Skip to content

Commit d97fa86

Browse files
committed
Alt texts
1 parent c951065 commit d97fa86

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

articles/active-directory/governance/entitlement-management-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ With an access package, an administrator or delegated access package manager lis
8585

8686
Access packages also include one or more *policies*. A policy defines the rules or guardrails for assignment to access package. Each policy can be used to ensure that only the appropriate users are able to have access assignments, and the access is time-limited and will expire if not renewed.
8787

88-
![Access package and policies](./media/entitlement-management-overview/elm-overview-access-package.png)
88+
![Diagram of access package and policies.](./media/entitlement-management-overview/elm-overview-access-package.png)
8989

9090
You can have policies for users to request access. In these kinds of policies, an administrator or access package manager defines
9191

@@ -100,7 +100,7 @@ The following diagram shows an example of the different elements in entitlement
100100
- **Access package 1** includes a single group as a resource. Access is defined with a policy that enables a set of users in the directory to request access.
101101
- **Access package 2** includes a group, an application, and a SharePoint Online site as resources. Access is defined with two different policies. The first policy enables a set of users in the directory to request access. The second policy enables users in an external directory to request access.
102102

103-
![Entitlement management overview](./media/entitlement-management-overview/elm-overview.png)
103+
![Entitlement management overview diagram](./media/entitlement-management-overview/elm-overview.png)
104104

105105
## When should I use access packages?
106106

articles/active-directory/governance/what-is-identity-lifecycle-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Identity Governance helps organizations achieve a balance between productivity.
1919

2020
**Identity lifecycle management** is the foundation for Identity Governance, and effective governance at scale requires modernizing the identity lifecycle management infrastructure for applications. Identity Lifecycle Management aims to automate and manage the entire digital identity lifecycle process.
2121

22-
![cloud provisioning](media/what-is-provisioning/cloud-1.png)
22+
![Diagram of the cloud provisioning](media/what-is-provisioning/cloud-1.png)
2323

2424
## What is a digital identity?
2525

articles/active-directory/governance/what-is-provisioning.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,11 +27,11 @@ Azure AD currently provides three areas of automated provisioning. They are:
2727
- Provisioning from Azure AD to applications, via **[App provisioning](#app-provisioning)**
2828
- Provisioning between Azure AD and Active Directory domain services, via **[inter-directory provisioning](#inter-directory-provisioning)**
2929

30-
![identity lifecycle management](media/what-is-provisioning/provisioning.png)
30+
![Diagram of the identity lifecycle management.](media/what-is-provisioning/provisioning.png)
3131

3232
## HR-driven provisioning
3333

34-
![HR provisioning](media/what-is-provisioning/cloud-2a.png)
34+
![Diagram of the HR provisioning.](media/what-is-provisioning/cloud-2a.png)
3535

3636
Provisioning from HR to Azure AD involves the creation of objects, typically user identities representing each employee, but in some cases other objects representing departments or other structures, based on the information that is in your HR system.
3737

@@ -52,15 +52,15 @@ For more information, see [What is HR driven provisioning?](../app-provisioning/
5252

5353
## App provisioning
5454

55-
![app provisioning](media/what-is-provisioning/cloud-3b.png)
55+
![Diagram that shows the app provisioning flow.](media/what-is-provisioning/cloud-3b.png)
5656

5757
In Azure AD, the term **[app provisioning](../app-provisioning/user-provisioning.md)** refers to automatically creating copies of user identities in the applications that users need access to, for applications that have their own data store, distinct from Azure AD or Active Directory. In addition to creating user identities, app provisioning includes the maintenance and removal of user identities from those apps, as the user's status or roles change. Common scenarios include provisioning an Azure AD user into applications like [Dropbox](../saas-apps/dropboxforbusiness-provisioning-tutorial.md), [Salesforce](../saas-apps/salesforce-provisioning-tutorial.md), [ServiceNow](../saas-apps/servicenow-provisioning-tutorial.md), as each of these applications have their own user repository distinct from Azure AD.
5858

5959
For more information, see [What is app provisioning?](../app-provisioning/user-provisioning.md)
6060

6161
## Inter-directory provisioning
6262

63-
![inter-directory provisioning](media/what-is-provisioning/cloud-4a.png)
63+
![Diagram that shows the inter-directory provisioning](media/what-is-provisioning/cloud-4a.png)
6464

6565
Many organizations rely upon both Active Directory and Azure AD, and may have applications connected to Active Directory, such as on-premises file servers.
6666

0 commit comments

Comments
 (0)