You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: View and manage requests for an access package in Azure AD entitlement management (Preview) - Azure Active Directory
3
-
description: Learn how to view, reprocess, and cancel requests for an access package in Azure Active Directory entitlement management (Preview).
2
+
title: View requests for an access package in Azure AD entitlement management (Preview) - Azure Active Directory
3
+
description: Learn how to view requests for an access package in Azure Active Directory entitlement management (Preview).
4
4
services: active-directory
5
5
documentationCenter: ''
6
6
author: msaburnley
@@ -18,17 +18,17 @@ ms.reviewer:
18
18
ms.collection: M365-identity-device-management
19
19
20
20
21
-
#Customer intent: As an administrator, I want detailed information about how I can edit an access package so that requestors have the resources they need to perform their job.
21
+
#Customer intent: As an access package manager, I want detailed information about requests for access packages so that I can view the status and troubleshoot any issues.
22
22
23
23
---
24
-
# View and manage requests for an access package in Azure AD entitlement management (Preview)
24
+
# View requests for an access package in Azure AD entitlement management (Preview)
25
25
26
26
> [!IMPORTANT]
27
27
> Azure Active Directory (Azure AD) entitlement management is currently in public preview.
28
28
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
29
29
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
30
30
31
-
In Azure AD entitlement management, you can see who has requested access packages, their policy, and status. This article describes how to view, reprocess, and cancel requests for an access packages.
31
+
In Azure AD entitlement management, you can see who has requested access packages, their policy, and status. This article describes how to view requests for an access packages.
32
32
33
33
## View requests
34
34
@@ -44,59 +44,8 @@ In Azure AD entitlement management, you can see who has requested access package
44
44
45
45

46
46
47
-
## View a request's delivery errors
48
-
49
-
**Prerequisite role:** Global administrator, User administrator, Catalog owner, or Access package manager
50
-
51
-
1. In the Azure portal, click **Azure Active Directory** and then click **Identity Governance**.
52
-
53
-
1. In the left menu, click **Access packages** and then open the access package.
54
-
55
-
1. Click **Requests**.
56
-
57
-
1. Select the request you want to view.
58
-
59
-
If the request has any delivery errors, the request status will be **Undelivered** or **Partially delivered**.
60
-
61
-
If there are any delivery errors, in the request's detail pane, there will be a count of delivery errors.
62
-
63
-
1. Click the count to see all of the request's delivery errors.
64
-
65
-
## Reprocess a request
66
-
67
-
If a request encounters an error, you can reprocess the request to try it again. You can only reprocess a request that has a status of **Delivery failed** or **Partially delivered** and a completed date of less than one week.
68
-
69
-
**Prerequisite role:** Global administrator, User administrator, Catalog owner, or Access package manager
70
-
71
-
1. In the Azure portal, click **Azure Active Directory** and then click **Identity Governance**.
72
-
73
-
1. In the left menu, click **Access packages** and then open the access package.
74
-
75
-
1. Click **Requests**.
76
-
77
-
1. Click the request you want to reprocess.
78
-
79
-
1. In the request details pane, click **Reprocess request**.
80
-
81
-

82
-
83
-
## Cancel a pending request
84
-
85
-
You can only cancel a pending request that has not yet been delivered or whose delivery has failed.
86
-
87
-
**Prerequisite role:** Global administrator, User administrator, Catalog owner, or Access package manager
88
-
89
-
1. In the Azure portal, click **Azure Active Directory** and then click **Identity Governance**.
90
-
91
-
1. In the left menu, click **Access packages** and then open the access package.
92
-
93
-
1. Click **Requests**.
94
-
95
-
1. Click the request you want to cancel.
96
-
97
-
1. In the request details pane, click **Cancel request**.
98
-
99
47
## Next steps
100
48
101
49
-[Change request and approval settings for an access package](entitlement-management-access-package-request-policy.md)
102
-
-[View, add, and remove assignments for an access package](entitlement-management-access-package-assignments.md)
50
+
-[View, add, and remove assignments for an access package](entitlement-management-access-package-assignments.md)
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-delegate-catalog.md
+16-2Lines changed: 16 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.tgt_pltfrm: na
12
12
ms.devlang: na
13
13
ms.topic: conceptual
14
14
ms.subservice: compliance
15
-
ms.date: 10/07/2019
15
+
ms.date: 10/26/2019
16
16
ms.author: ajburnle
17
17
ms.reviewer: mwahl
18
18
ms.collection: M365-identity-device-management
@@ -43,14 +43,28 @@ Follow these steps to assign a user to the catalog creator role.
43
43
44
44
1. Click **Edit**.
45
45
46
-

46
+

47
47
48
48
1. In the **Delegate entitlement management** section, click **Add catalog creators** to select the users or groups that you want to delegate this entitlement management role to.
49
49
50
50
1. Click **Select**.
51
51
52
52
1. Click **Save**.
53
53
54
+
## Allow delegated roles to access the Azure portal
55
+
56
+
To allow delegated roles, such as catalog creators and access package managers, to access the Azure portal to manage access packages, you should check the administration portal setting.
57
+
58
+
**Prerequisite role:** Global administrator or User administrator
59
+
60
+
1. In the Azure portal, click **Azure Active Directory** and then click **Users**.
61
+
62
+
1. In the left menu, click **User settings**.
63
+
64
+
1. Make sure **Restrict access to Azure AD administration portal** is set to **No**.
65
+
66
+

67
+
54
68
## Next steps
55
69
56
70
-[Create and manage a catalog of resources](entitlement-management-catalog-create.md)
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-delegate.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -112,8 +112,9 @@ The following table lists the tasks that the entitlement management roles can pe
112
112
|[Directly assign a user to an access package](entitlement-management-access-package-assignments.md#directly-assign-a-user)|:heavy_check_mark:||:heavy_check_mark:|:heavy_check_mark:|
113
113
|[View who has an assignment to an access package](entitlement-management-access-package-assignments.md#view-who-has-an-assignment)|:heavy_check_mark:||:heavy_check_mark:|:heavy_check_mark:|
114
114
|[View an access package's requests](entitlement-management-access-package-requests.md#view-requests)|:heavy_check_mark:||:heavy_check_mark:|:heavy_check_mark:|
115
-
|[View a request's delivery errors](entitlement-management-access-package-requests.md#view-a-requests-delivery-errors)|:heavy_check_mark:||:heavy_check_mark:|:heavy_check_mark:|
116
-
|[Cancel a pending request](entitlement-management-access-package-requests.md#cancel-a-pending-request)|:heavy_check_mark:||:heavy_check_mark:|:heavy_check_mark:|
115
+
|[View a request's delivery errors](entitlement-management-troubleshoot.md#view-a-requests-delivery-errors)|:heavy_check_mark:||:heavy_check_mark:|:heavy_check_mark:|
116
+
|[Reprocess a request](entitlement-management-troubleshoot.md#reprocess-a-request)|:heavy_check_mark:||:heavy_check_mark:|:heavy_check_mark:|
117
+
|[Cancel a pending request](entitlement-management-troubleshoot.md#cancel-a-pending-request)|:heavy_check_mark:||:heavy_check_mark:|:heavy_check_mark:|
117
118
|[Hide an access package](entitlement-management-access-package-edit.md#change-the-hidden-setting)|:heavy_check_mark:||:heavy_check_mark:|:heavy_check_mark:|
118
119
|[Delete an access package](entitlement-management-access-package-edit.md#delete-an-access-package)|:heavy_check_mark:||:heavy_check_mark:|:heavy_check_mark:|
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-external-users.md
+48-14Lines changed: 48 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.tgt_pltfrm: na
12
12
ms.devlang: na
13
13
ms.topic: conceptual
14
14
ms.subservice: compliance
15
-
ms.date: 10/15/2019
15
+
ms.date: 10/26/2019
16
16
ms.author: ajburnle
17
17
ms.reviewer: mwahl
18
18
ms.collection: M365-identity-device-management
@@ -73,6 +73,52 @@ The following diagram and steps provide an overview of how external users are gr
73
73
74
74
1. Depending on the lifecycle of external users settings, when the external user no longer has any access package assignments, the external user is blocked from signing in and the guest user account is removed from your directory.
75
75
76
+
## Settings for external users
77
+
78
+
To ensure people outside of your organization can request access packages and get access to the resources in those access packages, there are some settings that you should verify are properly configured.
79
+
80
+
### Enable catalog for external users
81
+
82
+
- By default, when you create a [new catalog](entitlement-management-catalog-create.md), it is enabled to allow external users to request access packages in the catalog. Make sure **Enabled for external users** is set to **Yes**.
### Configure your Azure AD B2B external collaboration settings
87
+
88
+
- Allowing guests to invite other guests to your directory means that guest invites can occur outside of entitlement management. We recommend setting **Guests can invite** to **No** to only allow for properly governed invitations.
89
+
- If you are using the B2B allow list, you must make sure any domain you want to partner with using entitlement management is added to the list. Alternatively, if you are using the B2B deny list, you must make sure any domain you want to partner with is not added to the list.
90
+
- If you create an entitlement management policy for **All users** (All connected organizations + any new external users), any B2B allow or deny list settings you have will take precedence. Therefore, be sure to include the domains you intend to include in this policy to your allow list if you are using one, and exclude them from your deny list if you are using a deny list.
91
+
- If you want to create an entitlement management policy that includes **All users** (All connected organizations + any new external users), you must first enable email one-time passcode authentication for your directory. For more information, see [Email one-time passcode authentication (preview)](../b2b/one-time-passcode.md#opting-in-to-the-preview).
92
+
- For more information about Azure AD B2B external collaboration settings, see [Enable B2B external collaboration and manage who can invite guests](../b2b/delegate-invitations.md).
93
+
94
+

95
+
96
+
### Review your Conditional Access policies
97
+
98
+
- Make sure to exclude guests from any Conditional Access policies that new guest users will not be able to meet as this will block them from being able to sign in to your directory. For example, guests likely don't have a registered device, aren't in a known location, and don't want to re-register for multi-factor authentication (MFA), so adding these requirements in a Conditional Access policy will block guests from using entitlement management. For more information, see [What are conditions in Azure Active Directory Conditional Access?](../conditional-access/conditions.md).
99
+
100
+

101
+
102
+
### Review your SharePoint Online external sharing settings
103
+
104
+
- If you want to include SharePoint Online sites in your access packages for external users, make sure that your organization-level external sharing setting is set to **Anyone** (users don't require sign in) or **New and existing guests** (guests must sign in or provide a verification code). For more information, see [Turn external sharing on or off](https://docs.microsoft.com/sharepoint/turn-external-sharing-on-or-off#change-the-organization-level-external-sharing-setting).
105
+
106
+
- If you want to restrict any external sharing outside of entitlement management, you can set the external sharing setting to **Existing guests**. Then, only new users that are invited through entitlement management will be able to gain access to these sites. For more information, see [Turn external sharing on or off](https://docs.microsoft.com/sharepoint/turn-external-sharing-on-or-off#change-the-organization-level-external-sharing-setting).
107
+
108
+
- Make sure that the site-level settings enable guest access (same option selections as previously listed). For more information, see [Turn external sharing on or off for a site](https://docs.microsoft.com/sharepoint/change-external-sharing-site).
109
+
110
+
### Review your Office 365 group sharing settings
111
+
112
+
- If you want to include Office 365 groups in your access packages for external users, make sure the **Let users add new guests to the organization** is set to **On** to allow guest access. For more information, see [Manage guest access to Office 365 Groups](https://docs.microsoft.com/office365/admin/create-groups/manage-guest-access-in-groups?view=o365-worldwide#manage-guest-access-to-office-365-groups).
113
+
114
+
- If you want external users to be able to access the SharePoint Online site and resources associated with an Office 365 group, make sure you turn on SharePoint Online external sharing. For more information, see [Turn external sharing on or off](https://docs.microsoft.com/sharepoint/turn-external-sharing-on-or-off#change-the-organization-level-external-sharing-setting).
115
+
116
+
- For information about how to set the guest policy for Office 365 groups at the directory level in PowerShell, see [Example: Configure Guest policy for groups at the directory level](../users-groups-roles/groups-settings-cmdlets.md#example-configure-guest-policy-for-groups-at-the-directory-level).
117
+
118
+
### Review your Teams sharing settings
119
+
120
+
- If you want to include Teams in your access packages for external users, make sure the **Allow guest access in Microsoft Teams** is set to **On** to allow guest access. For more information, see [Configure guest access in the Microsoft Teams admin center](https://docs.microsoft.com/microsoftteams/set-up-guests#configure-guest-access-in-the-microsoft-teams-admin-center).
121
+
76
122
## Manage the lifecycle of external users
77
123
78
124
You can select what happens when an external user, who was invited to your directory through an access package request being approved, no longer has any access package assignments. This can happen if the user relinquishes all their access package assignments, or their last access package assignment expires. By default, when an external user no longer has any access package assignments, they are blocked from signing in to your directory. After 30 days, their guest user account is removed from your directory.
@@ -103,20 +149,8 @@ You can select what happens when an external user, who was invited to your direc
103
149
104
150
1. Click **Save**.
105
151
106
-
## Enable a catalog for external users
107
-
108
-
When you create a [new catalog](entitlement-management-catalog-create.md), there is a setting to enable users from external directories to request access packages in the catalog. If you don't want external users to have permissions to request access packages in the catalog, set **Enabled for external users** to **No**.
109
-
110
-
**Prerequisite role:** Global administrator, User administrator, or Catalog owner
0 commit comments