Skip to content

Commit 50f1c1c

Browse files
authored
Merge pull request #93124 from curtand/pim024
[Azure AD PIM] Last editorial pass articles
2 parents 8b2559f + c299973 commit 50f1c1c

File tree

5 files changed

+74
-76
lines changed

5 files changed

+74
-76
lines changed
Lines changed: 30 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Extend or renew Azure resource role assignments in PIM - Azure Active Directory | Microsoft Docs
2+
title: Extend or renew Azure resource role assignments in Privileged Identity Management - Azure Active Directory | Microsoft Docs
33
description: Learn how to extend or renew Azure resource role assignments in Azure AD Privileged Identity Management (PIM).
44
services: active-directory
55
documentationcenter: ''
@@ -12,35 +12,35 @@ ms.tgt_pltfrm: na
1212
ms.devlang: na
1313
ms.topic: conceptual
1414
ms.subservice: pim
15-
ms.date: 04/02/2018
15+
ms.date: 10/23/2019
1616
ms.author: curtand
1717
ms.custom: pim
1818
ms.collection: M365-identity-device-management
1919
---
2020

2121

2222

23-
# Extend or renew Azure resource role assignments in PIM
23+
# Extend or renew Azure resource role assignments in Privileged Identity Management
2424

25-
Azure Active Directory (Azure AD) Privileged Identity Management (PIM) introduces new controls to manage the access and assignment lifecycle for Azure resources. Administrators can assign membership using start and end date-time properties. When the assignment end approaches, PIM sends email notifications to the affected users or groups. It also sends email notifications to administrators of the resource to ensure that appropriate access is maintained. Assignments might be renewed and remain visible in an expired state for up to 30 days, even if access is not extended.
25+
Azure Active Directory (Azure AD) Privileged Identity Management (PIM) provides controls to manage the access and assignment lifecycle for Azure resources. Administrators can assign roles using start and end date-time properties. When the assignment end approaches, Privileged Identity Management sends email notifications to the affected users or groups. It also sends email notifications to administrators of the resource to ensure that appropriate access is maintained. Assignments might be renewed and remain visible in an expired state for up to 30 days, even if access is not extended.
2626

2727
## Who can extend and renew?
2828

29-
Only administrators of the resource can extend or renew role assignments. The affected member can request to extend roles that are about to expire and request to renew roles that are already expired.
29+
Only administrators of the resource can extend or renew role assignments. The affected user or group can request to extend roles that are about to expire and request to renew roles that are already expired.
3030

3131
## When are notifications sent?
3232

33-
PIM sends email notifications to administrators and affected members of roles that are expiring within 14 days and one day prior to expiration. It sends an additional email when an assignment officially expires.
33+
Privileged Identity Management sends email notifications to administrators and affected user or groups of roles that are expiring within 14 days and one day prior to expiration. It sends an additional email when an assignment officially expires.
3434

35-
Administrators receive notifications when a member of an expiring or expired role requests to extend or renew. When a specific administrator resolves the request, all other administrators are notified of the resolution decision (approved or denied). Then the requesting member is notified of the decision.
35+
Administrators receive notifications when a user or group assigned an expiring or expired role requests to extend or renew. When a specific administrator resolves the request, all other administrators are notified of the resolution decision (approved or denied). Then the requesting user or group is notified of the decision.
3636

3737
## Extend role assignments
3838

39-
The following steps outline the process for requesting, resolving, or administering an extension or renewal of a role assignment.
39+
The following steps outline the process for requesting, resolving, or administering an extension or renewal of a role assignment.
4040

41-
### Member extend
41+
### Self-extend expiring assignments
4242

43-
Members of a role assignment can extend expiring role assignments directly from the **Eligible** or **Active** tab on the **My roles** page of a resource and from the top level **My roles** page of the PIM portal. Members can request to extend eligible and active (assigned) roles that expire in the next 14 days.
43+
Users or groups assigned to a role can extend expiring role assignments directly from the **Eligible** or **Active** tab on the **My roles** page of a resource and from the top level **My roles** page of the Privileged Identity Management portal.Users or groups can request to extend eligible and active (assigned) roles that expire in the next 14 days.
4444

4545
![Azure resources - My roles page listing eligible roles with an Action column](media/pim-resource-roles-renew-extend/aadpim-rbac-extend-ui.png)
4646

@@ -54,70 +54,70 @@ To request an extension of this role assignment, select **Extend** to open the r
5454

5555
To view information about the original assignment, expand **Assignment details**. Enter a reason for the extension request, and then select **Extend**.
5656

57-
>[!Note]
57+
>[!NOTE]
5858
>We recommend including the details of why the extension is necessary, and for how long the extension should be granted (if you have this information).
5959
6060
![Extend role assignment pane with Assignment details expanded](media/pim-resource-roles-renew-extend/aadpim-rbac-extend-form-complete.png)
6161

62-
In a matter of moments, resource administrators receive an email notification requesting that they review the extension request. If a request to extend has already been submitted, a toast notification appears at the top of the Azure portal explaining the error.
62+
In a matter of moments, resource administrators receive an email notification requesting that they review the extension request. If a request to extend has already been submitted, an Azure notification appears in the portal.
6363

6464
![Notification explaining that there is already an existing pending role assignment extension](media/pim-resource-roles-renew-extend/aadpim-rbac-extend-failed-existing-request.png)
6565

66-
Go to the **Pending requests** page in the left pane to view the status of your request or to cancel it.
66+
Go to the **Pending requests** page to view the status of your request or to cancel it.
6767

6868
![Azure resources - Pending requests page listing any pending requested and a link to Cancel](media/pim-resource-roles-renew-extend/aadpim-rbac-extend-cancel-request.png)
6969

70-
### Admin approve
70+
### Admin approved extension
7171

72-
When a member submits a request to extend a role assignment, resource administrators receive an email notification that contains the details of the original assignment and the reason for the request. The notification includes a direct link to the request for the administrator to approve or deny.
72+
When a user or group submits a request to extend a role assignment, resource administrators receive an email notification that contains the details of the original assignment and the reason for the request. The notification includes a direct link to the request for the administrator to approve or deny.
7373

74-
In addition to using following the link from email, administrators can approve or deny requests by going to the PIM administration portal and selecting **Approve requests** in the left pane.
74+
In addition to using following the link from email, administrators can approve or deny requests by going to the Privileged Identity Management administration portal and selecting **Approve requests** in the left pane.
7575

7676
![Azure resources - Approve requests page listing requests and links to approve or deny](media/pim-resource-roles-renew-extend/aadpim-rbac-extend-admin-approve-grid.png)
7777

78-
When an Administrator selects **Approve** or **Deny**, the details of the request are shown, along with a field to provide justification for the audit logs.
78+
When an Administrator selects **Approve** or **Deny**, the details of the request are shown, along with a field to provide a business justification for the audit logs.
7979

8080
![Approve role assignment request with requestor reason, assignment type, start time, end time, and reason](media/pim-resource-roles-renew-extend/aadpim-rbac-extend-admin-approve-blade.png)
8181

8282
When approving a request to extend role assignment, resource administrators can choose a new start date, end date, and assignment type. Changing assignment type might be necessary if the administrator wants to provide limited access to complete a specific task (one day, for example). In this example, the administrator can change the assignment from **Eligible** to **Active**. This means they can provide access to the requestor without requiring them to activate.
8383

84-
### Admin extend
84+
### Admin initiated extension
8585

86-
If a role member forgets or is unable to request a role membership extension, an administrator can extend an assignment on behalf of the member. Administrative extensions of role membership do not require approval, but notifications are sent to all other administrators after the role has been extended.
86+
If a user assigned to a role doesn't request an extension for the role assignment, an administrator can extend an assignment on behalf of the user. Administrative extensions of role assignment do not require approval, but notifications are sent to all other administrators after the role has been extended.
8787

88-
To extend a role membership, browse to the resource role or member view in PIM. Find the member that requires an extension. Then select **Extend** in the action column.
88+
To extend a role assignment, browse to the resource role or assignment view in Privileged Identity Management. Find the assignment that requires an extension. Then select **Extend** in the action column.
8989

90-
![Azure resources - Members page listing eligible roles with links to extend](media/pim-resource-roles-renew-extend/aadpim-rbac-extend-admin-extend.png)
90+
![Azure resources - assignments page listing eligible roles with links to extend](media/pim-resource-roles-renew-extend/aadpim-rbac-extend-admin-extend.png)
9191

9292
## Renew role assignments
9393

94-
While conceptually similar to the process for requesting an extension, the process to renew an expired role assignment is different. Using the following steps, members and administrators can renew access to expired roles when necessary.
94+
While conceptually similar to the process for requesting an extension, the process to renew an expired role assignment is different. Using the following steps, assignments and administrators can renew access to expired roles when necessary.
9595

96-
### Member renew
96+
### Self-renew
9797

98-
Members who can no longer access resources can access up to 30 days of expired assignment history. To do this, they browse to **My Roles** in the left pane, and then select the **Expired roles** tab in the Azure resource roles section.
98+
Users who can no longer access resources can access up to 30 days of expired assignment history. To do this, they browse to **My Roles** in the left pane, and then select the **Expired roles** tab in the Azure resource roles section.
9999

100100
![My roles page - Expired roles tab](media/pim-resource-roles-renew-extend/aadpim-rbac-renew-from-myroles.png)
101101

102102
The list of roles shown defaults to **Eligible roles**. Use the drop-down menu to toggle between Eligible and Active assigned roles.
103103

104-
To request renewal for any of the role assignments in the list, select the **Renew** action. Then provide a reason for the request. It's helpful to provide a duration in addition to any additional context that helps the resource administrator decide to approve or deny.
104+
To request renewal for any of the role assignments in the list, select the **Renew** action. Then provide a reason for the request. It's helpful to provide a duration in addition to any additional context or a business justification that can help the resource administrator decide to approve or deny.
105105

106106
![Renew role assignment pane showing Reason box](media/pim-resource-roles-renew-extend/aadpim-rbac-renew-request-form.png)
107107

108108
After the request has been submitted, resource administrators are notified of a pending request to renew a role assignment.
109109

110110
### Admin approves
111111

112-
Resource administrators can access the renewal request from the link in the email notification or by accessing PIM from the Azure portal and selecting **Approve requests** from the left pane.
112+
Resource administrators can access the renewal request from the link in the email notification or by accessing Privileged Identity Management from the Azure portal and selecting **Approve requests** from the left pane.
113113

114114
![Azure resources - Approve requests page listing requests and links to approve or deny](media/pim-resource-roles-renew-extend/aadpim-rbac-extend-admin-approve-grid.png)
115115

116-
When an administrator selects **Approve** or **Deny**, the details of the request are shown along with a field to provide justification for the audit logs.
116+
When an administrator selects **Approve** or **Deny**, the details of the request are shown along with a field to provide a business justification for the audit logs.
117117

118118
![Approve role assignment request with requestor reason, assignment type, start time, end time, and reason](media/pim-resource-roles-renew-extend/aadpim-rbac-extend-admin-approve-blade.png)
119119

120-
When approving a request to renew role assignment, resource administrators must enter a new start date, end date, and assignment type.
120+
When approving a request to renew role assignment, resource administrators must enter a new start date, end date, and assignment type.
121121

122122
### Admin renew
123123

@@ -129,5 +129,5 @@ To view a list of all expired role assignments, on the **Members** screen, selec
129129

130130
## Next steps
131131

132-
- [Approve or deny requests for Azure resource roles in PIM](pim-resource-roles-approval-workflow.md)
133-
- [Configure Azure resource role settings in PIM](pim-resource-roles-configure-role-settings.md)
132+
- [Approve or deny requests for Azure resource roles in Privileged Identity Management](pim-resource-roles-approval-workflow.md)
133+
- [Configure Azure resource role settings in Privileged Identity Management](pim-resource-roles-configure-role-settings.md)

articles/active-directory/privileged-identity-management/pim-resource-roles-start-access-review.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Create an access review of Azure resource roles in PIM - Azure Active Directory | Microsoft Docs
2+
title: Create an access review of Azure resource roles in Privileged Identity Management - Azure Active Directory | Microsoft Docs
33
description: Learn how to create an access review of Azure resource roles in Azure AD Privileged Identity Management (PIM).
44
services: active-directory
55
documentationcenter: ''
@@ -11,40 +11,38 @@ ms.tgt_pltfrm: na
1111
ms.devlang: na
1212
ms.topic: conceptual
1313
ms.subservice: pim
14-
ms.date: 04/29/2019
14+
ms.date: 10/23/2019
1515
ms.author: curtand
1616
ms.custom: pim
1717
ms.collection: M365-identity-device-management
1818
---
1919

20-
# Create an access review of Azure resource roles in PIM
20+
# Create an access review of Azure resource roles in Privileged Identity Management
2121

2222
Access to privileged Azure resource roles for employees changes over time. To reduce the risk associated with stale role assignments, you should regularly review access. You can use Azure Active Directory (Azure AD) Privileged Identity Management (PIM) to create access reviews for privileged Azure resource roles. You can also configure recurring access reviews that occur automatically.
2323

2424
This article describes how to create one or more access reviews for privileged Azure resource roles.
2525

2626
## Prerequisites
2727

28-
- [Privileged Role Administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator)
28+
[Privileged Role Administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator)
2929

3030
## Open access reviews
3131

3232
1. Sign in to [Azure portal](https://portal.azure.com/) with a user that is a member of the Privileged Role Administrator role.
3333

3434
1. Open **Azure AD Privileged Identity Management**.
3535

36-
1. In the left menu, click **Azure resources**.
36+
1. In the left menu, select **Azure resources**.
3737

38-
1. Click the resource you want to manage, such as a subscription or management group.
38+
1. Select the resource you want to manage, such as a subscription or management group.
3939

40-
1. Under Manage, click **Access reviews**.
40+
1. Under Manage, select **Access reviews**.
4141

4242
![Azure resources - Access reviews list showing the status of all reviews](./media/pim-resource-roles-start-access-review/access-reviews.png)
4343

44-
4544
[!INCLUDE [Privileged Identity Management access reviews](../../../includes/active-directory-privileged-identity-management-access-reviews.md)]
4645

47-
4846
## Start the access review
4947

5048
Once you have specified the settings for an access review, click **Start**. The access review will appear in your list with an indicator of its status.

0 commit comments

Comments
 (0)