Skip to content

Commit ce0b593

Browse files
authored
Merge pull request #241849 from jenniferf-skc/contentfreshness2
Content freshness updates round 2 for 6_16
2 parents 5ad3409 + cf676c3 commit ce0b593

14 files changed

+59
-71
lines changed

articles/active-directory/cloud-infrastructure-entitlement-management/TOC.yml

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,16 +27,13 @@
2727
href: onboard-enable-controller-after-onboarding.md
2828
- name: Add an account/ subscription/ project after onboarding is complete
2929
href: onboard-add-account-after-onboarding.md
30-
- name: View risk metrics in your authorization system
30+
- name: View information about your Authorization Systems
3131
expanded: false
3232
items:
3333
- name: View key statistics and data about your authorization system
3434
href: ui-dashboard.md
3535
- name: View data about the activity in your authorization system
3636
href: product-dashboard.md
37-
- name: View information about your Authorization Systems
38-
expanded: false
39-
items:
4037
- name: View and configure settings for data collection
4138
href: product-data-sources.md
4239
- name: View current billable resources in your authorization system

articles/active-directory/cloud-infrastructure-entitlement-management/how-to-recommendations-rule.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
2-
title: Generate, view, and apply rule recommendations in the Autopilot dashboard in Permissions Management
3-
description: How to generate, view, and apply rule recommendations in the Autopilot dashboard in Permissions Management.
2+
title: Generate, view, and apply rule recommendations in the Microsoft Entra Permissions Management Autopilot dashboard
3+
description: How to generate, view, and apply rule recommendations in the Microsoft Entra Permissions Management Autopilot dashboard.
44
services: active-directory
55
author: jenniferf-skc
66
manager: amycolannino
77
ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 02/23/2022
11+
ms.date: 06/16/2023
1212
ms.author: jfields
1313
---
1414

articles/active-directory/cloud-infrastructure-entitlement-management/how-to-revoke-task-readonly-status.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
2-
title: Revoke access to high-risk and unused tasks or assign read-only status for Microsoft Azure and Google Cloud Platform (GCP) identities in the Remediation dashboard in Permissions Management
3-
description: How to revoke access to high-risk and unused tasks or assign read-only status for Microsoft Azure and Google Cloud Platform (GCP) identities in the Remediation dashboard in Permissions Management.
2+
title: Revoke access to high-risk and unused tasks or assign read-only status for Microsoft Azure and Google Cloud Platform (GCP) identities in the Remediation dashboard
3+
description: How to revoke access to high-risk and unused tasks or assign read-only status for Microsoft Azure and Google Cloud Platform (GCP) identities in the Remediation dashboard.
44
services: active-directory
55
author: jenniferf-skc
66
manager: amycolannino
77
ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 02/23/2022
11+
ms.date: 06/16/2023
1212
ms.author: jfields
1313
---
1414

@@ -99,7 +99,7 @@ This article describes how you can revoke high-risk and unused tasks or assign r
9999
- For information on how to create a role/policy, see [Create a role/policy](how-to-create-role-policy.md).
100100
- For information on how to clone a role/policy, see [Clone a role/policy](how-to-clone-role-policy.md).
101101
- For information on how to delete a role/policy, see [Delete a role/policy](how-to-delete-role-policy.md).
102-
- For information on how to modify a role/policy, see Modify a role/policy](how-to-modify-role-policy.md).
102+
- For information on how to modify a role/policy, see [Modify a role/policy](how-to-modify-role-policy.md).
103103
- To view information about roles/policies, see [View information about roles/policies](how-to-view-role-policy.md).
104104
- For information on how to attach and detach permissions for AWS identities, see [Attach and detach policies for AWS identities](how-to-attach-detach-permissions.md).
105105
- For information on how to add and remove roles and tasks for Azure and GCP identities, see [Add and remove roles and tasks for Azure and GCP identities](how-to-attach-detach-permissions.md).

articles/active-directory/cloud-infrastructure-entitlement-management/how-to-view-role-policy.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
2-
title: View information about roles/ policies in the Remediation dashboard in Permissions Management
3-
description: How to view and filter information about roles/ policies in the Remediation dashboard in Permissions Management.
2+
title: View information about roles/ policies in the Remediation dashboard
3+
description: How to view and filter information about roles/ policies in the Microsoft Entra Permissions Management Remediation dashboard.
44
services: active-directory
55
author: jenniferf-skc
66
manager: amycolannino
77
ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 02/23/2022
11+
ms.date: 06/16/2023
1212
ms.author: jfields
1313
---
1414

@@ -61,9 +61,6 @@ The **Remediation** dashboard in Permissions Management enables system administr
6161
- The **Role Policy Details** report in CSV format.
6262
- The **Reports** dashboard where you can configure how and when you can automatically receive reports.
6363

64-
65-
66-
6764
## Filter information about roles/policies
6865

6966
1. On the Permissions Management home page, select the **Remediation** dashboard, and then select the **Role/Policies** tab.
@@ -91,7 +88,7 @@ The **Remediation** dashboard in Permissions Management enables system administr
9188
- For information on how to create a role/policy, see [Create a role/policy](how-to-create-role-policy.md).
9289
- For information on how to clone a role/policy, see [Clone a role/policy](how-to-clone-role-policy.md).
9390
- For information on how to delete a role/policy, see [Delete a role/policy](how-to-delete-role-policy.md).
94-
- For information on how to modify a role/policy, see Modify a role/policy](how-to-modify-role-policy.md).
91+
- For information on how to modify a role/policy, see [Modify a role/policy](how-to-modify-role-policy.md).
9592
- For information on how to attach and detach permissions AWS identities, see [Attach and detach policies for AWS identities](how-to-attach-detach-permissions.md).
9693
- For information on how to revoke high-risk and unused tasks or assign read-only status for Azure and GCP identities, see [Revoke high-risk and unused tasks or assign read-only status for Azure and GCP identities](how-to-revoke-task-readonly-status.md)
9794
- For information on how to create or approve a request for permissions, see [Create or approve a request for permissions](how-to-create-approve-privilege-request.md).

articles/active-directory/cloud-infrastructure-entitlement-management/integration-api.md

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 02/23/2022
11+
ms.date: 06/16/2023
1212
ms.author: jfields
1313
---
1414

@@ -27,7 +27,6 @@ The **Integrations** dashboard displays the authorization systems available to y
2727
1. Select an authorization system tile to view the following integration information:
2828

2929
1. To find out more about the Permissions Management API, select **Permissions Management API**, and then select documentation.
30-
<!---Add Link: [documentation](https://developer.cloudknox.io/)--->
3130

3231
1. To view information about service accounts, select **Integration**:
3332
- **Email**: Lists the email address of the user who created the integration.
@@ -93,9 +92,3 @@ The **Integrations** dashboard displays the authorization systems available to y
9392
- **Action (after the key rotation period ends)**: Select **Disable Action Key** or **No Action**.
9493

9594
5. Click **Save**.
96-
97-
<!---## Next steps--->
98-
99-
<!---View integrated authorization systems](product-integrations)--->
100-
<!---[Installation overview](installation.md)--->
101-
<!---[Sign up and deploy FortSentry registration](fortsentry-registration.md)--->

articles/active-directory/cloud-infrastructure-entitlement-management/multi-cloud-glossary.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,22 @@
11
---
2-
title: Permissions Management glossary
3-
description: Permissions Management glossary
2+
title: Microsoft Entra Permissions Management glossary
3+
description: Microsoft Entra Permissions Management glossary
44
services: active-directory
55
author: jenniferf-skc
66
manager: amycolannino
77
ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 02/23/2022
11+
ms.date: 06/16/2023
1212
ms.author: jfields
1313
---
1414

15-
# The Permissions Management glossary
15+
# The Microsoft Entra Permissions Management glossary
1616

17-
This glossary provides a list of some of the commonly used cloud terms in Permissions Management. These terms will help Permissions Management users navigate through cloud-specific terms and cloud-generic terms.
17+
This glossary provides a list of some of the commonly used cloud terms in Microsoft Entra Permissions Management. These terms help Permissions Management users navigate through cloud-specific terms and cloud-generic terms.
1818

19-
## Commonly-used acronyms and terms
19+
## Commonly used acronyms and terms
2020

2121
| Term | Definition |
2222
|-----------------------|-----------------------------------------------------|
@@ -51,7 +51,7 @@ This glossary provides a list of some of the commonly used cloud terms in Permis
5151
| JIT | Just in Time access can be seen as a way to enforce the principle of least privilege to ensure users and non-human identities are given the minimum level of privileges. It also ensures that privileged activities are conducted in accordance with an organization's Identity Access Management (IAM), IT Service Management (ITSM), and Privileged Access Management (PAM) policies, with its entitlements and workflows. JIT access strategy enables organizations to maintain a full audit trail of privileged activities so they can easily identify who or what gained access to which systems, what they did at what time, and for how long. |
5252
| Least privilege | Ensures that users only gain access to the specific tools they need to complete a task. |
5353
| Multi-tenant | A single instance of the software and its supporting infrastructure serves multiple customers. Each customer shares the software application and also shares a single database. |
54-
| OIDC | OpenID Connect. An authentication protocol that verifies user identity when a user is trying to access a protected HTTPs end point. OIDC is an evolutionary development of ideas implemented earlier in OAuth. |
54+
| OIDC | OpenID Connect. An authentication protocol that verifies user identity when a user is trying to access a protected HTTPS end point. OIDC is an evolutionary development of ideas implemented earlier in OAuth. |
5555
| PAM | Privileged access management. Tools that offer one or more of these features: discover, manage, and govern privileged accounts on multiple systems and applications; control access to privileged accounts, including shared and emergency access; randomize, manage, and vault credentials (password, keys, etc.) for administrative, service, and application accounts; single sign-on (SSO) for privileged access to prevent credentials from being revealed; control, filter, and orchestrate privileged commands, actions, and tasks; manage and broker credentials to applications, services, and devices to avoid exposure; and monitor, record, audit, and analyze privileged access, sessions, and actions. |
5656
| PASM | Privileged accounts are protected by vaulting their credentials. Access to those accounts is then brokered for human users, services, and applications. Privileged session management (PSM) functions establish sessions with possible credential injection and full session recording. Passwords and other credentials for privileged accounts are actively managed and changed at definable intervals or upon the occurrence of specific events. PASM solutions may also provide application-to-application password management (AAPM) and zero-install remote privileged access features for IT staff and third parties that don't require a VPN. |
5757
| PEDM | Specific privileges are granted on the managed system by host-based agents to logged-in users. PEDM tools provide host-based command control (filtering); application allow, deny, and isolate controls; and/or privilege elevation. The latter is in the form of allowing particular commands to be run with a higher level of privileges. PEDM tools execute on the actual operating system at the kernel or process level. Command control through protocol filtering is explicitly excluded from this definition because the point of control is less reliable. PEDM tools may also provide file integrity monitoring features. |
@@ -75,4 +75,4 @@ This glossary provides a list of some of the commonly used cloud terms in Permis
7575

7676
## Next steps
7777

78-
- For an overview of Permissions Management, see [What's Permissions Management?](overview.md).
78+
- For an overview of Permissions Management, see [What's Microsoft Entra Permissions Management?](overview.md).

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-add-account-after-onboarding.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 02/23/2022
11+
ms.date: 06/16/2023
1212
ms.author: jfields
1313
---
1414

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-aws.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,23 @@
11
---
2-
title: Onboard an Amazon Web Services (AWS) account on Permissions Management
3-
description: How to onboard an Amazon Web Services (AWS) account on Permissions Management.
2+
title: Onboard an Amazon Web Services (AWS) account to Permissions Management
3+
description: How to onboard an Amazon Web Services (AWS) account to Permissions Management.
44
services: active-directory
55
author: jenniferf-skc
66
manager: amycolannino
77
ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 04/20/2022
11+
ms.date: 06/16/2023
1212
ms.author: jfields
1313
---
1414

1515
# Onboard an Amazon Web Services (AWS) account
1616

17-
This article describes how to onboard an Amazon Web Services (AWS) account on Permissions Management.
17+
This article describes how to onboard an Amazon Web Services (AWS) account in Microsoft Entra Permissions Management.
1818

1919
> [!NOTE]
20-
> A *global administrator* or *root user* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
20+
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Microsoft Entra Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
2121
2222
## Explanation
2323

@@ -31,8 +31,6 @@ There are several moving parts across AWS and Azure, which are required to be co
3131
* An AWS Cross Account role assumed by OIDC role
3232

3333

34-
<!-- diagram from gargi -->
35-
3634
## Onboard an AWS account
3735

3836
1. If the **Data Collectors** dashboard isn't displayed when Permissions Management launches:

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 04/20/2022
11+
ms.date: 06/16/2023
1212
ms.author: jfields
1313
---
1414

@@ -136,5 +136,5 @@ To view status of onboarding after saving the configuration:
136136
- For information on how to onboard a Google Cloud Platform (GCP) project, see [Onboard a Google Cloud Platform (GCP) project](onboard-gcp.md).
137137
- For information on how to enable or disable the controller after onboarding is complete, see [Enable or disable the controller](onboard-enable-controller-after-onboarding.md).
138138
- For information on how to add an account/subscription/project after onboarding is complete, see [Add an account/subscription/project after onboarding is complete](onboard-add-account-after-onboarding.md).
139-
- For an overview on Permissions Management, see [What's Permissions Management?](overview.md).
139+
- For an overview on Permissions Management, see [What's Microsoft Entra Permissions Management?](overview.md).
140140
- For information on how to start viewing information about your authorization system in Permissions Management, see [View key statistics and data about your authorization system](ui-dashboard.md).

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-enable-controller-after-onboarding.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 02/13/2023
11+
ms.date: 06/16/2023
1212
ms.author: jfields
1313
---
1414

@@ -49,7 +49,7 @@ This article also describes how to enable the controller in Amazon Web Services
4949

5050
## Enable or disable the controller in Azure
5151

52-
You can enable or disable the controller in Azure at the Subscription level of you Management Group(s).
52+
You can enable or disable the controller in Azure at the Subscription level of your Management Group(s).
5353

5454
1. From the Azure **Home** page, select **Management groups**.
5555
1. Locate the group for which you want to enable or disable the controller, then select the arrow to expand the group menu and view your subscriptions. Alternatively, you can select the **Total Subscriptions** number listed for your group.
@@ -76,13 +76,13 @@ You can enable or disable the controller in Azure at the Subscription level of y
7676

7777
1. Execute the **gcloud auth login**.
7878
1. Follow the instructions displayed on the screen to authorize access to your Google account.
79-
1. Execute the **sh mciem-workload-identity-pool.sh** to create the workload identity pool, provider, and service account.
80-
1. Execute the **sh mciem-member-projects.sh** to give Permissions Management permissions to access each of the member projects.
79+
1. Execute the ``sh mciem-workload-identity-pool.sh`` to create the workload identity pool, provider, and service account.
80+
1. Execute the ``sh mciem-member-projects.sh`` to give Permissions Management permissions to access each of the member projects.
8181

8282
- If you want to manage permissions through Permissions Management, select **Y** to **Enable controller**.
8383
- If you want to onboard your projects in read-only mode, select **N** to **Disable controller**.
8484

85-
1. Optionally, execute **mciem-enable-gcp-api.sh** to enable all recommended GCP APIs.
85+
1. Optionally, execute ``mciem-enable-gcp-api.sh`` to enable all recommended GCP APIs.
8686

8787
1. Go to the Permissions Management home page, select **Settings** (the gear icon), and then select the **Data Collectors** subtab.
8888
1. On the **Data Collectors** dashboard, select **GCP**, and then select **Create Configuration**.

0 commit comments

Comments
 (0)