Skip to content

Commit c8c2e23

Browse files
Merge pull request #217584 from JnHs/jh-lh-pimga
remove preview for eligible authorizations
2 parents f4f01ab + c75fb61 commit c8c2e23

File tree

6 files changed

+14
-19
lines changed

6 files changed

+14
-19
lines changed

articles/lighthouse/concepts/cloud-solution-provider.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Cloud Solution Provider program considerations
33
description: For CSP partners, Azure delegated resource management helps improve security and control by enabling granular permissions.
4-
ms.date: 06/09/2022
4+
ms.date: 11/28/2022
55
ms.topic: conceptual
66
---
77

@@ -28,7 +28,7 @@ Using Azure Lighthouse, you can assign different groups to different customers o
2828

2929
Azure Lighthouse helps improve security by limiting unnecessary access to your customers' resources. It also gives you more flexibility to manage multiple customers at scale, using the [Azure built-in role](tenants-users-roles.md#role-support-for-azure-lighthouse) that's most appropriate for each user's duties, without granting a user more access than necessary.
3030

31-
To further minimize the number of permanent assignments, you can [create eligible authorizations](../how-to/create-eligible-authorizations.md) (currently in public preview) to grant additional permissions to your users on a just-in-time basis.
31+
To further minimize the number of permanent assignments, you can [create eligible authorizations](../how-to/create-eligible-authorizations.md) to grant additional permissions to your users on a just-in-time basis.
3232

3333
Onboarding a subscription that you created through the CSP program follows the steps described in [Onboard a subscription to Azure Lighthouse](../how-to/onboard-customer.md). Any user who has the Admin Agent role in the customer's tenant can perform this onboarding.
3434

articles/lighthouse/concepts/recommended-security-practices.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Recommended security practices
33
description: When using Azure Lighthouse, it's important to consider security and access control.
4-
ms.date: 06/09/2022
4+
ms.date: 11/28/2022
55
ms.topic: conceptual
66
---
77

@@ -41,10 +41,10 @@ Once you've created these groups, you can assign users as needed. Only add the u
4141
Keep in mind that when you [onboard customers through a public managed service offer](../how-to/publish-managed-services-offers.md), any group (or user or service principal) that you include will have the same permissions for every customer who purchases the plan. To assign different groups to work with each customer, you'll need to publish a separate private plan that is exclusive to each customer, or onboard customers individually by using Azure Resource Manager templates. For example, you could publish a public plan that has very limited access, then work with the customer directly to onboard their resources for additional access using a customized Azure Resource Template granting additional access as needed.
4242

4343
> [!TIP]
44-
> You can also create *eligible authorizations* that let users in your managing tenant temporarily elevate their role. By using eligible authorizations, you can minimize the number of permanent assignments of users to privileged roles, helping to reduce security risks related to privileged access by users in your tenant. This feature is currently in public preview and has specific licensing requirements. For more information, see [Create eligible authorizations](../how-to/create-eligible-authorizations.md).
44+
> You can also create *eligible authorizations* that let users in your managing tenant temporarily elevate their role. By using eligible authorizations, you can minimize the number of permanent assignments of users to privileged roles, helping to reduce security risks related to privileged access by users in your tenant. This feature has specific licensing requirements. For more information, see [Create eligible authorizations](../how-to/create-eligible-authorizations.md).
4545
4646
## Next steps
4747

48-
- Review the [security baseline information](/security/benchmark/azure/baselines/lighthouse-security-baseline) to understand how guidance from the Microsoft clou security benchmark applies to Azure Lighthouse.
48+
- Review the [security baseline information](/security/benchmark/azure/baselines/lighthouse-security-baseline) to understand how guidance from the Microsoft cloud security benchmark applies to Azure Lighthouse.
4949
- [Deploy Azure AD Multi-Factor Authentication](../../active-directory/authentication/howto-mfa-getstarted.md).
5050
- Learn about [cross-tenant management experiences](cross-tenant-management-experience.md).

articles/lighthouse/how-to/create-eligible-authorizations.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Create eligible authorizations
33
description: When onboarding customers to Azure Lighthouse, you can let users in your managing tenant elevate their role on a just-in-time basis.
4-
ms.date: 02/14/2022
4+
ms.date: 11/28/2022
55
ms.topic: how-to
66
---
77

@@ -13,11 +13,6 @@ Creating eligible authorizations lets you minimize the number of permanent assig
1313

1414
This topic explains how eligible authorizations work and how to create them when [onboarding a customer to Azure Lighthouse](onboard-customer.md).
1515

16-
> [!IMPORTANT]
17-
> Eligible authorizations are currently in public preview.
18-
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
19-
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
20-
2116
## License requirements
2217

2318
Creating eligible authorizations requires an Enterprise Mobility + Security E5 (EMS E5) or Azure AD Premium P2 license. To find the right license for your requirements, see [Comparing generally available features of the Free, Basic, and Premium editions](https://azure.microsoft.com/pricing/details/active-directory/).

articles/lighthouse/how-to/onboard-customer.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Onboard a customer to Azure Lighthouse
33
description: Learn how to onboard a customer to Azure Lighthouse, allowing their resources to be accessed and managed by users in your tenant.
4-
ms.date: 07/08/2022
4+
ms.date: 11/28/2022
55
ms.topic: how-to
66
ms.custom: devx-track-azurepowershell, devx-track-azurecli
77
ms.devlang: azurecli
@@ -55,7 +55,7 @@ When defining your authorizations, be sure to follow the principle of least priv
5555
To track your impact across customer engagements and receive recognition, associate your Microsoft Cloud Partner Program ID with at least one user account that has access to each of your onboarded subscriptions. You'll need to perform this association in your service provider tenant. We recommend creating a service principal account in your tenant that is associated with your partner ID, then including that service principal every time you onboard a customer. For more info, see [Link your partner ID to enable partner earned credit on delegated resources](partner-earned-credit.md).
5656

5757
> [!TIP]
58-
> You can also create *eligible authorizations* that let users in your managing tenant temporarily elevate their role. This feature is currently in public preview and has specific licensing requirements. For more information, see [Create eligible authorizations](create-eligible-authorizations.md).
58+
> You can also create *eligible authorizations* that let users in your managing tenant temporarily elevate their role. This feature has specific licensing requirements. For more information, see [Create eligible authorizations](create-eligible-authorizations.md).
5959
6060
## Create an Azure Resource Manager template
6161

@@ -89,7 +89,7 @@ Finally, create your authorizations by selecting **+ Add authorization**. For ea
8989
1. Select the **+ Select user** link to open the selection pane. You can use the search field to find the user you'd like to add. Once you've done so, click **Select**. The user's **Principal ID** will be automatically populated.
9090
1. Review the **Display name** field (populated based on the user you selected) and make changes, if desired.
9191
1. Select the **Role** to assign to this user.
92-
1. For **Access** type, select **Permanent** or **Eligible**. If you choose **Eligible**, you will need to specify options for maximum duration, multifactor authentication, and whether or not approval is required. For more information about these options, see [Create eligible authorizations](create-eligible-authorizations.md). The eligible authorizations feature is currently in public preview, and can't be used with service principals.
92+
1. For **Access** type, select **Permanent** or **Eligible**. If you choose **Eligible**, you will need to specify options for maximum duration, multifactor authentication, and whether or not approval is required. For more information about these options, see [Create eligible authorizations](create-eligible-authorizations.md). The eligible authorizations feature can't be used with service principals.
9393
1. Select **Add** to create your authorization.
9494

9595
:::image type="content" source="../media/add-authorization.png" alt-text="Screenshot of the Add authorization section in the Azure portal.":::
@@ -114,7 +114,7 @@ The template you choose will depend on whether you are onboarding an entire subs
114114
|Multiple resource groups within a subscription |[multi-rg.json](https://github.com/Azure/Azure-Lighthouse-samples/blob/master/templates/delegated-resource-management/rg/multi-rg.json) |[multiple-rg.parameters.json](https://github.com/Azure/Azure-Lighthouse-samples/blob/master/templates/delegated-resource-management/rg/multiple-rg.parameters.json) |
115115
|Subscription (when using an offer published to Azure Marketplace) |[marketplaceDelegatedResourceManagement.json](https://github.com/Azure/Azure-Lighthouse-samples/blob/master/templates/marketplace-delegated-resource-management/marketplaceDelegatedResourceManagement.json) |[marketplaceDelegatedResourceManagement.parameters.json](https://github.com/Azure/Azure-Lighthouse-samples/blob/master/templates/marketplace-delegated-resource-management/marketplaceDelegatedResourceManagement.parameters.json) |
116116

117-
If you want to include [eligible authorizations](create-eligible-authorizations.md#create-eligible-authorizations-using-azure-resource-manager-templates) (currently in public preview), select the corresponding template from the [delegated-resource-management-eligible-authorizations section of our samples repo](https://github.com/Azure/Azure-Lighthouse-samples/tree/master/templates/delegated-resource-management-eligible-authorizations).
117+
If you want to include [eligible authorizations](create-eligible-authorizations.md#create-eligible-authorizations-using-azure-resource-manager-templates), select the corresponding template from the [delegated-resource-management-eligible-authorizations section of our samples repo](https://github.com/Azure/Azure-Lighthouse-samples/tree/master/templates/delegated-resource-management-eligible-authorizations).
118118

119119
> [!TIP]
120120
> While you can't onboard an entire management group in one deployment, you can deploy a policy to [onboard each subscription in a management group](onboard-management-group.md). You'll then have access to all of the subscriptions in the management group, although you'll have to work on them as individual subscriptions (rather than taking actions on the management group resource directly).

articles/lighthouse/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ metadata:
1111
ms.collection: collection
1212
author: JnHs
1313
ms.author: jenhayes
14-
ms.date: 06/20/2022
14+
ms.date: 11/28/2022
1515

1616
landingContent:
1717
- title: About Azure Lighthouse
@@ -33,7 +33,7 @@ landingContent:
3333
links:
3434
- text: Onboard a customer to Azure Lighthouse
3535
url: ./how-to/onboard-customer.md
36-
- text: Just-in-time roles (preview)
36+
- text: Just-in-time roles
3737
url: ./how-to/create-eligible-authorizations.md
3838
- text: View and manage customers
3939
url: ./how-to/view-manage-customers.md

articles/marketplace/create-managed-service-offer-plans.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: telupu
66
ms.service: marketplace
77
ms.subservice: partnercenter-marketplace-publisher
88
ms.topic: how-to
9-
ms.date: 03/15/2022
9+
ms.date: 11/28/2022
1010
---
1111

1212
# Create plans for a Managed Service offer
@@ -102,7 +102,7 @@ Provide the following information for each **Authorization**. Select **+ Add aut
102102
- **Principal ID**: The Azure AD identifier of a user, user group, or service principal that will be granted certain permissions (as defined by the **Role** you specify) to your customers' resources.
103103
- **Access type**:
104104
- **Active** authorizations have the privileges assigned to the role at all times. Each plan must have at least one Active authorization.
105-
- **Eligible** authorizations are time-limited and require activation by the user. If you select **Eligible**, you must select a maximum duration that defines the total length of time for which the user will have the eligible role after it's activated. The minimum value is 30 minutes and the maximum is 8 hours. You can also select whether to require multifactor authentication in order to activate the role. Note that eligible authorizations are currently in public preview and have specific licensing requirements. For more information, see [Create eligible authorizations](../lighthouse/how-to/create-eligible-authorizations.md).
105+
- **Eligible** authorizations are time-limited and require activation by the user. If you select **Eligible**, you must select a maximum duration that defines the total length of time for which the user will have the eligible role after it's activated. The minimum value is 30 minutes and the maximum is 8 hours. You can also select whether to require multifactor authentication in order to activate the role. This feature has specific licensing requirements. For more information, see [Create eligible authorizations](../lighthouse/how-to/create-eligible-authorizations.md).
106106
- **Role**: Select one of the available Azure AD built-in roles from the list. This role will determine the permissions that the user in the **Principal ID** field will have on your customers' resources. For descriptions of these roles, see [Built-in roles](../role-based-access-control/built-in-roles.md) and [Role support for Azure Lighthouse](../lighthouse/concepts/tenants-users-roles.md#role-support-for-azure-lighthouse).
107107
> [!NOTE]
108108
> As applicable new built-in roles are added to Azure, they will become available here, although there may be some delay before they appear.

0 commit comments

Comments
 (0)