Skip to content

Commit 1749ead

Browse files
Merge pull request #234247 from amsliu/pim-roles-updates
pim roles updates
2 parents 90907cf + cc131ca commit 1749ead

File tree

4 files changed

+28
-9
lines changed

4 files changed

+28
-9
lines changed

articles/active-directory/privileged-identity-management/groups-assign-member-owner.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: conceptual
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 01/12/2023
13+
ms.date: 4/12/2023
1414
ms.author: amsliu
1515
ms.reviewer: ilyal
1616
ms.custom: pim
@@ -31,7 +31,10 @@ When a membership or ownership is assigned, the assignment:
3131
3232
## Assign an owner or member of a group
3333

34-
Follow these steps to make a user eligible member or owner of a group. You will need to have Global Administrator, Privileged Role Administrator role, or be an Owner of the group.
34+
Follow these steps to make a user eligible member or owner of a group. You will need permissions to manage groups. For role-assignable groups, you need to have Global Administrator, Privileged Role Administrator role, or be an Owner of the group. For non-role-assignable groups, you need to have Global Administrator, Directory Writer, Groups Administrator, Identity Governance Administrator, User Administrator role, or be an Owner of the group. Role assignments for administrators should be scoped at directory level (not administrative unit level).
35+
36+
> [!NOTE]
37+
> Other roles with permissions to manage groups (such as Exchange Administrators for non-role-assignable M365 groups) and administrators with assignments scoped at administrative unit level can manage groups through Groups API/UX and override changes made in Azure AD PIM.
3538
3639
1. [Sign in to the Azure portal](https://portal.azure.com).
3740

@@ -71,7 +74,10 @@ Follow these steps to make a user eligible member or owner of a group. You will
7174

7275
## Update or remove an existing role assignment
7376

74-
Follow these steps to update or remove an existing role assignment. You will need to have Global Administrator, Privileged Role Administrator role, or Owner role of the group.
77+
Follow these steps to update or remove an existing role assignment. You will need permissions to manage groups. For role-assignable groups, you need to have Global Administrator, Privileged Role Administrator role, or be an Owner of the group. For non-role-assignable groups, you need to have Global Administrator, Directory Writer, Groups Administrator, Identity Governance Administrator, User Administrator role, or be an Owner of the group. Role assignments for administrators should be scoped at directory level (not administrative unit level).
78+
79+
> [!NOTE]
80+
> Other roles with permissions to manage groups (such as Exchange Administrators for non-role-assignable M365 groups) and administrators with assignments scoped at administrative unit level can manage groups through Groups API/UX and override changes made in Azure AD PIM.
7581
7682
1. [Sign in to the Azure portal](https://portal.azure.com) with appropriate role permissions.
7783

articles/active-directory/privileged-identity-management/groups-discover-groups.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 01/12/2023
13+
ms.date: 4/12/2023
1414
ms.author: amsliu
1515
ms.reviewer: ilyal
1616
ms.collection: M365-identity-device-management
@@ -26,7 +26,10 @@ Before you will start, you need an Azure AD Security group or Microsoft 365 grou
2626

2727
Dynamic groups and groups synchronized from on-premises environment cannot be managed in PIM for Groups.
2828

29-
You should either be a group Owner, have Global Administrator role, or Privileged Role Administrator role to bring the group under management with PIM.
29+
You need appropriate permissions to bring groups in Azure AD PIM. For role-assignable groups, you need to have Global Administrator, Privileged Role Administrator role, or be an Owner of the group. For non-role-assignable groups, you need to have Global Administrator, Directory Writer, Groups Administrator, Identity Governance Administrator, User Administrator role, or be an Owner of the group. Role assignments for administrators should be scoped at directory level (not administrative unit level).
30+
31+
> [!NOTE]
32+
> Other roles with permissions to manage groups (such as Exchange Administrators for non-role-assignable M365 groups) and administrators with assignments scoped at administrative unit level can manage groups through Groups API/UX and override changes made in Azure AD PIM.
3033
3134

3235
1. [Sign in to the Azure portal](https://portal.azure.com).

articles/active-directory/privileged-identity-management/groups-renew-extend.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.tgt_pltfrm: na
1212
ms.topic: how-to
1313
ms.subservice: pim
14-
ms.date: 01/12/2023
14+
ms.date: 4/12/2023
1515
ms.author: amsliu
1616
ms.custom: pim
1717
ms.collection: M365-identity-device-management
@@ -23,7 +23,12 @@ Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part
2323

2424
## Who can extend and renew
2525

26-
Only Global Administrators, Privileged Role Administrators, or group owners can extend or renew group membership/ownership time-bound assignments. The affected user or group can request to extend assignments that are about to expire and request to renew assignments that are already expired.
26+
Only users with permissions to manage groups can extend or renew group membership or ownership time-bound assignments. The affected user or group can request to extend assignments that are about to expire and request to renew assignments that are already expired.
27+
28+
Role-assignable groups can be managed by Global Administrator, Privileged Role Administrator, or Owner of the group. Non-role-assignable groups can be managed by Global Administrator, Directory Writer, Groups Administrator, Identity Governance Administrator, User Administrator, or Owner of the group. Role assignments for administrators should be scoped at directory level (not Administrative Unit level).
29+
30+
> [!NOTE]
31+
> Other roles with permissions to manage groups (such as Exchange Administrators for non-role-assignable M365 groups) and administrators with assignments scoped at administrative unit level can manage groups through Groups API/UX and override changes made in Azure AD PIM.
2732
2833
## When notifications are sent
2934

articles/active-directory/privileged-identity-management/groups-role-settings.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 01/27/2023
13+
ms.date: 4/12/2023
1414
ms.author: amsliu
1515
ms.custom: pim
1616
ms.collection: M365-identity-device-management
@@ -20,7 +20,12 @@ ms.collection: M365-identity-device-management
2020

2121
In Privileged Identity Management (PIM) for groups in Azure Active Directory (Azure AD), part of Microsoft Entra, role settings define membership or ownership assignment properties: MFA and approval requirements for activation, assignment maximum duration, notification settings, etc. Use the following steps to configure role settings and set up the approval workflow to specify who can approve or deny requests to elevate privilege.
2222

23-
You need to have Global Administrator, Privileged Role Administrator, or group Owner permissions to manage settings for membership or ownership assignments of the group. Role settings are defined per role per group: all assignments for the same role (member or owner) for the same group follow same role settings. Role settings of one group are independent from role settings of another group. Role settings for one role (member) are independent from role settings for another role (owner).
23+
You will need group management permissions to manage settings. For role-assignable groups, you need to have Global Administrator, Privileged Role Administrator role, or be an Owner of the group. For non-role assignable groups, you need to have Global Administrator, Directory Writer, Groups Administrator, Identity Governance Administrator, User Administrator role, or be an Owner of the group. Role assignments for administrators should be scoped at directory level (not Administrative Unit level).
24+
25+
> [!NOTE]
26+
> Other roles with permissions to manage groups (such as Exchange Administrators for non-role-assignable M365 groups) and administrators with assignments scoped at administrative unit level can manage groups through Groups API/UX and override changes made in Azure AD PIM.
27+
28+
Role settings are defined per role per group: all assignments for the same role (member or owner) for the same group follow same role settings. Role settings of one group are independent from role settings of another group. Role settings for one role (member) are independent from role settings for another role (owner).
2429

2530

2631
## Update role settings

0 commit comments

Comments
 (0)