Skip to content

Commit 19295af

Browse files
committed
updates
1 parent c541164 commit 19295af

File tree

2 files changed

+57
-13
lines changed

2 files changed

+57
-13
lines changed

articles/active-directory/manage-apps/assign-user-or-group-access-portal.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -18,12 +18,10 @@ ms.collection: M365-identity-device-management
1818

1919
This article shows you how to assign users or groups to enterprise applications in Azure Active Directory (Azure AD), either from within the Azure portal or by using PowerShell. When you assign a user to an application, the application appears in the user's [My Apps access panel](https://myapps.microsoft.com/) for easy access. If the application exposes roles, you can also assign a specific role to the user.
2020

21-
For greater control, certain types of enterprise applications can be configured to *require* user assignment. This option blocks everyone from signing in, except those users you explicitly assign to the application. When user assignment is *not required*, unassigned users won't see the app on their My Apps access panel, but they can still sign in to the application with a direct app URL (known as service provider-initiated sign-on) or the **User Access URL** in the application’s **Properties** page (known as identity provider-initiated sign on).
21+
For greater control, certain types of enterprise applications can be configured to *require* user assignment. This option blocks everyone from signing in, except those users you explicitly assign to the application. When user assignment is *not required*, unassigned users won't see the app on their My Apps access panel, but they can still sign in to the application with a direct app URL (known as service provider-initiated sign-on) or the **User Access URL** in the application’s **Properties** page (known as identity provider-initiated sign on). For background, see [Managing access to apps](what-is-access-management.md).
2222

2323
To assign a user or group to an enterprise app, you'll need to sign in as a global administrator, application administrator, cloud application administrator, or the assigned owner of the enterprise app.
2424

25-
If you want to assign users to Microsoft Applications such as Office 365 apps, use PowerShell. You can also show or hide Office 365 applications in the My Apps access panel by [setting an option in the Enterprise applications **User settings**](hide-application-from-user-portal.md).
26-
2725
> [!NOTE]
2826
> Group-based assignment requires Azure Active Directory Premium P1 or P2 edition. Group-based assignment is supported for Security groups only. Nested group memberships and Office 365 groups are not currently supported. For more licensing requirements for the features discussed in this article, see the [Azure Active Directory pricing page](https://azure.microsoft.com/pricing/details/active-directory).
2927
@@ -49,6 +47,9 @@ To require user assignment for an application:
4947

5048
5. Make sure the **User assignment required?** toggle is set to **Yes**.
5149

50+
> [!NOTE]
51+
> If the **User assignment required?** toggle isn't available, you can use PowerShell to set this option on the service principal.
52+
5253
6. Select the **Save** button at the top of the screen.
5354

5455
## Assign users or groups to an app via the Azure portal
@@ -57,10 +58,12 @@ To require user assignment for an application:
5758
2. Select **Azure Active Directory**. In the left navigation menu, select **Enterprise applications**.
5859
3. Select the application from the list. If you don't see the application, start typing its name in the search box. Or use the filter controls to select the application type, status, or visibility, and then select **Apply**.
5960
4. In the left navigation menu, select **Users and groups**.
60-
5. Select the **Add user** button.
61-
6. On the **Add Assignment** pane, select **Users and groups**.
62-
7. Select the user or group you want to assign to the application, or start typing the name of the user or group in the search box. You can choose multiple users and groups, and your selections will appear under **Selected items**.
63-
8. When finished, click **Select**.
61+
> [!NOTE]
62+
> If you want to assign users to Microsoft Applications such as Office 365 apps, some of the these apps use PowerShell.
63+
1. Select the **Add user** button.
64+
2. On the **Add Assignment** pane, select **Users and groups**.
65+
3. Select the user or group you want to assign to the application, or start typing the name of the user or group in the search box. You can choose multiple users and groups, and your selections will appear under **Selected items**.
66+
4. When finished, click **Select**.
6467

6568
![Assign a user or group to the app](./media/assign-user-or-group-access-portal/assign-users.png)
6669

articles/active-directory/manage-apps/what-is-access-management.md

Lines changed: 47 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -18,23 +18,49 @@ ms.author: mimart
1818
ms.collection: M365-identity-device-management
1919
---
2020
# Managing access to apps
21+
2122
Ongoing access management, usage evaluation, and reporting continue to be a challenge after an app is integrated into your organization's identity system. In many cases, IT Administrators or helpdesk have to take an ongoing active role in managing access to your apps. Sometimes, assignment is performed by a general or divisional IT team. Often, the assignment decision is intended to be delegated to the business decision maker, requiring their approval before IT makes the assignment. Other organizations invest in integration with an existing automated identity and access management system, like Role-Based Access Control (RBAC) or Attribute-Based Access Control (ABAC). Both the integration and rule development tend to be specialized and expensive. Monitoring or reporting on either management approach is its own separate, costly, and complex investment.
2223

2324
## How does Azure Active Directory help?
24-
Azure AD supports extensive access management for configured applications, enabling organizations to easily achieve the right access policies ranging from automatic, attribute-based assignment (ABAC or RBAC scenarios) through delegation and including administrator management. With Azure AD, you can easily achieve complex policies, combining multiple management models for a single application and can even reuse management rules across applications with the same audiences.
2525

26-
* [Adding new or existing applications](add-gallery-app.md)
26+
Azure AD supports extensive access management for configured applications, enabling organizations to easily achieve the right access policies ranging from automatic, attribute-based assignment (ABAC or RBAC scenarios) through delegation and including administrator management. With Azure AD, you can easily achieve complex policies, combining multiple management models for a single application and can even reuse management rules across applications with the same audiences.
27+
28+
With Azure AD, usage and assignment reporting is fully integrated, enabling administrators to easily report on assignment state, assignment errors, and even usage.
29+
30+
### Assigning users and groups to an app
2731

28-
Azure AD's application assignment focuses on two primary assignment modes:
32+
Azure AD's application assignment focuses on two primary assignment modes:
2933

3034
* **Individual assignment** An IT admin with directory Global Administrator permissions can select individual user accounts and grant them access to the application.
31-
* **Group-based assignment (paid Azure AD only)** An IT admin with directory Global Administrator permissions can assign a group to the application. Specific users' access is determined by whether they are members of the group at the time they try to access the application. In other words, an administrator can effectively create an assignment rule stating "any current member of the assigned group has access to the application". Using this assignment option, administrators can benefit from any of Azure AD group management options, including [attribute-based dynamic groups](../fundamentals/active-directory-groups-create-azure-portal.md), external system groups (for example, on-premises Active Directory or Workday), or Administrator-managed or self-service-managed groups. A single group can be easily assigned to multiple apps, making sure that applications with assignment affinity can share assignment rules, reducing the overall management complexity. Note that nested group memberships aren't supported for group-based assignment to applications at this time.
35+
36+
* **Group-based assignment (requires Azure AD Premium P1 or P2)** An IT admin with directory Global Administrator permissions can assign a group to the application. Specific users' access is determined by whether they are members of the group at the time they try to access the application. In other words, an administrator can effectively create an assignment rule stating "any current member of the assigned group has access to the application". Using this assignment option, administrators can benefit from any of Azure AD group management options, including [attribute-based dynamic groups](../fundamentals/active-directory-groups-create-azure-portal.md), external system groups (for example, on-premises Active Directory or Workday), or Administrator-managed or self-service-managed groups. A single group can be easily assigned to multiple apps, making sure that applications with assignment affinity can share assignment rules, reducing the overall management complexity. Note that nested group memberships aren't supported for group-based assignment to applications at this time.
3237

3338
Using these two assignment modes, administrators can achieve any desirable assignment management approach.
3439

35-
With Azure AD, usage and assignment reporting is fully integrated, enabling administrators to easily report on assignment state, assignment errors, and even usage.
40+
### Requiring user assignment for an app
41+
42+
With certain types of applications, you have the option of [requiring users to be assigned to the application](assign-user-or-group-access-portal.md#configure-an-application-to-require-user-assignment). By doing so, you prevent everyone from signing in except those users you explicitly assign to the application. The following types of applications support this option:
43+
44+
* Applications configured for federated single sign-on (SSO) with SAML-based authentication
45+
* Application Proxy applications that use Azure Active Directory Pre-Authentication
46+
* Applications built on the Azure AD application platform that use OAuth 2.0 / OpenID Connect Authentication after a user or admin has consented to that application.Certain enterprise applications offer additional control over who is allowed to sign in.
47+
48+
When user assignment is *not required*, unassigned users don't see the app on their My Apps access panel, but they can still sign in to the application itself (known as service provider-initiated sign-on) or they can use the **User Access URL** in the application’s **Properties** page (known as identity provider-initiated sign on).
49+
50+
For some applications, the option to require user assignment isn't available in the application properties. In these cases, you can use PowerShell to configure the setting.
51+
52+
### Determining the user experience for accessing apps
3653

37-
## Complex application assignment with Azure AD
54+
Azure AD provides [several customizable ways to deploy applications](end-user-experiences.md) to end users in your organization:
55+
56+
* Azure AD My Apps access panel
57+
* Office 365 application launcher
58+
* Direct sign-on to federated apps (service-pr)
59+
* Deep links to federated, password-based, or existing apps
60+
61+
You can determine whether users assigned to an enterprise app can see it in the access panel and Office 365 application launcher.
62+
63+
## Example: Complex application assignment with Azure AD
3864
Consider an application like Salesforce. In many organizations, Salesforce is primarily used by the marketing and sales teams. Often, members of the marketing team have highly privileged access to Salesforce, while members of the sales team have limited access. In many cases, a broad population of information workers has restricted access to the application. Exceptions to these rules complicate matters. It's often the prerogative of the marketing or sales leadership teams to grant a user access or change their roles independently of these generic rules.
3965

4066
With Azure AD, applications like Salesforce can be pre-configured for single sign-on (SSO) and automated provisioning. Once the application is configured, an Administrator can take the one-time action to create and assign the appropriate groups. In this example, an administrator could execute the following assignments:
@@ -43,12 +69,27 @@ With Azure AD, applications like Salesforce can be pre-configured for single sig
4369

4470
* All members of marketing groups would be assigned to the "marketing" role in Salesforce
4571
* All members of sales team groups would be assigned to the "sales" role in Salesforce. A further refinement could use multiple groups that represent regional sales teams assigned to different Salesforce roles.
72+
4673
* To enable the exception mechanism, a self-service group could be created for each role. For example, the "Salesforce marketing exception" group can be created as a self-service group. The group can be assigned to the Salesforce marketing role and the marketing leadership team can be made owner. Members of the marketing leadership team could add or remove users, set a join policy, or even approve or deny individual users' requests to join. This mechanism is supported through an information worker appropriate experience that does not require specialized training for owners or members.
4774

4875
In this case, all assigned users would be automatically provisioned to Salesforce, as they are added to different groups their role assignment would be updated in Salesforce. Users would be able to discover and access Salesforce through the Microsoft application access panel, Office web clients, or even by navigating to their organizational Salesforce login page. Administrators would be able to easily view usage and assignment status using Azure AD reporting.
4976

5077
Administrators can employ [Azure AD Conditional Access](../active-directory-conditional-access-azure-portal.md) to set access policies for specific roles. These policies can include whether access is permitted outside the corporate environment and even Multi-Factor Authentication or device requirements to achieve access in various cases.
5178

79+
## Access to Microsoft applications
80+
81+
Microsoft Applications (like Office 365 Exchange, SharePoint, Yammer, etc.) are assigned and managed a bit differently than 3rd party SaaS applications or other applications you integrate with Azure AD for single sign on.
82+
83+
There are three main ways that a user can get access to a Microsoft-published application.
84+
85+
- For applications in the Office 365 or other paid suites, users are granted access through **license assignment** either directly to their user account, or through a group using our group-based license assignment capability.
86+
- For applications that Microsoft or a Third Party publishes freely for anyone to use, users may be granted access through [user consent](configure-user-consent.md). This means that they sign in to the application with their Azure AD Work or School account and allow it to have access to some limited set of data on their account.
87+
- For applications that Microsoft or a 3rd party publishes freely for anyone to use, users may also be granted access through [administrator consent](manage-consent-requests.md). This means that an administrator has determined the application may be used by everyone in the organization, so they sign in to the application with a Global Administrator account and grant access to everyone in the organization.
88+
89+
Users can access Office 365 applications through their Office 365 portals. You can also show or hide Office 365 applications in the My Apps access panel with the [Office 365 visibility toggle](hide-application-from-user-portal.md) in your directory's **User settings**.
90+
91+
As with enterprise apps, you can [assign users](assign-user-or-group-access-portal.md) to certain Microsoft applications via the Azure portal or, if the portal option isn't available, by using PowerShell.
92+
5293
## Next steps
5394
* [Protecting apps with Conditional Access](../active-directory-conditional-access-azure-portal.md)
5495
* [Self-service group management/SSAA](../users-groups-roles/groups-self-service-management.md)

0 commit comments

Comments
 (0)