You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-overview.md
+9-6Lines changed: 9 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.tgt_pltfrm: na
12
12
ms.devlang: na
13
13
ms.topic: conceptual
14
14
ms.subservice: compliance
15
-
ms.date: 04/27/2019
15
+
ms.date: 05/30/2019
16
16
ms.author: rolyon
17
17
ms.reviewer: mwahl
18
18
ms.collection: M365-identity-device-management
@@ -68,11 +68,14 @@ Here are the types of resources you can manage access to with entitlement manage
68
68
69
69
- Azure AD security groups
70
70
- Office 365 groups
71
-
- Azure AD enterprise applications
72
-
- SaaS applications
73
-
- Custom-integrated applications
74
-
- SharePoint Online site collections
75
-
- SharePoint Online sites
71
+
- Azure AD enterprise applications, including SaaS application and custom-integrated applications that support federation or provisioning
72
+
- SharePoint Online site collections and sites
73
+
74
+
You can also control access to other resources that rely upon Azure AD security groups or Office 365 groups. For example:
75
+
76
+
- You can give users licenses for Microsoft Office 365 by using an Azure AD security group in an access package and configuring [group-based licensing](../users-groups-roles/licensing-groups-assign.md) for that group
77
+
- You can give users access to manage Azure resources by using an Azure AD security group in an access package and creating an [Azure role assignment](../../role-based-access-control/role-assignments-portal.md) for that group
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-process.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.tgt_pltfrm: na
12
12
ms.devlang: na
13
13
ms.topic: conceptual
14
14
ms.subservice: compliance
15
-
ms.date: 04/26/2019
15
+
ms.date: 05/30/2019
16
16
ms.author: rolyon
17
17
ms.reviewer: mamkumar
18
18
ms.collection: M365-identity-device-management
@@ -42,7 +42,7 @@ A user that needs access to an access package can submit an access request. Depe
42
42
| --- | --- |
43
43
| Submitted | User submits a request. |
44
44
| Pending approval | If the policy for an access package requires approval, a request moves to pending approval. |
45
-
| Expired | If no approvers review a request within the approval request timeout, the request expires. To try again, the user will have to resubmit their request. |
45
+
| Expired | If no approvers approve a request within the approval request timeout, the request expires. To try again, the user will have to resubmit their request. |
46
46
| Denied | Approver denies a request. |
47
47
| Approved | Approver approves a request. |
48
48
| Delivering | User has **not** been assigned access to all the resources in the access package. If this is an external user, the user has not yet accessed the resource directory and accepted the permissions prompt. |
@@ -69,15 +69,15 @@ The following table provides more detail about each of these email notifications
69
69
| 7 | Your access to *[access package]* expires in X day(s) | X days before the requestor's access to the access package expires | Requestor |
70
70
| 8 | Your access to *[access package]* has expired | When the requestor's access to an access package expires | Requestor |
71
71
72
-
### Review access request emails
72
+
### Access request emails
73
73
74
74
When a requestor submits an access request for an access package that is configured to require approval, all approvers configured in the policy receive an email notification with details of the request. Details include the requestor's name, organization, access start and end date if provided, business justification, when the request was submitted, and when the request will expire. The email includes a link where approvers can approve or deny the access request. Here is a sample email notification that is sent to an approver when a requestor submits an access request.
Requestors are notified when their access request is approved and available for access, or when their access request is denied. When an approver reviews an access request submitted by a requestor, they can approve or deny the access request. The approver needs to add a business justification for their decision.
80
+
Requestors are notified when their access request is approved and available for access, or when their access request is denied. When an approver receives an access request submitted by a requestor, they can approve or deny the access request. The approver needs to add a business justification for their decision.
81
81
82
82
When an access request is approved, entitlement management starts the process of granting the requestor access to each of the resources in the access package. After the requestor has been granted access to every resource in the access package, an email notification is sent to the requestor that their access request was approved and that they now have access to the access package. Here is a sample email notification that is sent to a requestor when they are granted access to an access package.
> |**3.**[Add a policy](entitlement-management-access-package-edit.md#policy-for-users-in-your-directory)<ul><li>For users in your directory</li><li>Require approval</li><li>Expiration settings</li></ul> ||
50
50
51
-
### I want to allow users from my business partners (including users not yet in my directory) to request access to groups, applications, or SharePoint sites
51
+
### I want to allow users from my business partners directory (including users not yet in my directory) to request access to groups, applications, or SharePoint sites
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-troubleshoot.md
+15-3Lines changed: 15 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,9 +12,9 @@ ms.tgt_pltfrm: na
12
12
ms.devlang: na
13
13
ms.topic: conceptual
14
14
ms.subservice: compliance
15
-
ms.date: 04/25/2019
15
+
ms.date: 05/30/2019
16
16
ms.author: rolyon
17
-
ms.reviewer: mwahl
17
+
ms.reviewer: markwahl-msft
18
18
ms.collection: M365-identity-device-management
19
19
20
20
@@ -37,15 +37,27 @@ This article describes some items you should check to help you troubleshoot Azur
37
37
38
38
## Checklist for adding a resource
39
39
40
+
* For an application to be a resource in an access package, it must have at least one resource role that can be assigned. The roles are defined by the application itself and are managed in Azure AD. Note that the Azure portal may also show service principals for services that cannot be selected as applications. In particular, **Exchange Online** and **SharePoint Online** are services, not applications that have resource roles in the directory, so they cannot be included in an access package. Instead, use group-based licensing to establish an appropriate license for a user who needs access to those services.
41
+
42
+
* For a group to be a resource in an access package, it must be able to be modifiable in Azure AD. Groups that originate in an on-premises Active Directory cannot be assigned as resources because their owner or member attributes cannot be changed in Azure AD.
43
+
44
+
* SharePoint Online document libraries and individual documents cannot be added as resources. Instead, create an Azure AD security group, include that group and a site role in the access package, and in SharePoint Online use that group to control access to the document library or document.
45
+
40
46
* If there are users that have already been assigned to a resource that you want to manage with an access package, be sure that the users are assigned to the access package with an appropriate policy. For example, you might want to include a group in an access package that already has users in the group. If those users in the group require continued access, they must have an appropriate policy for the access packages so that they don't lose their access to the group. You can assign the access package by either asking the users to request the access package containing that resource, or by directly assigning them to the access package. For more information, see [Edit and manage an existing access package](entitlement-management-access-package-edit.md).
41
47
48
+
## Checklist for providing external users access
49
+
50
+
* If there is a B2B [allow list](../b2b/allow-deny-list.md), then users whose directories are not allowed will not be able to request access.
51
+
52
+
* Ensure that there are no [Conditional Access policies](../conditional-access/require-managed-devices.md) that would prevent external users from requesting access or being able to use the applications in the access packages.
53
+
42
54
## Checklist for request issues
43
55
44
56
* When a user wants to request access to an access package, be sure that they are using the **My Access portal link** for the access package. For more information, see [Copy My Access portal link](entitlement-management-access-package-edit.md#copy-my-access-portal-link).
45
57
46
58
* When a user signs in to the My Access portal to request an access package, be sure they authenticate using their organizational account. The organizational account can be either an account in the resource directory, or in a directory that is included in one of the policies of the access package. If the user's account is not an organizational account, or the directory is not included in the policy, then the user will not see the access package. For more information, see [Request access to an access package](entitlement-management-request-access.md).
47
59
48
-
* If a user is blocked from signing in to the resource directory, they will not be able to request access in the My Access portal. Before the user can request access, you must remove the sign-in block from the user's profile. To remove the sign-in block, in the Azure portal, click **Azure Active Directory**, click **Users**, click the user, and then click **Profile**. Edit the **Settings** section and change **Block sign in** to **No**. For more information, see [Add or update a user's profile information using Azure Active Directory](../fundamentals/active-directory-users-profile-azure-portal.md)
60
+
* If a user is blocked from signing in to the resource directory, they will not be able to request access in the My Access portal. Before the user can request access, you must remove the sign-in block from the user's profile. To remove the sign-in block, in the Azure portal, click **Azure Active Directory**, click **Users**, click the user, and then click **Profile**. Edit the **Settings** section and change **Block sign in** to **No**. For more information, see [Add or update a user's profile information using Azure Active Directory](../fundamentals/active-directory-users-profile-azure-portal.md). You can also check if the user was blocked due to an [Identity Protection policy](../identity-protection/howto-unblock-user.md).
49
61
50
62
* In the My Access portal, if a user is both a requestor and an approver, they will not see their request for an access package on the **Approvals** page. This behavior is intentional - a user cannot approve their own request. Ensure that the access package they are requesting has additional approvers configured on the policy. For more information, see [Edit an existing policy](entitlement-management-access-package-edit.md#edit-an-existing-policy).
0 commit comments