Skip to content

Commit e4a55df

Browse files
committed
User Admin removed from Entitlement management
1 parent c060fca commit e4a55df

25 files changed

+60
-61
lines changed

articles/active-directory/governance/create-access-review.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020

2121
Access to groups and applications for employees and guests changes over time. To reduce the risk associated with stale access assignments, administrators can use Azure Active Directory (Azure AD) to create access reviews for group members or application access.
2222

23-
Microsoft 365 and Security group owners can also use Azure AD to create access reviews for group members as long as the Global or User administrator enables the setting via the **Access Reviews Settings** pane. For more information about these scenarios, see [Manage access reviews](manage-access-review.md).
23+
Microsoft 365 and Security group owners can also use Azure AD to create access reviews for group members as long as the Global or Identity Governance Administrator enables the setting via the **Access Reviews Settings** pane. For more information about these scenarios, see [Manage access reviews](manage-access-review.md).
2424

2525
Watch a short video that talks about enabling access reviews.
2626

@@ -32,7 +32,7 @@ This article describes how to create one or more access reviews for group member
3232

3333
- Microsoft Azure AD Premium P2 or Microsoft Entra ID Governance licenses.
3434
- Creating a review on inactive users and with [user-to-group affiliation](review-recommendations-access-reviews.md#user-to-group-affiliation) recommendations requires a Microsoft Entra ID Governance license.
35-
- Global administrator, User administrator, or Identity Governance administrator to create reviews on groups or applications.
35+
- Global administrator or Identity Governance administrator to create reviews on groups or applications.
3636
- Global administrators and Privileged Role administrators can create reviews on role-assignable groups. For more information, see [Use Azure AD groups to manage role assignments](../roles/groups-concept.md).
3737
- Microsoft 365 and Security group owner.
3838

@@ -267,7 +267,7 @@ Use the following instructions to create an access review on a team with shared
267267

268268
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
269269

270-
The prerequisite role is a Global or User administrator.
270+
The prerequisite role is a Global or Identity Governance Administrator.
271271

272272
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
273273

articles/active-directory/governance/entitlement-management-access-package-approval-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ For a demonstration of how to add a multi-stage approval to a request policy, wa
5252

5353
Follow these steps to specify the approval settings for requests for the access package through a policy:
5454

55-
**Prerequisite role:** Global administrator, Identity Governance Administrator, User Administrator, Catalog owner, or Access package manager
55+
**Prerequisite role:** Global administrator, Identity Governance Administrator, Catalog owner, or Access package manager
5656

5757
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
5858

articles/active-directory/governance/entitlement-management-access-package-assignments.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ To use entitlement management and assign users to access packages, you must have
3737

3838
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
3939

40-
**Prerequisite role:** Global administrator, Identity Governance administrator, User administrator, Catalog owner, Access package manager or Access package assignment manager
40+
**Prerequisite role:** Global Administrator, Identity Governance Administrator, Catalog owner, Access package manager or Access package assignment manager
4141

4242
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
4343

@@ -78,7 +78,7 @@ $assignments | ft Id,state,{$_.Target.id},{$_.Target.displayName}
7878

7979
In some cases, you might want to directly assign specific users to an access package so that users don't have to go through the process of requesting the access package. To directly assign users, the access package must have a policy that allows administrator direct assignments.
8080

81-
**Prerequisite role:** Global Administrator, User Administrator, Identity Governance Administrator, Catalog owner, Access package manager or Access package assignment manager
81+
**Prerequisite role:** Global Administrator, Identity Governance Administrator, Catalog owner, Access package manager or Access package assignment manager
8282

8383
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
8484

@@ -120,7 +120,7 @@ In some cases, you might want to directly assign specific users to an access pac
120120

121121
Entitlement management also allows you to directly assign external users to an access package to make collaborating with partners easier. To do this, the access package must have a policy that allows users not yet in your directory to request access.
122122

123-
**Prerequisite role:** Global administrator, User administrator, Catalog owner, Access package manager or Access package assignment manager
123+
**Prerequisite role:** Global Administrator, Identity Governance Administrator, Catalog owner, Access package manager or Access package assignment manager
124124

125125
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
126126

@@ -204,7 +204,7 @@ $req = New-MgBetaEntitlementManagementAccessPackageAssignmentRequest -AccessPack
204204

205205
You can remove an assignment that a user or an administrator had previously requested.
206206

207-
**Prerequisite role:** Global administrator, User administrator, Catalog owner, Access package manager or Access package assignment manager
207+
**Prerequisite role:** Global Administrator, Identity Governance Administrator, Catalog owner, Access package manager or Access package assignment manager
208208

209209
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
210210

articles/active-directory/governance/entitlement-management-access-package-create.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ Then once the access package is created, you can [change the hidden setting](ent
5454

5555
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
5656

57-
To complete the following steps, you need a role of global administrator, Identity Governance administrator, user administrator, catalog owner, or access package manager.
57+
To complete the following steps, you need a role of global Administrator, Identity Governance Administrator, catalog owner, or access package manager.
5858

5959
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
6060

@@ -72,11 +72,11 @@ On the **Basics** tab, you give the access package a name and specify which cata
7272

7373
1. In the **Catalog** dropdown list, select the catalog where you want to put the access package. For example, you might have a catalog owner who manages all the marketing resources that can be requested. In this case, you could select the marketing catalog.
7474

75-
You see only catalogs that you have permission to create access packages in. To create an access package in an existing catalog, you must be a global administrator, Identity Governance administrator, or user administrator. Or you must be a catalog owner or access package manager in that catalog.
75+
You see only catalogs that you have permission to create access packages in. To create an access package in an existing catalog, you must be a Global Administrator or Identity Governance Administrator. Or you must be a catalog owner or access package manager in that catalog.
7676

7777
![Screenshot that shows basic information for a new access package.](./media/entitlement-management-access-package-create/basics.png)
7878

79-
If you're a global administrator, an Identity Governance administrator, a user administrator, or catalog creator, and you want to create your access package in a new catalog that's not listed, select **Create new catalog**. Enter the catalog name and description, and then select **Create**.
79+
If you're a global Administrator, an Identity Governance Administrator, or catalog creator, and you want to create your access package in a new catalog that's not listed, select **Create new catalog**. Enter the catalog name and description, and then select **Create**.
8080

8181
The access package that you're creating, and any resources included in it, are added to the new catalog. Later, you can add more catalog owners or add attributes to the resources that you put in the catalog. To learn more about how to edit the attributes list for a specific catalog resource and the prerequisite roles, read [Add resource attributes in the catalog](entitlement-management-catalog-create.md#add-resource-attributes-in-the-catalog).
8282

@@ -94,11 +94,11 @@ If you're not sure which resource roles to include, you can skip adding them whi
9494

9595
![Screenshot that shows the panel for selecting applications for resource roles in a new access package.](./media/entitlement-management-access-package-create/resource-roles.png)
9696

97-
If you're creating the access package in the general catalog or a new catalog, you can choose any resource from the directory that you own. You must be at least a global administrator, a user administrator, or catalog creator.
97+
If you're creating the access package in the general catalog or a new catalog, you can choose any resource from the directory that you own. You must be at least a global administrator, an Identity Governance Administrator, or catalog creator.
9898

9999
If you're creating the access package in an existing catalog, you can select any resource that's already in the catalog without owning it.
100100

101-
If you're a global administrator, a user administrator, or catalog owner, you have the additional option of selecting resources that you own but that aren't yet in the catalog. If you select resources not currently in the selected catalog, these resources are also added to the catalog for other catalog administrators to build access packages with. To see all the resources that can be added to the catalog, select the **See all** checkbox at the top of the panel. If you want to select only resources that are currently in the selected catalog, leave the **See all** checkbox cleared (the default state).
101+
If you're a global administrator, an Identity Governance Administrator, or catalog owner, you have the additional option of selecting resources that you own but that aren't yet in the catalog. If you select resources not currently in the selected catalog, these resources are also added to the catalog for other catalog administrators to build access packages with. To see all the resources that can be added to the catalog, select the **See all** checkbox at the top of the panel. If you want to select only resources that are currently in the selected catalog, leave the **See all** checkbox cleared (the default state).
102102

103103
1. In the **Role** list, select the role that you want users to be assigned for the resource. For more information on selecting the appropriate roles for a resource, read [Add resource roles](entitlement-management-access-package-resources.md#add-resource-roles).
104104

articles/active-directory/governance/entitlement-management-access-package-edit.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ This article describes how to hide or delete an access package.
3030

3131
Follow these steps to change the **Hidden** setting for an access package.
3232

33-
**Prerequisite role:** Global administrator, Identity Governance administrator, User administrator, Catalog owner, or Access package manager
33+
**Prerequisite role:** Global Administrator, Identity Governance Administrator, Catalog owner, or Access package manager
3434

3535
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
3636

@@ -50,7 +50,7 @@ Follow these steps to change the **Hidden** setting for an access package.
5050

5151
An access package can only be deleted if it has no active user assignments. Follow these steps to delete an access package.
5252

53-
**Prerequisite role:** Global administrator, User administrator, Catalog owner, or Access package manager
53+
**Prerequisite role:** Global Administrator, Identity Governance Administrator, Catalog owner, or Access package manager
5454

5555
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
5656

articles/active-directory/governance/entitlement-management-access-package-first.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -56,19 +56,19 @@ For more information, see [License requirements](entitlement-management-overview
5656

5757
A resource directory has one or more resources to share. In this step, you create a group named **Marketing resources** in the Woodgrove Bank directory that is the target resource for entitlement management. You also set up an internal requestor.
5858

59-
**Prerequisite role:** Global administrator or User administrator
59+
**Prerequisite role:** Global administrator or Identity Governance Administrator
6060

6161
![Diagram that shows the users and groups for this tutorial.](./media/entitlement-management-access-package-first/elm-users-groups.png)
6262

63-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a Global administrator or User administrator.
63+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
6464

6565
1. Browse to **Identity governance** > **Entitlement management** > **Access packages**.
6666

6767
1. [Create two users](../fundamentals/add-users.md). Use the following names or different names.
6868

6969
| Name | Directory role |
7070
| --- | --- |
71-
| **Admin1** | Global administrator, or User administrator. This user can be the user you're currently signed in. |
71+
| **Admin1** | Global administrator, or Identity Governance Administrator. This user can be the user you're currently signed in. |
7272
| **Requestor1** | User |
7373

7474
4. [Create an Azure AD security group](../fundamentals/how-to-manage-groups.md) named **Marketing resources** with a membership type of **Assigned**. This group is the target resource for entitlement management. The group should be empty of members to start.
@@ -78,7 +78,7 @@ A resource directory has one or more resources to share. In this step, you creat
7878

7979
An *access package* is a bundle of resources that a team or project needs and is governed with policies. Access packages are defined in containers called *catalogs*. In this step, you create a **Marketing Campaign** access package in the **General** catalog.
8080

81-
**Prerequisite role:** Global administrator, Identity Governance administrator, User administrator, Catalog owner, or Access package manager
81+
**Prerequisite role:** Global Administrator, Identity Governance Administrator, Catalog owner, or Access package manager
8282

8383
![Diagram that describes the relationship between the access package elements.](./media/entitlement-management-access-package-first/elm-access-package.png)
8484

@@ -118,7 +118,7 @@ An *access package* is a bundle of resources that a team or project needs and is
118118
:::image type="content" source="./media/entitlement-management-access-package-first/resource-roles.png" alt-text="Screenshot the shows how to select the member role." lightbox="./media/entitlement-management-access-package-first/resource-roles.png":::
119119

120120
>[!IMPORTANT]
121-
>The [role-assignable groups](../roles/groups-concept.md) added to an access package will be indicated using the Sub Type **Assignable to roles**. For more information, check out the [Create a role-assignable group](../roles/groups-create-eligible.md) article. Keep in mind that once a role-assignable group is present in an access package catalog, administrative users who are able to manage in entitlement management, including global administrators, user administrators and catalog owners of the catalog, will be able to control the access packages in the catalog, allowing them to choose who can be added to those groups. If you don't see a role-assignable group that you want to add or you are unable to add it, make sure you have the required Azure AD role and entitlement management role to perform this operation. You might need to ask someone with the required roles add the resource to your catalog. For more information, see [Required roles to add resources to a catalog](entitlement-management-delegate.md#required-roles-to-add-resources-to-a-catalog).
121+
>The [role-assignable groups](../roles/groups-concept.md) added to an access package will be indicated using the Sub Type **Assignable to roles**. For more information, check out the [Create a role-assignable group](../roles/groups-create-eligible.md) article. Keep in mind that once a role-assignable group is present in an access package catalog, administrative users who are able to manage in entitlement management, including global Administrators, Identity Governance Administrators and catalog owners of the catalog, will be able to control the access packages in the catalog, allowing them to choose who can be added to those groups. If you don't see a role-assignable group that you want to add or you are unable to add it, make sure you have the required Azure AD role and entitlement management role to perform this operation. You might need to ask someone with the required roles add the resource to your catalog. For more information, see [Required roles to add resources to a catalog](entitlement-management-delegate.md#required-roles-to-add-resources-to-a-catalog).
122122
123123
>[!NOTE]
124124
> When using [dynamic groups](../enterprise-users/groups-create-rule.md) you will not see any other roles available besides owner. This is by design.
@@ -207,7 +207,7 @@ In this step, you perform the steps as the **internal requestor** and request ac
207207

208208
In this step, you confirm that the **internal requestor** was assigned the access package and that they're now a member of the **Marketing resources** group.
209209

210-
**Prerequisite role:** Global administrator, User administrator, Catalog owner, or Access package manager
210+
**Prerequisite role:** Global Administrator, Identity Governance Administrator, Catalog owner, or Access package manager
211211

212212
1. Sign out of the My Access portal.
213213

@@ -239,7 +239,7 @@ In this step, you confirm that the **internal requestor** was assigned the acces
239239

240240
In this step, you remove the changes you made and delete the **Marketing Campaign** access package.
241241

242-
**Prerequisite role:** Global administrator or User administrator
242+
**Prerequisite role:** Global Administrator or Identity Governance Administrator
243243

244244
1. In the Microsoft Entra admin center **Identity Governance**.
245245

0 commit comments

Comments
 (0)