Skip to content

Commit 4a88f6c

Browse files
authored
Merge pull request #208059 from weznagwama/new-data-collector-ui
UI changes added for onbaording authorization systems for Azure and GCP
2 parents dcfa84d + 2776d4b commit 4a88f6c

File tree

3 files changed

+47
-22
lines changed

3 files changed

+47
-22
lines changed

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md

Lines changed: 30 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.author: kenwith
1313

1414
# Onboard a Microsoft Azure subscription
1515

16-
This article describes how to onboard a Microsoft Azure subscription or subscriptions on Permissions Management (Permissions Management). Onboarding a subscription creates a new authorization system to represent the Azure subscription in Permissions Management.
16+
This article describes how to onboard a Microsoft Azure subscription or subscriptions on Permissions Management. Onboarding a subscription creates a new authorization system to represent the Azure subscription in Permissions Management.
1717

1818
> [!NOTE]
1919
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
@@ -28,7 +28,7 @@ To add Permissions Management to your Azure AD tenant:
2828

2929
1. If the **Data Collectors** dashboard isn't displayed when Permissions Management launches:
3030

31-
- In the Permissions Management home page, select **Settings** (the gear icon), and then select the **Data Collectors** subtab.
31+
- In the Permissions Management home page, select **Settings** (the gear icon, top right), and then select the **Data Collectors** subtab.
3232

3333
1. On the **Data Collectors** dashboard, select **Azure**, and then select **Create Configuration**.
3434

@@ -38,19 +38,22 @@ Choose from 3 options to manage Azure subscriptions.
3838

3939
#### Option 1: Automatically manage
4040

41-
This option allows subscriptions to be automatically detected and monitored without additional configuration. Steps to detect list of subscriptions and onboard for collection:
41+
This option allows subscriptions to be automatically detected and monitored without extra configuration.A key benefit of automatic management is that any current or future subscriptions found get onboarded automatically. Steps to detect list of subscriptions and onboard for collection:
4242

43-
- Grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope.
43+
- Firstly, grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope.
4444

45-
Any current or future subscriptions found get onboarded automatically.
46-
47-
To view status of onboarding after saving the configuration:
48-
49-
1. In the MEPM portal, click the cog on the top right-hand side.
50-
1. Navigate to data collectors tab.
45+
1. In the EPM portal, left-click the cog on the top right-hand side.
46+
1. Navigate to data collectors tab
47+
1. Ensure 'Azure' is selected
5148
1. Click ‘Create Configuration’
5249
1. For onboarding mode, select ‘Automatically Manage’
53-
1. Click ‘Verify Now & Save’
50+
51+
The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. This can be performed manually in the Entra console, or programatically with PowerShell or the Azure CLI.
52+
53+
Lastly, Click ‘Verify Now & Save’
54+
55+
To view status of onboarding after saving the configuration:
56+
5457
1. Collectors will now be listed and change through status types. For each collector listed with a status of “Collected Inventory”, click on that status to view further information.
5558
1. You can then view subscriptions on the In Progress page
5659

@@ -59,8 +62,9 @@ Any current or future subscriptions found get onboarded automatically.
5962
You have the ability to specify only certain subscriptions to manage and monitor with MEPM (up to 10 per collector). Follow the steps below to configure these subscriptions to be monitored:
6063

6164
1. For each subscription you wish to manage, ensure that the ‘Reader’ role has been granted to Cloud Infrastructure Entitlement Management application for this subscription.
62-
1. In the MEPM portal, click the cog on the top right-hand side.
65+
1. In the EPM portal, click the cog on the top right-hand side.
6366
1. Navigate to data collectors tab
67+
1. Ensure 'Azure' is selected
6468
1. Click ‘Create Configuration’
6569
1. Select ‘Enter Authorization Systems’
6670
1. Under the Subscription IDs section, enter a desired subscription ID into the input box. Click the “+” up to 9 additional times, putting a single subscription ID into each respective input box.
@@ -78,8 +82,20 @@ To view status of onboarding after saving the configuration:
7882

7983
This option detects all subscriptions that are accessible by the Cloud Infrastructure Entitlement Management application.
8084

81-
1. Grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription(s) scope.
82-
1. Click Verify and Save.
85+
- Firstly, grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope.
86+
87+
1. In the EPM portal, click the cog on the top right-hand side.
88+
1. Navigate to data collectors tab
89+
1. Ensure 'Azure' is selected
90+
1. Click ‘Create Configuration’
91+
1. For onboarding mode, select ‘Automatically Manage’
92+
93+
The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. You can do this manually in the Entra console, or programatically with PowerShell or the Azure CLI.
94+
95+
Lastly, Click ‘Verify Now & Save’
96+
97+
To view status of onboarding after saving the configuration:
98+
8399
1. Navigate to newly create Data Collector row under Azure data collectors.
84100
1. Click on Status column when the row has “Pending” status
85101
1. To onboard and start collection, choose specific ones subscriptions from the detected list and consent for collection.

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-gcp.md

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -48,14 +48,18 @@ Choose from 3 options to manage GCP projects.
4848

4949
This option allows projects to be automatically detected and monitored without additional configuration. Steps to detect list of projects and onboard for collection:
5050

51-
- Grant Viewer and Security Reviewer role to service account created in previous step at organization, folder or project scope.
51+
Firstly, grant Viewer and Security Reviewer role to service account created in previous step at organization, folder or project scope.
52+
53+
Once done, the steps are listed in the screen to do this manually in the GPC console, or programatically with the gcloud CLI.
54+
55+
Once this has been configured, click next, then 'Verify Now & Save'.
5256

5357
Any current or future projects found get onboarded automatically.
5458

5559
To view status of onboarding after saving the configuration:
5660

57-
- Navigate to data collectors tab.
58-
- Click on the status of the data collector.
61+
- Navigate to data collectors tab
62+
- Click on the status of the data collector
5963
- View projects on the In Progress page
6064

6165
#### Option 2: Enter authorization systems
@@ -76,11 +80,13 @@ To view status of onboarding after saving the configuration:
7680

7781
This option detects all projects that are accessible by the Cloud Infrastructure Entitlement Management application.
7882

79-
- Grant Viewer and Security Reviewer role to service account created in previous step at organization, folder or project scope.
80-
- Click Verify and Save.
81-
- Navigate to newly create Data Collector row under GCP data collectors.
83+
- Firstly, grant Viewer and Security Reviewer role to service account created in previous step at organization, folder or project scope
84+
- Once done, the steps are listed in the screen to do this manually in the GPC console, or programatically with the gcloud CLI
85+
- Click Next
86+
- Click 'Verify Now & Save'
87+
- Navigate to newly create Data Collector row under GCP data collectors
8288
- Click on Status column when the row has “Pending” status
83-
- To onboard and start collection, choose specific ones from the detected list and consent for collection.
89+
- To onboard and start collection, choose specific ones from the detected list and consent for collection
8490

8591
### 3. Set up GCP member projects.
8692

articles/active-directory/cloud-infrastructure-entitlement-management/overview.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,9 @@ Organizations have to consider permissions management as a central piece of thei
3232

3333
Permissions Management allows customers to address three key use cases: *discover*, *remediate*, and *monitor*.
3434

35+
Permissions Management has been designed in such a way that we recommended your organization sequentially 'step-through' each of the below phases in order to gain insights into permissions across the organization. This is because you generally cannot action what is yet to be discovered, likewise you cannot continually evaluate what is yet to be remediated.
36+
37+
3538
### Discover
3639

3740
Customers can assess permission risks by evaluating the gap between permissions granted and permissions used.
@@ -61,7 +64,7 @@ Permissions Management deepens Zero Trust security strategies by augmenting the
6164
- Automate least privilege access: Use access analytics to ensure identities have the right permissions, at the right time.
6265
- Unify access policies across infrastructure as a service (IaaS) platforms: Implement consistent security policies across your cloud infrastructure.
6366

64-
67+
Once your organization has explored and implemented the discover, remediation and monitor phases, you have established one of the core pillars of a modern zero-trust security strategy.
6568

6669
## Next steps
6770

0 commit comments

Comments
 (0)