Skip to content

Commit c922dcc

Browse files
Merge pull request #253746 from jenniferf-skc/trialpermissions
Updating required permissions, small text edits
2 parents 2fd31b6 + 00e95d5 commit c922dcc

File tree

2 files changed

+13
-15
lines changed

2 files changed

+13
-15
lines changed

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-enable-tenant.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 09/13/2023
11+
ms.date: 10/04/2023
1212
ms.author: jfields
1313
---
1414

@@ -17,7 +17,7 @@ ms.author: jfields
1717
This article describes how to enable Microsoft Entra Permissions Management in your organization. Once you've enabled Permissions Management, you can connect it to your Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP) platforms.
1818

1919
> [!NOTE]
20-
> To complete this task, you must have *Microsoft Entra Permissions Management Administrator* permissions. You can't enable Permissions Management as a user from another tenant who has signed in via B2B or via Azure Lighthouse.
20+
> To complete this task, you must have at least [*Billing Administrator*](https://go.microsoft.com/fwlink/?linkid=2248574) permissions. You can't enable Permissions Management as a user from another tenant who has signed in via B2B or via Azure Lighthouse.
2121
2222
:::image type="content" source="media/onboard-enable-tenant/dashboard.png" alt-text="Screenshot of the Microsoft Entra Permissions Management dashboard." lightbox="media/onboard-enable-tenant/dashboard.png":::
2323

@@ -33,7 +33,7 @@ To enable Permissions Management in your organization:
3333
## How to enable Permissions Management on your Microsoft Entra tenant
3434

3535
1. In your browser:
36-
1. Browse to the [Microsoft Entra admin center](https://entra.microsoft.com) and sign in to [Microsoft Entra ID](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview) as a [Global Administrator](https://aka.ms/globaladmin).
36+
1. Browse to the [Microsoft Entra admin center](https://entra.microsoft.com) and sign in to [Microsoft Entra ID](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview) as at least a [Billing Administrator](https://go.microsoft.com/fwlink/?linkid=2248574).
3737
1. If needed, activate the *Permissions Management Administrator* role in your Microsoft Entra tenant.
3838
1. In the Azure portal, select **Microsoft Entra Permissions Management**, then select the link to purchase a license or begin a trial.
3939

articles/active-directory/cloud-infrastructure-entitlement-management/overview.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,18 @@
11
---
2-
title: What's Permissions Management?
3-
description: An introduction to Permissions Management.
2+
title: What's Microsoft Entra Permissions Management?
3+
description: An introduction to Microsoft Entra Permissions Management.
44
services: active-directory
55
author: jenniferf-skc
66
manager: amycolannino
77
ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: overview
11-
ms.date: 09/15/2023
11+
ms.date: 10/04/2023
1212
ms.author: jfields
1313
---
1414

15-
# What's Microsoft Entra Permissions Management?
16-
17-
## Overview
15+
# What's Microsoft Entra Permissions Management
1816

1917
Microsoft Entra Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. For example, over-privileged workload and user identities, actions, and resources across multicloud infrastructures in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
2018

@@ -23,19 +21,19 @@ Permissions Management detects, automatically right-sizes, and continuously mon
2321
Organizations have to consider permissions management as a central piece of their Zero Trust security to implement least privilege access across their entire infrastructure:
2422

2523
- Organizations are increasingly adopting multicloud strategy and are struggling with the lack of visibility and the increasing complexity of managing access permissions.
26-
- With the proliferation of identities and cloud services, the number of high-risk cloud permissions is exploding, expanding the attack surface for organizations.
24+
- With the growth of identities and cloud services, the number of high-risk cloud permissions is exploding, expanding the attack surface for organizations.
2725
- IT security teams are under increased pressure to ensure access to their expanding cloud estate is secure and compliant.
2826
- The inconsistency of cloud providers' native access management models makes it even more complex for Security and Identity to manage permissions and enforce least privilege access policies across their entire environment.
2927

3028
:::image type="content" source="media/overview/key-use-cases.png" alt-text="Diagram of Microsoft Entra Permissions Management use cases." lightbox="media/overview/key-use-cases.png":::
3129

3230
## Key use cases
3331

34-
Permissions Management allows customers to address three key use cases: *discover*, *remediate*, and *monitor*.
32+
Permissions Management allows customers to address three key use cases: *discover*, *remediate*, and *monitor*.
3533

36-
Permissions Management has been designed in such a way that we recommended you 'step-through' each of the below phases in order to gain insights into permissions across the organization. This is because you generally can't action what is yet to be discovered, likewise you can't continually evaluate what is yet to be remediated.
34+
Permissions Management is designed in such a way that we recommended you 'step-through' each of the below phases in order to gain insights into permissions across the organization. This is because you generally can't take action on what has not been discovered, likewise you can't continually evaluate what has not been remediated.
3735

38-
:::image type="content" source="media/overview/discover-remediate-monitor.png" alt-text="Use case for Permissions Management." lightbox="media/overview/discover-remediate-monitor.png":::
36+
:::image type="content" source="media/overview/discover-remediate-monitor.png" alt-text="Permissions Management use case diagram showing the discover, remediate, and monitor phases.":::
3937

4038
### Discover
4139

@@ -60,7 +58,7 @@ Customers can detect anomalous activities with machine learning-powered (ML-powe
6058
- ML-powered anomaly detections.
6159
- Context-rich forensic reports around identities, actions, and resources to support rapid investigation and remediation.
6260

63-
Permissions Management deepens Zero Trust security strategies by augmenting the least privilege access principle, allowing customers to:
61+
Permissions Management deepens Zero Trust security strategies by augmenting the least privilege access principle, allowing customers to:
6462

6563
- Get comprehensive visibility: Discover which identity is doing what, where, and when.
6664
- Automate least privilege access: Use access analytics to ensure identities have the right permissions, at the right time.
@@ -72,4 +70,4 @@ Once your organization has explored and implemented the discover, remediation an
7270

7371
- Deepen your learning with [Introduction to Microsoft Entra Permissions Management](https://go.microsoft.com/fwlink/?linkid=2240016) learn module.
7472
- Sign up for a [45-day free trial](https://aka.ms/TryPermissionsManagement) of Permissions Management.
75-
- For a list of frequently asked questions (FAQs) about Permissions Management, see [FAQs](faqs.md).
73+
- For a list of frequently asked questions (FAQs) about Permissions Management, see [FAQs](faqs.md).

0 commit comments

Comments
 (0)