How to audit service principal sign-in activity in Azure AD?
Service principal sign-ins refer to the authentication and activity logs associated with the identities used by Entra ID applications to access resources within Microsoft 365 services. When a service principal signs in, it performs actions such as accessing APIs, managing resources, or performing tasks on behalf of an application.
Monitoring these sign-ins helps track records of both successful and failed attempts, providing insight into whether the service principal is being used correctly or if potential security issues exist.
Monitor service principal sign-in logs using the Microsoft Entra admin center
- Navigate to Service principal sign-ins under .
- The service principal sign-in logs provide information such as sign-in status, service principal name, resource ID, sign-in date and time, IP address, conditional access, and more.
Note: To obtain a comprehensive summary of each application's service principal sign-in, navigate to the Service principal sign-in activity report under .
Track service principal sign-ins with AdminDroid for more detailed analytics.
- AdminDroidâs sign-in by apps and service principals report offers granular insights, including detailed sign-in time, application names, geographical data, and more.
- The built-in heatmap chart helps you quickly spot peak activity and low sign-in days, making it easier to detect unusual service principal usage patterns.