Skip to content

Commit 53a77cc

Browse files
committed
Acrolinx
1 parent 6129b8e commit 53a77cc

File tree

1 file changed

+28
-31
lines changed

1 file changed

+28
-31
lines changed

articles/active-directory/privileged-identity-management/pim-how-to-change-default-settings.md

Lines changed: 28 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Configure Azure AD role settings in PIM - Azure Active Directory | Microsoft Docs
2+
title: Configure Azure AD role settings in Privileged Identity Management - Azure Active Directory | Microsoft Docs
33
description: Learn how to configure Azure AD role settings in Azure AD Privileged Identity Management (PIM).
44
services: active-directory
55
documentationcenter: ''
@@ -46,7 +46,7 @@ Use the **Activations** slider to set the maximum time, in hours, that a role st
4646

4747
## Notifications
4848

49-
Use the **Notifications** switch to specify whether administrators will receive email notifications when roles are activated. This can be useful for detecting unauthorized or illegitimate activations.
49+
Use the **Notifications** switch to specify whether administrators will receive email notifications when roles are activated. This notification can be useful for detecting unauthorized or illegitimate activations.
5050

5151
When set to **Enable**, notifications are sent to:
5252

@@ -62,51 +62,48 @@ Use the **Incident/Request ticket** switch to require eligible administrators to
6262

6363
## Multi-Factor Authentication
6464

65-
Use the **Multi-Factor Authentication** switch to specify whether to require users to verify their identity with MFA before they can activate their roles. They only have to verify this once per session, not every time they activate a role. There are two tips to keep in mind when you enable MFA:
65+
Use the **Multi-Factor Authentication** switch to specify whether to require users to verify their identity with MFA before they can activate their roles. They only have to verify their identity once per session, not every time they activate a role. There are two tips to keep in mind when you enable MFA:
6666

67-
- Users who have Microsoft accounts for their email addresses (typically @outlook.com, but not always) cannot register for Azure MFA. If you want to assign roles to users with Microsoft accounts, you should either make them permanent admins or disable MFA for that role.
68-
- You cannot disable MFA for highly privileged roles for Azure AD and Office365. This is a safety feature because these roles should be carefully protected:
67+
- Users who have Microsoft accounts for their email addresses (typically @outlook.com, but not always) cannot register for Azure Multi-Factor Authentication. If you want to assign roles to users with Microsoft accounts, you should either make them permanent admins or disable multi-factor authentication for that role.
68+
- You cannot disable Azure Multi-Factor Authentication for highly privileged roles for Azure AD and Office 365. This safety feature helps protect the following roles:
6969

70-
- Azure Information Protection Administrator
71-
- Billing Administrator
72-
- Cloud Application Administrator
73-
- Compliance Administrator
74-
- Conditional Access Administrator
75-
- CRM Service Administrator
76-
- Customer LockBox Access Approver
77-
- Directory Writers
78-
- Exchange Administrator
79-
- Global Administrator
80-
- Intune Service Administrator
81-
- Power BI Service Administrator
82-
- Privileged Role Administrator
83-
- Security Administrator
84-
- SharePoint Service Administrator
85-
- Skype for Business Administrator
86-
- User Administrator
87-
88-
For more information, see [Multi-factor authentication (MFA) and Privileged Identity Management](pim-how-to-require-mfa.md).
70+
- Azure Information Protection administrator
71+
- Billing administrator
72+
- Cloud application administrator
73+
- Compliance administrator
74+
- Conditional access administrator
75+
- Dynamics 365 administrator
76+
- Customer LockBox access approver
77+
- Directory writers
78+
- Exchange administrator
79+
- Global administrator
80+
- Intune administrator
81+
- Power BI administrator
82+
- Privileged role administrator
83+
- Security administrator
84+
- SharePoint administrator
85+
- Skype for Business administrator
86+
- User administrator
87+
88+
For more information, see [Multi-factor authentication and Privileged Identity Management](pim-how-to-require-mfa.md).
8989

9090
## Require approval
9191

92-
If you want to require approval to activate a role, follow these steps.
92+
If you want to delegate the required approval to activate a role, follow these steps.
9393

9494
1. Set the **Require approval** switch to **Enabled**. The pane expands with options to select approvers.
9595

9696
![Azure AD roles - Settings - Require approval](./media/pim-how-to-change-default-settings/pim-directory-roles-settings-require-approval.png)
9797

98-
If you don't specify any approvers, the Privileged Role Administrator become the default approver and would then be required to approve all activation requests for this role.
98+
If you don't specify any approvers, the Privileged role administrator becomes the default approver and is then required to approve all activation requests for this role.
9999

100100
1. To specify approvers, click **Select approvers**.
101101

102102
![Azure AD roles - Settings - Require approval](./media/pim-how-to-change-default-settings/pim-directory-roles-settings-require-approval-select-approvers.png)
103103

104-
1. Select one or more approvers and then click **Select**. You can select users or groups. At least 2 approvers is recommended. Self-approval is not allowed.
105-
106-
Your selections will appear in the list of selected approvers.
107-
108-
1. Once you have specified your all your role settings, select **Save** to save your changes.
104+
1. Select one or more approvers in addition to the Privileged role administrator and then click **Select**. You can select users or groups. We recommend at least two approvers is. Even if you add yourself as an approver, you can't self-approve a role activation. Your selections will appear in the list of selected approvers.
109105

106+
1. After you have specified your all your role settings, select **Save** to save your changes.
110107

111108
<!--PLACEHOLDER: Need an explanation of what the temporary Global Administrator setting is for.-->
112109

0 commit comments

Comments
 (0)