You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/governance/create-access-review-pim-for-groups.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Create an access review of Privileged Access Groups - Azure AD (preview)
3
-
description: Learn how to create an access review of Privileged Access Groups in Azure Active Directory.
2
+
title: Create an access review of PIM for Groups - Azure AD (preview)
3
+
description: Learn how to create an access review of PIM for Groups in Azure Active Directory.
4
4
services: active-directory
5
5
author: amsliu
6
6
manager: amycolannino
@@ -16,18 +16,18 @@ ms.reviewer: jgangadhar
16
16
ms.collection: M365-identity-device-management
17
17
---
18
18
19
-
# Create an access review of Privileged Access Groups in Azure AD (preview)
19
+
# Create an access review of PIM for Groups in Azure AD (preview)
20
20
21
-
This article describes how to create one or more access reviews for Privileged Access Groups, which will include the active members of the group as well as the eligible members. Reviews can be performed on both active members of the group, who are active at the time the review is created, and the eligible members of the group.
21
+
This article describes how to create one or more access reviews for PIM for Groups, which will include the active members of the group as well as the eligible members. Reviews can be performed on both active members of the group, who are active at the time the review is created, and the eligible members of the group.
22
22
23
23
## Prerequisites
24
24
25
25
- Azure AD Premium P2.
26
-
- Only Global administrators and Privileged Role administrators can create reviews on Privileged Access Groups. For more information, see [Use Azure AD groups to manage role assignments](../roles/groups-concept.md).
26
+
- Only Global administrators and Privileged Role administrators can create reviews on PIM for Groups. For more information, see [Use Azure AD groups to manage role assignments](../roles/groups-concept.md).
27
27
28
28
For more information, see [License requirements](access-reviews-overview.md#license-requirements).
29
29
30
-
## Create a Privileged Access Group access review
30
+
## Create a PIM for Groups access review
31
31
32
32
### Scope
33
33
1. Sign in to the Azure portal and open the [Identity Governance](https://portal.azure.com/#blade/Microsoft_AAD_ERM/DashboardBlade/) page.
@@ -44,10 +44,10 @@ For more information, see [License requirements](access-reviews-overview.md#lice
44
44
45
45
5. Select **Teams + Groups** and then select **Select Teams + groups** under **Review Scope**. A list of groups to choose from appears on the right.
46
46
47
-

47
+

48
48
49
49
> [!NOTE]
50
-
> When a Privileged Access Group (PAG) is selected, the users under review for the group will include all eligible users and active users in that group.
50
+
> When a PIM for Groups is selected, the users under review for the group will include all eligible users and active users in that group.
51
51
52
52
6. Now you can select a scope for the review. Your options are:
53
53
-**Guest users only**: This option limits the access review to only the Azure AD B2B guest users in your directory.
@@ -64,9 +64,9 @@ For more information, see [License requirements](access-reviews-overview.md#lice
64
64
After you have reached this step, you may follow the instructions outlined under **Next: Reviews** in the [Create an access review of groups or applications](create-access-review.md#next-reviews) article to complete your access review.
65
65
66
66
> [!NOTE]
67
-
> Review of Privileged Access Groups will only assign active owner(s) as the reviewers. Eligible owners are not included. At least one fallback reviewer is required for a Privileged Access Groups review. If there are no active owner(s) when the review begins, the fallback reviewer(s) will be assigned to the review.
67
+
> Review of PIM for Groups will only assign active owner(s) as the reviewers. Eligible owners are not included. At least one fallback reviewer is required for a PIM for Groups review. If there are no active owner(s) when the review begins, the fallback reviewer(s) will be assigned to the review.
68
68
69
69
## Next steps
70
70
71
71
-[Create an access review of groups or applications](create-access-review.md)
72
-
-[Approve activation requests for privileged access group members and owners (preview)](../privileged-identity-management/groups-approval-workflow.md)
72
+
-[Approve activation requests for PIM for Groups members and owners (preview)](../privileged-identity-management/groups-approval-workflow.md)
Copy file name to clipboardExpand all lines: articles/active-directory/governance/create-access-review.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,7 +96,7 @@ If you are reviewing access to an application, then before creating the review,
96
96
If you choose either **Managers of users** or **Group owner(s)**, you can also specify a fallback reviewer. Fallback reviewers are asked to do a review when the user has no manager specified in the directory or if the group doesn't have an owner.
97
97
98
98
>[!IMPORTANT]
99
-
> For Privileged Access Groups (Preview), you must select **Group owner(s)**. It is mandatory to assign at least one fallback reviewer to the review. The review will only assign active owner(s) as the reviewer(s). Eligible owners are not included. If there are no active owners when the review begins, the fallback reviewer(s) will be assigned to the review.
99
+
> For PIM for Groups (Preview), you must select **Group owner(s)**. It is mandatory to assign at least one fallback reviewer to the review. The review will only assign active owner(s) as the reviewer(s). Eligible owners are not included. If there are no active owners when the review begins, the fallback reviewer(s) will be assigned to the review.
100
100
101
101

102
102
@@ -302,7 +302,7 @@ After one or more access reviews have started, you might want to modify or updat
302
302
## Next steps
303
303
304
304
-[Complete an access review of groups or applications](complete-access-review.md)
305
-
-[Create an access review of Privileged Access Groups (preview)](create-access-review-privileged-access-groups.md)
305
+
-[Create an access review of PIM for Groups (preview)](create-access-review-pim-for-groups.md)
306
306
-[Review access to groups or applications](perform-access-review.md)
307
307
-[Review access for yourself to groups or applications](review-your-access.md)
Copy file name to clipboardExpand all lines: articles/active-directory/governance/lifecycle-workflow-tasks.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -175,7 +175,7 @@ For Microsoft Graph the parameters for the **Generate Temporary Access Pass and
175
175
176
176
### Add user to groups
177
177
178
-
Allows users to be added to Microsoft 365 and cloud-only security groups. Mail-enabled, distribution, dynamic and privileged access groups are not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
178
+
Allows users to be added to Microsoft 365 and cloud-only security groups. Mail-enabled, distribution, dynamic and PIM for Groups are not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
179
179
180
180
You're able to customize the task name and description for this task.
181
181
:::image type="content" source="media/lifecycle-workflow-task/add-group-task.png" alt-text="Screenshot of Workflows task: Add user to group task.":::
@@ -353,7 +353,7 @@ For Microsoft Graph the parameters for the **Disable user account** task are as
353
353
354
354
### Remove user from selected groups
355
355
356
-
Allows users to be removed from Microsoft 365 and cloud-only security groups. Mail-enabled, distribution, dynamic and privileged access groups are not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
356
+
Allows users to be removed from Microsoft 365 and cloud-only security groups. Mail-enabled, distribution, dynamic and PIM for Groups are not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
357
357
358
358
You're able to customize the task name and description for this task in the Azure portal.
359
359
:::image type="content" source="media/lifecycle-workflow-task/remove-group-task.png" alt-text="Screenshot of Workflows task: Remove user from select groups.":::
@@ -392,7 +392,7 @@ For Microsoft Graph the parameters for the **Remove user from selected groups**
392
392
393
393
### Remove users from all groups
394
394
395
-
Allows users to be removed from every Microsoft 365 and cloud-only security group they're a member of. Mail-enabled, distribution, dynamic and privileged access groups are not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
395
+
Allows users to be removed from every Microsoft 365 and cloud-only security group they're a member of. Mail-enabled, distribution, dynamic and PIM for Groups are not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
396
396
397
397
398
398
You're able to customize the task name and description for this task in the Azure portal.
> For groups used for elevating into Azure AD roles, we recommend that you require an approval process for eligible member assignments. Assignments that can be activated without approval can leave you vulnerable to a security risk from less-privileged administrators. For example, the Helpdesk Administrator has permission to reset an eligible user's passwords.
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/concept-pim-for-groups.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,8 +30,7 @@ PIM for Groups is part of Azure AD Privileged Identity Management – alongside
30
30
31
31
With PIM for Groups you can use policies similar to ones you use in PIM for Azure AD Roles and PIM for Azure Resources: you can require approval for membership or ownership activation, enforce multi-factor authentication (MFA), require justification, limit maximum activation time, and more. Each group in PIM for Groups has two policies: one for activation of membership and another for activation of ownership in the group. Up until January 2023, PIM for Groups feature was called “Privileged Access Groups”.
32
32
33
-
>[!Note]
34
-
> For groups used for elevating into Azure AD roles, we recommend that you require an approval process for eligible member assignments. Assignments that can be activated without approval can leave you vulnerable to a security risk from less-privileged administrators. For example, the Helpdesk Administrator has permission to reset an eligible user's passwords.
33
+
[!INCLUDE [PIM for Groups note](../includes/pim-for-groups-include.md)]
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/groups-assign-member-owner.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ When a membership or ownership is assigned, the assignment:
27
27
- Can't be removed within five minutes of it being assigned
28
28
29
29
>[!NOTE]
30
-
>Every user who is eligible for membership in or ownership of a privileged access group must have an Azure AD Premium P2 license. For more information, see [License requirements to use Privileged Identity Management](subscription-requirements.md).
30
+
>Every user who is eligible for membership in or ownership of a PIM for Groups must have an Azure AD Premium P2 license. For more information, see [License requirements to use Privileged Identity Management](subscription-requirements.md).
31
31
32
32
## Assign an owner or member of a group
33
33
@@ -63,7 +63,7 @@ Follow these steps to make a user eligible member or owner of a group. You will
63
63
> For groups used for elevating into Azure AD roles, Microsoft recommends that you require an approval process for eligible member assignments. Assignments that can be activated without approval can leave you vulnerable to a security risk from another administrator with permission to reset an eligible user's passwords.
64
64
- Active assignments don't require the member to perform any activations to use the role. Members or owners assigned as active have the privileges assigned to the role at all times.
65
65
66
-
1. If the assignment should be permanent (permanently eligible or permanently assigned), select the **Permanently** checkbox. Depending on the group's settings, the check box might not appear or might not be editable. For more information, check out the [Configure privileged access group settings (preview) in Privileged Identity Management](groups-role-settings.md#assignment-duration) article.
66
+
1. If the assignment should be permanent (permanently eligible or permanently assigned), select the **Permanently** checkbox. Depending on the group's settings, the check box might not appear or might not be editable. For more information, check out the [Configure PIM for Groups settings (preview) in Privileged Identity Management](groups-role-settings.md#assignment-duration) article.
67
67
68
68
:::image type="content" source="media/pim-for-groups/pim-group-5.png" alt-text="Screenshot of where to configure the setting for add assignments." lightbox="media/pim-for-groups/pim-group-5.png":::
0 commit comments