You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
With Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra, you can configure roles to require approval for activation, and choose one or multiple users or groups as delegated approvers. Delegated approvers have 24 hours to approve requests. If a request is not approved within 24 hours, then the eligible user must re-submit a new request. The 24 hour approval time window is not configurable.
As a delegated approver, you'll receive an email notification when an Azure resource role request is pending your approval. You can view these pending requests in Privileged Identity Management.
31
32
33
+
32
34
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Privileged role administrator](../roles/permissions-reference.md#privileged-role-administrator).
@@ -37,27 +39,54 @@ As a delegated approver, you'll receive an email notification when an Azure reso
37
39
38
40
In the **Requests for role activations** section, you'll see a list of requests pending your approval.
39
41
42
+
40
43
## Approve requests
41
44
42
-
1. Find and select the request that you want to approve. An approve or deny page appears.
45
+
1. Find and select the request that you want to approve. An approve or deny page appears.
46
+
2. In the **Justification** box, enter the business justification.
47
+
3. Select **Approve**. You will receive an Azure notification of your approval.
43
48
44
-

45
49
46
-
1. In the **Justification** box, enter the business justification.
50
+
## Approve pending requests using Microsoft ARM API
47
51
48
-
1. Select **Approve**. You will receive an Azure notification of your approval.
52
+
>[!NOTE]
53
+
> Approval for **extend and renew** requests is currently not supported by the Microsoft ARM API
49
54
50
-

55
+
### Get IDs for the steps that require approval
51
56
52
-
## Deny requests
57
+
To get the details of any stage of a role assignment approval, you can use [Role Assignment Approval Step - Get By ID](/rest/api/authorization/role-assignment-approval-step/get-by-id?tabs=HTTP) REST API.
58
+
59
+
#### HTTP request
60
+
61
+
````HTTP
62
+
GET https://management.azure.com/providers/Microsoft.Authorization/roleAssignmentApprovals/{approvalId}/stages/{stageId}?api-version=2021-01-01-preview
63
+
````
53
64
54
-
1. Find and select the request that you want to deny. An approve or deny page appears.
55
65
56
-

66
+
### Approve the activation request step
57
67
58
-
1. In the **Justification** box, enter the business justification.
Successful PATCH calls generate an empty response.
82
+
83
+
For more information, see [Use Role Assignment Approvals to approve PIM role activation requests with REST API](/rest/api/authorization/privileged-approval-sample)
84
+
85
+
## Deny requests
59
86
60
-
1. Select **Deny**. A notification appears with your denial.
87
+
1. Find and select the request that you want to approve. An approve or deny page appears.
88
+
2. In the **Justification** box, enter the business justification.
89
+
3. Select **Deny**. A notification appears with your denial.
0 commit comments