You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/pim-how-to-change-default-settings.md
+28-31Lines changed: 28 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Configure Azure AD role settings in PIM - Azure Active Directory | Microsoft Docs
2
+
title: Configure Azure AD role settings in Privileged Identity Management - Azure Active Directory | Microsoft Docs
3
3
description: Learn how to configure Azure AD role settings in Azure AD Privileged Identity Management (PIM).
4
4
services: active-directory
5
5
documentationcenter: ''
@@ -46,7 +46,7 @@ Use the **Activations** slider to set the maximum time, in hours, that a role st
46
46
47
47
## Notifications
48
48
49
-
Use the **Notifications** switch to specify whether administrators will receive email notifications when roles are activated. This can be useful for detecting unauthorized or illegitimate activations.
49
+
Use the **Notifications** switch to specify whether administrators will receive email notifications when roles are activated. This notification can be useful for detecting unauthorized or illegitimate activations.
50
50
51
51
When set to **Enable**, notifications are sent to:
52
52
@@ -62,51 +62,48 @@ Use the **Incident/Request ticket** switch to require eligible administrators to
62
62
63
63
## Multi-Factor Authentication
64
64
65
-
Use the **Multi-Factor Authentication** switch to specify whether to require users to verify their identity with MFA before they can activate their roles. They only have to verify this once per session, not every time they activate a role. There are two tips to keep in mind when you enable MFA:
65
+
Use the **Multi-Factor Authentication** switch to specify whether to require users to verify their identity with MFA before they can activate their roles. They only have to verify their identity once per session, not every time they activate a role. There are two tips to keep in mind when you enable MFA:
66
66
67
-
- Users who have Microsoft accounts for their email addresses (typically @outlook.com, but not always) cannot register for Azure MFA. If you want to assign roles to users with Microsoft accounts, you should either make them permanent admins or disable MFA for that role.
68
-
- You cannot disable MFA for highly privileged roles for Azure AD and Office365. This is a safety feature because these roles should be carefully protected:
67
+
- Users who have Microsoft accounts for their email addresses (typically @outlook.com, but not always) cannot register for Azure Multi-Factor Authentication. If you want to assign roles to users with Microsoft accounts, you should either make them permanent admins or disable multi-factor authentication for that role.
68
+
- You cannot disable Azure Multi-Factor Authentication for highly privileged roles for Azure AD and Office 365. This safety feature helps protect the following roles:
69
69
70
-
- Azure Information Protection Administrator
71
-
- Billing Administrator
72
-
- Cloud Application Administrator
73
-
- Compliance Administrator
74
-
- Conditional Access Administrator
75
-
-CRM Service Administrator
76
-
- Customer LockBox Access Approver
77
-
- Directory Writers
78
-
- Exchange Administrator
79
-
- Global Administrator
80
-
- Intune Service Administrator
81
-
- Power BI Service Administrator
82
-
- Privileged Role Administrator
83
-
- Security Administrator
84
-
- SharePoint Service Administrator
85
-
- Skype for Business Administrator
86
-
- User Administrator
87
-
88
-
For more information, see [Multi-factor authentication (MFA) and Privileged Identity Management](pim-how-to-require-mfa.md).
70
+
- Azure Information Protection administrator
71
+
- Billing administrator
72
+
- Cloud application administrator
73
+
- Compliance administrator
74
+
- Conditional access administrator
75
+
-Dynamics 365 administrator
76
+
- Customer LockBox access approver
77
+
- Directory writers
78
+
- Exchange administrator
79
+
- Global administrator
80
+
- Intune administrator
81
+
- Power BI administrator
82
+
- Privileged role administrator
83
+
- Security administrator
84
+
- SharePoint administrator
85
+
- Skype for Business administrator
86
+
- User administrator
87
+
88
+
For more information, see [Multi-factor authentication and Privileged Identity Management](pim-how-to-require-mfa.md).
89
89
90
90
## Require approval
91
91
92
-
If you want to require approval to activate a role, follow these steps.
92
+
If you want to delegate the required approval to activate a role, follow these steps.
93
93
94
94
1. Set the **Require approval** switch to **Enabled**. The pane expands with options to select approvers.
95
95
96
96

97
97
98
-
If you don't specify any approvers, the Privileged Role Administrator become the default approver and would then be required to approve all activation requests for this role.
98
+
If you don't specify any approvers, the Privileged role administrator becomes the default approver and is then required to approve all activation requests for this role.
99
99
100
100
1. To specify approvers, click **Select approvers**.
101
101
102
102

103
103
104
-
1. Select one or more approvers and then click **Select**. You can select users or groups. At least 2 approvers is recommended. Self-approval is not allowed.
105
-
106
-
Your selections will appear in the list of selected approvers.
107
-
108
-
1. Once you have specified your all your role settings, select **Save** to save your changes.
104
+
1. Select one or more approvers in addition to the Privileged role administrator and then click **Select**. You can select users or groups. We recommend at least two approvers is. Even if you add yourself as an approver, you can't self-approve a role activation. Your selections will appear in the list of selected approvers.
109
105
106
+
1. After you have specified your all your role settings, select **Save** to save your changes.
110
107
111
108
<!--PLACEHOLDER: Need an explanation of what the temporary Global Administrator setting is for.-->
0 commit comments