Skip to content

Commit 301a6fb

Browse files
authored
Merge pull request #103423 from curtand/pim0205
[Azure AD PIM] remove references to group role assignments
2 parents 38bfc55 + 9a2bf19 commit 301a6fb

File tree

4 files changed

+14
-32
lines changed

4 files changed

+14
-32
lines changed

articles/active-directory/privileged-identity-management/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@
6767
href: azure-ad-custom-roles-configure.md
6868
- name: View audit history
6969
href: pim-how-to-use-audit-log.md
70-
- name: Manage Azure resource roles
70+
- name: Manage Azure roles
7171
items:
7272
- name: Assign roles
7373
href: pim-resource-roles-assign-roles.md
@@ -97,7 +97,7 @@
9797
href: pim-how-to-perform-security-review.md
9898
- name: Complete an access review
9999
href: pim-how-to-complete-review.md
100-
- name: Azure resource roles
100+
- name: Azure roles
101101
items:
102102
- name: Create an access review
103103
href: pim-resource-roles-start-access-review.md
Loading

articles/active-directory/privileged-identity-management/pim-how-to-add-role-to-user.md

Lines changed: 5 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.topic: conceptual
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 09/17/2019
13+
ms.date: 01/05/2020
1414
ms.author: curtand
1515
ms.collection: M365-identity-device-management
1616
---
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
With Azure Active Directory (Azure AD), a Global administrator can make **permanent** Azure AD admin role assignments. These role assignments can be created using the [Azure portal](../users-groups-roles/directory-assign-admin-roles.md) or using [PowerShell commands](/powershell/module/azuread#directory_roles).
2121

22-
The Azure AD Privileged Identity Management (PIM) service also allows Privileged Role Administrators to make permanent admin role assignments. Additionally, Privileged Role Administrators can make users **eligible** for Azure AD admin roles. An eligible administrator can activate the role when they need it, and then their permissions expire once they're done.
22+
The Azure AD Privileged Identity Management (PIM) service also allows Privileged role administrators to make permanent admin role assignments. Additionally, Privileged role administrators can make users **eligible** for Azure AD admin roles. An eligible administrator can activate the role when they need it, and then their permissions expire once they're done.
2323

2424
## Determine your version of PIM
2525

@@ -56,19 +56,9 @@ Follow these steps to make a user eligible for an Azure AD admin role.
5656

5757
1. Select a role you want to assign and then click **Select**.
5858

59-
The **Select a member or group** page opens.
59+
1. Select a member to whom you want to assign to the role and then select **Select**.
6060

61-
1. Select a member or group you want to assign to the role and then select **Select**.
62-
63-
![Select a member or group pane](./media/pim-resource-roles-assign-roles/resources-select-member-or-group.png)
64-
65-
The Membership settings pane opens.
66-
67-
1. In the **Assignment type** list, select **Eligible** or **Active**.
68-
69-
![Memberships settings pane](./media/pim-resource-roles-assign-roles/resources-membership-settings-type.png)
70-
71-
Privileged Identity Management for Azure resources provides two distinct assignment types:
61+
1. In the **Assignment type** list on the **Membership settings** pane, select **Eligible** or **Active**.
7262

7363
- **Eligible** assignments require the member of the role to perform an action to use the role. Actions might include performing a multi-factor authentication (MFA) check, providing a business justification, or requesting approval from designated approvers.
7464

@@ -78,14 +68,10 @@ Follow these steps to make a user eligible for an Azure AD admin role.
7868

7969
Depending on the role settings, the check box might not appear or might be unmodifiable.
8070

81-
1. To specify a specific assignment duration, clear the check box and modify the start and/or end date and time boxes.
71+
1. To specify a specific assignment duration, clear the check box and modify the start and/or end date and time boxes. When finished, select **Done**.
8272

8373
![Memberships settings - date and time](./media/pim-resource-roles-assign-roles/resources-membership-settings-date.png)
8474

85-
1. When finished, select **Done**.
86-
87-
![New assignment - Add](./media/pim-resource-roles-assign-roles/resources-new-assignment-add.png)
88-
8975
1. To create the new role assignment, select **Add**. A notification of the status is displayed.
9076

9177
![New assignment - Notification](./media/pim-resource-roles-assign-roles/resources-new-assignment-notification.png)

articles/active-directory/privileged-identity-management/pim-how-to-change-default-settings.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.topic: conceptual
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 11/13/2019
14+
ms.date: 02/05/2020
1515
ms.author: curtand
1616
ms.custom: pim
1717
ms.collection: M365-identity-device-management
@@ -38,12 +38,8 @@ Follow the steps in this article to approve or deny requests for Azure AD roles.
3838
Follow these steps to open the settings for an Azure AD role.
3939

4040
1. Sign in to [Azure portal](https://portal.azure.com/) with a user in the [Privileged Role Administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator) role.
41-
42-
1. Open **Azure AD Privileged Identity Management**.
43-
44-
1. Select **Azure AD roles**.
45-
46-
1. Select **Role settings**.
41+
gt
42+
1. Open **Azure AD Privileged Identity Management** > **Azure AD roles** > **Role settings**.
4743

4844
![Role settings page listing Azure resource roles](./media/pim-resource-roles-configure-role-settings/resources-role-settings.png)
4945

@@ -84,7 +80,7 @@ Privileged Identity Management provides optional enforcement of Azure Multi-Fact
8480

8581
### Require Multi-Factor Authentication on active assignment
8682

87-
In some cases, you might want to assign a user or group to a role for a short duration (one day, for example). In this case, the assigned users don't need to request activation. In this scenario, Privileged Identity Management can't enforce multi-factor authentication when the user uses their role assignment because they are already active in the role from the time that it is assigned.
83+
In some cases, you might want to assign a user to a role for a short duration (one day, for example). In this case, the assigned users don't need to request activation. In this scenario, Privileged Identity Management can't enforce multi-factor authentication when the user uses their role assignment because they are already active in the role from the time that it is assigned.
8884

8985
To ensure that the resource administrator fulfilling the assignment is who they say they are, you can enforce multi-factor authentication on active assignment by checking the **Require Multi-Factor Authentication on active assignment** box.
9086

@@ -110,11 +106,11 @@ If you want to require approval to activate a role, follow these steps.
110106

111107
1. Check the **Require approval to activate** check box.
112108

113-
1. Select **Select approvers** to open the **Select a member or group** page.
109+
1. Select **Select approvers**.
114110

115111
![Select a user or group pane to select approvers](./media/pim-resource-roles-configure-role-settings/resources-role-settings-select-approvers.png)
116112

117-
1. Select at least one user or group and then click **Select**. You can add any combination of users and groups. You must select at least one approver. There are no default approvers.
113+
1. Select at least one user and then click **Select**. You must select at least one approver. There are no default approvers.
118114

119115
Your selections will appear in the list of selected approvers.
120116

@@ -203,7 +199,7 @@ If you want to delegate the required approval to activate a role, follow these s
203199

204200
![Azure AD roles - Settings - Require approval](./media/pim-how-to-change-default-settings/pim-directory-roles-settings-require-approval-select-approvers.png)
205201

206-
1. Select one or more approvers in addition to the Privileged role administrator and then click **Select**. You can select users or groups. We recommend that you add at least two approvers. Even if you add yourself as an approver, you can't self-approve a role activation. Your selections will appear in the list of selected approvers.
202+
1. Select one or more approvers in addition to the Privileged role administrator and then click **Select**. We recommend that you add at least two approvers. Even if you add yourself as an approver, you can't self-approve a role activation. Your selections will appear in the list of selected approvers.
207203

208204
1. After you have specified your all your role settings, select **Save** to save your changes.
209205

0 commit comments

Comments
 (0)