![Lead Image © amasterpics123, 123RF.com Lead Image © amasterpics123, 123RF.com](/var/ezflow_site/storage/images/archive/2020/56/identity-governance-regulates-access-control-in-azure-ad/123rf_21579259_3d-man-checkmark_amasterpics123_resized.png/171668-1-eng-US/123RF_21579259_3d-Man-Checkmark_amasterpics123_resized.png_medium.png)
Lead Image © amasterpics123, 123RF.com
Identity Governance regulates access control in Azure AD
Right Rights
Besides internal corporate users, Azure Active Directory (AAD) is increasingly seeing access by suppliers, partners, and external developers. If your own identities and external partners are stored in one directory, collaboration across a diverse range of applications becomes easier but managing the various authorizations more complex. Azure identity governance comes in handy in these cases.
Access management and processes that support the lifecycle are of interest even in companies that aim for little or no collaboration in the cloud. For example, employees often move between departments within a company, collecting different authorizations in the process, such as access to marketing repositories, insights into various training courses, or information on budget planning for previous years. Next, they might switch to a sales role, where they gain insights into customer relations information. Rarely does a clean-up take place after a role change. If the corresponding user account is hijacked by attackers, they can gain access to all of this information, which is fatal in the case of administrative accounts. Here, too, administrators retain extensive permissions after setting up systems across different projects.
Azure AD administrators use Identity Governance to regulate access management for resources in the cloud. This function lets organizations bundle resources, assign them to end users, and check access regularly with automatic mechanisms. In AAD, identity governance is split into two parts: the lifecycle of privileges for administrators (Privileged Identity Management, PIM) and Entitlement Lifecycle Management (ELM) for end users. Premium P2 licenses are required for both functions, but a trial license is all you need to test the functionality.
Access Packages
ELM in AAD currently manages groups (both security and Office 365 groups), applications integrated in AAD
...Buy this article as PDF
(incl. VAT)