You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/id-governance/entitlement-management-access-package-create-app.md
+39-6Lines changed: 39 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: You can use Microsoft Entra entitlement management to enforce the p
4
4
author: markwahl-msft
5
5
editor: markwahl-msft
6
6
ms.topic: how-to
7
-
ms.date: 08/25/2024
7
+
ms.date: 04/22/2026
8
8
ms.author: mwahl
9
9
ms.reviewer: mwahl
10
10
ms.custom: sfi-ga-nochange
@@ -48,9 +48,7 @@ To create the access package and its associated policies and assignments, you'll
48
48
49
49
This section shows how to interact with Microsoft Entra ID Governance by using [Microsoft Graph PowerShell](https://www.powershellgallery.com/packages/Microsoft.Graph) cmdlets.
50
50
51
-
The first time your organization uses these cmdlets for this scenario, you need to be in a Global Administrator role to allow Microsoft Graph PowerShell to be used in your tenant. Subsequent interactions can use a lower-privileged role, such as:
The first time your organization uses these cmdlets for this scenario, you need to be in a Global Administrator role to allow Microsoft Graph PowerShell to be used in your tenant. Subsequent interactions can use a lower-privileged role, such as [Identity Governance Administrator](~/identity/role-based-access-control/permissions-reference.md#identity-governance-administrator).
54
52
55
53
1. Open PowerShell.
56
54
1. If you don't have the [Microsoft Graph PowerShell modules](https://www.powershellgallery.com/packages/Microsoft.Graph) already installed, install the `Microsoft.Graph.Identity.Governance` module and others by using this command:
@@ -320,7 +318,7 @@ If the application relies upon a group, then you link the group membership of th
320
318
321
319
In this section you'll create the first access package assignment policy in the access package, an [access package assignment policy for direct assignment](entitlement-management-access-package-request-policy.md#none-administrator-direct-assignments-only), that can be used to track the users who already have access to the application. In the example policy created in this section, only the administrators or access package assignment managers can assign access, users retain access indefinitely, and there are no approvals or access reviews.
322
320
323
-
1. Create a policy.
321
+
- Create a policy.
324
322
325
323
```powershell
326
324
$policy1Name = "Direct assignment policy"
@@ -403,8 +401,43 @@ For each access package that is to be marked as incompatible with another, you c
403
401
1. If your scenario requires the ability to override a separation of duties check, then you can also [set up additional access packages for those override scenarios](entitlement-management-access-package-incompatible.md#configuring-multiple-access-packages-for-override-scenarios).
404
402
405
403
## Add assignments of existing users who already have access to the application
404
+
**Option 1**
405
+
406
+
When you use the Microsoft Entra provisioning service to [discover](~/identity/app-provisioning/how-to-account-discovery.md) users in your application, you can easily assign those users to an access package. [Download](https://aka.ms/AssignCorrelatedUsersPowerShell) the Assign-CorrelatedUsersWithRules.ps1 file. See the example approaches for adding assignments.
407
+
408
+
1. Assign all discovered users to a specific access package (dry run):
Add assignments of existing users, who already have access to the application, to the access package and its direct assignment policy. You can [directly assign each user](entitlement-management-access-package-assignments.md#assign-a-user-to-an-access-package-with-powershell) to an access package.
440
+
Add assignments of existing users, who are already assigned to the Entra Enterprise application, to the access package and its direct assignment policy. You can [directly assign each user](entitlement-management-access-package-assignments.md#assign-a-user-to-an-access-package-with-powershell) to an access package.
408
441
409
442
1. Retrieve the existing application role assignments.
0 commit comments