You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Create an access review of Azure AD roles in Privileged Identity Management
21
21
22
-
Access to privileged Azure Active Directory (Azure AD) roles for employees changes over time. To reduce the risk associated with stale role assignments, you should regularly review access. You can use Azure AD Privileged Identity Management (PIM) to create access reviews for privileged Azure AD roles. You can also configure recurring access reviews that occur automatically.
22
+
Requirements for users to obtain access to privileged Azure Active Directory (Azure AD) roles can change over time. To reduce the risk associated with stale role assignments, you should regularly review access. You can use Azure AD Privileged Identity Management (PIM) to create access reviews for privileged Azure AD roles. You can also configure recurring access reviews that occur automatically.
23
23
24
24
This article describes how to create one or more access reviews for privileged Azure AD roles.
25
25
26
26
## Prerequisites
27
27
28
-
-[Privileged Role Administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator)
28
+
[Privileged Role Administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator)
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/pim-how-to-use-audit-log.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,15 +11,15 @@ ms.service: active-directory
11
11
ms.topic: conceptual
12
12
ms.workload: identity
13
13
ms.subservice: pim
14
-
ms.date: 06/10/2019
14
+
ms.date: 10/22/2019
15
15
ms.author: curtand
16
16
ms.custom: pim
17
17
18
18
ms.collection: M365-identity-device-management
19
19
---
20
20
# View audit history for Azure AD roles in PIM
21
21
22
-
You can use the Azure Active Directory (Azure AD) Privileged Identity Management (PIM) audit history to see all the role assignments and activations within the past 30 days for all privileged roles. If you want to see the full audit history of activity in your directory, including administrator, end user, and synchronization activity, you can use the [Azure Active Directory security and activity reports](../reports-monitoring/overview-reports.md).
22
+
You can use the Privileged Identity Management (PIM) audit history to see all role assignments and activations within the past 30 days for all privileged roles. If you want to see the full audit history of activity in your Azure Active Directory (Azure AD) organization, including administrator, end user, and synchronization activity, you can use the [Azure Active Directory security and activity reports](../reports-monitoring/overview-reports.md).
23
23
24
24
## View audit history
25
25
@@ -59,12 +59,12 @@ Follow these steps to view the audit history for Azure AD roles.
59
59
60
60
1. In **Time range**, select a time range.
61
61
62
-
1. In **Roles**, add checkmarks for the roles you want to view.
62
+
1. In **Roles**, select the checkboxes to indicate the roles you want to view.
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/pim-resource-roles-activate-your-roles.md
+24-24Lines changed: 24 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,49 +11,49 @@ ms.topic: conceptual
11
11
ms.tgt_pltfrm: na
12
12
ms.workload: identity
13
13
ms.subservice: pim
14
-
ms.date: 06/28/2019
14
+
ms.date: 10/22/2019
15
15
ms.author: curtand
16
16
ms.custom: pim
17
17
ms.collection: M365-identity-device-management
18
18
---
19
19
20
-
# Activate my Azure resource roles in PIM
20
+
# Activate my Azure resource roles in Privileged Identity Management
21
21
22
-
Using Azure Active Directory (Azure AD) Privileged Identity Management (PIM), eligible role members for Azure resources can schedule activation for a future date and time. They can also select a specific activation duration within the maximum (configured by administrators).
22
+
Use Privileged Identity Management (PIM) to allow eligible role members for Azure resources to schedule activation for a future date and time. They can also select a specific activation duration within the maximum (configured by administrators).
23
23
24
-
This article is for members who need to activate their Azure resource role in PIM.
24
+
This article is for members who need to activate their Azure resource role in Privileged Identity Management.
25
25
26
26
## Activate a role
27
27
28
-
When you need to take on an Azure resource role, you can request activation by using the **My roles** navigation option in PIM.
28
+
When you need to take on an Azure resource role, you can request activation by using the **My roles** navigation option in Privileged Identity Management.
29
29
30
30
1. Sign in to the [Azure portal](https://portal.azure.com/).
31
31
32
-
1. Open **Azure AD Privileged Identity Management**. For information about how to add the PIM tile to your dashboard, see [Start using PIM](pim-getting-started.md).
32
+
1. Open **Azure AD Privileged Identity Management**. For information about how to add the Privileged Identity Management tile to your dashboard, see [Start using Privileged Identity Management](pim-getting-started.md).
33
33
34
-
1.Click**My roles**.
34
+
1.Select**My roles**.
35
35
36
36

37
37
38
-
1.Click**Azure resource roles** to see a list of your eligible Azure resource roles.
38
+
1.Select**Azure resource roles** to see a list of your eligible Azure resource roles.
1. In the **Azure resource roles** list, find the role you want to activate.
43
43
44
44

45
45
46
-
1.Click**Activate** to open the Activate pane.
46
+
1.Select**Activate** to open the Activate pane.
47
47
48
-
1. If your role requires multi-factor authentication (MFA), click**Verify your identity before proceeding**. You only have to authenticate once per session.
48
+
1. If your role requires multi-factor authentication, select**Verify your identity before proceeding**. You only have to authenticate once per session.
49
49
50
50

51
51
52
-
1.Click**Verify my identity** and follow the instructions to provide additional security verification.
52
+
1.Select**Verify my identity** and follow the instructions to provide additional security verification.
53
53
54
54

55
55
56
-
1. If you want to specify a reduced scope, click**Scope** to open the Resource filter pane.
56
+
1. If you want to specify a reduced scope, select**Scope** to open the Resource filter pane.
57
57
58
58
It's a best practice to only request access to the resources you need. On the Resource filter pane, you can specify the resource groups or resources that you need access to.
59
59
@@ -65,7 +65,7 @@ When you need to take on an Azure resource role, you can request activation by u
65
65
66
66

67
67
68
-
1.Click**Activate**.
68
+
1.Select**Activate**.
69
69
70
70
If the role does not require approval, it is activated and added to the list of active roles. If you want to use the role, follow the steps in next section.
71
71
@@ -79,11 +79,11 @@ In case of any delay after activation, follow these steps after you activate to
79
79
80
80
1. Open Azure AD Privileged Identity Management.
81
81
82
-
1.Click**My roles** to see a list of your eligible Azure AD roles and Azure resource roles.
82
+
1.Select**My roles** to see a list of your eligible Azure AD roles and Azure resource roles.
83
83
84
-
1.Click**Azure resource roles**.
84
+
1.Select**Azure resource roles**.
85
85
86
-
1.Click the **Active roles** tab.
86
+
1.Select the **Active roles** tab.
87
87
88
88
1. Once the role is active, sign out of the portal and sign back in.
89
89
@@ -95,7 +95,7 @@ You can view the status of your pending requests to activate.
95
95
96
96
1. Open Azure AD Privileged Identity Management.
97
97
98
-
1.Click**My requests** to see a list of your Azure AD role and Azure resource role requests.
98
+
1.Select**My requests** to see a list of your Azure AD role and Azure resource role requests.
99
99
100
100

101
101
@@ -107,27 +107,27 @@ If you do not require activation of a role that requires approval, you can cance
107
107
108
108
1. Open Azure AD Privileged Identity Management.
109
109
110
-
1.Click**My requests**.
110
+
1.Select**My requests**.
111
111
112
-
1. For the role that you want to cancel, click the **Cancel** link.
112
+
1. For the role that you want to cancel, select the **Cancel** link.
113
113
114
-
When you click Cancel, the request will be canceled. To activate the role again, you will have to submit a new request for activation.
114
+
When you select Cancel, the request will be canceled. To activate the role again, you will have to submit a new request for activation.
115
115
116
116

117
117
118
118
## Troubleshoot
119
119
120
120
### Permissions are not granted after activating a role
121
121
122
-
When you activate a role in PIM, the activation may not instantly propagate to all portals that require the privileged role. Sometimes, even if the change is propagated, web caching in a portal may result in the change not taking effect immediately. If your activation is delayed, here is what you should do.
122
+
When you activate a role in Privileged Identity Management, the activation may not instantly propagate to all portals that require the privileged role. Sometimes, even if the change is propagated, web caching in a portal may result in the change not taking effect immediately. If your activation is delayed, here is what you should do.
123
123
124
124
1. Sign out of the Azure portal and then sign back in.
125
125
126
126
When you activate an Azure resource role, you will see the stages of your activation. Once all the stages are complete, you will see a **Sign out** link. You can use this link to sign out. This will solve most cases for activation delay.
127
127
128
-
1. In PIM, verify that you are listed as the member of the role.
128
+
1. In Privileged Identity Management, verify that you are listed as the member of the role.
129
129
130
130
## Next steps
131
131
132
-
-[Extend or renew Azure resource roles in PIM](pim-resource-roles-renew-extend.md)
133
-
-[Activate my Azure AD roles in PIM](pim-how-to-activate-role.md)
132
+
-[Extend or renew Azure resource roles in Privileged Identity Management](pim-resource-roles-renew-extend.md)
133
+
-[Activate my Azure AD roles in Privileged Identity Management](pim-how-to-activate-role.md)
0 commit comments