Skip to content

Commit 0870074

Browse files
committed
Acrolinx and typos
1 parent 31b38fd commit 0870074

File tree

1 file changed

+15
-11
lines changed

1 file changed

+15
-11
lines changed

articles/role-based-access-control/pim-integration.md

Lines changed: 15 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ This article describes the integration of Azure role-based access control (Azure
1616

1717
## PIM functionality
1818

19-
If you have PIM, you create eligible and time-bound role assignments using the role assignments steps on the **Access control (IAM)** page in the Azure portal. You can create eligible role assignments for users, but you can't create eligible role assignments for applications, service principals, or managed identities because they can't perform the activation steps. You can create eligible role assignments at management group, subscription, and resource group scope, but not at resource scope.
19+
If you have PIM, you can create eligible and time-bound role assignments using the role assignments steps on the **Access control (IAM)** page in the Azure portal. You can create eligible role assignments for users, but you can't create eligible role assignments for applications, service principals, or managed identities because they can't perform the activation steps. You can create eligible role assignments at management group, subscription, and resource group scope, but not at resource scope.
2020

2121
Here's an example of the **Assignment type** tab when adding a role assignment on the **Access control (IAM)** page. This capability is being deployed in stages, so it might not be available yet in your tenant or your interface might look different.
2222

@@ -50,9 +50,9 @@ Here are options for how to list eligible and time-bound role assignments.
5050

5151
1. Sign in to the Azure portal, open the **Access control (IAM)** page, and select the **Role assignments** tab.
5252

53-
1. Filter the eligble and time-bound role assignments.
53+
1. Filter the eligible and time-bound role assignments.
5454

55-
You can group and sort by **State**, and look for role assignments that are not of the type **Active permanent**.
55+
You can group and sort by **State**, and look for role assignments that aren't the **Active permanent** type.
5656

5757
:::image type="content" source="./media/role-assignments-list-portal/sub-access-control-role-assignments-eligible.png" alt-text="Screenshot of Access control and Active assignments and Eligible assignments tabs." lightbox="./media/role-assignments-list-portal/sub-access-control-role-assignments-eligible.png":::
5858

@@ -77,21 +77,25 @@ For information about how scopes are constructed, see [Understand scope for Azur
7777

7878
## How to convert eligible and time-bound role assignments to active permanent
7979

80-
If your organization has process or compliance reasons to limit the use of PIM. here are the options for how to convert these role assignments to active permanent.
80+
If your organization has process or compliance reasons to limit the use of PIM, here are the options for how to convert these role assignments to active permanent.
8181

8282
### Option 1: Convert using the Azure portal
8383

84-
1. On the **Role assignments** tab and **State** column, select the **Eligile permanent**, **Eligible time-bound**, and **Active time-bound** links for each role assignment you want to convert.
84+
1. On the **Role assignments** tab and **State** column, select the **Eligible permanent**, **Eligible time-bound**, and **Active time-bound** links for each role assignment you want to convert.
8585

8686
1. In the **Edit assignment** pane, select **Active** for the assignment type and **Permanent** for the assignment duration.
8787

88+
For more information, see [Edit assignment](role-assignments-portal.yml#edit-assignment-(preview)).
89+
8890
:::image type="content" source="./media/role-assignments-portal/assignment-type-edit.png" alt-text="Screenshot of Edit assignment pane with Assignment type options displayed." lightbox="./media/role-assignments-portal/assignment-type-edit.png":::
8991

90-
This conversion might take a few moments. For more information, see [Edit assignment](role-assignments-portal.yml#edit-assignment-(preview)).
92+
1. When finished, select **Save**.
93+
94+
Your updates might take a while to be processed and reflected in the portal.
9195

9296
1. Repeat these steps for all role assignments at management group, subscription, and resource group scopes that you want to convert.
9397

94-
If you have role assignments at resource scope that you want to convert, you'll have to make changes directly in PIM.
98+
If you have role assignments at resource scope that you want to convert, you have to make changes directly in PIM.
9599

96100
### Option 2: Convert using PowerShell
97101

@@ -107,7 +111,7 @@ There isn't a command or API to directly convert role assignments to a different
107111
108112
2. Use the [New-AzRoleEligibilityScheduleRequest](/powershell/module/az.resources/new-azroleeligibilityschedulerequest) command to remove your eligible role assignments.
109113

110-
The follow example shows how you can remove an eligible role assignment.
114+
This example shows how you can remove an eligible role assignment.
111115

112116
```powershell
113117
$guid = New-Guid
@@ -116,7 +120,7 @@ There isn't a command or API to directly convert role assignments to a different
116120
117121
3. Use the [New-AzRoleAssignmentScheduleRequest](/powershell/module/az.resources/new-azroleassignmentschedulerequest) command to remove your active time-bound role assignments.
118122
119-
The follow example shows how you can remove an active time-bound role assignment
123+
This example shows how you can remove an active time-bound role assignment
120124
121125
```powershell
122126
$guid = New-Guid
@@ -125,7 +129,7 @@ There isn't a command or API to directly convert role assignments to a different
125129
126130
4. Use the [Get-AzRoleAssignment](/powershell/module/az.resources/get-azroleassignment) and [New-AzRoleAssignment](/powershell/module/az.resources/new-azroleassignment) commands to create active permanent role assignments with Azure RBAC for every eligible and time-bound role assignment.
127131
128-
The following example shows how to create an active permanent role assignment with Azure RBAC.
132+
This example shows how to create an active permanent role assignment with Azure RBAC.
129133
130134
```powershell
131135
$result = Get-AzRoleAssignment -ObjectId $RA.PrincipalId -RoleDefinitionName $RA.RoleDefinitionDisplayName -Scope $RA.Scope;
@@ -138,7 +142,7 @@ There isn't a command or API to directly convert role assignments to a different
138142
139143
You can use Azure Policy to block creation of eligible or time-bound role assignments. For more information, see [What is Azure Policy?](/azure/governance/policy/overview).
140144
141-
Here is an example policy that blocks the creation of eligible and time-bound role assignments except for a specific list of identities to can receive them. Additional parameters and checks can be added for other allow conditions.
145+
Here's an example policy that blocks the creation of eligible and time-bound role assignments except for a specific list of identities to can receive them. Additional parameters and checks can be added for other allow conditions.
142146
143147
```json
144148
{

0 commit comments

Comments
 (0)