Skip to content

Commit 0d70739

Browse files
committed
New PM Quickstart Guide and Roles + Permissions article
1 parent e917d03 commit 0d70739

File tree

4 files changed

+255
-0
lines changed

4 files changed

+255
-0
lines changed
Loading
Loading
Lines changed: 190 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,190 @@
1+
---
2+
title: Microsoft Entra Permissions Management Quickstart Guide
3+
description: Quickstart guide - How to quickly onboard your Microsoft Entra Permissions Management product
4+
# CustomerIntent: As a security administrator, I want to successfully onboard Permissions Management so that I can enable identity security in my cloud environment as efficiently as possible.'
5+
services: active-directory
6+
author: jenniferf-skc
7+
manager: amycolannino
8+
ms.service: active-directory
9+
ms.subservice: ciem
10+
ms.workload: identity
11+
ms.topic: quickstart
12+
ms.date: 08/17/2023
13+
ms.author: jfields
14+
---
15+
16+
# Quickstart guide to Microsoft Entra Permissions Management
17+
18+
Welcome to the Quickstart Guide for Microsoft Entra Permissions Management.
19+
20+
Permissions Management is a Cloud Infrastructure Entitlement Management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. These identities include over-privileged workload and user identities, actions, and resources across multicloud infrastructures in Microsoft Entra, Amazon Web Services (AWS), and Google Cloud Platform (GCP). Permissions Management helps your organization effectively secure and manage cloud permissions by detecting, automatically right-sizing, and continuously monitoring unused and excessive permissions.
21+
22+
With this quickstart guide, you’ll set up your multicloud environment(s), configure data collection, and enable permissions access to ensure your cloud identities are managed and secure.
23+
24+
## Prerequisites
25+
26+
Before you begin, you need access to these tools for the onboarding process:
27+
28+
- Access to a local BASH shell with the Entra CLI or Entra Cloud Shell using BASH environment (Entra CLI is included).
29+
- Access to AWS, Entra, and GCP consoles.
30+
- A user with permissions (Permissions Management Administrator?) to create a new app registration in Entra is required for AWS and GCP onboarding.
31+
32+
33+
## Step 1: Set-up Permissions Management
34+
35+
To enable Permissions Management, you must have a Microsoft Entra tenant (example, Entra Admin Center).
36+
- If you have an Entra account, you automatically have an Entra Admin Center tenant.
37+
- If you don’t already have one, create a free account at [entra.microsoft.com](https://entra.microsoft.com).
38+
39+
If the above points are met, continue with:
40+
41+
1. [Enable Microsoft Entra Permissions Management in your organization](onboard-enable-tenant.md)
42+
43+
Ensure you are a Global Administrator, Permissions Management Administrator, or have equivalent permissions in your Entra Admin Center tenant. Learn more about [Permissions Management roles and permissions](product-roles-permissions.md).
44+
45+
46+
## Step 2: Onboard your multicloud environment
47+
48+
So far you’ve,
49+
50+
1. Been assigned the Permissions Management Administrator role in your Entra Admin Center tenant.
51+
2. Purchased licenses or activated your 45-day free trial for Permissions Management.
52+
3. Successfully launched Permissions Management.
53+
54+
Now, you're going to learn about the role and settings of the Controller, and Data collection modes in Permissions Management.
55+
56+
### Set the controller
57+
The controller gives you the choice to determine the level of access you grant to users in Permissions Management.
58+
59+
- Enabling the controller during onboarding grants Permissions Management admin access, or read and write access, so users can right-size permissions and remediate directly through Permissions Management (instead of going to the AWS, Entra, or GCP consoles). 
60+
61+
- Disabling the controller during onboarding, or never enabling it, grants Permissions Management user read only access to your environment(s).
62+
63+
> [!NOTE]
64+
> If you do not enable the controller during onboarding, you have the option to enable it after onboarding is complete. To set the controller in Permissions Management after onboarding, see [Enable or disable the controller after onboarding](onboard-enable-controller-after-onboarding.md).
65+
> For AWS environments, once you've enabled the controller, you *cannot* disable it.
66+
67+
To set the controller settings during onboarding:
68+
1. Select **Enable** to give read and writer access to Permissions Management.
69+
2. Select **Disable** to give read-only access to Permissions Management.
70+
71+
### Configure data collection
72+
73+
There are three mode options to set in order to collect data in Permissions Management.
74+
75+
- **Automatic (recommended)**
76+
Permissions Management automatically discovers, onboards, and monitors all current and future subscriptions.
77+
78+
- **Manual**
79+
Manually enter individual subscriptions for Permissions Management to discover, onboard, and monitor. You can enter up to 100 subscriptions per data collection.
80+
81+
- **Select**
82+
Permissions Management automatically discovers all current subscriptions. Once discovered, you select which subscriptions to onboard and monitor.
83+
84+
> [!NOTE]
85+
> To use **Automatic** or **Select** modes, the controller must be enabled while configuring data collection.
86+
87+
To configure data collection:
88+
1. In Permissions Management, navigate to the data collectors page.
89+
2. Select a cloud environment: AWS, Entra, or GCP.
90+
3. Click **Create configuration**.
91+
92+
### Onboard Amazon Web Services (AWS)
93+
Since Permissions Management is hosted on Microsoft Entra, there are additional steps to take to onboard your AWS environment.
94+
95+
To connect AWS to Permissions Management, you must create an Entra Admin Center application in the Entra Admin Center tenant where Permissions Management is enabled. This Entra Admin Center application is used to set up an OIDC connection to your AWS environment.
96+
97+
*OpenID Connect (OIDC) is an interoperable authentication protocol based on the OAuth 2.0 family of specifications.*
98+
99+
### Prerequisites
100+
101+
A user (Permissions Management Admin?) with the ability to create a new app registration in Entra (needed to facilitate the OIDC connection) is needed for AWS and GCP onboarding.
102+
103+
Account IDs and roles for:
104+
- AWS OIDC account: An AWS member account designated by you to create and host the OIDC connection through an OIDC IdP
105+
- AWS Logging account (optional but recommended)
106+
- AWS Management account (optional but recommended)
107+
- AWS member accounts to be monitored and managed by Permissions Management (for manual mode)
108+
109+
To use **Automatic** or **Select** data collection modes, you must connect your AWS Management account.
110+
111+
During this step, you have the option to enable the controller by entering the name of the S3 bucket with AWS CloudTrail activity logs (found on AWS Trails).
112+
113+
![Diagram, Entra Permissions Management tenant for OIDC app.](media/permissions-management-quickstart-guide/quickstart-entra-tenant.png)
114+
115+
To onboard your AWS environment and configure data collection, see [Onboard an Amazon Web Services (AWS) account](onboard-aws.md).
116+
117+
### Onboard Microsoft Entra
118+
When you enabled Permissions Management in the Entra tenant, an enterprise application Cloud Infrastructure Entitlement Management (CIEM) was created. To onboard your Entra environment, you grant permissions to this application so Permissions management.
119+
120+
In the Enta tenant where Permissions management is enabled, locate the Cloud Infrastructure Entitlement Management (CIEM) application.
121+
122+
Assign the *Reader* role to the CIEM application to allow Permissions management to read the Entra subscriptions in your environment.
123+
124+
### Prerequisites
125+
A user with Microsoft.Authorization/roleAssignments/write permissions at the subscription or management group scope.
126+
127+
To use **Automatic** or **Select** data collection modes, you must assign *Reader* role at the Management group scope.
128+
129+
To enable the controller, you must assign the *User Access Administrator* role to the CIEM application.
130+
131+
To onboard your Entra environment and configure data collection, see [Onboard a Microsoft Entra subscription](onboard-azure.md).
132+
133+
134+
### Onboard Google Cloud Platform (GCP)
135+
Because Permissions Management is hosted on Microsoft Entra, there are additional steps to take to onboard your GCP environment.
136+
137+
To connect GCP to Permissions Management, you must create an Entra Admin Center application in the Entra tenant where Permissions Management is enabled. This Entra Admin Center application is used to set up an OIDC connection to your GCP environment.
138+
139+
*OpenID Connect (OIDC) is an interoperable authentication protocol based on the OAuth 2.0 family of specifications.*
140+
141+
142+
### Prerequisites
143+
A user with the ability to create a new app registration in Entra (needed to facilitate the OIDC connection) is needed for AWS and GCP onboarding.
144+
145+
ID details for:
146+
- GCP OIDC project: a GCP project designated by you to create and host the OIDC connection through an OIDC IdP.
147+
- Project number and project ID
148+
- GCP OIDC Workload identity
149+
- Pool ID, pool provider ID
150+
- GCP OIDC service account
151+
- G-suite IdP Secret name and G-suite IdP user email (optional)
152+
- IDs for the GCP projects you wish to onboard (optional, for manual mode)
153+
154+
Assign the *Viewer* and *Security Reviewer* roles to the GCP service account at the organization, folder, or project levels to grant Permissions management read access to your GCP environment.
155+
156+
During this step, you have the option to **Enable** controller mode by assigning the *Role Administrator* and *Security Administrator* roles to the GCP service account at the organization, folder, or project levels.
157+
158+
> [!NOTE]
159+
> The Permissions Management default scope is at the project level.
160+
161+
![Diagram, GCP Permissions Management connection for OIDC app.](media/permissions-management-quickstart-guide/quickstart-entra-tenant.png)
162+
163+
To onboard your GCP environment and configure data collection, see [Onboard a GCP project](onboard-gcp.md).
164+
165+
## Summary
166+
167+
Congratulations! You've finished configuring data collection for your environment(s), and the data collection process has begun.
168+
169+
The status column in your Permissions Management UI shows you which step of data collection you are at.
170+
171+
172+
- **Pending**: Permissions management has not started detecting or onboarded yet.
173+
- **Discovering**: Permissions management is detecting the authorization systems.
174+
- **In progress**: Permissions management has finished detecting the authorization systems and has started onboarding.
175+
- **Onboarded**: data collection has completed, and all detected authorization systems have been successfully onboarded to Permissions Management.
176+
177+
> [!NOTE]
178+
> Data collection might take time depending on the amount of authorization systems you've onboarded. While the data collection process continues, you can begin setting up [users and groups in Permissions Management](how-to-add-remove-user-to-group).
179+
180+
## Next steps
181+
182+
- [Enable or disable the controller after onboarding](onboard-enable-controller-after-onboarding.md)
183+
- [Add an account/subscription/project after onboarding is complete](onboard-add-account-after-onboarding.md)
184+
185+
References:
186+
- Permissions Management operational guide tbd.md
187+
- Troubleshooting guide
188+
- Permissions Management best practices guide
189+
- [Permissions Management Glossary](multi-cloud-glossary.md)
190+
- [Permissions Management FAQs](faqs.md)
Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
---
2+
title: Permissions Management required roles and permissions
3+
description: Review roles and the level of permissions assigned in Microsoft Entra Permissions Management.
4+
services: active-directory
5+
author: jenniferf-skc
6+
manager: amycolannino
7+
ms.service: active-directory
8+
ms.subservice: ciem
9+
ms.workload: identity
10+
ms.topic: how-to
11+
ms.date: 08/17/2023
12+
ms.author: jfields
13+
---
14+
15+
In Microsoft Entra and Microsoft Entra Permissions Management, assigned roles give users different levels of access to monitor and take action in multicloud environments. Here, review a list of identities assigned to a privileged role and learn more about the level of permissions given to users assigned roles in your organization.
16+
17+
# [Microsoft Entra Admin Center built-in roles](../azure/active-directory/roles/permissions-reference.md)
18+
19+
- **Global Administrator**: Manages all aspects of Entra Admin Center and Microsoft services that use Entra Admin Center identities.
20+
- **Billing Administrator**: Performs common billing related tasks like updating payment information.
21+
- **Permissions Management Administrator**: Manages all aspects of Entra Permissions Management.
22+
23+
# Permissions Management roles and permissions levels
24+
25+
## Enabling Permissions Management
26+
- To activate a trial or purchase license, you must have *Global Administrator* or *Billing Administrator* permissions.
27+
28+
## Onboarding your Amazon Web Service (AWS), Microsoft Entra, or Google Cloud Platform (GCP) environments
29+
30+
- To configure data collection, you must have *Permissions Management Administrator* or *Global Administrator* permissions.
31+
- A user with the ability to create a new app registration in Azure (needed to facilitate the OIDC connection) will be needed for AWS and GCP onboarding.
32+
33+
## Notes on permissions and roles in Permissions Management
34+
35+
- Users can have the following permissions:
36+
- Admin for all authorization system types
37+
- Admin for selected authorization system types
38+
- If a user is not an admin, they are assigned Entra Admin Center security group-based, fine-grained permissions for all or selected authorization system types:
39+
- Viewers: View only access to scoped cloud accounts. View the specified AWS accounts, Entra subscriptions, and GCP projects
40+
- Controller: Modify Cloud Infrastructure Entitlement Management (CIEM) properties and use the Remediation dashboard.
41+
- Approvers: Able to approve permission requests
42+
- Requestors: Request for permissions in cloud accounts
43+
- Request permissions in the specified AWS accounts, Entra subscriptions, and GCP projects.
44+
45+
## Permissions Management actions and required roles
46+
47+
Remediation
48+
- To view the Remediation tab, you must have Viewer, Controller, or Approver permissions.
49+
- To make changes in the Remediation tab, you much have Controller or Approver permissions.
50+
51+
Autopilot
52+
- To view and make changes in the Autopilot tab, you must be a Permissions Management Administrator.
53+
54+
Alert
55+
- Any user (admin, non-admin) can create an alert.
56+
- Only the user who creates the alert can edit, rename, deactivate, or delete the alert.
57+
58+
Manage users or groups
59+
- Only the owner of a group can add or remove a user from the group.
60+
- Managing users and groups is only done in the Entra Admin Center.
61+
62+
63+
# Next steps
64+
65+
- For information about managing roles, policies and permissions requests in your organization, see [View roles/policies and requests for permission in the Remediation dashboard](ui-remediation.md).

0 commit comments

Comments
 (0)