Access
Access
Access
Access
Table of Content
https://ericsson.sharepoint.com/sites/PublicCloudDevHandbook/sitepages/azure/access.aspx 1/20
16/08/2023, 07:03 Access
Introduction
Summary
How does Functional ID works for access to an subscription.
What is an Managed identity
How do i order an Service principal
How does Fine grain access work
As part of the onboarding process for your application an Azure Subscription has
been created to contain the application services, servers, and other objects. Also,
there are one or more roles create in the Ericsson Identity Manager (IDM) that
give access to this Azure Subscription. To get access to your application
environment, you'll have to order the role that corresponds to that environment.
(IdM application has url https://idm.internal.ericsson.com). The IDM role name
itself will contain the application name, application environment, and the
corresponding Azure role that determines what level of access the user will get to
the resource group.
https://ericsson.sharepoint.com/sites/PublicCloudDevHandbook/sitepages/azure/access.aspx 2/20
16/08/2023, 07:03 Access
There is a special folder for Azure roles in the IdM folder structure. Each new
application will have its own folder containing all defined roles for that
application. Anyone with an valid Signum and EGAD account can request an
access role to an Enterprise IT application resource group. It is up to the
application owner or service manager to approve access. Note that some
accesses to production environment require specific typ of identities (e.g.
Functional IDs).
Our roles are mostly based on built-in Azure roles. See Microsoft documentation
for information.
Note! CBM does only set up Approvers in IdM. Approvers does not gain access to
a Subscription. In order to gain access you must apply for the actual role, e.g
contributor.
Back
Note! Even if you are the approver of this role you still have to request access to
it before you can access the Subscription.
https://ericsson.sharepoint.com/sites/PublicCloudDevHandbook/sitepages/azure/access.aspx 3/20
16/08/2023, 07:03 Access
4. .When the list of content have loaded, select the Search for IT
Accesses Search box and enter
then name of your assigned IdM role.
5. Then klick on the role you want access to and klick on the blue icon
"Request access.
https://ericsson.sharepoint.com/sites/PublicCloudDevHandbook/sitepages/azure/access.aspx 4/20
16/08/2023, 07:03 Access
6. You will get a notification in your browser window that the request has
been sent. If you are the approver, the role will be automatically granted to
you. Please allow 4 hours for synchronization until your Azure Subscription
is visible. Now you should have access to your Subscription.
7. If you want to request for someone else or you want to request for an
Functional ID first choose the "Order for" in the left pane.
8. type in signum for person you want to order for, then follow the flow
outlined above.
Back
In Azure you always get Contributor and Reader role as default. Depending if you
have requested an ECN Subscription you will get the VM-admin role as well.
Starting from 30/8 2021 access roles are classified as Privileged and non-
privileged. Privileged groups. This will affect recertification of IdM groups and the
orderability in different ways.
Recertification - Every 90 day all group members and the information approver(s)
will receive an e-mail when the membership is about to expire. The information
https://ericsson.sharepoint.com/sites/PublicCloudDevHandbook/sitepages/azure/access.aspx 6/20
16/08/2023, 07:03 Access
approver has 10 days to recertify the user access or the membership will be
removed.
Recertification - Every 365 day all group members and the information
approver(s) will receive an e-mail when the membership is about to expire. The
information approver have 10 days to recertify the user access or the
membership will be removed.
Please note that CBM support cannot help with recertification. If you have any
questions, please raise an IT Support request with the IdM team.
(Select SAP IdM as Affected service)
Back
https://ericsson.sharepoint.com/sites/PublicCloudDevHandbook/sitepages/azure/access.aspx 7/20
16/08/2023, 07:03 Access
Each person that needs access using Functional Admin accounts needs to request
Admin account:
Go to https://isignum.internal.ericsson.com/
Click “Functional Identity Management”
Click Create:
https://ericsson.sharepoint.com/sites/PublicCloudDevHandbook/sitepages/azure/access.aspx 8/20
16/08/2023, 07:03 Access
Submit request
How to change the temporary password there are multiple ways. Below we
describe two ways. Do either 1 or 2. Not both.
Option 1:
Go
to https://partner.se.ericsson.net/ or https://svcpwdreset.internal.erics
son.com/SvcPwdReset/ <- (login with your own SIGNUM)
In Pre-Sign-In Notification click Proceed.
In primary authentication enter user ID and the initial password
When the web asks for old password and new password. The old password
is the initial password
Click accept/next. Once the pop up appears say password successfully
changed you are done with this step.
Option 2:
(Requires MWP/VICS): Log into functional ID on MWP or VICS (will be
forced to change initial password, that is the point). Once password is
changed you can log out. You can even use a colleagues computer.
https://ericsson.sharepoint.com/sites/PublicCloudDevHandbook/sitepages/azure/access.aspx 9/20
16/08/2023, 07:03 Access
Depending on your device you might be blocked to log in, but since the
point is to reset the initial password, this doesn't matter.
Log into sa.ericsson.net with Functional ID (M) (username = functional ID) and
setup Symantec VIP second factor o(mobile app). You can use the same app you
already have for your normal Signum account.
Instructions
here: https://myaccount.ericsson.net/sa/Strong_Authentication_User_Guide.pdf
Back
https://ericsson.sharepoint.com/sites/PublicCloudDevHandbook/sitepages/azure/access.aspx 10/20
16/08/2023, 07:03 Access
here: https://ericsson-
dwp.onbmc.com/dwp/app/#/itemprofile/27901
Managed identities.
Note! Microsoft suggests using Managed Identities over Service principal.
Managed Identities are in essence 100% identical in functionality and use case
than Service Principals. In fact, they are actually Service Principals.
– They are always linked to an Azure Resource, not to an application or 3rd party
connector
– They are automatically created for you, including the credentials; big benefit
here is that no one knows the credentials
System assigned; in this scenario, the identity is linked to a single Azure Resource,
e.g. a Virtual Machine, a Logic App, a Storage Account, Web App, Function App,…
so almost anything. Next, they also “live” with the Azure Resource, which means
they get deleted when the Azure Resource gets deleted.
User Assigned Managed Identity, which means that you first have to create it as a
stand-alone Azure resource by itself, after which it can be linked to multiple Azure
Resources. An example here could be out of an integration with Key Vault, where
different Workload services belonging to the same application stack, need to read
out information from Key Vault. In this case, one could create a “read KV”
https://ericsson.sharepoint.com/sites/PublicCloudDevHandbook/sitepages/azure/access.aspx 11/20
16/08/2023, 07:03 Access
Managed Identity, and link it to the web app, storage account, function, logic
app,… all belonging to the same application architecture.
Let’s walk through a quick demo scenario for both, using a Virtual Machine as
Azure Resource:
· From the Azure Portal, select the Virtual Machine; under settings, find Identity
Switching to Azure Key Vault / Access Policies, we can now define this System
Assigned Managed Identity having get and list permissions (or any other) for
keys, secrets or certificates. For example reading out an Azure Storage Account
Access key or similar.
Notice how Azure Key Vault is expecting a Service Principal object here (where in
reality we are using a Managed Identity).
https://ericsson.sharepoint.com/sites/PublicCloudDevHandbook/sitepages/azure/access.aspx 12/20
16/08/2023, 07:03 Access
Similarly, let’s remove the System Assigned MI of the VM and use a User
Assigned one in the next example (an Azure Resource can only be linked to one
or the other, not both…):
From the Azure Virtual Machine blade, navigate to Identity and switch the
“Status” toggle button to Off. This will prompt for your confirmation when
saving the settings
This will prompt for your confirmation when saving the settings
As you notice, the Managed Identity object gets immediately removed from
Azure AD. Yes, security is key here…
https://ericsson.sharepoint.com/sites/PublicCloudDevHandbook/sitepages/azure/access.aspx 13/20
16/08/2023, 07:03 Access
From the Azure Portal, create new Resource, and search for “User Assigned
Managed Identity”
click Create.
Specify the Resource Group, Azure Region and Name for this resource.
https://ericsson.sharepoint.com/sites/PublicCloudDevHandbook/sitepages/azure/access.aspx 14/20
16/08/2023, 07:03 Access
Confirm by clicking create and Wait for the resource creation to complete
successfully.
Once created, switch back to the Azure Virtual Machine, select Identity and
select User Assigned
Notice the Managed Identity you just created.
Select another Azure Resource in your subscription, for example an Azure Web
App or Logic App and once more select Identity from the settings. Below
screenshot shows what it looks like for an Azure Web App Resource:
To complete the sample scenario, let’s go back to Azure Key Vault, and specify
another Access Policy for this User Assigned Managed Identity:
https://ericsson.sharepoint.com/sites/PublicCloudDevHandbook/sitepages/azure/access.aspx 15/20
16/08/2023, 07:03 Access
Select your Azure Key Vault resource, followed by selecting Access Policy
from the settings.
Specify the Key and/or Secret Permissions (for example get, list)
Click “Select Principal” and search for the User Assigned Managed Identity
you created earlier
After saving the changes, the result is that now both the Azure Virtual Machine as
well as the Web App – having the User Assigned Managed Identity assigned to
them – can read our keys and secrets from Azure Key Vault
https://ericsson.sharepoint.com/sites/PublicCloudDevHandbook/sitepages/azure/access.aspx 16/20
16/08/2023, 07:03 Access
However, if you have a traditional setup which has been using Service principal,
you can still request it.
https://ericsson.sharepoint.com/sites/PublicCloudDevHandbook/sitepages/azure/access.aspx 17/20
16/08/2023, 07:03 Access
Rules
https://ericsson.sharepoint.com/sites/PublicCloudDevHandbook/sitepages/azure/access.aspx 18/20
16/08/2023, 07:03 Access
Diagram
Following diagram depicts validation flow for RBAC assignments:
https://ericsson.sharepoint.com/sites/PublicCloudDevHandbook/sitepages/azure/access.aspx 19/20
16/08/2023, 07:03 Access
https://ericsson.sharepoint.com/sites/PublicCloudDevHandbook/sitepages/azure/access.aspx 20/20