User’s Experience in Microsoft Power Apps an interview with Ilya Fainberg, Microsoft

This article is contributed. See the original author and article here.

When building an application, one of the things we have to work alongside with is business requirements but we mostly forget about the users, “Is this application accessible to the users?” 


User’s Interaction and accessibility are many of the factors that needs to be discussed when building an application. It’s important to consider how efficient your application is to your users. 



Check out this Podcast Episode on A Girl in Love with Tech Podcast where I and Microsoft Snr Program Manager Ilya Fainberg who role is researching market trends and understanding customer needs to formulate product strategy. Helping customers succeed in their journey to the Microsoft Cloud by advising on best practices and product discussed about the importance of User’s Experience in Microsoft Power Platform 


 


 


In this article, we would learn about simple user’s needs we can easily work on when building a Power apps application but first, let us understand what Power Apps is


 


What is Microsoft Power Apps? 


Microsoft Power Apps is a low-code or no- code tool in the Microsoft Power Platform ecosystem that is used in building business applications with or without the use of programming languages. Microsoft has been able to bridge that gap, where both developers and non-developers have free rays in building solutions. What this means is that, the platform can be extended by code making it a pro code platform for professional developers. 


 


What to look at for 


1. Simple icons: it is advisable to use icons in place to help increase space and avoid distractions. Make use of icons that are understandable on what it does. 


 


2. Consistency: When building an application, especially when you have many screens in the application. It’s important to consider the consistency of the controls in your screen especially the width and height.


 


3. Colours: How well you use your colours is very important, especially to the users, it has to be accessible, not contrasting the other, the colour should not be too dull. 
These are the few examples to consider when working with colours


 



  • The font colour and background colour of your screen should be accessible. Check the Colour contrast checker to see which colour works best. 


 



  • When using an image in the screen the colour in the background of the image should not contradict the background colour of your screen. 


 



  • Use primary colours to point out the main objective. A good example of not working well with colors is using a green colour for the delete icon.


 


4. Avoiding distractions: Application should always be easy to use. A user should not need a manual to use your application. 


 


5. Performance: Improving how users interact with your applications should be met. A few examples to consider when working in an application: 



  • Application should not take too long to load or respond to an action. 

  • When a user clicks on a button they expect that something will happen. Button controls should not be used as a text control.


Check this out to learn more about ways you can improve Performance in your application 


 


6. Size: The font type and size should be readable and accessible. Check here and learn more about accessible fonts. 


 


7.ResponsiveBuilding an application, always think about the use of your application on different devices. When building an application one of the mistakes we make is not having an idea or design of how the application layout will look like on different types of screens. 


 


Check out the learning resources


PowerApps Canvas App Accessibility Guidelines | Microsoft Power Apps


Understand the Power Apps Studio 


How to build the UI in a canvas app in Power Apps 


How to build a color-contrast-ratio checker for improved accessibility in Power Apps


How to use custom fonts in Power Apps


Power Apps performance optimization guidelines 


 


 


 


 


 


 


 


 


 


 


 


 


 

How is IIT Madras connecting Mentors & Students using Communities in Teams?

How is IIT Madras connecting Mentors & Students using Communities in Teams?

This article is contributed. See the original author and article here.

With ongoing advancements in technology, there has been a continuous shift in how we learn, network, and interact with each other. Communities in Teams experience enables students and mentors to connect and bring out a true sense of connection among them.


 


IIT Madras, one of the leading engineering institutions in India, has been using Teams to enable mentorship-led communities along with their Microsoft Learn for Educators (MSLE) effort in their data science program. Mentors connect with the students to help them with course curriculum and technical questions related to various Microsoft certification courses that they are encouraging their students to take up, both asynchronously and with live online office hours, in one place.


 


In this article, we will explore how IIT Madras created communities for mentorship cohorts and engaged their students to help them easily connect with one another and have a go-to space for upskilling and networking.


 


Why create mentorship communities on Teams? 


 


Building a strong connection between the mentors and mentees is critical for folks to achieve goals and learn from each other. This is especially true if the students are from diverse geographical locations, ages, roles, and backgrounds. The BS Degree in Data Science and Application Program offered by IIT Madras is born out of the philosophy of democratizing education and has seen wide acceptance both inside and outside the country.


 


With data science being a buzzword in the industry for quite some time, the BS program aims to provide without compromising the strong academic foundations needed in this arena. Knowledge of cloud computing and use of cloud resources is a significant extracurricular component where IIT Madras is working with Microsoft (through a faculty development program – Microsoft Learn for Educator program) to enable Microsoft Cloud-related certifications, both in Data Science and Application Development, for its students. Communities in Teams provides a single platform for students to connect, engage, and build relationships with their fellow students and mentors before and after their sessions.


 


This community is the centralized space for students to find information related to their out-of-class mentoring sessions scheduled in the program and address all questions and concerns. Students can



  • Find the program schedule 

  • Engage with the coordinating team

  • Track important dates

  • Help, interact, and collaborate with peers

  • Resolve queries in real time

  • One-stop access to all your reading materials

  • Connect with your trainers/mentors

  • Follow upcoming events


Additionally, since students could potentially use Teams in their colleges, it serves as an excellent opportunity for them to navigate on a single platform.


 


How is IIT Madras creating and managing mentorship cohorts in Communities in Teams?


 


IIT Madras has been using Communities in Teams as a platform for all its students and mentors to build relationships, expand their network, and motivate students in finishing their Microsoft certification programs.


 


For every mentorship session, they share the QR code/ invite link of the community to all its registered participants. Students join the community before/during the course delivery session to connect asynchronously with their peers and discuss key elements discussed during the session.


 


The mentors/coordinating team shares all the required details of the cloud certification including meeting details, and prerequisites, and supports students by providing them a platform to ask questions, seek guidance, and share their certificates.


 


These communities also act as a knowledge resource for all the students aiming to get themselves certified with other certifications as IIT Madras leverages the existing community network they have built to cross-promote the upcoming mentorship sessions and certifications.


 


How IIT M is using Communities in Teams 3 .png


 


Here is what IIT Madras has to say about Teams 



In the unique context of IIT Madras BS Degree in Data Science and Programming, the mentorship communities through MS Teams help emulate the informal learning environment that is available in the regular on-campus programs for extra-curricular activities. This is a very significant activity as students aiming to get Cloud Certifications not only get guidance from their peers/seniors who have already completed their journey but also promote a strong sense of belonging. We are really happy to be part of this journey with Microsoft Teams and are looking forward to having a strong community built within this space. 



Overall, these communities have been helping the students to engage proactively, find easy resolution of queries, and stay motivated to complete their programs and certifications. 


 


Best practices to keep in mind while creating student-mentor communities on Teams


 



  • Set Community Description, Avatar, and Guidelines: Once the community is created, ensure the community description encourages participation and delivers the goal of the community. Additionally, fill out any specific community guidelines you want to communicate to members of the community. Having a community avatar makes the community more real. Learn more about updating the community details. 



  • Restrict Community Join Link Sharing: To ensure the community remains secure and limited to authorized members, disable the option to share the community join link and enable requests for members to join. This step prevents the link from being shared outside the intended audience, maintaining the privacy and exclusivity of the community. Learn more about how to disable the option to share a community link 



  • Create an engagement plan: Plan your engagement for 2 weeks beforehand as starters to kick-start conversations in the community. You can have multiple types of posts planned with details on who will post and when. 


Content Calendar.png



  • Change your profile name so members can uniquely identify you as the mentor. You can use titles such as Your Name – Mentor

  • Diversify Communities: Consider creating separate communities for every certification/program type. This segmentation allows for more targeted discussions and networking opportunities within specific cohorts. 

  • Empower the community to lead: A community becomes strong and sustainable only when leaders are nurtured within the community and empowered. As part of this, there is a cognitive apprenticeship within the community through which students can move up to become Mentors and Community managers.    


By following these steps, you can harness the power of Communities in Teams to create vibrant communities that foster connections, facilitate networking, and enhance the overall mentorship experience.  


 


How to send feedback and suggestions?


 


We are always happy to receive feedback and suggestions to make our product even better. To participate in our feedback program and help us in our endeavor, please follow the steps below: 



You can also sign up for a user panel, to get opportunities to connect directly with the product team and help make Teams (free) better. Learn more. 


 

Configure Just-in-Time Access to M365 Defender

Configure Just-in-Time Access to M365 Defender

This article is contributed. See the original author and article here.

PIM for Groups


 


Entra ID (formerly Azure AD) offers the Privileged Identity Management (PIM) for Groups feature, enabling users to attain just-in-time membership and ownership of groups, thus governing access to a range of services. This feature allows the implementation of policies similar to those in PIM for Entra ID Roles and PIM for Azure Resources, allowing the configuration of actions like approval enforcement, multi-factor authentication (MFA), justification requirements, and activation time limits. Each PIM for Groups configured group features two distinct policies, catering to membership and ownership activation. This means that if an account is both an eligible owner and an eligible member of a group, each of them have their own activation.


For more information you can read the official documentation here.


 


Microsoft 365 Defender RBAC


 


Microsoft 365 Defender RBAC offers centralized permissions management for the following services:



  • Defender for Endpoint

  • Defender for Identity

  • Defender for Cloud Apps

  • Defender for Office 365

  • Microsoft Defender Vulnerability Management

  • Secure score


When a role is created, the services which the role covers can be selected. The advantage of using the new M365 Defender RBAC as opposed to the legacy RBAC for each individual service is that it is possible to grant permissions to multiple services from just a single role assignment. If you have been using legacy RBAC assignments it’s very simple to import those roles into the new M365 Defender unified RBAC. The steps for importing the roles can be found here.


 


M365 Defender unified RBAC workloads need to be activated before they are applied. Until the workloads are activated Defender will apply the legacy RBAC model for each individual service.


 


When creating an M365 Defender role you will need to create an assignment for it. Assignments will have a scope (which Defender data sources the assignment will apply to) and Entra ID users or groups (which users or groups the assignment will be applied to).


For more information you can read the official documentation here.


 


Putting the two together


 


As group membership can define getting M365 Defender roles, and group membership can be given in a just-in-time manner, it means that indirectly M365 Defender roles can be given in a just-in-time manner.


The steps to set this up would be the following.


 


Create the Entra ID group and add members


 


In the Azure portal go to Azure Active Directory and click on Groups and then New group.


timurengin_0-1692858631272.png


Figure 1 Creating new group


 


Enter the details as required.


timurengin_1-1692858631277.png


Figure 2 Adding details to group being created


 


Add Eligible Members to the group


 


Go to the Azure portal and search for Azure AD Privileged Identity Management in the search bar. Once there, select Groups on the left side of the menu. The group needs to be discovered before eligible members can be added. To discover the group, search the group name and select Discover groups.


timurengin_5-1692858727186.png


Figure 3 Discover groups to manage with PIM


 


Select the group and click Manage groups.


timurengin_6-1692858727192.png


Figure 4 Manage group using PIM


 


Click on OK.


timurengin_7-1692858727193.png


Figure 5 Onboarding selected groups


 


Now the group should be visible. Select the group and click Assignments, then Add assignments in the Eligible assignments tab. If it is not added to this tab, the assignment will be active and not eligible.


timurengin_8-1692858727197.png


Figure 6 Adding assignment to PIM managed group


 


Select the members to be added to the group.


timurengin_9-1692858727199.png


Figure 7 Selecting members


 


timurengin_10-1692858727203.png


Figure 8 Selecting members


 


Select Eligible and enter the start and end dates of the eligibility assignment. Once the correct dates are set click Done. Finish the assignment process.


timurengin_11-1692858727205.png


Figure 9 Setting details of eligible membership


 


Now there should be the account added in the Eligible assignments tab on the groups membership.


timurengin_12-1692858727208.png


 


Figure 10 Viewing eligible assignment of groups members


 


Now the group has PIM eligible members.


 


Create the M365 Defender Role


 


M365 Defender roles can be created in the M365 Defender portal. If you have the correct permissions you can click on Permissions on the left side in the menu.


timurengin_13-1692858937489.png


Figure 11 Permissions tab in Defender menu


 


Under Microsoft 365 Defender select Roles.


timurengin_14-1692858937492.png


Figure 12 Microsoft 365 Defender Roles in permissions page


 


Click on Create custom role. Enter the name of the role and click Next.


timurengin_15-1692858937495.png


Figure 13 Beginning the creation of a custom role


 


On the Choose permissions tab click on each permission an select the level of access you want the role to have.


timurengin_16-1692858937500.png


Figure 14 Permissions selection screen


 


timurengin_17-1692858937506.png


Figure 15 Example permissions for Security Operations


 


Once the permissions you want are selected click on Next.


timurengin_18-1692858937508.png


Figure 16 Permissions selected for each group


 


On the next screen assignment are created for the role. The assignments created will determine which account are assigned this role. Click on Add assignment.


timurengin_22-1692859171624.png


Figure 17 Adding assignment to role


 


Enter the assignment name and select the group created in Step 1. Click Add.


timurengin_23-1692859194136.png


Figure 18 Entering assignment details


 


Move to the next screen by clicking Next. Review the permissions and click Submit.


timurengin_24-1692859194143.png


Figure 19 Reviewing and submitting the roles settings


 


As mentioned earlier, the M365 Defender RBAC has to be activated for workloads so that it can be applied. If this hasn’t been done already then it will need to be activated. On the main page for M365 Defender Roles there will be a note if any workload has not been activated. If this note is there then you will need to Activate workloads.


timurengin_25-1692859194146.png


 


timurengin_26-1692859194152.png


Figure 21 Activating workloads


 


Users perspective


 


Once a user has been made an eligible member of the group they can activate their membership and get temporarily assigned to the M365 Defender role. The user will have to follow these steps:


 


Go to Azure AD Privileged Identity Management and to the Groups tab in the menu on the left. The group should be visible. If the group is not visible, verify that the user is an eligible member of the group and that the group was ‘discovered’ by the admins. These steps can be found in the previous sections. Select Activate role.


timurengin_30-1692859301779.png


Figure 22 Activating group membership


 


On the next screen select Activate on the group you want to activate the membership for.


timurengin_31-1692859301783.png


Figure 23 Activating group membership


 


Select the duration the membership should last for and add a reason. Select Activate.


timurengin_32-1692859301787.png


Figure 24 Activating group membership


 


After activating the role, if the membership status of the group is checked, you will see the account there with details about when the membership was activated.


timurengin_33-1692859403742.png


 


Figure 25 Viewing the activated group membership


 


The users view in M365 Defender before and after activating the group membership, and therefore getting assigned the M365 Defender role. Notice that after the role is assigned the user can see menus for Defender related activities.


 


timurengin_34-1692859403749.png


Figure 26 The Defender menu before activating the group membership


 


timurengin_35-1692859403752.png


Figure 27 The Defender menu after activating the group membership


 


Wrapping it up


 


PIM for Groups paired with M365 Defender RBAC offers a solution for those looking for just-in-time Defender access. These can also be used in combinations. For example, if you want a certain sures to always have read access but access to take device actions should be granted just-in-time, then a read-only Defender role can be assigned permanently and the role for taking device actions can be granted to the group via the steps mentioned above.


 

Introducing a New Flexible Way of Bringing Identities from Any Source into Microsoft Entra ID!

Introducing a New Flexible Way of Bringing Identities from Any Source into Microsoft Entra ID!

This article is contributed. See the original author and article here.

Hello everyone,


 


I’m thrilled to announce that Microsoft Entra API-driven provisioning is now in public preview!


 


With today’s announcement, we’re expanding our support for HR-driven provisioning to address the most common customer asks, including: 


 



  • Automatically provisioning cloud-only users and hybrid users (users that require an on-premises Active Directory account) from any trusted source 

  • Importing data from sources like CSV files and SQL staging tables using the automation tool of your choice 

  • Simplifying the integration by using standard SCIM schema attributes to abstract schema differences across systems and provide a consistent mapping experience

  • Leveraging Lifecycle Workflows to automate joiner-mover-leaver workflows for users sourced from any system of record 


 


In one common customer scenario, organizations use a cloud human capital management (HCM) platform for managing employees and extracting nightly flat files/CSVs to manage vendor and contractor data. Both of these sources can send information to Microsoft Entra API-driven provisioning using your automation tool of choice. Then, the provisioning service will automatically determine the right operation to perform for each user, and Microsoft Entra ID Governance Lifecycle Workflows will automate the joiner-mover-leaver processes configured by your IAM admin.


 


Figure 1: Microsoft Entra API-driven provisioning data flowFigure 1: Microsoft Entra API-driven provisioning data flow


 


 


Let’s walk through the steps involved in configuring this integration.


 


Bring identities into your directory from any source in three easy steps 


Step 1 – Configure API-driven provisioning app 


In the Microsoft Entra Portal, sign in as a user with Application Administrator and Hybrid Identity Administrator role. You will see two new provisioning applications in the Enterprise App gallery:


 



  • API-driven provisioning to Microsoft Entra ID: Configure this app if you’d like to provision cloud-only user accounts from your authoritative source.

  • API-driven provisioning to on-premises Active Directory: Configure this app if you’d like to provision user accounts first to your on-premises Active Directory and then sync them into Microsoft Entra ID using Microsoft Entra Cloud Sync / Connect Sync. 


 


If your provisioning target is an on-premises Active Directory domain, download and configure the Microsoft Entra provisioning agent. Once configured, you can select the Active Directory domain in the provisioning app.


 


Figure 2: Connect to your on-premises Active Directory domainFigure 2: Connect to your on-premises Active Directory domain


 


 



By default, the provisioning app maps attributes from the standard SCIM Core User schema and the SCIM Enterprise User schema extension to the corresponding Microsoft Entra ID / on-premises Active Directory user attributes. 


 


Figure 3: SCIM schema attributes to on-premises Active Directory attribute mappingFigure 3: SCIM schema attributes to on-premises Active Directory attribute mapping


 


 


The Microsoft Entra provisioning service creates a unique API endpoint for your provisioning app. You can copy this API endpoint from the “Overview” blade. Select “Start provisioning” to accept inbound provisioning requests at this API endpoint.


 


Figure 4:API endpoint for your provisioning appFigure 4:API endpoint for your provisioning app


 


 


The inbound provisioning API endpoint has the format: 


https://graph.microsoft.com/beta/servicePrincipals/{servicePrincipalId}/synchronization/jobs/{jobId}/bulkUpload 


where {servicePrincipalId} is the object ID of your provisioning app and {jobId} is the provisioning job id.


 


Step 2 – Grant permission to your application or service to upload identity data 


In this step, you create an entity in Microsoft Entra ID that represents your application or service calling the inbound provisioning API and grant it the necessary permissions. You can use one of the following options:


 



 


Grant the following Graph API permissions with admin consent:


 



  • SynchronizationData-User.Upload  

  • AuditLog.Read.All 


Figure 5: Permissions required to perform API-driven provisioningFigure 5: Permissions required to perform API-driven provisioning


 



Step 3 – Upload identity data using any automation tool of your choice 


You can now securely upload identity data to the provisioning /bulkUpload API endpoint. The great thing about API-driven provisioning is that you don’t need to implement custom logic to figure out whether an operation in your system of record requires creating or updating an identity. Just upload the data from your source systems and the Microsoft Entra provisioning service will automatically determine the right operation to perform for each user record based on mapping rules configured by your IAM admin.


 


Unlock more integration scenarios 


In the set of steps above, we showed you how to provision to Microsoft Entra ID in the cloud, and to Active Directory on-premises. You can apply these steps to implement several enterprise HR integration scenarios.


 


Scenario 1: IT teams can import HR data extracts from any source 


Flat files, CSV files and SQL staging tables are commonly used in enterprise integration scenarios. Employee, contractor, and vendor information are periodically exported into one of these formats, and an automation tool is used to sync this data with Microsoft Entra ID. With API-driven provisioning, IT teams can use any automation tool of their choice (example: PowerShell scripts or Azure Logic Apps) to modernize and simplify this integration.


 


Scenario 2: HR ISVs can build direct inbound sync with Microsoft Entra ID 


With API-driven provisioning, HR ISVs can ship native synchronization experiences so that changes in the HR system automatically flow into Microsoft Entra ID and connected on-premises Active Directory domains. For example, an HR app or student information systems app can send data to Microsoft Entra ID as soon as a transaction is complete or as end-of-day bulk update.


 


Scenario 3: System integrators can build more connectors to systems of record 


System integrators can build custom HR connectors to meet different integration requirements around identity data flow from systems of record to Microsoft Entra ID.


 


What customers and partners are telling us 


We got some great feedback from customers and partners like you during the previews.


 


Microsoft Entra API-driven provisioning will allow us to achieve our cloud-first vision by provisioning identity directly in the cloud and on-premises, integrating with our HR application. We will be able to remove legacy infrastructure and automate many fragmented workflows and reduce dependency on on-premises Active Directory infrastructure. This will enhance our security, efficiency, and user experience. 


Sachin Desai, Sr. Director at Avanade Inc. 


 


With API-driven provisioning, HR has better control over the identity lifecycle & data in Active Directory and Microsoft Entra ID. When combined with Lifecycle Workflows, onboarding and offboarding becomes easy and seamless, and with that, no more manual work and always an up-to-date identity! 


Pim Jacobs, Principal Consultant at InSpark and Microsoft Most Valuable Professional (MVP)


 


Microsoft Entra API-driven inbound provisioning is a game changer for customers constrained by existing technologies, opening the possibility for any customer to start the journey for joiner, mover, and leaver automation.   


Martyn Gill, Senior Architect and Team Lead at Kocho 


 


With API-driven provisioning, our customers can link employee information in SmartHR with Microsoft Entra ID. This will reduce the time and effort required to manage accounts as employees join, move, or leave the company. SmartHR is excited to partner with Microsoft in building this integration! 


Takumi Kanzaki, Product Engineer at SmartHR 


 


Rippling gives businesses one place to run HR, IT, and Finance by automating payroll, expenses, and benefits in one integrated platform. With Microsoft Entra API-driven provisioning, we can now extend this automation to streamline access to more workforce apps, regardless of whether it’s in the cloud or on-premises. We look forward to enabling this seamless experience for our customers by partnering with Microsoft! 


Sam Gnesin, Product Lead at Rippling 


 


Give it a try 


With this new capability, you now have even more flexibility on how to keep identity data in sync with your authoritative sources, regardless of whether they are hosted in the cloud or on-premises. Working with your HR/IT teams, you can select from a range of automation tools like Azure Logic Apps, PowerAutomate, Azure Functions or Azure Data Factory to retrieve, transform and merge HR data and simply upload the data to the new provisioning API endpoint.


 


To quickly configure and evaluate API-driven provisioning with your favorite API testing tool, refer to one of these tutorials:  


 



 


To get started with your favorite automation tools, refer to one of these samples:   


 



 


The API-driven provisioning feature is in preview, and you can start using it if you have Microsoft Entra ID P1 (formerly Azure AD Premium P1) license or above. Licensing terms will be released at general availability.  


 


Have more questions? Check out our frequently asked questions to see if it’s answered there. 


 


We’d love to hear your feedback along the way! Share your feedback through the Azure forum or by tagging @AzureAD on Twitter.  


 


 Joseph Dadzie, Partner Director of Product Management  


LinkedIn: @joedadzie  


Twitter: @joe_dadzie  


 


 


Learn more about Microsoft Entra: 


Manage Access to Microsoft Sentinel Workbooks with Lower Scoped RBAC

Manage Access to Microsoft Sentinel Workbooks with Lower Scoped RBAC

This article is contributed. See the original author and article here.

Leveraging Microsoft Sentinel workbooks for reporting to leadership is a common use case. A common concern is granting recipients access to Microsoft Sentinel or all of the tables within the workspace. Using some different RBAC components, this can be done.


 


Components:



  1. Table-level RBAC

  2. Resource-level RBAC


How It Works:


Table-level RBAC: Access to the data that is leveraged within the workspace is set at the table level. This prevents the user from being able to read data from the other tables while still being able to see the required data within the workbook.


Matt_Lowe_0-1692721169802.png


 


Resource-level RBAC: Access to just the resource as needed. The resource here is the workbook of interest. Setting access at the resource level prevents the user from being able to see all resources within the resource group.


Matt_Lowe_1-1692718378211.png


 


How to Configure:


Table-level RBAC: Table-level RBAC will leverage a custom role that enables the user to be able to see the workspace and run a query, and a reader role on the table itself. The process is highlighted in the documentation here.


 


Resource-level RBAC: Resource-level RBAC will limit the scope of visibility to be just to the resource. To set this:



  1. Go to the Azure Portal.

  2. Go to the resource group that has Microsoft Sentinel.

  3. Find the workbook of interest.

  4. Click on access control.

  5. Click on add.

  6. Choose role assignment.

  7. Select the workbook reader role.

  8. Select the user that should be able to see the workbook.

  9. Click review and assign.


Sharing the Workbook


Since the user is unable to see Microsoft Sentinel, the workbook will need to be shared directly with the user. To do so:



  1. Go to the Azure Portal.

  2. Go to Microsoft Sentinel or the resource group.

  3. Find the workbook of interest and open it.

  4. Click on share and copy the link. Matt_Lowe_2-1692718840044.pngMatt_Lowe_3-1692718854306.png

  5. Share the link with the user who should have limited access.


Anticipated Questions:



  1. I don’t want the user to see the workspace so that they can’t run a query on the data. Can I do that?

    1. No. The permission to see and query the workspace is required so that the user can view the data in the workbook, which queries the data.



  2. How does the user consistently view the workbook without having to use the link?

    1. The user can configure a dashboard that pins the workbook to the dashboard.



  3. What if the workbook uses several tables?

    1. Table-level RBAC will need to be configured for each one.



  4. What if I have multiple users who need this type of access?

    1. Consider creating an AAD group that contains these users and assign permissions to the group.




And that’s it. This is a fairly straightforward process that leads to good results. Go ahead and give it a shot and leave comments below if there are any issues.

Build Right and Fast: Landing Zone Accelerator for Spring Apps – Now Generally Available!

Build Right and Fast: Landing Zone Accelerator for Spring Apps – Now Generally Available!

This article is contributed. See the original author and article here.

Today we are excited to announce the general of Azure Spring Apps (ASA) landing zone accelerator. You can start deploying your spring applications to Azure Spring Apps at scale using the built with industry-proven practices.


 


Customers on their app modernization or migration journey to cloud may encounter challenges to deploy spring applications at enterprise scale and get it right at the first time. Landing zone accelerators help you address this challenge providing guidance to deploy workloads faster with better security, scalability, availability, reduced cost, operating confidently with better performance.


 


Landing zone accelerators provide architectural guidance, reference architecture, reference implementations and automation packaged to deploy workload platforms on Azure at scale. The goal of landing zone accelerators is to save you having to reinvent the wheel by building on the lessons we learned working with our strategic customers. This accelerator allows you to establish secure, compliant, and scalable development, test, or production environments within 15-30 minutes.


 


ASA landing zone accelerator comes with two parts,



  1. Design Area Guidance providing recommendations and considerations for critical design pillars: Security, Networking, Identity and Access Management and Monitoring

  2. Reference implementation providing end-to-end guidance for provisioning Azure Spring Apps and deploying workloads to production-grade secure infrastructure.


Build and deploy spring applications at scale


Azure Spring Apps makes it easy to deploy Spring applications to Azure without any code changes. The service manages the infrastructure of Spring applications so developers can focus on their code. Azure Spring Apps provides lifecycle management using comprehensive monitoring and diagnostics, configuration management, service discovery, CI/CD integration, blue-green deployments, and more.


 


For application teams, the Spring Apps landing zone accelerator offers a significant head start by bundling together the most used backing services, which teams can select as part of their deployment process. This includes Azure Spring Apps Enterprise for Java Spring Boot applications, Azure Application Gateway for efficient web traffic management, Azure Virtual Machines for streamlined management operations, and diverse database services such as Azure MySQL Flexible Server, Azure PostgreSQL Flexible Server, Azure Cosmos Database and Azure SQL Database for adaptable data storage solutions. Teams can further secure and monitor their operations with Azure Key Vault, Azure Monitor Logs, and Azure Application Insights – or using any monitoring tools and platform of their choice. And they can automate from idea to production using any automation tools and platform of their choice.


 


On the other hand, platform teams benefit from an array of resources designed to maintain security and operational efficiency. The Azure Firewall, Azure Bastion, Azure ExpressRoute, Azure DNS, and Azure VPN Gateway ensure seamless connectivity, secure access management, and effective traffic control across both on-premises and Azure environments. The Landing Zone Accelerator for Spring Apps builds on the Azure Well-Architected Framework, adhering to its five pillars of architectural excellence – reliability, security, cost optimization, operational excellence, and performance efficiency. Furthermore, it integrates seamlessly with Azure landing zones and other accelerators. Rooted in real-world Azure migration projects, this accelerator framework not only ensures consistent governance but also reduces operational overhead, optimizing cost, and establishing a reliable solution for deploying both private and public applications in single or multi cloud environments.


 


Design Area Guidance


The reference architecture is considered across four key design areas integrated with centralized services.



These design guidelines are based on real-world work with our strategic customers performing large-scale Azure migration and modernization projects, and you can use the architectural guidance to achieve your target technical state with confidence.


MS Learn documentation – Azure Spring Apps landing zone accelerator – Cloud Adoption Framework | Microsoft Learn


 


Reference Architecture


The reference implementation demonstrates a secure baseline infrastructure architecture to deploy spring and polyglot apps. It uses a hub and spoke architecture with a single spoke hosting Spring Apps. East/West traffic (traffic between resources in the hub and resources in the spoke) is filtered with Network Security Groups and North/South traffic (traffic between the Internet and resources in the hub or spoke) is routed through and mediated with an instance of Azure Firewall.


 


aarthimurugan_0-1692378956094.jpeg


 


Core architecture components are below.



  • Azure Spring Apps (Enterprise or Standard) is deployed using VNet-injection to allow for mediation inbound and outbound traffic to the Azure Spring Apps Instance and deployed applications.

  • The Azure Firewall instance has been configured to write its logs to a Log Analytics Workspace.

  • Azure Private DNS zones for Azure Spring Apps and support services deployed with Private Endpoints

  • A single Windows Server 2022 Virtual Machine deployed into the spoke Virtual Network for testing access to applications deployed into the Azure Spring Apps instance. This VM is not exposed to the internet and is only accessible via Azure Bastion.

  • Log Analytics Workspace where Azure Spring Apps and Azure Firewall deliver logs and metrics.

  • Application Insights for monitoring applications deployed to Azure Spring Apps.

  • Instance of Azure Key Vault deployed with a Private Endpoint for secrets and certificates storage for applications deployed to Azure Spring Apps.

  • Instance of Azure Bastion for connection to the Windows Server 2022 virtual machine running in the virtual network.


 


Next Steps


For the implementation of this architecture, see the Azure Spring Apps landing zone accelerator repository on GitHub. Deployment options for this architecture include ready-to-go BicepTerraform, scripts with automation provided in both Azure DevOps and GitHub Actions.


Lets get started by forking the repo to create a dev, test or production environment in 15-30 minutes using the landing zone accelerator. The artifacts in this repository provide groundwork that you can customize for your environment and automated provisioning pipelines. For any feedback, please use the GitHub Issues.


 


Meet the Experts


This accelerator was created and maintained by Cloud Solution Architects, Software Engineers, and Program Managers at Microsoft. Check them out under the GitHub repo contributors section.