Tenant

Master this essential documentation concept

Quick Definition

In cloud services like Azure AD, a dedicated instance of the platform assigned to a single organization, containing all of that organization's users, groups, and configurations.

How Tenant Works

graph TD A[Azure AD Tenant contoso.onmicrosoft.com] --> B[Users & Groups] A --> C[Applications & Service Principals] A --> D[Policies & Configurations] A --> E[Subscriptions & Resources] B --> B1[HR Staff - 120 users] B --> B2[Engineering - 85 users] B --> B3[Security Group: MFA-Required] C --> C1[Microsoft 365] C --> C2[Custom Internal App] D --> D1[Conditional Access Policies] D --> D2[Password Reset Policy] E --> E1[Azure Subscription: Prod] E --> E2[Azure Subscription: Dev] style A fill:#0078D4,color:#fff,stroke:#005A9E style B fill:#50E6FF,color:#000 style C fill:#50E6FF,color:#000 style D fill:#50E6FF,color:#000 style E fill:#50E6FF,color:#000

Understanding Tenant

In cloud services like Azure AD, a dedicated instance of the platform assigned to a single organization, containing all of that organization's users, groups, and configurations.

Key Features

  • Centralized information management
  • Improved documentation workflows
  • Better team collaboration
  • Enhanced user experience

Benefits for Documentation Teams

  • Reduces repetitive documentation tasks
  • Improves content consistency
  • Enables better content reuse
  • Streamlines review processes

Documenting Tenant Configurations Across Your Organization

When onboarding new administrators or setting up Azure AD integrations, teams often default to recording walkthrough sessions — screen-sharing a tenant's user structure, conditional access policies, and group configurations in real time. These recordings capture the context well in the moment, but they create a fragile knowledge base.

The core problem is discoverability. When a team member needs to recall how your tenant's guest access settings were configured, or why a specific security group was structured a certain way, scrubbing through a 45-minute onboarding recording is rarely practical. Tenant-level decisions — which affect every user, app, and permission in your organization — deserve documentation that can be searched, versioned, and referenced quickly.

Consider a scenario where your IT team records a session explaining how your tenant's multi-factor authentication policies were set up. Converting that recording into a structured SOP means the next administrator can find the exact decision rationale and step-by-step configuration without scheduling a follow-up call or rewatching the full session.

Automatically extracting the decisions, action items, and processes from your Teams recordings makes tenant configuration knowledge genuinely reusable — not just archived.

Real-World Documentation Use Cases

Documenting Multi-Tenant SaaS Onboarding for Enterprise Customers

Problem

SaaS vendors struggle to explain to enterprise IT admins how their product integrates with the customer's existing Azure AD tenant without requiring a separate identity store, leading to lengthy back-and-forth during sales and onboarding.

Solution

By clearly documenting the tenant-based trust model, IT admins understand that the SaaS application registers as an enterprise application within their own Azure AD tenant, preserving their existing user lifecycle management and Conditional Access Policies.

Implementation

["Create a diagram showing the customer's Azure AD tenant as the authoritative identity source, with the SaaS app registered as an enterprise application inside it.", 'Document the admin consent flow step-by-step, specifying which Microsoft Graph API permissions are requested and why (e.g., User.Read for SSO, Group.Read.All for role mapping).', 'Provide a tenant configuration checklist covering: app registration, redirect URIs, claim mappings, and optional SCIM provisioning endpoint setup.', "Include a troubleshooting section for common tenant-specific errors such as 'AADSTS50020: User account from identity provider does not exist in tenant.'"]

Expected Outcome

Enterprise onboarding time reduced from 2 weeks to 2-3 days, with IT admins completing setup independently using the documentation without requiring a support call.

Writing Internal Runbooks for Azure AD Tenant Governance Audits

Problem

Security and compliance teams at mid-to-large organizations lack standardized runbooks for auditing their Azure AD tenant, resulting in inconsistent audit outputs and missed misconfigurations like stale guest accounts or overprivileged service principals.

Solution

Tenant-scoped documentation defines the exact PowerShell and Microsoft Graph API queries needed to enumerate users, guest accounts, app registrations, and role assignments within a specific tenant, creating a repeatable audit process.

Implementation

['Document the tenant ID retrieval process and how to authenticate to Microsoft Graph using a service principal with least-privilege roles (e.g., Global Reader).', 'Create a step-by-step runbook section for each audit area: inactive users (last sign-in > 90 days), guest accounts without a sponsor, app registrations with expiring credentials, and users with permanent privileged roles.', 'Include sample Microsoft Graph API calls and expected JSON response schemas so auditors can validate output format.', 'Add a remediation decision tree: for each finding type, document the approval workflow, the remediation command, and the evidence to retain for compliance records.']

Expected Outcome

Quarterly tenant audits that previously took a security engineer 3 full days now complete in under 6 hours, with consistent findings format accepted directly by external auditors.

Documenting Tenant Separation Strategy for a Corporate Merger

Problem

When two companies merge, IT architects must decide whether to consolidate into one Azure AD tenant or maintain separate tenants with cross-tenant access, but there is rarely clear documentation guiding this decision or its consequences for applications and users.

Solution

Documentation that maps tenant boundaries, cross-tenant synchronization options (Azure AD B2B vs. tenant merge), and the impact on existing Conditional Access Policies and app registrations gives architects a concrete framework for the merger decision.

Implementation

["Document both tenants' current state: number of users, federated domains, active app registrations, and existing Conditional Access Policies using a side-by-side comparison table.", 'Create decision-tree documentation covering the three architectural options: full tenant merge, cross-tenant synchronization with Azure AD Connect, and B2B guest collaboration—with trade-offs for each.', 'Write a phased migration runbook for the chosen approach, documenting how user UPNs, group memberships, and application assignments will be migrated or re-provisioned in the target tenant.', 'Document the rollback procedure and the 30-day monitoring checklist to validate sign-in success rates and application access post-migration.']

Expected Outcome

The architecture team aligns on a migration strategy within one week instead of three, and the IT helpdesk receives 60% fewer support tickets during the cutover period due to clear user-facing communication docs.

Creating Developer Guides for Acquiring Tokens Across Multiple Tenants

Problem

Developers building multi-tenant applications frequently misconfigure MSAL (Microsoft Authentication Library) by hardcoding a single tenant ID, causing authentication failures for users from external customer tenants and generating confusing AADSTS error codes.

Solution

Documentation that explains the difference between single-tenant, multi-tenant, and common/organizations authority endpoints—with concrete MSAL code samples for each scenario—prevents misconfiguration and clarifies how token audiences relate to tenant IDs.

Implementation

['Create a concept page explaining tenant ID, tenant domain, and authority URL formats (e.g., https://login.microsoftonline.com/{tenantId} vs. https://login.microsoftonline.com/common) with a table showing when to use each.', "Provide working MSAL code samples in Python, JavaScript, and C# showing how to configure the authority for multi-tenant scenarios and how to validate the 'tid' claim in the received JWT token.", "Document the admin consent vs. user consent flow for multi-tenant apps, including which tenant's admin must grant consent and how to construct the consent URL with the correct tenant parameter.", 'Add a troubleshooting reference mapping the top 10 AADSTS error codes (e.g., AADSTS700016, AADSTS90094) to their tenant-related root causes and specific configuration fixes.']

Expected Outcome

Developer support tickets related to multi-tenant authentication drop by 45% within the first month of publishing, and new developers complete their first successful multi-tenant token acquisition within one day.

Best Practices

âś“ Always Specify the Tenant Scope at the Top of Every Azure AD Document

Azure AD documentation that omits whether instructions apply to a single-tenant or multi-tenant context forces readers to make dangerous assumptions. A reader configuring Conditional Access Policies in a single-tenant internal app context will implement them incorrectly if the doc was written for a multi-tenant SaaS scenario. Explicitly state the tenant type, the target audience (tenant admin vs. application developer), and the tenant's role in the scenario within the first paragraph.

âś“ Do: Begin every Azure AD runbook or guide with a 'Scope' section that states: 'This guide applies to a single Azure AD tenant acting as the identity provider for internal employees. The tenant ID is referenced as {YOUR_TENANT_ID} throughout.'
âś— Don't: Do not write Azure AD documentation that uses vague phrases like 'your Azure environment' without clarifying whether the reader is configuring their own tenant, a customer's tenant, or a shared development tenant.

âś“ Use Tenant ID (GUID) and Tenant Domain Name Together in All Code Examples

Tenant IDs appear as GUIDs (e.g., xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx) in API calls and logs, while tenant domain names (e.g., contoso.onmicrosoft.com) appear in sign-in URLs and user UPNs. Documenting only one form causes confusion when readers encounter the other form in the Azure portal or error logs. Always show both representations together so readers can map between them.

âś“ Do: In code samples and configuration tables, always show both forms: 'Tenant ID: d1e8b4c2-3f7a-4b9e-8c1d-2e5f6a7b8c9d (also accessible as contoso.onmicrosoft.com)' and explain where each form is used.
âś— Don't: Do not use placeholder values like 'YOUR_TENANT_ID' in isolation without explaining that this value is a GUID found in Azure Portal > Azure Active Directory > Overview, and that it differs from the tenant's primary domain.

âś“ Document Tenant Isolation Boundaries Explicitly When Describing Data Residency

One of the most misunderstood properties of Azure AD tenants is that each tenant is a logically isolated container—users, groups, and configurations in Tenant A are never visible to Tenant B unless explicitly shared via B2B or cross-tenant sync. Documentation that fails to make this isolation explicit leads to security misconceptions, especially in regulated industries where data residency and access boundaries must be auditable. Clearly state what is and is not shared across tenant boundaries.

âś“ Do: Include a 'Tenant Isolation' callout box in any architecture document that states which resources are tenant-scoped (users, groups, app registrations, policies) versus subscription-scoped (Azure resources), and explicitly confirm that no user data crosses tenant boundaries without administrative configuration.
âś— Don't: Do not assume readers understand that Azure AD tenant isolation is separate from Azure subscription isolation. Never conflate the two in documentation, as a single tenant can manage multiple subscriptions.

âś“ Version and Timestamp Tenant Configuration Documentation Due to Rapid Feature Changes

Azure AD features—such as Conditional Access policy conditions, External Identities settings, and cross-tenant synchronization capabilities—are updated frequently by Microsoft, sometimes monthly. Documentation written for a tenant configuration in Q1 may be partially incorrect by Q3, leading administrators to apply outdated settings. All tenant configuration guides must carry a 'Last Validated' date and a link to the corresponding Microsoft Learn page for the authoritative current state.

âś“ Do: Add a metadata block at the top of every tenant configuration runbook: 'Last validated: 2024-11-15 against Azure AD P2 tenant. Microsoft Learn reference: [link]. Review this document every 90 days against the Azure AD changelog at aka.ms/aadchangelog.'
âś— Don't: Do not publish tenant configuration guides without a review cadence. Stale tenant documentation is particularly dangerous because misconfigured Conditional Access Policies or broken federation settings can lock users out of the entire tenant.

âś“ Distinguish Between Tenant-Level Admin Roles and Subscription-Level RBAC in Permission Documentation

Azure AD tenant roles (e.g., Global Administrator, User Administrator, Application Administrator) control identity and directory objects, while Azure RBAC roles (e.g., Owner, Contributor) control Azure resource access within subscriptions. These two permission systems are frequently confused in documentation, leading to over-provisioning of Global Administrator rights when a narrower Azure RBAC role was sufficient. Every permissions table must explicitly label which system each role belongs to.

âś“ Do: Create a two-column permissions table in any setup guide: one column for 'Azure AD Tenant Role Required' (e.g., 'Application Administrator to register apps') and one for 'Azure Subscription RBAC Role Required' (e.g., 'Contributor to deploy resources'), making the boundary between the two systems visually clear.
✗ Don't: Do not write 'you need admin access' without specifying whether this means Global Administrator in the Azure AD tenant, a specific tenant role like Privileged Role Administrator, or an Azure subscription Owner role—these grant completely different and non-overlapping permissions.

How Docsie Helps with Tenant

Build Better Documentation with Docsie

Join thousands of teams creating outstanding documentation

Start Free Trial