Skip to content

Commit 87f4b89

Browse files
authored
Merge pull request #249292 from OWinfreyATL/owinfreyATL-AR-EntraStandardization
AR Azure to Entra step updates
2 parents 172efb5 + 6cf0efd commit 87f4b89

6 files changed

+23
-30
lines changed

articles/active-directory/governance/access-reviews-downloadable-review-history.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,9 @@ Review history and request review history are available for any user if they're
2626

2727
**Prerequisite role:** All users authorized to view access reviews
2828

29-
1. In the Azure portal, select **Azure Active Directory** and then select **Identity Governance**.
29+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
3030

31-
1. In the left menu, under **Access Reviews** select **Review history**.
31+
1. Browse to **Identity governance** > **Access Reviews** > **Review History**.
3232

3333
1. Select **New report**.
3434

@@ -54,7 +54,7 @@ The reports provide details on a per-user basis showing the following informatio
5454
| Element name | Description |
5555
| --- | --- |
5656
| AccessReviewId | Review object ID |
57-
| AccessReviewSeriesId | Object ID of the review series, if the review is an instance of a recurring review. If the review is one time, the value is am empty GUID. |
57+
| AccessReviewSeriesId | Object ID of the review series, if the review is an instance of a recurring review. If the review is one time, the value is an empty GUID. |
5858
| ReviewType | Review types include group, application, Azure AD role, Azure role, and access package|
5959
|ResourceDisplayName | Display Name of the resource being reviewed |
6060
| ResourceId | ID of the resource being reviewed |

articles/active-directory/governance/complete-access-review.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -33,15 +33,12 @@ For more information, see [License requirements](access-reviews-overview.md#lice
3333

3434

3535
## View the status of an access review
36-
37-
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
38-
3936

4037
You can track the progress of access reviews as they're completed.
4138

42-
1. Sign in to the [Azure portal](https://portal.azure.com) and open the [Identity Governance page](https://portal.azure.com/#blade/Microsoft_AAD_ERM/DashboardBlade/).
43-
44-
1. In the left menu, select **Access reviews**.
39+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
40+
41+
1. Browse to **Identity governance** > **Access Reviews**.
4542

4643
1. In the list, select an access review.
4744

@@ -119,7 +116,7 @@ Manually or automatically applying results doesn't have an effect on a group tha
119116

120117
On review creation, the creator can choose between two options for denied guest users in an access review.
121118
- Denied guest users can have their access to the resource removed. This is the default.
122-
- The denied guest user can be blocked from signing in for 30 days, then deleted from the tenant. During the 30-day period the guest user is able to be restored access to the tenant by an administrator. After the 30-day period is completed, if the guest user hasn't had access to the resource granted to them again, they'll be removed from the tenant permanently. In addition, using the Azure portal, a Global Administrator can explicitly [permanently delete a recently deleted user](../fundamentals/users-restore.md) before that time period is reached. Once a user has been permanently deleted, the data about that guest user will be removed from active access reviews. Audit information about deleted users remains in the audit log.
119+
- The denied guest user can be blocked from signing in for 30 days, then deleted from the tenant. During the 30-day period the guest user is able to be restored access to the tenant by an administrator. After the 30-day period is completed, if the guest user hasn't had access to the resource granted to them again, they'll be removed from the tenant permanently. In addition, using the Microsoft Entra admin center, a Global Administrator can explicitly [permanently delete a recently deleted user](../fundamentals/users-restore.md) before that time period is reached. Once a user has been permanently deleted, the data about that guest user will be removed from active access reviews. Audit information about deleted users remains in the audit log.
123120

124121
### Actions taken on denied B2B direct connect users
125122

articles/active-directory/governance/create-access-review-pim-for-groups.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -31,21 +31,19 @@ For more information, see [License requirements](access-reviews-overview.md#lice
3131

3232
### Scope
3333

34-
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
34+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
3535

36-
1. Sign in to the [Azure portal](https://portal.azure.com) and open the [Identity Governance](https://portal.azure.com/#blade/Microsoft_AAD_ERM/DashboardBlade/) page.
36+
1. Browse to **Identity governance** > **Access Reviews** > **Review History**.
3737

38-
2. On the left menu, select **Access reviews**.
39-
40-
3. Select **New access review** to create a new access review.
38+
1. Select **New access review** to create a new access review.
4139

4240
![Screenshot that shows the Access reviews pane in Identity Governance.](./media/create-access-review/access-reviews.png)
4341

44-
4. In the **Select what to review** box, select **Teams + Groups**.
42+
1. In the **Select what to review** box, select **Teams + Groups**.
4543

4644
![Screenshot that shows creating an access review.](./media/create-access-review/select-what-review.png)
4745

48-
5. Select **Teams + Groups** and then select **Select Teams + groups** under **Review Scope**. A list of groups to choose from appears on the right.
46+
1. Select **Teams + Groups** and then select **Select Teams + groups** under **Review Scope**. A list of groups to choose from appears on the right.
4947

5048
![Screenshot that shows selecting Teams + Groups.](./media/create-access-review/create-pim-review.png)
5149

articles/active-directory/governance/create-access-review.md

Lines changed: 6 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -44,11 +44,9 @@ If you're reviewing access to an application, then before creating the review, s
4444

4545
### Scope
4646

47-
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
47+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
4848

49-
1. Sign in to the [Azure portal](https://portal.azure.com) and open the [Identity Governance](https://portal.azure.com/#blade/Microsoft_AAD_ERM/DashboardBlade/) page.
50-
51-
2. On the left menu, select **Access reviews**.
49+
1. Browse to **Identity governance** > **Access Reviews**.
5250

5351
3. Select **New access review** to create a new access review.
5452

@@ -236,11 +234,9 @@ B2B direct connect users and teams are included in access reviews of the Teams-e
236234

237235
Use the following instructions to create an access review on a team with shared channels:
238236

239-
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator, User Admin or Identity Governance Admin.
240-
241-
1. Open the [Identity Governance](https://portal.azure.com/#blade/Microsoft_AAD_ERM/DashboardBlade/) page.
237+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
242238

243-
1. On the left menu, select **Access reviews**.
239+
1. Browse to **Identity governance** > **Access Reviews**.
244240

245241
1. Select **+ New access review**.
246242

@@ -271,9 +267,9 @@ Use the following instructions to create an access review on a team with shared
271267

272268
The prerequisite role is a Global or User administrator.
273269

274-
1. Sign in to the [Azure portal](https://portal.azure.com) and open the [Identity Governance page](https://portal.azure.com/#blade/Microsoft_AAD_ERM/DashboardBlade/).
270+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
275271

276-
1. On the menu on the left, under **Access reviews**, select **Settings**.
272+
1. Browse to **Identity governance** > **Access Reviews** > **Settings**.
277273

278274
1. On the **Delegate who can create and manage access reviews** page, set **Group owners can create and manage access reviews for groups they own** to **Yes**.
279275

articles/active-directory/governance/entitlement-management-access-reviews-create.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,9 +37,11 @@ For more information, see [License requirements](entitlement-management-overview
3737

3838
You can enable access reviews when [creating a new access package](entitlement-management-access-package-create.md) or [editing an existing access package assignment policy](entitlement-management-access-package-lifecycle-policy.md) policy. If you have multiple policies, for different communities of users to request access, you can have independent access review schedules for each policy. Follow these steps to enable access reviews of an access package's assignments:
3939

40-
1. In the Azure portal, select **Azure Active Directory** and then select **Identity Governance**.
40+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
4141

42-
1. To create a new access policy, in the left menu, select **Access packages**, then select **New access** package.
42+
1. Browse to **Identity governance** > **Access Reviews** > **Access packages**.
43+
44+
1. To create a new access policy, select **New access** package.
4345

4446
1. To edit an existing access policy, in the left menu, select **Access packages** and open the access package you want to edit. Then, in the left menu, select **Policies** and select the policy that has the lifecycle settings you want to edit.
4547

articles/active-directory/governance/perform-access-review.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ If you're the second-stage or third-stage reviewer, you'll also see the decision
119119
Approve or deny access as outlined in [Review access for one or more users](#review-access-for-one-or-more-users).
120120

121121
> [!NOTE]
122-
> The next stage of the review won't become active until the duration specified during the access review setup has passed. If the administrator believes a stage is done but the review duration for this stage has not expired yet, they can use the **Stop current stage** button in the overview of the access review in the Azure portal. This action will close the active stage and start the next stage.
122+
> The next stage of the review won't become active until the duration specified during the access review setup has passed. If the administrator believes a stage is done but the review duration for this stage has not expired yet, they can use the **Stop current stage** button in the overview of the access review in the Microsoft Entra admin center. This action will close the active stage and start the next stage.
123123
124124
### Review access for B2B direct connect users in Teams shared channels and Microsoft 365 groups (preview)
125125

0 commit comments

Comments
 (0)