Skip to content

Commit 0f94b2b

Browse files
authored
Merge pull request #223911 from amsliu/pim-updates-1
pim for groups update
2 parents eb8c32b + fd8872a commit 0f94b2b

34 files changed

+306
-362
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11055,6 +11055,16 @@
1105511055
"source_path_from_root": "/articles/active-directory/develop/microsoft-graph-intro.md",
1105611056
"redirect_url": "/graph/overview?toc=/azure/active-directory/develop/toc.json&bc=/azure/active-directory/develop/breadcrumb/toc.json",
1105711057
"redirect_document_id": false
11058+
},
11059+
{
11060+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/concept-privileged-access-versus-role-assignable.md",
11061+
"redirect_url": "azure/active-directory/privileged-identity-management/concept-pim-for-groups",
11062+
"redirect_document_id": false
11063+
},
11064+
{
11065+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/groups-features.md",
11066+
"redirect_url": "azure/active-directory/privileged-identity-management/concept-pim-for-groups",
11067+
"redirect_document_id": false
1105811068
}
1105911069
]
1106011070
}

articles/active-directory/privileged-identity-management/TOC.yml

Lines changed: 14 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,8 @@
88
items:
99
- name: License requirements
1010
href: subscription-requirements.md
11-
- name: Privileged Access groups
12-
href: groups-features.md
13-
- name: Role-assignable vs Privileged Access groups
14-
href: concept-privileged-access-versus-role-assignable.md
11+
- name: PIM for Groups
12+
href: concept-pim-for-groups.md
1513
- name: Roles you can't manage with PIM
1614
href: pim-roles.md
1715
- name: Secure privileged access in Azure AD
@@ -32,51 +30,51 @@
3230
href: pim-deployment-plan.md
3331
- name: Start using PIM
3432
href: pim-getting-started.md
33+
- name: Bring under management
34+
items:
35+
- name: Azure resources
36+
href: pim-resource-roles-discover-resources.md
37+
- name: Groups
38+
href: groups-discover-groups.md
3539
- name: Assign
3640
items:
3741
- name: Azure AD roles
3842
href: pim-how-to-add-role-to-user.md
3943
- name: Azure roles
4044
href: pim-resource-roles-assign-roles.md
41-
- name: Privileged Access groups
45+
- name: Groups
4246
href: groups-assign-member-owner.md
4347
- name: Activate
4448
items:
4549
- name: Azure AD roles
4650
href: pim-how-to-activate-role.md
4751
- name: Azure roles
4852
href: pim-resource-roles-activate-your-roles.md
49-
- name: Privileged Access groups
53+
- name: Groups
5054
href: groups-activate-roles.md
5155
- name: Approve
5256
items:
5357
- name: Azure AD roles
5458
href: azure-ad-pim-approval-workflow.md
5559
- name: Azure roles
5660
href: pim-resource-roles-approval-workflow.md
57-
- name: Privileged Access groups
61+
- name: Groups
5862
href: groups-approval-workflow.md
59-
- name: Bring under management
60-
items:
61-
- name: Azure resources
62-
href: pim-resource-roles-discover-resources.md
63-
- name: Privileged Access groups
64-
href: groups-discover-groups.md
6563
- name: Extend or renew
6664
items:
6765
- name: Azure AD roles
6866
href: pim-how-to-renew-extend.md
6967
- name: Azure roles
7068
href: pim-resource-roles-renew-extend.md
71-
- name: Privileged Access groups
69+
- name: Groups
7270
href: groups-renew-extend.md
7371
- name: Set role settings
7472
items:
7573
- name: Azure AD roles
7674
href: pim-how-to-change-default-settings.md
7775
- name: Azure roles
7876
href: pim-resource-roles-configure-role-settings.md
79-
- name: Privileged Access groups
77+
- name: Groups
8078
href: groups-role-settings.md
8179
- name: Set up alerts
8280
items:
@@ -90,7 +88,7 @@
9088
href: pim-how-to-use-audit-log.md
9189
- name: Azure roles
9290
href: azure-pim-resource-rbac.md
93-
- name: Privileged Access groups
91+
- name: Groups
9492
href: groups-audit.md
9593
- name: Review access
9694
items:
Lines changed: 73 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
---
2+
title: Privileged Identity Management (PIM) for Groups (preview) - Azure Active Directory
3+
description: How to manage Azure AD Privileged Identity Management (PIM) for Groups.
4+
services: active-directory
5+
documentationcenter: ''
6+
author: amsliu
7+
manager: amycolannino
8+
ms.assetid:
9+
ms.service: active-directory
10+
ms.subservice: pim
11+
ms.topic: overview
12+
ms.tgt_pltfrm: na
13+
ms.workload: identity
14+
ms.date: 01/11/2023
15+
ms.author: amsliu
16+
ms.custom: pim
17+
ms.collection: M365-identity-device-management
18+
19+
20+
#Customer intent: As a dev or IT admin, I want to manage group assignments in PIM, so that I can grant eligibility for elevation to a role assigned via group membership
21+
---
22+
23+
# Privileged Identity Management (PIM) for Groups (preview)
24+
25+
With Azure Active Directory (Azure AD), part of Microsoft Entra, you can provide users just-in-time membership in the group and just-in-time ownership of the group using the Azure AD Privileged Identity Management for Groups feature. These groups can be used to govern access to a variety of scenarios that include Azure AD roles, Azure roles, as well as Azure SQL, Azure Key Vault, Intune, other application roles, and 3rd party applications.
26+
27+
## What is PIM for Groups?
28+
29+
PIM for Groups is part of Azure AD Privileged Identity Management – alongside with PIM for Azure AD Roles and PIM for Azure Resources, PIM for Groups enables users to activate the ownership or membership of an Azure AD security group or Microsoft 365 group. Groups can be used to govern access to a variety of scenarios that include Azure AD roles, Azure roles, as well as Azure SQL, Azure Key Vault, Intune, other application roles, and 3rd party applications.
30+
31+
With PIM for Groups you can use policies similar to ones you use in PIM for Azure AD Roles and PIM for Azure Resources: you can require approval for membership or ownership activation, enforce multi-factor authentication (MFA), require justification, limit maximum activation time, and more. Each group in PIM for Groups has two policies: one for activation of membership and another for activation of ownership in the group. Up until January 2023, PIM for Groups feature was called “Privileged Access Groups”.
32+
33+
>[!Note]
34+
> For groups used for elevating into Azure AD roles, we recommend that you require an approval process for eligible member assignments. Assignments that can be activated without approval can leave you vulnerable to a security risk from less-privileged administrators. For example, the Helpdesk Administrator has permission to reset an eligible user's passwords.
35+
36+
## What are Azure AD role-assignable groups?
37+
38+
With Azure Active Directory (Azure AD), part of Microsoft Entra, you can assign a cloud Azure AD security group or Microsoft 365 group to an Azure AD role. This is possible only with groups that are created as role-assignable.
39+
40+
To learn more about Azure AD role-assignable groups, see [Create a role-assignable group in Azure Active Directory](../roles/groups-create-eligible.md).
41+
42+
Role-assignable groups benefit from extra protections comparing to non-role-assignable groups:
43+
- For role-assignable groups, only the Global Administrator, Privileged Role Administrator, or the group Owner can manage the group. Also, no other users can change the credentials of the users who are (active) members of the group. This feature helps prevent an admin from elevating to a higher privileged role without going through a request and approval procedure.
44+
- For non-role-assignable groups, various Azure AD roles can manage group – that includes Exchange Administrators, Groups Administrators, User Administrators, etc. Also, various roles Azure AD roles can change the credentials of the users who are (active) members of the group – that includes Authentication Administrators, Helpdesk Administrators, User Administrators, etc.
45+
46+
To learn more about Azure AD built-in roles and their permissions, see [Azure AD built-in roles](../roles/permissions-reference.md).
47+
48+
One Azure AD tenant can have up to 500 role-assignable groups. To learn more about Azure AD service limits and restrictions, see [Azure AD service limits and restrictions](../enterprise-users/directory-service-limits-restrictions.md).
49+
50+
Azure AD role-assignable group feature is not part of Azure AD Privileged Identity Management (Azure AD PIM). It requires Azure AD Premium P1 or P2 license.
51+
52+
## Relationship between role-assignable groups and PIM for Groups
53+
54+
Groups can be role-assignable or non-role-assignable. The group can be enabled in PIM for Groups or not enabled in PIM for Groups. These are independent properties of the group. Any Azure AD security group and any Microsoft 365 group (except dynamic groups and groups synchronized from on-premises environment) can be enabled in PIM for Groups. The group does not have to be role-assignable group to be enabled in PIM for Groups.
55+
56+
If you want to assign Azure AD role to a group, it has to be role-assignable. Even if you do not intend to assign Azure AD role to the group but the group provides access to sensitive resources, it is still recommended to consider creating the group as role-assignable. This is because of extra protections role-assignable groups have – see “What are Azure AD role-assignable groups?” in the section above.
57+
58+
Up until January 2023, it was required that every Privileged Access Group (former name for this PIM for Groups feature) had to be role-assignable group. This restriction is currently removed. Because of that, it is now possible to enable more than 500 groups per tenant in PIM, but only up to 500 groups can be role-assignable.
59+
60+
## Making group of users eligible for Azure AD role
61+
62+
There are two ways to make a group of users eligible for Azure AD role:
63+
1. Make active assignments of users to the group, and then assign the group to a role as eligible for activation.
64+
2. Make active assignment of a role to a group and assign users to be eligible to group membership.
65+
66+
To provide a group of users with just-in-time access to Azure AD directory roles with permissions in SharePoint, Exchange, or Security & Microsoft Purview compliance portal (for example, Exchange Administrator role), be sure to make active assignments of users to the group, and then assign the group to a role as eligible for activation (Option #1 above). If you choose to make active assignment of a group to a role and assign users to be eligible to group membership instead, it may take significant time to have all permissions of the role activated and ready to use.
67+
68+
## Next steps
69+
70+
- [Bring groups into Privileged Identity Management (preview)](groups-discover-groups.md)
71+
- [Assign eligibility for a group (preview) in Privileged Identity Management](groups-assign-member-owner.md)
72+
- [Activate your group membership or ownership in Privileged Identity Management](groups-activate-roles.md)
73+
- [Approve activation requests for group members and owners (preview)](groups-approval-workflow.md)

articles/active-directory/privileged-identity-management/concept-privileged-access-versus-role-assignable.md

Lines changed: 0 additions & 52 deletions
This file was deleted.

0 commit comments

Comments
 (0)