Skip to content

Commit de8a80d

Browse files
authored
Merge pull request #208133 from amsliu/pag-update
Pag update
2 parents 26ce97e + 33df3e3 commit de8a80d

19 files changed

+86
-5
lines changed

articles/active-directory/governance/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -202,6 +202,10 @@
202202
href: ../privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json
203203
- name: Complete an access review
204204
href: ../privileged-identity-management/pim-complete-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json
205+
- name: Azure AD Privileged Access Groups (Preview)
206+
items:
207+
- name: Create an access review
208+
href: create-access-review-privileged-access-groups.md
205209
- name: Lifecycle Workflows (Preview)
206210
items:
207211
- name: Deployment (Preview)
Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
---
2+
title: Create an access review of Privileged Access Groups - Azure AD (preview)
3+
description: Learn how to create an access review of Privileged Access Groups in Azure Active Directory.
4+
services: active-directory
5+
author: amsliu
6+
manager: amycolannino
7+
editor: markwahl-msft
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ms.tgt_pltfrm: na
11+
ms.topic: how-to
12+
ms.subservice: compliance
13+
ms.date: 09/14/2022
14+
ms.author: amsliu
15+
ms.reviewer: jgangadhar
16+
ms.collection: M365-identity-device-management
17+
---
18+
19+
# Create an access review of Privileged Access Groups in Azure AD (preview)
20+
21+
This article describes how to create one or more access reviews for Privileged Access Groups, which will include the active members of the group as well as the eligible members. Reviews can be performed on both active members of the group, who are active at the time the review is created, and the eligible members of the group.
22+
23+
## Prerequisites
24+
25+
- Azure AD Premium P2.
26+
- Only Global administrators and Privileged Role administrators can create reviews on Privileged Access Groups. For more information, see [Use Azure AD groups to manage role assignments](../roles/groups-concept.md).
27+
28+
For more information, see [License requirements](access-reviews-overview.md#license-requirements).
29+
30+
## Create a Privileged Access Group access review
31+
32+
### Scope
33+
1. Sign in to the Azure portal and open the [Identity Governance](https://portal.azure.com/#blade/Microsoft_AAD_ERM/DashboardBlade/) page.
34+
35+
2. On the left menu, select **Access reviews**.
36+
37+
3. Select **New access review** to create a new access review.
38+
39+
![Screenshot that shows the Access reviews pane in Identity Governance.](./media/create-access-review/access-reviews.png)
40+
41+
4. In the **Select what to review** box, select **Teams + Groups**.
42+
43+
![Screenshot that shows creating an access review.](./media/create-access-review/select-what-review.png)
44+
45+
5. Select **Teams + Groups** and then select **Select Teams + groups** under **Review Scope**. A list of groups to choose from appears on the right.
46+
47+
![Screenshot that shows selecting Teams + Groups.](./media/create-access-review/create-privileged-access-groups-review.png)
48+
49+
> [!NOTE]
50+
> When a Privileged Access Group (PAG) is selected, the users under review for the group will include all eligible users and active users in that group.
51+
52+
6. Now you can select a scope for the review. Your options are:
53+
- **Guest users only**: This option limits the access review to only the Azure AD B2B guest users in your directory.
54+
- **Everyone**: This option scopes the access review to all user objects associated with the resource.
55+
56+
57+
7. If you are conducting group membership review, you can create access reviews for only the inactive users in the group. In the *Users scope* section, check the box next to **Inactive users (on tenant level)**. If you check the box, the scope of the review will focus on inactive users only, those who have not signed in either interactively or non-interactively to the tenant. Then, specify **Days inactive** with a number of days inactive up to 730 days (two years). Users in the group inactive for the specified number of days will be the only users in the review.
58+
59+
> [!NOTE]
60+
> Recently created users are not affected when configuring the inactivity time. The Access Review will check if a user has been created in the time frame configured and disregard users who haven’t existed for at least that amount of time. For example, if you set the inactivity time as 90 days and a guest user was created or invited less than 90 days ago, the guest user will not be in scope of the Access Review. This ensures that a user can sign in at least once before being removed.
61+
62+
8. Select **Next: Reviews**.
63+
64+
After you have reached this step, you may follow the instructions outlined under **Next: Reviews** in the [Create an access review of groups or applications](create-access-review.md#next-reviews) article to complete your access review.
65+
66+
> [!NOTE]
67+
> Review of Privileged Access Groups will only assign active owner(s) as the reviewers. Eligible owners are not included. At least one fallback reviewer is required for a Privileged Access Groups review. If there are no active owner(s) when the review begins, the fallback reviewer(s) will be assigned to the review.
68+
69+
## Next steps
70+
71+
- [Create an access review of groups or applications](create-access-review.md)
72+
- [Approve activation requests for privileged access group members and owners (preview)](../privileged-identity-management/groups-approval-workflow.md)

articles/active-directory/governance/create-access-review.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.workload: identity
1010
ms.tgt_pltfrm: na
1111
ms.topic: how-to
1212
ms.subservice: compliance
13-
ms.date: 08/24/2022
13+
ms.date: 09/09/2022
1414
ms.author: amsliu
1515
ms.reviewer: mwahl
1616
ms.collection: M365-identity-device-management
@@ -95,6 +95,9 @@ If you are reviewing access to an application, then before creating the review,
9595

9696
If you choose either **Managers of users** or **Group owner(s)**, you can also specify a fallback reviewer. Fallback reviewers are asked to do a review when the user has no manager specified in the directory or if the group doesn't have an owner.
9797

98+
>[!IMPORTANT]
99+
> For Privileged Access Groups (Preview), you must select **Group owner(s)**. It is mandatory to assign at least one fallback reviewer to the review. The review will only assign active owner(s) as the reviewer(s). Eligible owners are not included. If there are no active owners when the review begins, the fallback reviewer(s) will be assigned to the review.
100+
98101
![Screenshot that shows New access review.](./media/create-access-review/new-access-review.png)
99102

100103
1. In the **Specify recurrence of review** section, specify the following selections:
@@ -297,8 +300,10 @@ After one or more access reviews have started, you might want to modify or updat
297300

298301
## Next steps
299302

303+
- [Complete an access review of groups or applications](complete-access-review.md)
304+
- [Create an access review of Privileged Access Groups (preview)](create-access-review-privileged-access-groups.md)
300305
- [Review access to groups or applications](perform-access-review.md)
301306
- [Review access for yourself to groups or applications](review-your-access.md)
302-
- [Complete an access review of groups or applications](complete-access-review.md)
307+
303308

304309

123 Bytes
Loading
677 Bytes
Loading
178 KB
Loading
465 Bytes
Loading
4.92 KB
Loading
-285 Bytes
Loading
5.26 KB
Loading

0 commit comments

Comments
 (0)