Microsoft Entra ID is an identity and access management software designed to help organizations securely manage user identities and control access to applications and resources. The software offers features such as single sign-on, multifactor authentication, and conditional access policies to facilitate secure authentication and authorization processes. Entra ID enables centralized administration of users, groups, and devices, supporting hybrid environments with integration across cloud-based and on-premises applications. It addresses the business need for secure access management by providing tools for identity governance, monitoring, and reporting on user activities. The software helps organizations reduce security risks associated with unauthorized access and streamlines user lifecycle management.
Microsoft Entra ID Pricing
Microsoft Entra ID software follows a tiered pricing model that includes a free version with basic features and paid tiers such as Entra ID P1 and P2, which offer additional functionalities. Pricing is based on a per user per month structure, with features and access varying according to the selected tier. Users can choose the tier that matches their organizational requirements and scale accordingly.
Overall experience with Microsoft Entra ID
IT Manager
Gov't/PS/ED <5,000 Employees, Education
FAVORABLE
“Ease of Configuration Contrasted With Session Risks and Difficult Log Analysis in Entra ID”
5.0Dec 11, 2025
Built on a mature platform (Azure AD) its cloud / hybrid setup is familiar, and the documentation and various methods available to administer identities, e.g. PowerShell, Azure CLI PowerShell and Graph API calls, as well as Entra admin portal allow for a lot of different scenarios that go beyond basic admin, such as in-life checks and incident response actions.
IT Associate
Gov't/PS/ED 5,000 - 50,000 Employees, Education
CRITICAL
“Group Management and SSO Limitations Hinder Enterprise-Scale Service Usability”
3.0Jan 5, 2026
Many small areas lack completion. Group Management is seen as a half-baked implementation and must be coupled with additional products to be a usable Enterprise service. The SSO's inability to be coupled to large metadata providers as well is a limitation that is ignored. MFA has a hard data base limitation causing large organizations to have to be very picky on what MFA options are made available. API permissions are confusing and a security nightmare for security versus application admin. There is no customized access controls in how the API accesses data.
Badges
Gartner Peer Insights recognizes vendors who meet or exceed both the market average Overall Experience and the market average User Interest and Adoption score through a Customers’ Choice distinction.
Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. Microsoft is dedicated to advancing human and organizational achievement.
Microsoft Security helps protect people and data against cyberthreats to give peace of mind.
Access Vendor Portal to update and manage your profile.
User Sentiment About Microsoft Entra ID
Reviewer Insights for: Microsoft Entra ID
Deciding Factors: Microsoft Entra ID Vs. Market Average
Performance of Microsoft Entra ID Across Market Features
Microsoft Entra ID Likes & Dislikes
I like the clear documentation provided online, helpful advice about pre-requisites for setting anything up, and the default configurations. Plenty of information available via Microsoft community and partners when configuration issues or help to address specific use cases come up. Servicing - checking on accounts and logs, and Reporting using dashboards, and email notifications is generally full of useful information, and very easy to take action on if needed.
Multifactor Authentication Strengths with Conditional Access helps improve security for certain applications. The ease of SAML and OIDC implementation. Access controls with conditional access and entitlements help restrict and secure much of the service.
PIM, CA policies tied to Defender for cloud apps, RBAC roles designated for specific resources like Purview (great for being able to still easily block your Global Admins from getting to areas they dont belong).
Session management is still not set right as default. Its too easy for attackers to steal authenticated tokens using Aitm methods, and replay session tokens and compromise accounts. The availability of entra id, and certain applications such as exchange, mean it is more exposed to brute force attempts and password sprays than local ad only accounts. Logs are very numerous for background actions when servicing an account - lead to a lot of logs. Sometimes its not clear from these logs who the subject and target account is. Logs from EntraId can be hard to parse and understand for analysts involved in incident detection and response. Especially SSPR actions produce a lot of individual logs, and the auditlogs table in Azure for a lot of Entra ID actions put a large amount of details within single column like additionalDetails, that then need to be parsed out to be useful for queries / auditing.
There is no way to delegate admin consent for users to specific groups, so we are forced to keep it as admin consent only. There are no customizable error or access denied pages; generic deny pages are confusing to users, so users are generally allowed into the application at the level providing the correct error. Group membership limitations should be flagged and exposed to users with large groups and what applications they will not be able to access. The users and application admins are unaware of this until after implementation and then a few users hit the error which is an empty claim. Nothing is exposed without a major effort to expose it is group memberships. This leads to this service not having a true Enterprise group management implementation. Sign-In log queries are slow and sometimes unresponsive.
Biggest dislike is the paywall behind the Entra Suite. i get some items costing more, but having to pay for B2B provisioning is annoying in a world where Microsoft touts security first, yet doesnt give a proper guest account lifecycle workflow without paying for those vendor accounts.
Peer Discussions
What Your Peers Are Saying About Microsoft Entra ID
As I understand it, the E5 is assigned to a user, the device working from can be any computer, as long as the policies allow the user to login to the device and the device is allowed to connect. So I would say no, the owner of the computer is only a matter if you are working on the computer and not in the M365 cloud.
If you are having resistance about it, I think the first step is to engage higher organization levels showing evolved risks. If you get green sign of them next steps are:
1) training teams about security and risks;
2) review organization's security policy;
2.1) maybe create a standard about IAM's administration;
3) implement IAM policy
There is no formula about which team should do what, each organizations has its own way of working. It isn't a question of organizational chart, it's a question of resposibility. The most important thing is to ensure teams are aware of the their roles in the security implications.
Ease of Configuration Contrasted With Session Risks and Difficult Log Analysis in Entra ID
5.0Dec 11, 2025
Built on a mature platform (Azure AD) its cloud / hybrid setup is familiar, and the documentation and various methods available to administer identities, e.g. PowerShell, Azure CLI PowerShell and Graph API calls, as well as Entra admin portal allow for a lot of different scenarios that go beyond basic admin, such as in-life checks and incident response actions.
Manager, IT Security and Risk Management
50M-1B USD
Manufacturing
Review Source
Paywall Restrictions Hamper Guest Account Management and B2B Provisioning in Entra ID
5.0Nov 14, 2025
Entra ID, to me, works great right out of the box for smaller companies that don’t have a security team to keep things managed with best practice in mind. in fact, to lower the security, you have to intentially want to do this and ignore Microsoft’s suggestions while you do so.
where i love it is when you do have a security team and have P2 licensing, which brings everything together with CA policies, risk based polices and added Defender recommendations. Having your CA policies tied to risky users and the ability to get as granular as possible makes the attack surface a bit smaller, and that isnt even bringing the awesome PIM setup into the conversation yet.
DEVELOPER FOR WEBMETHODS, MS POWERPLATFO
50M-1B USD
IT Services
Review Source
A reliable and well-integrated access management solution, especially for Microsoft-based environments
5.0Apr 21, 2026
We have been using Microsoft Entra ID for several years as our central identity and access management solution, especially in combination with Microsoft 365 and other cloud services. For us, it became the foundation for managing user identities, access rights, and authentication across different systems.
In day-to-day operations, it works reliably and has helped us standardize how users access applications, both internally and externally. Especially as our environment grew and more services moved to the cloud, Entra ID made it easier to keep access control consistent without relying on multiple separate solutions.
IT Associate
Gov't/PS/Ed
Education
Review Source
Group Management and SSO Limitations Hinder Enterprise-Scale Service Usability
3.0Jan 5, 2026
Many small areas lack completion. Group Management is seen as a half-baked implementation and must be coupled with additional products to be a usable Enterprise service. The SSO's inability to be coupled to large metadata providers as well is a limitation that is ignored. MFA has a hard data base limitation causing large organizations to have to be very picky on what MFA options are made available. API permissions are confusing and a security nightmare for security versus application admin. There is no customized access controls in how the API accesses data.
IT ASSOCIATE
50M-1B USD
IT Services
Review Source
Microsoft Entra Offers Simple Automation, But Unexpected Licensing Costs May Arise
5.0Oct 20, 2025
Microsoft is a trusted vendor with high quality of services, support and SLA. Entra is a key product for Microsoft, so it is always in focus for the vendor and it provides a very good experience with both (vendor and product).