Azure Active Directory connector
Automate Identity Management and User Provisioning with Azure Active Directory
Connect Azure AD to your tech stack to clean up user lifecycle management, access control, and security workflows.

What can you do with the Azure Active Directory connector?
Azure Active Directory is Microsoft's cloud-based identity and access management service, used by thousands of organizations to control who can access which applications and resources. Integrating Azure AD with your other business tools cuts out the manual work of provisioning accounts, managing group memberships, and enforcing security policies across systems. With tray.ai, you can build workflows that keep Azure AD in sync with your HRIS, ticketing, CRM, and collaboration tools in real time.
Automate & integrate Azure Active Directory
Automating Azure Active Directory business process or integrating Azure Active Directory data is made easy with tray.ai
Use case
Automated Employee Onboarding and Provisioning
When a new hire is added to your HRIS (such as Workday, BambooHR, or HiBob), tray.ai can automatically create their Azure AD account, assign them to the right security groups, grant application access based on their role, and trigger a welcome workflow in Slack or Microsoft Teams. This eliminates days of manual IT setup and means new employees can actually get work done on day one.
Use case
User Deprovisioning and Offboarding
When an employee leaves, tray.ai can immediately detect the change in your HRIS, disable or delete their Azure AD account, revoke all group memberships, and notify IT and security teams via email or Slack. Automated offboarding closes the window of unauthorized access that opens up when this process is handled manually.
Use case
Dynamic Group Membership Sync
Keep Azure AD security groups synchronized with data from external systems like your CRM, project management tool, or HRIS. When a user changes departments, gets promoted, or joins a new project team, tray.ai updates their group memberships in Azure AD automatically so their permissions always reflect their actual role.
Use case
Security Incident Response and Alerting
Connect Azure AD sign-in and audit logs to your SIEM or alerting tools to build automated security response workflows. When Azure AD detects risky sign-ins, impossible travel events, or MFA failures, tray.ai can force a password reset, disable an account, open a Jira ticket, or page an on-call engineer via PagerDuty.
Use case
SaaS Application Access Request Automation
When employees submit access requests through a ticketing system like ServiceNow or Jira Service Management, tray.ai routes approvals, updates Azure AD group memberships upon approval, and notifies the requester automatically. IT gets a governed, auditable process without manually executing every step.
Use case
Cross-Directory User Sync and Identity Reconciliation
Organizations running multiple directories or identity providers alongside Azure AD often end up with inconsistent user data — and that causes real problems. tray.ai can reconcile user profiles between Azure AD and other LDAP directories, Okta, Google Workspace, or on-premises Active Directory, keeping attributes like job title, manager, department, and phone number consistent across all systems.
Use case
License Management and Cost Optimization
Automatically audit Microsoft 365 and Azure AD licensed users against your HRIS or active user data to find unused licenses. tray.ai can flag inactive accounts, trigger license reclamation workflows, and generate reports for finance and IT leadership — so you stop paying for licenses assigned to people who left six months ago.
Build Azure Active Directory Agents
Give agents secure and governed access to Azure Active Directory through Agent Builder and Agent Gateway for MCP.
Data Source
Look Up User Details
Retrieve profile information for a specific user, including display name, email, department, job title, and contact details. Useful for enriching workflows with accurate identity data from the directory.
Data Source
List Group Members
Fetch all members belonging to a specific Azure AD group or security group. Lets agents understand team compositions, access scopes, or approval chains for downstream automation.
Data Source
Search and Filter Users
Query users across the directory using filters like department, location, or role. Helps agents find the right people for notifications, assignments, or access reviews.
Data Source
Retrieve User Sign-In Activity
Pull recent sign-in logs and activity data for a user or set of users. Useful for security monitoring agents that need to detect anomalous login patterns or dormant accounts.
Data Source
Check Group Membership
Confirm whether a specific user belongs to a given group or holds a particular role assignment. Lets agents make conditional decisions based on a user's access level or team affiliation.
Data Source
List Registered Applications
Retrieve details about applications registered in Azure AD, including permissions and owners. Supports governance workflows where agents audit app access or flag unused integrations.
Agent Tool
Create New User
Provision a new user account in Azure Active Directory with attributes like name, email, department, and initial password. Automates onboarding workflows triggered by HR systems or ticketing tools.
Agent Tool
Update User Profile
Modify attributes on an existing user account, such as job title, manager, phone number, or department. Keeps directory data in sync when changes come in from source-of-truth systems like an HRIS.
Agent Tool
Enable or Disable User Account
Toggle the sign-in status of a user account to enable or block access. Good for offboarding workflows or security incident response where you need to cut access fast.
Agent Tool
Add User to Group
Add a specified user to one or more Azure AD groups, granting them associated permissions and resource access. Fits role-based access provisioning during onboarding or role-change workflows.
Agent Tool
Remove User from Group
Remove a user from a designated group, revoking the associated access rights. Handles offboarding, role transitions, or access cleanup during periodic reviews.
Agent Tool
Reset User Password
Trigger a password reset for a user account, optionally requiring a change at next sign-in. Lets agents handle help desk requests or security alerts without manual IT intervention.
Agent Tool
Delete User Account
Permanently remove or soft-delete a user from Azure Active Directory as part of an offboarding or cleanup process. Can be coordinated with other deprovisioning steps across connected SaaS tools.
Get started with our Azure Active Directory connector today
If you would like to get started with the tray.ai Azure Active Directory connector today then speak to one of our team.
Azure Active Directory Challenges
What challenges are there when working with Azure Active Directory and how will using Tray.ai help?
Challenge
Managing Complex Microsoft Graph API Authentication
Azure AD integration runs through the Microsoft Graph API, which requires OAuth 2.0 client credentials flows, proper scope configuration, and token refresh handling. Many teams get stuck on app registrations, granting admin consent for the right permissions, and keeping tokens valid across long-running workflows.
How Tray.ai Can Help:
tray.ai handles OAuth authentication and token lifecycle management natively. Configure your Azure AD app registration once and tray.ai takes care of token refresh from there. The built-in connector setup walks you through the required permission scopes, which cuts down on setup errors considerably.
Challenge
Handling Large Directory Datasets with Pagination
Azure AD tenants at large enterprises can have tens of thousands of users and groups. The Microsoft Graph API returns paginated responses, and workflows that need to process the full directory have to handle nextLink tokens correctly — otherwise you end up with incomplete syncs and missing records.
How Tray.ai Can Help:
tray.ai's loop and pagination handling lets workflows automatically follow Microsoft Graph nextLink tokens across paginated result sets, so every user and group record gets processed without any custom pagination code.
Challenge
Keeping Multiple Systems in Sync Without Duplication
When Azure AD runs alongside Okta, Google Workspace, or on-premises AD, bidirectional sync workflows can create duplicate records or write conflicts if changes originate in multiple systems at the same time. It's a messier problem than it looks.
How Tray.ai Can Help:
tray.ai lets you define source-of-truth logic directly in your workflows, using conditional branches and data lookup steps to check whether a record already exists before writing. That prevents duplicate provisioning and makes it straightforward to build idempotent sync patterns across all connected directories.
Challenge
Auditing and Compliance Reporting Across Identity Events
Compliance frameworks like SOX, HIPAA, and ISO 27001 require detailed audit trails of who was granted or revoked access, when, and by whom. Azure AD's built-in audit logs are solid, but getting that data into a format compliance teams can actually use requires extra tooling.
How Tray.ai Can Help:
tray.ai workflows can pull Azure AD audit log data on a schedule, filter and transform events by type, and push structured reports to data warehouses, Google Sheets, or compliance tools. Every automated action a tray.ai workflow takes is also logged, so you get a complete chain of custody.
Challenge
Reacting to Real-Time Directory Events at Scale
Many identity workflows need to respond to events as they happen — a user added to a group, a password reset — but polling the Azure AD API frequently enough for near-real-time response puts pressure on rate limits and makes scheduling complicated.
How Tray.ai Can Help:
tray.ai supports Microsoft Graph change notifications and webhook-based triggers where available, so workflows can react to Azure AD events in near real time without constant polling. Where polling is necessary, tray.ai's rate limit handling and retry logic prevent throttling errors from breaking your workflows.
Talk to our team to learn how to connect Azure Active Directory with your stack
Find the tray.ai connector with one of the 700+ other connectors in the tray.ai connector library to integrate your stack.
Integrate Azure Active Directory With Your Stack
The Tray.ai connector library can help you integrate Azure Active Directory with the rest of your stack. See what Tray.ai can help you integrate Azure Active Directory with.
Start using our pre-built Azure Active Directory templates today
Start from scratch or use one of our pre-built Azure Active Directory templates to quickly solve your most common use cases.
Azure Active Directory Templates
Find pre-built Azure Active Directory solutions for common use cases
Template
New Employee Onboarding: HRIS to Azure AD
Automatically creates an Azure AD user account, assigns role-based security groups, and sends a welcome message in Microsoft Teams when a new hire record is created in Workday or BambooHR.
Steps:
- Trigger on new employee record created in Workday or BambooHR
- Map employee attributes (name, department, role) and create user account in Azure AD
- Assign user to appropriate security groups and licensed application groups based on role
- Send personalized welcome message to the new hire's Teams channel and notify IT of completion
Connectors Used: Azure Active Directory, Workday REST, Microsoft Teams
Template
Employee Offboarding: Disable Azure AD Account on Termination
Watches for terminated employee records in your HRIS and immediately disables the Azure AD account, removes group memberships, and opens a deprovisioning ticket in ServiceNow.
Steps:
- Trigger when employee status changes to 'Terminated' in BambooHR
- Disable the corresponding Azure AD user account and revoke all group memberships
- Create a deprovisioning task in ServiceNow for IT to complete any hardware or physical access steps
- Post a notification to the IT security Slack channel with the account action summary
Connectors Used: Azure Active Directory, BambooHR, ServiceNow, Slack
Template
Azure AD Risky Sign-In to PagerDuty Incident
Monitors Azure AD Identity Protection for risky or anomalous sign-in events and automatically escalates high-risk incidents to PagerDuty while logging event details in a Jira security ticket.
Steps:
- Poll Azure AD Identity Protection API for new risky sign-in detections on a scheduled interval
- Filter for high-severity events and enrich with user profile data from Azure AD
- Create a Jira security ticket with full sign-in context, user details, and risk level
- Trigger a PagerDuty incident to page the on-call security engineer for immediate response
Connectors Used: Azure Active Directory, PagerDuty, Jira
Template
Jira Access Request to Azure AD Group Assignment
Automates the end-to-end SaaS access request process by routing Jira Service Management tickets through an approval workflow and updating Azure AD group memberships upon approval.
Steps:
- Trigger when a new access request ticket is created in Jira Service Management
- Send an approval request to the relevant manager or system owner in Slack
- On approval, add the requesting user to the appropriate Azure AD security or application group
- Update the Jira ticket status and notify the requester that access has been provisioned
Connectors Used: Azure Active Directory, Jira, Slack
Template
Monthly Inactive License Audit and Reclamation
Runs on a monthly schedule to compare licensed Azure AD users against HRIS active employee data, flags unused licenses, and delivers a report to finance via email.
Steps:
- Schedule workflow to run on the first day of each month
- Pull all licensed users from Azure AD and active employees from Workday
- Identify discrepancies where licensed Azure AD accounts have no matching active HRIS record
- Log flagged accounts to a Google Sheet and send a summary email report to IT and Finance stakeholders
Connectors Used: Azure Active Directory, Workday REST, Gmail, Google Sheets
Template
Azure AD User Attribute Sync from Salesforce
Keeps Azure AD user profiles updated when contact information or job titles change in Salesforce, so downstream SSO applications always get accurate user attributes.
Steps:
- Trigger on record update events for User or Contact objects in Salesforce
- Map updated Salesforce field values to corresponding Azure AD user attribute schema
- Patch the Azure AD user profile via Microsoft Graph API with the updated attributes
- Log the sync event and any errors to an internal monitoring system or Slack channel
Connectors Used: Azure Active Directory, Salesforce







