Skip to content

Commit d61e9d4

Browse files
Merge pull request #286038 from davidsmatlak/ds-amg-ga-remediation-20240903
Management groups edits for SFI global admin
2 parents bd1fbd0 + f98bc59 commit d61e9d4

9 files changed

+25
-42
lines changed

articles/governance/management-groups/create-management-group-azure-cli.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -33,11 +33,9 @@ directory. You receive a notification when the process is complete. For more inf
3333
[hierarchy protection](./how-to/protect-resource-hierarchy.md#setting-require-authorization)
3434
isn't enabled. This new management group becomes a child of the Root Management Group or the
3535
[default management group](./how-to/protect-resource-hierarchy.md#setting-define-the-default-management-group)
36-
and the creator is given an "Owner" role assignment. Management group service allows this ability
37-
so that role assignments aren't needed at the root level. No users have access to the Root
38-
Management Group when it's created. To avoid the hurdle of finding the Microsoft Entra ID Global Admins to
39-
start using management groups, we allow the creation of the initial management groups at the root
40-
level.
36+
and the creator is given an Owner role assignment. Management group service allows this ability
37+
so that role assignments aren't needed at the root level. When the Root
38+
Management Group when is created, users don't have access to it. To start using management groups, the service allows the creation of the initial management groups at the root level. For more information, see [Root management group for each directory](./overview.md#root-management-group-for-each-directory).
4139

4240
[!INCLUDE [cloud-shell-try-it.md](~/reusable-content/ce-skilling/azure/includes/cloud-shell-try-it.md)]
4341

articles/governance/management-groups/create-management-group-dotnet.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -33,11 +33,9 @@ directory. You receive a notification when the process is complete. For more inf
3333
[hierarchy protection](./how-to/protect-resource-hierarchy.md#setting-require-authorization)
3434
isn't enabled. This new management group becomes a child of the Root Management Group or the
3535
[default management group](./how-to/protect-resource-hierarchy.md#setting-define-the-default-management-group)
36-
and the creator is given an "Owner" role assignment. Management group service allows this ability
37-
so that role assignments aren't needed at the root level. No users have access to the Root
38-
Management Group when it's created. To avoid the hurdle of finding the Microsoft Entra ID Global Admins to
39-
start using management groups, we allow the creation of the initial management groups at the root
40-
level.
36+
and the creator is given an Owner role assignment. Management group service allows this ability
37+
so that role assignments aren't needed at the root level. When the Root
38+
Management Group when is created, users don't have access to it. To start using management groups, the service allows the creation of the initial management groups at the root level. For more information, see [Root management group for each directory](./overview.md#root-management-group-for-each-directory).
4139

4240
[!INCLUDE [cloud-shell-try-it.md](~/reusable-content/ce-skilling/azure/includes/cloud-shell-try-it.md)]
4341

articles/governance/management-groups/create-management-group-go.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -34,11 +34,9 @@ directory. You receive a notification when the process is complete. For more inf
3434
[hierarchy protection](./how-to/protect-resource-hierarchy.md#setting-require-authorization)
3535
isn't enabled. This new management group becomes a child of the Root Management Group or the
3636
[default management group](./how-to/protect-resource-hierarchy.md#setting-define-the-default-management-group)
37-
and the creator is given an "Owner" role assignment. Management group service allows this ability
38-
so that role assignments aren't needed at the root level. No users have access to the Root
39-
Management Group when it's created. To avoid the hurdle of finding the Microsoft Entra ID Global Admins to
40-
start using management groups, we allow the creation of the initial management groups at the root
41-
level.
37+
and the creator is given an Owner role assignment. Management group service allows this ability
38+
so that role assignments aren't needed at the root level. When the Root
39+
Management Group when is created, users don't have access to it. To start using management groups, the service allows the creation of the initial management groups at the root level. For more information, see [Root management group for each directory](./overview.md#root-management-group-for-each-directory).
4240

4341
[!INCLUDE [cloud-shell-try-it.md](~/reusable-content/ce-skilling/azure/includes/cloud-shell-try-it.md)]
4442

articles/governance/management-groups/create-management-group-javascript.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -31,11 +31,9 @@ directory. You receive a notification when the process is complete. For more inf
3131
[hierarchy protection](./how-to/protect-resource-hierarchy.md#setting-require-authorization)
3232
isn't enabled. This new management group becomes a child of the Root Management Group or the
3333
[default management group](./how-to/protect-resource-hierarchy.md#setting-define-the-default-management-group)
34-
and the creator is given an "Owner" role assignment. Management group service allows this ability
35-
so that role assignments aren't needed at the root level. No users have access to the Root
36-
Management Group when it's created. To avoid the hurdle of finding the Microsoft Entra ID Global Admins to
37-
start using management groups, we allow the creation of the initial management groups at the root
38-
level.
34+
and the creator is given an Owner role assignment. Management group service allows this ability
35+
so that role assignments aren't needed at the root level. When the Root
36+
Management Group when is created, users don't have access to it. To start using management groups, the service allows the creation of the initial management groups at the root level. For more information, see [Root management group for each directory](./overview.md#root-management-group-for-each-directory).
3937

4038
[!INCLUDE [cloud-shell-try-it.md](~/reusable-content/ce-skilling/azure/includes/cloud-shell-try-it.md)]
4139

articles/governance/management-groups/create-management-group-portal.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -28,11 +28,9 @@ directory. You receive a notification when the process is complete. For more inf
2828
[hierarchy protection](./how-to/protect-resource-hierarchy.md#setting-require-authorization)
2929
isn't enabled. This new management group becomes a child of the Root Management Group or the
3030
[default management group](./how-to/protect-resource-hierarchy.md#setting-define-the-default-management-group)
31-
and the creator is given an "Owner" role assignment. Management group service allows this ability
32-
so that role assignments aren't needed at the root level. No users have access to the Root
33-
Management Group when it's created. To avoid the hurdle of finding the Microsoft Entra ID Global Admins to
34-
start using management groups, we allow the creation of the initial management groups at the root
35-
level.
31+
and the creator is given an Owner role assignment. Management group service allows this ability
32+
so that role assignments aren't needed at the root level. When the Root
33+
Management Group when is created, users don't have access to it. To start using management groups, the service allows the creation of the initial management groups at the root level. For more information, see [Root management group for each directory](./overview.md#root-management-group-for-each-directory).
3634

3735
### Create in portal
3836

articles/governance/management-groups/create-management-group-powershell.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -31,11 +31,9 @@ directory. You receive a notification when the process is complete. For more inf
3131
[hierarchy protection](./how-to/protect-resource-hierarchy.md#setting-require-authorization)
3232
isn't enabled. This new management group becomes a child of the Root Management Group or the
3333
[default management group](./how-to/protect-resource-hierarchy.md#setting-define-the-default-management-group)
34-
and the creator is given an "Owner" role assignment. Management group service allows this ability
35-
so that role assignments aren't needed at the root level. No users have access to the Root
36-
Management Group when it's created. To avoid the hurdle of finding the Microsoft Entra ID Global Admins to
37-
start using management groups, we allow the creation of the initial management groups at the root
38-
level.
34+
and the creator is given an Owner role assignment. Management group service allows this ability
35+
so that role assignments aren't needed at the root level. When the Root
36+
Management Group when is created, users don't have access to it. To start using management groups, the service allows the creation of the initial management groups at the root level. For more information, see [Root management group for each directory](./overview.md#root-management-group-for-each-directory).
3937

4038
[!INCLUDE [cloud-shell-try-it.md](~/reusable-content/ce-skilling/azure/includes/cloud-shell-try-it.md)]
4139

articles/governance/management-groups/create-management-group-python.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -28,11 +28,9 @@ directory. You receive a notification when the process is complete. For more inf
2828
[hierarchy protection](./how-to/protect-resource-hierarchy.md#setting-require-authorization)
2929
isn't enabled. This new management group becomes a child of the Root Management Group or the
3030
[default management group](./how-to/protect-resource-hierarchy.md#setting-define-the-default-management-group)
31-
and the creator is given an "Owner" role assignment. Management group service allows this ability
32-
so that role assignments aren't needed at the root level. No users have access to the Root
33-
Management Group when it's created. To avoid the hurdle of finding the Microsoft Entra ID Global Admins to
34-
start using management groups, we allow the creation of the initial management groups at the root
35-
level.
31+
and the creator is given an Owner role assignment. Management group service allows this ability
32+
so that role assignments aren't needed at the root level. When the Root
33+
Management Group when is created, users don't have access to it. To start using management groups, the service allows the creation of the initial management groups at the root level. For more information, see [Root management group for each directory](./overview.md#root-management-group-for-each-directory).
3634

3735
[!INCLUDE [cloud-shell-try-it.md](~/reusable-content/ce-skilling/azure/includes/cloud-shell-try-it.md)]
3836

articles/governance/management-groups/create-management-group-rest-api.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -31,11 +31,9 @@ directory. You receive a notification when the process is complete. For more inf
3131
[hierarchy protection](./how-to/protect-resource-hierarchy.md#setting-require-authorization)
3232
isn't enabled. This new management group becomes a child of the Root Management Group or the
3333
[default management group](./how-to/protect-resource-hierarchy.md#setting-define-the-default-management-group)
34-
and the creator is given an "Owner" role assignment. Management group service allows this ability
35-
so that role assignments aren't needed at the root level. No users have access to the Root
36-
Management Group when it's created. To avoid the hurdle of finding the Microsoft Entra ID Global Admins to
37-
start using management groups, we allow the creation of the initial management groups at the root
38-
level.
34+
and the creator is given an Owner role assignment. Management group service allows this ability
35+
so that role assignments aren't needed at the root level. When the Root
36+
Management Group when is created, users don't have access to it. To start using management groups, the service allows the creation of the initial management groups at the root level. For more information, see [Root management group for each directory](./overview.md#root-management-group-for-each-directory).
3937

4038
[!INCLUDE [cloud-shell-try-it.md](~/reusable-content/ce-skilling/azure/includes/cloud-shell-try-it.md)]
4139

articles/governance/management-groups/overview.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,8 +58,7 @@ root management group is built into the hierarchy to have all management groups
5858
fold up to it.
5959

6060
The root management group allows for the application of global policies and Azure role assignments
61-
at the directory level. Initially, the [Microsoft Entra Global Administrator needs to elevate
62-
themselves](../../role-based-access-control/elevate-access-global-admin.md) to the User Access
61+
at the directory level. Initially, the [Elevate access to manage all Azure subscriptions and management groups](../../role-based-access-control/elevate-access-global-admin.md) to the User Access
6362
Administrator role of this root group. After elevating access, the administrator can
6463
assign any Azure role to other directory users or groups to manage the hierarchy. As an administrator,
6564
you can assign your account as the owner of the root management group.

0 commit comments

Comments
 (0)