You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/permissions-management-quickstart-guide.md
+33-40Lines changed: 33 additions & 40 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,68 +9,68 @@ ms.service: active-directory
9
9
ms.subservice: ciem
10
10
ms.workload: identity
11
11
ms.topic: quickstart
12
-
ms.date: 08/17/2023
12
+
ms.date: 08/24/2023
13
13
ms.author: jfields
14
14
---
15
15
16
16
# Quickstart guide to Microsoft Entra Permissions Management
17
17
18
18
Welcome to the Quickstart Guide for Microsoft Entra Permissions Management.
19
19
20
-
Permissions Management is a Cloud Infrastructure Entitlement Management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. These identities include over-privileged workload and user identities, actions, and resources across multicloud infrastructures in Microsoft Entra, Amazon Web Services (AWS), and Google Cloud Platform (GCP). Permissions Management helps your organization effectively secure and manage cloud permissions by detecting, automatically right-sizing, and continuously monitoring unused and excessive permissions.
20
+
Permissions Management is a Cloud Infrastructure Entitlement Management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. These identities include over-privileged workload and user identities, actions, and resources across multicloud infrastructures in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP). Permissions Management helps your organization effectively secure and manage cloud permissions by detecting, automatically right-sizing, and continuously monitoring unused and excessive permissions.
21
21
22
22
With this quickstart guide, you’ll set up your multicloud environment(s), configure data collection, and enable permissions access to ensure your cloud identities are managed and secure.
23
23
24
24
## Prerequisites
25
25
26
26
Before you begin, you need access to these tools for the onboarding process:
27
27
28
-
- Access to a local BASH shell with the Entra CLI or Entra Cloud Shell using BASH environment (Entra CLI is included).
29
-
- Access to AWS, Entra, and GCP consoles.
30
-
- A user with permissions (Permissions Management Administrator?) to create a new app registration in Entra is required for AWS and GCP onboarding.
28
+
- Access to a local BASH shell with the Azure CLI or Azure Cloud Shell using BASH environment (Azure CLI is included).
29
+
- Access to AWS, Azure, and GCP consoles.
30
+
- A user must have *Global Administrator* or *Permissions Management Administrator* role assignments to create a new app registration in Entra ID tenant is required for AWS and GCP onboarding.
31
31
32
32
33
33
## Step 1: Set-up Permissions Management
34
34
35
-
To enable Permissions Management, you must have a Microsoft Entra tenant (example, Entra Admin Center).
36
-
- If you have an Entra account, you automatically have an Entra Admin Center tenant.
37
-
- If you don’t already have one, create a free account at [entra.microsoft.com](https://entra.microsoft.com).
35
+
To enable Permissions Management, you must have a Microsoft Entra ID tenant (example, Entra admin center).
36
+
- If you have an Azure account, you automatically have an Entra admin center tenant.
37
+
- If you don’t already have one, create a free account at [entra.microsoft.com].(https://entra.microsoft.com)
38
38
39
39
If the above points are met, continue with:
40
40
41
41
1.[Enable Microsoft Entra Permissions Management in your organization](onboard-enable-tenant.md)
42
42
43
-
Ensure you are a Global Administrator, Permissions Management Administrator, or have equivalent permissions in your Entra Admin Center tenant. Learn more about [Permissions Management roles and permissions](product-roles-permissions.md).
43
+
Ensure you are a *Global Administrator* or *Permissions Management Administrator*. Learn more about [Permissions Management roles and permissions](product-roles-permissions.md).
44
44
45
45
46
46
## Step 2: Onboard your multicloud environment
47
47
48
48
So far you’ve,
49
49
50
-
1. Been assigned the Permissions Management Administrator role in your Entra Admin Center tenant.
50
+
1. Been assigned the *Permissions Management Administrator* role in your Entra admin center tenant.
51
51
2. Purchased licenses or activated your 45-day free trial for Permissions Management.
52
52
3. Successfully launched Permissions Management.
53
53
54
-
Now, you're going to learn about the role and settings of the Controller, and Data collection modes in Permissions Management.
54
+
Now, you're going to learn about the role and settings of the Controller and Data collection modes in Permissions Management.
55
55
56
56
### Set the controller
57
57
The controller gives you the choice to determine the level of access you grant to users in Permissions Management.
58
58
59
-
- Enabling the controller during onboarding grants Permissions Management admin access, or read and write access, so users can right-size permissions and remediate directly through Permissions Management (instead of going to the AWS, Entra, or GCP consoles).
59
+
- Enabling the controller during onboarding grants Permissions Management admin access, or read and write access, so users can right-size permissions and remediate directly through Permissions Management (instead of going to the AWS, Azure, or GCP consoles).
60
60
61
-
- Disabling the controller during onboarding, or never enabling it, grants Permissions Management user readonly access to your environment(s).
61
+
- Disabling the controller during onboarding, or never enabling it, grants a Permissions Management user read-only access to your environment(s).
62
62
63
63
> [!NOTE]
64
-
> If you do not enable the controller during onboarding, you have the option to enable it after onboarding is complete. To set the controller in Permissions Management after onboarding, see [Enable or disable the controller after onboarding](onboard-enable-controller-after-onboarding.md).
64
+
> If you don't enable the controller during onboarding, you have the option to enable it after onboarding is complete. To set the controller in Permissions Management after onboarding, see [Enable or disable the controller after onboarding](onboard-enable-controller-after-onboarding.md).
65
65
> For AWS environments, once you've enabled the controller, you *cannot* disable it.
66
66
67
67
To set the controller settings during onboarding:
68
-
1. Select **Enable** to give read and writer access to Permissions Management.
68
+
1. Select **Enable** to give read and write access to Permissions Management.
69
69
2. Select **Disable** to give read-only access to Permissions Management.
70
70
71
71
### Configure data collection
72
72
73
-
There are three mode options to set in order to collect data in Permissions Management.
73
+
There are three modes to choose from in order to collect data in Permissions Management.
74
74
75
75
-**Automatic (recommended)**
76
76
Permissions Management automatically discovers, onboards, and monitors all current and future subscriptions.
@@ -86,19 +86,19 @@ Permissions Management automatically discovers all current subscriptions. Once d
86
86
87
87
To configure data collection:
88
88
1. In Permissions Management, navigate to the data collectors page.
89
-
2. Select a cloud environment: AWS, Entra, or GCP.
89
+
2. Select a cloud environment: AWS, Azure, or GCP.
90
90
3. Click **Create configuration**.
91
91
92
92
### Onboard Amazon Web Services (AWS)
93
93
Since Permissions Management is hosted on Microsoft Entra, there are additional steps to take to onboard your AWS environment.
94
94
95
-
To connect AWS to Permissions Management, you must create an Entra Admin Center application in the Entra Admin Center tenant where Permissions Management is enabled. This Entra Admin Center application is used to set up an OIDC connection to your AWS environment.
95
+
To connect AWS to Permissions Management, you must create an Entra ID application in the Entra admin center tenant where Permissions Management is enabled. This Entra ID application is used to set up an OIDC connection to your AWS environment.
96
96
97
97
*OpenID Connect (OIDC) is an interoperable authentication protocol based on the OAuth 2.0 family of specifications.*
98
98
99
99
### Prerequisites
100
100
101
-
A user (Permissions Management Admin?) with the ability to create a new app registration in Entra (needed to facilitate the OIDC connection) is needed for AWS and GCP onboarding.
101
+
A user must have *Global Administrator* or *Permissions Management Administrator* role assignments to create a new app registration in Entra ID.
102
102
103
103
Account IDs and roles for:
104
104
- AWS OIDC account: An AWS member account designated by you to create and host the OIDC connection through an OIDC IdP
@@ -110,31 +110,29 @@ To use **Automatic** or **Select** data collection modes, you must connect your
110
110
111
111
During this step, you have the option to enable the controller by entering the name of the S3 bucket with AWS CloudTrail activity logs (found on AWS Trails).
112
112
113
-

114
-
115
113
To onboard your AWS environment and configure data collection, see [Onboard an Amazon Web Services (AWS) account](onboard-aws.md).
116
114
117
-
### Onboard Microsoft Entra
118
-
When you enabled Permissions Management in the Entra tenant, an enterprise application Cloud Infrastructure Entitlement Management (CIEM) was created. To onboard your Entra environment, you grant permissions to this application so Permissions management.
115
+
### Onboard Microsoft Azure
116
+
When you enabled Permissions Management in the Entra ID tenant, an enterprise application for CIEM was created. To onboard your Azure environment, you grant permissions to this application for Permissions management.
119
117
120
-
In the Enta tenant where Permissions management is enabled, locate the Cloud Infrastructure Entitlement Management (CIEM) application.
118
+
1.In the Entra ID tenant where Permissions management is enabled, locate the **Cloud Infrastructure Entitlement Management (CIEM)** enterprise application.
121
119
122
-
Assign the *Reader* role to the CIEM application to allow Permissions management to read the Entra subscriptions in your environment.
120
+
2.Assign the *Reader* role to the CIEM application to allow Permissions management to read the Entra subscriptions in your environment.
123
121
124
122
### Prerequisites
125
-
A user with Microsoft.Authorization/roleAssignments/write permissions at the subscription or management group scope.
123
+
-A user with ```Microsoft.Authorization/roleAssignments/write``` permissions at the subscription or management group scope.
126
124
127
-
To use **Automatic** or **Select** data collection modes, you must assign *Reader* role at the Management group scope.
125
+
-To use **Automatic** or **Select** data collection modes, you must assign the*Reader* role at the Management group scope.
128
126
129
-
To enable the controller, you must assign the *User Access Administrator* role to the CIEM application.
127
+
-To enable the controller, you must assign the *User Access Administrator* role to the CIEM application.
130
128
131
-
To onboard your Entra environment and configure data collection, see [Onboard a Microsoft Entra subscription](onboard-azure.md).
129
+
-To onboard your Azure environment and configure data collection, see [Onboard a Microsoft Azure subscription](onboard-azure.md).
132
130
133
131
134
132
### Onboard Google Cloud Platform (GCP)
135
-
Because Permissions Management is hosted on Microsoft Entra, there are additional steps to take to onboard your GCP environment.
133
+
Because Permissions Management is hosted on Microsoft Azure, there are additional steps to take to onboard your GCP environment.
136
134
137
-
To connect GCP to Permissions Management, you must create an Entra Admin Center application in the Entra tenant where Permissions Management is enabled. This Entra Admin Center application is used to set up an OIDC connection to your GCP environment.
135
+
To connect GCP to Permissions Management, you must create an Entra admin center application in the Entra ID tenant where Permissions Management is enabled. This Entra admin center application is used to set up an OIDC connection to your GCP environment.
138
136
139
137
*OpenID Connect (OIDC) is an interoperable authentication protocol based on the OAuth 2.0 family of specifications.*
140
138
@@ -158,8 +156,6 @@ During this step, you have the option to **Enable** controller mode by assigning
158
156
> [!NOTE]
159
157
> The Permissions Management default scope is at the project level.
160
158
161
-

162
-
163
159
To onboard your GCP environment and configure data collection, see [Onboard a GCP project](onboard-gcp.md).
164
160
165
161
## Summary
@@ -169,10 +165,10 @@ Congratulations! You've finished configuring data collection for your environmen
169
165
The status column in your Permissions Management UI shows you which step of data collection you are at.
170
166
171
167
172
-
-**Pending**: Permissions management has not started detecting or onboarded yet.
173
-
-**Discovering**: Permissions management is detecting the authorization systems.
174
-
-**In progress**: Permissions management has finished detecting the authorization systems and has started onboarding.
175
-
-**Onboarded**: data collection has completed, and all detected authorization systems have been successfully onboarded to Permissions Management.
168
+
-**Pending**: Permissions Management has not started detecting or onboarding yet.
169
+
-**Discovering**: Permissions Management is detecting the authorization systems.
170
+
-**In progress**: Permissions Management has finished detecting the authorization systems and is onboarding.
171
+
-**Onboarded**: Data collection is complete, and all detected authorization systems are onboarded to Permissions Management.
176
172
177
173
> [!NOTE]
178
174
> Data collection might take time depending on the amount of authorization systems you've onboarded. While the data collection process continues, you can begin setting up [users and groups in Permissions Management](how-to-add-remove-user-to-group.md).
@@ -183,8 +179,5 @@ The status column in your Permissions Management UI shows you which step of data
183
179
-[Add an account/subscription/project after onboarding is complete](onboard-add-account-after-onboarding.md)
0 commit comments