Information Technology Service Management (ITSM) Processes. 1) Service Request Management Focuses on requests and responses for the IT help-desk items. The processes should be established and uniform. To reduce the workload on agents, organization may consider implementing self service options or chat-bots. 2) Service Catalogs Generally Service Catalogs is a central location/webpage with all the details for contacting the help-desk. It may also contain the self service options and solutions for common problems/issues. 3) Knowledge,Policy and Procedures. This is the knowledge base which controls the collection, maintenance and distribution of information sharing throughout the organization. It shall include the policies, standards, guidelines and the operating procedures for each process or tasks. 4) Incident Management. Defines process on how to handle a situation when an incident happens and how to fix the situation in an accelerated and organized manner. The objective is to reduce t
Azure Active Directory has two types of Users.
1) Member
A member is a normal cloud user. An Active Directory member can read all directory information and can invite external users. They can also manage their own profile information and can register applications in the AD.
2) Guest
1) Member
A member is a normal cloud user. An Active Directory member can read all directory information and can invite external users. They can also manage their own profile information and can register applications in the AD.
2) Guest
Restricted user who can manage only their own profile data. Cannot browse the directory and cannot register applications in the AD.
RBAC built-in roles (Top 4)
- Owner Role : Lets you manage everything, including access to resources.The owner can add permission, perform actions such as delete, stop the resources.
- Contributor Role : This role allows a user to manage all types of resources, but does not allow the user to grant access to resources.To allow a user to have the ability to grant access to resources, the user must be assigned with either the User Access Administrator Role or the Owner Role
- User Access Administrator Role : In this role, the user can manage the access to resources. The user would be able to read all resources, but can't modify.
- Virtual Machine Contributor Role : This allows to manage the properties of the Virtual Machine. This will not provide access to the underlying virtual network or the storage accounts the virtual machine is connected to.