You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Prepare for an access review of users' access to an application
25
25
26
-
[Azure Active Directory (Azure AD) Identity Governance](identity-governance-overview.md) allows you to balance your organization's need for security and employee productivity with the right processes and visibility. It provides you with capabilities to ensure that the right people have the right access to the right resources.
26
+
[Microsoft Entra Identity Governance](identity-governance-overview.md) allows you to balance your organization's need for security and employee productivity with the right processes and visibility. It provides you with capabilities to ensure that the right people have the right access to the right resources.
27
27
28
-
Organizations with compliance requirements or risk management plans will have sensitive or business-critical applications. The application sensitivity may be based on its purpose or the data it contains, such as financial information or personal information of the organization's customers. For those applications, only a subset of all the users in the organization will typically be authorized to have access, and access should only be permitted based on documented business requirements. Azure AD can be integrated with many popular SaaS applications, on-premises applications, and applications that your organization has developed, using [standard protocol](../fundamentals/auth-sync-overview.md) and API interfaces. Through these interfaces, Azure AD can be the authoritative source to control who has access to those applications. As you integrate your applications with Azure AD, you can then use Azure AD access reviews to recertify the users who have access to those applications, and remove access of those users who no longer need access. You can also use other features, including terms of use, conditional access and entitlement management, for governing access to applications, as described in [how to govern access to applications in your environment](identity-governance-applications-prepare.md).
28
+
Organizations with compliance requirements or risk management plans will have sensitive or business-critical applications. The application sensitivity may be based on its purpose or the data it contains, such as financial information or personal information of the organization's customers. For those applications, only a subset of all the users in the organization will typically be authorized to have access, and access should only be permitted based on documented business requirements. Azure AD can be integrated with many popular SaaS applications, on-premises applications, and applications that your organization has developed, using [standard protocol](../fundamentals/auth-sync-overview.md) and API interfaces. Through these interfaces, Azure AD can be the authoritative source to control who has access to those applications. As you integrate your applications with Azure AD, you can then use Microsoft Entra access reviews to recertify the users who have access to those applications, and remove access of those users who no longer need access. You can also use other features, including terms of use, conditional access and entitlement management, for governing access to applications, as described in [how to govern access to applications in your environment](identity-governance-applications-prepare.md).
29
29
30
30
## Prerequisites for reviewing access
31
31
@@ -40,7 +40,7 @@ Also, while not required for reviewing access to an application, we recommend al
40
40
41
41
## Determine how the application is integrated with Azure AD
42
42
43
-
In order for Azure AD access reviews to be used for an application, then the application must first be integrated with Azure AD. An application being integrated with Azure AD means one of two requirements must be met:
43
+
In order for Microsoft Entra access reviews to be used for an application, then the application must first be integrated with Azure AD. An application being integrated with Azure AD means one of two requirements must be met:
44
44
45
45
* The application relies upon Azure AD for federated SSO, and Azure AD controls authentication token issuance. If Azure AD is the only identity provider for the application, then only users who are assigned to one of the application's roles in Azure AD are able to sign into the application. Those users that are denied by a review lose their application role assignment and can no longer get a new token to sign in to the application.
46
46
* The application relies upon user or group lists that are provided to the application by Azure AD. This fulfillment could be done through a provisioning protocol such as System for Cross-Domain Identity Management (SCIM) or by the application querying Azure AD via Microsoft Graph, or groups that are written to AD DS. Those users that are denied by a review lose their application role assignment or group membership, and when those changes are made available to the application, then the denied users will no longer have access.
Copy file name to clipboardExpand all lines: articles/active-directory/governance/access-reviews-downloadable-review-history.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Create and manage downloadable access review history report - Azure Active Directory
3
-
description: Using Azure Active Directory access reviews, you can download a review history for access reviews in your organization.
2
+
title: Create and manage downloadable access review history report
3
+
description: Using Microsoft Entra access reviews, you can download a review history for access reviews in your organization.
4
4
services: active-directory
5
5
documentationcenter: ''
6
6
author: amsliu
@@ -14,9 +14,9 @@ ms.date: 02/18/2022
14
14
ms.author: amsliu
15
15
---
16
16
17
-
# Create and manage downloadable access review history report in Azure AD access reviews
17
+
# Create and manage downloadable access review history report in Microsoft Entra access reviews
18
18
19
-
With Azure Active Directory (Azure AD) Access Reviews, you can create a downloadable review history to help your organization gain more insight. The report pulls the decisions that were taken by reviewers when a report is created. These reports can be constructed to include specific access reviews, for a specific time frame, and can be filtered to include different review types and review results.
19
+
With Microsoft Entra Access Reviews, you can create a downloadable review history to help your organization gain more insight. The report pulls the decisions that were taken by reviewers when a report is created. These reports can be constructed to include specific access reviews, for a specific time frame, and can be filtered to include different review types and review results.
Copy file name to clipboardExpand all lines: articles/active-directory/governance/access-reviews-overview.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: What are access reviews? - Azure Active Directory | Microsoft Docs
3
-
description: Using Azure Active Directory access reviews, you can control group membership and application access to meet governance, risk management, and compliance initiatives in your organization.
2
+
title: What are access reviews? - Microsoft Entra | Microsoft Docs
3
+
description: Using Microsoft Entra access reviews, you can control group membership and application access to meet governance, risk management, and compliance initiatives in your organization.
Azure Active Directory (Azure AD) access reviews enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignments. User's access can be reviewed on a regular basis to make sure only the right people have continued access.
23
+
Microsoft Entra access reviews enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignments. User's access can be reviewed on a regular basis to make sure only the right people have continued access.
24
24
25
25
Here's a video that provides a quick overview of access reviews:
26
26
@@ -38,7 +38,7 @@ Azure AD enables you to collaborate with users from inside your organization and
38
38
39
39
## When should you use access reviews?
40
40
41
-
-**Too many users in privileged roles:** It's a good idea to check how many users have administrative access, how many of them are Global Administrators, and if there are any invited guests or partners that have not been removed after being assigned to do an administrative task. You can recertify the role assignment users in [Azure AD roles](../privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) such as Global Administrators, or [Azure resources roles](../privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) such as User Access Administrator in the [Azure AD Privileged Identity Management (PIM)](../privileged-identity-management/pim-configure.md) experience.
41
+
-**Too many users in privileged roles:** It's a good idea to check how many users have administrative access, how many of them are Global Administrators, and if there are any invited guests or partners that have not been removed after being assigned to do an administrative task. You can recertify the role assignment users in [Azure AD roles](../privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) such as Global Administrators, or [Azure resources roles](../privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) such as User Access Administrator in the [Microsoft Entra Privileged Identity Management (PIM)](../privileged-identity-management/pim-configure.md) experience.
42
42
-**When automation is not possible:** You can create rules for dynamic membership on security groups or Microsoft 365 Groups, but what if the HR data is not in Azure AD or if users still need access after leaving the group to train their replacement? You can then create a review on that group to ensure those who still need access should have continued access.
43
43
-**When a group is used for a new purpose:** If you have a group that is going to be synced to Azure AD, or if you plan to enable the application Salesforce for everyone in the Sales team group, it would be useful to ask the group owner to review the group membership prior to the group being used in a different risk content.
44
44
-**Business critical data access:** for certain resources, such as [business critical applications](identity-governance-applications-prepare.md), it might be required as part of compliance processes to ask people to regularly reconfirm and give a justification on why they need continued access.
@@ -51,15 +51,15 @@ Azure AD enables you to collaborate with users from inside your organization and
51
51
52
52
## Where do you create reviews?
53
53
54
-
Depending on what you want to review, you will create your access review in Azure AD access reviews, Azure AD enterprise apps (in preview), Azure AD PIM, or Azure AD entitlement management.
54
+
Depending on what you want to review, you will create your access review in Microsoft Entra access reviews, Azure AD enterprise apps (in preview), Microsoft Entra PIM, or Microsoft Entra entitlement management.
55
55
56
56
| Access rights of users | Reviewers can be | Review created in | Reviewer experience |
57
57
| --- | --- | --- | --- |
58
-
| Security group members</br>Office group members | Specified reviewers</br>Group owners</br>Self-review |Azure AD access reviews</br>Azure AD groups | Access panel |
59
-
| Assigned to a connected app | Specified reviewers</br>Self-review |Azure AD access reviews</br>Azure AD enterprise apps (in preview) | Access panel |
60
-
| Azure AD role | Specified reviewers</br>Self-review |[Azure AD PIM](../privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json)| Azure portal |
61
-
| Azure resource role | Specified reviewers</br>Self-review |[Azure AD PIM](../privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json)| Azure portal |
| Security group members</br>Office group members | Specified reviewers</br>Group owners</br>Self-review |Microsoft Entra access reviews</br>Azure AD groups | Access panel |
59
+
| Assigned to a connected app | Specified reviewers</br>Self-review |Microsoft Entra access reviews</br>Azure AD enterprise apps (in preview) | Access panel |
60
+
| Azure AD role | Specified reviewers</br>Self-review |[Microsoft Entra PIM](../privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json)| Azure portal |
Copy file name to clipboardExpand all lines: articles/active-directory/governance/complete-access-review.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Complete an access review of groups & applications - Azure AD
3
-
description: Learn how to complete an access review of group members or application access in Azure Active Directory access reviews.
2
+
title: Complete an access review of groups & applications
3
+
description: Learn how to complete an access review of group members or application access in Microsoft Entra access reviews.
4
4
services: active-directory
5
5
documentationcenter: ''
6
6
author: amsliu
@@ -17,7 +17,7 @@ ms.reviewer: mwahl
17
17
ms.collection: M365-identity-device-management
18
18
---
19
19
20
-
# Complete an access review of groups and applications in Azure AD access reviews
20
+
# Complete an access review of groups and applications in Microsoft Entra access reviews
21
21
22
22
As an administrator, you [create an access review of groups or applications](create-access-review.md) and reviewers [perform the access review](perform-access-review.md). This article describes how to see the results of the access review and apply them.
Copy file name to clipboardExpand all lines: articles/active-directory/governance/conditional-access-exclusion.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Manage users excluded from Conditional Access policies
3
-
description: Learn how to use Azure Active Directory (Azure AD) access reviews to manage users that have been excluded from Conditional Access policies
3
+
description: Learn how to use Microsoft Entra access reviews to manage users that have been excluded from Conditional Access policies
4
4
services: active-directory
5
5
documentationcenter: ''
6
6
author: amsliu
@@ -17,7 +17,7 @@ ms.reviewer: mwahl
17
17
ms.collection: M365-identity-device-management
18
18
---
19
19
20
-
# Use Azure AD access reviews to manage users excluded from Conditional Access policies
20
+
# Use Microsoft Entra access reviews to manage users excluded from Conditional Access policies
21
21
22
22
In an ideal world, all users follow the access policies to secure access to your organization's resources. However, sometimes there are business cases that require you to make exceptions. This article goes over some examples of situations where exclusions may be necessary. You, as the IT administrator, can manage this task, avoid oversight of policy exceptions, and provide auditors with proof that these exceptions are reviewed regularly using Azure Active Directory (Azure AD) access reviews.
23
23
@@ -142,7 +142,7 @@ that is excluded from the policy. Here is a recommended access review where memb
142
142

143
143
144
144
>[!IMPORTANT]
145
-
>If you have many exclusion groups and therefore need to create multiple access reviews, we now have an API in the Microsoft Graph beta endpoint that allows you to create and manage them programmatically. To get started, see the [Azure AD access reviews API reference](/graph/api/resources/accessreviewsv2-overview) and [Example of retrieving Azure AD access reviews via Microsoft Graph](https://techcommunity.microsoft.com/t5/Azure-Active-Directory/Example-of-retrieving-Azure-AD-access-reviews-via-Microsoft/td-p/236096).
145
+
>If you have many exclusion groups and therefore need to create multiple access reviews, we now have an API in the Microsoft Graph beta endpoint that allows you to create and manage them programmatically. To get started, see the [Microsoft Entra access reviews API reference](/graph/api/resources/accessreviewsv2-overview) and [Example of retrieving Microsoft Entra access reviews via Microsoft Graph](https://techcommunity.microsoft.com/t5/Azure-Active-Directory/Example-of-retrieving-Azure-AD-access-reviews-via-Microsoft/td-p/236096).
146
146
147
147
## Access review results and audit logs
148
148
@@ -160,7 +160,7 @@ Now that you have everything in place, group, Conditional Access policy, and acc
As an IT administrator, you know that managing exclusion groups to your policies is sometimes inevitable. However, maintaining these groups, reviewing them on a regular basis by the business owner or the users themselves, and auditing these changes can be made easier with Azure AD access reviews.
163
+
As an IT administrator, you know that managing exclusion groups to your policies is sometimes inevitable. However, maintaining these groups, reviewing them on a regular basis by the business owner or the users themselves, and auditing these changes can be made easier with Microsoft Entra access reviews.
0 commit comments