Introduction
One of the biggest challenges IT and HR teams face is ensuring that employee accounts are created, updated, and deactivated in a timely and accurate way. Traditional file-based imports and manual processes are slow, error-prone, and often disconnected from the source of truth, your HR system.With API-driven inbound provisioning in Microsoft Entra ID, you can integrate your HR system directly with Microsoft Graph. This allows authoritative HR data to automatically flow into Microsoft Entra ID and then into your on-premises Active Directory through the provisioning agent.
In this blog, I’ll guide you step by step through the configuration process for API-driven provisioning using Microsoft Graph Explorer, complemented with screenshots from my lab environment.
What is API-Driven Inbound Provisioning?
API-driven inbound provisioning is a modern mechanism where HR systems push identity data into Microsoft Entra ID using the Microsoft Graph API. Entra ID then provisions that data downstream to connected systems, such as on-premises AD, using the provisioning agent.
Source: MicrosoftKey benefits:- Real-time automation – new hires, job changes, and terminations are reflected immediately.
- Flexibility – define custom attribute mappings, unique UPN formats, and filtering rules.
- Security – central audit logs, scoped provisioning, and better governance.
- Integration – works with any HR system capable of calling Graph APIs (Workday, SAP, or even a custom in-house system).
Prerequisites
Before configuring, ensure the following:
- Licenses: Microsoft Entra ID P1 or P2.
- Roles: Application Administrator + Hybrid Identity Administrator.
- On-prem server: Windows Server 2016+ with internet access and .NET 4.7.1+.
- Provisioning Agent installed on a domain-joined server with rights to create/update users.
- HR system or middleware capable of making API calls (e.g., Logic Apps, PowerShell, Graph Explorer or direct HRIS integration).
Step-by-Step Configuration
Step 1: Install & Register the Provisioning Agent
Download the Microsoft Entra provisioning agent from the portal.
Install the provisioning agent on an on-premises Windows Server that is domain-joined to Active Directory and has reliable internet access for communication with Microsoft Entra ID

Next, let’s configure the service account that will handle synchronization from Active Directory. For this, we’ll create a Group Managed Service Account (gMSA). To create the gMSA, provide the required domain credentials and then click Next.
Now, if you navigate to Entra Connect → Cloud Sync and select Agents, you will see the newly installed agent listed there.
Step 2: Create the Enterprise Application
In Microsoft Entra Admin Center, navigate to Enterprise applications → New application.Search for “API-driven provisioning to on-premises Active Directory”.
Now, return to the Provisioning blade and enable the Provisioning status to activate the configuration.
HR-Driven Scenarios & Use Cases
Onboarding (Joiners): When HR creates a new employee record, an AD account is automatically provisioned with attributes such as name, department, and email etc.
Role Changes (Movers): Department transfers, promotions, or manager updates are instantly reflected in AD.
Offboarding (Leavers): HR-initiated terminations disable AD accounts the same day, reducing the risk of orphaned identities.
Re-hires: HR can reactivate a user record instead of creating duplicates, ensuring data consistency.
This HR-driven identity lifecycle improves accuracy, enhances compliance, and reduces IT overhead.
Advantages
Automation – Eliminates manual account creation.
Security – Prevents stale or orphaned accounts.
Efficiency – Reduces IT workload and accelerates onboarding.
Flexibility – Works with any HR system capable of calling APIs.
Governance – Provides full audit trails in Entra provisioning logs.
Conclusion
In this blog, I showcased how API-driven inbound provisioning works using Microsoft Graph Explorer as an example. This approach demonstrates the core flow of pushing HR data into Microsoft Entra and automatically provisioning accounts into on-premises Active Directory.
In real-world scenarios, organizations can integrate this process directly with their HR systems, or leverage Logic Apps and automation pipelines to seamlessly create and update users in local AD. By adopting this model, businesses can modernize their joiner-mover-leaver lifecycle, strengthen security posture, and optimize IT operations.
Stay tuned, I’ll be covering more configuration flow scenarios in my upcoming blogs.
0 Comments