Skip to content

Commit af6bf13

Browse files
authored
Merge pull request #200485 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents ae2cd48 + 1f3cb68 commit af6bf13

File tree

6 files changed

+68
-63
lines changed

6 files changed

+68
-63
lines changed
Lines changed: 56 additions & 58 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Frequently asked questions (FAQs) about CloudKnox Permissions Management
3-
description: Frequently asked questions (FAQs) about CloudKnox Permissions Management.
2+
title: Frequently asked questions (FAQs) about Permissions Management
3+
description: Frequently asked questions (FAQs) about Permissions Management.
44
services: active-directory
55
author: kenwith
66
manager: rkarlin
@@ -15,146 +15,144 @@ ms.author: kenwith
1515
# Frequently asked questions (FAQs)
1616

1717
> [!IMPORTANT]
18-
> CloudKnox Permissions Management (CloudKnox) is currently in PREVIEW.
18+
> Entra Permissions Management is currently in PREVIEW.
1919
> Some information relates to a prerelease product that may be substantially modified before it's released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
2020
2121
> [!NOTE]
22-
> The CloudKnox Permissions Management (CloudKnox) PREVIEW is currently not available for tenants hosted in the European Union (EU).
22+
> The Permissions Management PREVIEW is currently not available for tenants hosted in the European Union (EU).
2323
2424

25-
This article answers frequently asked questions (FAQs) about CloudKnox Permissions Management (CloudKnox).
25+
This article answers frequently asked questions (FAQs) about Permissions Management.
2626

27-
## What's CloudKnox Permissions Management?
27+
## What's Permissions Management?
2828

29-
CloudKnox is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. For example, over-privileged workload and user identities, actions, and resources across multi-cloud infrastructures in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP). CloudKnox detects, automatically right-sizes, and continuously monitors unused and excessive permissions. It deepens the Zero Trust security strategy by augmenting the least privilege access principle.
29+
Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. For example, over-privileged workload and user identities, actions, and resources across multi-cloud infrastructures in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP). Permissions Management detects, automatically right-sizes, and continuously monitors unused and excessive permissions. It deepens the Zero Trust security strategy by augmenting the least privilege access principle.
3030

3131

32-
## What are the prerequisites to use CloudKnox?
32+
## What are the prerequisites to use Permissions Management?
3333

34-
CloudKnox supports data collection from AWS, GCP, and/or Microsoft Azure. For data collection and analysis, customers are required to have an Azure Active Directory (Azure AD) account to use CloudKnox.
34+
Permissions Management supports data collection from AWS, GCP, and/or Microsoft Azure. For data collection and analysis, customers are required to have an Azure Active Directory (Azure AD) account to use Permissions Management.
3535

36-
## Can a customer use CloudKnox if they have other identities with access to their IaaS platform that aren't yet in Azure AD (for example, if part of their business has Okta or AWS Identity & Access Management (IAM))?
36+
## Can a customer use Permissions Management if they have other identities with access to their IaaS platform that aren't yet in Azure AD (for example, if part of their business has Okta or AWS Identity & Access Management (IAM))?
3737

3838
Yes, a customer can detect, mitigate, and monitor the risk of 'backdoor' accounts that are local to AWS IAM, GCP, or from other identity providers such as Okta or AWS IAM.
3939

40-
## Where can customers access CloudKnox?
40+
## Where can customers access Permissions Management?
4141

42-
Customers can access the CloudKnox interface with a link from the Azure AD extension in the Azure portal.
42+
Customers can access the Permissions Management interface with a link from the Azure AD extension in the Azure portal.
4343

44-
## Can non-cloud customers use CloudKnox on-premises?
44+
## Can non-cloud customers use Permissions Management on-premises?
4545

46-
No, CloudKnox is a hosted cloud offering.
46+
No, Permissions Management is a hosted cloud offering.
4747

48-
## Can non-Azure customers use CloudKnox?
48+
## Can non-Azure customers use Permissions Management?
4949

50-
Yes, non-Azure customers can use our solution. CloudKnox is a multi-cloud solution so even customers who have no subscription to Azure can benefit from it.
50+
Yes, non-Azure customers can use our solution. Permissions Management is a multi-cloud solution so even customers who have no subscription to Azure can benefit from it.
5151

52-
## Is CloudKnox available for tenants hosted in the European Union (EU)?
52+
## Is Permissions Management available for tenants hosted in the European Union (EU)?
5353

54-
No, the CloudKnox Permissions Management (CloudKnox) PREVIEW is currently not available for tenants hosted in the European Union (EU).
54+
No, the Permissions Management Permissions Management PREVIEW is currently not available for tenants hosted in the European Union (EU).
5555

56-
## If I'm already using Azure AD Privileged Identity Management (PIM) for Azure, what value does CloudKnox provide?
56+
## If I'm already using Azure AD Privileged Identity Management (PIM) for Azure, what value does Permissions Management provide?
5757

58-
CloudKnox complements Azure AD PIM. Azure AD PIM provides just-in-time access for admin roles in Azure (as well as Microsoft Online Services and apps that use groups), while CloudKnox allows multi-cloud discovery, remediation, and monitoring of privileged access across Azure, AWS, and GCP.
58+
Permissions Management complements Azure AD PIM. Azure AD PIM provides just-in-time access for admin roles in Azure (as well as Microsoft Online Services and apps that use groups), while Permissions Management allows multi-cloud discovery, remediation, and monitoring of privileged access across Azure, AWS, and GCP.
5959

60-
## What languages does CloudKnox support?
60+
## What languages does Permissions Management support?
6161

62-
CloudKnox currently supports English.
62+
Permissions Management currently supports English.
6363

64-
## What public cloud infrastructures are supported by CloudKnox?
64+
## What public cloud infrastructures are supported by Permissions Management?
6565

66-
CloudKnox currently supports the three major public clouds: Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure.
66+
Permissions Management currently supports the three major public clouds: Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure.
6767

68-
## Does CloudKnox support hybrid environments?
68+
## Does Permissions Management support hybrid environments?
6969

70-
CloudKnox currently doesn't support hybrid environments.
70+
Permissions Management currently doesn't support hybrid environments.
7171

72-
## What types of identities are supported by CloudKnox?
72+
## What types of identities are supported by Permissions Management?
7373

74-
CloudKnox supports user identities (for example, employees, customers, external partners) and workload identities (for example, virtual machines, containers, web apps, serverless functions).
74+
Permissions Management supports user identities (for example, employees, customers, external partners) and workload identities (for example, virtual machines, containers, web apps, serverless functions).
7575

76-
<!---## Is CloudKnox General Data Protection Regulation (GDPR) compliant?
76+
<!---## Is Permissions Management General Data Protection Regulation (GDPR) compliant?
7777
78-
CloudKnox is currently not GDPR compliant.--->
78+
Permissions Management is currently not GDPR compliant.--->
7979

80-
## Is CloudKnox available in Government Cloud?
80+
## Is Permissions Management available in Government Cloud?
8181

82-
No, CloudKnox is currently not available in Government clouds.
82+
No, Permissions Management is currently not available in Government clouds.
8383

84-
## Is CloudKnox available for sovereign clouds?
84+
## Is Permissions Management available for sovereign clouds?
8585

86-
No, CloudKnox is currently not available in sovereign Clouds.
86+
No, Permissions Management is currently not available in sovereign Clouds.
8787

88-
## How does CloudKnox collect insights about permissions usage?
88+
## How does Permissions Management collect insights about permissions usage?
8989

90-
CloudKnox has a data collector that collects access permissions assigned to various identities, activity logs, and resources metadata. This gathers full visibility into permissions granted to all identities to access the resources and details on usage of granted permissions.
90+
Permissions Management has a data collector that collects access permissions assigned to various identities, activity logs, and resources metadata. This gathers full visibility into permissions granted to all identities to access the resources and details on usage of granted permissions.
9191

92-
## How does CloudKnox evaluate cloud permissions risk?
92+
## How does Permissions Management evaluate cloud permissions risk?
9393

94-
CloudKnox offers granular visibility into all identities and their permissions granted versus used, across cloud infrastructures to uncover any action performed by any identity on any resource. This isn't limited to just user identities, but also workload identities such as virtual machines, access keys, containers, and scripts. The dashboard gives an overview of permission profile to locate the riskiest identities and resources.
94+
Permissions Management offers granular visibility into all identities and their permissions granted versus used, across cloud infrastructures to uncover any action performed by any identity on any resource. This isn't limited to just user identities, but also workload identities such as virtual machines, access keys, containers, and scripts. The dashboard gives an overview of permission profile to locate the riskiest identities and resources.
9595

9696
## What is the Permissions Creep Index?
9797

9898
The Permissions Creep Index (PCI) is a quantitative measure of risk associated with an identity or role determined by comparing permissions granted versus permissions exercised. It allows users to instantly evaluate the level of risk associated with the number of unused or over-provisioned permissions across identities and resources. It measures how much damage identities can cause based on the permissions they have.
9999

100-
## How can customers use CloudKnox to delete unused or excessive permissions?
100+
## How can customers use Permissions Management to delete unused or excessive permissions?
101101

102-
CloudKnox allows users to right-size excessive permissions and automate least privilege policy enforcement with just a few clicks. The solution continuously analyzes historical permission usage data for each identity and gives customers the ability to right-size permissions of that identity to only the permissions that are being used for day-to-day operations. All unused and other risky permissions can be automatically removed.
102+
Permissions Management allows users to right-size excessive permissions and automate least privilege policy enforcement with just a few clicks. The solution continuously analyzes historical permission usage data for each identity and gives customers the ability to right-size permissions of that identity to only the permissions that are being used for day-to-day operations. All unused and other risky permissions can be automatically removed.
103103

104-
## How can customers grant permissions on-demand with CloudKnox?
104+
## How can customers grant permissions on-demand with Permissions Management?
105105

106106
For any break-glass or one-off scenarios where an identity needs to perform a specific set of actions on a set of specific resources, the identity can request those permissions on-demand for a limited period with a self-service workflow. Customers can either use the built-in workflow engine or their IT service management (ITSM) tool. The user experience is the same for any identity type, identity source (local, enterprise directory, or federated) and cloud.
107107

108108
## What is the difference between permissions on-demand and just-in-time access?
109109

110110
Just-in-time (JIT) access is a method used to enforce the principle of least privilege to ensure identities are given the minimum level of permissions to perform the task at hand. Permissions on-demand are a type of JIT access that allows the temporary elevation of permissions, enabling identities to access resources on a by-request, timed basis.
111111

112-
## How can customers monitor permissions usage with CloudKnox?
112+
## How can customers monitor permissions usage with Permissions Management?
113113

114-
Customers only need to track the evolution of their Permission Creep Index to monitor permissions usage. They can do this in the "Analytics" tab in their CloudKnox dashboard where they can see how the PCI of each identity or resource is evolving over time.
114+
Customers only need to track the evolution of their Permission Creep Index to monitor permissions usage. They can do this in the "Analytics" tab in their Permissions Management dashboard where they can see how the PCI of each identity or resource is evolving over time.
115115

116116
## Can customers generate permissions usage reports?
117117

118-
Yes, CloudKnox has various types of system report available that capture specific data sets. These reports allow customers to:
118+
Yes, Permissions Management has various types of system report available that capture specific data sets. These reports allow customers to:
119119
- Make timely decisions.
120120
- Analyze usage trends and system/user performance.
121121
- Identify high-risk areas.
122122

123123
For information about permissions usage reports, see [Generate and download the Permissions analytics report](product-permissions-analytics-reports.md).
124124

125-
## Does CloudKnox integrate with third-party ITSM (Information Technology Security Management) tools?
125+
## Does Permissions Management integrate with third-party ITSM (Information Technology Security Management) tools?
126126

127-
CloudKnox integrates with ServiceNow.
127+
Permissions Management integrates with ServiceNow.
128128

129+
## How is Permissions Management being deployed?
129130

130-
## How is CloudKnox being deployed?
131+
Customers with Global Admin role have first to onboard Permissions Management on their Azure AD tenant, and then onboard their AWS accounts, GCP projects, and Azure subscriptions. More details about onboarding can be found in our product documentation.
131132

132-
Customers with Global Admin role have first to onboard CloudKnox on their Azure AD tenant, and then onboard their AWS accounts, GCP projects, and Azure subscriptions. More details about onboarding can be found in our product documentation.
133-
134-
## How long does it take to deploy CloudKnox?
133+
## How long does it take to deploy Permissions Management?
135134

136135
It depends on each customer and how many AWS accounts, GCP projects, and Azure subscriptions they have.
137136

138-
## Once CloudKnox is deployed, how fast can I get permissions insights?
137+
## Once Permissions Management is deployed, how fast can I get permissions insights?
139138

140139
Once fully onboarded with data collection set up, customers can access permissions usage insights within hours. Our machine-learning engine refreshes the Permission Creep Index every hour so that customers can start their risk assessment right away.
141140

142-
## Is CloudKnox collecting and storing sensitive personal data?
141+
## Is Permissions Management collecting and storing sensitive personal data?
143142

144-
No, CloudKnox doesn't have access to sensitive personal data.
143+
No, Permissions Management doesn't have access to sensitive personal data.
145144

146-
## Where can I find more information about CloudKnox?
145+
## Where can I find more information about Permissions Management?
147146

148147
You can read our blog and visit our web page. You can also get in touch with your Microsoft point of contact to schedule a demo.
149148

150149
## Resources
151150

152151
- [Public Preview announcement blog](https://www.aka.ms/CloudKnox-Public-Preview-Blog)
153-
- [CloudKnox Permissions Management web page](https://microsoft.com/security/business/identity-access-management/permissions-management)
154-
152+
- [Permissions Management web page](https://microsoft.com/security/business/identity-access-management/permissions-management)
155153

156154

157155
## Next steps
158156

159-
- For an overview of CloudKnox, see [What's CloudKnox Permissions Management?](overview.md).
160-
- For information on how to onboard CloudKnox in your organization, see [Enable CloudKnox in your organization](onboard-enable-tenant.md).
157+
- For an overview of Permissions Management, see [What's Permissions Management Permissions Management?](overview.md).
158+
- For information on how to onboard Permissions Management in your organization, see [Enable Permissions Management in your organization](onboard-enable-tenant.md).

articles/active-directory/develop/scenario-desktop-acquire-token.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,7 @@ let accounts = await msalTokenCache.getAllAccounts();
175175

176176
const tokenRequest = {
177177
code: response["authorization_code"],
178-
codeVerifier: verifier // PKCE Code Verifier
178+
codeVerifier: verifier, // PKCE Code Verifier
179179
redirectUri: "your_redirect_uri",
180180
scopes: ["User.Read"],
181181
};

articles/container-registry/tasks-agent-pools.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,7 @@ Create an agent pool by using the [az acr agentpool create][az-acr-agentpool-cre
6565

6666
```azurecli
6767
az acr agentpool create \
68+
--registry MyRegistry \
6869
--name myagentpool \
6970
--tier S2
7071
```
@@ -78,6 +79,7 @@ Scale the pool size up or down with the [az acr agentpool update][az-acr-agentpo
7879

7980
```azurecli
8081
az acr agentpool update \
82+
--registry MyRegistry \
8183
--name myagentpool \
8284
--count 2
8385
```
@@ -112,6 +114,7 @@ subnetId=$(az network vnet subnet show \
112114
--query id --output tsv)
113115
114116
az acr agentpool create \
117+
--registry MyRegistry \
115118
--name myagentpool \
116119
--tier S2 \
117120
--subnet-id $subnetId
@@ -131,6 +134,7 @@ Queue a quick task on the agent pool by using the [az acr build][az-acr-build] c
131134

132135
```azurecli
133136
az acr build \
137+
--registry MyRegistry \
134138
--agent-pool myagentpool \
135139
--image myimage:mytag \
136140
--file Dockerfile \
@@ -143,6 +147,7 @@ For example, create a scheduled task on the agent pool with [az acr task create]
143147

144148
```azurecli
145149
az acr task create \
150+
--registry MyRegistry \
146151
--name mytask \
147152
--agent-pool myagentpool \
148153
--image myimage:mytag \
@@ -156,6 +161,7 @@ To verify task setup, run [az acr task run][az-acr-task-run]:
156161

157162
```azurecli
158163
az acr task run \
164+
--registry MyRegistry \
159165
--name mytask
160166
```
161167

@@ -165,6 +171,7 @@ To find the number of runs currently scheduled on the agent pool, run [az acr ag
165171

166172
```azurecli
167173
az acr agentpool show \
174+
--registry MyRegistry \
168175
--name myagentpool \
169176
--queue-count
170177
```

articles/virtual-desktop/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -380,6 +380,6 @@
380380
- name: Azure Virtual Desktop roadmap
381381
href: https://aka.ms/avdroadmap
382382
- name: Azure Resource Manager templates
383-
href: https://github.com/Azure/RDS-Templates/tree/master/wvd-templates
383+
href: https://github.com/Azure/RDS-Templates/tree/master/ARM-wvd-templates
384384
- name: Azure compliance offerings
385-
href: https://azure.microsoft.com/resources/microsoft-azure-compliance-offerings/
385+
href: https://azure.microsoft.com/resources/microsoft-azure-compliance-offerings/

articles/virtual-machines/linux/n-series-driver-setup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ sudo reboot
9797

9898
2. Install the latest [Linux Integration Services for Hyper-V and Azure](https://www.microsoft.com/download/details.aspx?id=55106). Check if LIS is required by verifying the results of lspci. If all GPU devices are listed as expected (and documented above), installing LIS is not required.
9999

100-
Please note that LIS is applicable to Red Hat Enterprise Linux, CentOS, and the Oracle Linux Red Hat Compatible Kernel 5.2-5.11, 6.0-6.10, and 7.0-7.7. Please refer to the [Linux Integration Services documentation] (https://www.microsoft.com/en-us/download/details.aspx?id=55106) for more details.
100+
Please note that LIS is applicable to Red Hat Enterprise Linux, CentOS, and the Oracle Linux Red Hat Compatible Kernel 5.2-5.11, 6.0-6.10, and 7.0-7.7. Please refer to the [Linux Integration Services documentation](https://www.microsoft.com/en-us/download/details.aspx?id=55106) for more details.
101101
Skip this step if you plan to use CentOS/RHEL 7.8 (or higher versions) as LIS is no longer required for these versions.
102102

103103
```bash

0 commit comments

Comments
 (0)