You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md
+30-14Lines changed: 30 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.author: kenwith
13
13
14
14
# Onboard a Microsoft Azure subscription
15
15
16
-
This article describes how to onboard a Microsoft Azure subscription or subscriptions on Permissions Management (Permissions Management). Onboarding a subscription creates a new authorization system to represent the Azure subscription in Permissions Management.
16
+
This article describes how to onboard a Microsoft Azure subscription or subscriptions on Permissions Management. Onboarding a subscription creates a new authorization system to represent the Azure subscription in Permissions Management.
17
17
18
18
> [!NOTE]
19
19
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
@@ -28,7 +28,7 @@ To add Permissions Management to your Azure AD tenant:
28
28
29
29
1. If the **Data Collectors** dashboard isn't displayed when Permissions Management launches:
30
30
31
-
- In the Permissions Management home page, select **Settings** (the gear icon), and then select the **Data Collectors** subtab.
31
+
- In the Permissions Management home page, select **Settings** (the gear icon, top right), and then select the **Data Collectors** subtab.
32
32
33
33
1. On the **Data Collectors** dashboard, select **Azure**, and then select **Create Configuration**.
34
34
@@ -38,19 +38,22 @@ Choose from 3 options to manage Azure subscriptions.
38
38
39
39
#### Option 1: Automatically manage
40
40
41
-
This option allows subscriptions to be automatically detected and monitored without additional configuration. Steps to detect list of subscriptions and onboard for collection:
41
+
This option allows subscriptions to be automatically detected and monitored without extra configuration.A key benefit of automatic management is that any current or future subscriptions found get onboarded automatically. Steps to detect list of subscriptions and onboard for collection:
42
42
43
-
-Grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope.
43
+
-Firstly, grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope.
44
44
45
-
Any current or future subscriptions found get onboarded automatically.
46
-
47
-
To view status of onboarding after saving the configuration:
48
-
49
-
1. In the MEPM portal, click the cog on the top right-hand side.
50
-
1. Navigate to data collectors tab.
45
+
1. In the EPM portal, left-click the cog on the top right-hand side.
46
+
1. Navigate to data collectors tab
47
+
1. Ensure 'Azure' is selected
51
48
1. Click ‘Create Configuration’
52
49
1. For onboarding mode, select ‘Automatically Manage’
53
-
1. Click ‘Verify Now & Save’
50
+
51
+
The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. This can be performed manually in the Entra console, or programatically with PowerShell or the Azure CLI.
52
+
53
+
Lastly, Click ‘Verify Now & Save’
54
+
55
+
To view status of onboarding after saving the configuration:
56
+
54
57
1. Collectors will now be listed and change through status types. For each collector listed with a status of “Collected Inventory”, click on that status to view further information.
55
58
1. You can then view subscriptions on the In Progress page
56
59
@@ -59,8 +62,9 @@ Any current or future subscriptions found get onboarded automatically.
59
62
You have the ability to specify only certain subscriptions to manage and monitor with MEPM (up to 10 per collector). Follow the steps below to configure these subscriptions to be monitored:
60
63
61
64
1. For each subscription you wish to manage, ensure that the ‘Reader’ role has been granted to Cloud Infrastructure Entitlement Management application for this subscription.
62
-
1. In the MEPM portal, click the cog on the top right-hand side.
65
+
1. In the EPM portal, click the cog on the top right-hand side.
63
66
1. Navigate to data collectors tab
67
+
1. Ensure 'Azure' is selected
64
68
1. Click ‘Create Configuration’
65
69
1. Select ‘Enter Authorization Systems’
66
70
1. Under the Subscription IDs section, enter a desired subscription ID into the input box. Click the “+” up to 9 additional times, putting a single subscription ID into each respective input box.
@@ -78,8 +82,20 @@ To view status of onboarding after saving the configuration:
78
82
79
83
This option detects all subscriptions that are accessible by the Cloud Infrastructure Entitlement Management application.
80
84
81
-
1. Grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription(s) scope.
82
-
1. Click Verify and Save.
85
+
- Firstly, grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope.
86
+
87
+
1. In the EPM portal, click the cog on the top right-hand side.
88
+
1. Navigate to data collectors tab
89
+
1. Ensure 'Azure' is selected
90
+
1. Click ‘Create Configuration’
91
+
1. For onboarding mode, select ‘Automatically Manage’
92
+
93
+
The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. You can do this manually in the Entra console, or programatically with PowerShell or the Azure CLI.
94
+
95
+
Lastly, Click ‘Verify Now & Save’
96
+
97
+
To view status of onboarding after saving the configuration:
98
+
83
99
1. Navigate to newly create Data Collector row under Azure data collectors.
84
100
1. Click on Status column when the row has “Pending” status
85
101
1. To onboard and start collection, choose specific ones subscriptions from the detected list and consent for collection.
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-gcp.md
+13-7Lines changed: 13 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,14 +48,18 @@ Choose from 3 options to manage GCP projects.
48
48
49
49
This option allows projects to be automatically detected and monitored without additional configuration. Steps to detect list of projects and onboard for collection:
50
50
51
-
- Grant Viewer and Security Reviewer role to service account created in previous step at organization, folder or project scope.
51
+
Firstly, grant Viewer and Security Reviewer role to service account created in previous step at organization, folder or project scope.
52
+
53
+
Once done, the steps are listed in the screen to do this manually in the GPC console, or programatically with the gcloud CLI.
54
+
55
+
Once this has been configured, click next, then 'Verify Now & Save'.
52
56
53
57
Any current or future projects found get onboarded automatically.
54
58
55
59
To view status of onboarding after saving the configuration:
56
60
57
-
- Navigate to data collectors tab.
58
-
- Click on the status of the data collector.
61
+
- Navigate to data collectors tab
62
+
- Click on the status of the data collector
59
63
- View projects on the In Progress page
60
64
61
65
#### Option 2: Enter authorization systems
@@ -76,11 +80,13 @@ To view status of onboarding after saving the configuration:
76
80
77
81
This option detects all projects that are accessible by the Cloud Infrastructure Entitlement Management application.
78
82
79
-
- Grant Viewer and Security Reviewer role to service account created in previous step at organization, folder or project scope.
80
-
- Click Verify and Save.
81
-
- Navigate to newly create Data Collector row under GCP data collectors.
83
+
- Firstly, grant Viewer and Security Reviewer role to service account created in previous step at organization, folder or project scope
84
+
- Once done, the steps are listed in the screen to do this manually in the GPC console, or programatically with the gcloud CLI
85
+
- Click Next
86
+
- Click 'Verify Now & Save'
87
+
- Navigate to newly create Data Collector row under GCP data collectors
82
88
- Click on Status column when the row has “Pending” status
83
-
- To onboard and start collection, choose specific ones from the detected list and consent for collection.
89
+
- To onboard and start collection, choose specific ones from the detected list and consent for collection
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/overview.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,6 +32,9 @@ Organizations have to consider permissions management as a central piece of thei
32
32
33
33
Permissions Management allows customers to address three key use cases: *discover*, *remediate*, and *monitor*.
34
34
35
+
Permissions Management has been designed in such a way that we recommended your organization sequentially 'step-through' each of the below phases in order to gain insights into permissions across the organization. This is because you generally cannot action what is yet to be discovered, likewise you cannot continually evaluate what is yet to be remediated.
36
+
37
+
35
38
### Discover
36
39
37
40
Customers can assess permission risks by evaluating the gap between permissions granted and permissions used.
@@ -61,7 +64,7 @@ Permissions Management deepens Zero Trust security strategies by augmenting the
61
64
- Automate least privilege access: Use access analytics to ensure identities have the right permissions, at the right time.
62
65
- Unify access policies across infrastructure as a service (IaaS) platforms: Implement consistent security policies across your cloud infrastructure.
63
66
64
-
67
+
Once your organization has explored and implemented the discover, remediation and monitor phases, you have established one of the core pillars of a modern zero-trust security strategy.
0 commit comments