Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The Microsoft Entra admin center allows you to view all agent identity blueprint principals in your tenant. You can search, filter, sort, and manage blueprint principals including their credentials, permissions, and owners.
Navigate to the agent identity blueprint list
- Sign in to the Microsoft Entra admin center.
- Browse to Entra ID > Agents > Agent blueprints.
- Select a blueprint principal to open its management page.
Search and filter blueprints
- Enter the name or object ID of the blueprint principal in the search box.
- To look up a blueprint by its Blueprint Application ID, select Add filters and add the Blueprint App ID filter.
- You can further refine the list using filters based on various criteria.
Select viewing options
To customize your view, select Choose columns to configure which columns are shown. The available columns are:
| Column Name | Description | Sortable | Filterable | Special notes |
|---|---|---|---|---|
| Name | Display name of the agent identity blueprint principal | ✓ | ✓ | Primary search field; clickable to view details of the agent identity blueprint principal |
| Agent identities | The number of child agent identities created by the agent blueprint principal | ✗ | ✗ | Select this to see a list of linked child agent identities for that agent identity blueprint principal |
| Status | Current operational state (Active, or Disabled) | ✓ | ✓ | |
| Blueprint Application ID | Unique identifier for the agent identity blueprint of this agent identity blueprint principal | ✗ | ✓ | |
| Object ID | Unique identifier for agent blueprint principal | ✗ | ✓ |
View linked agent identities
View the agent identities that were created from a blueprint.
- From the blueprint's management page, select Linked agent identities from the left menu.
- The list shows each linked identity with its Name, Status, View Access link, and Owners and Sponsors.
- Select an identity name to navigate to its detail page.
- Use Add filters to refine the list.
View granted permissions
Review the permissions assigned to a blueprint principal, organized by consent type.
- From the blueprint's management page, select Granted permissions under Access.
- Select the Admin consent tab to view permissions granted through administrator consent, or select the User consent tab to view permissions granted through user consent.
- The list shows the API name, Claim value, Permission, Type, Granted through, and Granted by for each permission entry.
View the manifest
To view or edit the raw JSON manifest for the agent identity blueprint, select Manifest under Developer settings from the blueprint's management page.
Note
The manifest editor is currently in preview.
Manage credentials
Configure the credentials that agent identities use to authenticate. The credentials page has three tabs for different credential types.
Important
To best align with Zero Trust principles, use federated credentials or certificates instead of client secrets.
Upload a certificate
- From the blueprint's management page, select Credentials under Developer settings.
- Select the Certificates tab.
- Select Upload certificate.
- Browse to and select the certificate file, and optionally add a description.
- Select Add.
Create a client secret
- From the blueprint's management page, select Credentials under Developer settings.
- Select the Client secrets tab.
- Select New client secret.
- Enter a Description for the secret.
- Select an expiration period under Expires. For custom expiration, set the Start and End dates.
- Select Add.
- Copy the secret Value immediately. The value isn't displayed again after you leave the page.
Note
Your tenant policy might limit the maximum lifetime for client secrets.
Add a federated credential
Federated credentials use workload identity federation to establish trust between Microsoft Entra and external identity providers without storing secrets. For more information about these scenarios and how workload identity federation works, see Workload identity federation.
Take the following steps to add a federated credential for an agent identity blueprint principal.
- From the blueprint's management page, select Credentials under Developer settings.
- Select the Federated credentials tab.
- Select Add credential.
- Under Federated credential scenario, select a scenario:
- Managed Identity — Configure a managed identity to get tokens and access resources across tenants.
- GitHub Actions deploying Azure resources — Configure a GitHub workflow to get tokens and deploy to Azure.
- Kubernetes accessing Azure resources — Configure a Kubernetes service account to get tokens and access Azure resources.
- Other issuer — Configure an identity managed by an external OpenID Connect provider.
- Complete the required fields for the selected scenario.
- Select Add.
Manage owners and sponsors
Owners and sponsors help establish governance for your blueprint. From the Owners and sponsors page in the left menu, you can manage ownership for both the agent blueprint and the agent blueprint principal.
For detailed steps on adding, removing, and managing owners and sponsors, see Add and manage owners and sponsors for agent identities and blueprints.
View audit and sign-in logs
You can view logs for both the agent blueprint principal and the blueprint itself from the blueprint's management page.
Agent blueprint principal activity
The agent blueprint principal supports both audit and sign-in logs:
- To view administrative actions taken on the blueprint principal, select Audit logs from the left menu under Agent blueprint principal activity.
- To view sign-in activity for the blueprint principal, select Sign-in logs from the left menu under Agent blueprint principal activity. For more information, see view sign-in logs for agents.
Agent blueprint activity
The agent blueprint supports only audit logs:
- To view administrative actions related to the blueprint configuration, select Audit logs from the left menu under Agent blueprint activity.
Disable an agent identity blueprint principal
To disable an agent identity blueprint principal, select the Disable button in the command bar at the top of the blueprint's overview page. A confirmation dialog appears warning that existing agent identities created from this blueprint will no longer be able to authenticate. Confirm the action to proceed.