Provisioning Scoped Entra ID Accounts for Guests
Audience: IT administrators, identity managers
Purpose: Create temporary accounts for devices using group-based licensing and automation
This guide is a work in progress and may be incomplete or subject to change.
Overview
This process is for very short-term temporary accounts (typically less than 30 days). For longer-term guest access, use the official Sponsored NetID Process.
This guide explains how to provision temporary user accounts for devices managed by Intune that leverage Entra ID logins (guest or kiosk accounts) using:
- Group-Based Licensing/Policies — Assign licenses and policies via Entra ID groups
- Power App + Power Automate — Self-service or admin-assisted account creation
- Lifecycle Workflows — Automatic account expiration (default 2 weeks)
Quick Reference
- Group-Based Licensing — New accounts inherit access when added to the appropriate group
- Power Platform — Front-end for account creation with multiple scenario pages
- Lifecycle Workflow — Automatically disable/delete accounts after set duration
Background
Organizations need short-term accounts for guests, kiosks, or events with:
- Limited license and policy sets
- Automatic cleanup after a set period
Temporary "Experiences"
An experience is a category of temporary account with defined access and lifespan:
| Experience | Access Level | Duration |
|---|---|---|
| Library Guest | Library computer access | 1 day |
| General Guest | Campus Wi-Fi and lab access | 2 weeks |
| Event Guest | Event-specific resources | Custom |
Each experience corresponds to a security group with bundled licenses and policies.
Prerequisites
| Requirement | Details |
|---|---|
| Entra ID Premium P1 | Required for group-based licensing and dynamic groups |
| Entra ID Premium P2 | Required for Lifecycle Workflows (automatic expiration) |
| Power Platform | Power Pages site and Power Automate licenses |
| Security Groups | One group per experience with licenses/policies assigned |
| License Availability | Sufficient M365 license seats for group members |
Solution Architecture
Implementation Steps
Step 1: Prepare Groups
Create Experience Groups
Create security groups for each experience type:
| Group Name | Purpose |
|---|---|
TS-SG-Temp-Library | Library kiosk guest accounts |
TS-SG-Temp-Guest | General guest accounts (14-day) |
TS-SG-Temp-Event | Event-specific temporary users |
Use consistent naming conventions per IT policies.
Assign Licenses to Groups
- In Entra ID admin center, select the group
- Configure Group-Based Licensing
- Assign required product SKUs
- Disable unneeded service plans (e.g., turn off Exchange if no email needed)
All group members automatically receive the assigned licenses.
Assign Policies to Groups
Target policies to experience groups:
| Policy Type | Example |
|---|---|
| Intune profiles | Lock down library PC when temp account logs in |
| Conditional Access | Block sensitive apps or require MFA |
| Terms of Use | Require acceptance before access |
Group membership governs all access—no individual configuration needed.
Step 2: Build Power Automate Flow
Design Power Pages Front-End
Create pages for different audiences:
Library Kiosk Page:
- Accessible without login (IP-restricted to kiosks)
- Minimal info collection
- Auto-creates Library Guest account
Admin Provisioning Page:
- Requires staff authentication
- Dropdown to select experience type
- Creates account in corresponding group
Configure Account Creation Flow
The Power Automate flow should:
- Receive form inputs (name, experience type, etc.)
- Create user account in Entra ID
- Set temporary password
- Add user to appropriate experience group
- Set
employeeLeaveDateTimefor Lifecycle Workflow - Return credentials (securely)
Step 3: Configure Lifecycle Workflow
Set Up Automatic Expiration
Use Entra ID Lifecycle Workflows to automatically disable/delete accounts:
- Navigate to Entra ID → Identity Governance → Lifecycle Workflows
- Create workflow triggered by
employeeLeaveDateTime - Configure actions:
- Disable account
- Remove from all groups
- (Optional) Delete account after grace period
Default: 14 days, adjustable per experience.
Security Considerations
| Consideration | Implementation |
|---|---|
| Network restrictions | Limit kiosk page access by IP range |
| Credential delivery | Secure channel for temporary passwords |
| Audit trail | All account creation logged via Power Automate |
| Access review | Regular review of experience group membership |
Related Resources
- Entra ID Documentation — Identity management
- PIM Best Practices — Privileged access
- Intune Documentation — Device management
- Sponsored NetID Process — Long-term guest access