You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/quickstart-create-new-tenant.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -71,4 +71,4 @@ To begin building apps that sign in social and local accounts, you'll need to cr
71
71
72
72
* Try a coding quickstart and begin authenticating users.
73
73
* For more in-depth code samples, check out the **Tutorials** section of the documentation.
74
-
* Want to deploy your app to the cloud? Check out [deploying containers to Azure](https://docs.microsoft.com/azure/index#pivot=products&panel=containers).
74
+
* Want to deploy your app to the cloud? Check out [deploying containers to Azure](https://docs.microsoft.com/azure/index?pivot=products&panel=containers).
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/azure-pim-resource-rbac.md
+51-28Lines changed: 51 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,27 +1,24 @@
1
1
---
2
-
title: View audit report for Azure resource roles in PIM - Azure AD | Microsoft Docs
2
+
title: View audit report for Azure resource roles in Privileged Identity Management (PIM) - Azure AD | Microsoft Docs
3
3
description: View activity and audit history for Azure resource roles in Azure AD Privileged Identity Management (PIM).
4
4
services: active-directory
5
5
documentationcenter: ''
6
6
author: curtand
7
7
manager: daveba
8
8
editor: ''
9
9
10
-
ms.assetid:
11
10
ms.service: active-directory
12
-
ms.devlang: na
13
11
ms.topic: article
14
-
ms.tgt_pltfrm: na
15
12
ms.workload: identity
16
13
ms.subservice: pim
17
14
ms.date: 01/10/2020
18
15
ms.author: curtand
19
-
16
+
ms.reviewer: shaunliu
20
17
ms.collection: M365-identity-device-management
21
18
---
22
19
# View activity and audit history for Azure resource roles in Privileged Identity Management
23
20
24
-
With Azure Active Directory (Azure AD) Privileged Identity Management (PIM), you can view activity, activations, and audit history for Azure resources roles within your organization. This includes subscriptions, resource groups, and even virtual machines. Any resource within the Azure portal that leverages the Azure role-based access control (RBAC) functionality can take advantage of the security and lifecycle management capabilities in Privileged Identity Management.
21
+
With Azure Active Directory (Azure AD) Privileged Identity Management (PIM), you can view activity, activations, and audit history for Azure resources roles within your organization. This includes subscriptions, resource groups, and even virtual machines. Any resource within the Azure portal that leverages the Azure role-based access control functionality can take advantage of the security and lifecycle management capabilities in Privileged Identity Management.
25
22
26
23
> [!NOTE]
27
24
> If your organization has outsourced management functions to a service provider who uses [Azure delegated resource management](../../lighthouse/concepts/azure-delegated-resource-management.md), role assignments authorized by that service provider won't be shown here.
@@ -32,39 +29,39 @@ To see what actions a specific user took in various resources, you can view the
32
29
33
30
1. Open **Azure AD Privileged Identity Management**.
34
31
35
-
1.Click**Azure resources**.
32
+
1.Select**Azure resources**.
36
33
37
-
1.Click the resource you want to view activity and activations for.
34
+
1.Select the resource you want to view activity and activations for.
38
35
39
-
1.Click**Roles** or **Members**.
36
+
1.Select**Roles** or **Members**.
40
37
41
-
1.Click a user.
38
+
1.Select a user.
42
39
43
-
You see a graphical view of the user's actions in Azure resources by date. It also shows the recent role activations over that same time period.
40
+
You see an summary of the user's actions in Azure resources by date. It also shows the recent role activations over that same time period.
44
41
45
42

46
43
47
-
1.Click a specific role activation to see details and corresponding Azure resource activity that occurred while that user was active.
44
+
1.Select a specific role activation to see details and corresponding Azure resource activity that occurred while that user was active.
48
45
49
-

46
+
[](media/azure-pim-resource-rbac/export-membership.png)
50
47
51
48
## Export role assignments with children
52
49
53
50
You may have a compliance requirement where you must provide a complete list of role assignments to auditors. Privileged Identity Management enables you to query role assignments at a specific resource, which includes role assignments for all child resources. Previously, it was difficult for administrators to get a complete list of role assignments for a subscription and they had to export role assignments for each specific resource. Using Privileged Identity Management, you can query for all active and eligible role assignments in a subscription including role assignments for all resource groups and resources.
54
51
55
52
1. Open **Azure AD Privileged Identity Management**.
56
53
57
-
1.Click**Azure resources**.
54
+
1.Select**Azure resources**.
58
55
59
-
1.Click the resource you want to export role assignments for, such as a subscription.
56
+
1.Select the resource you want to export role assignments for, such as a subscription.
60
57
61
-
1.Click**Members**.
58
+
1.Select**Members**.
62
59
63
-
1.Click**Export** to open the Export membership pane.
60
+
1.Select**Export** to open the Export membership pane.
64
61
65
-

62
+
[](media/azure-pim-resource-rbac/export-membership.png)
66
63
67
-
1.Click**Export all members** to export all role assignments in a CSV file.
64
+
1.Select**Export all members** to export all role assignments in a CSV file.
68
65
69
66

70
67
@@ -74,18 +71,19 @@ Resource audit gives you a view of all role activity for a resource.
74
71
75
72
1. Open **Azure AD Privileged Identity Management**.
76
73
77
-
1.Click**Azure resources**.
74
+
1.Select**Azure resources**.
78
75
79
-
1.Click the resource you want to view audit history for.
76
+
1.Select the resource you want to view audit history for.
80
77
81
-
1.Click**Resource audit**.
78
+
1.Select**Resource audit**.
82
79
83
80
1. Filter the history using a predefined date or custom range.
84
81
85
-

82
+
[](media/azure-pim-resource-rbac/rbac-resource-audit.png)
86
83
87
84
1. For **Audit type**, select **Activate (Assigned + Activated)**.
88
85
86
+
[](media/azure-pim-resource-rbac/rbac-audit-activity.png)
89
87

90
88
91
89
1. Under **Action**, click **(activity)** for a user to see that user's activity detail in Azure resources.
@@ -98,19 +96,44 @@ My audit enables you to view your personal role activity.
98
96
99
97
1. Open **Azure AD Privileged Identity Management**.
100
98
101
-
1.Click**Azure resources**.
99
+
1.Select**Azure resources**.
102
100
103
-
1.Click the resource you want to view audit history for.
101
+
1.Select the resource you want to view audit history for.
104
102
105
-
1.Click**My audit**.
103
+
1.Select**My audit**.
106
104
107
105
1. Filter the history using a predefined date or custom range.
108
106
109
-

110
-
107
+
[](media/azure-pim-resource-rbac/my-audit-time.png)
108
+
111
109
> [!NOTE]
112
110
> Access to audit history requires either a Global Administrator or Privileged Role Administrator role.
113
111
112
+
## Get reason, approver, and ticket number for approval events
113
+
114
+
1. Sign in to the [Azure portal](https://aad.portal.azure.com) with Privileged Role administrator role permissions, and open Azure AD.
115
+
1. Select **Audit logs**.
116
+
1. Use the **Service** filter to display only audit events for the Privileged identity Management service. On the **Audit logs** page, you can:
117
+
118
+
- See the reason for an audit event in the **Status reason** column.
119
+
- See the approver in the **Initiated by (actor)** column for the "add member to role request approved" event.
120
+
121
+
[](media/azure-pim-resource-rbac/filter-audit-logs.png)
122
+
123
+
1. Select an audit log event to see the ticket number on the **Activity** tab of the **Details** pane.
124
+
125
+
[](media/azure-pim-resource-rbac/audit-event-ticket-number.png)]
126
+
127
+
1. You can view the requester (person activating the role) on the **Targets** tab of the **Details** pane for an audit event. There are three target types for Azure resource roles:
128
+
129
+
- The role (**Type** = Role)
130
+
- The requester (**Type** = Other)
131
+
- The approver (**Type** = User)
132
+
133
+
[](media/azure-pim-resource-rbac/audit-event-target-type.png)
134
+
135
+
Typically, the log event immediately above the approval event is an event for "Add member to role completed" where the **Initiated by (actor)** is the requester. In most cases, you won't need to find the requester in the approval request from an auditing perspective.
136
+
114
137
## Next steps
115
138
116
139
-[Assign Azure resource roles in Privileged Identity Management](pim-resource-roles-assign-roles.md)
0 commit comments