Views:

Gain instant visibility into the identities managed by Microsoft Entra ID.

Identity Inventory allows you to review and monitor the identities managed by Microsoft Entra ID.
Select Microsoft Entra ID under DATA SOURCES to view identity summaries and detailed identity information by identity type.
You may connect and grant permissions to multiple Microsoft Entra ID tenants. Switch to a new tenant by selecting the tenant name under TENANTS.
The following table details the tabs available for Microsoft Entra ID.
Tab
Description
Displays widgets with information on the status of your connected Microsoft Entra ID and an identity summary with statistics on your organization's human and non-human identities as well as entitlements.
Lists the human users in your organization and provides information significant to your security posture, including roles, user type, and authentication type.
Lists the enterprise applications in your organization and provides information significant to your security posture, including whether the application has a publisher or is a first-party application.
Enterprise applications are applications registered with your identity provider that need to access user and group data or to which you wish to control access.
Lists the devices in your organization and provides information significant to your security posture, including whether the device join type, whether it is mobile policy compliant, and whether it is synced with Active Directory.
Devices are endpoints, including desktops, laptops, printers, and mobile devices, that are registered to your identity provider in order to allow single sign-on (SSO) or conditional access.
Lists the groups in your organization and provides information significant to your security posture, including the group type.
Groups are collections of users, devices, service principals, or groups assigned the same security or application access permissions.
Lists the roles used by the identities in your organization.
Roles are sets of built-in or custom permissions granted to users, groups, or devices to control permissions and access in your organization.
Lists the Conditional Access (CA) policies assigned to the identities in your organization.
Conditional Access (CA) policies are sets of conditions, such as location, device type, and device posture, that govern resource access in your organization.
Lists the permissions granted to the identities in your organization.
Granted permissions are active permissions granted by users to applications to allow specific resource access and use.
The following table details the common actions available on the tabs except Overview.
Action
Details
Search identities
Enter the identity name into the search field to search for specific identities.
Filter identities
Filter identities by clicking Add filter and setting the criteria.
Sort identities
Sort identities by clicking a column header.
Some column headers may not support sorting.
Access detailed profiles
Click on an identity in the first column to access detailed profile information for the identity.
Export identity information
Export information about identities to a .csv file. If you have applied filter criteria, only the identities that have been filtered are exported.