Skip to content

Commit 57aeb1c

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into ip-metadata
2 parents 5941012 + 3ecdba4 commit 57aeb1c

26 files changed

+90
-72
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11095,6 +11095,11 @@
1109511095
"source_path_from_root": "/articles/active-directory/cloud-infrastructure-entitlement-management/product-data-inventory.md",
1109611096
"redirect_url": "/azure/active-directory/cloud-infrastructure-entitlement-management/product-data-billable-resources",
1109711097
"redirect_document_id": false
11098+
},
11099+
{
11100+
"source_path_from_root": "/articles/active-directory/governance/create-access-review-privileged-access-groups.md",
11101+
"redirect_url": "/azure/active-directory/governance/create-access-review-pim-for-groups",
11102+
"redirect_document_id": false
1109811103
}
1109911104
]
1110011105
}

articles/active-directory/governance/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -208,10 +208,10 @@
208208
href: ../privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json
209209
- name: Complete an access review
210210
href: ../privileged-identity-management/pim-complete-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json
211-
- name: Azure AD Privileged Access Groups (Preview)
211+
- name: Azure AD PIM for Groups (Preview)
212212
items:
213213
- name: Create an access review
214-
href: create-access-review-privileged-access-groups.md
214+
href: create-access-review-pim-for-groups.md
215215
- name: Lifecycle Workflows (Preview)
216216
items:
217217
- name: Deployment

articles/active-directory/governance/create-access-review-privileged-access-groups.md renamed to articles/active-directory/governance/create-access-review-pim-for-groups.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Create an access review of Privileged Access Groups - Azure AD (preview)
3-
description: Learn how to create an access review of Privileged Access Groups in Azure Active Directory.
2+
title: Create an access review of PIM for Groups - Azure AD (preview)
3+
description: Learn how to create an access review of PIM for Groups in Azure Active Directory.
44
services: active-directory
55
author: amsliu
66
manager: amycolannino
@@ -16,18 +16,18 @@ ms.reviewer: jgangadhar
1616
ms.collection: M365-identity-device-management
1717
---
1818

19-
# Create an access review of Privileged Access Groups in Azure AD (preview)
19+
# Create an access review of PIM for Groups in Azure AD (preview)
2020

21-
This article describes how to create one or more access reviews for Privileged Access Groups, which will include the active members of the group as well as the eligible members. Reviews can be performed on both active members of the group, who are active at the time the review is created, and the eligible members of the group.
21+
This article describes how to create one or more access reviews for PIM for Groups, which will include the active members of the group as well as the eligible members. Reviews can be performed on both active members of the group, who are active at the time the review is created, and the eligible members of the group.
2222

2323
## Prerequisites
2424

2525
- Azure AD Premium P2.
26-
- Only Global administrators and Privileged Role administrators can create reviews on Privileged Access Groups. For more information, see [Use Azure AD groups to manage role assignments](../roles/groups-concept.md).
26+
- Only Global administrators and Privileged Role administrators can create reviews on PIM for Groups. For more information, see [Use Azure AD groups to manage role assignments](../roles/groups-concept.md).
2727

2828
For more information, see [License requirements](access-reviews-overview.md#license-requirements).
2929

30-
## Create a Privileged Access Group access review
30+
## Create a PIM for Groups access review
3131

3232
### Scope
3333
1. Sign in to the Azure portal and open the [Identity Governance](https://portal.azure.com/#blade/Microsoft_AAD_ERM/DashboardBlade/) page.
@@ -44,10 +44,10 @@ For more information, see [License requirements](access-reviews-overview.md#lice
4444

4545
5. Select **Teams + Groups** and then select **Select Teams + groups** under **Review Scope**. A list of groups to choose from appears on the right.
4646

47-
![Screenshot that shows selecting Teams + Groups.](./media/create-access-review/create-privileged-access-groups-review.png)
47+
![Screenshot that shows selecting Teams + Groups.](./media/create-access-review/create-pim-review.png)
4848

4949
> [!NOTE]
50-
> When a Privileged Access Group (PAG) is selected, the users under review for the group will include all eligible users and active users in that group.
50+
> When a PIM for Groups is selected, the users under review for the group will include all eligible users and active users in that group.
5151
5252
6. Now you can select a scope for the review. Your options are:
5353
- **Guest users only**: This option limits the access review to only the Azure AD B2B guest users in your directory.
@@ -64,9 +64,9 @@ For more information, see [License requirements](access-reviews-overview.md#lice
6464
After you have reached this step, you may follow the instructions outlined under **Next: Reviews** in the [Create an access review of groups or applications](create-access-review.md#next-reviews) article to complete your access review.
6565

6666
> [!NOTE]
67-
> Review of Privileged Access Groups will only assign active owner(s) as the reviewers. Eligible owners are not included. At least one fallback reviewer is required for a Privileged Access Groups review. If there are no active owner(s) when the review begins, the fallback reviewer(s) will be assigned to the review.
67+
> Review of PIM for Groups will only assign active owner(s) as the reviewers. Eligible owners are not included. At least one fallback reviewer is required for a PIM for Groups review. If there are no active owner(s) when the review begins, the fallback reviewer(s) will be assigned to the review.
6868
6969
## Next steps
7070

7171
- [Create an access review of groups or applications](create-access-review.md)
72-
- [Approve activation requests for privileged access group members and owners (preview)](../privileged-identity-management/groups-approval-workflow.md)
72+
- [Approve activation requests for PIM for Groups members and owners (preview)](../privileged-identity-management/groups-approval-workflow.md)

articles/active-directory/governance/create-access-review.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ If you are reviewing access to an application, then before creating the review,
9696
If you choose either **Managers of users** or **Group owner(s)**, you can also specify a fallback reviewer. Fallback reviewers are asked to do a review when the user has no manager specified in the directory or if the group doesn't have an owner.
9797

9898
>[!IMPORTANT]
99-
> For Privileged Access Groups (Preview), you must select **Group owner(s)**. It is mandatory to assign at least one fallback reviewer to the review. The review will only assign active owner(s) as the reviewer(s). Eligible owners are not included. If there are no active owners when the review begins, the fallback reviewer(s) will be assigned to the review.
99+
> For PIM for Groups (Preview), you must select **Group owner(s)**. It is mandatory to assign at least one fallback reviewer to the review. The review will only assign active owner(s) as the reviewer(s). Eligible owners are not included. If there are no active owners when the review begins, the fallback reviewer(s) will be assigned to the review.
100100
101101
![Screenshot that shows New access review.](./media/create-access-review/new-access-review.png)
102102

@@ -302,7 +302,7 @@ After one or more access reviews have started, you might want to modify or updat
302302
## Next steps
303303

304304
- [Complete an access review of groups or applications](complete-access-review.md)
305-
- [Create an access review of Privileged Access Groups (preview)](create-access-review-privileged-access-groups.md)
305+
- [Create an access review of PIM for Groups (preview)](create-access-review-pim-for-groups.md)
306306
- [Review access to groups or applications](perform-access-review.md)
307307
- [Review access for yourself to groups or applications](review-your-access.md)
308308

articles/active-directory/governance/lifecycle-workflow-tasks.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,7 @@ For Microsoft Graph the parameters for the **Generate Temporary Access Pass and
175175

176176
### Add user to groups
177177

178-
Allows users to be added to Microsoft 365 and cloud-only security groups. Mail-enabled, distribution, dynamic and privileged access groups are not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
178+
Allows users to be added to Microsoft 365 and cloud-only security groups. Mail-enabled, distribution, dynamic and PIM for Groups are not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
179179

180180
You're able to customize the task name and description for this task.
181181
:::image type="content" source="media/lifecycle-workflow-task/add-group-task.png" alt-text="Screenshot of Workflows task: Add user to group task.":::
@@ -353,7 +353,7 @@ For Microsoft Graph the parameters for the **Disable user account** task are as
353353

354354
### Remove user from selected groups
355355

356-
Allows users to be removed from Microsoft 365 and cloud-only security groups. Mail-enabled, distribution, dynamic and privileged access groups are not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
356+
Allows users to be removed from Microsoft 365 and cloud-only security groups. Mail-enabled, distribution, dynamic and PIM for Groups are not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
357357

358358
You're able to customize the task name and description for this task in the Azure portal.
359359
:::image type="content" source="media/lifecycle-workflow-task/remove-group-task.png" alt-text="Screenshot of Workflows task: Remove user from select groups.":::
@@ -392,7 +392,7 @@ For Microsoft Graph the parameters for the **Remove user from selected groups**
392392

393393
### Remove users from all groups
394394

395-
Allows users to be removed from every Microsoft 365 and cloud-only security group they're a member of. Mail-enabled, distribution, dynamic and privileged access groups are not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
395+
Allows users to be removed from every Microsoft 365 and cloud-only security group they're a member of. Mail-enabled, distribution, dynamic and PIM for Groups are not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
396396

397397

398398
You're able to customize the task name and description for this task in the Azure portal.
315 KB
Loading
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
title: include file
3+
description: include file
4+
author: amsliu
5+
manager: amycolannino
6+
ms.service: active-directory
7+
ms.workload: identity
8+
ms.topic: include
9+
ms.date: 01/31/2023
10+
ms.author: amsliu
11+
ms.custom: include file
12+
---
13+
14+
>[!Note]
15+
> For groups used for elevating into Azure AD roles, we recommend that you require an approval process for eligible member assignments. Assignments that can be activated without approval can leave you vulnerable to a security risk from less-privileged administrators. For example, the Helpdesk Administrator has permission to reset an eligible user's passwords.

articles/active-directory/privileged-identity-management/concept-pim-for-groups.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,7 @@ PIM for Groups is part of Azure AD Privileged Identity Management – alongside
3030

3131
With PIM for Groups you can use policies similar to ones you use in PIM for Azure AD Roles and PIM for Azure Resources: you can require approval for membership or ownership activation, enforce multi-factor authentication (MFA), require justification, limit maximum activation time, and more. Each group in PIM for Groups has two policies: one for activation of membership and another for activation of ownership in the group. Up until January 2023, PIM for Groups feature was called “Privileged Access Groups”.
3232

33-
>[!Note]
34-
> For groups used for elevating into Azure AD roles, we recommend that you require an approval process for eligible member assignments. Assignments that can be activated without approval can leave you vulnerable to a security risk from less-privileged administrators. For example, the Helpdesk Administrator has permission to reset an eligible user's passwords.
33+
[!INCLUDE [PIM for Groups note](../includes/pim-for-groups-include.md)]
3534

3635
## What are Azure AD role-assignable groups?
3736

articles/active-directory/privileged-identity-management/groups-assign-member-owner.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ When a membership or ownership is assigned, the assignment:
2727
- Can't be removed within five minutes of it being assigned
2828

2929
>[!NOTE]
30-
>Every user who is eligible for membership in or ownership of a privileged access group must have an Azure AD Premium P2 license. For more information, see [License requirements to use Privileged Identity Management](subscription-requirements.md).
30+
>Every user who is eligible for membership in or ownership of a PIM for Groups must have an Azure AD Premium P2 license. For more information, see [License requirements to use Privileged Identity Management](subscription-requirements.md).
3131
3232
## Assign an owner or member of a group
3333

@@ -63,7 +63,7 @@ Follow these steps to make a user eligible member or owner of a group. You will
6363
> For groups used for elevating into Azure AD roles, Microsoft recommends that you require an approval process for eligible member assignments. Assignments that can be activated without approval can leave you vulnerable to a security risk from another administrator with permission to reset an eligible user's passwords.
6464
- Active assignments don't require the member to perform any activations to use the role. Members or owners assigned as active have the privileges assigned to the role at all times.
6565

66-
1. If the assignment should be permanent (permanently eligible or permanently assigned), select the **Permanently** checkbox. Depending on the group's settings, the check box might not appear or might not be editable. For more information, check out the [Configure privileged access group settings (preview) in Privileged Identity Management](groups-role-settings.md#assignment-duration) article.
66+
1. If the assignment should be permanent (permanently eligible or permanently assigned), select the **Permanently** checkbox. Depending on the group's settings, the check box might not appear or might not be editable. For more information, check out the [Configure PIM for Groups settings (preview) in Privileged Identity Management](groups-role-settings.md#assignment-duration) article.
6767

6868
:::image type="content" source="media/pim-for-groups/pim-group-5.png" alt-text="Screenshot of where to configure the setting for add assignments." lightbox="media/pim-for-groups/pim-group-5.png":::
6969

0 commit comments

Comments
 (0)