Skip to content

Commit 062777e

Browse files
committed
Tech review edits
1 parent 565658c commit 062777e

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/active-directory/cloud-infrastructure-entitlement-management/error-codes-onboarding.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,13 +8,13 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 09/06/2023
11+
ms.date: 09/07/2023
1212
ms.author: jfields
1313
---
1414

1515
# Error codes: Microsoft Entra Permissions Management
1616

17-
During onboarding in Microsoft Entra Permissions Management, authorization system onboarding might return error messages that an admin can triage. This article lists data collection error messages and their descriptions shown in the Permissions Management UI, along with proposed solutions.
17+
During onboarding, Microsoft Entra Permissions Management may return error messages that an admin can triage. This article lists data collection error messages and their descriptions shown in the Permissions Management UI, along with proposed solutions.
1818

1919

2020
## AWS_ACCESSADVISOR_COLLECTION_ERROR
@@ -26,9 +26,9 @@ This account does not have permissions to view ```Service Last Acc
2626
- Verify that you're signed in using Management Account credentials. The AWS account must have a policy that has permissions to generate, get, or list ```ServiceLastAccessDetails``` or equivalent permissions.
2727
- In the AWS Management Console, verify that Service Control Policies (SCPs) are enabled in your organization root.
2828

29-
## AWS_CLOUDTRAIL
29+
## AWS_CLOUDTRAIL_DISABLED
3030

31-
TheAWSenvironment doesn't have CloudTrail configured, or you don't have permissions to access CloudTrail.
31+
The AWS environment doesn't have CloudTrail configured, or you don't have permissions to access CloudTrail.
3232

3333
### Proposed solution
3434

@@ -76,7 +76,7 @@ Error during the collection of System role policies.
7676

7777
### Proposed solution
7878

79-
If your system role policies include Service Control Policies (SCPS), verify you're signed in using Management Account credentials. The AWS account must have the required permissions to display the policies’ details and attached entities.
79+
If your system role policies include Service Control Policies (SCPs), verify you're signed in using Management Account credentials. The AWS account must have the required permissions to display the policies’ details and attached entities.
8080

8181

8282
## ERROR_GCP_PROJECT_MIN_PERMISSION

0 commit comments

Comments
 (0)