You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Configure an automatic assignment policy for an access package in Azure AD entitlement management - Azure Active Directory
3
+
description: Learn how to configure automatic assignments based on rules for an access package in Azure Active Directory entitlement management.
4
+
services: active-directory
5
+
documentationCenter: ''
6
+
author: markwahl-msft
7
+
manager: karenhoran
8
+
editor:
9
+
ms.service: active-directory
10
+
ms.workload: identity
11
+
ms.tgt_pltfrm: na
12
+
ms.topic: how-to
13
+
ms.subservice: compliance
14
+
ms.date: 08/15/2022
15
+
ms.author: owinfrey
16
+
ms.reviewer: mwahl
17
+
ms.collection: M365-identity-device-management
18
+
19
+
20
+
#Customer intent: As an administrator, I want detailed information about how I can edit an access package to include a policy for users to get and lose access package assignments automatically, without them or an administrator needing to request access.
21
+
22
+
---
23
+
# Configure an automatic assignment policy for an access package in Azure AD entitlement management (Preview)
24
+
25
+
You can use rules to determine access package assignment based on user properties in Azure Active Directory (Azure AD), part of Microsoft Entra. In Entitlement Management, an access package can have multiple policies, and each policy establishes how users get an assignment to the access package, and for how long. As an administrator, you can establish a policy for automatic assignments by supplying a membership rule, that Entitlement Management will follow to create and remove assignments automatically. Similar to a [dynamic group](../enterprise-users/groups-create-rule.md), when an automatic assignment policy is created, user attributes are evaluated for matches with the policy's membership rule. When an attribute changes for a user, these automatic assignment policy rules in the access packages are processed for membership changes. Assignments to users are then added or removed depending on whether they meet the rule criteria.
26
+
27
+
During this preview, you can have at most one automatic assignment policy in an access package.
28
+
29
+
This article describes how to create an access package automatic assignment policy for an existing access package.
30
+
31
+
## Create an automatic assignment policy (Preview)
32
+
33
+
To create a policy for an access package, you need to start from the access package's policy tab. Follow these steps to create a new policy for an access package.
34
+
35
+
**Prerequisite role:** Global administrator, Identity Governance administrator, Catalog owner, or Access package manager
36
+
37
+
1. In the Azure portal, click **Azure Active Directory** and then click **Identity Governance**.
38
+
39
+
1. In the left menu, click **Access packages** and then open the access package.
40
+
41
+
1. Click **Policies** and then **Add auto-assignment policy** to create a new policy.
42
+
43
+
1. In the first tab, you'll specify the rule. Click **Edit**.
44
+
45
+
1. Provide a dynamic membership rule, using the [membership rule builder](../enterprise-users/groups-dynamic-membership.md) or by clicking **Edit** on the rule syntax text box.
46
+
47
+
> [!NOTE]
48
+
> The rule builder might not be able to display some rules constructed in the text box. For more information, see [rule builder in the Azure portal](/enterprise-users/groups-create-rule.md#rule-builder-in-the-azure-portal).
49
+
50
+

51
+
52
+
1. Click **Save** to close the dynamic membership rule editor, then click **Next** to open the **Custom Extensions** tab.
53
+
54
+
1. If you have [custom extensions](entitlement-management-logic-apps-integration.md) in your catalog you wish to have run when the policy assigns or removes access, you can add them to this policy. Then click next to open the **Review** tab.
55
+
56
+
1. Type a name and a description for the policy.
57
+
58
+

59
+
60
+
1. Click **Create** to save the policy.
61
+
62
+
> [!NOTE]
63
+
> In this preview, Entitlement management will automatically create a dynamic security group corresponding to each policy, in order to evaluate the users in scope. This group should not be modified except by Entitlement Management itself. This group may also be modified or deleted automatically by Entitlement Management, so don't use this group for other applications or scenarios.
64
+
65
+
1. Azure AD will evaluate the users in the organization that are in scope of this rule, and create assignments for those users who don't already have assignments to the access package. It may take several minutes for the evaluation to occur, or for subsequent updates to user's attributes to be reflected in the access package assignments.
66
+
67
+
## Create an automatic assignment policy programmatically (Preview)
68
+
69
+
You can also create a policy using Microsoft Graph. A user in an appropriate role with an application that has the delegated `EntitlementManagement.ReadWrite.All` permission, or an application in a catalog role or with the `EntitlementManagement.ReadWrite.All` permission, can call the [create an accessPackageAssignmentPolicy](/graph/api/entitlementmanagement-post-assignmentpolicies?tabs=http&view=graph-rest-1.0&preserve-view=true) API. In your [request payload](/graph/api/resources/accesspackageassignmentpolicy?view=graph-rest-1.0&preserve-view=true), include the `displayName`, `description`, `specificAllowedTargets`, [`automaticRequestSettings`](/graph/api/resources/accesspackageautomaticrequestsettings?view=graph-rest-1.0&preserve-view=true) and `accessPackage` properties of the policy.
70
+
71
+
## Next steps
72
+
73
+
-[View assignments for an access package](entitlement-management-access-package-assignments.md)
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-access-package-request-policy.md
+11-4Lines changed: 11 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,9 +30,11 @@ The way you specify who can request an access package is with a policy. Before c
30
30
31
31
When you create an access package, you can specify the request, approval and lifecycle settings, which are stored on the first policy of the access package. Most access packages will have a single policy for users to request access, but a single access package can have multiple policies. You would create multiple policies for an access package if you want to allow different sets of users to be granted assignments with different request and approval settings.
32
32
33
-
For example, a single policy cannot be used to assign internal and external users to the same access package. However, you can create two policies in the same access package, one for internal users and one for external users. If there are multiple policies that apply to a user, they will be prompted at the time of their request to select the policy they would like to be assigned to. The following diagram shows an access package with two policies.
33
+
For example, a single policy cannot be used to assign internal and external users to the same access package. However, you can create two policies in the same access package, one for internal users and one for external users. If there are multiple policies that apply to a user to request, they will be prompted at the time of their request to select the policy they would like to be assigned to. The following diagram shows an access package with two policies.
34
34
35
-

35
+

36
+
37
+
In addition to policies for users to request access, you can also have policies for [automatic assignment](entitlement-management-access-package-auto-assignment-policy.md), and policies for direct assignment by administrators or catalog owners.
36
38
37
39
### How many policies will I need?
38
40
@@ -43,7 +45,8 @@ For example, a single policy cannot be used to assign internal and external user
43
45
| I want to allow users in my directory and also users outside my directory to request an access package | Two |
44
46
| I want to specify different approval settings for some users | One for each group of users |
45
47
| I want some users access package assignments to expire while other users can extend their access | One for each group of users |
46
-
| I want users to request access and other users to be assigned access by an administrator | Two |
48
+
| I want some users to request access and other users to be assigned access by an administrator | Two |
49
+
| I want some users in my organization to receive access automatically, other users in my organization to be able to request, and other users to be assigned access by an administrator | Three |
47
50
48
51
For information about the priority logic that is used when multiple policies apply, see [Multiple policies](entitlement-management-troubleshoot.md#multiple-policies
49
52
).
@@ -105,7 +108,7 @@ Follow these steps if you want to allow users in your directory to be able to re
105
108
106
109
## For users not in your directory
107
110
108
-
**Users not in your directory** refers to users who are in another Azure AD directory or domain. These users may not have yet been invited into your directory. Azure AD directories must be configured to be allow invitations in **Collaboration restrictions**. For more information, see [Configure external collaboration settings](../external-identities/external-collaboration-settings-configure.md).
111
+
**Users not in your directory** refers to users who are in another Azure AD directory or domain. These users may not have yet been invited into your directory. Azure AD directories must be configured to allow invitations in **Collaboration restrictions**. For more information, see [Configure external collaboration settings](../external-identities/external-collaboration-settings-configure.md).
109
112
110
113
> [!NOTE]
111
114
> A guest user account will be created for a user not yet in your directory whose request is approved or auto-approved. The guest will be invited, but will not receive an invite email. Instead, they will receive an email when their access package assignment is delivered. By default, later when that guest user no longer has any access package assignments, because their last assignment has expired or been cancelled, that guest user account will be blocked from sign in and subsequently deleted. If you want to have guest users remain in your directory indefinitely, even if they have no access package assignments, you can change the settings for your entitlement management configuration. For more information about the guest user object, see [Properties of an Azure Active Directory B2B collaboration user](../external-identities/user-properties.md).
@@ -206,6 +209,10 @@ To change the request and approval settings for an access package, you need to o
206
209
207
210
1. If you are editing a policy click **Update**. If you are adding a new policy, click **Create**.
208
211
212
+
## Creating an access package assignment policy programmatically
213
+
214
+
You can also create a policy using Microsoft Graph. A user in an appropriate role with an application that has the delegated `EntitlementManagement.ReadWrite.All` permission, or an application in a catalog role or with the `EntitlementManagement.ReadWrite.All` permission, can call the [create an accessPackageAssignmentPolicy](/graph/api/entitlementmanagement-post-assignmentpolicies?tabs=http&view=graph-rest-1.0&preserve-view=true) API.
215
+
209
216
## Prevent requests from users with incompatible access
210
217
211
218
In addition to the policy checks on who can request, you may wish to further restrict access, in order to avoid a user who already has some access - via a group or another access package - from obtaining excessive access.
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-overview.md
+11-10Lines changed: 11 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,6 +50,7 @@ Azure AD entitlement management can help address these challenges. To learn mor
50
50
Here are some of capabilities of entitlement management:
51
51
52
52
- Control who can get access to applications, groups, Teams and SharePoint sites, with multi-stage approval, and ensure users don't retain access indefinitely through time-limited assignments and recurring access reviews.
53
+
- Give users access automatically to those resources, based on the user's properties like department or cost center, and remove a user's access when those properties change (preview).
53
54
- Delegate to non-administrators the ability to create access packages. These access packages contain resources that users can request, and the delegated access package managers can define policies with rules for which users can request, who must approve their access, and when access expires.
54
55
- Select connected organizations whose users can request access. When a user who isn't yet in your directory requests access, and is approved, they're automatically invited into your directory and assigned access. When their access expires, if they have no other access package assignments, their B2B account in your directory can be automatically removed.
55
56
@@ -93,7 +94,7 @@ You can have policies for users to request access. In these kinds of policies, a
93
94
- The approval process and the users that can approve or deny access
94
95
- The duration of a user's access assignment, once approved, before the assignment expires
95
96
96
-
You can also have policies for users to be assigned access, either by an administrator or automatically.
97
+
You can also have policies for users to be assigned access, either by an administrator or [automatically](entitlement-management-access-package-auto-assignment-policy.md).
97
98
98
99
The following diagram shows an example of the different elements in entitlement management. It shows one catalog with two example access packages.
99
100
@@ -143,17 +144,17 @@ Specialized clouds, such as Azure Germany, and Azure China 21Vianet, aren't curr
143
144
144
145
Ensure that your directory has at least as many Azure AD Premium P2 licenses as you have:
145
146
146
-
- Member users who **can** request an access package.
147
-
- Member users who <u>request</u> an access package.
148
-
- Member users who <u>approve requests</u> for an access package.
149
-
- Member users who <u>review assignments</u> for an access package.
150
-
- Member users who have a <u>direct assignment</u> to an access package.
147
+
- Member users who *can* request an access package.
148
+
- Member users who *request* an access package.
149
+
- Member users who *approve requests* for an access package.
150
+
- Member users who *review assignments* for an access package.
151
+
- Member users who have a *direct assignment* or an *automatic assignment* to an access package.
151
152
152
153
For guest users, licensing needs will depend on the [licensing model](../external-identities/external-identities-pricing.md) you’re using. However, the below guest users’ activities are considered Azure AD Premium P2 usage:
153
-
- Guest users who <u>request</u> an access package.
154
-
- Guest users who <u>approve requests</u> for an access package.
155
-
- Guest users who <u>review assignments</u> for an access package.
156
-
- Guest users who have a <u>direct assignment</u> to an access package.
154
+
- Guest users who *request* an access package.
155
+
- Guest users who *approve requests* for an access package.
156
+
- Guest users who *review assignments* for an access package.
157
+
- Guest users who have a *direct assignment* to an access package.
157
158
158
159
Azure AD Premium P2 licenses are **not** required for the following tasks:
1.[Create a new access package](entitlement-management-access-package-create.md#start-new-access-package)
53
+
1.[Add groups, Teams, applications, or SharePoint sites to access package](entitlement-management-access-package-create.md#resource-roles)
54
+
1.[Add an automatic assignment policy](entitlement-management-access-package-auto-assignment-policy.md)
55
+
50
56
### Access package manager: Allow employees in your organization to request access to resources
51
57
52
58
1.[Create a new access package](entitlement-management-access-package-create.md#start-new-access-package)
@@ -151,7 +157,7 @@ There are several ways that you can configure entitlement management for your or
151
157
152
158
## Programmatic administration
153
159
154
-
You can also manage access packages, catalogs, policies, requests and assignments using Microsoft Graph. A user in an appropriate role with an application that has the delegated `EntitlementManagement.Read.All` or `EntitlementManagement.ReadWrite.All` permission can call the [entitlement management API](/graph/tutorial-access-package-api). An application with those application permissions can also use many of those API functions, with the exception of managing resources in catalogs and access packages. An an applications which only needs to operate within specific catalogs, can be added to the **Catalog owner** or **Catalog reader** roles of a catalog to be authorized to update or read within that catalog.
160
+
You can also manage access packages, catalogs, policies, requests and assignments using Microsoft Graph. A user in an appropriate role with an application that has the delegated `EntitlementManagement.Read.All` or `EntitlementManagement.ReadWrite.All` permission can call the [entitlement management API](/graph/tutorial-access-package-api). An application with those application permissions can also use many of those API functions, with the exception of managing resources in catalogs and access packages. And an application which only needs to operate within specific catalogs can be added to the **Catalog owner** or **Catalog reader** roles of a catalog to be authorized to update or read within that catalog.
Copy file name to clipboardExpand all lines: articles/active-directory/governance/identity-governance-overview.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -109,6 +109,7 @@ Once you've started using these identity governance features, you can easily aut
109
109
| Creating, updating and deleting AD and Azure AD user accounts automatically for employees |[Plan cloud HR to Azure AD user provisioning](../app-provisioning/plan-cloud-hr-provision.md)|
110
110
| Updating the membership of a group, based on changes to the member user's attributes |[Create a dynamic group](../enterprise-users/groups-create-rule.md)|
| Adding and removing a user's group memberships, application roles, and SharePoint site roles, based on changes to the user's attributes |[Configure an automatic assignment policy for an access package in entitlement management](entitlement-management-access-package-auto-assignment-policy.md) (preview)|
112
113
| Adding and removing a user's group memberships, application roles, and SharePoint site roles, on a specific date |[Configure lifecycle settings for an access package in entitlement management](entitlement-management-access-package-lifecycle-policy.md)|
113
114
| Running custom workflows when a user requests or receives access, or access is removed |[Trigger Logic Apps in entitlement management](entitlement-management-logic-apps-integration.md) (preview) |
114
115
| Regularly having memberships of guests in Microsoft groups and Teams reviewed, and removing guest memberships that are denied |[Create an access review](create-access-review.md)|
0 commit comments