You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-add-account-after-onboarding.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: ciem
9
9
ms.workload: identity
10
10
ms.topic: how-to
11
-
ms.date: 06/16/2023
11
+
ms.date: 09/13/2023
12
12
ms.author: jfields
13
13
---
14
14
@@ -28,7 +28,7 @@ This article describes how to add an Amazon Web Services (AWS) account, Microsof
28
28
29
29
The **Permissions Management Onboarding - AWS Member Account Details** page displays.
30
30
31
-
1. Go to **Enter Your AWS Account IDs**, and then select **Add** (the plus **+** sign).
31
+
1. Go to **Enter Your AWS Account IDs**, then select **Add** (the plus **+** sign).
32
32
1. Copy your account ID from AWS and paste it into the **Enter Account ID** box.
33
33
34
34
The AWS account ID is automatically added to the script.
@@ -54,8 +54,8 @@ This article describes how to add an Amazon Web Services (AWS) account, Microsof
54
54
55
55
The **Permissions Management Onboarding - Summary** page displays.
56
56
57
-
1. Go to **Azure subscription IDs**, and then select **Edit** (the pencil icon).
58
-
1. Go to **Enter your Azure Subscription IDs**, and then select **Add subscription** (the plus **+** sign).
57
+
1. Go to **Azure subscription IDs**, then select **Edit** (the pencil icon).
58
+
1. Go to **Enter your Azure Subscription IDs**, then select **Add subscription** (the plus **+** sign).
59
59
1. Copy and paste your subscription ID from Azure and paste it into the subscription ID box.
60
60
61
61
The subscription ID is automatically added to the subscriptions line in the script.
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-aws.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: ciem
9
9
ms.workload: identity
10
10
ms.topic: how-to
11
-
ms.date: 08/24/2023
11
+
ms.date: 09/13/2023
12
12
ms.author: jfields
13
13
---
14
14
@@ -17,7 +17,7 @@ ms.author: jfields
17
17
This article describes how to onboard an Amazon Web Services (AWS) account in Microsoft Entra Permissions Management.
18
18
19
19
> [!NOTE]
20
-
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Microsoft Entra Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
20
+
> You must have Global Administrator permissions to perform the tasks in this article.
21
21
22
22
## Explanation
23
23
@@ -126,17 +126,17 @@ Any current or future accounts found get onboarded automatically.
126
126
127
127
To view status of onboarding after saving the configuration:
128
128
129
-
-Navigate to data collectors tab.
129
+
-Go to **Data Collectors** tab.
130
130
- Click on the status of the data collector.
131
-
- View accounts on the In Progress page
131
+
- View accounts on the **In Progress** page
132
132
133
133
#### Option 2: Enter authorization systems
134
134
1. In the **Permissions Management Onboarding - AWS Member Account Details** page, enter the **Member Account Role** and the **Member Account IDs**.
135
135
136
136
You can enter up to 100 account IDs. Click the plus icon next to the text box to add more account IDs.
137
137
138
138
> [!NOTE]
139
-
> Perform the next 6 steps for each account ID you add.
139
+
> Do the following steps for each account ID you add:
140
140
141
141
1. Open another browser window and sign in to the AWS console for the member account.
142
142
@@ -174,8 +174,8 @@ This option detects all AWS accounts that are accessible through OIDC role acces
174
174
- If AWS SSO is enabled, organization account CFT also adds policy needed to collect AWS SSO configuration details.
175
175
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. These actions create a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
176
176
- Click Verify and Save.
177
-
-Navigate to newly create Data Collector row under AWSdata collectors.
178
-
- Click on Status column when the row has “Pending” status
177
+
-Go to the newly create Data Collector row under AWSdata collectors.
178
+
- Click on Status column when the row has **Pending** status
179
179
- To onboard and start collection, choose specific ones from the detected list and consent for collection.
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md
+24-24Lines changed: 24 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ ms.author: jfields
17
17
This article describes how to onboard a Microsoft Azure subscription or subscriptions on Permissions Management. Onboarding a subscription creates a new authorization system to represent the Azure subscription in Permissions Management.
18
18
19
19
> [!NOTE]
20
-
> A *global administrator* or *root user* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
20
+
> You must have [Global Administrator](https://aka.ms/globaladmin) permissions to perform the tasks in this article.
21
21
22
22
## Explanation
23
23
@@ -29,8 +29,8 @@ The Permissions Management service is built on Azure, and given you're onboardin
29
29
30
30
## Prerequisites
31
31
32
-
To add Permissions Management to your Azure AD tenant:
33
-
- You must have an Azure AD user account and an Azure command-line interface (Azure CLI) on your system, or an Azure subscription. If you don't already have one, [create a free account](https://azure.microsoft.com/free/).
32
+
To add Permissions Management to your Entra ID tenant:
33
+
- You must have an Entra ID user account and an Azure command-line interface (Azure CLI) on your system, or an Azure subscription. If you don't already have one, [create a free account](https://azure.microsoft.com/free/).
34
34
- You must have **Microsoft.Authorization/roleAssignments/write** permission at the subscription or management group scope to perform these tasks. If you don't have this permission, you can ask someone who has this permission to perform these tasks for you.
35
35
36
36
## How to onboard an Azure subscription
@@ -47,33 +47,33 @@ Choose from three options to manage Azure subscriptions.
47
47
48
48
#### Option 1: Automatically manage
49
49
50
-
This option allows subscriptions to be automatically detected and monitored without further work required. A key benefit of automatic management is that any current or future subscriptions found will be onboarded automatically. The steps to detect a list of subscriptions and onboard for collection are as follows:
50
+
This option lets subscriptions be automatically detected and monitored without further work required. A key benefit of automatic management is that any current or future subscriptions found are onboarded automatically. The steps to detect a list of subscriptions and onboard for collection are as follows:
51
51
52
52
- Firstly, grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope. To do this:
53
53
54
54
1. In the EPM portal, left-click the cog on the top right-hand side.
55
-
1.Navigate to data collectors tab
56
-
1. Ensure 'Azure' is selected
57
-
1. Click ‘Create Configuration’
58
-
1. For onboarding mode, select ‘Automatically Manage’
55
+
1.Go to data collectors tab
56
+
1. Ensure **Azure** is selected.
57
+
1. Click **Create Configuration.**
58
+
1. For onboarding mode, select **Automatically Manage.**
59
59
60
60
> [!NOTE]
61
-
> The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. This can be performed manually in the Entra console, or programmatically with PowerShell or the Azure CLI.
61
+
> The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. This is performed manually in the Entra console, or programmatically with PowerShell or the Azure CLI.
62
62
63
-
- Once complete, Click ‘Verify Now & Save’
63
+
- Once complete, Click **Verify Now & Save.**
64
64
65
65
To view status of onboarding after saving the configuration:
66
66
67
-
1. Collectors will now be listed and change through status types. For each collector listed with a status of “Collected Inventory”, click on that status to view further information.
68
-
1. You can then view subscriptions on the In Progress page
67
+
1. Collectors are now listed and change through status types. For each collector listed with a status of **Collected Inventory,** click on that status to view further information.
68
+
1. You can then view subscriptions on the In Progress page.
69
69
70
70
#### Option 2: Enter authorization systems
71
71
72
-
You have the ability to specify only certain subscriptions to manage and monitor with MEPM (up to 100 per collector). Follow the steps below to configure these subscriptions to be monitored:
72
+
You have the ability to specify only certain subscriptions to manage and monitor with Permissions Management (up to 100 per collector). Follow the steps below to configure these subscriptions to be monitored:
73
73
74
74
1. For each subscription you wish to manage, ensure that the ‘Reader’ role has been granted to Cloud Infrastructure Entitlement Management application for the subscription.
75
75
1. In the EPM portal, click the cog on the top right-hand side.
76
-
1.Navigate to data collectors tab
76
+
1.Go to data collectors tab
77
77
1. Ensure 'Azure' is selected
78
78
1. Click ‘Create Configuration’
79
79
1. Select ‘Enter Authorization Systems’
@@ -84,31 +84,31 @@ You have the ability to specify only certain subscriptions to manage and monitor
84
84
85
85
To view status of onboarding after saving the configuration:
86
86
87
-
1.Navigate to data collectors tab.
87
+
1.Go to the **Data Collectors** tab.
88
88
1. Click on the status of the data collector.
89
-
1. View subscriptions on the In Progress page
89
+
1. View subscriptions on the In Progress page.
90
90
91
91
#### Option 3: Select authorization systems
92
92
93
93
This option detects all subscriptions that are accessible by the Cloud Infrastructure Entitlement Management application.
94
94
95
95
- Firstly, grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope.
96
96
97
-
1. In the EPM portal, click the cog on the top right-hand side.
98
-
1.Navigate to data collectors tab
99
-
1. Ensure 'Azure' is selected
100
-
1. Click ‘Create Configuration’
101
-
1. For onboarding mode, select ‘Automatically Manage’
97
+
1. In the Permissions Management portal, click the cog on the top right-hand side.
98
+
1.Go to the **Data Collectors**tab.
99
+
1. Ensure **Azure** is selected.
100
+
1. Click **Create Configuration.**
101
+
1. For onboarding mode, select **Automatically Manage.**
102
102
103
103
> [!NOTE]
104
104
> The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. You can do this manually in the Entra console, or programmatically with PowerShell or the Azure CLI.
105
105
106
-
- Once complete, Click ‘Verify Now & Save’
106
+
- Once complete, Click **Verify Now & Save.**
107
107
108
108
To view status of onboarding after saving the configuration:
109
109
110
-
1.Navigate to newly create Data Collector row under Azure data collectors.
111
-
1. Click on Status column when the row has “Pending” status
110
+
1.Go to newly create Data Collector row under Azure data collectors.
111
+
1. Click on Status column when the row has **Pending** status
112
112
1. To onboard and start collection, choose specific ones subscriptions from the detected list and consent for collection.
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-enable-controller-after-onboarding.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: ciem
9
9
ms.workload: identity
10
10
ms.topic: how-to
11
-
ms.date: 08/24/2023
11
+
ms.date: 09/13/2023
12
12
ms.author: jfields
13
13
---
14
14
@@ -32,9 +32,9 @@ This article also describes how to disable the controller in Microsoft Azure and
32
32
> [!NOTE]
33
33
> You can enable the controller in AWS if you disabled it during onboarding. Once you enable the controller in AWS, you can’t disable it.
34
34
35
-
1.Sign in to the AWS console of the member account in a separate browser window.
36
-
1. Go to the Permissions Management home page, select **Settings** (the gear icon), and then select the **Data Collectors** subtab.
37
-
1. On the **Data Collectors** dashboard, select **AWS**, and then select **Create Configuration**.
35
+
1.In a separate browser window, sign in to the AWS console of the member account.
36
+
1. Go to the Permissions Management home page, select **Settings** (the gear icon), then select the **Data Collectors** subtab.
37
+
1. On the **Data Collectors** dashboard, select **AWS**, then select **Create Configuration**.
38
38
1. On the **Permissions Management Onboarding - AWS Member Account Details** page, select **Launch Template**.
39
39
40
40
The **AWS CloudFormation create stack** page opens, displaying the template.
@@ -52,7 +52,7 @@ This article also describes how to disable the controller in Microsoft Azure and
52
52
This AWS CloudFormation stack creates a collection role in the member account with necessary permissions (policies) for data collection. A trust policy is set on this role to allow the OIDC role created in your AWS OIDC account to access it. These entities are listed in the **Resources** tab of your CloudFormation stack.
53
53
54
54
1. Return to Permissions Management, and on the Permissions Management **Onboarding - AWS Member Account Details** page, select **Next**.
55
-
1. On **Permissions Management Onboarding – Summary** page, review the information you've added, and then select **Verify Now & Save**.
55
+
1. On **Permissions Management Onboarding – Summary** page, review the information you've added, then select **Verify Now & Save**.
56
56
57
57
The following message appears: **Successfully created configuration.**
58
58
@@ -70,13 +70,13 @@ You can enable or disable the controller in Azure at the Subscription level of y
70
70
- If you have read-only permission, the **Role** column displays **Reader**.
71
71
- If you have administrative permission, the **Role** column displays **User Access Administrator**.
72
72
73
-
1. To add the administrative role assignment, return to the **Access control (IAM)** page, and then select **Add role assignment**.
73
+
1. To add the administrative role assignment, return to the **Access control (IAM)** page, then select **Add role assignment**.
74
74
1. Add or remove the role assignment for Cloud Infrastructure Entitlement Management.
75
75
76
-
1. Go to the Permissions Management home page, select **Settings** (the gear icon), and then select the **Data Collectors** subtab.
77
-
1. On the **Data Collectors** dashboard, select **Azure**, and then select **Create Configuration**.
78
-
1. On the **Permissions Management Onboarding - Azure Subscription Details** page, enter the **Subscription ID**, and then select **Next**.
79
-
1. On **Permissions Management Onboarding – Summary** page, review the controller permissions, and then select **Verify Now & Save**.
76
+
1. Go to the Permissions Management home page, select **Settings** (the gear icon), then select the **Data Collectors** subtab.
77
+
1. On the **Data Collectors** dashboard, select **Azure**, then select **Create Configuration**.
78
+
1. On the **Permissions Management Onboarding - Azure Subscription Details** page, enter the **Subscription ID**, then select **Next**.
79
+
1. On **Permissions Management Onboarding – Summary** page, review the controller permissions, then select **Verify Now & Save**.
80
80
81
81
The following message appears: **Successfully Created Configuration.**
82
82
@@ -93,12 +93,12 @@ You can enable or disable the controller in Azure at the Subscription level of y
93
93
94
94
1. Optionally, execute ``mciem-enable-gcp-api.sh`` to enable all recommended GCP APIs.
95
95
96
-
1. Go to the Permissions Management home page, select **Settings** (the gear icon), and then select the **Data Collectors** subtab.
96
+
1. Go to the Permissions Management home page, select **Settings** (the gear icon), then select the **Data Collectors** subtab.
97
97
1. On the **Data Collectors** dashboard, select **GCP**, and then select **Create Configuration**.
98
98
1. On the **Permissions Management Onboarding - Azure AD OIDC App Creation** page, select **Next**.
99
99
1. On the **Permissions Management Onboarding - GCP OIDC Account Details & IDP Access** page, enter the **OIDC Project Number** and **OIDC Project ID**, and then select **Next**.
100
-
1. On the **Permissions Management Onboarding - GCP Project IDs** page, enter the **Project IDs**, and then select **Next**.
101
-
1. On the **Permissions Management Onboarding – Summary** page, review the information you've added, and then select **Verify Now & Save**.
100
+
1. On the **Permissions Management Onboarding - GCP Project IDs** page, enter the **Project IDs**, then select **Next**.
101
+
1. On the **Permissions Management Onboarding – Summary** page, review the information you've added, then select **Verify Now & Save**.
102
102
103
103
The following message appears: **Successfully Created Configuration.**
0 commit comments