Entra External ID features missing on one tenant

Vedran Opančar - dotSource SE 5 Reputation points
2025-01-24T06:48:40.98+00:00

Hello,

In my test default tenant, when I set up Entra External ID as a Global Administrator, I can access all available features. However, in my client’s Entra External tenant, where I have the roles of Application Administrator and Cloud Application Administrator, I notice several features are missing.

The missing features include but are not limited to:

  • Conditional Access
  • Custom Extension Submit options
  • Submit & Run User Flow button
  • Features labeled as "(Preview)"
  • etc

I would like to understand why these features are unavailable in my client tenant and how I can enable them.

Thank you for your assistance.

Microsoft Entra External ID
Microsoft Entra External ID
A modern identity solution for securing access to customer, citizen and partner-facing apps and services. It is the converged platform of Azure AD External Identities B2B and B2C. Replaces Azure Active Directory External Identities.
3,001 questions
0 comments No comments
{count} vote

2 answers

Sort by: Most helpful
  1. Raja Pothuraju 11,610 Reputation points Microsoft Vendor
    2025-01-24T10:07:15.3566667+00:00

    Hello @Vedran Opančar - dotSource SE,

    Thank you for posting your query on Microsoft Q&A.

    As @Abiola Akinbade mentioned, the difference between your test tenant and the client’s tenant is due to the roles assigned to your user account. In your test tenant, you can perform actions in the External ID tenant because you have the Global Administrator role. However, in the client’s tenant, where you only have the "Application Administrator" and "Cloud Application Administrator" roles, you lack the necessary permissions to manage or make changes to Entra features.

    To manage conditional access policies, you need to have at least the Conditional Access Administrator or Security Administrator role assigned.

    https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/delegate-by-task#security---conditional-access

    User's image

    To manage user flows, your account must have the External ID User Flow Administrator role.

    https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/delegate-by-task#external-identitiesb2c

    User's image

    Additionally, if you are encountering any error messages when trying to create a Custom Authentication Extension (Preview), please share a screenshot of the error. This will help us troubleshoot the issue more effectively.

    You also mentioned that some features currently in Preview are unavailable for use. Could you provide more details about these options so we can investigate and provide further guidance?

    I hope this information is helpful. Please feel free to reach out if you have any further questions.

    Thanks,
    Raja Pothuraju.

    1 person found this answer helpful.

  2. Abiola Akinbade 22,630 Reputation points
    2025-01-24T07:57:55.1133333+00:00

    Hello Vedran Opančar - dotSource SE,

    Thanks for your question

    This is an RBAC issue. The discrepancies you’re observing between your test tenant and your client’s Entra External ID tenant are likely due to the differences in the roles assigned to you in each environment. 

    For example To manage Conditional access you need at least the Conditional Access Administrator role as the cloud application administrator does not have the needed ppermissions for CA management:

    See: https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/permissions-reference#conditional-access-administrator

    To resolve the issue, for what you need on the tenant you need to have the appropriate roles assigned.

    You can mark it 'Accept Answer' and 'Upvote' if this helped you

    Regards,

    Abiola

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.