Skip to content

Commit be8051b

Browse files
authored
Merge pull request #213732 from MicrosoftDocs/main
10/05 AM Publish
2 parents 6384643 + 1533edb commit be8051b

File tree

239 files changed

+2065
-1034
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

239 files changed

+2065
-1034
lines changed

articles/active-directory/app-provisioning/functions-for-customizing-application-data.md

Lines changed: 28 additions & 28 deletions
Large diffs are not rendered by default.

articles/active-directory/develop/workload-identity-federation-create-trust-user-assigned-managed-identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ For a workflow triggered by a pull request event, specify an **Entity type** of
123123
124124
Fill in the **Cluster issuer URL**, **Namespace**, **Service account name**, and **Name** fields:
125125
126-
- **Cluster issuer URL** is the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer-preview) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster.
126+
- **Cluster issuer URL** is the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster.
127127
- **Service account name** is the name of the Kubernetes service account, which provides an identity for processes that run in a Pod.
128128
- **Namespace** is the service account namespace.
129129
- **Name** is the name of the federated credential, which can't be changed later.
@@ -504,4 +504,4 @@ https://management.azure.com/subscriptions/<SUBSCRIPTION ID>/resourceGroups/<RES
504504

505505
## Next steps
506506

507-
- For information about the required format of JWTs created by external identity providers, read about the [assertion format](active-directory-certificate-credentials.md#assertion-format).
507+
- For information about the required format of JWTs created by external identity providers, read about the [assertion format](active-directory-certificate-credentials.md#assertion-format).

articles/active-directory/develop/workload-identity-federation-create-trust.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ Select the **Kubernetes accessing Azure resources** scenario from the dropdown m
128128
129129
Fill in the **Cluster issuer URL**, **Namespace**, **Service account name**, and **Name** fields:
130130
131-
- **Cluster issuer URL** is the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer-preview) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster.
131+
- **Cluster issuer URL** is the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster.
132132
- **Service account name** is the name of the Kubernetes service account, which provides an identity for processes that run in a Pod.
133133
- **Namespace** is the service account namespace.
134134
- **Name** is the name of the federated credential, which can't be changed later.
@@ -202,7 +202,7 @@ az ad app federated-credential create --id f6475511-fd81-4965-a00e-41e7792b7b9c
202202

203203
### Kubernetes example
204204

205-
*issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer-preview) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
205+
*issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
206206

207207
*subject* is the subject name in the tokens issued to the service account. Kubernetes uses the following format for subject names: `system:serviceaccount:<SERVICE_ACCOUNT_NAMESPACE>:<SERVICE_ACCOUNT_NAME>`.
208208

@@ -346,7 +346,7 @@ New-AzADAppFederatedCredential -ApplicationObjectId $appObjectId -Audience api:/
346346
### Kubernetes example
347347

348348
- *ApplicationObjectId*: the object ID of the app (not the application (client) ID) you previously registered in Azure AD.
349-
- *Issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer-preview) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
349+
- *Issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
350350
- *Subject* is the subject name in the tokens issued to the service account. Kubernetes uses the following format for subject names: `system:serviceaccount:<SERVICE_ACCOUNT_NAMESPACE>:<SERVICE_ACCOUNT_NAME>`.
351351
- *Name* is the name of the federated credential, which can't be changed later.
352352
- *Audience* lists the audiences that can appear in the `aud` claim of the external token.
@@ -446,7 +446,7 @@ And you get the response:
446446

447447
Run the following method to configure a federated identity credential on an app and create a trust relationship with a Kubernetes service account. Specify the following parameters:
448448

449-
- *issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer-preview) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
449+
- *issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
450450
- *subject* is the subject name in the tokens issued to the service account. Kubernetes uses the following format for subject names: `system:serviceaccount:<SERVICE_ACCOUNT_NAMESPACE>:<SERVICE_ACCOUNT_NAME>`.
451451
- *name* is the name of the federated credential, which can't be changed later.
452452
- *audiences* lists the audiences that can appear in the external token. This field is mandatory. The recommended value is "api://AzureADTokenExchange".
@@ -570,4 +570,4 @@ az rest -m DELETE -u 'https://graph.microsoft.com/applications/f6475511-fd81-49
570570
- To learn how to use workload identity federation for GitHub Actions, see [Configure a GitHub Actions workflow to get an access token](/azure/developer/github/connect-from-azure).
571571
- Read the [GitHub Actions documentation](https://docs.github.com/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-azure) to learn more about configuring your GitHub Actions workflow to get an access token from Microsoft identity provider and access Azure resources.
572572
- For more information, read about how Azure AD uses the [OAuth 2.0 client credentials grant](v2-oauth2-client-creds-grant-flow.md#third-case-access-token-request-with-a-federated-credential) and a client assertion issued by another IdP to get a token.
573-
- For information about the required format of JWTs created by external identity providers, read about the [assertion format](active-directory-certificate-credentials.md#assertion-format).
573+
- For information about the required format of JWTs created by external identity providers, read about the [assertion format](active-directory-certificate-credentials.md#assertion-format).

articles/active-directory/governance/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -202,6 +202,10 @@
202202
href: ../privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json
203203
- name: Complete an access review
204204
href: ../privileged-identity-management/pim-complete-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json
205+
- name: Azure AD Privileged Access Groups (Preview)
206+
items:
207+
- name: Create an access review
208+
href: create-access-review-privileged-access-groups.md
205209
- name: Lifecycle Workflows (Preview)
206210
items:
207211
- name: Deployment (Preview)
Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
---
2+
title: Create an access review of Privileged Access Groups - Azure AD (preview)
3+
description: Learn how to create an access review of Privileged Access Groups in Azure Active Directory.
4+
services: active-directory
5+
author: amsliu
6+
manager: amycolannino
7+
editor: markwahl-msft
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ms.tgt_pltfrm: na
11+
ms.topic: how-to
12+
ms.subservice: compliance
13+
ms.date: 09/14/2022
14+
ms.author: amsliu
15+
ms.reviewer: jgangadhar
16+
ms.collection: M365-identity-device-management
17+
---
18+
19+
# Create an access review of Privileged Access Groups in Azure AD (preview)
20+
21+
This article describes how to create one or more access reviews for Privileged Access Groups, which will include the active members of the group as well as the eligible members. Reviews can be performed on both active members of the group, who are active at the time the review is created, and the eligible members of the group.
22+
23+
## Prerequisites
24+
25+
- Azure AD Premium P2.
26+
- Only Global administrators and Privileged Role administrators can create reviews on Privileged Access Groups. For more information, see [Use Azure AD groups to manage role assignments](../roles/groups-concept.md).
27+
28+
For more information, see [License requirements](access-reviews-overview.md#license-requirements).
29+
30+
## Create a Privileged Access Group access review
31+
32+
### Scope
33+
1. Sign in to the Azure portal and open the [Identity Governance](https://portal.azure.com/#blade/Microsoft_AAD_ERM/DashboardBlade/) page.
34+
35+
2. On the left menu, select **Access reviews**.
36+
37+
3. Select **New access review** to create a new access review.
38+
39+
![Screenshot that shows the Access reviews pane in Identity Governance.](./media/create-access-review/access-reviews.png)
40+
41+
4. In the **Select what to review** box, select **Teams + Groups**.
42+
43+
![Screenshot that shows creating an access review.](./media/create-access-review/select-what-review.png)
44+
45+
5. Select **Teams + Groups** and then select **Select Teams + groups** under **Review Scope**. A list of groups to choose from appears on the right.
46+
47+
![Screenshot that shows selecting Teams + Groups.](./media/create-access-review/create-privileged-access-groups-review.png)
48+
49+
> [!NOTE]
50+
> When a Privileged Access Group (PAG) is selected, the users under review for the group will include all eligible users and active users in that group.
51+
52+
6. Now you can select a scope for the review. Your options are:
53+
- **Guest users only**: This option limits the access review to only the Azure AD B2B guest users in your directory.
54+
- **Everyone**: This option scopes the access review to all user objects associated with the resource.
55+
56+
57+
7. If you are conducting group membership review, you can create access reviews for only the inactive users in the group. In the *Users scope* section, check the box next to **Inactive users (on tenant level)**. If you check the box, the scope of the review will focus on inactive users only, those who have not signed in either interactively or non-interactively to the tenant. Then, specify **Days inactive** with a number of days inactive up to 730 days (two years). Users in the group inactive for the specified number of days will be the only users in the review.
58+
59+
> [!NOTE]
60+
> Recently created users are not affected when configuring the inactivity time. The Access Review will check if a user has been created in the time frame configured and disregard users who haven’t existed for at least that amount of time. For example, if you set the inactivity time as 90 days and a guest user was created or invited less than 90 days ago, the guest user will not be in scope of the Access Review. This ensures that a user can sign in at least once before being removed.
61+
62+
8. Select **Next: Reviews**.
63+
64+
After you have reached this step, you may follow the instructions outlined under **Next: Reviews** in the [Create an access review of groups or applications](create-access-review.md#next-reviews) article to complete your access review.
65+
66+
> [!NOTE]
67+
> Review of Privileged Access Groups will only assign active owner(s) as the reviewers. Eligible owners are not included. At least one fallback reviewer is required for a Privileged Access Groups review. If there are no active owner(s) when the review begins, the fallback reviewer(s) will be assigned to the review.
68+
69+
## Next steps
70+
71+
- [Create an access review of groups or applications](create-access-review.md)
72+
- [Approve activation requests for privileged access group members and owners (preview)](../privileged-identity-management/groups-approval-workflow.md)

articles/active-directory/governance/create-access-review.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.workload: identity
1010
ms.tgt_pltfrm: na
1111
ms.topic: how-to
1212
ms.subservice: compliance
13-
ms.date: 08/24/2022
13+
ms.date: 09/09/2022
1414
ms.author: amsliu
1515
ms.reviewer: mwahl
1616
ms.collection: M365-identity-device-management
@@ -95,6 +95,9 @@ If you are reviewing access to an application, then before creating the review,
9595

9696
If you choose either **Managers of users** or **Group owner(s)**, you can also specify a fallback reviewer. Fallback reviewers are asked to do a review when the user has no manager specified in the directory or if the group doesn't have an owner.
9797

98+
>[!IMPORTANT]
99+
> For Privileged Access Groups (Preview), you must select **Group owner(s)**. It is mandatory to assign at least one fallback reviewer to the review. The review will only assign active owner(s) as the reviewer(s). Eligible owners are not included. If there are no active owners when the review begins, the fallback reviewer(s) will be assigned to the review.
100+
98101
![Screenshot that shows New access review.](./media/create-access-review/new-access-review.png)
99102

100103
1. In the **Specify recurrence of review** section, specify the following selections:
@@ -297,8 +300,10 @@ After one or more access reviews have started, you might want to modify or updat
297300

298301
## Next steps
299302

303+
- [Complete an access review of groups or applications](complete-access-review.md)
304+
- [Create an access review of Privileged Access Groups (preview)](create-access-review-privileged-access-groups.md)
300305
- [Review access to groups or applications](perform-access-review.md)
301306
- [Review access for yourself to groups or applications](review-your-access.md)
302-
- [Complete an access review of groups or applications](complete-access-review.md)
307+
303308

304309

123 Bytes
Loading
677 Bytes
Loading
178 KB
Loading
465 Bytes
Loading

0 commit comments

Comments
 (0)