Skip to content

Commit 88e29ed

Browse files
committed
Updated steps in content for User Story 149483
1 parent 758389a commit 88e29ed

8 files changed

+68
-68
lines changed

articles/active-directory/cloud-infrastructure-entitlement-management/how-to-add-remove-user-to-group.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ This article describes how you can add or remove a new user for a group in Permi
2121
2222
## Add a user
2323

24-
1. Navigate to the [Microsoft Entra admin center](https://entra.microsoft.com/#home).
24+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/#home).
2525
1. From the Azure Active Directory tile, select **Go to Azure Active Directory**.
2626
1. From the navigation pane, select the **Groups** drop-down menu, then **All groups**.
2727
1. Select the group name for the group you want to add the user to.
@@ -37,7 +37,7 @@ This article describes how you can add or remove a new user for a group in Permi
3737

3838
## Remove a user
3939

40-
1. Navigate to the Microsoft [Entra admin center](https://entra.microsoft.com/#home).
40+
1. Sign in to the Microsoft [Entra admin center](https://entra.microsoft.com/#home).
4141
1. From the Azure Active Directory tile, select **Go to Azure Active Directory**.
4242
1. From the navigation pane, select the **Groups** drop-down menu, then **All groups**.
4343
1. Select the group name for the group you want to remove the user from.

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-add-account-after-onboarding.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 06/16/2023
11+
ms.date: 09/13/2023
1212
ms.author: jfields
1313
---
1414

@@ -28,7 +28,7 @@ This article describes how to add an Amazon Web Services (AWS) account, Microsof
2828

2929
The **Permissions Management Onboarding - AWS Member Account Details** page displays.
3030

31-
1. Go to **Enter Your AWS Account IDs**, and then select **Add** (the plus **+** sign).
31+
1. Go to **Enter Your AWS Account IDs**, then select **Add** (the plus **+** sign).
3232
1. Copy your account ID from AWS and paste it into the **Enter Account ID** box.
3333

3434
The AWS account ID is automatically added to the script.
@@ -54,8 +54,8 @@ This article describes how to add an Amazon Web Services (AWS) account, Microsof
5454

5555
The **Permissions Management Onboarding - Summary** page displays.
5656

57-
1. Go to **Azure subscription IDs**, and then select **Edit** (the pencil icon).
58-
1. Go to **Enter your Azure Subscription IDs**, and then select **Add subscription** (the plus **+** sign).
57+
1. Go to **Azure subscription IDs**, then select **Edit** (the pencil icon).
58+
1. Go to **Enter your Azure Subscription IDs**, then select **Add subscription** (the plus **+** sign).
5959
1. Copy and paste your subscription ID from Azure and paste it into the subscription ID box.
6060

6161
The subscription ID is automatically added to the subscriptions line in the script.

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-aws.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 08/24/2023
11+
ms.date: 09/13/2023
1212
ms.author: jfields
1313
---
1414

@@ -17,7 +17,7 @@ ms.author: jfields
1717
This article describes how to onboard an Amazon Web Services (AWS) account in Microsoft Entra Permissions Management.
1818

1919
> [!NOTE]
20-
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Microsoft Entra Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
20+
> You must have Global Administrator permissions to perform the tasks in this article.
2121
2222
## Explanation
2323

@@ -126,17 +126,17 @@ Any current or future accounts found get onboarded automatically.
126126

127127
To view status of onboarding after saving the configuration:
128128

129-
- Navigate to data collectors tab.
129+
- Go to **Data Collectors** tab.
130130
- Click on the status of the data collector.
131-
- View accounts on the In Progress page
131+
- View accounts on the **In Progress** page
132132

133133
#### Option 2: Enter authorization systems
134134
1. In the **Permissions Management Onboarding - AWS Member Account Details** page, enter the **Member Account Role** and the **Member Account IDs**.
135135

136136
You can enter up to 100 account IDs. Click the plus icon next to the text box to add more account IDs.
137137

138138
> [!NOTE]
139-
> Perform the next 6 steps for each account ID you add.
139+
> Do the following steps for each account ID you add:
140140
141141
1. Open another browser window and sign in to the AWS console for the member account.
142142

@@ -174,8 +174,8 @@ This option detects all AWS accounts that are accessible through OIDC role acces
174174
- If AWS SSO is enabled, organization account CFT also adds policy needed to collect AWS SSO configuration details.
175175
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. These actions create a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
176176
- Click Verify and Save.
177-
- Navigate to newly create Data Collector row under AWSdata collectors.
178-
- Click on Status column when the row has Pending status
177+
- Go to the newly create Data Collector row under AWSdata collectors.
178+
- Click on Status column when the row has **Pending** status
179179
- To onboard and start collection, choose specific ones from the detected list and consent for collection.
180180

181181
### 6. Review and save

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.author: jfields
1717
This article describes how to onboard a Microsoft Azure subscription or subscriptions on Permissions Management. Onboarding a subscription creates a new authorization system to represent the Azure subscription in Permissions Management.
1818

1919
> [!NOTE]
20-
> A *global administrator* or *root user* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
20+
> You must have [Global Administrator](https://aka.ms/globaladmin) permissions to perform the tasks in this article.
2121
2222
## Explanation
2323

@@ -29,8 +29,8 @@ The Permissions Management service is built on Azure, and given you're onboardin
2929

3030
## Prerequisites
3131

32-
To add Permissions Management to your Azure AD tenant:
33-
- You must have an Azure AD user account and an Azure command-line interface (Azure CLI) on your system, or an Azure subscription. If you don't already have one, [create a free account](https://azure.microsoft.com/free/).
32+
To add Permissions Management to your Entra ID tenant:
33+
- You must have an Entra ID user account and an Azure command-line interface (Azure CLI) on your system, or an Azure subscription. If you don't already have one, [create a free account](https://azure.microsoft.com/free/).
3434
- You must have **Microsoft.Authorization/roleAssignments/write** permission at the subscription or management group scope to perform these tasks. If you don't have this permission, you can ask someone who has this permission to perform these tasks for you.
3535

3636
## How to onboard an Azure subscription
@@ -47,33 +47,33 @@ Choose from three options to manage Azure subscriptions.
4747

4848
#### Option 1: Automatically manage
4949

50-
This option allows subscriptions to be automatically detected and monitored without further work required. A key benefit of automatic management is that any current or future subscriptions found will be onboarded automatically. The steps to detect a list of subscriptions and onboard for collection are as follows:
50+
This option lets subscriptions be automatically detected and monitored without further work required. A key benefit of automatic management is that any current or future subscriptions found are onboarded automatically. The steps to detect a list of subscriptions and onboard for collection are as follows:
5151

5252
- Firstly, grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope. To do this:
5353

5454
1. In the EPM portal, left-click the cog on the top right-hand side.
55-
1. Navigate to data collectors tab
56-
1. Ensure 'Azure' is selected
57-
1. Click Create Configuration
58-
1. For onboarding mode, select Automatically Manage
55+
1. Go to data collectors tab
56+
1. Ensure **Azure** is selected.
57+
1. Click **Create Configuration.**
58+
1. For onboarding mode, select **Automatically Manage.**
5959

6060
> [!NOTE]
61-
> The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. This can be performed manually in the Entra console, or programmatically with PowerShell or the Azure CLI.
61+
> The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. This is performed manually in the Entra console, or programmatically with PowerShell or the Azure CLI.
6262
63-
- Once complete, Click Verify Now & Save
63+
- Once complete, Click **Verify Now & Save.**
6464

6565
To view status of onboarding after saving the configuration:
6666

67-
1. Collectors will now be listed and change through status types. For each collector listed with a status of Collected Inventory”, click on that status to view further information.
68-
1. You can then view subscriptions on the In Progress page
67+
1. Collectors are now listed and change through status types. For each collector listed with a status of **Collected Inventory,** click on that status to view further information.
68+
1. You can then view subscriptions on the In Progress page.
6969

7070
#### Option 2: Enter authorization systems
7171

72-
You have the ability to specify only certain subscriptions to manage and monitor with MEPM (up to 100 per collector). Follow the steps below to configure these subscriptions to be monitored:
72+
You have the ability to specify only certain subscriptions to manage and monitor with Permissions Management (up to 100 per collector). Follow the steps below to configure these subscriptions to be monitored:
7373

7474
1. For each subscription you wish to manage, ensure that the ‘Reader’ role has been granted to Cloud Infrastructure Entitlement Management application for the subscription.
7575
1. In the EPM portal, click the cog on the top right-hand side.
76-
1. Navigate to data collectors tab
76+
1. Go to data collectors tab
7777
1. Ensure 'Azure' is selected
7878
1. Click ‘Create Configuration’
7979
1. Select ‘Enter Authorization Systems’
@@ -84,31 +84,31 @@ You have the ability to specify only certain subscriptions to manage and monitor
8484

8585
To view status of onboarding after saving the configuration:
8686

87-
1. Navigate to data collectors tab.
87+
1. Go to the **Data Collectors** tab.
8888
1. Click on the status of the data collector.
89-
1. View subscriptions on the In Progress page
89+
1. View subscriptions on the In Progress page.
9090

9191
#### Option 3: Select authorization systems
9292

9393
This option detects all subscriptions that are accessible by the Cloud Infrastructure Entitlement Management application.
9494

9595
- Firstly, grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope.
9696

97-
1. In the EPM portal, click the cog on the top right-hand side.
98-
1. Navigate to data collectors tab
99-
1. Ensure 'Azure' is selected
100-
1. Click Create Configuration
101-
1. For onboarding mode, select Automatically Manage
97+
1. In the Permissions Management portal, click the cog on the top right-hand side.
98+
1. Go to the **Data Collectors** tab.
99+
1. Ensure **Azure** is selected.
100+
1. Click **Create Configuration.**
101+
1. For onboarding mode, select **Automatically Manage.**
102102

103103
> [!NOTE]
104104
> The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. You can do this manually in the Entra console, or programmatically with PowerShell or the Azure CLI.
105105
106-
- Once complete, Click Verify Now & Save
106+
- Once complete, Click **Verify Now & Save.**
107107

108108
To view status of onboarding after saving the configuration:
109109

110-
1. Navigate to newly create Data Collector row under Azure data collectors.
111-
1. Click on Status column when the row has Pending status
110+
1. Go to newly create Data Collector row under Azure data collectors.
111+
1. Click on Status column when the row has **Pending** status
112112
1. To onboard and start collection, choose specific ones subscriptions from the detected list and consent for collection.
113113

114114
### 2. Review and save.

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-enable-controller-after-onboarding.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 08/24/2023
11+
ms.date: 09/13/2023
1212
ms.author: jfields
1313
---
1414

@@ -32,9 +32,9 @@ This article also describes how to disable the controller in Microsoft Azure and
3232
> [!NOTE]
3333
> You can enable the controller in AWS if you disabled it during onboarding. Once you enable the controller in AWS, you can’t disable it.
3434
35-
1. Sign in to the AWS console of the member account in a separate browser window.
36-
1. Go to the Permissions Management home page, select **Settings** (the gear icon), and then select the **Data Collectors** subtab.
37-
1. On the **Data Collectors** dashboard, select **AWS**, and then select **Create Configuration**.
35+
1. In a separate browser window, sign in to the AWS console of the member account.
36+
1. Go to the Permissions Management home page, select **Settings** (the gear icon), then select the **Data Collectors** subtab.
37+
1. On the **Data Collectors** dashboard, select **AWS**, then select **Create Configuration**.
3838
1. On the **Permissions Management Onboarding - AWS Member Account Details** page, select **Launch Template**.
3939

4040
The **AWS CloudFormation create stack** page opens, displaying the template.
@@ -52,7 +52,7 @@ This article also describes how to disable the controller in Microsoft Azure and
5252
This AWS CloudFormation stack creates a collection role in the member account with necessary permissions (policies) for data collection. A trust policy is set on this role to allow the OIDC role created in your AWS OIDC account to access it. These entities are listed in the **Resources** tab of your CloudFormation stack.
5353

5454
1. Return to Permissions Management, and on the Permissions Management **Onboarding - AWS Member Account Details** page, select **Next**.
55-
1. On **Permissions Management Onboarding – Summary** page, review the information you've added, and then select **Verify Now & Save**.
55+
1. On **Permissions Management Onboarding – Summary** page, review the information you've added, then select **Verify Now & Save**.
5656

5757
The following message appears: **Successfully created configuration.**
5858

@@ -70,13 +70,13 @@ You can enable or disable the controller in Azure at the Subscription level of y
7070
- If you have read-only permission, the **Role** column displays **Reader**.
7171
- If you have administrative permission, the **Role** column displays **User Access Administrator**.
7272

73-
1. To add the administrative role assignment, return to the **Access control (IAM)** page, and then select **Add role assignment**.
73+
1. To add the administrative role assignment, return to the **Access control (IAM)** page, then select **Add role assignment**.
7474
1. Add or remove the role assignment for Cloud Infrastructure Entitlement Management.
7575

76-
1. Go to the Permissions Management home page, select **Settings** (the gear icon), and then select the **Data Collectors** subtab.
77-
1. On the **Data Collectors** dashboard, select **Azure**, and then select **Create Configuration**.
78-
1. On the **Permissions Management Onboarding - Azure Subscription Details** page, enter the **Subscription ID**, and then select **Next**.
79-
1. On **Permissions Management Onboarding – Summary** page, review the controller permissions, and then select **Verify Now & Save**.
76+
1. Go to the Permissions Management home page, select **Settings** (the gear icon), then select the **Data Collectors** subtab.
77+
1. On the **Data Collectors** dashboard, select **Azure**, then select **Create Configuration**.
78+
1. On the **Permissions Management Onboarding - Azure Subscription Details** page, enter the **Subscription ID**, then select **Next**.
79+
1. On **Permissions Management Onboarding – Summary** page, review the controller permissions, then select **Verify Now & Save**.
8080

8181
The following message appears: **Successfully Created Configuration.**
8282

@@ -93,12 +93,12 @@ You can enable or disable the controller in Azure at the Subscription level of y
9393

9494
1. Optionally, execute ``mciem-enable-gcp-api.sh`` to enable all recommended GCP APIs.
9595

96-
1. Go to the Permissions Management home page, select **Settings** (the gear icon), and then select the **Data Collectors** subtab.
96+
1. Go to the Permissions Management home page, select **Settings** (the gear icon), then select the **Data Collectors** subtab.
9797
1. On the **Data Collectors** dashboard, select **GCP**, and then select **Create Configuration**.
9898
1. On the **Permissions Management Onboarding - Azure AD OIDC App Creation** page, select **Next**.
9999
1. On the **Permissions Management Onboarding - GCP OIDC Account Details & IDP Access** page, enter the **OIDC Project Number** and **OIDC Project ID**, and then select **Next**.
100-
1. On the **Permissions Management Onboarding - GCP Project IDs** page, enter the **Project IDs**, and then select **Next**.
101-
1. On the **Permissions Management Onboarding – Summary** page, review the information you've added, and then select **Verify Now & Save**.
100+
1. On the **Permissions Management Onboarding - GCP Project IDs** page, enter the **Project IDs**, then select **Next**.
101+
1. On the **Permissions Management Onboarding – Summary** page, review the information you've added, then select **Verify Now & Save**.
102102

103103
The following message appears: **Successfully Created Configuration.**
104104

0 commit comments

Comments
 (0)