You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
With Azure Active Directory (Azure AD), a Global administrator can make **permanent** Azure AD admin role assignments. These role assignments can be created using the [Azure portal](../users-groups-roles/directory-assign-admin-roles.md) or using [PowerShell commands](/powershell/module/azuread#directory_roles).
21
21
22
-
The Azure AD Privileged Identity Management (PIM) service also allows Privileged Role Administrators to make permanent admin role assignments. Additionally, Privileged Role Administrators can make users **eligible** for Azure AD admin roles. An eligible administrator can activate the role when they need it, and then their permissions expire once they're done.
22
+
The Azure AD Privileged Identity Management (PIM) service also allows Privileged role administrators to make permanent admin role assignments. Additionally, Privileged role administrators can make users **eligible** for Azure AD admin roles. An eligible administrator can activate the role when they need it, and then their permissions expire once they're done.
23
23
24
24
## Determine your version of PIM
25
25
@@ -56,19 +56,9 @@ Follow these steps to make a user eligible for an Azure AD admin role.
56
56
57
57
1. Select a role you want to assign and then click **Select**.
58
58
59
-
The **Select a member or group** page opens.
59
+
1. Select a member to whom you want to assign to the role and then select **Select**.
60
60
61
-
1. Select a member or group you want to assign to the role and then select **Select**.
62
-
63
-

64
-
65
-
The Membership settings pane opens.
66
-
67
-
1. In the **Assignment type** list, select **Eligible** or **Active**.
Privileged Identity Management for Azure resources provides two distinct assignment types:
61
+
1. In the **Assignment type** list on the **Membership settings** pane, select **Eligible** or **Active**.
72
62
73
63
-**Eligible** assignments require the member of the role to perform an action to use the role. Actions might include performing a multi-factor authentication (MFA) check, providing a business justification, or requesting approval from designated approvers.
74
64
@@ -78,14 +68,10 @@ Follow these steps to make a user eligible for an Azure AD admin role.
78
68
79
69
Depending on the role settings, the check box might not appear or might be unmodifiable.
80
70
81
-
1. To specify a specific assignment duration, clear the check box and modify the start and/or end date and time boxes.
71
+
1. To specify a specific assignment duration, clear the check box and modify the start and/or end date and time boxes. When finished, select **Done**.
82
72
83
73

Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/pim-how-to-change-default-settings.md
+7-11Lines changed: 7 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
11
11
ms.topic: conceptual
12
12
ms.workload: identity
13
13
ms.subservice: pim
14
-
ms.date: 11/13/2019
14
+
ms.date: 02/05/2020
15
15
ms.author: curtand
16
16
ms.custom: pim
17
17
ms.collection: M365-identity-device-management
@@ -38,12 +38,8 @@ Follow the steps in this article to approve or deny requests for Azure AD roles.
38
38
Follow these steps to open the settings for an Azure AD role.
39
39
40
40
1. Sign in to [Azure portal](https://portal.azure.com/) with a user in the [Privileged Role Administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator) role.
41
-
42
-
1. Open **Azure AD Privileged Identity Management**.
43
-
44
-
1. Select **Azure AD roles**.
45
-
46
-
1. Select **Role settings**.
41
+
gt
42
+
1. Open **Azure AD Privileged Identity Management**>**Azure AD roles**>**Role settings**.
### Require Multi-Factor Authentication on active assignment
86
82
87
-
In some cases, you might want to assign a user or group to a role for a short duration (one day, for example). In this case, the assigned users don't need to request activation. In this scenario, Privileged Identity Management can't enforce multi-factor authentication when the user uses their role assignment because they are already active in the role from the time that it is assigned.
83
+
In some cases, you might want to assign a user to a role for a short duration (one day, for example). In this case, the assigned users don't need to request activation. In this scenario, Privileged Identity Management can't enforce multi-factor authentication when the user uses their role assignment because they are already active in the role from the time that it is assigned.
88
84
89
85
To ensure that the resource administrator fulfilling the assignment is who they say they are, you can enforce multi-factor authentication on active assignment by checking the **Require Multi-Factor Authentication on active assignment** box.
90
86
@@ -110,11 +106,11 @@ If you want to require approval to activate a role, follow these steps.
110
106
111
107
1. Check the **Require approval to activate** check box.
112
108
113
-
1. Select **Select approvers** to open the **Select a member or group** page.
109
+
1. Select **Select approvers**.
114
110
115
111

116
112
117
-
1. Select at least one user or group and then click **Select**. You can add any combination of users and groups. You must select at least one approver. There are no default approvers.
113
+
1. Select at least one user and then click **Select**. You must select at least one approver. There are no default approvers.
118
114
119
115
Your selections will appear in the list of selected approvers.
120
116
@@ -203,7 +199,7 @@ If you want to delegate the required approval to activate a role, follow these s
203
199
204
200

205
201
206
-
1. Select one or more approvers in addition to the Privileged role administrator and then click **Select**. You can select users or groups. We recommend that you add at least two approvers. Even if you add yourself as an approver, you can't self-approve a role activation. Your selections will appear in the list of selected approvers.
202
+
1. Select one or more approvers in addition to the Privileged role administrator and then click **Select**. We recommend that you add at least two approvers. Even if you add yourself as an approver, you can't self-approve a role activation. Your selections will appear in the list of selected approvers.
207
203
208
204
1. After you have specified your all your role settings, select **Save** to save your changes.
0 commit comments