You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/governance/management-groups/overview.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ above subscriptions. You organize subscriptions into management groups; the gove
14
14
cascade by inheritance to all associated subscriptions.
15
15
16
16
Management groups give you enterprise-grade management at scale, no matter what type of subscriptions you might have.
17
-
However, all subscriptions within a single management group must trust the same Entra ID tenant.
17
+
However, all subscriptions within a single management group must trust the same Microsoft Entra ID tenant.
18
18
19
19
For example, you can apply policies to a management group that limits the regions available for virtual machine (VM) creation. This policy would be applied to all nested management groups, subscriptions, and resources and allow VM creation only in authorized regions.
20
20
@@ -56,15 +56,15 @@ subscriptions.
56
56
Each directory is given a single top-level management group called the **root** management group. The
57
57
root management group is built into the hierarchy to have all management groups and subscriptions
58
58
fold up to it. This root management group allows for global policies and Azure role assignments to
59
-
be applied at the directory level. The [Entra ID Global Administrator needs to elevate
59
+
be applied at the directory level. The [Microsoft Entra ID Global Administrator needs to elevate
60
60
themselves](../../role-based-access-control/elevate-access-global-admin.md) to the User Access
61
61
Administrator role of this root group initially. After elevating access, the administrator can
62
62
assign any Azure role to other directory users or groups to manage the hierarchy. As an administrator,
63
63
you can assign your account as the owner of the root management group.
64
64
65
65
### Important facts about the root management group
66
66
67
-
- By default, the root management group's display name is **Tenant root group** and operates itself as a management group. The ID is the same value as the Entra ID tenant ID.
67
+
- By default, the root management group's display name is **Tenant root group** and operates itself as a management group. The ID is the same value as the Microsoft Entra ID tenant ID.
68
68
- To change the display name, your account must be assigned the **Owner** or **Contributor** role on the
69
69
root management group. See
70
70
[Change the name of a management group](manage.md#change-the-name-of-a-management-group) to update
@@ -78,7 +78,7 @@ you can assign your account as the owner of the root management group.
78
78
that root management group.
79
79
- Everyone who has access to a subscription can see the context of where that subscription is in
80
80
the hierarchy.
81
-
- No one is given default access to the root management group. Entra ID Global Administrators are
81
+
- No one is given default access to the root management group. Microsoft Entra ID Global Administrators are
82
82
the only users that can elevate themselves to gain access. Once they have access to the root
83
83
management group, the global administrators can assign any Azure role to other users to manage
84
84
it.
@@ -98,7 +98,7 @@ The reason for this process is to make sure there's only one management group hi
98
98
directory. The single hierarchy within the directory allows administrative customers to apply global
99
99
access and policies that other customers within the directory can't bypass. Anything assigned on the
100
100
root will apply to the entire hierarchy, which includes all management groups, subscriptions,
101
-
resource groups, and resources within that Entra ID tenant.
101
+
resource groups, and resources within that Microsoft Entra ID tenant.
0 commit comments