What is Azure AD Identity Governance?
Azure Active Directory (Azure AD) Identity Governance allows you to balance your organization's need for security and employee productivity with the right processes and visibility. It provides you with capabilities to ensure that the right people have the right access to the right resources. These and related Azure AD and Enterprise Mobility + Security features allows you to mitigate access risk by protecting, monitoring, and auditing access to critical assets -- while ensuring employee and business partner productivity.
Identity Governance gives organizations the ability to do the following tasks across employees, business partners and vendors, and across services and applications both on-premises and in clouds:
- Govern the identity lifecycle
- Govern access lifecycle
- Secure privileged access for administration
Specifically, it is intended to help organizations address these four key questions:
- Which users should have access to which resources?
- What are those users doing with that access?
- Are there effective organizational controls for managing access?
- Can auditors verify that the controls are working?
Identity Governance helps organizations achieve a balance between productivity - How quickly can a person have access to the resources they need, such as when they join my organization? And security - How should their access change over time, such as due to changes to that person's employment status? Identity lifecycle management is the foundation for Identity Governance, and effective governance at scale requires modernizing the identity lifecycle management infrastructure for applications.
For many organizations, identity lifecycle for employees is tied to the representation of that user in an HCM (human capital management) system. Azure AD Premium automatically maintains user identities for people represented in Workday and SuccessFactors in both Active Directory and Azure Active Directory, as described in the cloud HR application to Azure Active Directory user provisioning planning guide. Azure AD Premium also includes Microsoft Identity Manager, which can import records from on-premises HCM systems such as SAP HCM, Oracle eBusiness, and Oracle PeopleSoft.
Increasingly, scenarios require collaboration with people outside your organization. Azure AD B2B collaboration enables you to securely share your organization's applications and services with guest users and external partners from any organization, while maintaining control over your own corporate data. Azure AD entitlement management enables you to select which organization's users are allowed to request access and be added as B2B guests to your organization's directory, and ensures that these guests are removed when they no longer need access.
Organizations need a process to manage access beyond what was initially provisioned for a user when that user's identity was created. Furthermore, enterprise organizations need to be able to scale efficiently to be able to develop and enforce access policy and controls on an ongoing basis.
Typically, IT delegates access approval decisions to business decision makers. Furthermore, IT can involve the users themselves. For example, users that access confidential customer data in a company's marketing application in Europe need to know the company's policies. Guest users may be unaware of the handling requirements for data in an organization to which they have been invited.
Organizations can automate the access lifecycle process through technologies such as dynamic groups, coupled with user provisioning to SaaS apps or apps integrated with SCIM. Organizations can also control which guest users have access to on-premises applications. These access rights can then be regularly reviewed using recurring Azure AD access reviews. Azure AD entitlement management also enables you to define how users request access across packages of group and team memberships, application roles, and SharePoint Online roles.
Privileged access lifecycle
Historically, privileged access has been described by other vendors as a separate capability from Identity Governance. However, at Microsoft, we think governing privileged access is a key part of Identity Governance -- especially given the potential for misuse associated with those administrator rights can cause to an organization. The employees, vendors, and contractors that take on administrative rights need to be governed.
Azure AD Privileged Identity Management (PIM) provides additional controls tailored to securing access rights for resources, across Azure AD, Azure, and other Microsoft Online Services. The just-in-time access, and role change alerting capabilities provided by Azure AD PIM, in addition to multi-factor authentication and Conditional Access, provide a comprehensive set of governance controls to help secure your company's resources (directory, Microsoft 365, and Azure resource roles). As with other forms of access, organizations can use access reviews to configure recurring access recertification for all users in administrator roles.
Governance capabilities in other Azure AD features
In addition to the features listed above, additional Azure AD features frequently used to provide identity governance scenarios include:
|Identity lifecycle (employees)||Admins can enable user account provisioning from Workday or SuccessFactors cloud HR, or on-premises HR.||cloud HR to Azure AD user provisioning|
|Identity lifecycle (guests)||Admins can enable self-service guest user onboarding from another Azure AD tenant, direct federation, One Time Passcode (OTP) or Google accounts. Guest users are automatically provisioned and deprovisioned subject to lifecycle policies.||Entitlement management using B2B|
|Entitlement management||Resource owners can create access packages containing apps, Teams, Azure AD and Microsoft 365 groups, and SharePoint Online sites.||Entitlement management|
|Access requests||End users can request group membership or application access. End users, including guests from other organizations, can request access to access packages.||Entitlement management|
|Workflow||Resource owners can define the approvers and escalation approvers for access requests and approvers for role activation requests.||Entitlement management and PIM|
|Policy and role management||Admin can define conditional access policies for run-time access to applications. Resource owners can define policies for user's access via access packages.||Conditional access and Entitlement management policies|
|Access certification||Admins can enable recurring access recertification for: SaaS apps, on-premises apps, cloud group memberships, Azure AD or Azure Resource role assignments. Automatically remove resource access, block guest access and delete guest accounts.||Access reviews, also surfaced in PIM|
|Fulfillment and provisioning||Automatic provisioning and deprovisioning into Azure AD connected apps, including via SCIM, LDAP, SQL and into SharePoint Online sites.||user provisioning|
|Reporting and analytics||Admins can retrieve audit logs of recent user provisioning and sign on activity. Integration with Azure Monitor and 'who has access' via access packages.||Azure AD reports and monitoring|
|Privileged access||Just-in-time and scheduled access, alerting, approval workflows for Azure AD roles (including custom roles) and Azure Resource roles.||Azure AD PIM|
|Auditing||Admins can be alerted of creation of admin accounts.||Azure AD PIM alerts|
There are also tutorials for managing access to resources in entitlement management, onboarding external users to Azure AD through an approval process, governing access to existing applications. You can also automate identity governance tasks through Microsoft Graph and PowerShell.
If you have any feedback about Identity Governance features, click Got feedback? in the Azure portal to submit your feedback. The team regularly reviews your feedback.
While there is no perfect solution or recommendation for every customer, the following configuration guides also provide the baseline policies Microsoft recommends you follow to ensure a more secure and productive workforce.
- Plan an access reviews deployment to manage resource access lifecycle
- Identity and device access configurations
- Securing privileged access
Appendix - least privileged roles for managing in Identity Governance features
It's a best practice to use the least privileged role to perform administrative tasks in Identity Governance. We recommend that you use Azure AD PIM to activate a role as needed to perform these tasks. The following are the least privileged directory roles to configure Identity Governance features:
|Feature||Least privileged role|
|Entitlement management||Identity Governance Administrator|
|Access reviews||User administrator (with the exception of access reviews of Azure or Azure AD roles, which requires Privileged role administrator)|
|Privileged Identity Management||Privileged role administrator|
The least privileged role for Entitlement management has changed from the User Administrator role to the Identity Governance Administrator role.
Submit and view feedback for