You boot an EC2 instance, open your SSH client, and pause. Another round of temporary keys, Bastion host approvals, and sticky notes with IAM role names. It feels like 2010. That friction is exactly what EC2 Systems Manager and Microsoft Entra ID can remove together, if you wire them correctly.
AWS Systems Manager (SSM) gives you remote control of EC2 instances without touching the network layer. It routes commands through the AWS API itself, which means no exposed SSH ports. Microsoft Entra ID, the new face of Azure Active Directory, anchors identity in a consistent, audit-ready model. Combine them and you get privileged access that respects who a user is, not where they sit.
At a high level, you use Entra ID to prove identity and SSM to enforce it. The flow works like this: a user signs in through Entra ID using OpenID Connect, gets mapped to a temporary AWS IAM role via a trust policy, then uses Systems Manager Session Manager to connect to EC2. No long-lived credentials ever touch a laptop. Everything routes through the control plane and lands in CloudTrail. The result is zero exposed endpoints and full traceability.
Quick answer: To connect EC2 Systems Manager with Microsoft Entra ID, configure an OIDC trust in AWS IAM that recognizes Entra as the identity provider, map user groups to IAM roles, and enable Session Manager to launch authenticated sessions without SSH keys.
Set clear access boundaries. Map Entra ID groups to IAM roles that represent real jobs, not fictional ones like “superadmin.” Use AWS managed policies only as a starting point, then tighten permissions with least privilege. Rotate temporary credentials automatically, and push logs into a system your compliance team actually reads. Auditability is only boring until you need it.