You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-overview.md
+14-10Lines changed: 14 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,10 +12,11 @@ ms.tgt_pltfrm: na
12
12
ms.devlang: na
13
13
ms.topic: overview
14
14
ms.subservice: compliance
15
-
ms.date: 06/18/2020
15
+
ms.date: 08/25/2020
16
16
ms.author: barclayn
17
17
ms.reviewer: markwahl-msft
18
18
ms.collection: M365-identity-device-management
19
+
ms.custom: contperfq1
19
20
20
21
21
22
#Customer intent: As a administrator, I want learn about entitlement management so that see how I can use it to manage access to resources in my organization.
Azure Active Directory (Azure AD) entitlement management is an [identity governance](identity-governance-overview.md) feature that enables organizations to manage identity and access lifecycle at scale, by automating access request workflows, access assignments, reviews, and expiration.
27
28
28
-
Employees in organizations need access to various groups, applications, and sites to perform their job. Managing this access is challenging, as requirements change - new applications are added or users need additional access rights. This scenario gets more complicated when you collaborate with outside organizations - you may not know who in the other organization needs access to your organization's resources, and they won't know what applications, groups or sites your organization is using.
29
+
Employees in organizations need access to various groups, applications, and sites to perform their job. Managing this access is challenging, as requirements change - new applications are added or users need additional access rights. This scenario gets more complicated when you collaborate with outside organizations - you may not know who in the other organization needs access to your organization's resources, and they won't know what applications, groups, or sites your organization is using.
29
30
30
31
Azure AD entitlement management can help you more efficiently manage access to groups, applications, and SharePoint Online sites for internal users, and also for users outside your organization who need access to those resources.
31
32
@@ -52,7 +53,10 @@ Here are some of capabilities of entitlement management:
52
53
- Delegate to non-administrators the ability to create access packages. These access packages contain resources that users can request, and the delegated access package managers can define policies with rules for which users can request, who must approve their access, and when access expires.
53
54
- Select connected organizations whose users can request access. When a user who is not yet in your directory requests access, and is approved, they are automatically invited into your directory and assigned access. When their access expires, if they have no other access package assignments, their B2B account in your directory can be automatically removed.
54
55
55
-
You can get started with our [tutorial to create your first access package](entitlement-management-access-package-first.md). You can also read the [common scenarios](entitlement-management-scenarios.md), or watch videos, including
56
+
>[!NOTE]
57
+
>If you are ready to try Entitlement management you can get started with our [tutorial to create your first access package](entitlement-management-access-package-first.md).
58
+
59
+
You can also read the [common scenarios](entitlement-management-scenarios.md), or watch videos, including
56
60
57
61
-[How to deploy Azure AD entitlement management in your organization](https://www.youtube.com/watch?v=zaaKvaaYwI4)
58
62
-[How to monitor and scale your use of Azure AD entitlement management](https://www.youtube.com/watch?v=omtNJ7ySjS0)
@@ -66,7 +70,7 @@ Entitlement management introduces to Azure AD the concept of an *access package*
66
70
67
71
- Membership of Azure AD security groups
68
72
- Membership of Microsoft 365 Groups and Teams
69
-
- Assignment to Azure AD enterprise applications, including SaaS applications and custom-integrated applications that support federation/single signon and/or provisioning
73
+
- Assignment to Azure AD enterprise applications, including SaaS applications and custom-integrated applications that support federation/single sign-on and/or provisioning
70
74
- Membership of SharePoint Online sites
71
75
72
76
You can also control access to other resources that rely upon Azure AD security groups or Microsoft 365 Groups. For example:
@@ -97,16 +101,16 @@ The following diagram shows an example of the different elements in entitlement
97
101
98
102
## When should I use access packages?
99
103
100
-
Access packages do not replace other mechanisms for access assignment. They are most appropriate in situations such as the following:
104
+
Access packages do not replace other mechanisms for access assignment. They are most appropriate in situations such as:
101
105
102
-
- Employees need time-limited access for a particular task. For example, you might use group-based licensing and a dynamic group to ensure all employees have an Exchange Online mailbox, and then use access packages for situations in which employees need additional access,such as to read departmental resources from another department.
103
-
- Access needs to be approved by an employee's manager or other designated individuals.
106
+
- Employees need time-limited access for a particular task. For example, you might use group-based licensing and a dynamic group to ensure all employees have an Exchange Online mailbox, and then use access packages for situations in which employees need additional access,such as to read departmental resources from another department.
107
+
- Access that requires the approval of an employee's manager or other designated individuals.
104
108
- Departments wish to manage their own access policies for their resources without IT involvement.
105
109
- Two or more organizations are collaborating on a project, and as a result, multiple users from one organization will need to be brought in via Azure AD B2B to access another organization's resources.
106
110
107
111
## How do I delegate access?
108
112
109
-
Access packages are defined in containers called *catalogs*. You can have a single catalog for all your access packages, or you can designate individuals to create and own their own catalogs. An administrator can add resources to any catalog, but a non-administrator can only add to a catalog the resources which they own. A catalog owner can add other users as catalog co-owners, or as access package managers. These scenarios are described further in the article [delegation and roles in Azure AD entitlement management](entitlement-management-delegate.md).
113
+
Access packages are defined in containers called *catalogs*. You can have a single catalog for all your access packages, or you can designate individuals to create and own their own catalogs. An administrator can add resources to any catalog, but a non-administrator can only add to a catalog the resources that they own. A catalog owner can add other users as catalog co-owners, or as access package managers. These scenarios are described further in the article [delegation and roles in Azure AD entitlement management](entitlement-management-delegate.md).
110
114
111
115
## Summary of terminology
112
116
@@ -119,7 +123,7 @@ To better understand entitlement management and its documentation, you can refer
119
123
| assignment | An assignment of an access package to a user ensures the user has all the resource roles of that access package. Access package assignments typically have a time limit before they expire. |
120
124
| catalog | A container of related resources and access packages. Catalogs are used for delegation, so that non-administrators can create their own access packages. Catalog owners can add resources they own to a catalog. |
121
125
| catalog creator | A collection of users who are authorized to create new catalogs. When a non-administrator user who is authorized to be a catalog creator creates a new catalog, they automatically become the owner of that catalog. |
122
-
| connected organization |A external Azure AD directory or domain that you have a relationship with. The users from a connected organization can be specified in a policy as being allowed to request access. |
126
+
| connected organization |An external Azure AD directory or domain that you have a relationship with. The users from a connected organization can be specified in a policy as being allowed to request access. |
123
127
| policy | A set of rules that defines the access lifecycle, such as how users get access, who can approve, and how long users have access through an assignment. A policy is linked to an access package. For example, an access package could have two policies - one for employees to request access and a second for external users to request access. |
124
128
| resource | An asset, such as an Office group, a security group, an application, or a SharePoint Online site, with a role that a user can be granted permissions to. |
125
129
| resource directory | A directory that has one or more resources to share. |
@@ -147,7 +151,7 @@ Azure AD Premium P2 licenses are **not** required for the following tasks:
147
151
- No licenses are required for users who have been delegated administrative tasks, such as catalog creator, catalog owner, and access package manager.
148
152
- No licenses are required for guests who **can** request access packages, but do **not** request an access package.
149
153
150
-
For each paid Azure AD Premium P2 license that you purchase for your member users (employees), you can use Azure AD B2B to invite up to 5 guest users. These guest users can also use Azure AD Premium P2 features. For more information, see [Azure AD B2B collaboration licensing guidance](../external-identities/licensing-guidance.md).
154
+
For each paid Azure AD Premium P2 license that you purchase for your member users (employees), you can use Azure AD B2B to invite up to five guest users. These guest users can also use Azure AD Premium P2 features. For more information, see [Azure AD B2B collaboration licensing guidance](../external-identities/licensing-guidance.md).
151
155
152
156
For more information about licenses, see [Assign or remove licenses using the Azure Active Directory portal](../fundamentals/license-users-groups.md).
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/groups-assign-member-owner.md
+12-18Lines changed: 12 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.topic: conceptual
11
11
ms.tgt_pltfrm: na
12
12
ms.workload: identity
13
13
ms.subservice: pim
14
-
ms.date: 07/27/2020
14
+
ms.date: 08/18/2020
15
15
ms.author: curtand
16
16
ms.custom: pim
17
17
ms.collection: M365-identity-device-management
@@ -28,19 +28,14 @@ Azure Active Directory (Azure AD) Privileged Identity Management (PIM) can help
28
28
29
29
Follow these steps to make a user eligible to be a member or owner of a privileged access group.
30
30
31
-
1. Sign in to [Privileged Identity Management](https://portal.azure.com/) in the Azure portal with [Privileged role administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator) role permissions.
31
+
1.[Sign in to Azure AD](https://aad.portal.azure.com) with Global Administrator or group Owner permissions.
32
+
1. Select **Groups** and then select the role-assignable group you want to manage. You can search or filter the list.
32
33
33
-
For information about how to grant another administrator access to manage Privileged Identity Management, see [Grant access to other administrators to manage Privileged Identity Management](pim-how-to-give-access-to-pim.md).
34
+

34
35
35
-
1. Open **Azure AD Privileged Identity Management**.
36
+
1. Open the group and select **Privileged access (Preview)**.
36
37
37
-
1. Select **Privileged access (Preview)**.
38
-
39
-
1. You can search for a group name and use the **Group type** to filter the list to select the group you want to manage.
40
-
41
-

42
-
43
-
1. Under **Manage**, select **Assignments**.
38
+

44
39
45
40
1. Select **Add assignments**.
46
41
@@ -72,21 +67,20 @@ Follow these steps to make a user eligible to be a member or owner of a privileg
72
67
73
68
Follow these steps to update or remove an existing role assignment.
74
69
75
-
1. Open **Azure AD Privileged Identity Management**.
76
-
77
-
1. Select **Privileged access (Preview)**.
70
+
1.[Sign in to Azure AD](https://aad.portal.azure.com) with Global Administrator or group Owner permissions.
71
+
1. Select **Groups** and then select the role-assignable group you want to manage. You can search or filter the list.
78
72
79
-
1. You can search for a group name and use the **Group type**to filter the list to select the group you want to manage.
73
+

80
74
81
-

75
+
1. Open the group and select **Privileged access (Preview)**.
82
76
83
-
1. Under **Manage**, select **Assignments**.
77
+

84
78
85
79
1. Select the role that you want to update or remove.
86
80
87
81
1. Find the role assignment on the **Eligible roles** or **Active roles** tabs.
88
82
89
-

83
+

90
84
91
85
1. Select **Update** or **Remove** to update or remove the role assignment.
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/groups-discover-groups.md
+12-8Lines changed: 12 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Identify a group to manage in Privileged Identity Management - Azure AD | Microsoft Docs
3
-
description: Learn how to onboard role-assignable groups to manage as privileged access groups in Privileged Identity Management (PIM).
2
+
title: Manage role-assignable groups as privileged access groups - Azure AD | Microsoft Docs
3
+
description: Consent to onboard role-assignable groups to manage as privileged access groups in Privileged Identity Management (PIM).
4
4
services: active-directory
5
5
documentationcenter: ''
6
6
author: curtand
@@ -11,34 +11,38 @@ ms.topic: how-to
11
11
ms.tgt_pltfrm: na
12
12
ms.workload: identity
13
13
ms.subservice: pim
14
-
ms.date: 08/03/2020
14
+
ms.date: 08/17/2020
15
15
ms.author: curtand
16
16
ms.collection: M365-identity-device-management
17
17
---
18
18
19
-
# Bring a privileged access groups (preview) into Privileged Identity Management
19
+
# Manage privileged access groups (preview) in Privileged Identity Management
20
20
21
21
In Azure Active Directory (Azure AD), you can assign Azure AD built-in roles to cloud groups to simplify how you manage role assignments. To protect Azure AD roles and to secure access, you can now use Privileged Identity Management (PIM) to manage just-in-time access for members or owners of these groups. To manage an Azure AD role-assignable group as a privileged access group in Privileged Identity Management, you must bring it under management in PIM.
22
22
23
23
## Identify groups to manage
24
24
25
-
You can create a role-assignable group in Azure AD as described in [Create a role-assignable group in Azure Active Directory](../users-groups-roles/roles-groups-create-eligible.md). You have be an owner of the group to bring it under management with Privileged Identity Management.
25
+
You can create a role-assignable group in Azure AD as described in [Create a role-assignable group in Azure Active Directory](../users-groups-roles/roles-groups-create-eligible.md). You have be an owner of the group to bring it under management in Privileged Identity Management.
26
26
27
-
1.[Sign in to Azure AD](https://aad.portal.azure.com) with Privileged Role Administrator role permissions.
28
-
1. Select **Groups** and then select the role-assignable group you want to manage in PIM. You can search and filter the list.
27
+
1.[Sign in to Azure AD](https://aad.portal.azure.com) with Privileged Role Administrator permissions.
28
+
1. Select **Groups** and then select the role-assignable group you want to manage. You can search or filter the list.
29
29
30
30

31
31
32
32
1. Open the group and select **Privileged access (Preview)**.
33
33
34
34

35
35
36
+
1. If your groups hasn't yet been brought under management in PIM, select **Enable privileged access** to consent to management. Only the Global Administrator or Owner of a group can give this consent.
37
+
38
+

39
+
36
40
1. Start managing assignments in PIM.
37
41
38
42

39
43
40
44
> [!NOTE]
41
-
> Once a privileged access group is managed, it can't be taken out of management. This prevents another resource administrator from removing Privileged Identity Management settings.
45
+
> Once a privileged access group is managed, it can't be taken out of management. This prevents another administrator from removing Privileged Identity Management settings.
0 commit comments