Skip to content

Commit 5aac8e4

Browse files
author
Tristan Desktop
committed
Tweaks added
1 parent 3575dcd commit 5aac8e4

File tree

2 files changed

+8
-7
lines changed

2 files changed

+8
-7
lines changed

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -48,17 +48,18 @@ Choose from 3 options to manage Azure subscriptions.
4848

4949
This option allows subscriptions to be automatically detected and monitored without extra configuration.A key benefit of automatic management is that any current or future subscriptions found get onboarded automatically. Steps to detect list of subscriptions and onboard for collection:
5050

51-
- Firstly, grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope.
51+
- Firstly, grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope. To do this:
5252

5353
1. In the EPM portal, left-click the cog on the top right-hand side.
5454
1. Navigate to data collectors tab
5555
1. Ensure 'Azure' is selected
5656
1. Click ‘Create Configuration’
5757
1. For onboarding mode, select ‘Automatically Manage’
5858

59-
The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. This can be performed manually in the Entra console, or programatically with PowerShell or the Azure CLI.
59+
> [!NOTE]
60+
> The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. This can be performed manually in the Entra console, or programatically with PowerShell or the Azure CLI.
6061
61-
Lastly, Click ‘Verify Now & Save’
62+
- Once complete, Click ‘Verify Now & Save’
6263

6364
To view status of onboarding after saving the configuration:
6465

@@ -98,9 +99,10 @@ This option detects all subscriptions that are accessible by the Cloud Infrastru
9899
1. Click ‘Create Configuration’
99100
1. For onboarding mode, select ‘Automatically Manage’
100101

101-
The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. You can do this manually in the Entra console, or programatically with PowerShell or the Azure CLI.
102+
> [!NOTE]
103+
> The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. You can do this manually in the Entra console, or programatically with PowerShell or the Azure CLI.
102104
103-
Lastly, Click ‘Verify Now & Save’
105+
- Once complete, Click ‘Verify Now & Save’
104106

105107
To view status of onboarding after saving the configuration:
106108

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-gcp.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,8 +51,7 @@ There are several moving parts across GCP and Azure, which are required to be co
5151
> [!NOTE]
5252
> 1. To confirm that the app was created, open **App registrations** in Azure and, on the **All applications** tab, locate your app.
5353
> 1. Select the app name to open the **Expose an API** page. The **Application ID URI** displayed in the **Overview** page is the *audience value* used while making an OIDC connection with your GCP account.
54-
55-
1. Return to Permissions Management, and in the **Permissions Management Onboarding - Azure AD OIDC App Creation**, select **Next**.
54+
> 1. Return to the Permissions Management window, and in the **Permissions Management Onboarding - Azure AD OIDC App Creation**, select **Next**.
5655
5756
### 2. Set up a GCP OIDC project.
5857

0 commit comments

Comments
 (0)