Skip to content

Commit 71aa3e3

Browse files
authored
Merge pull request #188785 from omondiatieno/app-management-tutorials
app management tutorials
2 parents d42b657 + 9cade66 commit 71aa3e3

File tree

3 files changed

+272
-2
lines changed

3 files changed

+272
-2
lines changed

articles/active-directory/manage-apps/toc.yml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,10 @@
2424
href: delete-application-portal.md
2525
- name: Tutorials
2626
items:
27-
- name: List of app integration tutorials
28-
href: ../saas-apps/tutorial-list.md
27+
- name: Manage access and security
28+
href: tutorial-manage-access-security.md
29+
- name: Govern and monitor
30+
href: tutorial-govern-monitor.md
2931
- name: Samples
3032
items:
3133
- name: Overview of App Management samples
@@ -86,6 +88,8 @@
8688
- name: How-to guides
8789
expanded: false
8890
items:
91+
- name: List of app integration tutorials
92+
href: ../saas-apps/tutorial-list.md
8993
- name: Assign owners
9094
href: assign-app-owners.md
9195
- name: Manage access
Lines changed: 111 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,111 @@
1+
---
2+
title: "Tutorial: Govern and monitor applications"
3+
titleSuffix: Azure AD
4+
description: In this tutorial, you learn how to govern and monitor an application in Azure Active Directory.
5+
author: omondiatieno
6+
manager: CelesteDG
7+
ms.author: jomondi
8+
ms.service: active-directory
9+
ms.subservice: app-mgmt
10+
ms.topic: tutorial
11+
ms.date: 02/24/2022
12+
# Customer intent: As an administrator of an Azure AD tenant, I want to govern and monitor my applications.
13+
---
14+
15+
# Tutorial: Govern and monitor applications
16+
17+
The IT administrator at Fabrikam has added and configured an application from the [Azure Active Directory (Azure AD) application gallery](overview-application-gallery.md). They also made sure that access can be managed and that the application is secure by using the information in [Tutorial: Manage application access and security](tutorial-manage-access-security.md). They now need to understand the resources that are available to govern and monitor the application.
18+
19+
Using the information in this tutorial, an administrator of the application learns how to:
20+
21+
> [!div class="checklist"]
22+
> * Create an access review
23+
> * Access the audit logs report
24+
> * Access the sign-ins report
25+
> * Send logs to Azure Monitor
26+
27+
## Prerequisites
28+
29+
- An Azure account with an active subscription. If you don't already have one, [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30+
- One of the following roles: Global Administrator, Privileged Role Administrator, Cloud Application Administrator, or Application Administrator.
31+
- An enterprise application that has been configured in your Azure AD tenant.
32+
33+
## Create an access review
34+
35+
The administrator wants to make sure that users or guests have appropriate access. They decide to ask users of the application to participate in an access review and recertify or attest to their need for access. When the access review is finished, they can then make changes and remove access from users who no longer need it. For more information, see
36+
[Manage user and guest user access with access reviews](../governance/manage-access-review.md).
37+
38+
To create an access review:
39+
40+
1. Sign in to the [Azure portal](https://portal.azure.com/) with one of the roles listed in the prerequisites.
41+
1. Go to **Azure Active Directory**, and then select **Identity Governance**.
42+
1. On the left menu, select **Access reviews**.
43+
1. Select **New access review** to create a new access review.
44+
1. In **Select what to review**, select **Applications**.
45+
1. Select **+ Select application(s)**, select the application, and then choose **Select**.
46+
1. Now you can select a scope for the review. Your options are:
47+
- **Guest users only** - This option limits the access review to only the Azure AD B2B guest users in your directory.
48+
- **All users** - This option scopes the access review to all user objects associated with the resource.
49+
Select **All users**.
50+
1. Select **Next: Reviews**.
51+
1. In the **Specify reviewers** section, in the Select reviewers box, select **Selected user(s) or group(s)**, select **+ Select reviewers**, and then select the user account that is assigned to the application.
52+
1. In the **Specify recurrence of review** section, specify the following selections:
53+
- **Duration (in days)** - Accept the default value of **3**.
54+
- **Review recurrence** - select **One time**.
55+
- **Start date** - Accept today's date as the start date.
56+
1. Select **Next: Settings**.
57+
1. In the **Upon completion settings** section, you can specify what happens after the review finishes. Select **Auto apply results to resource**.
58+
1. Select **Next: Review + Create**.
59+
1. Name the access review. Optionally, give the review a description. The name and description are shown to the reviewers.
60+
1. Review the information and select **Create**.
61+
62+
### Start the access review
63+
64+
After you've specified the settings for an access review, select **Start**. The access review appears in your list with an indicator of its status.
65+
66+
By default, Azure AD sends an email to reviewers shortly after the review starts. If you choose not to have Azure AD send the email, be sure to inform the reviewers that an access review is waiting for them to complete. You can show them the instructions for how to review access to groups or applications. If your review is for guests to review their own access, show them the instructions for how to review access for themselves to groups or applications.
67+
68+
If you've assigned guests as reviewers and they haven't accepted their invitation to the tenant, they won't receive an email from access reviews. They must first accept the invitation before they can begin reviewing.
69+
70+
## Access the audit logs report
71+
72+
The audit logs report combines several reports around application activities into a single view for context-based reporting. For more information, see [Audit logs in Azure Active Directory](../reports-monitoring/concept-audit-logs.md).
73+
74+
To access the audit logs report, select **Audit logs** from the **Activity** section of the Azure Active Directory page.
75+
76+
The audit logs report consolidates the following reports:
77+
78+
- Password reset activity
79+
- Password reset registration activity
80+
- Self-service groups activity
81+
- Office365 Group Name Changes
82+
- Account provisioning activity
83+
- Password rollover status
84+
- Account provisioning errors
85+
86+
## Access the sign-ins report
87+
88+
The Sign-ins view includes all user sign-ins, and the Application Usage report. You also can view application usage information in the Manage section of the Enterprise applications overview. For more information, see [Sign-in logs in Azure Active Directory](../reports-monitoring/concept-sign-ins.md)
89+
90+
To access the sign-in logs report, select **Sign-ins** from the **Monitoring** section of the Azure Active Directory blade.
91+
92+
## Send logs to Azure Monitor
93+
94+
The Azure AD activity logs only store information for a maximum of 30 days. Depending on your needs, you may require extra storage to back up the activity logs data. Using the Azure Monitor, you can archive the audit and sign logs to an Azure storage account to retain the data for a longer time.
95+
The Azure Monitor is also useful for rich visualization, monitoring and alerting of data. To learn more about the Azure Monitor and the cost considerations for extra storage, see [Azure AD activity logs in Azure Monitor](../reports-monitoring/concept-activity-logs-azure-monitor.md).
96+
97+
To send logs to your logs analytics workspace:
98+
99+
1. Select **Diagnostic settings**, and then select **Add diagnostic setting**. You can also select Export Settings from the Audit Logs or Sign-ins page to get to the diagnostic settings configuration page.
100+
1. In the Diagnostic settings menu, select **Send to Log Analytics workspace**, and then select Configure.
101+
1. Select the Log Analytics workspace you want to send the logs to, or create a new workspace in the provided dialog box.
102+
1. Select the logs that you would like to send to the workspace.
103+
1. Select **Save** to save the setting.
104+
105+
After about 15 minutes, verify that events are streamed to your Log Analytics workspace.
106+
107+
## Next steps
108+
109+
Advance to the next article to learn how to...
110+
> [!div class="nextstepaction"]
111+
> [Manage consent to applications and evaluate consent requests](manage-consent-requests.md)
Lines changed: 155 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,155 @@
1+
---
2+
title: "Tutorial: Manage application access and security"
3+
titleSuffix: Azure AD
4+
description: In this tutorial, you learn how to manage access to an application in Azure Active Directory and make sure it's secure.
5+
author: omondiatieno
6+
manager: CelesteDG
7+
ms.author: jomondi
8+
ms.service: active-directory
9+
ms.subservice: app-mgmt
10+
ms.topic: tutorial
11+
ms.date: 02/24/2022
12+
13+
# Customer intent: As an administrator of an Azure AD tenant, I want to manage access to my applications and make sure they are secure.
14+
---
15+
16+
# Tutorial: Manage application access and security
17+
18+
The IT administrator at Fabrikam has added and configured an application from the Azure Active Directory (Azure AD) application gallery. They now need to understand the features that are available to manage access to the application and make sure the application is secure.
19+
Using the information in this tutorial, an administrator learns how to:
20+
21+
> [!div class="checklist"]
22+
> * Grant consent for the application on behalf of all users
23+
> * Enable multi-factor authentication to make sign-in more secure
24+
> * Communicate a term of use to users of the application
25+
> * Create a collection in the My Apps portal
26+
27+
## Prerequisites
28+
29+
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30+
* One of the following roles: Global Administrator, Privileged Role Administrator, Cloud Application Administrator, or Application Administrator.
31+
* An enterprise application that has been configured in your Azure AD tenant.
32+
* At least one user account added and assigned to the application. For more information, see [Quickstart: Create and assign a user account](add-application-portal-assign-users.md).
33+
34+
## Grant tenant wide admin consent
35+
36+
For the application that the administrator added to their tenant, they want to set it up so that all users in the organization can use it and not have to individually request consent to use it. To avoid the need for user consent, they can grant consent for the application on behalf of all users in the organization. For more information, see [Consent and permissions overview](consent-and-permissions-overview.md).
37+
38+
1. Sign in to the [Azure portal](https://portal.azure.com/) with one of the roles listed in the prerequisites.
39+
2. Search for and select **Azure Active Directory**.
40+
3. Select **Enterprise applications**.
41+
4. Select the application to which you want to grant tenant-wide admin consent.
42+
5. Under **Security**, select **Permissions**.
43+
6. Carefully review the permissions that the application requires. If you agree with the permissions the application requires, select **Grant admin consent**.
44+
45+
## Create a Conditional Access policy
46+
47+
The administrator wants to make sure that only the people they assign to the application can securely sign in. To do this, they can configure a conditional access policy for a group of users that enforces multi-factor authentication (MFA). For more information, see [What is Conditional Access?](../conditional-access/overview.md).
48+
49+
### Create a group
50+
51+
It's easier for an administrator to manage access to the application by assigning all users of the application to a group. The administrator can then manage access at a group level.
52+
53+
1. In the left menu of the tenant overview, select **Groups**.
54+
1. Select **New group** at the top of the pane.
55+
1. Enter *MFA-Test-Group* for the name of the group.
56+
1. Select No members selected, and then choose the user account that you assigned to the application.
57+
1. Select **Create**.
58+
59+
### Create a Conditional Access policy for the group
60+
61+
1. In the left menu of the tenant overview, select **Security**.
62+
1. Select **Conditional Access**, select **+ New policy**, and then select **Create new policy**.
63+
1. Enter a name for the policy, such as *MFA Pilot*.
64+
1. Under **Assignments**, select **Users and groups**
65+
1. On the **Include** tab, choose **Select users and groups**, and then select **Users and groups**.
66+
1. Browse for and select the *MFA-Test-Group* that you previously created, and then choose **Select**.
67+
1. Don't select **Create** yet, you add MFA to the policy in the next section.
68+
69+
### Configure multi-factor authentication
70+
71+
In this tutorial, the administrator can find the basic steps to configure the application, but they should consider creating a plan for MFA before starting. For more information, see [Plan an Azure Active Directory Multi-Factor Authentication deployment](../authentication/howto-mfa-getstarted.md).
72+
73+
1. Under **Cloud apps or actions**, select **No cloud apps, actions, or authentication contexts selected**. For this tutorial, on the **Include** tab, choose **Select apps**.
74+
1. Search for and select your application, and then select **Select**.
75+
1. Under **Access controls** and **Grant**, select **0 controls selected**.
76+
1. Check the box for **Require multi-factor authentication**, and then choose **Select**.
77+
1. Set **Enable policy** to **On**.
78+
1. To apply the Conditional Access policy, select **Create**.
79+
80+
## Test multi-factor authentication
81+
82+
1. Open a new browser window in InPrivate or incognito mode and browse to the URL of the application.
83+
1. Sign in with the user account that you assigned to the application. You're required to register for and use Azure AD Multi-Factor Authentication. Follow the prompts to complete the process and verify you successfully sign into the Azure portal.
84+
1. Close the browser window.
85+
86+
## Create a terms of use statement
87+
88+
Juan wants to make sure that certain terms and conditions are known to users before they start using the application. For more information, see [Azure Active Directory terms of use](../conditional-access/terms-of-use.md).
89+
90+
1. In Microsoft Word, create a new document.
91+
1. Type My terms of use, and then save the document on your computer as *mytou.pdf*.
92+
1. Under **Manage**, in the **Conditional Access** menu, select **Terms of use**.
93+
1. In the top menu, select **+ New terms**.
94+
1. In the **Name** textbox, type *My TOU*.
95+
1. In the **Display name** textbox, type *My TOU*.
96+
1. Upload your terms of use PDF file.
97+
1. For **Language**, select **English**.
98+
1. For **Require users to expand the terms of use**, select **On**.
99+
1. For **Enforce with conditional access policy templates**, select **Custom policy**.
100+
1. Select **Create**.
101+
102+
## Add the terms of use to the policy
103+
104+
1. In the left menu of the tenant overview, select **Security**.
105+
1. Select **Conditional Access**, and then select the *MFA Pilot* policy.
106+
1. Under **Access controls** and **Grant**, select the controls selected link.
107+
1. Select *My TOU*.
108+
1. Select **Require all the selected controls**, and then choose **Select**.
109+
1. Select **Save**.
110+
111+
## Create a collection in the My Apps portal
112+
113+
The My Apps portal enables administrators and users to manage the applications used in the organization. For more information, see [End-user experiences for applications](end-user-experiences.md).
114+
115+
> [!NOTE]
116+
> Applications only appear in a user's my Apps portal after the user is assigned to the application and the application is configured to be visible to users. See [Configure application properties](add-application-portal-configure.md) to learn how to make the application visible to users.
117+
118+
1. Open the Azure portal.
119+
1. Go to **Azure Active Directory**, and then select **Enterprise Applications**.
120+
1. Under **Manage**, select **Collections**.
121+
1. Select **New collection**. In the New collection page, enter a **Name** for the collection (it's recommended to not use "collection" in the name. Then enter a **Description**.
122+
1. Select the **Applications** tab. Select **+ Add application**, and then in the Add applications page, select all the applications you want to add to the collection, or use the Search box to find applications.
123+
1. When you're finished adding applications, select **Add**. The list of selected applications appears. You can use the arrows to change the order of applications in the list.
124+
1. Select the **Owners** tab. Select **+ Add users and groups**, and then in the Add users and groups page, select the users or groups you want to assign ownership to. When you're finished selecting users and groups, choose **Select**.
125+
1. Select the **Users and groups** tab. Select **+ Add users and groups**, and then in the **Add users and groups** page, select the users or groups you want to assign the collection to. Or use the Search box to find users or groups. When you're finished selecting users and groups, choose **Select**.
126+
1. Select **Review + Create**, and then select **Create**. The properties for the new collection appear.
127+
128+
## Clean up resources
129+
130+
You can keep the resources for future use, or if you're not going to continue to use the resources created in this tutorial, delete them with the following steps.
131+
132+
## Delete the application
133+
134+
1. In the left menu, select **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant. Search for and select the application that you want to delete.
135+
1. In the **Manage** section of the left menu, select **Properties**.
136+
1. At the top of the **Properties** pane, select **Delete**, and then select **Yes** to confirm you want to delete the application from your Azure AD tenant.
137+
138+
## Delete the conditional access policy
139+
140+
1. Select **Enterprise applications**.
141+
1. Under **Security**, select **Conditional Access**.
142+
1. Search for and select **MFA Pilot**.
143+
1. Select **Delete** at the top of the pane.
144+
145+
## Delete the group
146+
147+
1. Select **Azure Active Directory**, and then select **Groups**.
148+
1. From the **Groups - All groups** page, search for and select the **MFA-Test-Group** group.
149+
1. On the overview page, select **Delete**.
150+
151+
## Next steps
152+
153+
For information about how you can make sure that your application is healthy and being used correctly, see:
154+
> [!div class="nextstepaction"]
155+
> [Govern and monitor your application](tutorial-govern-monitor.md)

0 commit comments

Comments
 (0)