{"id":833,"date":"2022-05-06T20:57:54","date_gmt":"2022-05-06T20:57:54","guid":{"rendered":"https:\/\/www.spktechfit.com\/?p=833"},"modified":"2022-05-06T21:09:34","modified_gmt":"2022-05-06T21:09:34","slug":"14-planning-and-implementing-entitlement-management","status":"publish","type":"post","link":"https:\/\/www.spktechfit.com\/?p=833","title":{"rendered":"14. Planning and Implementing Entitlement Management"},"content":{"rendered":"<h2>Defining Catalogs for Entitlement Management<\/h2>\n<p>Microsoft provides us with a way a user can self-manage access rights to resources using &#8220;self-service&#8221;. With this method a user can logon and request access to a particular resource.<\/p>\n<p>A catalog is a group of resources like access packages. EG: if the company is doing a big marketing push, you could create a catalog of everything relating to marketing.<\/p>\n<ol>\n<li>Go Azure AD -&gt; Identity Governance -&gt; Catalogs<\/li>\n<li>Click new Catalog<\/li>\n<li>Give it a name and description<\/li>\n<li>Enable the catalog<\/li>\n<li>Choose whether you want to make it available to external users or not<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h2>Defining Access Packages<\/h2>\n<p>An Access Package is an object that allows users to request access to. You can specify what is in the Access Package.<\/p>\n<p>You can set whether the users have to justify why they need the Access Package and whether or not an admin needs to approve the request.<\/p>\n<ol>\n<li>Go Azure AD -&gt; Identity Governance -&gt; Access Packages<\/li>\n<li>New Access Package<\/li>\n<li>Give it a name and description<\/li>\n<li>Choose which Catalog it will go in\u00a0 (we created in previous section)<\/li>\n<li>Resources roles: this is where you choose what is in the Access Package. Here you can add:<br \/>\n&#8211; Groups and Teams (you can choose whether to add them as member or owner)<br \/>\n&#8211; Applications<br \/>\n&#8211; SharePoint Sites<\/li>\n<li>Requests: who can request this access package?:<br \/>\n&#8211; Users in your directory (you can specify users &amp; groups)<br \/>\n&#8211; Users not in your directory<br \/>\n&#8211; None &#8211; administrators assign users<\/li>\n<li>approval: do they need to get approval?<br \/>\n&#8211; who can approve it?<br \/>\n&#8211; within how many days?<\/li>\n<li>Requestor information: here you can request extra information for the user. EG: a mobile phone number so someone can call them<\/li>\n<li>Lifecycle: expiration date\/ days<br \/>\n&#8211; you can set periodic access reviews<\/li>\n<\/ol>\n<p>Once the Access Package is created you get a direct link to this which you can share with users.<\/p>\n<h3>Exploring the user side of Entitlement with Azure AD<\/h3>\n<p>When you go to this link it shows the user the Access Packages available to them.<\/p>\n<p>From here, they can request access to the package and enter any required information (set in the package in the previous steps).<\/p>\n<p>From this area the user can look at their request history, approvals, Access reviews etc\u2026<\/p>\n<p>&nbsp;<\/p>\n<h2>Implementing and Managing Terms of Use<\/h2>\n<p>When someone signs on to their Microsoft 365 account you can have a terms of user pop up.<\/p>\n<p>To set this up:<\/p>\n<ol>\n<li>Go to Azure AD- &gt; Identity Governance &#8211; &gt;Terms of use<\/li>\n<li>Click New Terms<\/li>\n<li>Options:<br \/>\n&#8211; Name<br \/>\n&#8211; Display Name<br \/>\n&#8211; Term of use document: you can upload a pdf<br \/>\n&#8211; requires users to expand the terms&#8221;<br \/>\n&#8211; require consent on every device<br \/>\n&#8211; Expire consent: so they have to do it again after certain amount of days<br \/>\n&#8211; Duration before re-acceptance: eg: every 90 days they have to re-accept<br \/>\n&#8211; Apply using Conditional Access policy: you can choose to apply this using existing conditional access policy or create a new one<\/li>\n<\/ol>\n<p><b>Create Conditional Access Policy for Terms of Use<\/b><\/p>\n<ul>\n<li>Go to Azure AD- &gt; Security -&gt; Conditional Access -&gt; New<\/li>\n<li>Give it a name<\/li>\n<li>Assignments: select the users and groups this will apply<\/li>\n<li>Go to Access controls: from here you can now see the &#8220;Terms of Use&#8221; you created in the previous step are here as an option when granting access. You can require them to go through the Terms of use.<\/li>\n<li>It can take up to a few hours to apply<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Managing the lifecycle of external users (Guests) in Azure AD Governance Setting<\/h2>\n<p>Periodically you should monitor the external accounts in your organisation to see if they are still active and if so, are they required.<\/p>\n<h3>Create New Access Review for external users<\/h3>\n<ol>\n<li>Go to Azure AD -&gt; Identity Governance -&gt; Access Reviews -&gt; New Access Review<\/li>\n<li>Review Type:<br \/>\n&#8211; What to review: Teams and Groups -&gt; Select &#8220;All M365 groups with guests&#8221;<br \/>\n&#8211; Select Review scope: &#8220;guest users only&#8221;<\/li>\n<li>Reviews:<br \/>\n&#8211; Select reviewers: group owners, Specific users, managers of users<br \/>\n&#8211; Recurrence of reviews: number of days<br \/>\n&#8211; Review recurrence: quarterly, fortnightly etc\u2026<br \/>\n&#8211; Start Date<br \/>\n&#8211; End date<\/li>\n<li>Settings:<br \/>\n&#8211; Auto reply results to resource: if enabled this will revoke users access automatically<br \/>\n&#8211; If reviewers don\u2019t respond: remove access , approve access, make no change<br \/>\n&#8211; Send notification to<br \/>\n&#8211; Review decision helpers: if the reviewer hasn\u2019t signed in for 30 days<\/li>\n<li>Advanced settings:<br \/>\n&#8211; which info will you gather when running access review<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Defining Catalogs for Entitlement Management Microsoft provides us with a way a user can self-manage access rights to resources using &#8220;self-service&#8221;. With this method a user can logon and request access to a particular resource. A catalog is a group of resources like access packages. EG: if the company is doing a big marketing push, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[13,12,3],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/posts\/833"}],"collection":[{"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=833"}],"version-history":[{"count":1,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/posts\/833\/revisions"}],"predecessor-version":[{"id":834,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/posts\/833\/revisions\/834"}],"wp:attachment":[{"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}