You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/faqs.md
+40-7Lines changed: 40 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ Yes, non-Azure customers can use our solution. Permissions Management is a multi
42
42
43
43
## Is Permissions Management available for tenants hosted in the European Union (EU)?
44
44
45
-
No, the Permissions Management Permissions Management PREVIEW is currently not available for tenants hosted in the European Union (EU).
45
+
No, the Permissions Management PREVIEW is currently not available for tenants hosted in the European Union (EU).
46
46
47
47
## If I'm already using Azure AD Privileged Identity Management (PIM) for Azure, what value does Permissions Management provide?
48
48
@@ -64,10 +64,6 @@ Permissions Management currently doesn't support hybrid environments.
64
64
65
65
Permissions Management supports user identities (for example, employees, customers, external partners) and workload identities (for example, virtual machines, containers, web apps, serverless functions).
66
66
67
-
<!---## Is Permissions Management General Data Protection Regulation (GDPR) compliant?
68
-
69
-
Permissions Management is currently not GDPR compliant.--->
70
-
71
67
## Is Permissions Management available in Government Cloud?
72
68
73
69
No, Permissions Management is currently not available in Government clouds.
@@ -128,7 +124,7 @@ It depends on each customer and how many AWS accounts, GCP projects, and Azure s
128
124
129
125
## Once Permissions Management is deployed, how fast can I get permissions insights?
130
126
131
-
Once fully onboarded with data collection set up, customers can access permissions usage insights within hours. Our machine-learning engine refreshes the Permission Creep Index every hour so that customers can start their risk assessment right away.
127
+
Once fully onboarded with data collection setup, customers can access permissions usage insights within hours. Our machine-learning engine refreshes the Permission Creep Index every hour so that customers can start their risk assessment right away.
132
128
133
129
## Is Permissions Management collecting and storing sensitive personal data?
134
130
@@ -138,13 +134,50 @@ No, Permissions Management doesn't have access to sensitive personal data.
138
134
139
135
You can read our blog and visit our web page. You can also get in touch with your Microsoft point of contact to schedule a demo.
140
136
137
+
## What is the data destruction/decommission process?
138
+
139
+
If a customer initiates a free Permissions Management 90-day trial, but does not follow up and convert to a paid license within 90 days of the free trial expiration, we will delete all collected data on or just before 90 days.
140
+
141
+
If a customer decides to discontinue licensing the service, we will also delete all previously collected data within 90 days of license termination.
142
+
143
+
We also have the ability to remove, export or modify specific data should the Global Admin using the Entra Permissions Management service file an official Data Subject Request. This can be initiated by opening a ticket in the Azure portal [New support request - Microsoft Entra admin center](https://entra.microsoft.com/#blade/Microsoft_Azure_Support/NewSupportRequestV3Blade/callerName/ActiveDirectory/issueType/technical), or alternately contacting your local Microsoft representative.
144
+
145
+
## Do I require a license to use Entra Permissions Management?
146
+
147
+
Yes, as of July 1st, 2022, new customers must acquire a free 90-trial license or a paid license to use the service. You can enable a trial or purchase licenses here: [https://aka.ms/TryPermissionsManagement](https://aka.ms/TryPermissionsManagement)
148
+
149
+
## What do I do if I’m using Public Preview version of Entra Permissions Management?
150
+
151
+
If you are using the Public Preview version of Entra Permissions Management, your current deployment(s) will continue to work through October 1st.
152
+
153
+
After October 1st you will need to move over to use the newly released version of the service and enable a 90-day trial or purchase licenses to continue using the service.
154
+
155
+
## What do I do if I’m using the legacy version of the CloudKnox service?
156
+
157
+
We are currently working on developing a migration plan to help customers on the original CloudKnox service move to the new Entra Permissions Management service later in 2022.
158
+
159
+
## Can I use Entra Permissions Management in the EU?
160
+
161
+
Yes, the product is compliant.
162
+
163
+
## How to I enable one of the new 18 languages supported in the GA release?
164
+
165
+
We are now localized in 18 languages. We respect your browser setting or you can manually enable your language of choice by adding a query string suffix to your Entra Permissions Management URL:
166
+
167
+
`?lang=xx-XX`
168
+
169
+
Where xx-XX is one of the following available language parameters: 'cs-CZ', 'de-DE', 'en-US', 'es-ES', 'fr-FR', 'hu-HU', 'id-ID', 'it-IT', 'ja-JP', 'ko-KR', 'nl-NL', 'pl-PL', 'pt-BR', 'pt-PT', 'ru-RU', 'sv-SE', 'tr-TR', 'zh-CN', or 'zh-TW'.
-[Permissions Management web page](https://microsoft.com/security/business/identity-access-management/permissions-management)
175
+
- For more information about Microsoft's privacy and security terms, see [Commercial Licensing Terms](https://www.microsoft.com/licensing/terms/product/ForallOnlineServices/all).
176
+
- For more information about Microsoft's data processing and security terms when you subscribe to a product, see [Microsoft Products and Services Data Protection Addendum (DPA)](https://www.microsoft.com/licensing/docs/view/Microsoft-Products-and-Services-Data-Protection-Addendum-DPA).
177
+
- For more information about Microsoft’s policy and practices for Data Subject Requests for GDPR and CCPA: [https://docs.microsoft.com/en-us/compliance/regulatory/gdpr-dsr-azure](https://docs.microsoft.com/compliance/regulatory/gdpr-dsr-azure).
145
178
146
179
147
180
## Next steps
148
181
149
-
- For an overview of Permissions Management, see [What's Permissions Management Permissions Management?](overview.md).
182
+
- For an overview of Permissions Management, see [What's Permissions Management?](overview.md).
150
183
- For information on how to onboard Permissions Management in your organization, see [Enable Permissions Management in your organization](onboard-enable-tenant.md).
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-aws.md
+33Lines changed: 33 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -102,6 +102,27 @@ To view a video on how to configure and onboard AWS accounts in Permissions Mana
102
102
103
103
### 5. Set up an AWS member account
104
104
105
+
Select **Enable AWS SSO checkbox**, if the AWS account access is configured through AWS SSO.
106
+
107
+
Choose from 3 options to manage AWS accounts.
108
+
109
+
#### Option 1: Automatically manage
110
+
111
+
Choose this option to automatically detect and add to monitored account list, without additional configuration. Steps to detect list of accounts and onboard for collection:
112
+
113
+
- Deploy Master account CFT (Cloudformation template) which creates organization account role that grants permission to OIDC role created earlier to list accounts, OUs and SCPs.
114
+
- If AWS SSO is enabled, organization account CFT also adds policy needed to collect AWS SSO configuration details.
115
+
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. This creates a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
116
+
117
+
Any current or future accounts found get onboarded automatically.
118
+
119
+
To view status of onboarding after saving the configuration:
120
+
121
+
- Navigate to data collectors tab.
122
+
- Click on the status of the data collector.
123
+
- View accounts on the In Progress page
124
+
125
+
#### Option 2: Enter authorization systems
105
126
1. In the **Permissions Management Onboarding - AWS Member Account Details** page, enter the **Member Account Role** and the **Member Account IDs**.
106
127
107
128
You can enter up to 10 account IDs. Click the plus icon next to the text box to add more account IDs.
@@ -136,6 +157,18 @@ To view a video on how to configure and onboard AWS accounts in Permissions Mana
136
157
1. Return to Permissions Management, and in the **Permissions Management Onboarding - AWS Member Account Details** page, select **Next**.
137
158
138
159
This step completes the sequence of required connections from Azure AD STS to the OIDC connection account and the AWS member account.
160
+
161
+
#### Option 3: Select authorization systems
162
+
163
+
This option detects all AWS accounts that are accessible through OIDC role access created earlier.
164
+
165
+
- Deploy Master account CFT (Cloudformation template) which creates organization account role that grants permission to OIDC role created earlier to list accounts, OUs and SCPs.
166
+
- If AWS SSO is enabled, organization account CFT also adds policy needed to collect AWS SSO configuration details.
167
+
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. This creates a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
168
+
- Click Verify and Save.
169
+
- Navigate to newly create Data Collector row under AWSdata collectors.
170
+
- Click on Status column when the row has “Pending” status
171
+
- To onboard and start collection, choose specific ones from the detected list and consent for collection.
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md
+42-15Lines changed: 42 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,28 +39,55 @@ To view a video on how to enable Permissions Management in your Azure AD tenant,
39
39
40
40
### 1. Add Azure subscription details
41
41
42
-
1. On the **Permissions Management Onboarding - Azure Subscription Details** page, enter the **Subscription IDs** that you want to onboard.
42
+
Choose from 3 options to manage Azure subscriptions.
43
43
44
-
> [!NOTE]
45
-
> To locate the Azure subscription IDs, open the **Subscriptions** page in Azure.
46
-
> You can enter up to 10 subscriptions IDs. Select the plus sign **(+)** icon next to the text box to enter more subscriptions.
44
+
#### Option 1: Automatically manage
47
45
48
-
1. From the **Scope** dropdown, select **Subscription** or **Management Group**. The script box displays the role assignment script.
46
+
This option allows subscriptions to be automatically detected and monitored without additional configuration. Steps to detect list of subscriptions and onboard for collection:
49
47
50
-
> [!NOTE]
51
-
> Select **Subscription** if you want to assign permissions separately for each individual subscription. The generated script has to be executed once per subscription.
52
-
> Select **Management Group** if all of your subscriptions are under one management group. The generated script must be executed once for the management group.
48
+
- Grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope.
53
49
54
-
1. To give this role assignment to the service principal, copy the script to a file on your system where Azure CLI is installed and execute it.
50
+
Any current or future subscriptions found get onboarded automatically.
55
51
56
-
You can execute the script once for each subscription, or once for all the subscriptions in the management group.
52
+
To view status of onboarding after saving the configuration:
57
53
58
-
1. From the **Enable Controller** dropdown, select:
54
+
1. In the MEPM portal, click the cog on the top right-hand side.
55
+
1. Navigate to data collectors tab.
56
+
1. Click ‘Create Configuration’
57
+
1. For onboarding mode, select ‘Automatically Manage’
58
+
1. Click ‘Verify Now & Save’
59
+
1. Collectors will now be listed and change through status types. For each collector listed with a status of “Collected Inventory”, click on that status to view further information.
60
+
1. You can then view subscriptions on the In Progress page
59
61
60
-
-**True**, if you want the controller to provide Permissions Management with read and write access so that any remediation you want to do from the Permissions Management platform can be done automatically.
61
-
-**False**, if you want the controller to provide Permissions Management with read-only access.
62
+
#### Option 2: Enter authorization systems
62
63
63
-
1. Return to **Permissions Management Onboarding - Azure Subscription Details** page and select **Next**.
64
+
You have the ability to specify only certain subscriptions to manage and monitor with MEPM (up to 10 per collector). Follow the steps below to configure these subscriptions to be monitored:
65
+
66
+
1. For each subscription you wish to manage, ensure that the ‘Reader’ role has been granted to Cloud Infrastructure Entitlement Management application for this subscription.
67
+
1. In the MEPM portal, click the cog on the top right-hand side.
68
+
1. Navigate to data collectors tab
69
+
1. Click ‘Create Configuration’
70
+
1. Select ‘Enter Authorization Systems’
71
+
1. Under the Subscription IDs section, enter a desired subscription ID into the input box. Click the “+” up to 9 additional times, putting a single subscription ID into each respective input box.
72
+
1. Once you have input all of the desired subscriptions, click next
73
+
1. Click ‘Verify Now & Save’
74
+
1. Once the access to read and collect data is verified, collection will begin.
75
+
76
+
To view status of onboarding after saving the configuration:
77
+
78
+
1. Navigate to data collectors tab.
79
+
1. Click on the status of the data collector.
80
+
1. View subscriptions on the In Progress page
81
+
82
+
#### Option 3: Select authorization systems
83
+
84
+
This option detects all subscriptions that are accessible by the Cloud Infrastructure Entitlement Management application.
85
+
86
+
1. Grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription(s) scope.
87
+
1. Click Verify and Save.
88
+
1. Navigate to newly create Data Collector row under Azure data collectors.
89
+
1. Click on Status column when the row has “Pending” status
90
+
1. To onboard and start collection, choose specific ones subscriptions from the detected list and consent for collection.
64
91
65
92
### 2. Review and save.
66
93
@@ -88,4 +115,4 @@ To view a video on how to enable Permissions Management in your Azure AD tenant,
88
115
- For information on how to enable or disable the controller after onboarding is complete, see [Enable or disable the controller](onboard-enable-controller-after-onboarding.md).
89
116
- For information on how to add an account/subscription/project after onboarding is complete, see [Add an account/subscription/project after onboarding is complete](onboard-add-account-after-onboarding.md).
90
117
- For an overview on Permissions Management, see [What's Permissions Management?](overview.md).
91
-
- For information on how to start viewing information about your authorization system in Permissions Management, see [View key statistics and data about your authorization system](ui-dashboard.md).
118
+
- For information on how to start viewing information about your authorization system in Permissions Management, see [View key statistics and data about your authorization system](ui-dashboard.md).
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-enable-tenant.md
+6-35Lines changed: 6 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,45 +38,16 @@ To enable Permissions Management in your organization:
38
38
## How to enable Permissions Management on your Azure AD tenant
39
39
40
40
1. In your browser:
41
-
1. Go to [Azure services](https://portal.azure.com) and use your credentials to sign in to [Azure Active Directory](https://ms.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview).
41
+
1. Go to [Entra services](https://entra.microsoft.com) and use your credentials to sign in to [Azure Active Directory](https://ms.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview).
42
42
1. If you aren't already authenticated, sign in as a global administrator user.
43
43
1. If needed, activate the global administrator role in your Azure AD tenant.
44
-
1. In the Azure AD portal, select **Features highlights**, and then select **Permissions Management**.
44
+
1. In the Azure AD portal, select **Permissions Management**, and then select the link to purchase a license or begin a trial.
45
45
46
-
1. If you're prompted to select a sign in account, sign in as a global administrator for a specified tenant.
47
-
48
-
The **Welcome to Permissions Management** screen appears, displaying information on how to enable Permissions Management on your tenant.
49
-
50
-
1. To provide access to the Permissions Management application, create a service principal.
51
-
52
-
An Azure service principal is a security identity used by user-created apps, services, and automation tools to access specific Azure resources.
53
-
54
-
> [!NOTE]
55
-
> To complete this step, you must have Azure CLI or Azure PowerShell on your system, or an Azure subscription where you can run Cloud Shell.
56
-
57
-
- To create a service principal that points to the Permissions Management application via Cloud Shell:
58
-
59
-
1. Copy the script on the **Welcome** screen:
60
-
61
-
`az ad sp create --id b46c3ac5-9da6-418f-a849-0a07a10b3c6c`
62
-
63
-
1. If you have an Azure subscription, return to the Azure AD portal and select **Cloud Shell** on the navigation bar.
64
-
If you don't have an Azure subscription, open a command prompt on a Windows Server.
65
-
1. If you have an Azure subscription, paste the script into Cloud Shell and press **Enter**.
66
-
67
-
- For information on how to create a service principal through the Azure portal, see [Create an Azure service principal with the Azure CLI](/cli/azure/create-an-azure-service-principal-azure-cli).
68
-
69
-
- For information on the **az** command and how to sign in with the no subscriptions flag, see [az login](/cli/azure/reference-index?view=azure-cli-latest#az-login&preserve-view=true).
70
-
71
-
- For information on how to create a service principal via Azure PowerShell, see [Create an Azure service principal with Azure PowerShell](/powershell/azure/create-azure-service-principal-azureps?view=azps-7.1.0&preserve-view=true).
72
-
73
-
1. After the script runs successfully, the service principal attributes for Permissions Management display. Confirm the attributes.
74
-
75
-
The **Cloud Infrastructure Entitlement Management** application displays in the Azure AD portal under **Enterprise applications**.
76
-
77
-
1. Return to the **Welcome to Permissions Management** screen and select **Enable Permissions Management**.
46
+
> [!NOTE]
47
+
> There are two ways to enable a trial or a full product license, self-service and volume licensing.
48
+
> For self-service, navigate to the M365 portal at [https://aka.ms/TryPermissionsManagement](https://aka.ms/TryPermissionsManagement) and purchase licenses or sign up for a free trial. The second way is through Volume Licensing or Enterprise agreements. If your organization falls under a volume license or enterprise agreement scenario, please contact your Microsoft representative.
78
49
79
-
You have now completed enabling Permissions Management on your tenant. Permissions Management launches with the **Data Collectors** dashboard.
50
+
Permissions Management launches with the **Data Collectors** dashboard.
0 commit comments