diff --git a/calico-cloud_versioned_docs/version-19-1/users/create-custom-role-for-entra-id-group.mdx b/calico-cloud_versioned_docs/version-19-1/users/create-custom-role-for-entra-id-group.mdx
index c17d6a849c..63e12c75bd 100644
--- a/calico-cloud_versioned_docs/version-19-1/users/create-custom-role-for-entra-id-group.mdx
+++ b/calico-cloud_versioned_docs/version-19-1/users/create-custom-role-for-entra-id-group.mdx
@@ -1,50 +1,29 @@
---
-description: Create custom roles for Entra ID groups.
+description: Create custom roles for Entra ID groups.
+title: Assign roles to Entra ID groups
---
import IconUser from '/img/icons/user-icon.svg';
-# Create a custom role for an Entra ID group
+# Give role-based access to an Entra ID group
-If you have Microsoft Entra ID configured as your identity provider, you can assign custom roles to Entra ID (formerly Azure AD) security group.
-This lets you manage role-based access to Calico Cloud directly from your identity provider portal.
-## Prerequisites
-
-* You have owner or administrator permissions to the Calico Cloud Manager UI.
-* You have administrator permissions for your organization in the Azure Portal.
-
-## Create and configure an Azure web app
-
-You need to create an Azure web app to securely connect Calico Cloud to your Entra ID security group data.
-
-***Procedure***
-
-1. From the Azure portal, search for `app registrations`. Under **Services**, select **App registration**.
-1. Select **New registration** and complete the form:
- * Enter a **Name**.
- * Under **Supported account types**, select **Accounts on this organization directory only**.
- * Under **Redirect URI**, add a URI with the type **Web** and the value `https://auth.calicocloud.io/login/callback`.
-1. From the Azure portal, search for app registrations and select the app you created.
-1. Under **Manage**, select **Token configuration** and then click **Add groups claim**.
-1. On the **Edit groups claim** panel, select the **security groups** checkbox.
-1. Under **Manage**, select **Authentication**.
- Under **Implicit grant and hybrid flows** select the **ID tokens** checkbox.
-
-## Create a custom role for your Entra ID group
-
-After you prepare your Entra ID app in the Azure portal, you can create a custom role in Calico Cloud and link it to your Entra ID group.
+If you have Microsoft Entra ID configured as your identity provider, you can define role-based access in Calico Cloud and assign that role to an Entra ID (formerly Azure AD) security group.
+By managing membership in that security group, you can manage role-based access to Calico Cloud directly from your identity provider portal.
***Prerequisites***
-* You have the Object ID for an Entra ID security group.
-* You have added a value for the **Email** property for all users in the security group.
+* You have owner or administrator permissions to the Calico Cloud Manager UI.
+* You set up Entra ID as your [identity provider](user-management.mdx#add-your-own-identity-provider).
+* You have administrator permissions for your organization in the Azure Portal.
+* You have the Object ID for an Entra ID security group.
+* The **Email** property for all users in the security group has a valid email address.
***Procedure***
-1. Click the user icon > **Manage Team**.
+1. In Manager UI, click the user icon > **Manage Team**.
1. Under the **Roles** tab, click **Add Role** and enter a name and description for the custom role.
- Under **IDP Group Identifier**, enter your Entra ID security group's Object ID and click **Save**.
+ Under **IDP Group Identifier**, enter your Entra ID security group's Object ID and click **Save**.
1. To add permissions, locate your new role under the **Roles** tab, select **Action** > **Manage permissions** > **Edit**, and then click **Add Permission**.
1. Under **Permission**, choose a permission type from the list.
Depending on the permission, you may also need to choose a namespace or policy tier.