You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/pim-integration.md
+15-11Lines changed: 15 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ This article describes the integration of Azure role-based access control (Azure
16
16
17
17
## PIM functionality
18
18
19
-
If you have PIM, you create eligible and time-bound role assignments using the role assignments steps on the **Access control (IAM)** page in the Azure portal. You can create eligible role assignments for users, but you can't create eligible role assignments for applications, service principals, or managed identities because they can't perform the activation steps. You can create eligible role assignments at management group, subscription, and resource group scope, but not at resource scope.
19
+
If you have PIM, you can create eligible and time-bound role assignments using the role assignments steps on the **Access control (IAM)** page in the Azure portal. You can create eligible role assignments for users, but you can't create eligible role assignments for applications, service principals, or managed identities because they can't perform the activation steps. You can create eligible role assignments at management group, subscription, and resource group scope, but not at resource scope.
20
20
21
21
Here's an example of the **Assignment type** tab when adding a role assignment on the **Access control (IAM)** page. This capability is being deployed in stages, so it might not be available yet in your tenant or your interface might look different.
22
22
@@ -50,9 +50,9 @@ Here are options for how to list eligible and time-bound role assignments.
50
50
51
51
1. Sign in to the Azure portal, open the **Access control (IAM)** page, and select the **Role assignments** tab.
52
52
53
-
1. Filter the eligble and time-bound role assignments.
53
+
1. Filter the eligible and time-bound role assignments.
54
54
55
-
You can group and sort by **State**, and look for role assignments that are not of the type **Active permanent**.
55
+
You can group and sort by **State**, and look for role assignments that aren't the **Active permanent** type.
56
56
57
57
:::image type="content" source="./media/role-assignments-list-portal/sub-access-control-role-assignments-eligible.png" alt-text="Screenshot of Access control and Active assignments and Eligible assignments tabs." lightbox="./media/role-assignments-list-portal/sub-access-control-role-assignments-eligible.png":::
58
58
@@ -77,21 +77,25 @@ For information about how scopes are constructed, see [Understand scope for Azur
77
77
78
78
## How to convert eligible and time-bound role assignments to active permanent
79
79
80
-
If your organization has process or compliance reasons to limit the use of PIM. here are the options for how to convert these role assignments to active permanent.
80
+
If your organization has process or compliance reasons to limit the use of PIM, here are the options for how to convert these role assignments to active permanent.
81
81
82
82
### Option 1: Convert using the Azure portal
83
83
84
-
1. On the **Role assignments** tab and **State** column, select the **Eligile permanent**, **Eligible time-bound**, and **Active time-bound** links for each role assignment you want to convert.
84
+
1. On the **Role assignments** tab and **State** column, select the **Eligible permanent**, **Eligible time-bound**, and **Active time-bound** links for each role assignment you want to convert.
85
85
86
86
1. In the **Edit assignment** pane, select **Active** for the assignment type and **Permanent** for the assignment duration.
87
87
88
+
For more information, see [Edit assignment](role-assignments-portal.yml#edit-assignment-(preview)).
89
+
88
90
:::image type="content" source="./media/role-assignments-portal/assignment-type-edit.png" alt-text="Screenshot of Edit assignment pane with Assignment type options displayed." lightbox="./media/role-assignments-portal/assignment-type-edit.png":::
89
91
90
-
This conversion might take a few moments. For more information, see [Edit assignment](role-assignments-portal.yml#edit-assignment-(preview)).
92
+
1. When finished, select **Save**.
93
+
94
+
Your updates might take a while to be processed and reflected in the portal.
91
95
92
96
1. Repeat these steps for all role assignments at management group, subscription, and resource group scopes that you want to convert.
93
97
94
-
If you have role assignments at resource scope that you want to convert, you'll have to make changes directly in PIM.
98
+
If you have role assignments at resource scope that you want to convert, you have to make changes directly in PIM.
95
99
96
100
### Option 2: Convert using PowerShell
97
101
@@ -107,7 +111,7 @@ There isn't a command or API to directly convert role assignments to a different
107
111
108
112
2. Use the [New-AzRoleEligibilityScheduleRequest](/powershell/module/az.resources/new-azroleeligibilityschedulerequest) command to remove your eligible role assignments.
109
113
110
-
The follow example shows how you can remove an eligible role assignment.
114
+
This example shows how you can remove an eligible role assignment.
111
115
112
116
```powershell
113
117
$guid = New-Guid
@@ -116,7 +120,7 @@ There isn't a command or API to directly convert role assignments to a different
116
120
117
121
3. Use the [New-AzRoleAssignmentScheduleRequest](/powershell/module/az.resources/new-azroleassignmentschedulerequest) command to remove your active time-bound role assignments.
118
122
119
-
The follow example shows how you can remove an active time-bound role assignment
123
+
This example shows how you can remove an active time-bound role assignment
120
124
121
125
```powershell
122
126
$guid = New-Guid
@@ -125,7 +129,7 @@ There isn't a command or API to directly convert role assignments to a different
125
129
126
130
4. Use the [Get-AzRoleAssignment](/powershell/module/az.resources/get-azroleassignment) and [New-AzRoleAssignment](/powershell/module/az.resources/new-azroleassignment) commands to create active permanent role assignments with Azure RBAC for every eligible and time-bound role assignment.
127
131
128
-
The following example shows how to create an active permanent role assignment with Azure RBAC.
132
+
This example shows how to create an active permanent role assignment with Azure RBAC.
@@ -138,7 +142,7 @@ There isn't a command or API to directly convert role assignments to a different
138
142
139
143
You can use Azure Policy to block creation of eligible or time-bound role assignments. For more information, see [What is Azure Policy?](/azure/governance/policy/overview).
140
144
141
-
Here is an example policy that blocks the creation of eligible and time-bound role assignments except for a specific list of identities to can receive them. Additional parameters and checks can be added for other allow conditions.
145
+
Here's an example policy that blocks the creation of eligible and time-bound role assignments except for a specific list of identities to can receive them. Additional parameters and checks can be added for other allow conditions.
0 commit comments