Skip to content

Commit 12e8085

Browse files
committed
Fixed merge conflict
2 parents bef225b + 8210cf5 commit 12e8085

25 files changed

+371
-476
lines changed

articles/active-directory/governance/access-reviews-application-preparation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ ms.collection: M365-identity-device-management
2525

2626
[Microsoft Entra Identity Governance](identity-governance-overview.md) allows you to balance your organization's need for security and employee productivity with the right processes and visibility. It provides you with capabilities to ensure that the right people have the right access to the right resources.
2727

28-
Organizations with compliance requirements or risk management plans will have sensitive or business-critical applications. The application sensitivity may be based on its purpose or the data it contains, such as financial information or personal information of the organization's customers. For those applications, only a subset of all the users in the organization will typically be authorized to have access, and access should only be permitted based on documented business requirements. Azure AD can be integrated with many popular SaaS applications, on-premises applications, and applications that your organization has developed, using [standard protocol](../fundamentals/auth-sync-overview.md) and API interfaces. Through these interfaces, Azure AD can be the authoritative source to control who has access to those applications. As you integrate your applications with Azure AD, you can then use Microsoft Entra access reviews to recertify the users who have access to those applications, and remove access of those users who no longer need access. You can also use other features, including terms of use, conditional access and entitlement management, for governing access to applications, as described in [how to govern access to applications in your environment](identity-governance-applications-prepare.md).
28+
Organizations with compliance requirements or risk management plans will have sensitive or business-critical applications. The application sensitivity may be based on its purpose or the data it contains, such as financial information or personal information of the organization's customers. For those applications, only a subset of all the users in the organization will typically be authorized to have access, and access should only be permitted based on documented business requirements. Azure AD can be integrated with many popular SaaS applications, on-premises applications, and applications that your organization has developed, using [standard protocol](../fundamentals/auth-sync-overview.md) and API interfaces. Through these interfaces, Azure AD can be the authoritative source to control who has access to those applications. As you integrate your applications with Azure AD, you can then use access reviews to recertify the users who have access to those applications, and remove access of those users who no longer need access. You can also use other features, including terms of use, conditional access and entitlement management, for governing access to applications, as described in [how to govern access to applications in your environment](identity-governance-applications-prepare.md).
2929

3030
## Prerequisites for reviewing access
3131

@@ -40,7 +40,7 @@ Also, while not required for reviewing access to an application, we recommend al
4040

4141
## Determine how the application is integrated with Azure AD
4242

43-
In order for Microsoft Entra access reviews to be used for an application, then the application must first be integrated with Azure AD. An application being integrated with Azure AD means one of two requirements must be met:
43+
In order for access reviews to be used for an application, then the application must first be integrated with Azure AD. An application being integrated with Azure AD means one of two requirements must be met:
4444

4545
* The application relies upon Azure AD for federated SSO, and Azure AD controls authentication token issuance. If Azure AD is the only identity provider for the application, then only users who are assigned to one of the application's roles in Azure AD are able to sign into the application. Those users that are denied by a review lose their application role assignment and can no longer get a new token to sign in to the application.
4646
* The application relies upon user or group lists that are provided to the application by Azure AD. This fulfillment could be done through a provisioning protocol such as System for Cross-Domain Identity Management (SCIM) or by the application querying Azure AD via Microsoft Graph, or groups that are written to AD DS. Those users that are denied by a review lose their application role assignment or group membership, and when those changes are made available to the application, then the denied users will no longer have access.

articles/active-directory/governance/access-reviews-downloadable-review-history.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.author: amsliu
1616

1717
# Create and manage downloadable access review history report in Microsoft Entra access reviews
1818

19-
With Microsoft Entra Access Reviews, you can create a downloadable review history to help your organization gain more insight. The report pulls the decisions that were taken by reviewers when a report is created. These reports can be constructed to include specific access reviews, for a specific time frame, and can be filtered to include different review types and review results.
19+
With access reviews, you can create a downloadable review history to help your organization gain more insight. The report pulls the decisions that were taken by reviewers when a report is created. These reports can be constructed to include specific access reviews, for a specific time frame, and can be filtered to include different review types and review results.
2020

2121
## Who can access and request review history
2222

articles/active-directory/governance/access-reviews-overview.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection: M365-identity-device-management
1818
ms.custom: contperf-fy21q1
1919
---
2020

21-
# What are Microsoft Entra access reviews?
21+
# What are access reviews?
2222

2323
Microsoft Entra access reviews enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignments. User's access can be reviewed on a regular basis to make sure only the right people have continued access.
2424

@@ -51,15 +51,15 @@ Azure AD enables you to collaborate with users from inside your organization and
5151
5252
## Where do you create reviews?
5353

54-
Depending on what you want to review, you will create your access review in Microsoft Entra access reviews, Azure AD enterprise apps (in preview), Microsoft Entra PIM, or Microsoft Entra entitlement management.
54+
Depending on what you want to review, you will create your access review in access reviews, Azure AD enterprise apps (in preview), PIM, or entitlement management.
5555

5656
| Access rights of users | Reviewers can be | Review created in | Reviewer experience |
5757
| --- | --- | --- | --- |
58-
| Security group members</br>Office group members | Specified reviewers</br>Group owners</br>Self-review | Microsoft Entra access reviews</br>Azure AD groups | Access panel |
59-
| Assigned to a connected app | Specified reviewers</br>Self-review | Microsoft Entra access reviews</br>Azure AD enterprise apps (in preview) | Access panel |
60-
| Azure AD role | Specified reviewers</br>Self-review | [Microsoft Entra PIM](../privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) | Azure portal |
61-
| Azure resource role | Specified reviewers</br>Self-review | [Microsoft Entra PIM](../privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) | Azure portal |
62-
| Access package assignments | Specified reviewers</br>Group members</br>Self-review | Microsoft Entra entitlement management | Access panel |
58+
| Security group members</br>Office group members | Specified reviewers</br>Group owners</br>Self-review | access reviews</br>Azure AD groups | Access panel |
59+
| Assigned to a connected app | Specified reviewers</br>Self-review | access reviews</br>Azure AD enterprise apps (in preview) | Access panel |
60+
| Azure AD role | Specified reviewers</br>Self-review | [PIM](../privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) | Azure portal |
61+
| Azure resource role | Specified reviewers</br>Self-review | [PIM](../privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) | Azure portal |
62+
| Access package assignments | Specified reviewers</br>Group members</br>Self-review | entitlement management | Access panel |
6363

6464
## License requirements
6565

articles/active-directory/governance/index.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ landingContent:
2222
linkLists:
2323
- linkListType: overview
2424
links:
25-
- text: What is Microsoft Entra Identity Governance?
25+
- text: What is Identity Governance?
2626
url: identity-governance-overview.md
2727
- linkListType: video
2828
links:
@@ -34,7 +34,7 @@ landingContent:
3434
linkLists:
3535
- linkListType: overview
3636
links:
37-
- text: What is Microsoft Entra entitlement management?
37+
- text: What is entitlement management?
3838
url: entitlement-management-overview.md
3939
- linkListType: tutorial
4040
links:
@@ -52,7 +52,7 @@ landingContent:
5252
linkLists:
5353
- linkListType: overview
5454
links:
55-
- text: What are Microsoft Entra access reviews?
55+
- text: What are access reviews?
5656
url: access-reviews-overview.md
5757
- linkListType: how-to-guide
5858
links:
@@ -86,7 +86,7 @@ landingContent:
8686
linkLists:
8787
- linkListType: overview
8888
links:
89-
- text: What is Microsoft Entra Privileged Identity Management?
89+
- text: What is Privileged Identity Management?
9090
url: ../privileged-identity-management/pim-configure.md
9191

9292
# Card

0 commit comments

Comments
 (0)