You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-enable-tenant.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: ciem
9
9
ms.workload: identity
10
10
ms.topic: how-to
11
-
ms.date: 09/13/2023
11
+
ms.date: 10/04/2023
12
12
ms.author: jfields
13
13
---
14
14
@@ -17,7 +17,7 @@ ms.author: jfields
17
17
This article describes how to enable Microsoft Entra Permissions Management in your organization. Once you've enabled Permissions Management, you can connect it to your Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP) platforms.
18
18
19
19
> [!NOTE]
20
-
> To complete this task, you must have *Microsoft Entra Permissions Management Administrator* permissions. You can't enable Permissions Management as a user from another tenant who has signed in via B2B or via Azure Lighthouse.
20
+
> To complete this task, you must have at least [*Billing Administrator*](https://go.microsoft.com/fwlink/?linkid=2248574) permissions. You can't enable Permissions Management as a user from another tenant who has signed in via B2B or via Azure Lighthouse.
21
21
22
22
:::image type="content" source="media/onboard-enable-tenant/dashboard.png" alt-text="Screenshot of the Microsoft Entra Permissions Management dashboard." lightbox="media/onboard-enable-tenant/dashboard.png":::
23
23
@@ -33,7 +33,7 @@ To enable Permissions Management in your organization:
33
33
## How to enable Permissions Management on your Microsoft Entra tenant
34
34
35
35
1. In your browser:
36
-
1. Browse to the [Microsoft Entra admin center](https://entra.microsoft.com) and sign in to [Microsoft Entra ID](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview) as a [Global Administrator](https://aka.ms/globaladmin).
36
+
1. Browse to the [Microsoft Entra admin center](https://entra.microsoft.com) and sign in to [Microsoft Entra ID](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview) as at least a [Billing Administrator](https://go.microsoft.com/fwlink/?linkid=2248574).
37
37
1. If needed, activate the *Permissions Management Administrator* role in your Microsoft Entra tenant.
38
38
1. In the Azure portal, select **Microsoft Entra Permissions Management**, then select the link to purchase a license or begin a trial.
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/overview.md
+10-12Lines changed: 10 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,20 +1,18 @@
1
1
---
2
-
title: What's Permissions Management?
3
-
description: An introduction to Permissions Management.
2
+
title: What's Microsoft Entra Permissions Management?
3
+
description: An introduction to Microsoft Entra Permissions Management.
4
4
services: active-directory
5
5
author: jenniferf-skc
6
6
manager: amycolannino
7
7
ms.service: active-directory
8
8
ms.subservice: ciem
9
9
ms.workload: identity
10
10
ms.topic: overview
11
-
ms.date: 09/15/2023
11
+
ms.date: 10/04/2023
12
12
ms.author: jfields
13
13
---
14
14
15
-
# What's Microsoft Entra Permissions Management?
16
-
17
-
## Overview
15
+
# What's Microsoft Entra Permissions Management
18
16
19
17
Microsoft Entra Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. For example, over-privileged workload and user identities, actions, and resources across multicloud infrastructures in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
Organizations have to consider permissions management as a central piece of their Zero Trust security to implement least privilege access across their entire infrastructure:
24
22
25
23
- Organizations are increasingly adopting multicloud strategy and are struggling with the lack of visibility and the increasing complexity of managing access permissions.
26
-
- With the proliferation of identities and cloud services, the number of high-risk cloud permissions is exploding, expanding the attack surface for organizations.
24
+
- With the growth of identities and cloud services, the number of high-risk cloud permissions is exploding, expanding the attack surface for organizations.
27
25
- IT security teams are under increased pressure to ensure access to their expanding cloud estate is secure and compliant.
28
26
- The inconsistency of cloud providers' native access management models makes it even more complex for Security and Identity to manage permissions and enforce least privilege access policies across their entire environment.
29
27
30
28
:::image type="content" source="media/overview/key-use-cases.png" alt-text="Diagram of Microsoft Entra Permissions Management use cases." lightbox="media/overview/key-use-cases.png":::
31
29
32
30
## Key use cases
33
31
34
-
Permissions Management allows customers to address three key use cases: *discover*, *remediate*, and *monitor*.
32
+
Permissions Management allows customers to address three key use cases: *discover*, *remediate*, and *monitor*.
35
33
36
-
Permissions Management has been designed in such a way that we recommended you 'step-through' each of the below phases in order to gain insights into permissions across the organization. This is because you generally can't action what is yet to be discovered, likewise you can't continually evaluate what is yet to be remediated.
34
+
Permissions Management is designed in such a way that we recommended you 'step-through' each of the below phases in order to gain insights into permissions across the organization. This is because you generally can't take action on what has not been discovered, likewise you can't continually evaluate what has not been remediated.
37
35
38
-
:::image type="content" source="media/overview/discover-remediate-monitor.png" alt-text="Use case for Permissions Management." lightbox="media/overview/discover-remediate-monitor.png":::
36
+
:::image type="content" source="media/overview/discover-remediate-monitor.png" alt-text="Permissions Management use case diagram showing the discover, remediate, and monitor phases.":::
39
37
40
38
### Discover
41
39
@@ -60,7 +58,7 @@ Customers can detect anomalous activities with machine learning-powered (ML-powe
60
58
- ML-powered anomaly detections.
61
59
- Context-rich forensic reports around identities, actions, and resources to support rapid investigation and remediation.
62
60
63
-
Permissions Management deepens Zero Trust security strategies by augmenting the least privilege access principle, allowing customers to:
61
+
Permissions Management deepens Zero Trust security strategies by augmenting the least privilege access principle, allowing customers to:
64
62
65
63
- Get comprehensive visibility: Discover which identity is doing what, where, and when.
66
64
- Automate least privilege access: Use access analytics to ensure identities have the right permissions, at the right time.
@@ -72,4 +70,4 @@ Once your organization has explored and implemented the discover, remediation an
72
70
73
71
- Deepen your learning with [Introduction to Microsoft Entra Permissions Management](https://go.microsoft.com/fwlink/?linkid=2240016) learn module.
74
72
- Sign up for a [45-day free trial](https://aka.ms/TryPermissionsManagement) of Permissions Management.
75
-
- For a list of frequently asked questions (FAQs) about Permissions Management, see [FAQs](faqs.md).
73
+
- For a list of frequently asked questions (FAQs) about Permissions Management, see [FAQs](faqs.md).
0 commit comments