{"id":"https://openalex.org/W4396573297","doi":"https://doi.org/10.5220/0012735700003690","title":"Exploring Applicability of LLM-Powered Autonomous Agents to Solve Real-life Problems: Microsoft Entra ID Administration Agent (MEAN)","display_name":"Exploring Applicability of LLM-Powered Autonomous Agents to Solve Real-life Problems: Microsoft Entra ID Administration Agent (MEAN)","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4396573297","doi":"https://doi.org/10.5220/0012735700003690"},"language":"en","primary_location":{"id":"doi:10.5220/0012735700003690","is_oa":true,"landing_page_url":"http://dx.doi.org/10.5220/0012735700003690","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Conference on Enterprise Information Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://dx.doi.org/10.5220/0012735700003690","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103556645","display_name":"Roberto Rodr\u00edguez","orcid":"https://orcid.org/0000-0002-0560-6672"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Roberto Rodriguez","raw_affiliation_strings":["Microsoft Security Research (MSecR), U.S.A., --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Microsoft Security Research (MSecR), U.S.A., --- Select a Country ---","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044238599","display_name":"Nestori Syynimaa","orcid":"https://orcid.org/0000-0002-6848-094X"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]},{"id":"https://openalex.org/I94722563","display_name":"University of Jyv\u00e4skyl\u00e4","ror":"https://ror.org/05n3dz165","country_code":"FI","type":"education","lineage":["https://openalex.org/I94722563"]}],"countries":["FI","US"],"is_corresponding":true,"raw_author_name":"Nestori Syynimaa","raw_affiliation_strings":["Faculty of Information Technology, University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland, --- Select a Country ---","Microsoft Security Research (MSecR), U.S.A., --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland, --- Select a Country ---","institution_ids":["https://openalex.org/I94722563"]},{"raw_affiliation_string":"Microsoft Security Research (MSecR), U.S.A., --- Select a Country ---","institution_ids":["https://openalex.org/I1290206253"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5044238599"],"corresponding_institution_ids":["https://openalex.org/I1290206253","https://openalex.org/I94722563"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07417493,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"881","last_page":"887"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9769999980926514,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6957655549049377},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.6597402691841125},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5355534553527832},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4762271046638489},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4468829333782196},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2768148183822632},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1653101146221161}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6957655549049377},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.6597402691841125},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5355534553527832},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4762271046638489},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4468829333782196},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2768148183822632},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1653101146221161},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5220/0012735700003690","is_oa":true,"landing_page_url":"http://dx.doi.org/10.5220/0012735700003690","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Conference on Enterprise Information Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:jyx.jyu.fi:123456789/95036","is_oa":true,"landing_page_url":"http://urn.fi/URN:NBN:fi:jyu-202405223800","pdf_url":"https://jyx.jyu.fi/bitstreams/30a3b848-f84f-47a6-acf1-bd322177adb5/download","source":{"id":"https://openalex.org/S4306400563","display_name":"Jyv\u00e4skyl\u00e4 University Digital Archive (University of Jyv\u00e4skyl\u00e4)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I94722563","host_organization_name":"University of Jyv\u00e4skyl\u00e4","host_organization_lineage":["https://openalex.org/I94722563"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"A4"}],"best_oa_location":{"id":"doi:10.5220/0012735700003690","is_oa":true,"landing_page_url":"http://dx.doi.org/10.5220/0012735700003690","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Conference on Enterprise Information Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2136922540","https://openalex.org/W4238484207","https://openalex.org/W4246562710","https://openalex.org/W4285276666","https://openalex.org/W4292779060","https://openalex.org/W4304195432","https://openalex.org/W4380353816","https://openalex.org/W4385287322","https://openalex.org/W4385688511","https://openalex.org/W4385988359","https://openalex.org/W4388860777","https://openalex.org/W4389544300","https://openalex.org/W4389977189"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"Microsoft":[0,22,44,100],"Entra":[1,95,120],"ID":[2,96,121],"is":[3,41],"Microsoft\u2019s":[4],"identity":[5],"and":[6,14,47,86],"access":[7],"management":[8],"solution":[9],"used":[10],"by":[11,134],"many":[12],"public":[13],"private":[15],"sector":[16],"organisations":[17],"globally.":[18],"In":[19,59],"March":[20],"2023,":[21],"retired":[23],"two":[24],"PowerShell":[25],"modules":[26],"which":[27],"have":[28],"enabled":[29],"automation":[30],"of":[31,67,74,89],"administrative":[32,97,122,132],"tasks,":[33],"such":[34],"as":[35],"user":[36],"management.":[37],"The":[38,108],"replacement":[39],"module":[40],"based":[42,103],"on":[43,70,104],"Graph":[45,101],"API,":[46],"its":[48],"effective":[49],"usage":[50],"would":[51],"require":[52],"administrators":[53],"to":[54,78,138],"learn":[55,139],"software":[56,140],"development":[57,141],"skills.":[58,142],"this":[60],"paper,":[61],"we":[62],"will":[63],"report":[64],"the":[65,72,84,127,131,136],"results":[66,109],"work-in-progress":[68],"research":[69],"exploring":[71],"applicability":[73],"LLM-powered":[75,112],"autonomous":[76,113],"agents":[77,114,128],"solve":[79],"real-life":[80],"problems.":[81],"We":[82],"describe":[83],"design":[85],"proof-of-concept":[87],"implementation":[88],"MEAN,":[90],"an":[91],"agent":[92],"that":[93,111,126],"performs":[94],"tasks":[98],"using":[99],"API":[102],"natural":[105],"language":[106],"prompts.":[107],"show":[110],"can":[115],"perform":[116],"at":[117],"least":[118],"simple":[119],"tasks.":[123],"This":[124],"indicates":[125],"could":[129],"ease":[130],"burden":[133],"removing":[135],"need":[137]},"counts_by_year":[],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
