Skip to content

Commit a8a78dc

Browse files
authored
Merge pull request #206481 from yoelhor/patch-290
[Azure AD identity governance] Accessibility, links and minor updates
2 parents c985ee1 + d97fa86 commit a8a78dc

26 files changed

+124
-129
lines changed

articles/active-directory/governance/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
items:
1919
- name: Azure portal tutorials
2020
items:
21-
- name: Manage access to resources - Azure portal
21+
- name: Manage access to resources
2222
href: entitlement-management-access-package-first.md
2323
- name: Manage the lifecycle of your group-based licenses in Azure AD
2424
href: entitlement-management-group-licenses.md

articles/active-directory/governance/entitlement-management-access-package-first.md

Lines changed: 79 additions & 85 deletions
Large diffs are not rendered by default.

articles/active-directory/governance/entitlement-management-overview.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.tgt_pltfrm: na
1212
ms.topic: overview
1313
ms.subservice: compliance
14-
ms.date: 11/23/2020
14+
ms.date: 08/01/2022
1515
ms.author: owinfrey
1616
ms.reviewer: markwahl-msft
1717
ms.collection: M365-identity-device-management
@@ -25,7 +25,7 @@ ms.custom: contperf-fy21q1
2525

2626
Azure Active Directory (Azure AD) entitlement management is an [identity governance](identity-governance-overview.md) feature that enables organizations to manage identity and access lifecycle at scale, by automating access request workflows, access assignments, reviews, and expiration.
2727

28-
Employees in organizations need access to various groups, applications, and sites to perform their job. Managing this access is challenging, as requirements change - new applications are added or users need additional access rights. This scenario gets more complicated when you collaborate with outside organizations - you may not know who in the other organization needs access to your organization's resources, and they won't know what applications, groups, or sites your organization is using.
28+
Employees in organizations need access to various groups, applications, and SharePoint Online sites to perform their job. Managing this access is challenging, as requirements change. New applications are added or users need more access rights. This scenario gets more complicated when you collaborate with outside organizations. You may not know who in the other organization needs access to your organization's resources, and they won't know what applications, groups, or sites your organization is using.
2929

3030
Azure AD entitlement management can help you more efficiently manage access to groups, applications, and SharePoint Online sites for internal users, and also for users outside your organization who need access to those resources.
3131

@@ -49,9 +49,9 @@ Azure AD entitlement management can help address these challenges. To learn mor
4949

5050
Here are some of capabilities of entitlement management:
5151

52-
- Control who can get access to applications, groups, Teams and SharePoint sites, with multi-stage approval, and ensure users do not retain access indefinitely through time-limited assignments and recurring access reviews.
52+
- Control who can get access to applications, groups, Teams and SharePoint sites, with multi-stage approval, and ensure users don't retain access indefinitely through time-limited assignments and recurring access reviews.
5353
- Delegate to non-administrators the ability to create access packages. These access packages contain resources that users can request, and the delegated access package managers can define policies with rules for which users can request, who must approve their access, and when access expires.
54-
- Select connected organizations whose users can request access. When a user who is not yet in your directory requests access, and is approved, they are automatically invited into your directory and assigned access. When their access expires, if they have no other access package assignments, their B2B account in your directory can be automatically removed.
54+
- Select connected organizations whose users can request access. When a user who isn't yet in your directory requests access, and is approved, they're automatically invited into your directory and assigned access. When their access expires, if they have no other access package assignments, their B2B account in your directory can be automatically removed.
5555

5656
>[!NOTE]
5757
>If you are ready to try Entitlement management you can get started with our [tutorial to create your first access package](entitlement-management-access-package-first.md).
@@ -85,11 +85,11 @@ With an access package, an administrator or delegated access package manager lis
8585

8686
Access packages also include one or more *policies*. A policy defines the rules or guardrails for assignment to access package. Each policy can be used to ensure that only the appropriate users are able to have access assignments, and the access is time-limited and will expire if not renewed.
8787

88-
![Access package and policies](./media/entitlement-management-overview/elm-overview-access-package.png)
88+
![Diagram of access package and policies.](./media/entitlement-management-overview/elm-overview-access-package.png)
8989

9090
You can have policies for users to request access. In these kinds of policies, an administrator or access package manager defines
9191

92-
- Either the already-existing users (typically employees or already-invited guests), or the partner organizations of external users, that are eligible to request access
92+
- Either the already-existing users (typically employees or already-invited guests), or the partner organizations of external users that are eligible to request access
9393
- The approval process and the users that can approve or deny access
9494
- The duration of a user's access assignment, once approved, before the assignment expires
9595

@@ -100,13 +100,13 @@ The following diagram shows an example of the different elements in entitlement
100100
- **Access package 1** includes a single group as a resource. Access is defined with a policy that enables a set of users in the directory to request access.
101101
- **Access package 2** includes a group, an application, and a SharePoint Online site as resources. Access is defined with two different policies. The first policy enables a set of users in the directory to request access. The second policy enables users in an external directory to request access.
102102

103-
![Entitlement management overview](./media/entitlement-management-overview/elm-overview.png)
103+
![Entitlement management overview diagram](./media/entitlement-management-overview/elm-overview.png)
104104

105105
## When should I use access packages?
106106

107-
Access packages do not replace other mechanisms for access assignment. They are most appropriate in situations such as:
107+
Access packages don't replace other mechanisms for access assignment. They're most appropriate in situations such as:
108108

109-
- Employees need time-limited access for a particular task. For example, you might use group-based licensing and a dynamic group to ensure all employees have an Exchange Online mailbox, and then use access packages for situations in which employees need additional access, such as to read departmental resources from another department.
109+
- Employees need time-limited access for a particular task. For example, you might use group-based licensing and a dynamic group to ensure all employees have an Exchange Online mailbox, and then use access packages for situations in which employees need more access rights. For example, rights to read departmental resources from another department.
110110
- Access that requires the approval of an employee's manager or other designated individuals.
111111
- Departments wish to manage their own access policies for their resources without IT involvement.
112112
- Two or more organizations are collaborating on a project, and as a result, multiple users from one organization will need to be brought in via Azure AD B2B to access another organization's resources.
@@ -130,14 +130,14 @@ To better understand entitlement management and its documentation, you can refer
130130
| policy | A set of rules that defines the access lifecycle, such as how users get access, who can approve, and how long users have access through an assignment. A policy is linked to an access package. For example, an access package could have two policies - one for employees to request access and a second for external users to request access. |
131131
| resource | An asset, such as an Office group, a security group, an application, or a SharePoint Online site, with a role that a user can be granted permissions to. |
132132
| resource directory | A directory that has one or more resources to share. |
133-
| resource role | A collection of permissions associated with and defined by a resource. A group has two roles - member and owner. SharePoint sites typically have 3 roles but may have additional custom roles. Applications can have custom roles. |
133+
| resource role | A collection of permissions associated with and defined by a resource. A group has two roles - member and owner. SharePoint sites typically have three roles but may have other custom roles. Applications can have custom roles. |
134134

135135

136136
## License requirements
137137

138138
[!INCLUDE [Azure AD Premium P2 license](../../../includes/active-directory-p2-license.md)]
139139

140-
Specialized clouds, such as Azure Germany, and Azure China 21Vianet, are not currently available for use.
140+
Specialized clouds, such as Azure Germany, and Azure China 21Vianet, aren't currently available for use.
141141

142142
### How many licenses must you have?
143143

@@ -169,14 +169,14 @@ Here are some example license scenarios to help you determine the number of lice
169169

170170
| Scenario | Calculation | Number of licenses |
171171
| --- | --- | --- |
172-
| A Global Administrator at Woodgrove Bank creates initial catalogs and delegates administrative tasks to 6 other users. One of the policies specifies that **All employees** (2,000 employees) can request a specific set of access packages. 150 employees request the access packages. | 2,000 employees who **can** request the access packages | 2,000 |
173-
| A Global Administrator at Woodgrove Bank creates initial catalogs and delegates administrative tasks to 6 other users. One of the policies specifies that **All employees** (2,000 employees) can request a specific set of access packages. Another policy specifies that some users from **Users from partner Contoso** (guests) can request the same access packages subject to approval. Contoso has 30,000 users. 150 employees request the access packages and 10,500 users from Contoso request access. | 2,000 employees need licenses, guest users are billed on a monthly active user basis and no additional licenses are required for them. * | 2,000 |
172+
| A Global Administrator at Woodgrove Bank creates initial catalogs and delegates administrative tasks to six other users. One of the policies specifies that **All employees** (2,000 employees) can request a specific set of access packages. 150 employees request the access packages. | 2,000 employees who **can** request the access packages | 2,000 |
173+
| A Global Administrator at Woodgrove Bank creates initial catalogs and delegates administrative tasks to six other users. One of the policies specifies that **All employees** (2,000 employees) can request a specific set of access packages. Another policy specifies that some users from **Users from partner Contoso** (guests) can request the same access packages subject to approval. Contoso has 30,000 users. 150 employees request the access packages and 10,500 users from Contoso request access. | 2,000 employees need licenses, guest users are billed on a monthly active user basis and no additional licenses are required for them. * | 2,000 |
174174

175175
\* Azure AD External Identities (guest user) pricing is based on monthly active users (MAU), which is the count of unique users with authentication activity within a calendar month. This model replaces the 1:5 ratio billing model, which allowed up to five guest users for each Azure AD Premium license in your tenant. When your tenant is linked to a subscription and you use External Identities features to collaborate with guest users, you'll be automatically billed using the MAU-based billing model. For more information, see [Billing model for Azure AD External Identities](../external-identities/external-identities-pricing.md).
176176

177177

178178
## Next steps
179179

180-
- If you are interested in using the Azure portal to manage access to resources, see [Tutorial: Manage access to resources - Azure portal](entitlement-management-access-package-first.md).
181-
- if you are interested in using Microsoft Graph to manage access to resources, see [Tutorial: manage access to resources - Microsoft Graph](/graph/tutorial-access-package-api?toc=/azure/active-directory/governance/toc.json&bc=/azure/active-directory/governance/breadcrumb/toc.json)
180+
- If you're interested in using the Azure portal to manage access to resources, see [Tutorial: Manage access to resources - Azure portal](entitlement-management-access-package-first.md).
181+
- if you're interested in using Microsoft Graph to manage access to resources, see [Tutorial: manage access to resources - Microsoft Graph](/graph/tutorial-access-package-api?toc=/azure/active-directory/governance/toc.json&bc=/azure/active-directory/governance/breadcrumb/toc.json)
182182
- [Common scenarios](entitlement-management-scenarios.md)
3.1 KB
Loading
78 KB
Loading
Loading
Loading
121 KB
Loading

0 commit comments

Comments
 (0)