You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/pim-integration.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,7 +54,7 @@ If you want to see which users are using the PIM funcationality, here are option
54
54
55
55
You can group and sort by **State**, and look for role assignments that aren't the **Active permanent** type.
56
56
57
-
:::image type="content" source="./media/role-assignments-list-portal/sub-access-control-role-assignments-eligible.png" alt-text="Screenshot of Access control and Active assignments and Eligible assignments tabs." lightbox="./media/role-assignments-list-portal/sub-access-control-role-assignments-eligible.png":::
57
+
:::image type="content" source="./media/shared/sub-access-control-role-assignments-eligible.png" alt-text="Screenshot of Access control and Active assignments and Eligible assignments tabs." lightbox="./media/shared/sub-access-control-role-assignments-eligible.png":::
58
58
59
59
### Option 2: List using PowerShell
60
60
@@ -87,7 +87,7 @@ If your organization has process or compliance reasons to limit the use of PIM,
87
87
88
88
For more information, see [Edit assignment](role-assignments-portal.yml#edit-assignment-(preview)).
89
89
90
-
:::image type="content" source="./media/role-assignments-portal/assignment-type-edit.png" alt-text="Screenshot of Edit assignment pane with Assignment type options displayed." lightbox="./media/role-assignments-portal/assignment-type-edit.png":::
90
+
:::image type="content" source="./media/shared/assignment-type-edit.png" alt-text="Screenshot of Edit assignment pane with Assignment type options displayed." lightbox="./media/shared/assignment-type-edit.png":::
Copy file name to clipboardExpand all lines: articles/role-based-access-control/role-assignments-eligible-activate.md
+4-8Lines changed: 4 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,19 +1,15 @@
1
1
---
2
-
title: Activate eligible Azure role assignments (Preview) - Azure RBAC
2
+
title: Activate eligible Azure role assignments - Azure RBAC
3
3
description: Learn how to activate eligible Azure role assignments in Azure role-based access control (Azure RBAC) using the Azure portal.
4
4
author: rolyon
5
5
manager: amycolannino
6
6
ms.service: role-based-access-control
7
7
ms.topic: how-to
8
-
ms.date: 06/27/2024
8
+
ms.date: 11/11/2024
9
9
ms.author: rolyon
10
10
---
11
11
12
-
# Activate eligible Azure role assignments (Preview)
13
-
14
-
> [!IMPORTANT]
15
-
> Azure role assignment integration with Privileged Identity Management is currently in PREVIEW.
16
-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
12
+
# Activate eligible Azure role assignments
17
13
18
14
Eligible Azure role assignments provide just-in-time access to a role for a limited period of time. Microsoft Entra Privileged Identity Management (PIM) role activation has been integrated into the Access control (IAM) page in the Azure portal. If you have been made eligible for an Azure role, you can activate that role using the Azure portal. This capability is being deployed in stages, so it might not be available yet in your tenant or your interface might look different.
19
15
@@ -73,5 +69,5 @@ These steps describe how to activate an eligible role assignment using the Azure
73
69
74
70
## Next steps
75
71
76
-
-[Integration with Privileged Identity Management (Preview)](./role-assignments.md#integration-with-privileged-identity-management-preview)
72
+
-[Eligible and time-bound role assignments in Azure RBAC](./pim-integration.md)
77
73
-[Activate my Azure resource roles in Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-resource-roles-activate-your-roles)
Copy file name to clipboardExpand all lines: articles/role-based-access-control/role-assignments-list-portal.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -112,7 +112,7 @@ procedureSection:
112
112
113
113
If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, your **Role assignments** tab is similar to the following screenshot for management group, subscription, and resource group scopes. This capability is being deployed in stages, so it might not be available yet in your tenant or your interface might look different.
114
114
115
-
:::image type="content" source="./media/role-assignments-list-portal/sub-access-control-role-assignments-eligible.png" alt-text="Screenshot of Access control and Active assignments and Eligible assignments tabs." lightbox="./media/role-assignments-list-portal/sub-access-control-role-assignments-eligible.png":::
115
+
:::image type="content" source="./media/shared/sub-access-control-role-assignments-eligible.png" alt-text="Screenshot of Access control and Active assignments and Eligible assignments tabs." lightbox="./media/shared/sub-access-control-role-assignments-eligible.png":::
116
116
117
117
You see a **State** column with one of the following states:
Copy file name to clipboardExpand all lines: articles/role-based-access-control/role-assignments-portal.yml
+6-14Lines changed: 6 additions & 14 deletions
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ metadata:
6
6
author: rolyon
7
7
ms.author: rolyon
8
8
manager: amycolannino
9
-
ms.date: 08/30/2024
9
+
ms.date: 11/11/2024
10
10
ms.service: role-based-access-control
11
11
ms.topic: how-to
12
12
ms.custom:
@@ -167,13 +167,9 @@ procedureSection:
167
167
Follow the steps in [Add or edit Azure role assignment conditions](conditions-role-assignments-portal.md#step-3-review-basics).
168
168
169
169
- title: |
170
-
Step 6: Select assignment type (Preview)
170
+
Step 6: Select assignment type
171
171
summary: |
172
-
> [!IMPORTANT]
173
-
> Azure role assignment integration with Privileged Identity Management is currently in PREVIEW.
174
-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
175
-
176
-
If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, an **Assignment type** tab will appear for management group, subscription, and resource group scopes. Use eligible assignments to provide just-in-time access to a role. This capability is being deployed in stages, so it might not be available yet in your tenant or your interface might look different. For more information, see [Integration with Privileged Identity Management (Preview)](./role-assignments.md#integration-with-privileged-identity-management-preview).
172
+
If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, an **Assignment type** tab will appear for management group, subscription, and resource group scopes. Use eligible assignments to provide just-in-time access to a role. This capability is being deployed in stages, so it might not be available yet in your tenant or your interface might look different. For more information, see [Eligible and time-bound role assignments in Azure RBAC](././pim-integration.md).
177
173
178
174
If you don't want to use the PIM functionality, select the **Active** assignment type and **Permanent** assignment duration options. These settings create a role assignment where the principal always has permissions in the role.
179
175
steps:
@@ -222,13 +218,9 @@ procedureSection:
222
218
If you don't see the description for the role assignment, click **Edit columns** to add the **Description** column.
223
219
224
220
- title: |
225
-
Edit assignment (Preview)
221
+
Edit assignment
226
222
summary: |
227
-
> [!IMPORTANT]
228
-
> Azure role assignment integration with Privileged Identity Management is currently in PREVIEW.
229
-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
230
-
231
-
If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, you can edit your role assignment type settings. For more information, see [Integration with Privileged Identity Management (Preview)](./role-assignments.md#integration-with-privileged-identity-management-preview).
223
+
If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, you can edit your role assignment type settings. For more information, see [Eligible and time-bound role assignments in Azure RBAC](./pim-integration.md).
232
224
steps:
233
225
- |
234
226
On the **Access control (IAM)** page, click the **Role assignments** tab to view the role assignments at this scope.
@@ -241,7 +233,7 @@ procedureSection:
241
233
242
234
The **Edit assignment** pane appears where you can update the role assignment type settings. The pane might take a few moments to open.
243
235
244
-
:::image type="content" source="./media/role-assignments-portal/assignment-type-edit.png" alt-text="Screenshot of Edit assignment pane with Assignment type options displayed." lightbox="./media/role-assignments-portal/assignment-type-edit.png":::
236
+
:::image type="content" source="./media/shared/assignment-type-edit.png" alt-text="Screenshot of Edit assignment pane with Assignment type options displayed." lightbox="./media/shared/assignment-type-edit.png":::
Copy file name to clipboardExpand all lines: articles/role-based-access-control/role-assignments.md
+2-31Lines changed: 2 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about Azure role assignments in Azure role-based access contr
4
4
author: rolyon
5
5
ms.service: role-based-access-control
6
6
ms.topic: conceptual
7
-
ms.date: 08/30/2024
7
+
ms.date: 11/11/2024
8
8
ms.author: rolyon
9
9
---
10
10
# Understand Azure role assignments
@@ -148,37 +148,8 @@ The preceding condition allows users to read blobs with a blob index tag key of
148
148
149
149
For more information about conditions, see [What is Azure attribute-based access control (Azure ABAC)?](conditions-overview.md)
150
150
151
-
## Integration with Privileged Identity Management (Preview)
152
-
153
-
> [!IMPORTANT]
154
-
> Azure role assignment integration with Privileged Identity Management is currently in PREVIEW.
155
-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
156
-
157
-
If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, [Microsoft Entra Privileged Identity Management (PIM)](/entra/id-governance/privileged-identity-management/pim-configure) is integrated into role assignment steps. For example, you can assign roles to users for a limited period of time. You can also make users eligible for role assignments so that they must activate to use the role, such as request approval. Eligible role assignments provide just-in-time access to a role for a limited period of time. You can't create eligible role assignments for applications, service principals, or managed identities because they can't perform the activation steps. You can create eligible role assignments at management group, subscription, and resource group scope, but not at resource scope. This capability is being deployed in stages, so it might not be available yet in your tenant or your interface might look different.
158
-
159
-
The assignment type options available to you might vary depending or your PIM policy. For example, PIM policy defines whether permanent assignments can be created, maximum duration for time-bound assignments, roles activations requirements (approval, multifactor authentication, or Conditional Access authentication context), and other settings. For more information, see [Configure Azure resource role settings in Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-resource-roles-configure-role-settings).
160
-
161
-
If you don't want to use the PIM functionality, select the **Active** assignment type and **Permanent** assignment duration options. These settings create a role assignment where the principal always has permissions in the role.
162
-
163
-
:::image type="content" source="./media/shared/assignment-type-eligible.png" alt-text="Screenshot of Add role assignment with Assignment type options displayed." lightbox="./media/shared/assignment-type-eligible.png":::
164
-
165
-
To better understand PIM, you should review the following terms.
166
-
167
-
| Term or concept | Role assignment category | Description |
168
-
| --- | --- | --- |
169
-
| eligible | Type | A role assignment that requires a user to perform one or more actions to use the role. If a user has been made eligible for a role, that means they can activate the role when they need to perform privileged tasks. There's no difference in the access given to someone with a permanent versus an eligible role assignment. The only difference is that some people don't need that access all the time. |
170
-
| active | Type | A role assignment that doesn't require a user to perform any action to use the role. Users assigned as active have the privileges assigned to the role. |
171
-
| activate || The process of performing one or more actions to use a role that a user is eligible for. Actions might include performing a multifactor authentication (MFA) check, providing a business justification, or requesting approval from designated approvers. |
172
-
| permanent eligible | Duration | A role assignment where a user is always eligible to activate the role. |
173
-
| permanent active | Duration | A role assignment where a user can always use the role without performing any actions. |
174
-
| time-bound eligible | Duration | A role assignment where a user is eligible to activate the role only within start and end dates. |
175
-
| time-bound active | Duration | A role assignment where a user can use the role only within start and end dates. |
176
-
| just-in-time (JIT) access || A model in which users receive temporary permissions to perform privileged tasks, which prevents malicious or unauthorized users from gaining access after the permissions have expired. Access is granted only when users need it. |
177
-
| principle of least privilege access || A recommended security practice in which every user is provided with only the minimum privileges needed to accomplish the tasks they're authorized to perform. This practice minimizes the number of Global Administrators and instead uses specific administrator roles for certain scenarios. |
178
-
179
-
For more information, see [What is Microsoft Entra Privileged Identity Management?](/entra/id-governance/privileged-identity-management/pim-configure).
180
-
181
151
## Next steps
182
152
183
153
-[Delegate Azure access management to others](delegate-role-assignments-overview.md)
184
154
-[Steps to assign an Azure role](role-assignments-steps.md)
155
+
-[Eligible and time-bound role assignments in Azure RBAC](./pim-integration.md)
0 commit comments