
Azure LighthouseMicrosoft
Azure Lighthouse enables service providers to manage customer resources at scale with greater visibility and control.
Vendor
Microsoft
Company Website
Product details
Stay in control of your Azure environment
Gain full transparency into service provider actions and manage access without compromising security. Decide who can access your tenant, what they can access, and when. Talk to your service partners about implementing these security and access control protocols for free with Azure Lighthouse.
- **Partner with confidence: **Manage your service providers across all clouds.
- **Take control: **Assign precise permissions to each provider with role-based access control (RBAC).
- **Stay secure: **Enable just-enough and just-in-time access for providers with Privileged Identity Management and Azure Multi-Factor Authentication.
- **Be informed: **Access on-demand auditing and reporting across all service provider actions.
Features
- **Take control by allowing just-enough access: **Limit access to your resources with role-based access control (RBAC), a granular access management system. Control permissions, including who has access, what actions they can take, and what areas they have access to. RBAC in Azure allows service providers to work autonomously while keeping your systems secure.
- **Reduce risk with just-in-time access: **Provide time- and approval-based role activation to service providers with Privileged Identity Management* (PIM), a service of Azure Active Directory (Azure AD). For jobs that fall outside the parameters of RBAC roles built in to Azure, PIM further mitigates risk by assigning providers the exact level of access needed, per resource, for the exact amount of time needed to complete a task. Customers also benefit from added security by requiring Azure Multi-Factor Authentication before a provider's access is elevated.
- **Stay informed with activity reports: **Ensure transparency across all service provider actions with on-demand auditing and activity logs. Take the uncertainty out of guest access with real-time insights about who accessed which resources when, and what actions they took, including all PIM-related activity, available directly in all Azure Resource Manager-based logs.