Entitlement Management

Entitlement Management

Intro

As a security consultant I have been working for several companies over the years and have dealt with numerous issues surrounding Identity Management.

One of the recurring challenges has always been granting the right amount of access for the right amount of time. Especially the latter part has been a challenge, like removing users from groups after they leave the company or change position in the company.

Since the beginning of Azure AD, Microsoft has been implementing more and more self-service and automation regarding Identity Management, I for one am a big fan of this considering the risks when Identity Management isn´t done properly.

One of the latest additions to Azure ADs Identity Management is Entitlement Management. Entitlement Management can be found under the service – Identity Governance, where PIM, Access Reviews and Terms of use is located also.

Entitlement Management is the ability to enable access to SharePoint sites, company apps and adding users to groups. Individually this is possible already, but with Entitlement Management it is possible to create Catalogs of resources that can be grouped together to Access Packages that users can request access to.

Creating catalogs

Using Entitlement Management starts with creating a catalog of resources

Go to the service tab – Identity Governance and select Catalogs under Entitlement Management

In the right pane select New Catalog


clip_image001[13]

Figure 1 – Catalog creation

This brings up the catalog creation where a Name and Description for the catalog must be entered and if the catalog should be Enabled and if External Users can be added to it.

clip_image003[8]

Figure 2 – Catalog settings

After the catalog has been created Resources should be added. Choose Resources in the left pane and press Add resources in the right pane.

clip_image004[6]

Figure 3 – Adding resources to catalog

As mentioned, it is possible to add 3 types of resources Groups, Applications and Sharepoint Sites.

clip_image005[8]

Figure 4 – Resource types

At this point resources are added to the catalog that will be available to the creation of Access Packages.

clip_image007[8]

Figure 5 – Adding groups

clip_image009[8]

Figure 6 – Adding groups

clip_image011[8]

Figure 7 – Adding Sharepoint sites

Since we have no applications in our test tenant it is not possible to add these, but I hope you get the point.

Adding 2 groups and 1 SharePoint site leaves us with a catalog that looks like this. In production and for companies of a medium size, expect the catalog to contain a lot more resources.

clip_image013[8]

Figure 8 – Resources selected to be added to the catalog

After selecting the resources for the catalog, press Add at the bottom of the screen.

Access Package creation

When the catalog has been created, we have a foundation to build our Access Packages from. To create an Access Package choose Access Packages in the left pane and press New access package.


clip_image015[4]

Figure 9 – Access package creation

Access package creation consists of 3 parts – Basics like name and description, Resource roles where it is defined what to do with access to the chosen resources and Policy where it is defined how users can request the access package.

Basics

Note: The name and Description entered here will be displayed to the users.

clip_image017[8]

Figure 10 – Access package creation – basics

Resource roles

By pressing the Groups, Applications or Sharepoint sites button at the top, resources ca be added.

clip_image019[4]

Figure 11 – Access package creation – resource roles

When selecting resources, it is possible to tick the Only see Group(s)…. – to only have resources listed that are available from the catalog. It is possible to add resources that are not in the catalog, but only if the user has privileges that allows for those to be added to the catalog.


clip_image021[4]

Figure 12 – Adding resources to access package – groups

After a resource has been added the Role needs to be set using the drop-down to the right of the resource.

clip_image023[4]

Figure 13 – Choose the role the users should have when approved.

Policy

Policies define which users can request access, if the request requires approval and if the access should expire at a certain time or after a certain amount of time.

It is only possible to select if the users should come from your own directory or if they are external. Alternatively, you could choose that no users should be able to request access, but that access will be appointed by an administrator directly.

This is not a limitation, because it is possible to add multiple policies to every access package.

clip_image025[8]

Figure 14 – Policy creation

clip_image027[8]

Figure 15 – Directory selection when selecting users from external tenants.

clip_image028[6]

Figure 16 – Approver selection.

clip_image029[8]

Figure 17 – Expiration selection

When the access package has been created the link should be sent to external users that needs to request access.

clip_image031[8]

Figure 18 – Review page

So, the Access Package we created ended up with these resources – which means that users that request access and are approved by the approvers will be added to the 2 groups and will be a member of the Sharepoint site.

clip_image033[8]

Figure 19 – Resource overview

Requesting access

When users access the link, they will be accessing the “myportal” site. After a successful login they will be able to select the access package and request access. See below.

clip_image035

Figure 20 – The initial page after logging in.

clip_image036[4]

Figure 21 – To request access – select the package and press Request access.


clip_image038[4]

Figure 22 – Fill out the required fields.

clip_image040

Figure 23 – After the request has been added it can be viewed in the request history.

clip_image042

Figure 24 – And the approver will get a notification that there is a request waiting.

Conclusion

Using services like entitlement management can greatly reduce the management needed for adding resources to users and removing access to the same resources afterwards. This might not seem like a big security enhancement, but in fact the right access at the right time is a big security improvement. Also it reduces the time needed for administrative staff to help users with access and allows for outsourcing the administration to the people actually owning the resources. All in all we are very happy about Microsofts new features.

If you have any questions about this article or would like a demo in your own environment, as always just reach out to us.

Have a great summer all! Winking smile

+ posts

Table of Contents

Share this post
Search blog posts
Search
Authors
Modern Workplace consultant and a Microsoft MVP in Enterprise Mobility.

Modern Workplace consultant and a Microsoft MVP in Windows and Devices.

Infrastructure architect with focus on Modern Workplace and Microsoft 365 security.

Cloud & security specialist with focus on Microsoft backend products and cloud technologies.

Cloud & security specialist with focus on Microsoft 365.

Cloud & Security Specialist, with a passion for all things Cybersecurity

Cloud and infrastructure security specialist with background in networking.

Infrastructure architect with focus on design, implementation, migration and consolidation.

Infrastructure consultant with focus on cloud solutions in Office365 and Azure.

Modern workplace and infrastructure architect with a focus on Microsoft 365 and security.

follow us in feedly
Categories

Follow on SoMe