CHAPTER 6
In the previous chapter, we covered how you can use Azure Functions to create guest users in Azure AD. In this chapter, we are going to cover entitlement management, which is part of Azure AD Identity Governance. With entitlement management, organizations can manage identity and access lifecycle at scale.
Before we dive into entitlement management and creating access packages for your guest users, we will first look into Identity Governance in more detail.
Identity Governance is one of the newest features in Azure AD. It offers tools and support for balancing organizational needs for security and productivity with the right processes and visibility. It provides the ability govern the complete identity and access lifecycle across employees, business partners, vendors, applications, and services, both in the cloud and on-premises. On top of that, it offers secured privileged access for administration.
Identity Governance is mainly intended to help organizations address the following key questions:
One of the key challenges of organizations is to maintain balance between productivity and security. You want your services and applications to be accessed quickly and easily when needed, but there is also a need for keeping all those assets secure.
The foundation of Identity Governance is identity lifecycle management. Azure AD Premium has comprehensive integration with the Workday HR system. It also includes Microsoft Identity Manager, which can import records from human capital management (HCM) systems such as Oracle E-Business, Oracle PeopleSoft, and SAP.
Note: For more information about Microsoft Identity Manager, you can refer to this website.
For scenarios that require collaboration with people outside the organization, Azure AD B2B entitlement management offers the tools to manage the complete lifecycle of guest users.
In the next section, we are going to cover entitlement management in more detail.
Azure Active Directory entitlement management is an identity governance feature that helps organizations manage identity and access lifecycle at scale. Therefore, it offers features for automating access assignments, request workflows, reviews, and access expirations.
Entitlement management can be used for internal and guest users. This can be a cumbersome process because requirements change over time. This is already a difficult process for internal users, but it becomes even more complicated when you are planning to collaborate with external users as well.
Most enterprises face challenges when managing internal access to resources, such as:
In scenarios where collaboration with guest users is required, access becomes even more difficult to manage. Additional challenges arise:
Azure AD entitlement management helps address these challenges. It offers the following capabilities:
Access packages are not suited for all scenarios. They also don’t replace the other mechanisms for access assignment. Access packages are most suited in cases when employees and guest users need limited-time access to a particular task, application, or other resource in Azure or SharePoint Online. They are also suitable when access to certain resources needs to be approved by a manager, for instance. In cases where certain departments or connected organizations are responsible for managing access, access packages are also the best solution.
In the next section, we are going to create an access package in Azure AD entitlement management.
In this demonstration, we are going to create an access package for guest users. We are going to add the required permissions to this package, add a security group to it (one where the guest user is automatically added), and add permissions to an application.
Therefore, we are going to take the following steps:

Figure 59: Identity Governance in the Azure portal

Figure 60: Identity Governance overview blade

Figure 61: Basic access package settings

Figure 62: Add a security group

Figure 63: Add applications

Figure 64: Set resource roles

Figure 65: Create access policy

Figure 66: Set expiration

Figure 67: Review all the settings
The package is now created. In the next section, we are going to cover how this access package can be redeemed by the guest user.
To get an overview of the access packages that the guest user has access to, the user can log in to the Access overview page. It is also where the user can request access to other resources, renew access to resources, and so on.
In the next section, we are going to obtain the MyAccess link from the Azure portal. However, there are other ways to get access to this package. Users that already have access to other packages will be familiar with the https://myaccess.microsoft.com/ website. Since this package is scoped to all guest users, they can request access from there as well. In the next demo, we are going to obtain the direct link and use that link to access the package.

Figure 68: Retrieve package link
The direct link will be displayed:

Figure 69: Copy package link
In this demo, we have retrieved the access package. This added the guest user to the required security group and gave the user access to an application. In the next section, we are going to cover how you can add connected organizations.
If you frequently collaborate with guest users from an organization who also have an Azure AD directory or domain, you can add it as a connected organization. The users from that domain or directory can then ask for access to your organization’s resources and applications. By connecting an organization, you are establishing a relationship between these directories in Azure.
For example, let’s say that our organization is collaborating with an organization where users have a user principal name that ends with sjoukjezaal.com. In this case, we can create a connected organization for this collaboration. If we then add this connected organization to an access package, all users with a principal name that matches the policy can request access.
To add a connected organization, we have to take the following steps:

Figure 70: Add new connected organization

Figure 71: Specify organization name and description
Figure 72: Add the domain name
Note: All users from the Azure AD directory or domain will be able to request this access package. This includes users in Azure AD from all subdomains associated with the directory, unless those domains are blocked by the Azure AD business-to-business (B2B) allow or deny list.

Figure 73: Adding sponsors

Figure 74: Connected organization summary
Now that we added this domain as a connected organization, it can easily be added to all the access packages that are created.
Thus concludes this chapter. We have covered Identity Governance and entitlement management in Azure AD and Azure AD B2B. We created an access package and shared it with a guest user. In the next chapter, we are going to cover how Azure AD is integrated in Office 365.