Cloud Strategy
Cloud-first strategy
Phishing-Resistant Authentication
Choosing the right phishing-resistant authentication method for your environment
Directory Synchronization
Directory synchronization
Entra Security Settings
Entra Security Settings
Identity Governance
Access governance — HR provisioning, Face Check identity verification, PIM, and Entitlement Management
Cross-Tenant Collaboration
Cloud-only identities, PIM, and B2B