Skip to content

Commit 08022b3

Browse files
committed
Section descriptions
1 parent af83026 commit 08022b3

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/role-based-access-control/pim-integration.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,9 @@ This article describes the integration of Azure role-based access control (Azure
1616

1717
## PIM functionality
1818

19-
If you have PIM, you can create eligible and time-bound role assignments using the role assignments steps on the **Access control (IAM)** page in the Azure portal. You can create eligible role assignments for users, but you can't create eligible role assignments for applications, service principals, or managed identities because they can't perform the activation steps. You can create eligible role assignments at management group, subscription, and resource group scope, but not at resource scope.
19+
If you have PIM, you can create eligible and time-bound role assignments using the **Access control (IAM)** page in the Azure portal. You can create eligible role assignments for users, but you can't create eligible role assignments for applications, service principals, or managed identities because they can't perform the activation steps. You can create eligible role assignments at management group, subscription, and resource group scope, but not at resource scope.
2020

21-
Here's an example of the **Assignment type** tab when adding a role assignment on the **Access control (IAM)** page. This capability is being deployed in stages, so it might not be available yet in your tenant or your interface might look different.
21+
Here's an example of the **Assignment type** tab when you add a role assignment using the **Access control (IAM)** page. This capability is being deployed in stages, so it might not be available yet in your tenant or your interface might look different.
2222

2323
:::image type="content" source="./media/shared/assignment-type-eligible.png" alt-text="Screenshot of Add role assignment with Assignment type options displayed." lightbox="./media/shared/assignment-type-eligible.png":::
2424

@@ -44,7 +44,7 @@ For more information, see [What is Microsoft Entra Privileged Identity Managemen
4444

4545
## How to list eligible and time-bound role assignments
4646

47-
Here are options for how to list eligible and time-bound role assignments.
47+
If you want to see which users are using the PIM funcationality, here are options for how to list eligible and time-bound role assignments.
4848

4949
### Option 1: List using the Azure portal
5050

@@ -77,7 +77,7 @@ For information about how scopes are constructed, see [Understand scope for Azur
7777

7878
## How to convert eligible and time-bound role assignments to active permanent
7979

80-
If your organization has process or compliance reasons to limit the use of PIM, here are the options for how to convert these role assignments to active permanent.
80+
If your organization has process or compliance reasons to limit the use of PIM, here are options for how to convert these role assignments to active permanent.
8181

8282
### Option 1: Convert using the Azure portal
8383

@@ -111,7 +111,7 @@ There isn't a command or API to directly convert role assignments to a different
111111
112112
2. Use the [New-AzRoleEligibilityScheduleRequest](/powershell/module/az.resources/new-azroleeligibilityschedulerequest) command to remove your eligible role assignments.
113113

114-
This example shows how you can remove an eligible role assignment.
114+
This example shows how to remove an eligible role assignment.
115115

116116
```powershell
117117
$guid = New-Guid
@@ -120,7 +120,7 @@ There isn't a command or API to directly convert role assignments to a different
120120
121121
3. Use the [New-AzRoleAssignmentScheduleRequest](/powershell/module/az.resources/new-azroleassignmentschedulerequest) command to remove your active time-bound role assignments.
122122
123-
This example shows how you can remove an active time-bound role assignment
123+
This example shows how to remove an active time-bound role assignment.
124124
125125
```powershell
126126
$guid = New-Guid
@@ -140,14 +140,14 @@ There isn't a command or API to directly convert role assignments to a different
140140
141141
## How to limit the creation of eligible or time-bound role assignments
142142
143-
You can use Azure Policy to block creation of eligible or time-bound role assignments. For more information, see [What is Azure Policy?](/azure/governance/policy/overview).
143+
If your organization has process or compliance reasons to limit the use of PIM, you can use Azure Policy to limit the creation of eligible or time-bound role assignments. For more information, see [What is Azure Policy?](/azure/governance/policy/overview).
144144
145-
Here's an example policy that blocks the creation of eligible and time-bound role assignments except for a specific list of identities to can receive them. Additional parameters and checks can be added for other allow conditions.
145+
Here's an example policy that limits the creation of eligible and time-bound role assignments except for a specific list of identities. Additional parameters and checks can be added for other allow conditions.
146146
147147
```json
148148
{
149149
"properties": {
150-
"displayName": "Block eligible and active time-bound role assignment creation except for allowed principal ids",
150+
"displayName": "Limit eligible and active time-bound role assignments except for allowed principal IDs",
151151
"policyType": "Custom",
152152
"mode": "All",
153153
"metadata": {

0 commit comments

Comments
 (0)