Use Microsoft Entra ID with the Azure mobile app

The Azure mobile app provides access to Microsoft Entra ID. You can perform tasks such as managing users and updating group memberships from within the app.

To access Microsoft Entra ID, open the Azure mobile app and sign in with your Azure account. From Home, scroll down to select the Microsoft Entra ID card.

Note

Your account must have the appropriate permissions in order to perform these tasks. For example, to invite a user to your tenant, you must have a role that includes this permission, such as Guest Inviter or User Administrator.

Invite a user to the tenant

To invite a guest user to your tenant from the Azure mobile app:

  1. In Microsoft Entra ID, select Users, then select the + icon in the top right corner.
  2. Select Invite user, then enter the user's name and email address. You can optionally add a message for the user.
  3. Select Invite in the top right corner, then select Save to confirm your changes.

Add users to a group

To add one or more users to a group from the Azure mobile app:

  1. In Microsoft Entra ID, select Groups.
  2. Search or scroll to find the desired group, then tap to select it.
  3. On the Members card, select See All. The current list of members is displayed.
  4. Select the + icon in the top right corner.
  5. Search or scroll to find users you want to add to the group, then select one or more users by tapping the circle next to their name.
  6. Select Add in the top right corner to add the selected users to the group.

Add group memberships for a specified user

You can also add a single user to one or more groups in the Users section of Microsoft Entra ID in the Azure mobile app. To do so:

  1. In Microsoft Entra ID, select Users, then search or scroll to find and select the desired user.
  2. On the Groups card, select See All to display all current group memberships for that user.
  3. Select the + icon in the top right corner.
  4. Search or scroll to find groups to which this user should be added, then select one or more groups by tapping the circle next to the group name.
  5. Select Add in the top right corner to add the user to the selected groups.

Manage authentication methods or reset password for a user

To manage authentication methods or reset a user's password:

  1. In Microsoft Entra ID, select Users, then search or scroll to find and select the desired user.
  2. On the Authentication methods card, select Manage.
  3. Select Reset password to assign a temporary password to the user, or Authentication methods to manage authentication methods for self-service password reset.

Note

You won't see the Authentication methods card if you don't have the appropriate permissions to manage authentication methods and/or password changes for a user.

Investigate risky users and sign-ins

Microsoft Entra ID Protection provides organizations with reporting they can use to investigate identity risks in their environment.

If you have the necessary permissions and license, you'll see details in the Risky users and Risky sign-ins sections within Microsoft Entra ID. You can open these sections to view more information and perform some management tasks.

Manage risky users

  1. In Microsoft Entra ID, scroll down to the Security card and then select Risky users.

  2. Search or scroll to find and select a specific risky user.

  3. Review basic information for this user, a list of their risky sign-ins, and their risk history.

  4. To take action on the user, select the three dots near the top of the screen. You can:

    • Reset the user's password
    • Confirm user compromise
    • Dismiss user risk
    • Block the user from signing in (or unblock, if previously blocked)

Monitor risky sign-ins

  1. In Microsoft Entra ID, scroll down to the Security card and then select Risky sign-ins. It may take a minute or two for the list of all risky sign-ins to load.

  2. Search or scroll to find and select a specific risky sign-in.

  3. Review details about the risky sign-in.

Activate Privileged Identity Management (PIM) roles

If you have been made eligible for an administrative role through Microsoft Entra Privileged Identity Management (PIM), you must activate the role assignment when you need to perform privileged actions. This activation can be done from within the Azure mobile app.

For more information, see Activate PIM roles using the Azure mobile app.

Next steps