You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/how-to-revoke-task-readonly-status.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,14 @@
1
1
---
2
-
title: Revoke access to high-risk and unused tasks or assign read-only status for Microsoft Azure and Google Cloud Platform (GCP) identities in the Remediation dashboard in Permissions Management
3
-
description: How to revoke access to high-risk and unused tasks or assign read-only status for Microsoft Azure and Google Cloud Platform (GCP) identities in the Remediation dashboard in Permissions Management.
2
+
title: Revoke access to high-risk and unused tasks or assign read-only status for Microsoft Azure and Google Cloud Platform (GCP) identities in the Remediation dashboard
3
+
description: How to revoke access to high-risk and unused tasks or assign read-only status for Microsoft Azure and Google Cloud Platform (GCP) identities in the Remediation dashboard.
4
4
services: active-directory
5
5
author: jenniferf-skc
6
6
manager: amycolannino
7
7
ms.service: active-directory
8
8
ms.subservice: ciem
9
9
ms.workload: identity
10
10
ms.topic: how-to
11
-
ms.date: 02/23/2022
11
+
ms.date: 06/16/2023
12
12
ms.author: jfields
13
13
---
14
14
@@ -99,7 +99,7 @@ This article describes how you can revoke high-risk and unused tasks or assign r
99
99
- For information on how to create a role/policy, see [Create a role/policy](how-to-create-role-policy.md).
100
100
- For information on how to clone a role/policy, see [Clone a role/policy](how-to-clone-role-policy.md).
101
101
- For information on how to delete a role/policy, see [Delete a role/policy](how-to-delete-role-policy.md).
102
-
- For information on how to modify a role/policy, see Modify a role/policy](how-to-modify-role-policy.md).
102
+
- For information on how to modify a role/policy, see [Modify a role/policy](how-to-modify-role-policy.md).
103
103
- To view information about roles/policies, see [View information about roles/policies](how-to-view-role-policy.md).
104
104
- For information on how to attach and detach permissions for AWS identities, see [Attach and detach policies for AWS identities](how-to-attach-detach-permissions.md).
105
105
- For information on how to add and remove roles and tasks for Azure and GCP identities, see [Add and remove roles and tasks for Azure and GCP identities](how-to-attach-detach-permissions.md).
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/how-to-view-role-policy.md
+4-7Lines changed: 4 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,14 @@
1
1
---
2
-
title: View information about roles/ policies in the Remediation dashboard in Permissions Management
3
-
description: How to view and filter information about roles/ policies in the Remediation dashboard in Permissions Management.
2
+
title: View information about roles/ policies in the Remediation dashboard
3
+
description: How to view and filter information about roles/ policies in the Microsoft Entra Permissions Management Remediation dashboard.
4
4
services: active-directory
5
5
author: jenniferf-skc
6
6
manager: amycolannino
7
7
ms.service: active-directory
8
8
ms.subservice: ciem
9
9
ms.workload: identity
10
10
ms.topic: how-to
11
-
ms.date: 02/23/2022
11
+
ms.date: 06/16/2023
12
12
ms.author: jfields
13
13
---
14
14
@@ -61,9 +61,6 @@ The **Remediation** dashboard in Permissions Management enables system administr
61
61
- The **Role Policy Details** report in CSV format.
62
62
- The **Reports** dashboard where you can configure how and when you can automatically receive reports.
63
63
64
-
65
-
66
-
67
64
## Filter information about roles/policies
68
65
69
66
1. On the Permissions Management home page, select the **Remediation** dashboard, and then select the **Role/Policies** tab.
@@ -91,7 +88,7 @@ The **Remediation** dashboard in Permissions Management enables system administr
91
88
- For information on how to create a role/policy, see [Create a role/policy](how-to-create-role-policy.md).
92
89
- For information on how to clone a role/policy, see [Clone a role/policy](how-to-clone-role-policy.md).
93
90
- For information on how to delete a role/policy, see [Delete a role/policy](how-to-delete-role-policy.md).
94
-
- For information on how to modify a role/policy, see Modify a role/policy](how-to-modify-role-policy.md).
91
+
- For information on how to modify a role/policy, see [Modify a role/policy](how-to-modify-role-policy.md).
95
92
- For information on how to attach and detach permissions AWS identities, see [Attach and detach policies for AWS identities](how-to-attach-detach-permissions.md).
96
93
- For information on how to revoke high-risk and unused tasks or assign read-only status for Azure and GCP identities, see [Revoke high-risk and unused tasks or assign read-only status for Azure and GCP identities](how-to-revoke-task-readonly-status.md)
97
94
- For information on how to create or approve a request for permissions, see [Create or approve a request for permissions](how-to-create-approve-privilege-request.md).
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/multi-cloud-glossary.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,22 +1,22 @@
1
1
---
2
-
title: Permissions Management glossary
3
-
description: Permissions Management glossary
2
+
title: Microsoft Entra Permissions Management glossary
3
+
description: Microsoft Entra Permissions Management glossary
4
4
services: active-directory
5
5
author: jenniferf-skc
6
6
manager: amycolannino
7
7
ms.service: active-directory
8
8
ms.subservice: ciem
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 02/23/2022
11
+
ms.date: 06/16/2023
12
12
ms.author: jfields
13
13
---
14
14
15
-
# The Permissions Management glossary
15
+
# The Microsoft Entra Permissions Management glossary
16
16
17
-
This glossary provides a list of some of the commonly used cloud terms in Permissions Management. These terms will help Permissions Management users navigate through cloud-specific terms and cloud-generic terms.
17
+
This glossary provides a list of some of the commonly used cloud terms in Microsoft Entra Permissions Management. These terms help Permissions Management users navigate through cloud-specific terms and cloud-generic terms.
@@ -51,7 +51,7 @@ This glossary provides a list of some of the commonly used cloud terms in Permis
51
51
| JIT | Just in Time access can be seen as a way to enforce the principle of least privilege to ensure users and non-human identities are given the minimum level of privileges. It also ensures that privileged activities are conducted in accordance with an organization's Identity Access Management (IAM), IT Service Management (ITSM), and Privileged Access Management (PAM) policies, with its entitlements and workflows. JIT access strategy enables organizations to maintain a full audit trail of privileged activities so they can easily identify who or what gained access to which systems, what they did at what time, and for how long. |
52
52
| Least privilege | Ensures that users only gain access to the specific tools they need to complete a task. |
53
53
| Multi-tenant | A single instance of the software and its supporting infrastructure serves multiple customers. Each customer shares the software application and also shares a single database. |
54
-
| OIDC | OpenID Connect. An authentication protocol that verifies user identity when a user is trying to access a protected HTTPs end point. OIDC is an evolutionary development of ideas implemented earlier in OAuth. |
54
+
| OIDC | OpenID Connect. An authentication protocol that verifies user identity when a user is trying to access a protected HTTPS end point. OIDC is an evolutionary development of ideas implemented earlier in OAuth. |
55
55
| PAM | Privileged access management. Tools that offer one or more of these features: discover, manage, and govern privileged accounts on multiple systems and applications; control access to privileged accounts, including shared and emergency access; randomize, manage, and vault credentials (password, keys, etc.) for administrative, service, and application accounts; single sign-on (SSO) for privileged access to prevent credentials from being revealed; control, filter, and orchestrate privileged commands, actions, and tasks; manage and broker credentials to applications, services, and devices to avoid exposure; and monitor, record, audit, and analyze privileged access, sessions, and actions. |
56
56
| PASM | Privileged accounts are protected by vaulting their credentials. Access to those accounts is then brokered for human users, services, and applications. Privileged session management (PSM) functions establish sessions with possible credential injection and full session recording. Passwords and other credentials for privileged accounts are actively managed and changed at definable intervals or upon the occurrence of specific events. PASM solutions may also provide application-to-application password management (AAPM) and zero-install remote privileged access features for IT staff and third parties that don't require a VPN. |
57
57
| PEDM | Specific privileges are granted on the managed system by host-based agents to logged-in users. PEDM tools provide host-based command control (filtering); application allow, deny, and isolate controls; and/or privilege elevation. The latter is in the form of allowing particular commands to be run with a higher level of privileges. PEDM tools execute on the actual operating system at the kernel or process level. Command control through protocol filtering is explicitly excluded from this definition because the point of control is less reliable. PEDM tools may also provide file integrity monitoring features. |
@@ -75,4 +75,4 @@ This glossary provides a list of some of the commonly used cloud terms in Permis
75
75
76
76
## Next steps
77
77
78
-
- For an overview of Permissions Management, see [What's Permissions Management?](overview.md).
78
+
- For an overview of Permissions Management, see [What's Microsoft Entra Permissions Management?](overview.md).
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-add-account-after-onboarding.md
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-aws.md
+5-7Lines changed: 5 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,23 +1,23 @@
1
1
---
2
-
title: Onboard an Amazon Web Services (AWS) account on Permissions Management
3
-
description: How to onboard an Amazon Web Services (AWS) account on Permissions Management.
2
+
title: Onboard an Amazon Web Services (AWS) account to Permissions Management
3
+
description: How to onboard an Amazon Web Services (AWS) account to Permissions Management.
4
4
services: active-directory
5
5
author: jenniferf-skc
6
6
manager: amycolannino
7
7
ms.service: active-directory
8
8
ms.subservice: ciem
9
9
ms.workload: identity
10
10
ms.topic: how-to
11
-
ms.date: 04/20/2022
11
+
ms.date: 06/16/2023
12
12
ms.author: jfields
13
13
---
14
14
15
15
# Onboard an Amazon Web Services (AWS) account
16
16
17
-
This article describes how to onboard an Amazon Web Services (AWS) account on Permissions Management.
17
+
This article describes how to onboard an Amazon Web Services (AWS) account in Microsoft Entra Permissions Management.
18
18
19
19
> [!NOTE]
20
-
> A *global administrator* or *root user* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
20
+
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Microsoft Entra Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
21
21
22
22
## Explanation
23
23
@@ -31,8 +31,6 @@ There are several moving parts across AWS and Azure, which are required to be co
31
31
* An AWS Cross Account role assumed by OIDC role
32
32
33
33
34
-
<!-- diagram from gargi -->
35
-
36
34
## Onboard an AWS account
37
35
38
36
1. If the **Data Collectors** dashboard isn't displayed when Permissions Management launches:
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: ciem
9
9
ms.workload: identity
10
10
ms.topic: how-to
11
-
ms.date: 04/20/2022
11
+
ms.date: 06/16/2023
12
12
ms.author: jfields
13
13
---
14
14
@@ -136,5 +136,5 @@ To view status of onboarding after saving the configuration:
136
136
- For information on how to onboard a Google Cloud Platform (GCP) project, see [Onboard a Google Cloud Platform (GCP) project](onboard-gcp.md).
137
137
- For information on how to enable or disable the controller after onboarding is complete, see [Enable or disable the controller](onboard-enable-controller-after-onboarding.md).
138
138
- For information on how to add an account/subscription/project after onboarding is complete, see [Add an account/subscription/project after onboarding is complete](onboard-add-account-after-onboarding.md).
139
-
- For an overview on Permissions Management, see [What's Permissions Management?](overview.md).
139
+
- For an overview on Permissions Management, see [What's Microsoft Entra Permissions Management?](overview.md).
140
140
- For information on how to start viewing information about your authorization system in Permissions Management, see [View key statistics and data about your authorization system](ui-dashboard.md).
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-enable-controller-after-onboarding.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: ciem
9
9
ms.workload: identity
10
10
ms.topic: how-to
11
-
ms.date: 02/13/2023
11
+
ms.date: 06/16/2023
12
12
ms.author: jfields
13
13
---
14
14
@@ -49,7 +49,7 @@ This article also describes how to enable the controller in Amazon Web Services
49
49
50
50
## Enable or disable the controller in Azure
51
51
52
-
You can enable or disable the controller in Azure at the Subscription level of you Management Group(s).
52
+
You can enable or disable the controller in Azure at the Subscription level of your Management Group(s).
53
53
54
54
1. From the Azure **Home** page, select **Management groups**.
55
55
1. Locate the group for which you want to enable or disable the controller, then select the arrow to expand the group menu and view your subscriptions. Alternatively, you can select the **Total Subscriptions** number listed for your group.
@@ -76,13 +76,13 @@ You can enable or disable the controller in Azure at the Subscription level of y
76
76
77
77
1. Execute the **gcloud auth login**.
78
78
1. Follow the instructions displayed on the screen to authorize access to your Google account.
79
-
1. Execute the **sh mciem-workload-identity-pool.sh** to create the workload identity pool, provider, and service account.
80
-
1. Execute the **sh mciem-member-projects.sh** to give Permissions Management permissions to access each of the member projects.
79
+
1. Execute the ``sh mciem-workload-identity-pool.sh`` to create the workload identity pool, provider, and service account.
80
+
1. Execute the ``sh mciem-member-projects.sh`` to give Permissions Management permissions to access each of the member projects.
81
81
82
82
- If you want to manage permissions through Permissions Management, select **Y** to **Enable controller**.
83
83
- If you want to onboard your projects in read-only mode, select **N** to **Disable controller**.
84
84
85
-
1. Optionally, execute **mciem-enable-gcp-api.sh** to enable all recommended GCP APIs.
85
+
1. Optionally, execute ``mciem-enable-gcp-api.sh`` to enable all recommended GCP APIs.
86
86
87
87
1. Go to the Permissions Management home page, select **Settings** (the gear icon), and then select the **Data Collectors** subtab.
88
88
1. On the **Data Collectors** dashboard, select **GCP**, and then select **Create Configuration**.
0 commit comments