You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-access-package-approval-policy.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,9 +52,11 @@ Follow these steps to specify the approval settings for requests for the access
52
52
53
53
**Prerequisite role:** Global administrator, Identity Governance administrator, User administrator, Catalog owner, or Access package manager
54
54
55
-
1.In the Azure portal, select **Azure Active Directory** and then select **Identity Governance**.
55
+
1.Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
56
56
57
-
1. In the left menu, select **Access packages** and then open the access package.
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-access-package-assignments.md
+16-8Lines changed: 16 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,9 +37,11 @@ To use entitlement management and assign users to access packages, you must have
37
37
38
38
**Prerequisite role:** Global administrator, Identity Governance administrator, User administrator, Catalog owner, Access package manager or Access package assignment manager
39
39
40
-
1.In the Azure portal, select **Azure Active Directory** and then select **Identity Governance**.
40
+
1.Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
41
41
42
-
1. In the left menu, select **Access packages** and then open the access package.
1. On the **Access packages** page open an access package.
43
45
44
46
1. Select **Assignments** to see a list of active assignments.
45
47
@@ -77,9 +79,11 @@ In some cases, you might want to directly assign specific users to an access pac
77
79
78
80
**Prerequisite role:** Global administrator, User administrator, Catalog owner, Access package manager or Access package assignment manager
79
81
80
-
1. In the Azure portal, select **Azure Active Directory** and then select **Identity Governance**.
82
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
1.In the left menu, select **Access packages**and then open the access package.
86
+
1.On the **Access packages**page open an access package.
83
87
84
88
1. In the left menu, select **Assignments**.
85
89
@@ -117,9 +121,11 @@ Entitlement management also allows you to directly assign external users to an a
117
121
118
122
**Prerequisite role:** Global administrator, User administrator, Catalog owner, Access package manager or Access package assignment manager
119
123
120
-
1.In the Azure portal, select **Azure Active Directory** and then select **Identity Governance**.
124
+
1.Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
121
125
122
-
1. In the left menu, select **Access packages** and then open the access package in which you want to add a user.
1. On the **Access packages** page open an access package.
123
129
124
130
1. In the left menu, select **Assignments**.
125
131
@@ -195,9 +201,11 @@ You can remove an assignment that a user or an administrator had previously requ
195
201
196
202
**Prerequisite role:** Global administrator, User administrator, Catalog owner, Access package manager or Access package assignment manager
197
203
198
-
1. In the Azure portal, select **Azure Active Directory** and then select **Identity Governance**.
204
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-access-package-auto-assignment-policy.md
+10-8Lines changed: 10 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,33 +42,35 @@ To create a policy for an access package, you need to start from the access pack
42
42
43
43
**Prerequisite role:** Global administrator or Identity Governance administrator
44
44
45
-
1.In the Azure portal, click **Azure Active Directory** and then click **Identity Governance**.
45
+
1.Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
46
46
47
-
1.In the left menu, click**Access packages**and then open the access package.
47
+
1.Browse to **Identity governance** >**Entitlement management**> **Access package**.
48
48
49
-
1.Click **Policies** and then **Add auto-assignment policy**to create a new policy.
49
+
1.On the **Access packages**page open an access package.
50
50
51
-
1. In the first tab, you'll specify the rule. Click **Edit**.
51
+
1. Select **Policies** and then **Add auto-assignment policy** to create a new policy.
52
+
53
+
1. In the first tab, you'll specify the rule. Select **Edit**.
52
54
53
55
1. Provide a dynamic membership rule, using the [membership rule builder](../enterprise-users/groups-dynamic-membership.md) or by clicking **Edit** on the rule syntax text box.
54
56
55
57
> [!NOTE]
56
-
> The rule builder might not be able to display some rules constructed in the text box, and validating a rule currently requires the you to be in the Global administrator role. For more information, see [rule builder in the Azure portal](../enterprise-users/groups-create-rule.md#rule-builder-in-the-azure-portal).
58
+
> The rule builder might not be able to display some rules constructed in the text box, and validating a rule currently requires the you to be in the Global administrator role. For more information, see [rule builder in the Entra admin center](../enterprise-users/groups-create-rule.md#rule-builder-in-the-azure-portal).
57
59
58
60

59
61
60
-
1.Click**Save** to close the dynamic membership rule editor.
62
+
1.Select**Save** to close the dynamic membership rule editor.
61
63
1. By default, the checkboxes to automatically create and remove assignments should remain checked.
62
64
1. If you wish users to retain access for a limited time after they go out of scope, you can specify a duration in hours or days. For example, when an employee leaves the sales department, you may wish to allow them to continue to retain access for 7 days to allow them to use sales apps and transfer ownership of their resources in those apps to another employee.
63
-
1.Click**Next** to open the **Custom Extensions** tab.
65
+
1.Select**Next** to open the **Custom Extensions** tab.
64
66
65
67
1. If you have [custom extensions](entitlement-management-logic-apps-integration.md) in your catalog you wish to have run when the policy assigns or removes access, you can add them to this policy. Then click next to open the **Review** tab.
66
68
67
69
1. Type a name and a description for the policy.
68
70
69
71

70
72
71
-
1.Click**Create** to save the policy.
73
+
1.Select**Create** to save the policy.
72
74
73
75
> [!NOTE]
74
76
> At this time, Entitlement management will automatically create a dynamic security group corresponding to each policy, in order to evaluate the users in scope. This group should not be modified except by Entitlement Management itself. This group may also be modified or deleted automatically by Entitlement Management, so don't use this group for other applications or scenarios.
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-access-package-create.md
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Create an access package in entitlement management
3
-
description: Learn how to create an access package of resources that you want to share in Azure Active Directory entitlement management.
3
+
description: Learn how to create an access package of resources that you want to share in Microsoft Entra entitlement management.
4
4
services: active-directory
5
5
documentationCenter: ''
6
6
author: owinfreyATL
@@ -56,15 +56,13 @@ Then once the access package is created, you can [change the hidden setting](ent
56
56
57
57
To complete the following steps, you need a role of global administrator, Identity Governance administrator, user administrator, catalog owner, or access package manager.
58
58
59
-
1. Sign in to the [Azure portal](https://portal.azure.com).
59
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
60
60
61
-
1. Select **Azure Active Directory**, and then select **Identity Governance**.

65
+

Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-access-package-edit.md
+8-4Lines changed: 8 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,9 +32,11 @@ Follow these steps to change the **Hidden** setting for an access package.
32
32
33
33
**Prerequisite role:** Global administrator, Identity Governance administrator, User administrator, Catalog owner, or Access package manager
34
34
35
-
1.In the Azure portal, select **Azure Active Directory** and then select **Identity Governance**.
35
+
1.Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
36
36
37
-
1. In the left menu, select **Access packages** and then open the access package.
1. On the **Access packages** page open an access package.
38
40
39
41
1. On the Overview page, select **Edit**.
40
42
@@ -50,9 +52,11 @@ An access package can only be deleted if it has no active user assignments. Foll
50
52
51
53
**Prerequisite role:** Global administrator, User administrator, Catalog owner, or Access package manager
52
54
53
-
1. In the Azure portal, select **Azure Active Directory** and then select **Identity Governance**.
55
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-access-package-first.md
+16-14Lines changed: 16 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Tutorial - Manage access to resources in entitlement management
3
-
description: Step-by-step tutorial for how to create your first access package using the Azure portal in entitlement management.
3
+
description: Step-by-step tutorial for how to create your first access package using the Microsoft Entra admin center in entitlement management.
4
4
services: active-directory
5
5
documentationCenter: ''
6
6
author: owinfreyATL
@@ -35,11 +35,11 @@ In this tutorial, you learn how to:
35
35
> * Allow a user in your directory to request access
36
36
> * Demonstrate how an internal user can request the access package
37
37
38
-
For a step-by-step demonstration of the process of deploying Azure Active Directory entitlement management, including creating your first access package, view the following video:
38
+
For a step-by-step demonstration of the process of deploying Microsoft Entra entitlement management, including creating your first access package, view the following video:
This rest of this article uses the Azure portal to configure and demonstrate entitlement management.
42
+
This rest of this article uses the Microsoft Entra admin center to configure and demonstrate entitlement management.
43
43
44
44
## Prerequisites
45
45
@@ -60,9 +60,9 @@ A resource directory has one or more resources to share. In this step, you creat
60
60
61
61

62
62
63
-
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global administrator or User administrator.
63
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a Global administrator or User administrator.
64
64
65
-
1. In the left navigation, select **Azure Active Directory**.
65
+
1. In the left navigation, select **Identity**.
66
66
67
67
1.[Create two users](../fundamentals/add-users.md). Use the following names or different names.
68
68
@@ -82,11 +82,13 @@ An *access package* is a bundle of resources that a team or project needs and is
82
82
83
83

84
84
85
-
1.In the Azure portal, in the left navigation, select **Azure Active Directory**.
85
+
1.Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
86
86
87
-
1.In the left menu, select**Identity Governance**
87
+
1.Browse to **Identity governance** >**Entitlement management** > **Access package**.
88
88
89
-
1. In the left menu, select **Access packages**. If you see **Access denied**, ensure that a Microsoft Azure AD Premium P2 or Microsoft Entra ID Governance license is present in your directory.
89
+
1. On the **Access packages** page open an access package.
90
+
91
+
1. When opening the access package if you see **Access denied**, ensure that a Microsoft Azure AD Premium P2 or Microsoft Entra ID Governance license is present in your directory.
90
92
91
93
1. Select **New access package**.
92
94
@@ -183,7 +185,7 @@ In this step, you perform the steps as the **internal requestor** and request ac
183
185
184
186
**Prerequisite role:** Internal requestor
185
187
186
-
1. Sign out of the Azure portal.
188
+
1. Sign out of the Microsoft Entra admin center.
187
189
188
190
1. In a new browser window, navigate to the My Access portal link you copied in the previous step.
189
191
@@ -209,9 +211,9 @@ In this step, you confirm that the **internal requestor** was assigned the acces
209
211
210
212
1. Sign out of the My Access portal.
211
213
212
-
1. Sign in to the [Azure portal](https://portal.azure.com) as **Admin1**.
214
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as **Admin1**.
213
215
214
-
1. Select **Azure Active Directory** and then select **Identity Governance**.
216
+
1. Select **Identity Governance**.
215
217
216
218
1. In the left menu, select **Access packages**.
217
219
@@ -225,7 +227,7 @@ In this step, you confirm that the **internal requestor** was assigned the acces
225
227
226
228
:::image type="content" source="./media/entitlement-management-access-package-first/request-details.png" alt-text="Screenshot of the access package request details." lightbox="./media/entitlement-management-access-package-first/request-details.png":::
227
229
228
-
1. In the left navigation, select **Azure Active Directory**.
230
+
1. In the left navigation, select **Identity**.
229
231
230
232
1. Select **Groups** and open the **Marketing resources** group.
231
233
@@ -241,7 +243,7 @@ In this step, you remove the changes you made and delete the **Marketing Campaig
241
243
242
244
**Prerequisite role:** Global administrator or User administrator
243
245
244
-
1. In the Azure portal, select **Azure Active Directory** and then select**Identity Governance**.
246
+
1. In the Microsoft Entra admin center**Identity Governance**.
245
247
246
248
1. Open the **Marketing Campaign** access package.
247
249
@@ -259,7 +261,7 @@ In this step, you remove the changes you made and delete the **Marketing Campaig
259
261
260
262
1. For **Marketing Campaign**, select the ellipsis (**...**) and then select **Delete**. In the message that appears, select **Yes**.
261
263
262
-
1. In Azure Active Directory, delete any users you created such as **Requestor1** and **Admin1**.
264
+
1. In **Identity**, delete any users you created such as **Requestor1** and **Admin1**.
0 commit comments