Skip to content

Commit 01c9c82

Browse files
Merge pull request #251662 from jenniferf-skc/steps2
Content refresh and Azure migration updates
2 parents 5486f35 + aab2c1c commit 01c9c82

24 files changed

+34
-113
lines changed

articles/active-directory/cloud-infrastructure-entitlement-management/how-to-add-remove-role-task.md

Lines changed: 6 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 06/16/2023
11+
ms.date: 09/13/2023
1212
ms.author: jfields
1313
---
1414

@@ -21,7 +21,7 @@ This article describes how you can add and remove roles and tasks for Microsoft
2121
2222
## View permissions
2323

24-
1. On the Entra home page, select the **Remediation** tab, and then select the **Permissions** subtab.
24+
1. On the Permissions Management home page, select the **Remediation** tab, and then select the **Permissions** subtab.
2525
1. From the **Authorization System Type** dropdown, select **Azure** or **GCP**.
2626
1. From the **Authorization System** dropdown, select the accounts you want to access.
2727
1. From the **Search For** dropdown, select **Group**, **User**, or **APP**.
@@ -37,7 +37,7 @@ This article describes how you can add and remove roles and tasks for Microsoft
3737

3838
## Add a role
3939

40-
1. On the Entra home page, select the **Remediation** tab, and then select the **Permissions** subtab.
40+
1. On the Permissions Management home page, select the **Remediation** tab, and then select the **Permissions** subtab.
4141
1. From the **Authorization System Type** dropdown, select **Azure** or **GCP**.
4242
1. From the **Authorization System** dropdown, select the accounts you want to access.
4343
1. From the **Search For** dropdown, select **Group**, **User**, or **APP/Service Account**, and then select **Apply**.
@@ -53,7 +53,7 @@ This article describes how you can add and remove roles and tasks for Microsoft
5353

5454
## Remove a role
5555

56-
1. On the Entra home page, select the **Remediation** tab, and then select the **Permissions** subtab.
56+
1. On the Permissions Management home page, select the **Remediation** tab, and then select the **Permissions** subtab.
5757
1. From the **Authorization System Type** dropdown, select **Azure** or **GCP**.
5858
1. From the **Authorization System** dropdown, select the accounts you want to access.
5959
1. From the **Search For** dropdown, select **Group**, **User**, or **APP/Service Account**, and then select **Apply**.
@@ -85,7 +85,7 @@ This article describes how you can add and remove roles and tasks for Microsoft
8585

8686
## Remove a task
8787

88-
1. On the Entra home page, select the **Remediation** tab, and then select the **Permissions** subtab.
88+
1. On the Permissions Management home page, select the **Remediation** tab, and then select the **Permissions** subtab.
8989
1. From the **Authorization System Type** dropdown, select **Azure** or **GCP**.
9090
1. From the **Authorization System** dropdown, select the accounts you want to access.
9191
1. From the **Search For** dropdown, select **Group**, **User**, or **APP/Service Account**, and then select **Apply**.
@@ -103,9 +103,4 @@ This article describes how you can add and remove roles and tasks for Microsoft
103103

104104

105105
- For information on how to view existing roles/policies, requests, and permissions, see [View roles/policies, requests, and permission in the Remediation dashboard](ui-remediation.md).
106-
- To view information about roles/policies, see [View information about roles/policies](how-to-view-role-policy.md).
107-
- For information on how to create a role/policy, see [Create a role/policy](how-to-create-role-policy.md).
108-
- For information on how to clone a role/policy, see [Clone a role/policy](how-to-clone-role-policy.md).
109-
- For information on how to delete a role/policy, see [Delete a role/policy](how-to-delete-role-policy.md).
110-
- For information on how to modify a role/policy, see [Modify a role/policy](how-to-modify-role-policy.md).
111-
- For information on how to attach and detach permissions for Amazon Web Services (AWS) identities, see [Attach and detach policies for AWS identities](how-to-attach-detach-permissions.md).
106+
- To view information about roles/policies, see [View information about roles/policies](how-to-view-role-policy.md).

articles/active-directory/cloud-infrastructure-entitlement-management/how-to-add-remove-user-to-group.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 06/16/2023
11+
ms.date: 09/14/2023
1212
ms.author: jfields
1313
---
1414

@@ -21,8 +21,8 @@ This article describes how you can add or remove a new user for a group in Permi
2121
2222
## Add a user
2323

24-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/#home).
25-
1. From the Azure Active Directory tile, select **Go to Azure Active Directory**.
24+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/#home) as a Global Administrator.
25+
1. Browse to **Microsoft Entra ID** > **Go to Azure Active Directory**.
2626
1. From the navigation pane, select the **Groups** drop-down menu, then **All groups**.
2727
1. Select the group name for the group you want to add the user to.
2828
1. From the group's **Manage** menu, click **Members**.
@@ -37,8 +37,8 @@ This article describes how you can add or remove a new user for a group in Permi
3737

3838
## Remove a user
3939

40-
1. Sign in to the Microsoft [Entra admin center](https://entra.microsoft.com/#home).
41-
1. From the Azure Active Directory tile, select **Go to Azure Active Directory**.
40+
1. Sign in to the Microsoft [Entra admin center](https://entra.microsoft.com/#home) as a Global Administrator.
41+
1. Browse to **Microsoft Entra ID** > **Go to Azure Active Directory**.
4242
1. From the navigation pane, select the **Groups** drop-down menu, then **All groups**.
4343
1. Select the group name for the group you want to remove the user from.
4444
1. From the groups **Manage** menu, click **Members**.

articles/active-directory/cloud-infrastructure-entitlement-management/how-to-attach-detach-permissions.md

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 06/16/2023
11+
ms.date: 09/14/2023
1212
ms.author: jfields
1313
---
1414

@@ -67,12 +67,5 @@ This article describes how you can attach and detach permissions for users, role
6767

6868
## Next steps
6969

70-
71-
- To view existing roles/policies, requests, and permissions, see [View roles/policies, requests, and permission in the Remediation dashboard](ui-remediation.md).
72-
- To create a role/policy, see [Create a role/policy](how-to-create-role-policy.md).
73-
- To clone a role/policy, see [Clone a role/policy](how-to-clone-role-policy.md).
74-
- To delete a role/policy, see [Delete a role/policy](how-to-delete-role-policy.md).
75-
- To modify a role/policy, see [Modify a role/policy](how-to-modify-role-policy.md).
76-
- To view information about roles/policies, see [View information about roles/policies](how-to-view-role-policy.md).
7770
- To revoke high-risk and unused tasks or assign read-only status for Microsoft Azure and Google Cloud Platform (GCP) identities, see [Revoke high-risk and unused tasks or assign read-only status for Azure and GCP identities](how-to-revoke-task-readonly-status.md)
7871
To create or approve a request for permissions, see [Create or approve a request for permissions](how-to-create-approve-privilege-request.md).

articles/active-directory/cloud-infrastructure-entitlement-management/how-to-audit-trail-results.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 06/16/2023
11+
ms.date: 09/14/2023
1212
ms.author: jfields
1313
---
1414

@@ -32,6 +32,4 @@ This article describes how you can generate an on-demand report from a query in
3232

3333
## Next steps
3434

35-
- For information on how to view how users access information, see [Use queries to see how users access information](ui-audit-trail.md).
36-
- For information on how to filter and view user activity, see [Filter and query user activity](product-audit-trail.md).
37-
- For information on how to create a query,see [Create a custom query](how-to-create-custom-queries.md).
35+
- For information on how to view system reports, see [Generate and view a system report in Permissions Management](report-view-system-report.md)

articles/active-directory/cloud-infrastructure-entitlement-management/how-to-clone-role-policy.md

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 06/16/2023
11+
ms.date: 09/14/2023
1212
ms.author: jfields
1313
---
1414

@@ -41,11 +41,4 @@ This article describes how you can use the **Remediation** dashboard in Microsof
4141

4242

4343
- To view existing roles/policies, requests, and permissions, see [View roles/policies, requests, and permission in the Remediation dashboard](ui-remediation.md).
44-
- To create a role/policy, see [Create a role/policy](how-to-create-role-policy.md).
45-
- To delete a role/policy, see [Delete a role/policy](how-to-delete-role-policy.md).
46-
- To modify a role/policy, see [Modify a role/policy](how-to-modify-role-policy.md).
47-
- To view information about roles/policies, see [View information about roles/policies](how-to-view-role-policy.md).
48-
- To attach and detach permissions for AWS identities, see [Attach and detach policies for AWS identities](how-to-attach-detach-permissions.md).
49-
- To revoke high-risk and unused tasks or assign read-only status for Azure and GCP identities, see [Revoke high-risk and unused tasks or assign read-only status for Azure and GCP identities](how-to-revoke-task-readonly-status.md)
50-
- To create or approve a request for permissions, see [Create or approve a request for permissions](how-to-create-approve-privilege-request.md).
5144
- To view information about roles/policies, see [View information about roles/policies](how-to-view-role-policy.md)

articles/active-directory/cloud-infrastructure-entitlement-management/how-to-create-alert-trigger.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,5 +107,3 @@ This article describes how you can create and view activity alerts and alert tri
107107

108108
- For an overview on activity triggers, see [View information about activity triggers](ui-triggers.md).
109109
- For information on rule-based anomalies and anomaly triggers, see [Create and view rule-based anomalies and anomaly triggers](product-rule-based-anomalies.md).
110-
- For information on finding outliers in identity's behavior, see [Create and view statistical anomalies and anomaly triggers](product-statistical-anomalies.md).
111-
- For information on permission analytics triggers, see [Create and view permission analytics triggers](product-permission-analytics.md).

articles/active-directory/cloud-infrastructure-entitlement-management/how-to-create-approve-privilege-request.md

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 06/16/2023
11+
ms.date: 09/15/2023
1212
ms.author: jfields
1313
---
1414

@@ -104,13 +104,6 @@ The **Remediation** dashboard has two privilege-on-demand (POD) workflows you ca
104104

105105
## Next steps
106106

107-
108-
- For information on how to view existing roles/policies, requests, and permissions, see [View roles/policies, requests, and permission in the Remediation dashboard](ui-remediation.md).
109-
- For information on how to create a role/policy, see [Create a role/policy](how-to-create-role-policy.md).
110-
- For information on how to clone a role/policy, see [Clone a role/policy](how-to-clone-role-policy.md).
111-
- For information on how to delete a role/policy, see [Delete a role/policy](how-to-delete-role-policy.md).
112-
- For information on how to modify a role/policy, see [Modify a role/policy](how-to-modify-role-policy.md).
113-
- To view information about roles/policies, see [View information about roles/policies](how-to-view-role-policy.md).
114107
- For information on how to attach and detach permissions for Amazon Web Services (AWS) identities, see [Attach and detach policies for AWS identities](how-to-attach-detach-permissions.md).
115108
- For information on how to add and remove roles and tasks for Microsoft Azure and Google Cloud Platform (GCP) identities, see [Add and remove roles and tasks for Azure and GCP identities](how-to-attach-detach-permissions.md).
116109
- For information on how to revoke high-risk and unused tasks or assign read-only status for Microsoft Azure and Google Cloud Platform (GCP) identities, see [Revoke high-risk and unused tasks or assign read-only status for Azure and GCP identities](how-to-revoke-task-readonly-status.md)

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 08/24/2023
11+
ms.date: 09/15/2023
1212
ms.author: jfields
1313
---
1414

@@ -137,9 +137,4 @@ To view status of onboarding after saving the configuration:
137137

138138
## Next steps
139139

140-
- For information on how to onboard an Amazon Web Services (AWS) account, see [Onboard an Amazon Web Services (AWS) account](onboard-aws.md).
141-
- For information on how to onboard a Google Cloud Platform (GCP) project, see [Onboard a Google Cloud Platform (GCP) project](onboard-gcp.md).
142-
- For information on how to enable or disable the controller after onboarding is complete, see [Enable or disable the controller](onboard-enable-controller-after-onboarding.md).
143-
- For information on how to add an account/subscription/project after onboarding is complete, see [Add an account/subscription/project after onboarding is complete](onboard-add-account-after-onboarding.md).
144-
- For an overview on Permissions Management, see [What's Microsoft Entra Permissions Management?](overview.md).
145140
- For information on how to start viewing information about your authorization system in Permissions Management, see [View key statistics and data about your authorization system](ui-dashboard.md).

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-enable-controller-after-onboarding.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,4 @@ You can enable or disable the controller in Azure at the Subscription level of y
104104

105105
## Next steps
106106

107-
- For information on how to onboard an Amazon Web Services (AWS) account, see [Onboard an AWS account](onboard-aws.md).
108-
- For information on how to onboard a Microsoft Azure subscription, see [Onboard a Microsoft Azure subscription](onboard-azure.md).
109-
- For information on how to onboard a Google Cloud Platform (GCP) project, see [Onboard a GCP project](onboard-gcp.md).
110107
- For information on how to add an account/subscription/project after onboarding is complete, see [Add an account/subscription/project after onboarding is complete](onboard-add-account-after-onboarding.md).

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-enable-tenant.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,5 +66,3 @@ Use the **Data Collectors** dashboard in Permissions Management to configure dat
6666
## Next steps
6767

6868
- For an overview of Permissions Management, see [What's Microsoft Entra Permissions Management?](overview.md)
69-
- For a list of frequently asked questions (FAQs) about Permissions Management, see [FAQs](faqs.md).
70-
- To start viewing information about your authorization system in Permissions Management, see [View key statistics and data about your authorization system](ui-dashboard.md).

0 commit comments

Comments
 (0)