Skip to content

Commit ebab47c

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into pauljewell-quickstart-toc
2 parents 3bfbeda + f8830aa commit ebab47c

File tree

224 files changed

+1041
-728
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

224 files changed

+1041
-728
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10895,6 +10895,11 @@
1089510895
"source_path_from_root": "/articles/active-directory/fundamentals/support-help-options.md",
1089610896
"redirect_url": "/azure/active-directory/fundamentals/how-to-get-support",
1089710897
"redirect_document_id": false
10898+
},
10899+
{
10900+
"source_path_from_root": "/articles/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-playbook.md",
10901+
"redirect_url": "/azure/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-user-guide",
10902+
"redirect_document_id": false
1089810903
}
1089910904
]
1090010905
}
282 Bytes
Loading
Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Trial Playbook - Microsoft Entra Permissions Management
2+
title: Trial User Guide - Microsoft Entra Permissions Management
33
description: How to get started with your Entra Permissions free trial
44
services: active-directory
55
author: jenniferf-skc
@@ -11,11 +11,11 @@ ms.date: 09/01/2022
1111
ms.author: jfields
1212
---
1313

14-
# Trial playbook: Microsoft Entra Permissions Management
14+
# Trial user guide: Microsoft Entra Permissions Management
1515

16-
Welcome to the Microsoft Entra Permissions Management trial playbook!
16+
Welcome to the Microsoft Entra Permissions Management trial user guide!
1717

18-
This playbook is a simple guide to help you make the most of your free trial, including the Permissions Management Cloud Infrastructure Assessment to help you identify and remediate the most critical permission risks across your multicloud infrastructure. Using the suggested steps in this playbook from the Microsoft Identity team, you'll learn how Permissions Management can assist you to protect all your users and data.
18+
This user guide is a simple guide to help you make the most of your free trial, including the Permissions Management Cloud Infrastructure Assessment to help you identify and remediate the most critical permission risks across your multicloud infrastructure. Using the suggested steps in this user guide from the Microsoft Identity team, you'll learn how Permissions Management can assist you to protect all your users and data.
1919

2020
## What is Permissions Management?
2121

@@ -28,7 +28,7 @@ Permissions Management helps your organization tackle cloud permissions by enabl
2828
- Enforce least privilege - Right-size permissions based on usage and activity and enforce permissions on-demand at cloud scale.
2929
- Monitor and detect anomalies - Detect anomalous permission usage and generate detailed forensic reports.
3030

31-
![Diagram, schematic Description automatically generated](media/permissions-management-trial-playbook/microsoft-entra-permissions-management-diagram.png)
31+
![Diagram, schematic Description automatically generated](media/permissions-management-trial-user-guide/microsoft-entra-permissions-management-diagram.png)
3232

3333

3434
## Step 1: Set-up Permissions Management
@@ -182,23 +182,23 @@ Use the **Activity triggers** dashboard to view information and set alerts and t
182182

183183
Example: Any activity done by root:
184184

185-
![Diagram, Any activity done by root user in AWS.](media/permissions-management-trial-playbook/custom-alerts-1.png)
185+
![Diagram, Any activity done by root user in AWS.](media/permissions-management-trial-user-guide/custom-alerts-1.png)
186186

187187
Alert for monitoring any direct Azure role assignment
188188

189-
![Diagram, Alert for monitoring any direct Azure role assignment done by anyone other than Admin user.](media/permissions-management-trial-playbook/custom-alerts-2.png)
189+
![Diagram, Alert for monitoring any direct Azure role assignment done by anyone other than Admin user.](media/permissions-management-trial-user-guide/custom-alerts-2.png)
190190

191191
- Access to critical sensitive resources
192192

193193
Example: Alert for monitoring any action on Azure resources
194194

195-
![Diagram, Alert for monitoring any action on Azure resources.](media/permissions-management-trial-playbook/custom-alerts-3.png)
195+
![Diagram, Alert for monitoring any action on Azure resources.](media/permissions-management-trial-user-guide/custom-alerts-3.png)
196196

197197
- Use of break glass accounts like root in AWS, global admin in Azure AD accessing subscriptions, etc.
198198

199199
Example: BreakGlass users should be used for emergency access only.
200200

201-
![Diagram, Example of break glass account users used for emergency access only.](media/permissions-management-trial-playbook/custom-alerts-4.png)
201+
![Diagram, Example of break glass account users used for emergency access only.](media/permissions-management-trial-user-guide/custom-alerts-4.png)
202202

203203
- Create and view reports
204204

articles/active-directory/develop/apple-sso-plugin.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,6 @@ Common settings:
9090
- `https://sts.windows.net`
9191
- `https://login.partner.microsoftonline.cn`
9292
- `https://login.chinacloudapi.cn`
93-
- `https://login.microsoftonline.de`
9493
- `https://login.microsoftonline.us`
9594
- `https://login.usgovcloudapi.net`
9695
- `https://login-us.microsoftonline.com`

articles/active-directory/fundamentals/automate-provisioning-to-applications-solutions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: fundamentals
1010
ms.topic: overview
11-
ms.date: 09/23/2022
11+
ms.date: 09/29/2022
1212
ms.author: jricketts
1313
ms.custom:
1414
- it-pro
@@ -59,7 +59,7 @@ Use the numbered sections in the next two section to cross reference the followi
5959

6060
As customers transition identity management to the cloud, more users and groups are created directly in Azure AD. However, they still need a presence on-premises in AD DS to access various resources.
6161

62-
3. When an external user from a partner organization is created in Azure AD using B2B, MIM can automatically provision them [into AD](/microsoft-identity-manager/microsoft-identity-manager-2016-graph-b2b-scenario) and give those guests access to on-premises Windows-Integrated Authentication or Kerberos-based applications.
62+
3. When an external user from a partner organization is created in Azure AD using B2B, MIM can automatically provision them [into AD DS](/microsoft-identity-manager/microsoft-identity-manager-2016-graph-b2b-scenario) and give those guests access to [on-premises Windows-Integrated Authentication or Kerberos-based applications](https://learn.microsoft.com/azure/active-directory/external-identities/hybrid-cloud-to-on-premises). Alternatively, customers can user [PowerShell scripts](https://github.com/Azure-Samples/B2B-to-AD-Sync) to automate the creation of guest accounts on-premises.
6363

6464
1. When a group is created in Azure AD, it can be automatically synchronized to AD DS using [Azure AD Connect sync](../hybrid/how-to-connect-group-writeback-v2.md).
6565

@@ -70,7 +70,7 @@ As customers transition identity management to the cloud, more users and groups
7070
| 1 |Users, groups| AD DS| Azure AD| [Azure AD Connect Cloud Sync](https://learn.microsoft.com/azure/active-directory/cloud-sync/what-is-cloud-sync) |
7171
| 2 |Users, groups, devices| AD DS| Azure AD| [Azure AD Connect Sync](https://learn.microsoft.com/azure/active-directory/hybrid/whatis-azure-ad-connect) |
7272
| 3 |Groups| Azure AD| AD DS| [Azure AD Connect Sync](../hybrid/how-to-connect-group-writeback-v2.md) |
73-
| 4 |Guest accounts| Azure AD| AD DS| [MIM](/microsoft-identity-manager/microsoft-identity-manager-2016-graph-b2b-scenario) |
73+
| 4 |Guest accounts| Azure AD| AD DS| [MIM](/microsoft-identity-manager/microsoft-identity-manager-2016-graph-b2b-scenario), [PowerShell](https://github.com/Azure-Samples/B2B-to-AD-Sync)|
7474
| 5 |Users, groups| Azure AD| Managed AD| [Azure AD Domain Services](https://azure.microsoft.com/services/active-directory-ds/) |
7575

7676
The table depicts common scenarios and the recommended technology.

0 commit comments

Comments
 (0)