Skip to content

Commit 4fae9f1

Browse files
authored
Merge pull request #207960 from amsliu/pim-update
update note
2 parents c070375 + ac7c744 commit 4fae9f1

File tree

1 file changed

+3
-4
lines changed

1 file changed

+3
-4
lines changed

articles/active-directory/privileged-identity-management/groups-features.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,14 @@ description: How to manage members and owners of privileged access groups in Pri
44
services: active-directory
55
documentationcenter: ''
66
author: amsliu
7-
manager: karenhoran
8-
7+
manager: amycolannino
98
ms.assetid:
109
ms.service: active-directory
1110
ms.subservice: pim
1211
ms.topic: overview
1312
ms.tgt_pltfrm: na
1413
ms.workload: identity
15-
ms.date: 06/24/2022
14+
ms.date: 08/15/2022
1615
ms.author: amsliu
1716
ms.custom: pim
1817
ms.collection: M365-identity-device-management
@@ -26,7 +25,7 @@ ms.collection: M365-identity-device-management
2625
In Privileged Identity Management (PIM), you can now assign eligibility for membership or ownership of privileged access groups. Starting with this preview, you can assign built-in roles in Azure Active Directory (Azure AD), part of Microsoft Entra, to cloud groups and use PIM to manage group member and owner eligibility and activation. For more information about role-assignable groups in Azure AD, see [Use Azure AD groups to manage role assignments](../roles/groups-concept.md).
2726

2827
> [!IMPORTANT]
29-
> To provide a group of users with just-in-time access to roles with permissions in SharePoint, Exchange, or Security & Compliance Center, be sure to make permanent assignments of users to the group, and then assign the group to a role as eligible for activation. If instead you assign a role permanently to a group and and assign users to be eligible to group membership, it might take significant time to have all permissions of the role activated and ready to use.
28+
> To provide a group of users with just-in-time access to Azure AD directory roles with permissions in SharePoint, Exchange, or Security & Compliance Center (for example, Exchange Administrator role), be sure to make active assignments of users to the group, and then assign the group to a role as eligible for activation. If instead you make active assignment of a role to a group and assign users to be eligible to group membership, it might take significant time to have all permissions of the role activated and ready to use.
3029
3130
> [!NOTE]
3231
> For privileged access groups that are used to elevate into Azure AD roles, we recommend that you require an approval process for eligible member assignments. Assignments that can be activated without approval might create a security risk from administrators who have a lower level of permissions. For example, the Helpdesk Administrator has permissions to reset an eligible user's password.

0 commit comments

Comments
 (0)