Skip to content

Commit df96a26

Browse files
authored
Merge pull request #78479 from markwahl-msft/markwahl-elmdoc-201905
713519 714883 add troubleshooting feedback for entitlement management
2 parents 6193010 + 71c43e7 commit df96a26

File tree

4 files changed

+29
-14
lines changed

4 files changed

+29
-14
lines changed

articles/active-directory/governance/entitlement-management-overview.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.tgt_pltfrm: na
1212
ms.devlang: na
1313
ms.topic: conceptual
1414
ms.subservice: compliance
15-
ms.date: 04/27/2019
15+
ms.date: 05/30/2019
1616
ms.author: rolyon
1717
ms.reviewer: mwahl
1818
ms.collection: M365-identity-device-management
@@ -68,11 +68,14 @@ Here are the types of resources you can manage access to with entitlement manage
6868

6969
- Azure AD security groups
7070
- Office 365 groups
71-
- Azure AD enterprise applications
72-
- SaaS applications
73-
- Custom-integrated applications
74-
- SharePoint Online site collections
75-
- SharePoint Online sites
71+
- Azure AD enterprise applications, including SaaS application and custom-integrated applications that support federation or provisioning
72+
- SharePoint Online site collections and sites
73+
74+
You can also control access to other resources that rely upon Azure AD security groups or Office 365 groups. For example:
75+
76+
- You can give users licenses for Microsoft Office 365 by using an Azure AD security group in an access package and configuring [group-based licensing](../users-groups-roles/licensing-groups-assign.md) for that group
77+
- You can give users access to manage Azure resources by using an Azure AD security group in an access package and creating an [Azure role assignment](../../role-based-access-control/role-assignments-portal.md) for that group
78+
7679

7780
## Prerequisites
7881

articles/active-directory/governance/entitlement-management-process.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.tgt_pltfrm: na
1212
ms.devlang: na
1313
ms.topic: conceptual
1414
ms.subservice: compliance
15-
ms.date: 04/26/2019
15+
ms.date: 05/30/2019
1616
ms.author: rolyon
1717
ms.reviewer: mamkumar
1818
ms.collection: M365-identity-device-management
@@ -42,7 +42,7 @@ A user that needs access to an access package can submit an access request. Depe
4242
| --- | --- |
4343
| Submitted | User submits a request. |
4444
| Pending approval | If the policy for an access package requires approval, a request moves to pending approval. |
45-
| Expired | If no approvers review a request within the approval request timeout, the request expires. To try again, the user will have to resubmit their request. |
45+
| Expired | If no approvers approve a request within the approval request timeout, the request expires. To try again, the user will have to resubmit their request. |
4646
| Denied | Approver denies a request. |
4747
| Approved | Approver approves a request. |
4848
| Delivering | User has **not** been assigned access to all the resources in the access package. If this is an external user, the user has not yet accessed the resource directory and accepted the permissions prompt. |
@@ -69,15 +69,15 @@ The following table provides more detail about each of these email notifications
6969
| 7 | Your access to *[access package]* expires in X day(s) | X days before the requestor's access to the access package expires | Requestor |
7070
| 8 | Your access to *[access package]* has expired | When the requestor's access to an access package expires | Requestor |
7171

72-
### Review access request emails
72+
### Access request emails
7373

7474
When a requestor submits an access request for an access package that is configured to require approval, all approvers configured in the policy receive an email notification with details of the request. Details include the requestor's name, organization, access start and end date if provided, business justification, when the request was submitted, and when the request will expire. The email includes a link where approvers can approve or deny the access request. Here is a sample email notification that is sent to an approver when a requestor submits an access request.
7575

7676
![Review access request email](./media/entitlement-management-shared/email-approve-request.png)
7777

7878
### Approved or denied emails
7979

80-
Requestors are notified when their access request is approved and available for access, or when their access request is denied. When an approver reviews an access request submitted by a requestor, they can approve or deny the access request. The approver needs to add a business justification for their decision.
80+
Requestors are notified when their access request is approved and available for access, or when their access request is denied. When an approver receives an access request submitted by a requestor, they can approve or deny the access request. The approver needs to add a business justification for their decision.
8181

8282
When an access request is approved, entitlement management starts the process of granting the requestor access to each of the resources in the access package. After the requestor has been granted access to every resource in the access package, an email notification is sent to the requestor that their access request was approved and that they now have access to the access package. Here is a sample email notification that is sent to a requestor when they are granted access to an access package.
8383

articles/active-directory/governance/entitlement-management-scenarios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ There are several ways that you can configure entitlement management for your or
4848
> | **2.** [Add resource roles to access package](entitlement-management-access-package-edit.md#add-resource-roles)<ul><li>Groups</li><li>Applications</li><li>SharePoint sites</li></ul> | ![Add resource roles](./media/entitlement-management-scenarios/resource-roles.png) |
4949
> | **3.** [Add a policy](entitlement-management-access-package-edit.md#policy-for-users-in-your-directory)<ul><li>For users in your directory</li><li>Require approval</li><li>Expiration settings</li></ul> | ![Add policy](./media/entitlement-management-scenarios/policy.png) |
5050
51-
### I want to allow users from my business partners (including users not yet in my directory) to request access to groups, applications, or SharePoint sites
51+
### I want to allow users from my business partners directory (including users not yet in my directory) to request access to groups, applications, or SharePoint sites
5252

5353
> [!div class="mx-tableFixed"]
5454
> | Steps | Example |

articles/active-directory/governance/entitlement-management-troubleshoot.md

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,9 @@ ms.tgt_pltfrm: na
1212
ms.devlang: na
1313
ms.topic: conceptual
1414
ms.subservice: compliance
15-
ms.date: 04/25/2019
15+
ms.date: 05/30/2019
1616
ms.author: rolyon
17-
ms.reviewer: mwahl
17+
ms.reviewer: markwahl-msft
1818
ms.collection: M365-identity-device-management
1919

2020

@@ -37,15 +37,27 @@ This article describes some items you should check to help you troubleshoot Azur
3737

3838
## Checklist for adding a resource
3939

40+
* For an application to be a resource in an access package, it must have at least one resource role that can be assigned. The roles are defined by the application itself and are managed in Azure AD. Note that the Azure portal may also show service principals for services that cannot be selected as applications. In particular, **Exchange Online** and **SharePoint Online** are services, not applications that have resource roles in the directory, so they cannot be included in an access package. Instead, use group-based licensing to establish an appropriate license for a user who needs access to those services.
41+
42+
* For a group to be a resource in an access package, it must be able to be modifiable in Azure AD. Groups that originate in an on-premises Active Directory cannot be assigned as resources because their owner or member attributes cannot be changed in Azure AD.
43+
44+
* SharePoint Online document libraries and individual documents cannot be added as resources. Instead, create an Azure AD security group, include that group and a site role in the access package, and in SharePoint Online use that group to control access to the document library or document.
45+
4046
* If there are users that have already been assigned to a resource that you want to manage with an access package, be sure that the users are assigned to the access package with an appropriate policy. For example, you might want to include a group in an access package that already has users in the group. If those users in the group require continued access, they must have an appropriate policy for the access packages so that they don't lose their access to the group. You can assign the access package by either asking the users to request the access package containing that resource, or by directly assigning them to the access package. For more information, see [Edit and manage an existing access package](entitlement-management-access-package-edit.md).
4147

48+
## Checklist for providing external users access
49+
50+
* If there is a B2B [allow list](../b2b/allow-deny-list.md), then users whose directories are not allowed will not be able to request access.
51+
52+
* Ensure that there are no [Conditional Access policies](../conditional-access/require-managed-devices.md) that would prevent external users from requesting access or being able to use the applications in the access packages.
53+
4254
## Checklist for request issues
4355

4456
* When a user wants to request access to an access package, be sure that they are using the **My Access portal link** for the access package. For more information, see [Copy My Access portal link](entitlement-management-access-package-edit.md#copy-my-access-portal-link).
4557

4658
* When a user signs in to the My Access portal to request an access package, be sure they authenticate using their organizational account. The organizational account can be either an account in the resource directory, or in a directory that is included in one of the policies of the access package. If the user's account is not an organizational account, or the directory is not included in the policy, then the user will not see the access package. For more information, see [Request access to an access package](entitlement-management-request-access.md).
4759

48-
* If a user is blocked from signing in to the resource directory, they will not be able to request access in the My Access portal. Before the user can request access, you must remove the sign-in block from the user's profile. To remove the sign-in block, in the Azure portal, click **Azure Active Directory**, click **Users**, click the user, and then click **Profile**. Edit the **Settings** section and change **Block sign in** to **No**. For more information, see [Add or update a user's profile information using Azure Active Directory](../fundamentals/active-directory-users-profile-azure-portal.md)
60+
* If a user is blocked from signing in to the resource directory, they will not be able to request access in the My Access portal. Before the user can request access, you must remove the sign-in block from the user's profile. To remove the sign-in block, in the Azure portal, click **Azure Active Directory**, click **Users**, click the user, and then click **Profile**. Edit the **Settings** section and change **Block sign in** to **No**. For more information, see [Add or update a user's profile information using Azure Active Directory](../fundamentals/active-directory-users-profile-azure-portal.md). You can also check if the user was blocked due to an [Identity Protection policy](../identity-protection/howto-unblock-user.md).
4961

5062
* In the My Access portal, if a user is both a requestor and an approver, they will not see their request for an access package on the **Approvals** page. This behavior is intentional - a user cannot approve their own request. Ensure that the access package they are requesting has additional approvers configured on the policy. For more information, see [Edit an existing policy](entitlement-management-access-package-edit.md#edit-an-existing-policy).
5163

0 commit comments

Comments
 (0)