Share via

Enabling Managers to Generate TAP for Their Reportees in Entra ID

Santaji 0 Reputation points
2026-03-26T13:31:22.61+00:00

We are currently provisioning user accounts to Active Directory through our IAM solution, which are then synchronized with Entra ID.

As part of the onboarding experience, we want to leverage the Temporary Access Pass (TAP) feature in Entra to allow managers to securely share a temporary password with their reportees. This will enable users to set their initial password and register MFA.

Requirement: We are looking to configure Entra ID such that:

  • Managers can generate TAP only for their direct and indirect reportees
  • Managers should not be able to generate TAP for users outside their reporting hierarchy

Ask: What is the recommended approach or configuration in Entra ID to enforce this scoped access for TAP generation?

Microsoft Security | Microsoft Entra | Microsoft Entra ID

1 answer

Sort by: Most helpful
  1. Q&A Assist
    2026-03-26T13:31:39.7733333+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    Entra ID currently scopes Temporary Access Pass (TAP) creation by admin role, not by manager/reporting hierarchy. The documented model is:

    • TAP must be enabled via the Temporary Access Pass policy in the Authentication methods policy.
    • TAPs are created for users by specific admin roles:
      • Privileged Authentication Administrator – can create/delete/view TAP for admins and members (except themselves).
      • Authentication Administrator – can create/delete/view TAP for members (except themselves).
      • Authentication Policy Administrator – manages the TAP policy itself.

    There is no configuration in the provided documentation that allows delegating TAP creation to “managers only for their direct/indirect reports” based on the organizational hierarchy.

    For onboarding scenarios where initial credentials or passwordless bootstrapping must be delegated, the documented guidance instead points to:

    • Using Lifecycle Workflows with the task “Generate Temporary Access Pass and send via email to user's manager” as part of an automated process for users synchronized from AD DS. In this model, the workflow (running under appropriate admin context) generates the TAP and sends it to the manager, but the manager does not hold the TAP creation permission; the workflow does.
    • Alternatively, admins can generate TAPs via:
      • Entra admin center: Entra ID → Users → user → Authentication methods → Add authentication method → Temporary Access Pass.
      • Microsoft Graph PowerShell using New-MgUserAuthenticationTemporaryAccessPassMethod as described in the TAP documentation.

    Given the available information, the recommended approach to meet the business goal (manager shares TAP with reportee) while respecting Entra’s permission model is:

    1. Enable TAP policy in Entra ID with appropriate lifetime, one-time-use, and length settings.
    2. Use Lifecycle Workflows (or another automated provisioning/orchestration layer) to:
      • Detect new users (for example, created via HR-driven provisioning or inbound provisioning).
      • Run the “Generate Temporary Access Pass and send via email to user's manager” task so the TAP is automatically created by the workflow and delivered to the manager.
    3. Keep TAP creation rights restricted to the appropriate admin roles; do not attempt to grant TAP creation directly to managers based on hierarchy, as this is not described as a supported scoping mechanism.

    This design enforces that:

    • Only centrally controlled workflows/admins can create TAPs.
    • Managers receive TAPs only for their own reportees (as driven by the workflow logic and HR data), not for users outside their hierarchy.

    References:

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.