Define organizational policies for governing access to applications in your environment
Once you've identified one or more applications that you want to use Azure AD to govern access, write down the organization's policies for determining which users should have access, and any other constraints that the system should provide.
Identifies applications and their roles in scope
Organizations with compliance requirements or risk management plans will have sensitive or business-critical applications. If this application is an existing application in your environment, you may already have documented the access policies for who 'should have access' to this application. If not, you may need to consult with various stakeholders, such as compliance and risk management teams, to ensure that the policies being used to automate access decisions are appropriate for your scenario.
Collect the roles and permissions that each application provides. Some applications may have only a single role, for example, an application that only has the role "User". More complex applications may surface multiple roles to be managed through Azure AD. These application roles typically make broad constraints on the access a user with that role would have within the app. For example, an application that has an administrator persona might have two roles, "User" and "Administrator". Other applications may also rely upon group memberships or claims for finer-grained role checks, which can be provided to the application from Azure AD in provisioning or claims issued using federation SSO protocols, or written to AD as a security group membership. Finally, there may be application-specific roles that don't surface in Azure AD - perhaps the application doesn't permit defining the administrators in Azure AD, instead relying upon its own authorization rules to identify administrators.
If you're using an application from the Azure AD application gallery that supports provisioning, then Azure AD may import defined roles in the application and automatically update the application manifest with the application's roles automatically, once provisioning is configured.
Select which roles and groups have membership that are to be governed in Azure AD. Based on compliance and risk management requirements, organizations often prioritize those application roles or groups that give privileged access or access to sensitive information.
Define the organization's policy with prerequisites and other constraints for access to the application
In this section, you'll write down the organizational policies you plan to use to determine access to the application. You can record this as a table in a spreadsheet, for example
|App Role||Prerequisite for access||Approvers||Default duration of access||Separation of duties constraints||Conditional access policies|
|Western Sales||Member of sales team||user's manager||Yearly review||Cannot have Eastern Sales access||Multifactor authentication (MFA) and registered device required for access|
|Western Sales||Any employee outside of sales||head of Sales department||90 days||N/A||MFA and registered device required for access|
|Western Sales||Non-employee sales rep||head of Sales department||30 days||N/A||MFA required for access|
|Eastern Sales||Member of sales team||user's manager||Yearly review||Cannot have Western Sales access||MFA and registered device required for access|
|Eastern Sales||Any employee outside of sales||head of Sales department||90 days||N/A||MFA and registered device required for access|
|Eastern Sales||Non-employee sales rep||head of Sales department||30 days||N/A||MFA required for access|
If you already have an organization role definition, then see how to migrate an organizational role for more information.
Identify if there are prerequisite requirements, standards that a user must meet before to they're given access to an application. For example, under normal circumstances, only full time employees, or those in a particular department or cost center, should be allowed to have access to a particular department's application. Also, you may require the entitlement management policy for a user from some other department requesting access to have one or more additional approvers. While having multiple stages of approval may slow the overall process of a user gaining access, these extra stages ensure access requests are appropriate and decisions are accountable. For example, requests for access by an employee could have two stages of approval, first by the requesting user's manager, and second by one of the resource owners responsible for data held in the application.
Determine how long a user who has been approved for access, should have access, and when that access should go away. For many applications, a user might retain access indefinitely, until they're no longer affiliated with the organization. In some situations, access may be tied to particular projects or milestones, so that when the project ends, access is removed automatically. Or, if only a few users are using an application through a policy, you may configure quarterly or yearly reviews of everyone's access through that policy, so that there's regular oversight.
If your organization is governing access already with an organizational role model, plan to bring that organizational role model into Azure AD. You may have an organizational role defined which assigns access based on a user's property, such as their position or department. These processes can ensure users lose access eventually when access is no longer needed, even if there isn't a pre-determined project end date.
Inquire if there are separation of duties constraints. For example, you may have an application with two app roles, Western Sales and Eastern Sales, and you want to ensure that a user can only have one sales territory at a time. Include a list of any pairs of app roles that are incompatible for your application, so that if a user has one role, they aren't allowed to request the second role.
Determine how exceptions to your criteria should be handled. For example, an application may typically only be available for designated employees, but an auditor or vendor may need temporary access for a specific project. Or, an employee who is traveling may require access from a location that is normally blocked as your organization has no presence in that location. In these situations, you may choose to also have an entitlement management policy for approval that may have different stages, or a different time limit, or a different approver. A vendor who is signed in as a guest user in your Azure AD tenant may not have a manager, so instead their access requests could be approved by a sponsor for their organization, or by a resource owner, or a security officer.
As the organizational policy for who should have access is being reviewed by the stakeholders, then you can begin integrating the application with Azure AD. That way at a later step you'll be ready to deploy the organization-approved policies for access in Azure AD identity governance.