Skip to content

Commit fb3b775

Browse files
authored
Merge pull request #249329 from OWinfreyATL/owinfreyATL-EM-EntraStandardization
EM Azure to Entra steps
2 parents ece2a7c + 97d1a72 commit fb3b775

File tree

34 files changed

+285
-230
lines changed

34 files changed

+285
-230
lines changed

articles/active-directory/governance/entitlement-management-access-package-approval-policy.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,9 +52,11 @@ Follow these steps to specify the approval settings for requests for the access
5252

5353
**Prerequisite role:** Global administrator, Identity Governance administrator, User administrator, Catalog owner, or Access package manager
5454

55-
1. In the Azure portal, select **Azure Active Directory** and then select **Identity Governance**.
55+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
5656

57-
1. In the left menu, select **Access packages** and then open the access package.
57+
1. Browse to **Identity governance** > **Entitlement management** > **Access package**.
58+
59+
1. On the **Access packages** page open an access package.
5860

5961
1. Either select a policy to edit or add a new policy to the access package
6062
1. Select **Policies** and then **Add policy** if you want to create a new policy.

articles/active-directory/governance/entitlement-management-access-package-assignments.md

Lines changed: 16 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -37,9 +37,11 @@ To use entitlement management and assign users to access packages, you must have
3737

3838
**Prerequisite role:** Global administrator, Identity Governance administrator, User administrator, Catalog owner, Access package manager or Access package assignment manager
3939

40-
1. In the Azure portal, select **Azure Active Directory** and then select **Identity Governance**.
40+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
4141

42-
1. In the left menu, select **Access packages** and then open the access package.
42+
1. Browse to **Identity governance** > **Entitlement management** > **Access package**.
43+
44+
1. On the **Access packages** page open an access package.
4345

4446
1. Select **Assignments** to see a list of active assignments.
4547

@@ -77,9 +79,11 @@ In some cases, you might want to directly assign specific users to an access pac
7779

7880
**Prerequisite role:** Global administrator, User administrator, Catalog owner, Access package manager or Access package assignment manager
7981

80-
1. In the Azure portal, select **Azure Active Directory** and then select **Identity Governance**.
82+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
83+
84+
1. Browse to **Identity governance** > **Entitlement management** > **Access package**.
8185

82-
1. In the left menu, select **Access packages** and then open the access package.
86+
1. On the **Access packages** page open an access package.
8387

8488
1. In the left menu, select **Assignments**.
8589

@@ -117,9 +121,11 @@ Entitlement management also allows you to directly assign external users to an a
117121

118122
**Prerequisite role:** Global administrator, User administrator, Catalog owner, Access package manager or Access package assignment manager
119123

120-
1. In the Azure portal, select **Azure Active Directory** and then select **Identity Governance**.
124+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
121125

122-
1. In the left menu, select **Access packages** and then open the access package in which you want to add a user.
126+
1. Browse to **Identity governance** > **Entitlement management** > **Access package**.
127+
128+
1. On the **Access packages** page open an access package.
123129

124130
1. In the left menu, select **Assignments**.
125131

@@ -195,9 +201,11 @@ You can remove an assignment that a user or an administrator had previously requ
195201

196202
**Prerequisite role:** Global administrator, User administrator, Catalog owner, Access package manager or Access package assignment manager
197203

198-
1. In the Azure portal, select **Azure Active Directory** and then select **Identity Governance**.
204+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
205+
206+
1. Browse to **Identity governance** > **Entitlement management** > **Access package**.
199207

200-
1. In the left menu, select **Access packages** and then open the access package.
208+
1. On the **Access packages** page open an access package.
201209

202210
1. In the left menu, select **Assignments**.
203211

articles/active-directory/governance/entitlement-management-access-package-auto-assignment-policy.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -42,33 +42,35 @@ To create a policy for an access package, you need to start from the access pack
4242

4343
**Prerequisite role:** Global administrator or Identity Governance administrator
4444

45-
1. In the Azure portal, click **Azure Active Directory** and then click **Identity Governance**.
45+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
4646

47-
1. In the left menu, click **Access packages** and then open the access package.
47+
1. Browse to **Identity governance** > **Entitlement management** > **Access package**.
4848

49-
1. Click **Policies** and then **Add auto-assignment policy** to create a new policy.
49+
1. On the **Access packages** page open an access package.
5050

51-
1. In the first tab, you'll specify the rule. Click **Edit**.
51+
1. Select **Policies** and then **Add auto-assignment policy** to create a new policy.
52+
53+
1. In the first tab, you'll specify the rule. Select **Edit**.
5254

5355
1. Provide a dynamic membership rule, using the [membership rule builder](../enterprise-users/groups-dynamic-membership.md) or by clicking **Edit** on the rule syntax text box.
5456

5557
> [!NOTE]
56-
> The rule builder might not be able to display some rules constructed in the text box, and validating a rule currently requires the you to be in the Global administrator role. For more information, see [rule builder in the Azure portal](../enterprise-users/groups-create-rule.md#rule-builder-in-the-azure-portal).
58+
> The rule builder might not be able to display some rules constructed in the text box, and validating a rule currently requires the you to be in the Global administrator role. For more information, see [rule builder in the Entra admin center](../enterprise-users/groups-create-rule.md#rule-builder-in-the-azure-portal).
5759
5860
![Screenshot of an access package automatic assignment policy rule configuration.](./media/entitlement-management-access-package-auto-assignment-policy/auto-assignment-rule-configuration.png)
5961

60-
1. Click **Save** to close the dynamic membership rule editor.
62+
1. Select **Save** to close the dynamic membership rule editor.
6163
1. By default, the checkboxes to automatically create and remove assignments should remain checked.
6264
1. If you wish users to retain access for a limited time after they go out of scope, you can specify a duration in hours or days. For example, when an employee leaves the sales department, you may wish to allow them to continue to retain access for 7 days to allow them to use sales apps and transfer ownership of their resources in those apps to another employee.
63-
1. Click **Next** to open the **Custom Extensions** tab.
65+
1. Select **Next** to open the **Custom Extensions** tab.
6466

6567
1. If you have [custom extensions](entitlement-management-logic-apps-integration.md) in your catalog you wish to have run when the policy assigns or removes access, you can add them to this policy. Then click next to open the **Review** tab.
6668

6769
1. Type a name and a description for the policy.
6870

6971
![Screenshot of an access package automatic assignment policy review tab.](./media/entitlement-management-access-package-auto-assignment-policy/auto-assignment-review.png)
7072

71-
1. Click **Create** to save the policy.
73+
1. Select **Create** to save the policy.
7274

7375
> [!NOTE]
7476
> At this time, Entitlement management will automatically create a dynamic security group corresponding to each policy, in order to evaluate the users in scope. This group should not be modified except by Entitlement Management itself. This group may also be modified or deleted automatically by Entitlement Management, so don't use this group for other applications or scenarios.

articles/active-directory/governance/entitlement-management-access-package-create.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Create an access package in entitlement management
3-
description: Learn how to create an access package of resources that you want to share in Azure Active Directory entitlement management.
3+
description: Learn how to create an access package of resources that you want to share in Microsoft Entra entitlement management.
44
services: active-directory
55
documentationCenter: ''
66
author: owinfreyATL
@@ -56,15 +56,13 @@ Then once the access package is created, you can [change the hidden setting](ent
5656

5757
To complete the following steps, you need a role of global administrator, Identity Governance administrator, user administrator, catalog owner, or access package manager.
5858

59-
1. Sign in to the [Azure portal](https://portal.azure.com).
59+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
6060

61-
1. Select **Azure Active Directory**, and then select **Identity Governance**.
62-
63-
1. On the left menu, select **Access packages**.
61+
1. Browse to **Identity governance** > **Entitlement management** > **Access package**.
6462

6563
1. Select **New access package**.
6664

67-
![Screenshot that shows the button for creating a new access package in the Azure portal.](./media/entitlement-management-shared/access-packages-list.png)
65+
![Screenshot that shows the button for creating a new access package in the Microsoft Entra admin center.](./media/entitlement-management-shared/access-packages-list.png)
6866

6967
## Configure basics
7068

articles/active-directory/governance/entitlement-management-access-package-edit.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -32,9 +32,11 @@ Follow these steps to change the **Hidden** setting for an access package.
3232

3333
**Prerequisite role:** Global administrator, Identity Governance administrator, User administrator, Catalog owner, or Access package manager
3434

35-
1. In the Azure portal, select **Azure Active Directory** and then select **Identity Governance**.
35+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
3636

37-
1. In the left menu, select **Access packages** and then open the access package.
37+
1. Browse to **Identity governance** > **Entitlement management** > **Access package**.
38+
39+
1. On the **Access packages** page open an access package.
3840

3941
1. On the Overview page, select **Edit**.
4042

@@ -50,9 +52,11 @@ An access package can only be deleted if it has no active user assignments. Foll
5052

5153
**Prerequisite role:** Global administrator, User administrator, Catalog owner, or Access package manager
5254

53-
1. In the Azure portal, select **Azure Active Directory** and then select **Identity Governance**.
55+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
56+
57+
1. Browse to **Identity governance** > **Entitlement management** > **Access package**.
5458

55-
1. In the left menu, select **Access packages** and then open the access package.
59+
1. On the **Access packages** page open the access package.
5660

5761
1. In the left menu, select **Assignments** and remove access for all users.
5862

articles/active-directory/governance/entitlement-management-access-package-first.md

Lines changed: 16 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Tutorial - Manage access to resources in entitlement management
3-
description: Step-by-step tutorial for how to create your first access package using the Azure portal in entitlement management.
3+
description: Step-by-step tutorial for how to create your first access package using the Microsoft Entra admin center in entitlement management.
44
services: active-directory
55
documentationCenter: ''
66
author: owinfreyATL
@@ -35,11 +35,11 @@ In this tutorial, you learn how to:
3535
> * Allow a user in your directory to request access
3636
> * Demonstrate how an internal user can request the access package
3737
38-
For a step-by-step demonstration of the process of deploying Azure Active Directory entitlement management, including creating your first access package, view the following video:
38+
For a step-by-step demonstration of the process of deploying Microsoft Entra entitlement management, including creating your first access package, view the following video:
3939

4040
>[!VIDEO https://www.youtube.com/embed/zaaKvaaYwI4]
4141
42-
This rest of this article uses the Azure portal to configure and demonstrate entitlement management.
42+
This rest of this article uses the Microsoft Entra admin center to configure and demonstrate entitlement management.
4343

4444
## Prerequisites
4545

@@ -60,9 +60,9 @@ A resource directory has one or more resources to share. In this step, you creat
6060

6161
![Diagram that shows the users and groups for this tutorial.](./media/entitlement-management-access-package-first/elm-users-groups.png)
6262

63-
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global administrator or User administrator.
63+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a Global administrator or User administrator.
6464

65-
1. In the left navigation, select **Azure Active Directory**.
65+
1. In the left navigation, select **Identity**.
6666

6767
1. [Create two users](../fundamentals/add-users.md). Use the following names or different names.
6868

@@ -82,11 +82,13 @@ An *access package* is a bundle of resources that a team or project needs and is
8282

8383
![Diagram that describes the relationship between the access package elements.](./media/entitlement-management-access-package-first/elm-access-package.png)
8484

85-
1. In the Azure portal, in the left navigation, select **Azure Active Directory**.
85+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
8686

87-
1. In the left menu, select **Identity Governance**
87+
1. Browse to **Identity governance** > **Entitlement management** > **Access package**.
8888

89-
1. In the left menu, select **Access packages**. If you see **Access denied**, ensure that a Microsoft Azure AD Premium P2 or Microsoft Entra ID Governance license is present in your directory.
89+
1. On the **Access packages** page open an access package.
90+
91+
1. When opening the access package if you see **Access denied**, ensure that a Microsoft Azure AD Premium P2 or Microsoft Entra ID Governance license is present in your directory.
9092

9193
1. Select **New access package**.
9294

@@ -183,7 +185,7 @@ In this step, you perform the steps as the **internal requestor** and request ac
183185

184186
**Prerequisite role:** Internal requestor
185187

186-
1. Sign out of the Azure portal.
188+
1. Sign out of the Microsoft Entra admin center.
187189

188190
1. In a new browser window, navigate to the My Access portal link you copied in the previous step.
189191

@@ -209,9 +211,9 @@ In this step, you confirm that the **internal requestor** was assigned the acces
209211

210212
1. Sign out of the My Access portal.
211213

212-
1. Sign in to the [Azure portal](https://portal.azure.com) as **Admin1**.
214+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as **Admin1**.
213215

214-
1. Select **Azure Active Directory** and then select **Identity Governance**.
216+
1. Select **Identity Governance**.
215217

216218
1. In the left menu, select **Access packages**.
217219

@@ -225,7 +227,7 @@ In this step, you confirm that the **internal requestor** was assigned the acces
225227

226228
:::image type="content" source="./media/entitlement-management-access-package-first/request-details.png" alt-text="Screenshot of the access package request details." lightbox="./media/entitlement-management-access-package-first/request-details.png":::
227229

228-
1. In the left navigation, select **Azure Active Directory**.
230+
1. In the left navigation, select **Identity**.
229231

230232
1. Select **Groups** and open the **Marketing resources** group.
231233

@@ -241,7 +243,7 @@ In this step, you remove the changes you made and delete the **Marketing Campaig
241243

242244
**Prerequisite role:** Global administrator or User administrator
243245

244-
1. In the Azure portal, select **Azure Active Directory** and then select **Identity Governance**.
246+
1. In the Microsoft Entra admin center **Identity Governance**.
245247

246248
1. Open the **Marketing Campaign** access package.
247249

@@ -259,7 +261,7 @@ In this step, you remove the changes you made and delete the **Marketing Campaig
259261

260262
1. For **Marketing Campaign**, select the ellipsis (**...**) and then select **Delete**. In the message that appears, select **Yes**.
261263

262-
1. In Azure Active Directory, delete any users you created such as **Requestor1** and **Admin1**.
264+
1. In **Identity**, delete any users you created such as **Requestor1** and **Admin1**.
263265

264266
1. Delete the **Marketing resources** group.
265267

0 commit comments

Comments
 (0)