You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Access to groups and applications for employees and guests changes over time. To reduce the risk associated with stale access assignments, administrators can use Azure Active Directory (Azure AD) to create access reviews for group members or application access.
22
22
23
-
Microsoft 365 and Security group owners can also use Azure AD to create access reviews for group members as long as the Global or User administrator enables the setting via the **Access Reviews Settings** pane. For more information about these scenarios, see [Manage access reviews](manage-access-review.md).
23
+
Microsoft 365 and Security group owners can also use Azure AD to create access reviews for group members as long as the Global or Identity Governance Administrator enables the setting via the **Access Reviews Settings** pane. For more information about these scenarios, see [Manage access reviews](manage-access-review.md).
24
24
25
25
Watch a short video that talks about enabling access reviews.
26
26
@@ -32,7 +32,7 @@ This article describes how to create one or more access reviews for group member
32
32
33
33
- Microsoft Azure AD Premium P2 or Microsoft Entra ID Governance licenses.
34
34
- Creating a review on inactive users and with [user-to-group affiliation](review-recommendations-access-reviews.md#user-to-group-affiliation) recommendations requires a Microsoft Entra ID Governance license.
35
-
- Global administrator, User administrator, or Identity Governance administrator to create reviews on groups or applications.
35
+
- Global administrator or Identity Governance administrator to create reviews on groups or applications.
36
36
- Global administrators and Privileged Role administrators can create reviews on role-assignable groups. For more information, see [Use Azure AD groups to manage role assignments](../roles/groups-concept.md).
37
37
- Microsoft 365 and Security group owner.
38
38
@@ -267,7 +267,7 @@ Use the following instructions to create an access review on a team with shared
The prerequisite role is a Global or User administrator.
270
+
The prerequisite role is a Global or Identity Governance Administrator.
271
271
272
272
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-access-package-approval-policy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ For a demonstration of how to add a multi-stage approval to a request policy, wa
52
52
53
53
Follow these steps to specify the approval settings for requests for the access package through a policy:
54
54
55
-
**Prerequisite role:** Global administrator, Identity Governance Administrator, User Administrator, Catalog owner, or Access package manager
55
+
**Prerequisite role:** Global administrator, Identity Governance Administrator, Catalog owner, or Access package manager
56
56
57
57
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
**Prerequisite role:** Global administrator, Identity Governance administrator, User administrator, Catalog owner, Access package manager or Access package assignment manager
40
+
**Prerequisite role:** Global Administrator, Identity Governance Administrator, Catalog owner, Access package manager or Access package assignment manager
41
41
42
42
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
43
43
@@ -78,7 +78,7 @@ $assignments | ft Id,state,{$_.Target.id},{$_.Target.displayName}
78
78
79
79
In some cases, you might want to directly assign specific users to an access package so that users don't have to go through the process of requesting the access package. To directly assign users, the access package must have a policy that allows administrator direct assignments.
80
80
81
-
**Prerequisite role:** Global Administrator, User Administrator, Identity Governance Administrator, Catalog owner, Access package manager or Access package assignment manager
81
+
**Prerequisite role:** Global Administrator, Identity Governance Administrator, Catalog owner, Access package manager or Access package assignment manager
82
82
83
83
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
84
84
@@ -120,7 +120,7 @@ In some cases, you might want to directly assign specific users to an access pac
120
120
121
121
Entitlement management also allows you to directly assign external users to an access package to make collaborating with partners easier. To do this, the access package must have a policy that allows users not yet in your directory to request access.
122
122
123
-
**Prerequisite role:** Global administrator, User administrator, Catalog owner, Access package manager or Access package assignment manager
123
+
**Prerequisite role:** Global Administrator, Identity Governance Administrator, Catalog owner, Access package manager or Access package assignment manager
124
124
125
125
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
You can remove an assignment that a user or an administrator had previously requested.
206
206
207
-
**Prerequisite role:** Global administrator, User administrator, Catalog owner, Access package manager or Access package assignment manager
207
+
**Prerequisite role:** Global Administrator, Identity Governance Administrator, Catalog owner, Access package manager or Access package assignment manager
208
208
209
209
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
To complete the following steps, you need a role of global administrator, Identity Governance administrator, user administrator, catalog owner, or access package manager.
57
+
To complete the following steps, you need a role of global Administrator, Identity Governance Administrator, catalog owner, or access package manager.
58
58
59
59
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
60
60
@@ -72,11 +72,11 @@ On the **Basics** tab, you give the access package a name and specify which cata
72
72
73
73
1. In the **Catalog** dropdown list, select the catalog where you want to put the access package. For example, you might have a catalog owner who manages all the marketing resources that can be requested. In this case, you could select the marketing catalog.
74
74
75
-
You see only catalogs that you have permission to create access packages in. To create an access package in an existing catalog, you must be a global administrator, Identity Governance administrator, or user administrator. Or you must be a catalog owner or access package manager in that catalog.
75
+
You see only catalogs that you have permission to create access packages in. To create an access package in an existing catalog, you must be a Global Administrator or Identity Governance Administrator. Or you must be a catalog owner or access package manager in that catalog.
76
76
77
77

78
78
79
-
If you're a global administrator, an Identity Governance administrator, a user administrator, or catalog creator, and you want to create your access package in a new catalog that's not listed, select **Create new catalog**. Enter the catalog name and description, and then select **Create**.
79
+
If you're a global Administrator, an Identity Governance Administrator, or catalog creator, and you want to create your access package in a new catalog that's not listed, select **Create new catalog**. Enter the catalog name and description, and then select **Create**.
80
80
81
81
The access package that you're creating, and any resources included in it, are added to the new catalog. Later, you can add more catalog owners or add attributes to the resources that you put in the catalog. To learn more about how to edit the attributes list for a specific catalog resource and the prerequisite roles, read [Add resource attributes in the catalog](entitlement-management-catalog-create.md#add-resource-attributes-in-the-catalog).
82
82
@@ -94,11 +94,11 @@ If you're not sure which resource roles to include, you can skip adding them whi
94
94
95
95

96
96
97
-
If you're creating the access package in the general catalog or a new catalog, you can choose any resource from the directory that you own. You must be at least a global administrator, a user administrator, or catalog creator.
97
+
If you're creating the access package in the general catalog or a new catalog, you can choose any resource from the directory that you own. You must be at least a global administrator, an Identity Governance Administrator, or catalog creator.
98
98
99
99
If you're creating the access package in an existing catalog, you can select any resource that's already in the catalog without owning it.
100
100
101
-
If you're a global administrator, a user administrator, or catalog owner, you have the additional option of selecting resources that you own but that aren't yet in the catalog. If you select resources not currently in the selected catalog, these resources are also added to the catalog for other catalog administrators to build access packages with. To see all the resources that can be added to the catalog, select the **See all** checkbox at the top of the panel. If you want to select only resources that are currently in the selected catalog, leave the **See all** checkbox cleared (the default state).
101
+
If you're a global administrator, an Identity Governance Administrator, or catalog owner, you have the additional option of selecting resources that you own but that aren't yet in the catalog. If you select resources not currently in the selected catalog, these resources are also added to the catalog for other catalog administrators to build access packages with. To see all the resources that can be added to the catalog, select the **See all** checkbox at the top of the panel. If you want to select only resources that are currently in the selected catalog, leave the **See all** checkbox cleared (the default state).
102
102
103
103
1. In the **Role** list, select the role that you want users to be assigned for the resource. For more information on selecting the appropriate roles for a resource, read [Add resource roles](entitlement-management-access-package-resources.md#add-resource-roles).
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-access-package-edit.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ This article describes how to hide or delete an access package.
30
30
31
31
Follow these steps to change the **Hidden** setting for an access package.
32
32
33
-
**Prerequisite role:** Global administrator, Identity Governance administrator, User administrator, Catalog owner, or Access package manager
33
+
**Prerequisite role:** Global Administrator, Identity Governance Administrator, Catalog owner, or Access package manager
34
34
35
35
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
36
36
@@ -50,7 +50,7 @@ Follow these steps to change the **Hidden** setting for an access package.
50
50
51
51
An access package can only be deleted if it has no active user assignments. Follow these steps to delete an access package.
52
52
53
-
**Prerequisite role:** Global administrator, User administrator, Catalog owner, or Access package manager
53
+
**Prerequisite role:** Global Administrator, Identity Governance Administrator, Catalog owner, or Access package manager
54
54
55
55
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-access-package-first.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,19 +56,19 @@ For more information, see [License requirements](entitlement-management-overview
56
56
57
57
A resource directory has one or more resources to share. In this step, you create a group named **Marketing resources** in the Woodgrove Bank directory that is the target resource for entitlement management. You also set up an internal requestor.
58
58
59
-
**Prerequisite role:** Global administrator or User administrator
59
+
**Prerequisite role:** Global administrator or Identity Governance Administrator
60
60
61
61

62
62
63
-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a Global administrator or User administrator.
63
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
1.[Create two users](../fundamentals/add-users.md). Use the following names or different names.
68
68
69
69
| Name | Directory role |
70
70
| --- | --- |
71
-
|**Admin1**| Global administrator, or User administrator. This user can be the user you're currently signed in. |
71
+
|**Admin1**| Global administrator, or Identity Governance Administrator. This user can be the user you're currently signed in. |
72
72
|**Requestor1**| User |
73
73
74
74
4.[Create an Azure AD security group](../fundamentals/how-to-manage-groups.md) named **Marketing resources** with a membership type of **Assigned**. This group is the target resource for entitlement management. The group should be empty of members to start.
@@ -78,7 +78,7 @@ A resource directory has one or more resources to share. In this step, you creat
78
78
79
79
An *access package* is a bundle of resources that a team or project needs and is governed with policies. Access packages are defined in containers called *catalogs*. In this step, you create a **Marketing Campaign** access package in the **General** catalog.
80
80
81
-
**Prerequisite role:** Global administrator, Identity Governance administrator, User administrator, Catalog owner, or Access package manager
81
+
**Prerequisite role:** Global Administrator, Identity Governance Administrator, Catalog owner, or Access package manager
82
82
83
83

84
84
@@ -118,7 +118,7 @@ An *access package* is a bundle of resources that a team or project needs and is
118
118
:::image type="content" source="./media/entitlement-management-access-package-first/resource-roles.png" alt-text="Screenshot the shows how to select the member role." lightbox="./media/entitlement-management-access-package-first/resource-roles.png":::
119
119
120
120
>[!IMPORTANT]
121
-
>The [role-assignable groups](../roles/groups-concept.md) added to an access package will be indicated using the Sub Type **Assignable to roles**. For more information, check out the [Create a role-assignable group](../roles/groups-create-eligible.md) article. Keep in mind that once a role-assignable group is present in an access package catalog, administrative users who are able to manage in entitlement management, including global administrators, user administrators and catalog owners of the catalog, will be able to control the access packages in the catalog, allowing them to choose who can be added to those groups. If you don't see a role-assignable group that you want to add or you are unable to add it, make sure you have the required Azure AD role and entitlement management role to perform this operation. You might need to ask someone with the required roles add the resource to your catalog. For more information, see [Required roles to add resources to a catalog](entitlement-management-delegate.md#required-roles-to-add-resources-to-a-catalog).
121
+
>The [role-assignable groups](../roles/groups-concept.md) added to an access package will be indicated using the Sub Type **Assignable to roles**. For more information, check out the [Create a role-assignable group](../roles/groups-create-eligible.md) article. Keep in mind that once a role-assignable group is present in an access package catalog, administrative users who are able to manage in entitlement management, including global Administrators, Identity Governance Administrators and catalog owners of the catalog, will be able to control the access packages in the catalog, allowing them to choose who can be added to those groups. If you don't see a role-assignable group that you want to add or you are unable to add it, make sure you have the required Azure AD role and entitlement management role to perform this operation. You might need to ask someone with the required roles add the resource to your catalog. For more information, see [Required roles to add resources to a catalog](entitlement-management-delegate.md#required-roles-to-add-resources-to-a-catalog).
122
122
123
123
>[!NOTE]
124
124
> When using [dynamic groups](../enterprise-users/groups-create-rule.md) you will not see any other roles available besides owner. This is by design.
@@ -207,7 +207,7 @@ In this step, you perform the steps as the **internal requestor** and request ac
207
207
208
208
In this step, you confirm that the **internal requestor** was assigned the access package and that they're now a member of the **Marketing resources** group.
209
209
210
-
**Prerequisite role:** Global administrator, User administrator, Catalog owner, or Access package manager
210
+
**Prerequisite role:** Global Administrator, Identity Governance Administrator, Catalog owner, or Access package manager
211
211
212
212
1. Sign out of the My Access portal.
213
213
@@ -239,7 +239,7 @@ In this step, you confirm that the **internal requestor** was assigned the acces
239
239
240
240
In this step, you remove the changes you made and delete the **Marketing Campaign** access package.
241
241
242
-
**Prerequisite role:** Global administrator or User administrator
242
+
**Prerequisite role:** Global Administrator or Identity Governance Administrator
243
243
244
244
1. In the Microsoft Entra admin center **Identity Governance**.
0 commit comments