Skip to content

Commit 024f390

Browse files
authored
Merge pull request #7747 from MicrosoftDocs/users/chcomley/add-just-in-time-access-for-admin-groups
Added just-in-time access process back to docs
2 parents e288e49 + 74ff038 commit 024f390

File tree

2 files changed

+24
-3
lines changed

2 files changed

+24
-3
lines changed

docs/organizations/accounts/manage-azure-active-directory-groups.md

Lines changed: 23 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.assetid: 882E6E07-F407-478A-9DCC-9324493CBE11
77
ms.topic: how-to
88
ms.author: chcomley
99
author: chcomley
10-
ms.date: 10/23/2024
10+
ms.date: 03/17/2025
1111
monikerRange: 'azure-devops'
1212
---
1313

@@ -23,7 +23,7 @@ Organize your directory members with [Microsoft Entra groups](/azure/active-dire
2323
For more information on [Microsoft Entra ID benefits](/azure/active-directory/fundamentals/active-directory-whatis) and how to [control organization access with Microsoft accounts or Microsoft Entra ID](access-with-azure-ad.md), see the provided links.
2424

2525
> [!NOTE]
26-
> Due to a functional limitation on Microsoft Graph, [service principals](../../integrate/get-started/authentication/service-principal-managed-identity.md) don't appear in any list of Microsoft Entra group members on Azure DevOps. Permissions set on any Microsoft Entra groups still apply to any service principals in the group that have been added to the organizations, even if they aren't displaying on the web UI.
26+
> Due to a functional limitation on Microsoft Graph, [service principals](../../integrate/get-started/authentication/service-principal-managed-identity.md) don't appear in any list of Microsoft Entra group members on Azure DevOps. Permissions set on any Microsoft Entra groups still apply to any service principals in the group that were added to the organizations, even if they aren't displaying on the web UI.
2727
2828
## Prerequisites
2929

@@ -88,6 +88,27 @@ For more information on [Microsoft Entra ID benefits](/azure/active-directory/fu
8888

8989
Microsoft Entra ID changes might take up to 1 hour to be visible in Azure DevOps, but you can immediately [reevaluate your permissions](../security/request-changes-permissions.md#refresh-or-reevaluate-your-permissions).
9090

91+
## Configure just-in-time-access for admin groups
92+
93+
If you have [Project Collection Administrator](../../user-guide/manage-organization-collection.md) and [Project Administrator](../../user-guide/project-admin-tutorial.md) access, you can modify the configuration of your organization or project. To enhance security for these built-in administrator groups, consider implementing just-in-time access using a Microsoft Entra [Privileged Identity Management (PIM) group](/azure/active-directory/privileged-identity-management/concept-pim-for-groups). This approach allows you to grant elevated permissions only when needed, reducing the risk associated with permanent access.
94+
95+
### Configure access
96+
97+
1. [Create a role-assignable group in Microsoft Entra ID](/azure/active-directory/roles/groups-create-eligible?tabs=ms-powershell&branch=main).
98+
2. [Add your Microsoft Entra group to the Azure DevOps group](/azure/devops/organizations/security/add-ad-aad-built-in-security-groups?view=azure-devops&branch=main&tabs=preview-page&preserve-view=true).
99+
100+
> [!NOTE]
101+
> When you configure just-in-time access using a Microsoft Entra Privileged Identity Management (PIM) group, ensure that any user with elevated access also retains standard access to the organization. This way, they can view the necessary pages and refresh their permissions as needed.
102+
103+
### Use access
104+
105+
1. [Activate your access](/azure/active-directory/privileged-identity-management/groups-activate-roles).
106+
2. [Refresh your permissions](../security/request-changes-permissions.md#refresh-or-reevaluate-your-permissions) in Azure DevOps.
107+
3. Take the action requiring administrator access.
108+
109+
> [!NOTE]
110+
> Users have elevated access in Azure DevOps for up to 1 hour after their PIM group access gets deactivated.
111+
91112
## Related articles
92113

93114
- [Restrict organization creation with tenant policy](azure-ad-tenant-policy-restrict-org-creation.md)

docs/organizations/security/security-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ To scope permissions effectively, do the following actions:
115115
- For more information, see [Manage security groups](add-manage-security-groups.md).
116116
- **Choose the right authentication method:** Set up secure authentication methods and manage authorization policies. For more information, see the [Choose the right authentication method](#choose-the-right-authentication-method) section in this article and [Authentication methods](about-security-identity.md).
117117
- **Integrate with Microsoft Entra ID:** Use Microsoft Entra ID for unified identity management. For more information, see [Connect your organization to Microsoft Entra ID](../accounts/connect-organization-to-azure-ad.md).
118-
- To enhance security for built-in administrator groups, consider implementing just-in-time access using a Microsoft Entra [Privileged Identity Management (PIM) group](/azure/active-directory/privileged-identity-management/concept-pim-for-groups). This approach allows you to grant elevated permissions only when needed, reducing the risk associated with permanent access.
118+
- To enhance security for built-in administrator groups, consider implementing just-in-time access using a Microsoft Entra [Privileged Identity Management (PIM) group](/azure/active-directory/privileged-identity-management/concept-pim-for-groups). This approach allows you to grant elevated permissions only when needed, reducing the risk associated with permanent access. For more information, see [Configure just-in-time-access for admin groups](../accounts/manage-azure-active-directory-groups.md#configure-just-in-time-access-for-admin-groups).
119119
- **Enable Microsoft Entra multifactor authentication (MFA):** Add an extra layer of security with MFA. For more information, see [Enable Microsoft Entra multifactor authentication](/entra/identity/authentication/tutorial-enable-azure-mfa).
120120
- **Change security policies:** Manage security policies, including conditional access. for more information, see [Change application connection & security policies for your organization](../accounts/change-application-access-policies.md).
121121

0 commit comments

Comments
 (0)