Skip to content

Commit bae27b7

Browse files
authored
Merge pull request #203662 from MicrosoftDocs/main
7/01 PM Publish
2 parents 1309ae4 + a5548b3 commit bae27b7

File tree

151 files changed

+1711
-853
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

151 files changed

+1711
-853
lines changed

articles/active-directory/authentication/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@
170170
href: how-to-mfa-additional-context.md
171171
- name: Use Microsoft managed settings
172172
href: how-to-mfa-microsoft-managed.md
173-
- name: Use a Temporary Access Pass (Preview)
173+
- name: Use a Temporary Access Pass
174174
href: howto-authentication-temporary-access-pass.md
175175
- name: Use SMS-based authentication
176176
href: howto-authentication-sms-signin.md
@@ -313,4 +313,4 @@
313313
- name: Stack Overflow
314314
href: https://stackoverflow.com/questions/tagged/azure-active-directory
315315
- name: Videos
316-
href: https://azure.microsoft.com/documentation/videos/index/?services=active-directory
316+
href: https://azure.microsoft.com/documentation/videos/index/?services=active-directory

articles/active-directory/cloud-infrastructure-entitlement-management/faqs.md

Lines changed: 40 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Yes, non-Azure customers can use our solution. Permissions Management is a multi
4242

4343
## Is Permissions Management available for tenants hosted in the European Union (EU)?
4444

45-
No, the Permissions Management Permissions Management PREVIEW is currently not available for tenants hosted in the European Union (EU).
45+
No, the Permissions Management PREVIEW is currently not available for tenants hosted in the European Union (EU).
4646

4747
## If I'm already using Azure AD Privileged Identity Management (PIM) for Azure, what value does Permissions Management provide?
4848

@@ -64,10 +64,6 @@ Permissions Management currently doesn't support hybrid environments.
6464

6565
Permissions Management supports user identities (for example, employees, customers, external partners) and workload identities (for example, virtual machines, containers, web apps, serverless functions).
6666

67-
<!---## Is Permissions Management General Data Protection Regulation (GDPR) compliant?
68-
69-
Permissions Management is currently not GDPR compliant.--->
70-
7167
## Is Permissions Management available in Government Cloud?
7268

7369
No, Permissions Management is currently not available in Government clouds.
@@ -128,7 +124,7 @@ It depends on each customer and how many AWS accounts, GCP projects, and Azure s
128124

129125
## Once Permissions Management is deployed, how fast can I get permissions insights?
130126

131-
Once fully onboarded with data collection set up, customers can access permissions usage insights within hours. Our machine-learning engine refreshes the Permission Creep Index every hour so that customers can start their risk assessment right away.
127+
Once fully onboarded with data collection setup, customers can access permissions usage insights within hours. Our machine-learning engine refreshes the Permission Creep Index every hour so that customers can start their risk assessment right away.
132128

133129
## Is Permissions Management collecting and storing sensitive personal data?
134130

@@ -138,13 +134,50 @@ No, Permissions Management doesn't have access to sensitive personal data.
138134

139135
You can read our blog and visit our web page. You can also get in touch with your Microsoft point of contact to schedule a demo.
140136

137+
## What is the data destruction/decommission process?
138+
139+
If a customer initiates a free Permissions Management 90-day trial, but does not follow up and convert to a paid license within 90 days of the free trial expiration, we will delete all collected data on or just before 90 days.
140+
141+
If a customer decides to discontinue licensing the service, we will also delete all previously collected data within 90 days of license termination.
142+
143+
We also have the ability to remove, export or modify specific data should the Global Admin using the Entra Permissions Management service file an official Data Subject Request. This can be initiated by opening a ticket in the Azure portal [New support request - Microsoft Entra admin center](https://entra.microsoft.com/#blade/Microsoft_Azure_Support/NewSupportRequestV3Blade/callerName/ActiveDirectory/issueType/technical), or alternately contacting your local Microsoft representative.
144+
145+
## Do I require a license to use Entra Permissions Management?
146+
147+
Yes, as of July 1st, 2022, new customers must acquire a free 90-trial license or a paid license to use the service. You can enable a trial or purchase licenses here: [https://aka.ms/TryPermissionsManagement](https://aka.ms/TryPermissionsManagement)
148+
149+
## What do I do if I’m using Public Preview version of Entra Permissions Management?
150+
151+
If you are using the Public Preview version of Entra Permissions Management, your current deployment(s) will continue to work through October 1st.
152+
153+
After October 1st you will need to move over to use the newly released version of the service and enable a 90-day trial or purchase licenses to continue using the service.
154+
155+
## What do I do if I’m using the legacy version of the CloudKnox service?
156+
157+
We are currently working on developing a migration plan to help customers on the original CloudKnox service move to the new Entra Permissions Management service later in 2022.
158+
159+
## Can I use Entra Permissions Management in the EU?
160+
161+
Yes, the product is compliant.
162+
163+
## How to I enable one of the new 18 languages supported in the GA release?
164+
165+
We are now localized in 18 languages. We respect your browser setting or you can manually enable your language of choice by adding a query string suffix to your Entra Permissions Management URL:
166+
167+
`?lang=xx-XX`
168+
169+
Where xx-XX is one of the following available language parameters: 'cs-CZ', 'de-DE', 'en-US', 'es-ES', 'fr-FR', 'hu-HU', 'id-ID', 'it-IT', 'ja-JP', 'ko-KR', 'nl-NL', 'pl-PL', 'pt-BR', 'pt-PT', 'ru-RU', 'sv-SE', 'tr-TR', 'zh-CN', or 'zh-TW'.
170+
141171
## Resources
142172

143173
- [Public Preview announcement blog](https://www.aka.ms/CloudKnox-Public-Preview-Blog)
144174
- [Permissions Management web page](https://microsoft.com/security/business/identity-access-management/permissions-management)
175+
- For more information about Microsoft's privacy and security terms, see [Commercial Licensing Terms](https://www.microsoft.com/licensing/terms/product/ForallOnlineServices/all).
176+
- For more information about Microsoft's data processing and security terms when you subscribe to a product, see [Microsoft Products and Services Data Protection Addendum (DPA)](https://www.microsoft.com/licensing/docs/view/Microsoft-Products-and-Services-Data-Protection-Addendum-DPA).
177+
- For more information about Microsoft’s policy and practices for Data Subject Requests for GDPR and CCPA: [https://docs.microsoft.com/en-us/compliance/regulatory/gdpr-dsr-azure](https://docs.microsoft.com/compliance/regulatory/gdpr-dsr-azure).
145178

146179

147180
## Next steps
148181

149-
- For an overview of Permissions Management, see [What's Permissions Management Permissions Management?](overview.md).
182+
- For an overview of Permissions Management, see [What's Permissions Management?](overview.md).
150183
- For information on how to onboard Permissions Management in your organization, see [Enable Permissions Management in your organization](onboard-enable-tenant.md).

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-aws.md

Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -102,6 +102,27 @@ To view a video on how to configure and onboard AWS accounts in Permissions Mana
102102

103103
### 5. Set up an AWS member account
104104

105+
Select **Enable AWS SSO checkbox**, if the AWS account access is configured through AWS SSO.
106+
107+
Choose from 3 options to manage AWS accounts.
108+
109+
#### Option 1: Automatically manage
110+
111+
Choose this option to automatically detect and add to monitored account list, without additional configuration. Steps to detect list of accounts and onboard for collection:
112+
113+
- Deploy Master account CFT (Cloudformation template) which creates organization account role that grants permission to OIDC role created earlier to list accounts, OUs and SCPs.
114+
- If AWS SSO is enabled, organization account CFT also adds policy needed to collect AWS SSO configuration details.
115+
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. This creates a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
116+
117+
Any current or future accounts found get onboarded automatically.
118+
119+
To view status of onboarding after saving the configuration:
120+
121+
- Navigate to data collectors tab.
122+
- Click on the status of the data collector.
123+
- View accounts on the In Progress page
124+
125+
#### Option 2: Enter authorization systems
105126
1. In the **Permissions Management Onboarding - AWS Member Account Details** page, enter the **Member Account Role** and the **Member Account IDs**.
106127

107128
You can enter up to 10 account IDs. Click the plus icon next to the text box to add more account IDs.
@@ -136,6 +157,18 @@ To view a video on how to configure and onboard AWS accounts in Permissions Mana
136157
1. Return to Permissions Management, and in the **Permissions Management Onboarding - AWS Member Account Details** page, select **Next**.
137158

138159
This step completes the sequence of required connections from Azure AD STS to the OIDC connection account and the AWS member account.
160+
161+
#### Option 3: Select authorization systems
162+
163+
This option detects all AWS accounts that are accessible through OIDC role access created earlier.
164+
165+
- Deploy Master account CFT (Cloudformation template) which creates organization account role that grants permission to OIDC role created earlier to list accounts, OUs and SCPs.
166+
- If AWS SSO is enabled, organization account CFT also adds policy needed to collect AWS SSO configuration details.
167+
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. This creates a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
168+
- Click Verify and Save.
169+
- Navigate to newly create Data Collector row under AWSdata collectors.
170+
- Click on Status column when the row has “Pending” status
171+
- To onboard and start collection, choose specific ones from the detected list and consent for collection.
139172

140173
### 6. Review and save
141174

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md

Lines changed: 42 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -39,28 +39,55 @@ To view a video on how to enable Permissions Management in your Azure AD tenant,
3939

4040
### 1. Add Azure subscription details
4141

42-
1. On the **Permissions Management Onboarding - Azure Subscription Details** page, enter the **Subscription IDs** that you want to onboard.
42+
Choose from 3 options to manage Azure subscriptions.
4343

44-
> [!NOTE]
45-
> To locate the Azure subscription IDs, open the **Subscriptions** page in Azure.
46-
> You can enter up to 10 subscriptions IDs. Select the plus sign **(+)** icon next to the text box to enter more subscriptions.
44+
#### Option 1: Automatically manage
4745

48-
1. From the **Scope** dropdown, select **Subscription** or **Management Group**. The script box displays the role assignment script.
46+
This option allows subscriptions to be automatically detected and monitored without additional configuration. Steps to detect list of subscriptions and onboard for collection:
4947

50-
> [!NOTE]
51-
> Select **Subscription** if you want to assign permissions separately for each individual subscription. The generated script has to be executed once per subscription.
52-
> Select **Management Group** if all of your subscriptions are under one management group. The generated script must be executed once for the management group.
48+
- Grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope.
5349

54-
1. To give this role assignment to the service principal, copy the script to a file on your system where Azure CLI is installed and execute it.
50+
Any current or future subscriptions found get onboarded automatically.
5551

56-
You can execute the script once for each subscription, or once for all the subscriptions in the management group.
52+
To view status of onboarding after saving the configuration:
5753

58-
1. From the **Enable Controller** dropdown, select:
54+
1. In the MEPM portal, click the cog on the top right-hand side.
55+
1. Navigate to data collectors tab.
56+
1. Click ‘Create Configuration’
57+
1. For onboarding mode, select ‘Automatically Manage’
58+
1. Click ‘Verify Now & Save’
59+
1. Collectors will now be listed and change through status types. For each collector listed with a status of “Collected Inventory”, click on that status to view further information.
60+
1. You can then view subscriptions on the In Progress page
5961

60-
- **True**, if you want the controller to provide Permissions Management with read and write access so that any remediation you want to do from the Permissions Management platform can be done automatically.
61-
- **False**, if you want the controller to provide Permissions Management with read-only access.
62+
#### Option 2: Enter authorization systems
6263

63-
1. Return to **Permissions Management Onboarding - Azure Subscription Details** page and select **Next**.
64+
You have the ability to specify only certain subscriptions to manage and monitor with MEPM (up to 10 per collector). Follow the steps below to configure these subscriptions to be monitored:
65+
66+
1. For each subscription you wish to manage, ensure that the ‘Reader’ role has been granted to Cloud Infrastructure Entitlement Management application for this subscription.
67+
1. In the MEPM portal, click the cog on the top right-hand side.
68+
1. Navigate to data collectors tab
69+
1. Click ‘Create Configuration’
70+
1. Select ‘Enter Authorization Systems’
71+
1. Under the Subscription IDs section, enter a desired subscription ID into the input box. Click the “+” up to 9 additional times, putting a single subscription ID into each respective input box.
72+
1. Once you have input all of the desired subscriptions, click next
73+
1. Click ‘Verify Now & Save’
74+
1. Once the access to read and collect data is verified, collection will begin.
75+
76+
To view status of onboarding after saving the configuration:
77+
78+
1. Navigate to data collectors tab.
79+
1. Click on the status of the data collector.
80+
1. View subscriptions on the In Progress page
81+
82+
#### Option 3: Select authorization systems
83+
84+
This option detects all subscriptions that are accessible by the Cloud Infrastructure Entitlement Management application.
85+
86+
1. Grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription(s) scope.
87+
1. Click Verify and Save.
88+
1. Navigate to newly create Data Collector row under Azure data collectors.
89+
1. Click on Status column when the row has “Pending” status
90+
1. To onboard and start collection, choose specific ones subscriptions from the detected list and consent for collection.
6491

6592
### 2. Review and save.
6693

@@ -88,4 +115,4 @@ To view a video on how to enable Permissions Management in your Azure AD tenant,
88115
- For information on how to enable or disable the controller after onboarding is complete, see [Enable or disable the controller](onboard-enable-controller-after-onboarding.md).
89116
- For information on how to add an account/subscription/project after onboarding is complete, see [Add an account/subscription/project after onboarding is complete](onboard-add-account-after-onboarding.md).
90117
- For an overview on Permissions Management, see [What's Permissions Management?](overview.md).
91-
- For information on how to start viewing information about your authorization system in Permissions Management, see [View key statistics and data about your authorization system](ui-dashboard.md).
118+
- For information on how to start viewing information about your authorization system in Permissions Management, see [View key statistics and data about your authorization system](ui-dashboard.md).

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-enable-tenant.md

Lines changed: 6 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -38,45 +38,16 @@ To enable Permissions Management in your organization:
3838
## How to enable Permissions Management on your Azure AD tenant
3939

4040
1. In your browser:
41-
1. Go to [Azure services](https://portal.azure.com) and use your credentials to sign in to [Azure Active Directory](https://ms.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview).
41+
1. Go to [Entra services](https://entra.microsoft.com) and use your credentials to sign in to [Azure Active Directory](https://ms.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview).
4242
1. If you aren't already authenticated, sign in as a global administrator user.
4343
1. If needed, activate the global administrator role in your Azure AD tenant.
44-
1. In the Azure AD portal, select **Features highlights**, and then select **Permissions Management**.
44+
1. In the Azure AD portal, select **Permissions Management**, and then select the link to purchase a license or begin a trial.
4545

46-
1. If you're prompted to select a sign in account, sign in as a global administrator for a specified tenant.
47-
48-
The **Welcome to Permissions Management** screen appears, displaying information on how to enable Permissions Management on your tenant.
49-
50-
1. To provide access to the Permissions Management application, create a service principal.
51-
52-
An Azure service principal is a security identity used by user-created apps, services, and automation tools to access specific Azure resources.
53-
54-
> [!NOTE]
55-
> To complete this step, you must have Azure CLI or Azure PowerShell on your system, or an Azure subscription where you can run Cloud Shell.
56-
57-
- To create a service principal that points to the Permissions Management application via Cloud Shell:
58-
59-
1. Copy the script on the **Welcome** screen:
60-
61-
`az ad sp create --id b46c3ac5-9da6-418f-a849-0a07a10b3c6c`
62-
63-
1. If you have an Azure subscription, return to the Azure AD portal and select **Cloud Shell** on the navigation bar.
64-
If you don't have an Azure subscription, open a command prompt on a Windows Server.
65-
1. If you have an Azure subscription, paste the script into Cloud Shell and press **Enter**.
66-
67-
- For information on how to create a service principal through the Azure portal, see [Create an Azure service principal with the Azure CLI](/cli/azure/create-an-azure-service-principal-azure-cli).
68-
69-
- For information on the **az** command and how to sign in with the no subscriptions flag, see [az login](/cli/azure/reference-index?view=azure-cli-latest#az-login&preserve-view=true).
70-
71-
- For information on how to create a service principal via Azure PowerShell, see [Create an Azure service principal with Azure PowerShell](/powershell/azure/create-azure-service-principal-azureps?view=azps-7.1.0&preserve-view=true).
72-
73-
1. After the script runs successfully, the service principal attributes for Permissions Management display. Confirm the attributes.
74-
75-
The **Cloud Infrastructure Entitlement Management** application displays in the Azure AD portal under **Enterprise applications**.
76-
77-
1. Return to the **Welcome to Permissions Management** screen and select **Enable Permissions Management**.
46+
> [!NOTE]
47+
> There are two ways to enable a trial or a full product license, self-service and volume licensing.
48+
> For self-service, navigate to the M365 portal at [https://aka.ms/TryPermissionsManagement](https://aka.ms/TryPermissionsManagement) and purchase licenses or sign up for a free trial. The second way is through Volume Licensing or Enterprise agreements. If your organization falls under a volume license or enterprise agreement scenario, please contact your Microsoft representative.
7849
79-
You have now completed enabling Permissions Management on your tenant. Permissions Management launches with the **Data Collectors** dashboard.
50+
Permissions Management launches with the **Data Collectors** dashboard.
8051

8152
## Configure data collection settings
8253

0 commit comments

Comments
 (0)