Skip to content

Commit 6d63b28

Browse files
authored
Merge pull request #220313 from MicrosoftDocs/main
Publish to live, Sunday 4 AM PST, 12/4
2 parents ac63766 + 2d45266 commit 6d63b28

File tree

167 files changed

+990
-883
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

167 files changed

+990
-883
lines changed

articles/active-directory/governance/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
- name: Azure AD Identity Governance documentation
1+
- name: Microsoft Entra Identity Governance documentation
22
href: index.yml
33
- name: Overview
44
expanded: true

articles/active-directory/governance/access-reviews-application-preparation.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,9 +23,9 @@ ms.collection: M365-identity-device-management
2323

2424
# Prepare for an access review of users' access to an application
2525

26-
[Azure Active Directory (Azure AD) Identity Governance](identity-governance-overview.md) allows you to balance your organization's need for security and employee productivity with the right processes and visibility. It provides you with capabilities to ensure that the right people have the right access to the right resources.
26+
[Microsoft Entra Identity Governance](identity-governance-overview.md) allows you to balance your organization's need for security and employee productivity with the right processes and visibility. It provides you with capabilities to ensure that the right people have the right access to the right resources.
2727

28-
Organizations with compliance requirements or risk management plans will have sensitive or business-critical applications. The application sensitivity may be based on its purpose or the data it contains, such as financial information or personal information of the organization's customers. For those applications, only a subset of all the users in the organization will typically be authorized to have access, and access should only be permitted based on documented business requirements. Azure AD can be integrated with many popular SaaS applications, on-premises applications, and applications that your organization has developed, using [standard protocol](../fundamentals/auth-sync-overview.md) and API interfaces. Through these interfaces, Azure AD can be the authoritative source to control who has access to those applications. As you integrate your applications with Azure AD, you can then use Azure AD access reviews to recertify the users who have access to those applications, and remove access of those users who no longer need access. You can also use other features, including terms of use, conditional access and entitlement management, for governing access to applications, as described in [how to govern access to applications in your environment](identity-governance-applications-prepare.md).
28+
Organizations with compliance requirements or risk management plans will have sensitive or business-critical applications. The application sensitivity may be based on its purpose or the data it contains, such as financial information or personal information of the organization's customers. For those applications, only a subset of all the users in the organization will typically be authorized to have access, and access should only be permitted based on documented business requirements. Azure AD can be integrated with many popular SaaS applications, on-premises applications, and applications that your organization has developed, using [standard protocol](../fundamentals/auth-sync-overview.md) and API interfaces. Through these interfaces, Azure AD can be the authoritative source to control who has access to those applications. As you integrate your applications with Azure AD, you can then use Microsoft Entra access reviews to recertify the users who have access to those applications, and remove access of those users who no longer need access. You can also use other features, including terms of use, conditional access and entitlement management, for governing access to applications, as described in [how to govern access to applications in your environment](identity-governance-applications-prepare.md).
2929

3030
## Prerequisites for reviewing access
3131

@@ -40,7 +40,7 @@ Also, while not required for reviewing access to an application, we recommend al
4040

4141
## Determine how the application is integrated with Azure AD
4242

43-
In order for Azure AD access reviews to be used for an application, then the application must first be integrated with Azure AD. An application being integrated with Azure AD means one of two requirements must be met:
43+
In order for Microsoft Entra access reviews to be used for an application, then the application must first be integrated with Azure AD. An application being integrated with Azure AD means one of two requirements must be met:
4444

4545
* The application relies upon Azure AD for federated SSO, and Azure AD controls authentication token issuance. If Azure AD is the only identity provider for the application, then only users who are assigned to one of the application's roles in Azure AD are able to sign into the application. Those users that are denied by a review lose their application role assignment and can no longer get a new token to sign in to the application.
4646
* The application relies upon user or group lists that are provided to the application by Azure AD. This fulfillment could be done through a provisioning protocol such as System for Cross-Domain Identity Management (SCIM) or by the application querying Azure AD via Microsoft Graph, or groups that are written to AD DS. Those users that are denied by a review lose their application role assignment or group membership, and when those changes are made available to the application, then the denied users will no longer have access.

articles/active-directory/governance/access-reviews-downloadable-review-history.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Create and manage downloadable access review history report - Azure Active Directory
3-
description: Using Azure Active Directory access reviews, you can download a review history for access reviews in your organization.
2+
title: Create and manage downloadable access review history report
3+
description: Using Microsoft Entra access reviews, you can download a review history for access reviews in your organization.
44
services: active-directory
55
documentationcenter: ''
66
author: amsliu
@@ -14,9 +14,9 @@ ms.date: 02/18/2022
1414
ms.author: amsliu
1515
---
1616

17-
# Create and manage downloadable access review history report in Azure AD access reviews
17+
# Create and manage downloadable access review history report in Microsoft Entra access reviews
1818

19-
With Azure Active Directory (Azure AD) Access Reviews, you can create a downloadable review history to help your organization gain more insight. The report pulls the decisions that were taken by reviewers when a report is created. These reports can be constructed to include specific access reviews, for a specific time frame, and can be filtered to include different review types and review results.
19+
With Microsoft Entra Access Reviews, you can create a downloadable review history to help your organization gain more insight. The report pulls the decisions that were taken by reviewers when a report is created. These reports can be constructed to include specific access reviews, for a specific time frame, and can be filtered to include different review types and review results.
2020

2121
## Who can access and request review history
2222

articles/active-directory/governance/access-reviews-overview.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: What are access reviews? - Azure Active Directory | Microsoft Docs
3-
description: Using Azure Active Directory access reviews, you can control group membership and application access to meet governance, risk management, and compliance initiatives in your organization.
2+
title: What are access reviews? - Microsoft Entra | Microsoft Docs
3+
description: Using Microsoft Entra access reviews, you can control group membership and application access to meet governance, risk management, and compliance initiatives in your organization.
44
services: active-directory
55
documentationcenter: ''
66
author: amsliu
@@ -18,9 +18,9 @@ ms.collection: M365-identity-device-management
1818
ms.custom: contperf-fy21q1
1919
---
2020

21-
# What are Azure AD access reviews?
21+
# What are Microsoft Entra access reviews?
2222

23-
Azure Active Directory (Azure AD) access reviews enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignments. User's access can be reviewed on a regular basis to make sure only the right people have continued access.
23+
Microsoft Entra access reviews enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignments. User's access can be reviewed on a regular basis to make sure only the right people have continued access.
2424

2525
Here's a video that provides a quick overview of access reviews:
2626

@@ -38,7 +38,7 @@ Azure AD enables you to collaborate with users from inside your organization and
3838

3939
## When should you use access reviews?
4040

41-
- **Too many users in privileged roles:** It's a good idea to check how many users have administrative access, how many of them are Global Administrators, and if there are any invited guests or partners that have not been removed after being assigned to do an administrative task. You can recertify the role assignment users in [Azure AD roles](../privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) such as Global Administrators, or [Azure resources roles](../privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) such as User Access Administrator in the [Azure AD Privileged Identity Management (PIM)](../privileged-identity-management/pim-configure.md) experience.
41+
- **Too many users in privileged roles:** It's a good idea to check how many users have administrative access, how many of them are Global Administrators, and if there are any invited guests or partners that have not been removed after being assigned to do an administrative task. You can recertify the role assignment users in [Azure AD roles](../privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) such as Global Administrators, or [Azure resources roles](../privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) such as User Access Administrator in the [Microsoft Entra Privileged Identity Management (PIM)](../privileged-identity-management/pim-configure.md) experience.
4242
- **When automation is not possible:** You can create rules for dynamic membership on security groups or Microsoft 365 Groups, but what if the HR data is not in Azure AD or if users still need access after leaving the group to train their replacement? You can then create a review on that group to ensure those who still need access should have continued access.
4343
- **When a group is used for a new purpose:** If you have a group that is going to be synced to Azure AD, or if you plan to enable the application Salesforce for everyone in the Sales team group, it would be useful to ask the group owner to review the group membership prior to the group being used in a different risk content.
4444
- **Business critical data access:** for certain resources, such as [business critical applications](identity-governance-applications-prepare.md), it might be required as part of compliance processes to ask people to regularly reconfirm and give a justification on why they need continued access.
@@ -51,15 +51,15 @@ Azure AD enables you to collaborate with users from inside your organization and
5151
5252
## Where do you create reviews?
5353

54-
Depending on what you want to review, you will create your access review in Azure AD access reviews, Azure AD enterprise apps (in preview), Azure AD PIM, or Azure AD entitlement management.
54+
Depending on what you want to review, you will create your access review in Microsoft Entra access reviews, Azure AD enterprise apps (in preview), Microsoft Entra PIM, or Microsoft Entra entitlement management.
5555

5656
| Access rights of users | Reviewers can be | Review created in | Reviewer experience |
5757
| --- | --- | --- | --- |
58-
| Security group members</br>Office group members | Specified reviewers</br>Group owners</br>Self-review | Azure AD access reviews</br>Azure AD groups | Access panel |
59-
| Assigned to a connected app | Specified reviewers</br>Self-review | Azure AD access reviews</br>Azure AD enterprise apps (in preview) | Access panel |
60-
| Azure AD role | Specified reviewers</br>Self-review | [Azure AD PIM](../privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) | Azure portal |
61-
| Azure resource role | Specified reviewers</br>Self-review | [Azure AD PIM](../privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) | Azure portal |
62-
| Access package assignments | Specified reviewers</br>Group members</br>Self-review | Azure AD entitlement management | Access panel |
58+
| Security group members</br>Office group members | Specified reviewers</br>Group owners</br>Self-review | Microsoft Entra access reviews</br>Azure AD groups | Access panel |
59+
| Assigned to a connected app | Specified reviewers</br>Self-review | Microsoft Entra access reviews</br>Azure AD enterprise apps (in preview) | Access panel |
60+
| Azure AD role | Specified reviewers</br>Self-review | [Microsoft Entra PIM](../privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) | Azure portal |
61+
| Azure resource role | Specified reviewers</br>Self-review | [Microsoft Entra PIM](../privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) | Azure portal |
62+
| Access package assignments | Specified reviewers</br>Group members</br>Self-review | Microsoft Entra entitlement management | Access panel |
6363

6464
## License requirements
6565

articles/active-directory/governance/check-status-workflow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Check status of a Lifecycle workflow - Azure Active Directory
2+
title: Check status of a Lifecycle workflow
33
description: This article guides a user on checking the status of a Lifecycle workflow
44
author: OWinfreyATL
55
ms.author: owinfrey

articles/active-directory/governance/complete-access-review.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Complete an access review of groups & applications - Azure AD
3-
description: Learn how to complete an access review of group members or application access in Azure Active Directory access reviews.
2+
title: Complete an access review of groups & applications
3+
description: Learn how to complete an access review of group members or application access in Microsoft Entra access reviews.
44
services: active-directory
55
documentationcenter: ''
66
author: amsliu
@@ -17,7 +17,7 @@ ms.reviewer: mwahl
1717
ms.collection: M365-identity-device-management
1818
---
1919

20-
# Complete an access review of groups and applications in Azure AD access reviews
20+
# Complete an access review of groups and applications in Microsoft Entra access reviews
2121

2222
As an administrator, you [create an access review of groups or applications](create-access-review.md) and reviewers [perform the access review](perform-access-review.md). This article describes how to see the results of the access review and apply them.
2323

articles/active-directory/governance/conditional-access-exclusion.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Manage users excluded from Conditional Access policies
3-
description: Learn how to use Azure Active Directory (Azure AD) access reviews to manage users that have been excluded from Conditional Access policies
3+
description: Learn how to use Microsoft Entra access reviews to manage users that have been excluded from Conditional Access policies
44
services: active-directory
55
documentationcenter: ''
66
author: amsliu
@@ -17,7 +17,7 @@ ms.reviewer: mwahl
1717
ms.collection: M365-identity-device-management
1818
---
1919

20-
# Use Azure AD access reviews to manage users excluded from Conditional Access policies
20+
# Use Microsoft Entra access reviews to manage users excluded from Conditional Access policies
2121

2222
In an ideal world, all users follow the access policies to secure access to your organization's resources. However, sometimes there are business cases that require you to make exceptions. This article goes over some examples of situations where exclusions may be necessary. You, as the IT administrator, can manage this task, avoid oversight of policy exceptions, and provide auditors with proof that these exceptions are reviewed regularly using Azure Active Directory (Azure AD) access reviews.
2323

@@ -142,7 +142,7 @@ that is excluded from the policy. Here is a recommended access review where memb
142142
![Create an access review pane for example 2](./media/conditional-access-exclusion/create-access-review-2.png)
143143

144144
>[!IMPORTANT]
145-
>If you have many exclusion groups and therefore need to create multiple access reviews, we now have an API in the Microsoft Graph beta endpoint that allows you to create and manage them programmatically. To get started, see the [Azure AD access reviews API reference](/graph/api/resources/accessreviewsv2-overview) and [Example of retrieving Azure AD access reviews via Microsoft Graph](https://techcommunity.microsoft.com/t5/Azure-Active-Directory/Example-of-retrieving-Azure-AD-access-reviews-via-Microsoft/td-p/236096).
145+
>If you have many exclusion groups and therefore need to create multiple access reviews, we now have an API in the Microsoft Graph beta endpoint that allows you to create and manage them programmatically. To get started, see the [Microsoft Entra access reviews API reference](/graph/api/resources/accessreviewsv2-overview) and [Example of retrieving Microsoft Entra access reviews via Microsoft Graph](https://techcommunity.microsoft.com/t5/Azure-Active-Directory/Example-of-retrieving-Azure-AD-access-reviews-via-Microsoft/td-p/236096).
146146
147147
## Access review results and audit logs
148148

@@ -160,7 +160,7 @@ Now that you have everything in place, group, Conditional Access policy, and acc
160160

161161
![Access reviews audit logs listing actions](./media/conditional-access-exclusion/access-reviews-audit-logs.png)
162162

163-
As an IT administrator, you know that managing exclusion groups to your policies is sometimes inevitable. However, maintaining these groups, reviewing them on a regular basis by the business owner or the users themselves, and auditing these changes can be made easier with Azure AD access reviews.
163+
As an IT administrator, you know that managing exclusion groups to your policies is sometimes inevitable. However, maintaining these groups, reviewing them on a regular basis by the business owner or the users themselves, and auditing these changes can be made easier with Microsoft Entra access reviews.
164164

165165
## Next steps
166166

0 commit comments

Comments
 (0)