Skip to content

Commit 339b6db

Browse files
committed
Added note in PIM
1 parent 7be56d0 commit 339b6db

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

articles/active-directory/privileged-identity-management/azure-pim-resource-rbac.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.topic: article
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
1616
ms.subservice: pim
17-
ms.date: 11/08/2019
17+
ms.date: 01/10/2020
1818
ms.author: curtand
1919

2020
ms.collection: M365-identity-device-management
@@ -23,6 +23,9 @@ ms.collection: M365-identity-device-management
2323

2424
With Azure Active Directory (Azure AD) Privileged Identity Management (PIM), you can view activity, activations, and audit history for Azure resources roles within your organization. This includes subscriptions, resource groups, and even virtual machines. Any resource within the Azure portal that leverages the Azure role-based access control (RBAC) functionality can take advantage of the security and lifecycle management capabilities in Privileged Identity Management.
2525

26+
> [!NOTE]
27+
> If your organization has outsourced management functions to a service provider who uses [Azure delegated resource management](../../lighthouse/concepts/azure-delegated-resource-management.md), role assignments authorized by that service provider won't be shown here.
28+
2629
## View activity and activations
2730

2831
To see what actions a specific user took in various resources, you can view the Azure resource activity that's associated with a given activation period.

0 commit comments

Comments
 (0)