You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,17 +48,18 @@ Choose from 3 options to manage Azure subscriptions.
48
48
49
49
This option allows subscriptions to be automatically detected and monitored without extra configuration.A key benefit of automatic management is that any current or future subscriptions found get onboarded automatically. Steps to detect list of subscriptions and onboard for collection:
50
50
51
-
- Firstly, grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope.
51
+
- Firstly, grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope. To do this:
52
52
53
53
1. In the EPM portal, left-click the cog on the top right-hand side.
54
54
1. Navigate to data collectors tab
55
55
1. Ensure 'Azure' is selected
56
56
1. Click ‘Create Configuration’
57
57
1. For onboarding mode, select ‘Automatically Manage’
58
58
59
-
The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. This can be performed manually in the Entra console, or programatically with PowerShell or the Azure CLI.
59
+
> [!NOTE]
60
+
> The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. This can be performed manually in the Entra console, or programatically with PowerShell or the Azure CLI.
60
61
61
-
Lastly, Click ‘Verify Now & Save’
62
+
- Once complete, Click ‘Verify Now & Save’
62
63
63
64
To view status of onboarding after saving the configuration:
64
65
@@ -98,9 +99,10 @@ This option detects all subscriptions that are accessible by the Cloud Infrastru
98
99
1. Click ‘Create Configuration’
99
100
1. For onboarding mode, select ‘Automatically Manage’
100
101
101
-
The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. You can do this manually in the Entra console, or programatically with PowerShell or the Azure CLI.
102
+
> [!NOTE]
103
+
> The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. You can do this manually in the Entra console, or programatically with PowerShell or the Azure CLI.
102
104
103
-
Lastly, Click ‘Verify Now & Save’
105
+
- Once complete, Click ‘Verify Now & Save’
104
106
105
107
To view status of onboarding after saving the configuration:
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-gcp.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,8 +51,7 @@ There are several moving parts across GCP and Azure, which are required to be co
51
51
> [!NOTE]
52
52
> 1. To confirm that the app was created, open **App registrations** in Azure and, on the **All applications** tab, locate your app.
53
53
> 1. Select the app name to open the **Expose an API** page. The **Application ID URI** displayed in the **Overview** page is the *audience value* used while making an OIDC connection with your GCP account.
54
-
55
-
1. Return to Permissions Management, and in the **Permissions Management Onboarding - Azure AD OIDC App Creation**, select **Next**.
54
+
> 1. Return to the Permissions Management window, and in the **Permissions Management Onboarding - Azure AD OIDC App Creation**, select **Next**.
0 commit comments