tag documents, and automate business processes in SharePoint Online.
|
 |
TAPP for GoCardless on Dynamics 365 Business Central: Bluefort’s TAPP for GoCardless enhances Microsoft Dynamics 365 Business Central and GoCardless, enabling no-touch direct debit payments and payment automation, increasing the efficiency of your invoicing and payment collection.
|
 |
Temporary Traffic Management: Road Direct’s eBoard temporary traffic management (TTM) software lets you view all job books from any device and location. The Microsoft Azure-based solution includes team management, time recording, and equipment tracking,
|
 |
Wise Card: Available in Icelandic and English, Wise Card enables users of Microsoft Dynamics 365 Business Central to fetch credit card entries for corporate purchasing cards from Valitor and Rapyd. This app is available in Iceland.
|
 |
Workshop Employee Communications Webpart for SharePoint: The Workshop webpart lets you add feeds to your Microsoft SharePoint site from Workshop, an employee communications platform for human resources, public relations, and internal communications professionals.
|
Go further with workshops, proofs of concept, and implementations
|
---|
 |
Catalyst Envisioning Workshop for Annata 365: Fellowmind will help you discover the potential gains to be realized by implementing Annata 365, built on Microsoft Dynamics 365 Supply Chain Management. Learn how Microsoft and Annata can accelerate your digital transformation.
|
 |
Collaboration on Microsoft 365: 6-Week Implementation: Available only in Japanese, Hitachi will deliver information sharing, document management, collaborative content creation, video conference, and real-time communication through cloud services built on Microsoft 365.
|
 |
Complete MXDR Powered by Microsoft Sentinel: KiZAN will help you rapidly improve your security posture and protect against cybersecurity threats by implementing and continuously monitoring, detecting, and responding to security incidents by using Microsoft Sentinel, Microsoft 365 Defender, and Microsoft Defender for Cloud.
|
 |
Crayon Voice Services Powered by Microsoft Teams: 12- to 14-Week Implementation: Crayon will guide you through all phases of your Microsoft Teams Voice project to save you time, simplify administration, and ensure compliance with audit requirements.
|
 |
Data & Analytics: Using a mesh concept, Concurrency will help you define a modern data framework, understand priority initiatives, and accelerate data outcomes with an accessible and governed data estate built on Microsoft Power BI.
|
 |
Databricks on Azure: 1-Week Training: DEX Consulting will show you how to use Microsoft Azure Databricks for data cleaning, processing, and workflows. The session covers how to use Databricks for collaboration on Microsoft 365 and integration with the Microsoft Power Platform.
|
 |
Databricks on Azure: 4-Week Assessment: DEX Consulting will analyze your current data environment and identify how you can use Microsoft Azure Databricks to improve your data cleaning, processing, and workflows. This session covers options to improve existing Databricks instances or migrate to a new system.
|
 |
Databricks on Azure: 4-Week Implementation: DEX Consulting will implement Microsoft Azure Databricks according to your needs. This offer includes analysis of current data systems, design and construction of functional workflows, integration, testing, go-live support, and maintenance.
|
 |
Digital Workspace Provisioning – Setup Consult: Ascend Technologies will help you simplify user setup and onboarding, improve security, and maintain Windows consistency throughout your organization by implementing its Zero-Touch Laptop Provisioning.
|
 |
DX Human Resources Development: 1-Month Training: Available only in Japanese, Fixer’s DX Small Starter Kit is an intensive training service for human resources developers. Learn how citizen developers can use the Microsoft Power Platform to further human resources strategy.
|
 |
Dynamics 365 Customer Service: 3-Month Implementation: AW will optimize your business processes by implementing Microsoft Dynamics 365 Customer Service. This offer includes project planning, analysis of your requirements, dedicated training, and more available in Spanish.
|
 |
GDPR Data Anonymization Function: MS POS Poland will implement its solution, built on the Microsoft Power Platform and Dynamics 365, to ensure that your company is compliant with the GDPR right to be forgotten. The solution enables data obfuscation and anonymization.
|
 |
Google Workspace to Microsoft 365: Migration: Vistas Cloud will migrate your emails, contacts, calendars, and documents from Google Workspace (formerly G-Suite) to Microsoft 365. This offer includes Microsoft 365 configuration, administrator training, and post-migration support.
|
 |
Intelligent Migration to Microsoft 365: Innovative Driven’s Intelligent Migration services help you realize a modern, secure, and collaborative solution built on Microsoft 365. Migrate your file share content to Microsoft 365 and gain greater insights into your data while lowering risk.
|
 |
KPMG Employee Experience Enabled by Microsoft Viva: Drawing on its experience with customer relationship management and consulting, KPMG will design and implement an employee experience solution on Microsoft Viva that incorporates key elements from Microsoft 365 to increase employee productivity.
|
 |
Live Chat and Bot Services on Dynamics 365: 5-Day Implementation: Adastra will review your current environment including integrations, customizations, and business processes, then configure live chat and bot services on Microsoft Dynamics 365 Customer Service.
|
 |
Microsoft Cloud for Nonprofit Fundraising & Marketing: 12-Week Implementation: MISSION CRM’s MIYM (Make It Your MISSION) implementation uses a phased approach to help your nonprofit launch a complete solution built on Microsoft Cloud for Nonprofit and Dynamics 365 Marketing.
|
 |
Microsoft Viva Connections: 6-Week Implementation: Persistent will build a one-stop employee gateway on Microsoft Viva Connections to enhance your employee engagement, improve communications, foster meaningful relationships, and make accessible relevant communications, communities, and tools.
|
 |
OpenAI and the Power Platform: 1-Week Training: Designed for people who lack extensive experience with artificial intelligence (AI), DEX Consulting’s training will show you how to use the Microsoft Power Platform, Azure AI services, and OpenAI models together.
|
 |
OpenAI and the Power Platform: 4-Week Assessment: DEX Consulting will analyze your current environment, design a solution, and deliver an execution plan to enhance your organization’s processes through the addition of artificial intelligence (AI) capabilities combined with the Microsoft Power Platform and OpenAI.
|
 |
Protect and Govern Sensitive Data for Financial Services: 4-Week Workshop: Protiviti will help you understand, discover, and assess data in your Microsoft 365 environment. Mitigate privacy and regulatory risks and accelerate your compliance journey with Microsoft Purview.
|
 |
Res@Place: 2-Week Pilot: Neos-SDI will implement Res@Place, its solution built on the Microsoft Power Platform to manage office space reservations and contact tracing. This solution is available only in French.
|
 |
SSC Endpoint Management with Security Workshop: SCC will help you understand how Microsoft 365 E3, Microsoft Intune, and Microsoft Defender for Endpoint can manage and secure user devices, apps, and identities.
|
 |
Teams Voice: Implementation: Connection will help you replace your legacy PBX system with Microsoft Teams Voice. This offer includes a network readiness assessment, phone system design, number porting, feature configuration, and more.
|
 |
UNITE: Secure Core_: Implementation: Infinity Group will implement its UNITE: Secure Core_ to simplify management of your security infrastructure via Microsoft Defender for Business. Get proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
|
 |
Viva Employee Experience 1-Hour Workshop: NewTech will show you how Microsoft Viva apps can increase employee communication and engagement, align organizational areas, and grow employee skills. You will also learn about what already is included in your current Microsoft 365 license.
|
Contact our partners
|
---|
365Construction Advanced |
ABILITY.Connect for ELO |
ADVWIN PLUS |
Axians Office Booking |
Bank Management Software |
BIT Cloud |
BIT Hyper Automation |
BSS.Service for Dynamics 365 Business Central |
Call Queue Extended for Microsoft Teams |
Couriers Integration Base |
Data Security: 5-Day Assessment |
Dynamics 365: 1-Week-Assessment |
Dynamics 365 Business Central: 2-Week Assessment |
Dynamics 365 Health Check: 4-Week Assessment |
Dynamics 365 Project Operations: 4-Hour Assessment |
Electronic Payment Processing |
ERP Modernization on Dynamics 365 Business Central: 1-Day Assessment |
Exotel Cloud Contact Center – Ameyo XTRM |
FAN Courier Integration |
Global Managed Service for Azure and Dynamics 365: 1-Day Assessment |
KSV1870 Integration for Dynamics 365 |
Licensing Product on the Power Platform |
Lumos 365 Joint Venture |
MazikCare Care Planner |
MES – Shop Floor Barcode Data Collection |
Microsoft 365 Security: 3-Week Assessment |
Microsoft 365 Security Posture: 10-Day Assessment |
Microsoft 365 Security Review: 1-Week Assessment |
Microsoft 365 Tenant Health Check |
Migration to Microsoft Cloud for Nonprofit: 3-Week Assessment |
MNP 311 Technology and Dynamics 365: Assessment |
Modern Workplace for Healthcare: 4-Week Assessment |
Optimize Microsoft 365: 1-Week Assessment |
Phonebook App |
ploydo for Microsoft Teams |
Power Plant Maintenance |
Power Platform and Enterprise Maturity: 3-Week Assessment |
Risk Assessment Service: 3-Month Evaluation |
Sentient.io Quality Inspection for Manufacturing |
Singular Real Estate |
Swirl Metasearch |
Swisscom Mobile Telephony for Microsoft Teams |
Tableau Metadata Accelerator to Power BI: 4-Week Migration Assessment |
Teams Rapid Readiness: 3-Day Assessment |
TeamSystem HR |
Topo Solutions – Supply Chain Management Platform |
Warehouse Management System (WMS) |
Wellbeing.ai |
WiseFish Norway Customs Link |
Wove Platform |
XCCommerce Promotion Management and Execution |
Stay up to date
AppSource is continually expanding the library of line-of-business apps that work with Microsoft products and technologies. Be sure to check out the full app library to see how Microsoft’s partner ecosystem is working to support businesses across industries and regions.
Recent Comments