Skip to content

Commit df0ee48

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into crossUpdates
2 parents 7790718 + 2b28d7d commit df0ee48

File tree

119 files changed

+210
-177
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

119 files changed

+210
-177
lines changed

articles/active-directory/develop/workload-identity-federation-create-trust-user-assigned-managed-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ For a workflow triggered by a pull request event, specify an **Entity type** of
137137
138138
Fill in the **Cluster issuer URL**, **Namespace**, **Service account name**, and **Name** fields:
139139
140-
- **Cluster issuer URL** is the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster.
140+
- **Cluster issuer URL** is the [OIDC issuer URL](../../aks/use-oidc-issuer.md) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster.
141141
- **Service account name** is the name of the Kubernetes service account, which provides an identity for processes that run in a Pod.
142142
- **Namespace** is the service account namespace.
143143
- **Name** is the name of the federated credential, which can't be changed later.

articles/active-directory/develop/workload-identity-federation-create-trust.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,6 @@ To add a federated identity for GitHub actions, follow these steps:
6464

6565
:::image type="content" source="media/workload-identity-federation-create-trust/add-credential.png" alt-text="Screenshot of the Add a credential window, showing sample values." :::
6666

67-
6867
Use the following values from your Azure AD application registration for your GitHub workflow:
6968

7069
- `AZURE_CLIENT_ID` the **Application (client) ID**
@@ -146,7 +145,7 @@ Select the **Kubernetes accessing Azure resources** scenario from the dropdown m
146145
147146
Fill in the **Cluster issuer URL**, **Namespace**, **Service account name**, and **Name** fields:
148147
149-
- **Cluster issuer URL** is the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster.
148+
- **Cluster issuer URL** is the [OIDC issuer URL](../../aks/use-oidc-issuer.md) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster.
150149
- **Service account name** is the name of the Kubernetes service account, which provides an identity for processes that run in a Pod.
151150
- **Namespace** is the service account namespace.
152151
- **Name** is the name of the federated credential, which can't be changed later.
@@ -220,7 +219,7 @@ az ad app federated-credential create --id f6475511-fd81-4965-a00e-41e7792b7b9c
220219

221220
### Kubernetes example
222221

223-
*issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
222+
*issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/use-oidc-issuer.md) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
224223

225224
*subject* is the subject name in the tokens issued to the service account. Kubernetes uses the following format for subject names: `system:serviceaccount:<SERVICE_ACCOUNT_NAMESPACE>:<SERVICE_ACCOUNT_NAME>`.
226225

@@ -309,6 +308,7 @@ az ad app federated-credential delete --id f6475511-fd81-4965-a00e-41e7792b7b9c
309308
::: zone pivot="identity-wif-apps-methods-powershell"
310309

311310
## Prerequisites
311+
312312
- To run the example scripts, you have two options:
313313
- Use [Azure Cloud Shell](../../cloud-shell/overview.md), which you can open by using the **Try It** button in the upper-right corner of code blocks.
314314
- Run scripts locally with Azure PowerShell, as described in the next section.
@@ -364,7 +364,7 @@ New-AzADAppFederatedCredential -ApplicationObjectId $appObjectId -Audience api:/
364364
### Kubernetes example
365365

366366
- *ApplicationObjectId*: the object ID of the app (not the application (client) ID) you previously registered in Azure AD.
367-
- *Issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
367+
- *Issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/use-oidc-issuer.md) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
368368
- *Subject* is the subject name in the tokens issued to the service account. Kubernetes uses the following format for subject names: `system:serviceaccount:<SERVICE_ACCOUNT_NAMESPACE>:<SERVICE_ACCOUNT_NAME>`.
369369
- *Name* is the name of the federated credential, which can't be changed later.
370370
- *Audience* lists the audiences that can appear in the `aud` claim of the external token.
@@ -464,7 +464,7 @@ And you get the response:
464464

465465
Run the following method to configure a federated identity credential on an app and create a trust relationship with a Kubernetes service account. Specify the following parameters:
466466

467-
- *issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
467+
- *issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/use-oidc-issuer.md) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
468468
- *subject* is the subject name in the tokens issued to the service account. Kubernetes uses the following format for subject names: `system:serviceaccount:<SERVICE_ACCOUNT_NAMESPACE>:<SERVICE_ACCOUNT_NAME>`.
469469
- *name* is the name of the federated credential, which can't be changed later.
470470
- *audiences* lists the audiences that can appear in the external token. This field is mandatory. The recommended value is "api://AzureADTokenExchange".

articles/active-directory/fundamentals/3-secure-access-plan.md

Lines changed: 46 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Create a security plan for external access to Azure Active Directory
2+
title: Create a security plan for external access to resources
33
description: Plan the security for external access to your organization's resources.
44
services: active-directory
55
author: gargi-sinha
@@ -8,64 +8,69 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: fundamentals
1010
ms.topic: conceptual
11-
ms.date: 12/15/2022
11+
ms.date: 02/21/2023
1212
ms.author: gasinh
1313
ms.reviewer: ajburnle
1414
ms.custom: "it-pro, seodec18"
1515
ms.collection: M365-identity-device-management
1616
---
1717

18-
# Create a security plan for external access
18+
# Create a security plan for external access to resources
1919

20-
Before you create an external-access security plan, ensure the following conditions are met.
20+
Before you create an external-access security plan, review the following two articles, which add context and information for the security plan.
2121

22-
* [Determine your security posture for external access](1-secure-access-posture.md)
22+
* [Determine your security posture for external access with Azure AD](1-secure-access-posture.md)
2323
* [Discover the current state of external collaboration in your organization](2-secure-access-current-state.md)
2424

25+
## Security plan documentation
26+
2527
For your security plan, document the following information:
2628

27-
* Applications and resources to be grouped for access
29+
* Applications and resources grouped for access
2830
* Sign-in conditions for external users
29-
* Device state, sign-in location, client application requirements, and user risk
30-
* Policies that determine when to review and remove access
31-
* User populations to be grouped for a similar experience
31+
* Device state, sign-in location, client application requirements, user risk, etc.
32+
* Policies to determine timing for reviews and access removal
33+
* User populations grouped for similar experiences
3234

33-
After you document the information, use Microsoft identity and access management policies, or another identity provider (IdP) to implement the plan.
35+
To implement the security plan, you can use Microsoft identity and access management policies, or another identity provider (IdP).
3436

35-
## Resources to be grouped for access
37+
Learn more: [Identity and access management overview](/compliance/assurance/assurance-identity-and-access-management)
3638

37-
To group resources for access:
39+
## Use groups for access
3840

39-
* Microsoft Teams groups files, conversation threads, and other resources. Formulate an external access strategy for Microsoft Teams.
40-
* See, [Secure external access to Microsoft Teams, SharePoint, and OneDrive for Business](9-secure-access-teams-sharepoint.md)
41-
* Use entitlement management access packages to create and delegate management of packages of applications, groups, teams, SharePoint sites, etc.
41+
See the following links to articles about resource grouping strategies:
42+
43+
* Microsoft Teams groups files, conversation threads, and other resources
44+
* Formulate an external access strategy for Teams
45+
* See, [Secure external access to Microsoft Teams, SharePoint, and OneDrive for Business with Azure AD](9-secure-access-teams-sharepoint.md)
46+
* Use entitlement management access packages to create and delegate package management of applications, groups, teams, SharePoint sites, etc.
4247
* [Create a new access package in entitlement management](../governance/entitlement-management-access-package-create.md)
4348
* Apply Conditional Access policies to up to 250 applications, with the same access requirements
4449
* [What is Conditional Access?](../conditional-access/overview.md)
45-
* Use Cross Tenant Access Settings Inbound Access to define access for application groups of external users
50+
* Define access for external user application groups
4651
* [Overview: Cross-tenant access with Azure AD External Identities](../external-identities/cross-tenant-access-overview.md)
4752

48-
Document the applications to be grouped. Considerations include:
53+
Document the grouped applications. Considerations include:
4954

50-
* **Risk profile** - Assess the risk if a bad actor gains access to an application.
51-
* Identify application as high, medium, or low risk. Avoid grouping high-risk with low-risk.
55+
* **Risk profile** - assess the risk if a bad actor gains access to an application
56+
* Identify application as High, Medium, or Low risk. We recommend you don't group High-risk with Low-risk.
5257
* Document applications that can't be shared with external users
53-
* **Compliance frameworks** - Determine compliance frameworks for apps
58+
* **Compliance frameworks** - determine compliance frameworks for apps
5459
* Identify access and review requirements
55-
* **Applications for roles or departments** - Assess applications to be grouped for a role or department access
56-
* **Collaboration applications** - Identify collaboration applications external users can access, such as Teams and SharePoint
60+
* **Applications for roles or departments** - assess applications grouped for role, or department, access
61+
* **Collaboration applications** - identify collaboration applications external users can access, such as Teams or SharePoint
5762
* For productivity applications, external users might have licenses, or you might provide access
5863

59-
For application and resource group access by external users, document the following information:
64+
Document the following information for application and resource group access by external users.
6065

6166
* Descriptive group name, for example High_Risk_External_Access_Finance
6267
* Applications and resources in the group
63-
* Application and resource owners and contact information
64-
* Access is controlled by IT, or delegated to a business owner
68+
* Application and resource owners and their contact information
69+
* The IT team controls access, or control is delegated to a business owner
6570
* Prerequisites for access: background check, training, etc.
6671
* Compliance requirements to access resources
6772
* Challenges, for example multi-factor authentication (MFA) for some resources
68-
* Cadence for reviews, by whom, and where it's documented
73+
* Cadence for reviews, by whom, and where results are documented
6974

7075
> [!TIP]
7176
> Use this type of governance plan for internal access.
@@ -82,7 +87,7 @@ Consider the following risk-based policies to trigger MFA.
8287

8388
* **Low** - MFA for some application sets
8489
* **Medium** - MFA when other risks are present
85-
* **High** - External users always use MFA
90+
* **High** - external users always use MFA
8691

8792
Learn more:
8893

@@ -98,14 +103,14 @@ Use the following table to help assess policy to address risk.
98103
| --- | --- |
99104
| Device| Require compliant devices |
100105
| Mobile apps| Require approved apps |
101-
| Identity protection is high risk| Require user to change password |
106+
| Identity protection is High risk| Require user to change password |
102107
| Network location| To access confidential projects, require sign-in from an IP address range |
103108

104-
To use device state as policy input, the device is registered or joined to your tenant. Configure cross-tenant access settings must be configured to trust the device claims from the home tenant. See, [Modify inbound access settings](../external-identities/cross-tenant-access-settings-b2b-collaboration.md#modify-inbound-access-settings).
109+
To use device state as policy input, register or join the device to your tenant. To trust the device claims from the home tenant, configure cross-tenant access settings. See, [Modify inbound access settings](../external-identities/cross-tenant-access-settings-b2b-collaboration.md#modify-inbound-access-settings).
105110

106-
You can use identity-protection risk policies. However, mitigate issue in the user home tenant. See, [Common Conditional Access policy: Sign-in risk-based multifactor authentication](../conditional-access/howto-conditional-access-policy-risk.md).
111+
You can use identity-protection risk policies. However, mitigate issues in the user home tenant. See, [Common Conditional Access policy: Sign-in risk-based multifactor authentication](../conditional-access/howto-conditional-access-policy-risk.md).
107112

108-
For network locations, you can restrict access to IP addresses ranges you own. Use this method if external partners access applications while at your location. See, [Conditional Access: Block access by location](../conditional-access/howto-conditional-access-policy-location.md)
113+
For network locations, you can restrict access to IP addresses ranges that you own. Use this method if external partners access applications while at your location. See, [Conditional Access: Block access by location](../conditional-access/howto-conditional-access-policy-location.md)
109114

110115
## Document access review policies
111116

@@ -115,13 +120,13 @@ Document policies that dictate when to review resource access, and remove accoun
115120
* Internal business policies and processes
116121
* User behavior
117122

118-
Your policies will be customized, however consider the following parameters:
123+
Generally, organizations customize policy, however consider the following parameters:
119124

120125
* **Entitlement management access reviews**:
121126
* [Change lifecycle settings for an access package in entitlement management](../governance/entitlement-management-access-package-lifecycle-policy.md)
122127
* [Create an access review of an access package in entitlement management](../governance/entitlement-management-access-reviews-create.md)
123128
* [Add a connected organization in entitlement management](../governance/entitlement-management-organization.md): group users from a partner and schedule reviews
124-
* **Microsoft 365 groups**:
129+
* **Microsoft 365 groups**
125130
* [Microsoft 365 group expiration policy](/microsoft-365/solutions/microsoft-365-groups-expiration-policy?view=o365-worldwide&preserve-view=true)
126131
* **Options**:
127132
* If external users don't use access packages or Microsoft 365 groups, determine when accounts become inactive or deleted
@@ -130,20 +135,20 @@ Your policies will be customized, however consider the following parameters:
130135

131136
## Access control methods
132137

133-
Some features, for example entitlement management, are available with an Azure AD Premium 2 (P2) license. Microsoft 365 E5 and Office 365 E5 licenses include Azure AD P2 licenses.
134-
135-
Other combinations of Microsoft 365, Office 365, and Azure AD have functionality to manage external users. See, [Microsoft 365 guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance).
138+
Some features, for example entitlement management, are available with an Azure AD Premium 2 (P2) license. Microsoft 365 E5 and Office 365 E5 licenses include Azure AD P2 licenses. Learn more in the following entitlement management section.
136139

137140
> [!NOTE]
138141
> Licenses are for one user. Therefore users, administrators, and business owners can have delegated access control. This scenario can occur with Azure AD P2 or Microsoft 365 E5, and you don't have to enable licenses for all users. The first 50,000 external users are free. If you don't enable P2 licenses for other internal users, they can't use entitlement management.
139142
143+
Other combinations of Microsoft 365, Office 365, and Azure AD have functionality to manage external users. See, [Microsoft 365 guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance).
144+
140145
## Govern access with Azure AD P2 and Microsoft 365 or Office 365 E5
141146

142147
Azure AD P2 and Microsoft 365 E5 have all the security and governance tools.
143148

144149
### Provision, sign-in, review access, and deprovision access
145150

146-
Entries in bold are recommended.
151+
Entries in bold are recommended actions.
147152

148153
| Feature| Provision external users| Enforce sign-in requirements| Review access| Deprovision access |
149154
| - | - | - | - | - |
@@ -154,7 +159,7 @@ Entries in bold are recommended.
154159

155160
### Resource access
156161

157-
Entries in bold are recommended.
162+
Entries in bold are recommended actions.
158163

159164
|Feature | App and resource access| SharePoint and OneDrive access| Teams access| Email and document security |
160165
| - |-|-|-|-|
@@ -165,15 +170,15 @@ Entries in bold are recommended.
165170

166171
### Entitlement management 
167172

168-
Use entitlement management to provision and deprovision access to groups and teams, applications, and SharePoint sites. Define the connected organizations allowed access, self-service requests, and approval workflows. To ensure access ends correctly, define expiration policies and access reviews for packages.
173+
Use entitlement management to provision and deprovision access to groups and teams, applications, and SharePoint sites. Define the connected organizations granted access, self-service requests, and approval workflows. To ensure access ends correctly, define expiration policies and access reviews for packages.
169174

170175
Learn more: [Create a new access package in entitlement management](../governance/entitlement-management-access-package-create.md)
171176

172177
## Governance with Azure AD P1, Microsoft 365, Office 365 E3
173178

174179
### Provision, sign-in, review access, and deprovision access
175180

176-
Items in bold are recommended.
181+
Items in bold are recommended actions.
177182

178183
|Feature | Provision external users| Enforce sign-in requirements| Review access| Deprovision access |
179184
| - |-|-|-|-|
@@ -200,4 +205,4 @@ Items in bold are recommended.
200205
* [Manage external access with entitlement management](6-secure-access-entitlement-managment.md)
201206
* [Secure access with Conditional Access policies](7-secure-access-conditional-access.md)
202207
* [Control access with sensitivity labels](8-secure-access-sensitivity-labels.md)
203-
* [Secure external access to Microsoft Teams, SharePoint, and OneDrive for Business](9-secure-access-teams-sharepoint.md)
208+
* [Secure external access to Microsoft Teams, SharePoint, and OneDrive for Business](9-secure-access-teams-sharepoint.md)

0 commit comments

Comments
 (0)