Skip to content

Commit 4b543a3

Browse files
committed
PIM edits
1 parent 48ed9dd commit 4b543a3

File tree

1 file changed

+8
-5
lines changed

1 file changed

+8
-5
lines changed

articles/role-based-access-control/check-access.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -62,9 +62,10 @@ If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, [M
6262

6363
The following shows an example of the Access control (IAM) page for a resource group.
6464

65+
6566
:::image type="content" source="./media/check-access/rg-access-control-pim.png" alt-text="Screenshot of resource group access control and Check access tab for PIM integration." lightbox="./media/check-access/rg-access-control-pim.png":::
6667

67-
If you have Microsoft Entra Privileged Identity Management (PIM), you also see [eligible and time-bound role assignments](pim-integration.md).
68+
This page lists any [eligible and time-bound role assignments](pim-integration.md). To activate any eligible role assignments, select **Activate role**. For more information, see [Activate eligible Azure role assignments](./role-assignments-eligible-activate.md).
6869

6970
---
7071

@@ -78,11 +79,13 @@ If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, [M
7879

7980
1. Select **Access control (IAM)**.
8081

81-
1. On the **Check access** tab, select the **Check access** button.
82+
1. On the **My access** tab, select the **Check access** button.
83+
84+
A **Check access** pane appears.
8285

83-
1. In the **Check access** pane, select **User, group, or service principal**.
86+
1. Select **User, group, or service principal**.
8487

85-
1. In the search box, enter a string to search the directory for display names, email addresses, or object identifiers.
88+
1. In the search box, enter a string to search the directory for name or email addresses.
8689

8790
:::image type="content" source="./media/shared/rg-check-access-select.png" alt-text="Screenshot of Check access select list." lightbox="./media/shared/rg-check-access-select.png":::
8891

@@ -118,7 +121,7 @@ If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, [M
118121
- Deny assignments managed by Azure.
119122
- Classic Service Administrator or Co-Administrator assignments for classic deployments.
120123

121-
If you have PIM, you also see a **Eligible assignments** tab with [eligible and time-bound role assignments](pim-integration.md).
124+
You also see a **Eligible assignments** tab with [eligible and time-bound role assignments](pim-integration.md).
122125

123126
:::image type="content" source="./media/check-access/rg-check-access-assignments-user-pim.png" alt-text="Screenshot of role and deny assignments pane for a user for PIM integration." lightbox="./media/check-access/rg-check-access-assignments-user-pim.png":::
124127

0 commit comments

Comments
 (0)