Skip to content

Commit 93c033d

Browse files
committed
Acrolinx edits
1 parent 31df10b commit 93c033d

File tree

2 files changed

+18
-17
lines changed

2 files changed

+18
-17
lines changed

articles/active-directory/cloud-infrastructure-entitlement-management/permissions-management-quickstart-guide.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ If the above points are met, continue with:
4040

4141
1. [Enable Microsoft Entra Permissions Management in your organization](onboard-enable-tenant.md)
4242

43-
Ensure you are a *Global Administrator* or *Permissions Management Administrator*. Learn more about [Permissions Management roles and permissions](product-roles-permissions.md).
43+
Ensure you're a *Global Administrator* or *Permissions Management Administrator*. Learn more about [Permissions Management roles and permissions](product-roles-permissions.md).
4444

4545

4646
## Step 2: Onboard your multicloud environment
@@ -62,7 +62,7 @@ The controller gives you the choice to determine the level of access you grant t
6262

6363
> [!NOTE]
6464
> If you don't enable the controller during onboarding, you have the option to enable it after onboarding is complete. To set the controller in Permissions Management after onboarding, see [Enable or disable the controller after onboarding](onboard-enable-controller-after-onboarding.md).
65-
> For AWS environments, once you've enabled the controller, you *cannot* disable it.
65+
> For AWS environments, once you have enabled the controller, you *cannot* disable it.
6666
6767
To set the controller settings during onboarding:
6868
1. Select **Enable** to give read and write access to Permissions Management.
@@ -90,7 +90,7 @@ To configure data collection:
9090
3. Click **Create configuration**.
9191

9292
### Onboard Amazon Web Services (AWS)
93-
Since Permissions Management is hosted on Microsoft Entra, there are additional steps to take to onboard your AWS environment.
93+
Since Permissions Management is hosted on Microsoft Entra, there are more steps to take to onboard your AWS environment.
9494

9595
To connect AWS to Permissions Management, you must create an Entra ID application in the Entra admin center tenant where Permissions Management is enabled. This Entra ID application is used to set up an OIDC connection to your AWS environment.
9696

@@ -104,11 +104,11 @@ Account IDs and roles for:
104104
- AWS OIDC account: An AWS member account designated by you to create and host the OIDC connection through an OIDC IdP
105105
- AWS Logging account (optional but recommended)
106106
- AWS Management account (optional but recommended)
107-
- AWS member accounts to be monitored and managed by Permissions Management (for manual mode)
107+
- AWS member accounts monitored and managed by Permissions Management (for manual mode)
108108

109109
To use **Automatic** or **Select** data collection modes, you must connect your AWS Management account.
110110

111-
During this step, you have the option to enable the controller by entering the name of the S3 bucket with AWS CloudTrail activity logs (found on AWS Trails).
111+
During this step, you can enable the controller by entering the name of the S3 bucket with AWS CloudTrail activity logs (found on AWS Trails).
112112

113113
To onboard your AWS environment and configure data collection, see [Onboard an Amazon Web Services (AWS) account](onboard-aws.md).
114114

@@ -160,9 +160,9 @@ To onboard your GCP environment and configure data collection, see [Onboard a GC
160160

161161
## Summary
162162

163-
Congratulations! You've finished configuring data collection for your environment(s), and the data collection process has begun.
163+
Congratulations! You have finished configuring data collection for your environment(s), and the data collection process has begun.
164164

165-
The status column in your Permissions Management UI shows you which step of data collection you are at.
165+
The status column in your Permissions Management UI shows you which step of data collection you're at.
166166

167167

168168
- **Pending**: Permissions Management has not started detecting or onboarding yet.
Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
title: Permissions Management required roles and permissions
33
description: Review roles and the level of permissions assigned in Microsoft Entra Permissions Management.
4+
# customerintent: As a cloud administer, I want to understand Permissions Management role assignments, so that I can effectively assign the correct permissions to users.
45
services: active-directory
56
author: jenniferf-skc
67
manager: amycolannino
@@ -13,30 +14,30 @@ ms.author: jfields
1314
---
1415

1516

16-
# [Microsoft Entra Admin Center built-in roles](../azure/active-directory/roles/permissions-reference.md)
17+
# Microsoft Entra admin center built-in roles
1718

18-
In Microsoft Entra and Microsoft Entra Permissions Management, assigned roles give users different levels of access to monitor and take action in multicloud environments. In the Microsoft Entra Admin Center, review a list of identities assigned to a privileged role and learn more about the level of permissions given to users assigned roles in your organization.
19+
In Microsoft Azure and Microsoft Entra Permissions Management, assigned roles give users different levels of access to monitor and take action in multicloud environments. In the [Microsoft Entra admin center built-in roles](../roles/permissions-reference.md), review a list of identities assigned to a privileged role and learn more about the level of permissions given to users assigned roles in your organization.
1920

2021
- **Global Administrator**: Manages all aspects of Entra Admin Center and Microsoft services that use Entra Admin Center identities.
2122
- **Billing Administrator**: Performs common billing related tasks like updating payment information.
2223
- **Permissions Management Administrator**: Manages all aspects of Entra Permissions Management.
2324

24-
# Permissions Management roles and permissions levels
25+
## Permissions Management roles and permissions levels
2526

2627
## Enabling Permissions Management
2728
- To activate a trial or purchase a license, you must have *Global Administrator* or *Billing Administrator* permissions.
2829

2930
## Onboarding your Amazon Web Service (AWS), Microsoft Entra, or Google Cloud Platform (GCP) environments
3031

3132
- To configure data collection, you must have *Permissions Management Administrator* or *Global Administrator* permissions.
32-
- A user with the ability to create a new app registration in Azure (needed to facilitate the OIDC connection) will be needed for AWS and GCP onboarding.
33+
- A user with *Global Administrator* or *Permissions Management Administrator* role assignments is required for AWS and GCP onboarding.
3334

3435
## Notes on permissions and roles in Permissions Management
3536

3637
- Users can have the following permissions:
3738
- Admin for all authorization system types
3839
- Admin for selected authorization system types
39-
- If a user is not an admin, they are assigned Entra Admin Center security group-based, fine-grained permissions for all or selected authorization system types:
40+
- If a user isn't an admin, they're assigned Entra Admin Center security group-based, fine-grained permissions for all or selected authorization system types:
4041
- Viewers: View only access to scoped cloud accounts. View the specified AWS accounts, Entra subscriptions, and GCP projects
4142
- Controller: Modify Cloud Infrastructure Entitlement Management (CIEM) properties and use the Remediation dashboard.
4243
- Approvers: Able to approve permission requests
@@ -46,21 +47,21 @@ In Microsoft Entra and Microsoft Entra Permissions Management, assigned roles gi
4647
## Permissions Management actions and required roles
4748

4849
Remediation
49-
- To view the Remediation tab, you must have Viewer, Controller, or Approver permissions.
50-
- To make changes in the Remediation tab, you much have Controller or Approver permissions.
50+
- To view the Remediation tab, you must have *Viewer*, *Controller*, or *Approver* permissions.
51+
- To make changes in the **Remediation** tab, you must have *Controller* or *Approver* permissions.
5152

5253
Autopilot
53-
- To view and make changes in the Autopilot tab, you must be a Permissions Management Administrator.
54+
- To view and make changes in the **Autopilot** tab, you must be a *Permissions Management Administrator*.
5455

5556
Alert
56-
- Any user (admin, non-admin) can create an alert.
57+
- Any user (admin, nonadmin) can create an alert.
5758
- Only the user who creates the alert can edit, rename, deactivate, or delete the alert.
5859

5960
Manage users or groups
6061
- Only the owner of a group can add or remove a user from the group.
6162
- Managing users and groups is only done in the Entra Admin Center.
6263

6364

64-
# Next steps
65+
## Next steps
6566

6667
- For information about managing roles, policies and permissions requests in your organization, see [View roles/policies and requests for permission in the Remediation dashboard](ui-remediation.md).

0 commit comments

Comments
 (0)