Skip to content

Commit 31df10b

Browse files
committed
Incorporating edits
1 parent 42c34dc commit 31df10b

File tree

1 file changed

+33
-40
lines changed

1 file changed

+33
-40
lines changed

articles/active-directory/cloud-infrastructure-entitlement-management/permissions-management-quickstart-guide.md

Lines changed: 33 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -9,68 +9,68 @@ ms.service: active-directory
99
ms.subservice: ciem
1010
ms.workload: identity
1111
ms.topic: quickstart
12-
ms.date: 08/17/2023
12+
ms.date: 08/24/2023
1313
ms.author: jfields
1414
---
1515

1616
# Quickstart guide to Microsoft Entra Permissions Management
1717

1818
Welcome to the Quickstart Guide for Microsoft Entra Permissions Management.
1919

20-
Permissions Management is a Cloud Infrastructure Entitlement Management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. These identities include over-privileged workload and user identities, actions, and resources across multicloud infrastructures in Microsoft Entra, Amazon Web Services (AWS), and Google Cloud Platform (GCP). Permissions Management helps your organization effectively secure and manage cloud permissions by detecting, automatically right-sizing, and continuously monitoring unused and excessive permissions.
20+
Permissions Management is a Cloud Infrastructure Entitlement Management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. These identities include over-privileged workload and user identities, actions, and resources across multicloud infrastructures in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP). Permissions Management helps your organization effectively secure and manage cloud permissions by detecting, automatically right-sizing, and continuously monitoring unused and excessive permissions.
2121

2222
With this quickstart guide, you’ll set up your multicloud environment(s), configure data collection, and enable permissions access to ensure your cloud identities are managed and secure.
2323

2424
## Prerequisites
2525

2626
Before you begin, you need access to these tools for the onboarding process:
2727

28-
- Access to a local BASH shell with the Entra CLI or Entra Cloud Shell using BASH environment (Entra CLI is included).
29-
- Access to AWS, Entra, and GCP consoles.
30-
- A user with permissions (Permissions Management Administrator?) to create a new app registration in Entra is required for AWS and GCP onboarding.
28+
- Access to a local BASH shell with the Azure CLI or Azure Cloud Shell using BASH environment (Azure CLI is included).
29+
- Access to AWS, Azure, and GCP consoles.
30+
- A user must have *Global Administrator* or *Permissions Management Administrator* role assignments to create a new app registration in Entra ID tenant is required for AWS and GCP onboarding.
3131

3232

3333
## Step 1: Set-up Permissions Management
3434

35-
To enable Permissions Management, you must have a Microsoft Entra tenant (example, Entra Admin Center).
36-
- If you have an Entra account, you automatically have an Entra Admin Center tenant.
37-
- If you don’t already have one, create a free account at [entra.microsoft.com](https://entra.microsoft.com).
35+
To enable Permissions Management, you must have a Microsoft Entra ID tenant (example, Entra admin center).
36+
- If you have an Azure account, you automatically have an Entra admin center tenant.
37+
- If you don’t already have one, create a free account at [entra.microsoft.com].(https://entra.microsoft.com)
3838

3939
If the above points are met, continue with:
4040

4141
1. [Enable Microsoft Entra Permissions Management in your organization](onboard-enable-tenant.md)
4242

43-
Ensure you are a Global Administrator, Permissions Management Administrator, or have equivalent permissions in your Entra Admin Center tenant. Learn more about [Permissions Management roles and permissions](product-roles-permissions.md).
43+
Ensure you are a *Global Administrator* or *Permissions Management Administrator*. Learn more about [Permissions Management roles and permissions](product-roles-permissions.md).
4444

4545

4646
## Step 2: Onboard your multicloud environment
4747

4848
So far you’ve,
4949

50-
1. Been assigned the Permissions Management Administrator role in your Entra Admin Center tenant.
50+
1. Been assigned the *Permissions Management Administrator* role in your Entra admin center tenant.
5151
2. Purchased licenses or activated your 45-day free trial for Permissions Management.
5252
3. Successfully launched Permissions Management.
5353

54-
Now, you're going to learn about the role and settings of the Controller, and Data collection modes in Permissions Management.
54+
Now, you're going to learn about the role and settings of the Controller and Data collection modes in Permissions Management.
5555

5656
### Set the controller
5757
The controller gives you the choice to determine the level of access you grant to users in Permissions Management.
5858

59-
- Enabling the controller during onboarding grants Permissions Management admin access, or read and write access, so users can right-size permissions and remediate directly through Permissions Management (instead of going to the AWS, Entra, or GCP consoles). 
59+
- Enabling the controller during onboarding grants Permissions Management admin access, or read and write access, so users can right-size permissions and remediate directly through Permissions Management (instead of going to the AWS, Azure, or GCP consoles). 
6060

61-
- Disabling the controller during onboarding, or never enabling it, grants Permissions Management user read only access to your environment(s).
61+
- Disabling the controller during onboarding, or never enabling it, grants a Permissions Management user read-only access to your environment(s).
6262

6363
> [!NOTE]
64-
> If you do not enable the controller during onboarding, you have the option to enable it after onboarding is complete. To set the controller in Permissions Management after onboarding, see [Enable or disable the controller after onboarding](onboard-enable-controller-after-onboarding.md).
64+
> If you don't enable the controller during onboarding, you have the option to enable it after onboarding is complete. To set the controller in Permissions Management after onboarding, see [Enable or disable the controller after onboarding](onboard-enable-controller-after-onboarding.md).
6565
> For AWS environments, once you've enabled the controller, you *cannot* disable it.
6666
6767
To set the controller settings during onboarding:
68-
1. Select **Enable** to give read and writer access to Permissions Management.
68+
1. Select **Enable** to give read and write access to Permissions Management.
6969
2. Select **Disable** to give read-only access to Permissions Management.
7070

7171
### Configure data collection
7272

73-
There are three mode options to set in order to collect data in Permissions Management.
73+
There are three modes to choose from in order to collect data in Permissions Management.
7474

7575
- **Automatic (recommended)**
7676
Permissions Management automatically discovers, onboards, and monitors all current and future subscriptions.
@@ -86,19 +86,19 @@ Permissions Management automatically discovers all current subscriptions. Once d
8686
8787
To configure data collection:
8888
1. In Permissions Management, navigate to the data collectors page.
89-
2. Select a cloud environment: AWS, Entra, or GCP.
89+
2. Select a cloud environment: AWS, Azure, or GCP.
9090
3. Click **Create configuration**.
9191

9292
### Onboard Amazon Web Services (AWS)
9393
Since Permissions Management is hosted on Microsoft Entra, there are additional steps to take to onboard your AWS environment.
9494

95-
To connect AWS to Permissions Management, you must create an Entra Admin Center application in the Entra Admin Center tenant where Permissions Management is enabled. This Entra Admin Center application is used to set up an OIDC connection to your AWS environment.
95+
To connect AWS to Permissions Management, you must create an Entra ID application in the Entra admin center tenant where Permissions Management is enabled. This Entra ID application is used to set up an OIDC connection to your AWS environment.
9696

9797
*OpenID Connect (OIDC) is an interoperable authentication protocol based on the OAuth 2.0 family of specifications.*
9898

9999
### Prerequisites
100100

101-
A user (Permissions Management Admin?) with the ability to create a new app registration in Entra (needed to facilitate the OIDC connection) is needed for AWS and GCP onboarding.
101+
A user must have *Global Administrator* or *Permissions Management Administrator* role assignments to create a new app registration in Entra ID.
102102

103103
Account IDs and roles for:
104104
- AWS OIDC account: An AWS member account designated by you to create and host the OIDC connection through an OIDC IdP
@@ -110,31 +110,29 @@ To use **Automatic** or **Select** data collection modes, you must connect your
110110

111111
During this step, you have the option to enable the controller by entering the name of the S3 bucket with AWS CloudTrail activity logs (found on AWS Trails).
112112

113-
![Diagram, Entra Permissions Management tenant for OIDC app.](media/permissions-management-quickstart-guide/quickstart-entra-tenant.png)
114-
115113
To onboard your AWS environment and configure data collection, see [Onboard an Amazon Web Services (AWS) account](onboard-aws.md).
116114

117-
### Onboard Microsoft Entra
118-
When you enabled Permissions Management in the Entra tenant, an enterprise application Cloud Infrastructure Entitlement Management (CIEM) was created. To onboard your Entra environment, you grant permissions to this application so Permissions management.
115+
### Onboard Microsoft Azure
116+
When you enabled Permissions Management in the Entra ID tenant, an enterprise application for CIEM was created. To onboard your Azure environment, you grant permissions to this application for Permissions management.
119117

120-
In the Enta tenant where Permissions management is enabled, locate the Cloud Infrastructure Entitlement Management (CIEM) application.
118+
1. In the Entra ID tenant where Permissions management is enabled, locate the **Cloud Infrastructure Entitlement Management (CIEM)** enterprise application.
121119

122-
Assign the *Reader* role to the CIEM application to allow Permissions management to read the Entra subscriptions in your environment.
120+
2. Assign the *Reader* role to the CIEM application to allow Permissions management to read the Entra subscriptions in your environment.
123121

124122
### Prerequisites
125-
A user with Microsoft.Authorization/roleAssignments/write permissions at the subscription or management group scope.
123+
- A user with ```Microsoft.Authorization/roleAssignments/write``` permissions at the subscription or management group scope.
126124

127-
To use **Automatic** or **Select** data collection modes, you must assign *Reader* role at the Management group scope.
125+
- To use **Automatic** or **Select** data collection modes, you must assign the *Reader* role at the Management group scope.
128126

129-
To enable the controller, you must assign the *User Access Administrator* role to the CIEM application.
127+
- To enable the controller, you must assign the *User Access Administrator* role to the CIEM application.
130128

131-
To onboard your Entra environment and configure data collection, see [Onboard a Microsoft Entra subscription](onboard-azure.md).
129+
- To onboard your Azure environment and configure data collection, see [Onboard a Microsoft Azure subscription](onboard-azure.md).
132130

133131

134132
### Onboard Google Cloud Platform (GCP)
135-
Because Permissions Management is hosted on Microsoft Entra, there are additional steps to take to onboard your GCP environment.
133+
Because Permissions Management is hosted on Microsoft Azure, there are additional steps to take to onboard your GCP environment.
136134

137-
To connect GCP to Permissions Management, you must create an Entra Admin Center application in the Entra tenant where Permissions Management is enabled. This Entra Admin Center application is used to set up an OIDC connection to your GCP environment.
135+
To connect GCP to Permissions Management, you must create an Entra admin center application in the Entra ID tenant where Permissions Management is enabled. This Entra admin center application is used to set up an OIDC connection to your GCP environment.
138136

139137
*OpenID Connect (OIDC) is an interoperable authentication protocol based on the OAuth 2.0 family of specifications.*
140138

@@ -158,8 +156,6 @@ During this step, you have the option to **Enable** controller mode by assigning
158156
> [!NOTE]
159157
> The Permissions Management default scope is at the project level.
160158
161-
![Diagram, GCP Permissions Management connection for OIDC app.](media/permissions-management-quickstart-guide/quickstart-entra-tenant.png)
162-
163159
To onboard your GCP environment and configure data collection, see [Onboard a GCP project](onboard-gcp.md).
164160

165161
## Summary
@@ -169,10 +165,10 @@ Congratulations! You've finished configuring data collection for your environmen
169165
The status column in your Permissions Management UI shows you which step of data collection you are at.
170166

171167

172-
- **Pending**: Permissions management has not started detecting or onboarded yet.
173-
- **Discovering**: Permissions management is detecting the authorization systems.
174-
- **In progress**: Permissions management has finished detecting the authorization systems and has started onboarding.
175-
- **Onboarded**: data collection has completed, and all detected authorization systems have been successfully onboarded to Permissions Management.
168+
- **Pending**: Permissions Management has not started detecting or onboarding yet.
169+
- **Discovering**: Permissions Management is detecting the authorization systems.
170+
- **In progress**: Permissions Management has finished detecting the authorization systems and is onboarding.
171+
- **Onboarded**: Data collection is complete, and all detected authorization systems are onboarded to Permissions Management.
176172

177173
> [!NOTE]
178174
> Data collection might take time depending on the amount of authorization systems you've onboarded. While the data collection process continues, you can begin setting up [users and groups in Permissions Management](how-to-add-remove-user-to-group.md).
@@ -183,8 +179,5 @@ The status column in your Permissions Management UI shows you which step of data
183179
- [Add an account/subscription/project after onboarding is complete](onboard-add-account-after-onboarding.md)
184180

185181
References:
186-
- Permissions Management operational guide tbd.md
187-
- Troubleshooting guide
188-
- Permissions Management best practices guide
189182
- [Permissions Management Glossary](multi-cloud-glossary.md)
190183
- [Permissions Management FAQs](faqs.md)

0 commit comments

Comments
 (0)