Skip to content

Commit 5013e53

Browse files
committed
Preview, link, screenshot updates
1 parent 3df6912 commit 5013e53

8 files changed

+15
-56
lines changed
114 KB
Loading

articles/role-based-access-control/pim-integration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ If you want to see which users are using the PIM funcationality, here are option
5454

5555
You can group and sort by **State**, and look for role assignments that aren't the **Active permanent** type.
5656

57-
:::image type="content" source="./media/role-assignments-list-portal/sub-access-control-role-assignments-eligible.png" alt-text="Screenshot of Access control and Active assignments and Eligible assignments tabs." lightbox="./media/role-assignments-list-portal/sub-access-control-role-assignments-eligible.png":::
57+
:::image type="content" source="./media/shared/sub-access-control-role-assignments-eligible.png" alt-text="Screenshot of Access control and Active assignments and Eligible assignments tabs." lightbox="./media/shared/sub-access-control-role-assignments-eligible.png":::
5858

5959
### Option 2: List using PowerShell
6060

@@ -87,7 +87,7 @@ If your organization has process or compliance reasons to limit the use of PIM,
8787

8888
For more information, see [Edit assignment](role-assignments-portal.yml#edit-assignment-(preview)).
8989

90-
:::image type="content" source="./media/role-assignments-portal/assignment-type-edit.png" alt-text="Screenshot of Edit assignment pane with Assignment type options displayed." lightbox="./media/role-assignments-portal/assignment-type-edit.png":::
90+
:::image type="content" source="./media/shared/assignment-type-edit.png" alt-text="Screenshot of Edit assignment pane with Assignment type options displayed." lightbox="./media/shared/assignment-type-edit.png":::
9191

9292
1. When finished, select **Save**.
9393

articles/role-based-access-control/role-assignments-eligible-activate.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,15 @@
11
---
2-
title: Activate eligible Azure role assignments (Preview) - Azure RBAC
2+
title: Activate eligible Azure role assignments - Azure RBAC
33
description: Learn how to activate eligible Azure role assignments in Azure role-based access control (Azure RBAC) using the Azure portal.
44
author: rolyon
55
manager: amycolannino
66
ms.service: role-based-access-control
77
ms.topic: how-to
8-
ms.date: 06/27/2024
8+
ms.date: 11/11/2024
99
ms.author: rolyon
1010
---
1111

12-
# Activate eligible Azure role assignments (Preview)
13-
14-
> [!IMPORTANT]
15-
> Azure role assignment integration with Privileged Identity Management is currently in PREVIEW.
16-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
12+
# Activate eligible Azure role assignments
1713

1814
Eligible Azure role assignments provide just-in-time access to a role for a limited period of time. Microsoft Entra Privileged Identity Management (PIM) role activation has been integrated into the Access control (IAM) page in the Azure portal. If you have been made eligible for an Azure role, you can activate that role using the Azure portal. This capability is being deployed in stages, so it might not be available yet in your tenant or your interface might look different.
1915

@@ -73,5 +69,5 @@ These steps describe how to activate an eligible role assignment using the Azure
7369

7470
## Next steps
7571

76-
- [Integration with Privileged Identity Management (Preview)](./role-assignments.md#integration-with-privileged-identity-management-preview)
72+
- [Eligible and time-bound role assignments in Azure RBAC](./pim-integration.md)
7773
- [Activate my Azure resource roles in Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-resource-roles-activate-your-roles)

articles/role-based-access-control/role-assignments-list-portal.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ procedureSection:
112112
113113
If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, your **Role assignments** tab is similar to the following screenshot for management group, subscription, and resource group scopes. This capability is being deployed in stages, so it might not be available yet in your tenant or your interface might look different.
114114
115-
:::image type="content" source="./media/role-assignments-list-portal/sub-access-control-role-assignments-eligible.png" alt-text="Screenshot of Access control and Active assignments and Eligible assignments tabs." lightbox="./media/role-assignments-list-portal/sub-access-control-role-assignments-eligible.png":::
115+
:::image type="content" source="./media/shared/sub-access-control-role-assignments-eligible.png" alt-text="Screenshot of Access control and Active assignments and Eligible assignments tabs." lightbox="./media/shared/sub-access-control-role-assignments-eligible.png":::
116116
117117
You see a **State** column with one of the following states:
118118

articles/role-based-access-control/role-assignments-portal.yml

Lines changed: 6 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ metadata:
66
author: rolyon
77
ms.author: rolyon
88
manager: amycolannino
9-
ms.date: 08/30/2024
9+
ms.date: 11/11/2024
1010
ms.service: role-based-access-control
1111
ms.topic: how-to
1212
ms.custom:
@@ -167,13 +167,9 @@ procedureSection:
167167
Follow the steps in [Add or edit Azure role assignment conditions](conditions-role-assignments-portal.md#step-3-review-basics).
168168
169169
- title: |
170-
Step 6: Select assignment type (Preview)
170+
Step 6: Select assignment type
171171
summary: |
172-
> [!IMPORTANT]
173-
> Azure role assignment integration with Privileged Identity Management is currently in PREVIEW.
174-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
175-
176-
If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, an **Assignment type** tab will appear for management group, subscription, and resource group scopes. Use eligible assignments to provide just-in-time access to a role. This capability is being deployed in stages, so it might not be available yet in your tenant or your interface might look different. For more information, see [Integration with Privileged Identity Management (Preview)](./role-assignments.md#integration-with-privileged-identity-management-preview).
172+
If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, an **Assignment type** tab will appear for management group, subscription, and resource group scopes. Use eligible assignments to provide just-in-time access to a role. This capability is being deployed in stages, so it might not be available yet in your tenant or your interface might look different. For more information, see [Eligible and time-bound role assignments in Azure RBAC](././pim-integration.md).
177173
178174
If you don't want to use the PIM functionality, select the **Active** assignment type and **Permanent** assignment duration options. These settings create a role assignment where the principal always has permissions in the role.
179175
steps:
@@ -222,13 +218,9 @@ procedureSection:
222218
If you don't see the description for the role assignment, click **Edit columns** to add the **Description** column.
223219
224220
- title: |
225-
Edit assignment (Preview)
221+
Edit assignment
226222
summary: |
227-
> [!IMPORTANT]
228-
> Azure role assignment integration with Privileged Identity Management is currently in PREVIEW.
229-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
230-
231-
If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, you can edit your role assignment type settings. For more information, see [Integration with Privileged Identity Management (Preview)](./role-assignments.md#integration-with-privileged-identity-management-preview).
223+
If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, you can edit your role assignment type settings. For more information, see [Eligible and time-bound role assignments in Azure RBAC](./pim-integration.md).
232224
steps:
233225
- |
234226
On the **Access control (IAM)** page, click the **Role assignments** tab to view the role assignments at this scope.
@@ -241,7 +233,7 @@ procedureSection:
241233
242234
The **Edit assignment** pane appears where you can update the role assignment type settings. The pane might take a few moments to open.
243235
244-
:::image type="content" source="./media/role-assignments-portal/assignment-type-edit.png" alt-text="Screenshot of Edit assignment pane with Assignment type options displayed." lightbox="./media/role-assignments-portal/assignment-type-edit.png":::
236+
:::image type="content" source="./media/shared/assignment-type-edit.png" alt-text="Screenshot of Edit assignment pane with Assignment type options displayed." lightbox="./media/shared/assignment-type-edit.png":::
245237
- |
246238
When finished, click **Save**.
247239

articles/role-based-access-control/role-assignments.md

Lines changed: 2 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about Azure role assignments in Azure role-based access contr
44
author: rolyon
55
ms.service: role-based-access-control
66
ms.topic: conceptual
7-
ms.date: 08/30/2024
7+
ms.date: 11/11/2024
88
ms.author: rolyon
99
---
1010
# Understand Azure role assignments
@@ -148,37 +148,8 @@ The preceding condition allows users to read blobs with a blob index tag key of
148148

149149
For more information about conditions, see [What is Azure attribute-based access control (Azure ABAC)?](conditions-overview.md)
150150

151-
## Integration with Privileged Identity Management (Preview)
152-
153-
> [!IMPORTANT]
154-
> Azure role assignment integration with Privileged Identity Management is currently in PREVIEW.
155-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
156-
157-
If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, [Microsoft Entra Privileged Identity Management (PIM)](/entra/id-governance/privileged-identity-management/pim-configure) is integrated into role assignment steps. For example, you can assign roles to users for a limited period of time. You can also make users eligible for role assignments so that they must activate to use the role, such as request approval. Eligible role assignments provide just-in-time access to a role for a limited period of time. You can't create eligible role assignments for applications, service principals, or managed identities because they can't perform the activation steps. You can create eligible role assignments at management group, subscription, and resource group scope, but not at resource scope. This capability is being deployed in stages, so it might not be available yet in your tenant or your interface might look different.
158-
159-
The assignment type options available to you might vary depending or your PIM policy. For example, PIM policy defines whether permanent assignments can be created, maximum duration for time-bound assignments, roles activations requirements (approval, multifactor authentication, or Conditional Access authentication context), and other settings. For more information, see [Configure Azure resource role settings in Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-resource-roles-configure-role-settings).
160-
161-
If you don't want to use the PIM functionality, select the **Active** assignment type and **Permanent** assignment duration options. These settings create a role assignment where the principal always has permissions in the role.
162-
163-
:::image type="content" source="./media/shared/assignment-type-eligible.png" alt-text="Screenshot of Add role assignment with Assignment type options displayed." lightbox="./media/shared/assignment-type-eligible.png":::
164-
165-
To better understand PIM, you should review the following terms.
166-
167-
| Term or concept | Role assignment category | Description |
168-
| --- | --- | --- |
169-
| eligible | Type | A role assignment that requires a user to perform one or more actions to use the role. If a user has been made eligible for a role, that means they can activate the role when they need to perform privileged tasks. There's no difference in the access given to someone with a permanent versus an eligible role assignment. The only difference is that some people don't need that access all the time. |
170-
| active | Type | A role assignment that doesn't require a user to perform any action to use the role. Users assigned as active have the privileges assigned to the role. |
171-
| activate | | The process of performing one or more actions to use a role that a user is eligible for. Actions might include performing a multifactor authentication (MFA) check, providing a business justification, or requesting approval from designated approvers. |
172-
| permanent eligible | Duration | A role assignment where a user is always eligible to activate the role. |
173-
| permanent active | Duration | A role assignment where a user can always use the role without performing any actions. |
174-
| time-bound eligible | Duration | A role assignment where a user is eligible to activate the role only within start and end dates. |
175-
| time-bound active | Duration | A role assignment where a user can use the role only within start and end dates. |
176-
| just-in-time (JIT) access | | A model in which users receive temporary permissions to perform privileged tasks, which prevents malicious or unauthorized users from gaining access after the permissions have expired. Access is granted only when users need it. |
177-
| principle of least privilege access | | A recommended security practice in which every user is provided with only the minimum privileges needed to accomplish the tasks they're authorized to perform. This practice minimizes the number of Global Administrators and instead uses specific administrator roles for certain scenarios. |
178-
179-
For more information, see [What is Microsoft Entra Privileged Identity Management?](/entra/id-governance/privileged-identity-management/pim-configure).
180-
181151
## Next steps
182152

183153
- [Delegate Azure access management to others](delegate-role-assignments-overview.md)
184154
- [Steps to assign an Azure role](role-assignments-steps.md)
155+
- [Eligible and time-bound role assignments in Azure RBAC](./pim-integration.md)

0 commit comments

Comments
 (0)