You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/pim-integration.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,9 @@ This article describes the integration of Azure role-based access control (Azure
16
16
17
17
## PIM functionality
18
18
19
-
If you have PIM, you can create eligible and time-bound role assignments using the role assignments steps on the **Access control (IAM)** page in the Azure portal. You can create eligible role assignments for users, but you can't create eligible role assignments for applications, service principals, or managed identities because they can't perform the activation steps. You can create eligible role assignments at management group, subscription, and resource group scope, but not at resource scope.
19
+
If you have PIM, you can create eligible and time-bound role assignments using the **Access control (IAM)** page in the Azure portal. You can create eligible role assignments for users, but you can't create eligible role assignments for applications, service principals, or managed identities because they can't perform the activation steps. You can create eligible role assignments at management group, subscription, and resource group scope, but not at resource scope.
20
20
21
-
Here's an example of the **Assignment type** tab when adding a role assignment on the **Access control (IAM)** page. This capability is being deployed in stages, so it might not be available yet in your tenant or your interface might look different.
21
+
Here's an example of the **Assignment type** tab when you add a role assignment using the **Access control (IAM)** page. This capability is being deployed in stages, so it might not be available yet in your tenant or your interface might look different.
22
22
23
23
:::image type="content" source="./media/shared/assignment-type-eligible.png" alt-text="Screenshot of Add role assignment with Assignment type options displayed." lightbox="./media/shared/assignment-type-eligible.png":::
24
24
@@ -44,7 +44,7 @@ For more information, see [What is Microsoft Entra Privileged Identity Managemen
44
44
45
45
## How to list eligible and time-bound role assignments
46
46
47
-
Here are options for how to list eligible and time-bound role assignments.
47
+
If you want to see which users are using the PIM funcationality, here are options for how to list eligible and time-bound role assignments.
48
48
49
49
### Option 1: List using the Azure portal
50
50
@@ -77,7 +77,7 @@ For information about how scopes are constructed, see [Understand scope for Azur
77
77
78
78
## How to convert eligible and time-bound role assignments to active permanent
79
79
80
-
If your organization has process or compliance reasons to limit the use of PIM, here are the options for how to convert these role assignments to active permanent.
80
+
If your organization has process or compliance reasons to limit the use of PIM, here are options for how to convert these role assignments to active permanent.
81
81
82
82
### Option 1: Convert using the Azure portal
83
83
@@ -111,7 +111,7 @@ There isn't a command or API to directly convert role assignments to a different
111
111
112
112
2. Use the [New-AzRoleEligibilityScheduleRequest](/powershell/module/az.resources/new-azroleeligibilityschedulerequest) command to remove your eligible role assignments.
113
113
114
-
This example shows how you can remove an eligible role assignment.
114
+
This example shows how to remove an eligible role assignment.
115
115
116
116
```powershell
117
117
$guid = New-Guid
@@ -120,7 +120,7 @@ There isn't a command or API to directly convert role assignments to a different
120
120
121
121
3. Use the [New-AzRoleAssignmentScheduleRequest](/powershell/module/az.resources/new-azroleassignmentschedulerequest) command to remove your active time-bound role assignments.
122
122
123
-
This example shows how you can remove an active time-bound role assignment
123
+
This example shows how to remove an active time-bound role assignment.
124
124
125
125
```powershell
126
126
$guid = New-Guid
@@ -140,14 +140,14 @@ There isn't a command or API to directly convert role assignments to a different
140
140
141
141
## How to limit the creation of eligible or time-bound role assignments
142
142
143
-
You can use Azure Policy to block creation of eligible or time-bound role assignments. For more information, see [What is Azure Policy?](/azure/governance/policy/overview).
143
+
If your organization has process or compliance reasons to limit the use of PIM, you can use Azure Policy to limit the creation of eligible or time-bound role assignments. For more information, see [What is Azure Policy?](/azure/governance/policy/overview).
144
144
145
-
Here's an example policy that blocks the creation of eligible and time-bound role assignments except for a specific list of identities to can receive them. Additional parameters and checks can be added for other allow conditions.
145
+
Here's an example policy that limits the creation of eligible and time-bound role assignments except for a specific list of identities. Additional parameters and checks can be added for other allow conditions.
146
146
147
147
```json
148
148
{
149
149
"properties": {
150
-
"displayName": "Block eligible and active time-bound role assignment creation except for allowed principal ids",
150
+
"displayName": "Limit eligible and active time-bound role assignments except for allowed principal IDs",
0 commit comments