You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-group-licenses.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,13 +3,13 @@ title: Manage the lifecycle of group-based licenses in Azure AD
3
3
description: This step-by-step tutorial shows how to create an access package for managing group-based licenses in entitlement management.
4
4
services: active-directory
5
5
documentationCenter: ''
6
-
author: sama
6
+
author: owinfreyATL
7
7
ms.service: active-directory
8
8
ms.workload: identity
9
9
ms.tgt_pltfrm: na
10
10
ms.topic: tutorial
11
11
ms.subservice: compliance
12
-
ms.date: 01/25/2023
12
+
ms.date: 05/25/2023
13
13
ms.author: owinfrey
14
14
ms.collection: M365-identity-device-management
15
15
@@ -60,7 +60,7 @@ For more information, see [License requirements](entitlement-management-overview
60
60
61
61
1. Select **Next: Requests** to go to the **Requests** tab.
62
62
63
-
On this tab, you create a request policy. A *policy* defines the rules for access to an access package. You'll create a policy that allows employees in the resource directory to request the access package.
63
+
On this tab, you create a request policy. A *policy* defines the rules for access to an access package. You create a policy that allows employees in the resource directory to request the access package.
64
64
65
65
3. In the **Users who can request access** section, select **For users in your directory** and then select **All members (excluding guests)**. These settings make it so that only members of your directory can request Office licenses.
66
66
@@ -90,16 +90,16 @@ For more information, see [License requirements](entitlement-management-overview
90
90
91
91
2. In the **Expiration** section, for **Access package assignments expire**, select **Number of days**.
92
92
93
-
3. In **Assignments expire after**, enter **365**. This box specifies when members who have access to the access package will need to renew their access.
93
+
3. In **Assignments expire after**, enter **365**. This box specifies when members who have access to the access package needs to renew their access.
94
94
95
95
4. You can also configure access reviews, which allow periodic checks of whether the employee still needs access to the access package. A review can be a self-review performed by the employee. Or you can set the employee's manager or another person as the reviewer. For more information, see [Access reviews](entitlement-management-access-reviews-create.md).
96
96
97
97
In this scenario, you want all employees to review whether they still need a license for Office each year.
98
98
99
99
1. Under **Require access reviews**, select **Yes**.
100
-
2. You can leave **Starting on** set to the current date. This date is when the access review will start. After you create an access review, you can't update its start date.
101
-
3. Under **Review frequency**, select **Annually**, because the review will occur once per year. The **Review frequency** box is where you determine how often the access review runs.
102
-
4. Specify a **Duration (in days)**. The duration box is where you indicate how many days each occurrence of the access review series will run.
100
+
2. You can leave **Starting on** set to the current date. This date is when the access review starts. After you create an access review, you can't update its start date.
101
+
3. Under **Review frequency**, select **Annually**, because the review occurs once per year. The **Review frequency** box is where you determine how often the access review runs.
102
+
4. Specify a **Duration (in days)**. The duration box is where you indicate how many days each occurrence of the access review series runs.
Copy file name to clipboardExpand all lines: articles/active-directory/governance/identity-governance-organizational-roles.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,16 +3,16 @@ title: Govern access with an organizational role model
3
3
description: Microsoft Entra Identity Governance allows you to model organizational roles using access packages, so you can migrate your existing role definitions to entitlement management.
4
4
services: active-directory
5
5
documentationcenter: ''
6
-
author: markwahl-msft
6
+
author: owinfreyATL
7
7
manager: amycolannino
8
8
editor: markwahl-msft
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.tgt_pltfrm: na
12
12
ms.topic: conceptual
13
13
ms.subservice: compliance
14
-
ms.date: 12/1/2022
15
-
ms.author: mwahl
14
+
ms.date: 05/26/2023
15
+
ms.author: owinfrey
16
16
ms.reviewer: markwahl-msft
17
17
ms.collection: M365-identity-device-management
18
18
---
@@ -49,9 +49,9 @@ For example, an organization may have an existing organizational role model simi
49
49
|Role Name|Permissions the role provides|Automatic assignment to the role|Request-based assignment to the role|Separation of duties checks|
50
50
|:--|-|-|-|-|
51
51
|*Salesperson*|Member of **Sales** Team|Yes|No|None|
52
-
|*Sales Solution Manager*|The permissions of *Salesperson*, and **Solution manager** app role in the Sales application|None|A salesperson can request, requires manager approval and quarterly review|Requestor cannot be a *Sales Account Manager*|
53
-
|*Sales Account Manager*|The permissions of *Salesperson*, and **Account manager** app role in the Sales application|None|A salesperson can request, requires manager approval and quarterly review|Request cannot be a *Sales Solution Manager*|
54
-
|*Sales Support*|Same permissions as a *Salesperson*|None|Any non-salesperson can request, requires manager approval and quarterly review|Requestor cannot be a *Salesperson*|
52
+
|*Sales Solution Manager*|The permissions of *Salesperson*, and **Solution manager** app role in the Sales application|None|A salesperson can request, requires manager approval and quarterly review|Requestor can't be a *Sales Account Manager*|
53
+
|*Sales Account Manager*|The permissions of *Salesperson*, and **Account manager** app role in the Sales application|None|A salesperson can request, requires manager approval and quarterly review|Request can't be a *Sales Solution Manager*|
54
+
|*Sales Support*|Same permissions as a *Salesperson*|None|Any nonsalesperson can request, requires manager approval and quarterly review|Requestor can't be a *Salesperson*|
55
55
56
56
This could be represented in Entra Identity Governance as an access package catalog containing four access packages.
57
57
@@ -66,29 +66,29 @@ The next sections outline the process for migration, creating the Azure AD and M
66
66
67
67
### Connect apps whose permissions are referenced in the organizational roles to Azure AD
68
68
69
-
If your organizational roles are used to assign permissions that control access to non-Microsoft SaaS apps, on-premises apps or your own cloud apps, then you will need to connect your applications to Azure AD.
69
+
If your organizational roles are used to assign permissions that control access to non-Microsoft SaaS apps, on-premises apps or your own cloud apps, then you'll need to connect your applications to Azure AD.
70
70
71
71
In order for an access package representing an organizational role to be able to refer to an application's roles as the permissions to include in the role, for an application that has multiple roles and supports modern standards such as SCIM, you should [integrate the application with Azure AD](identity-governance-applications-integrate.md) and ensure that the application's roles are listed in the application manifest.
72
72
73
-
If the application only has a single role, then you should still [integrated the application with Azure AD](identity-governance-applications-integrate.md). For applications that do not support SCIM, Azure AD can write users into an application's existing directory or SQL database, or add AD users into an AD group.
73
+
If the application only has a single role, then you should still [integrated the application with Azure AD](identity-governance-applications-integrate.md). For applications that don't support SCIM, Azure AD can write users into an application's existing directory or SQL database, or add AD users into an AD group.
74
74
75
75
### Populate Azure AD schema used by apps and for user scoping rules in the organizational roles
76
76
77
-
If your role definitions include statements of the form "all users with these attribute values get assigned to the role automatically" or "users with these attribute values are allowed to request", then you will need to ensure those attributes are present in Azure AD.
77
+
If your role definitions include statements of the form "all users with these attribute values get assigned to the role automatically" or "users with these attribute values are allowed to request", then you'll need to ensure those attributes are present in Azure AD.
78
78
79
79
You can [extend the Azure AD schema](../app-provisioning/user-provisioning-sync-attributes-for-mapping.md) and then populate those attributes either from on-premises AD, via Azure AD Connect, or from an HR system such as Workday or SuccessFactors.
80
80
81
81
### Create catalogs for delegation
82
82
83
-
If the ongoing maintenance of roles is delegated, then you can delegate the administration of access packages by [creating a catalog](entitlement-management-catalog-create.md) for each part of the organization you will be delegating to.
83
+
If the ongoing maintenance of roles is delegated, then you can delegate the administration of access packages by [creating a catalog](entitlement-management-catalog-create.md) for each part of the organization you'll be delegating to.
84
84
85
85
If you have multiple catalogs to create, you can use a PowerShell script to [create each catalog](entitlement-management-catalog-create.md#create-a-catalog-with-powershell).
86
86
87
-
If you are not planning to delegate the administration of the access packages, then you can keep the access packages in a single catalog.
87
+
If you aren't planning to delegate the administration of the access packages, then you can keep the access packages in a single catalog.
88
88
89
89
### Add resources to the catalogs
90
90
91
-
Now that you have the catalogs identified, then [add the applications, groups or sites](entitlement-management-catalog-create.md#add-resources-to-a-catalog) that will be included in the access packages representing the organization roles to the catalogs.
91
+
Now that you have the catalogs identified, then [add the applications, groups or sites](entitlement-management-catalog-create.md#add-resources-to-a-catalog) that are included in the access packages representing the organization roles to the catalogs.
92
92
93
93
If you have many resources, you can use a PowerShell script to [add each resource to a catalog](entitlement-management-catalog-create.md#add-a-resource-to-a-catalog-with-powershell).
94
94
@@ -98,13 +98,13 @@ Each organizational role definition can be represented with an [access package](
98
98
99
99
You can use a PowerShell script to [create an access package in a catalog](entitlement-management-access-package-create.md#create-an-access-package-with-microsoft-powershell).
100
100
101
-
Once you've created an access package, then you'll link one or more of the roles of the resources in the catalog to the access package. This represents the permissions of the organizational role.
101
+
Once you've created an access package, then you link one or more of the roles of the resources in the catalog to the access package. This represents the permissions of the organizational role.
102
102
103
103
In addition, you'll [create a policy for direct assignment](entitlement-management-access-package-request-policy.md#none-administrator-direct-assignments-only), as part of that access package that can be used to track the users who already have individual organizational role assignments.
104
104
105
105
### Create access package assignments for existing individual organizational role assignments
106
106
107
-
If some of your users already have organizational role memberships, that they would not receive via automatic assignment, then you should [create direct assignments](entitlement-management-access-package-assignments.md#directly-assign-a-user) for those users to the corresponding access packages.
107
+
If some of your users already have organizational role memberships, that they wouldn't receive via automatic assignment, then you should [create direct assignments](entitlement-management-access-package-assignments.md#directly-assign-a-user) for those users to the corresponding access packages.
108
108
109
109
If you have many users who need assignments, you can use a PowerShell script to [assign each user to an access package](entitlement-management-access-package-assignments.md#assign-a-user-to-an-access-package-with-powershell). This would link the users to the direct assignment policy.
110
110
@@ -122,7 +122,7 @@ For each access package that is to be marked as incompatible with another, you c
122
122
123
123
### Add policies to access packages for users to be allowed to request
124
124
125
-
If users who do not already have an organizational role are allowed to request and be approved to take on a role, then you can also configure entitlement management to allow users to request an access package. You can [add additional policies to an access package](entitlement-management-access-package-request-policy.md#choose-between-one-or-multiple-policies), and in each policy specify which users can request and who must approve.
125
+
If users who don't already have an organizational role are allowed to request and be approved to take on a role, then you can also configure entitlement management to allow users to request an access package. You can [add additional policies to an access package](entitlement-management-access-package-request-policy.md#choose-between-one-or-multiple-policies), and in each policy specify which users can request and who must approve.
126
126
127
127
### Configure access reviews in access package assignment policies
Copy file name to clipboardExpand all lines: articles/active-directory/governance/workflows-faqs.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,20 +2,20 @@
2
2
title: 'Lifecycle workflows FAQs (preview)'
3
3
description: Frequently asked questions about Lifecycle workflows (preview).
4
4
services: active-directory
5
-
author: amsliu
5
+
author: owinfreyATL
6
6
manager: amycolannino
7
7
ms.service: active-directory
8
8
ms.workload: identity
9
9
ms.topic: how-to
10
10
ms.subservice: compliance
11
-
ms.date: 07/14/2022
11
+
ms.date: 05/26/2023
12
12
ms.author: amsliu
13
13
ms.reviewer: krbain
14
14
ms.custom: template-tutorial
15
15
---
16
16
# Lifecycle workflows - FAQs (preview)
17
17
18
-
In this article you will find questions to commonly asked questions about [Lifecycle Workflows](what-are-lifecycle-workflows.md). Please check back to this page frequently as changes happen often, and answers are continually being added.
18
+
In this article, you'll find questions to commonly asked questions about [Lifecycle Workflows](what-are-lifecycle-workflows.md). Check back to this page frequently as changes happen often, and answers are continually being added.
19
19
20
20
## Frequently asked questions
21
21
@@ -28,7 +28,7 @@ For a small portion of our customers, Lifecycle Workflows may still be listed un
28
28
29
29
### Do I need to map employeeHireDate in provisioning apps like WorkDay?
30
30
31
-
Yes, key user properties like employeeHireDate and employeeType are supported for user provisioning from HR apps like WorkDay. To use these properties in Lifecycle workflows, you will need to map them in the provisioning process to ensure the values are set. The following is an example of the mapping:
31
+
Yes, key user properties like employeeHireDate and employeeType are supported for user provisioning from HR apps like WorkDay. To use these properties in Lifecycle workflows, you need to map them in the provisioning process to ensure the values are set. The following is an example of the mapping:
32
32
33
33

0 commit comments