Skip to content

Commit a312234

Browse files
Merge pull request #10646 from MicrosoftDocs/main
Auto Publish – main to live - 2025-12-01 23:06 UTC
2 parents f1bef42 + e7d24c7 commit a312234

11 files changed

+73
-29
lines changed

docs/fundamentals/licensing.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: barclayn
55
manager: pmwongera
66
ms.service: entra
77
ms.topic: article
8-
ms.date: 06/20/2025
8+
ms.date: 12/01/2025
99
ms.subservice: fundamentals
1010
ms.author: barclayn
1111
---
@@ -14,6 +14,8 @@ ms.author: barclayn
1414

1515
This article discusses licensing options for the Microsoft Entra product family. It's intended for security decision makers, identity and network access administrators, and IT professionals who are considering Microsoft Entra solutions for their organizations.
1616

17+
>[!NOTE]
18+
>If you are troubleshooting licensing assignment issues, review [Identify and resolve license assignment problems for a group in the Microsoft 365 Admin Portal](licensing-groups-resolve-problems.md).
1719
1820
## Microsoft Entra licensing options
1921

docs/global-secure-access/reference-current-known-limitations.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -278,3 +278,12 @@ Known limitations for Internet Access include:
278278
## B2B guest access (preview) limitations
279279
<a name="b2b-guest-access-limitations"></a>
280280
- The Global Secure Access client doesn't support multi-session Azure Virtual Desktop.
281+
282+
## Global Secure Access In Government Cloud limitations
283+
Global Secure Access is not available in the US Government community cloud High (GCC-H), Department of Defense cloud and other Govt/Sovereign cloud environments.
284+
285+
For usage in US Government community (GCC) cloud, known limitations/disclaimers include:
286+
287+
- Non Federal Information Processing Standard (FIPS) 140-2 certified: Note that while the GSA service is FedRAMP High accredited, it is not yet FIPS 140-2 certified. Microsoft is actively working toward achieving FIPS accreditation/certification, and this process is currently underway. Customers should consider this status when evaluating compliance requirements. FIPS 140-2 is a US government standard that defines FedRAMP minimum security requirements for cryptographic modules in products and systems. For more information, see [Federal Information Processisng Standard (FIPS) 140](https://learn.microsoft.com/azure/compliance/offerings/offering-fips-140-2).
288+
- Data Residency Requirements: Customers should carefully consider data residency requirements when evaluating the GSA solution for their needs. When using GSA, there is a possibility that your data (up to and including customer content) may be Transport Layer Security (TLS) terminated and processed outside the United States esp. in cases where the users access GSA while traveling outside of the USA and its territories. Additionally, data may also be TLS terminated and processed outside of the USA when GSA routes traffic through the nearest available edge location, which may be outside USA borders depending on several factors. Factors for TLS termination and processing outside the US may include but not limited to: user’s physical location, proximity to edge locations, network latency, service availability, performance considerations, customer configurations and so on. As an example, a user near a USA border with a non-USA region may connect to a non-USA edge, where data inspection and policy enforcement take place.
289+

docs/id-governance/custom-data-resource-access-reviews.md

Lines changed: 16 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,8 @@ With a catalog created, you can add custom data provided resource to it by doing
7979
1. Select **Create**.
8080

8181

82+
You can also create an access review programmatically using Microsoft Graph. For more information, see [Create a single stage access review on a catalog](/graph/api/accessreviewset-post-definitions?view=graph-rest-beta&tabs=http#example-6-create-a-single-stage-access-review-on-a-catalog).
83+
8284
## Get Access Review Object and Instance ID
8385

8486
After creating the catalog access review, but before uploading your custom data, you must get both the Access Review object ID, and the Access Review instance object ID. To get this information, you'd do the following:
@@ -115,6 +117,7 @@ After copying both the Access review object, and access review instance object,
115117
> To confirm all CSVs were uploaded successfully, view the [audit logs](entitlement-management-logs-and-reporting.md).
116118
1. You have **up to two hours** from the time the review enters the *Initializing* state to complete the upload.
117119

120+
You can also upload custom data via Graph, by creating an upload session and then uploading a CSV file. For more information, see [customDataProvidedResourceUploadSession](/graph/api/resources/customdataprovidedresourceuploadsession?view=graph-rest-beta).
118121

119122
## Active review state
120123

@@ -126,33 +129,38 @@ At the **Active** stage:
126129
## Applying stage
127130

128131

129-
In the **Applying** stage, you manually get a list of denied users by making the following API call:
132+
In the **Applying** stage, you can get a list of denied users by making the [list decisions](/graph/api/accessreviewinstance-list-decisions?view=graph-rest-beta&tabs=http) API call:
130133

131134
``` http
132-
GET /identityGovernance/accessReviews/definitions/{access review object ID}/instances/{access review instance object ID}/decisions?$filter=(decision eq Deny and resourceId eq <custom data provided resource ID>)
135+
GET https://graph.microsoft.com/beta/identityGovernance/accessReviews/definitions/{access review object ID}/instances/{access review instance object ID}/decisions?$filter=(decision eq 'Deny' and resourceId eq '<custom data provided resource ID>')
133136
```
134137

135138
For each decision item:
136139

137-
Remove access from your own system and Patch each decision item to indicate success or failure for removal by making the following API call:
140+
Remove access from your own system and then patch each decision item to indicate success or failure for removal by making the [update accessReviewInstanceDecisionItem](/graph/api/accessreviewinstancedecisionitem-update?view=graph-rest-beta&tabs=http) API call:
138141

139142
``` http
140-
PATCH /identityGovernance/accessReviews/definitions/{access review object ID}/instances/{access review instance object ID}/decisions/{decision ID}
141-
{ “applyResult” : “Success/Failure/PartialSuccess/NotSupported”, “applyDescription”: “ServiceNow ticket created” }
143+
PATCH https://graph.microsoft.com/beta/identityGovernance/accessReviews/definitions/{access review object ID}/instances/{access review instance object ID}/decisions/{decision ID}
144+
Content-Type: application/json
145+
146+
{
147+
"applyResult": "AppliedSuccessfully",
148+
"applyDescription": "ServiceNow ticket created"
149+
}
142150
```
143151

144-
The review transition to the **Applied** state once all the custom data provided decisions have been applied. For example, if you have five decisions that must be made from the data, you must apply(PATCH) five decisions before the review transitions to **Applied**.
152+
The review transition to the **Applied** state once all the custom data provided decisions have been applied. For example, if you have five decisions that must be made from the data, you must apply using PATCH each of five decision items before the review transitions to **Applied**.
145153

146154

147155

148156

149-
## Complete and apply review decisions
157+
## Review status
150158

151159
As reviewers take actions, the review progresses through several states:
152160

153161
| Review Status | Description |
154162
|--------------------|-----------------|
155-
| Initializing | Review created; waiting for custom data upload. |
163+
| Initializing | Review instance created; waiting for custom data upload. |
156164
| Active | Reviewers can take decisions in the My Access portal. |
157165
| Applying | Review decisions are being remediated. |
158166
| Applied | All decisions are marked as applied. |

docs/id-governance/identity-governance-applications-existing-users.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom: sfi-ga-blocked, sfi-ropc-nochange
1414

1515
# Govern an application's existing users - Microsoft PowerShell
1616

17-
There are three common scenarios in which it's necessary to populate Microsoft Entra ID with existing users of an application before you use the application with a Microsoft Entra ID Governance feature such as [access reviews](access-reviews-application-preparation.md).
17+
There are four common scenarios in which it's necessary to populate Microsoft Entra ID with existing access rights and users of an application before you use the application with a Microsoft Entra ID Governance feature such as [access reviews](access-reviews-application-preparation.md).
1818

1919
## License requirements
2020
[!INCLUDE [active-directory-entra-governance-license.md](~/includes/entra-entra-governance-license.md)]
@@ -57,6 +57,15 @@ For some legacy applications, it might not be feasible to remove other identity
5757

5858
That scenario of an application which does not support provisioning protocols, is covered in a separate article, [Govern the existing users of an application that does not support provisioning](identity-governance-applications-not-provisioned-users.md).
5959

60+
### Application uses Microsoft Entra ID as its identity provider and has additional access rights for users
61+
62+
Using custom data provided resources, you can include access rights from applications in Microsoft Entra ID access reviews by uploading their access data directly into a catalog.
63+
64+
You can then run user Access Reviews (UARs) across both Microsoft Entra-connected resources and those access rights. Reviewers can easily review and certify users’ access in the My Access portal, helping ensure consistent governance, improved visibility, and compliance across all resources whether or not they’re connected to Microsoft Entra.
65+
66+
This scenario is covered in a separate article, [include custom data provided resource in the catalog for catalog user Access Reviews (Preview)](custom-data-resource-access-reviews.md).
67+
68+
6069
## Terminology
6170

6271
This article illustrates the process for managing application role assignments by using the [Microsoft Graph PowerShell cmdlets](https://www.powershellgallery.com/packages/Microsoft.Graph). It uses the following Microsoft Graph terminology.

docs/id-governance/identity-governance-applications-integrate.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -114,6 +114,8 @@ However, if the application was already in your environment, users may have gain
114114
1. If the application was using AD security groups, and those groups were created in AD, then once the review is complete, you need to manually update the AD groups to remove memberships of those users who were denied. Subsequently, to have denied access rights removed automatically, you can either update the application to use an AD group that was created in Microsoft Entra ID and [written back to Microsoft Entra ID](~/identity/hybrid/cloud-sync/how-to-configure-entra-to-active-directory.md), or move the membership from the AD group to the Microsoft Entra group, and [nest the written back group as the only member of the AD group](~/identity/hybrid/cloud-sync/govern-on-premises-groups.md).
115115
1. Once the review has been completed and the application access updated, or if no users have access, then continue on to the next steps to deploy Conditional Access and entitlement management policies for the application.
116116

117+
Using custom data provided resources (preview), you can include access rights from applications in Microsoft Entra ID access reviews by uploading their access data directly prior to an access review. For more information, see [Include custom data provided resource in the catalog for catalog user Access Reviews (Preview)](custom-data-resource-access-reviews.md).
118+
117119
Now that you have a baseline that ensures existing access has been reviewed, then you can [deploy the organization's policies](identity-governance-applications-deploy.md) for ongoing access and any new access requests.
118120

119121
## Next steps

docs/id-governance/identity-governance-applications-not-provisioned-users.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,15 +14,18 @@ ms.custom: sfi-ga-nochange
1414

1515
# Govern the users of an application that does not support provisioning - Microsoft PowerShell
1616

17-
There are three common scenarios in which it's necessary to populate Microsoft Entra ID with existing users of an application before you use the application with a Microsoft Entra ID Governance feature such as [access reviews](access-reviews-application-preparation.md).
17+
There are four common scenarios in which it's necessary to populate Microsoft Entra ID with existing users and their access rights of an application before you use the application with a Microsoft Entra ID Governance feature such as [access reviews](access-reviews-application-preparation.md).
1818

1919
- Application migrated to Microsoft Entra ID after using its own identity provider
2020
- Application that doesn't use Microsoft Entra ID as its only identity provider
2121
- Application does not use Microsoft Entra ID as its identity provider nor does it support provisioning
22+
- Application uses Microsoft Entra ID as its identity provider and has additional access rights for users
2223

2324
For more information on those first two scenarios, where the application supports provisioning, or uses an LDAP directory, SQL database, has a SOAP or REST API or relies upon Microsoft Entra ID as its identity provider, see the article [govern an application's existing users](identity-governance-applications-existing-users.md). That article covers how to use identity governance features for existing users of those categories of applications.
2425

25-
This article covers the third scenario. For some legacy applications it might not be feasible to remove other identity providers or local credential authentication from the application, or enable support for provisioning protocols for those applications. For those applications, if you want to use Microsoft Entra ID to review who has access to that application, or remove someone's access from that application, you'll need to create assignments in Microsoft Entra ID that represent application users. This article covers that scenario of an application that does not use Microsoft Entra ID as its identity provider and does not support provisioning.
26+
This article covers the third scenario. For some legacy applications, it might not be feasible to remove other identity providers or local credential authentication from the application, or enable support for provisioning protocols for those applications. For those applications, if you want to use Microsoft Entra ID to review who has access to that application, or remove someone's access from that application, you'll need to create assignments in Microsoft Entra ID that represent application users. This article covers that scenario of an application that does not use Microsoft Entra ID as its identity provider and does not support provisioning.
27+
28+
For more information on the fourth scenario, see [include custom data provided resource in the catalog for catalog user Access Reviews (Preview)](custom-data-resource-access-reviews.md).
2629

2730
## License requirements
2831
[!INCLUDE [active-directory-entra-governance-license.md](~/includes/entra-entra-governance-license.md)]
@@ -59,7 +62,7 @@ In some environments, the application might be located on a network segment or s
5962

6063
If your application has an LDAP directory or SQL database, then see [Collect existing users from an application](identity-governance-applications-existing-users.md#collect-existing-users-from-an-application) for recommendations on how to extract the user collection.
6164

62-
Otherwise, if the application does not have a directory or database, you will need to contact the owner of the application and have them supply a list of users. This could be in a format such as a CSV file, with one line per user. Ensure that one field of each user in the file contains a unique identifier, such as an email address, that is also present on users in Microsoft Entra ID.
65+
Otherwise, if the application does not have a directory or database, you will need to contact the owner of the application and have them supply a list of users. This could be in a format such as a CSV file, with one line per user. Ensure that one field of each user in the file contains a unique identifier, such as an email address, that is also present on users in Microsoft Entra ID.
6366

6467
If this system doesn't have the Microsoft Graph PowerShell cmdlets installed or doesn't have connectivity to Microsoft Entra ID, transfer the CSV file that contains the list of users to a system that has the [Microsoft Graph PowerShell cmdlets](https://www.powershellgallery.com/packages/Microsoft.Graph) installed.
6568

@@ -239,7 +242,7 @@ Follow the instructions in the [guide for creating an access review of groups or
239242

240243
## Configure entitlement management integration with ServiceNow for ticketing (optional)
241244

242-
If you have ServiceNow then you can optionally configure automated ServiceNow ticket creation, using the [entitlement management integration](entitlement-management-ticketed-provisioning.md) via Logic Apps. In that scenario, entitlement management can automatically create ServiceNow tickets for manual provisioning of users who have received access package assignments.
245+
If you have ServiceNow, then you can optionally configure automated ServiceNow ticket creation, using the [entitlement management integration](entitlement-management-ticketed-provisioning.md) via Logic Apps. In that scenario, entitlement management can automatically create ServiceNow tickets for manual provisioning of users who have received access package assignments.
243246

244247
## Next steps
245248

docs/id-protection/concept-risky-user-report.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.reviewer: chuqiaoshi
1313

1414
Knowing which users are at risk and *why* they're at risk is a key responsibility of security and identity administrators. The Risky user report in Microsoft Entra ID Protection provides the full report, along with a risk data summary, and an activity timeline.
1515

16-
The Risky user report is also integrated with the Identity Risk Management Agent for enhanced agent suggestions and insights. If you have the Identity Risk Management Agent enabled, you can switch between the standard view and the agent view of the report.
16+
The Risky user report is also integrated with the Identity Risk Management Agent (Preview) for enhanced agent suggestions and insights. If you have the Identity Risk Management Agent enabled, you can switch between the standard view and the agent view of the report.
1717

1818
This article provides an overview of the information and actions available in the Risky user report.
1919

@@ -24,7 +24,7 @@ To access this report, you need:
2424
- Microsoft Entra ID Free, Microsoft Entra ID P1 for limited data on users.
2525
- Microsoft Entra ID P2 licenses for full access to the risky user data.
2626
- [Security Reader](../identity/role-based-access-control/permissions-reference.md#security-reader) and [Security Operator](../identity/role-based-access-control/permissions-reference.md#security-operator) are the least privileged roles required to use the *standard view* of the report.
27-
- [Security Administrator](../identity/role-based-access-control/permissions-reference.md#search-administrator) is required to use the *agent view* of the report and access the Risk Management Agent features.
27+
- [Security Administrator](../identity/role-based-access-control/permissions-reference.md#search-administrator) is required to use the *agent view* of the report and access the Identity Risk Management Agent features.
2828
- [User Administrator](../identity/role-based-access-control/permissions-reference.md#user-administrator) is required to reset passwords.
2929

3030
## Risky user report

0 commit comments

Comments
 (0)