The screen waits for a single string of characters—the Microsoft Entra Provisioning Key. Without it, automatic user management stops cold. With it, systems align, accounts sync, and identities flow between applications without manual fixes.
Microsoft Entra creates a secure bridge for identity provisioning. The provisioning key is the credential that authorizes the service to push and pull user data between your directory and external apps. This key is generated inside the Entra admin center and must be stored with care. Lose it, and the provisioning connection breaks. Rotate it, and you re-establish trust between Entra and the target system.
When setting up app provisioning in Microsoft Entra, go to Enterprise Applications, choose your target app, and open the Provisioning tab. Under the Admin Credentials section, you’ll find the option to create a new provisioning key. This key is paired with a secret token. Together, they authenticate API calls that send identity changes from Azure AD into the app.