Skip to content

Commit 6129b8e

Browse files
committed
more articles again to 10
1 parent 57fb042 commit 6129b8e

File tree

3 files changed

+30
-30
lines changed

3 files changed

+30
-30
lines changed

articles/active-directory/privileged-identity-management/pim-how-to-start-security-review.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,13 +19,13 @@ ms.collection: M365-identity-device-management
1919

2020
# Create an access review of Azure AD roles in Privileged Identity Management
2121

22-
Access to privileged Azure Active Directory (Azure AD) roles for employees changes over time. To reduce the risk associated with stale role assignments, you should regularly review access. You can use Azure AD Privileged Identity Management (PIM) to create access reviews for privileged Azure AD roles. You can also configure recurring access reviews that occur automatically.
22+
Requirements for users to obtain access to privileged Azure Active Directory (Azure AD) roles can change over time. To reduce the risk associated with stale role assignments, you should regularly review access. You can use Azure AD Privileged Identity Management (PIM) to create access reviews for privileged Azure AD roles. You can also configure recurring access reviews that occur automatically.
2323

2424
This article describes how to create one or more access reviews for privileged Azure AD roles.
2525

2626
## Prerequisites
2727

28-
- [Privileged Role Administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator)
28+
[Privileged Role Administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator)
2929

3030
## Open access reviews
3131

articles/active-directory/privileged-identity-management/pim-how-to-use-audit-log.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,15 +11,15 @@ ms.service: active-directory
1111
ms.topic: conceptual
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 06/10/2019
14+
ms.date: 10/22/2019
1515
ms.author: curtand
1616
ms.custom: pim
1717

1818
ms.collection: M365-identity-device-management
1919
---
2020
# View audit history for Azure AD roles in PIM
2121

22-
You can use the Azure Active Directory (Azure AD) Privileged Identity Management (PIM) audit history to see all the role assignments and activations within the past 30 days for all privileged roles. If you want to see the full audit history of activity in your directory, including administrator, end user, and synchronization activity, you can use the [Azure Active Directory security and activity reports](../reports-monitoring/overview-reports.md).
22+
You can use the Privileged Identity Management (PIM) audit history to see all role assignments and activations within the past 30 days for all privileged roles. If you want to see the full audit history of activity in your Azure Active Directory (Azure AD) organization, including administrator, end user, and synchronization activity, you can use the [Azure Active Directory security and activity reports](../reports-monitoring/overview-reports.md).
2323

2424
## View audit history
2525

@@ -59,12 +59,12 @@ Follow these steps to view the audit history for Azure AD roles.
5959

6060
1. In **Time range**, select a time range.
6161

62-
1. In **Roles**, add checkmarks for the roles you want to view.
62+
1. In **Roles**, select the checkboxes to indicate the roles you want to view.
6363

6464
![Update chart parameters pane](media/pim-how-to-use-audit-log/update-chart-parameters.png)
6565

6666
1. Click **Done** to view the filtered audit history.
6767

6868
## Next steps
6969

70-
- [View activity and audit history for Azure resource roles in PIM](azure-pim-resource-rbac.md)
70+
- [View activity and audit history for Azure resource roles in Privileged Identity Management](azure-pim-resource-rbac.md)

articles/active-directory/privileged-identity-management/pim-resource-roles-activate-your-roles.md

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -11,49 +11,49 @@ ms.topic: conceptual
1111
ms.tgt_pltfrm: na
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 06/28/2019
14+
ms.date: 10/22/2019
1515
ms.author: curtand
1616
ms.custom: pim
1717
ms.collection: M365-identity-device-management
1818
---
1919

20-
# Activate my Azure resource roles in PIM
20+
# Activate my Azure resource roles in Privileged Identity Management
2121

22-
Using Azure Active Directory (Azure AD) Privileged Identity Management (PIM), eligible role members for Azure resources can schedule activation for a future date and time. They can also select a specific activation duration within the maximum (configured by administrators).
22+
Use Privileged Identity Management (PIM) to allow eligible role members for Azure resources to schedule activation for a future date and time. They can also select a specific activation duration within the maximum (configured by administrators).
2323

24-
This article is for members who need to activate their Azure resource role in PIM.
24+
This article is for members who need to activate their Azure resource role in Privileged Identity Management.
2525

2626
## Activate a role
2727

28-
When you need to take on an Azure resource role, you can request activation by using the **My roles** navigation option in PIM.
28+
When you need to take on an Azure resource role, you can request activation by using the **My roles** navigation option in Privileged Identity Management.
2929

3030
1. Sign in to the [Azure portal](https://portal.azure.com/).
3131

32-
1. Open **Azure AD Privileged Identity Management**. For information about how to add the PIM tile to your dashboard, see [Start using PIM](pim-getting-started.md).
32+
1. Open **Azure AD Privileged Identity Management**. For information about how to add the Privileged Identity Management tile to your dashboard, see [Start using Privileged Identity Management](pim-getting-started.md).
3333

34-
1. Click **My roles**.
34+
1. Select **My roles**.
3535

3636
![My roles page showing roles you can activate](./media/pim-resource-roles-activate-your-roles/resources-my-roles.png)
3737

38-
1. Click **Azure resource roles** to see a list of your eligible Azure resource roles.
38+
1. Select **Azure resource roles** to see a list of your eligible Azure resource roles.
3939

4040
![My roles - Azure resource roles page](./media/pim-resource-roles-activate-your-roles/resources-my-roles-azure-resources.png)
4141

4242
1. In the **Azure resource roles** list, find the role you want to activate.
4343

4444
![Azure resource roles - My eligible roles list](./media/pim-resource-roles-activate-your-roles/resources-my-roles-activate.png)
4545

46-
1. Click **Activate** to open the Activate pane.
46+
1. Select **Activate** to open the Activate pane.
4747

48-
1. If your role requires multi-factor authentication (MFA), click **Verify your identity before proceeding**. You only have to authenticate once per session.
48+
1. If your role requires multi-factor authentication, select **Verify your identity before proceeding**. You only have to authenticate once per session.
4949

5050
![Verify my identity with MFA before role activation](./media/pim-resource-roles-activate-your-roles/resources-my-roles-mfa.png)
5151

52-
1. Click **Verify my identity** and follow the instructions to provide additional security verification.
52+
1. Select **Verify my identity** and follow the instructions to provide additional security verification.
5353

5454
![Screen to provide security verification such as a PIN code](./media/pim-resource-roles-activate-your-roles/resources-mfa-enter-code.png)
5555

56-
1. If you want to specify a reduced scope, click **Scope** to open the Resource filter pane.
56+
1. If you want to specify a reduced scope, select **Scope** to open the Resource filter pane.
5757

5858
It's a best practice to only request access to the resources you need. On the Resource filter pane, you can specify the resource groups or resources that you need access to.
5959

@@ -65,7 +65,7 @@ When you need to take on an Azure resource role, you can request activation by u
6565

6666
![Completed Activate pane with scope, start time, duration, and reason](./media/pim-resource-roles-activate-your-roles/resources-my-roles-activate-done.png)
6767

68-
1. Click **Activate**.
68+
1. Select **Activate**.
6969

7070
If the role does not require approval, it is activated and added to the list of active roles. If you want to use the role, follow the steps in next section.
7171

@@ -79,11 +79,11 @@ In case of any delay after activation, follow these steps after you activate to
7979

8080
1. Open Azure AD Privileged Identity Management.
8181

82-
1. Click **My roles** to see a list of your eligible Azure AD roles and Azure resource roles.
82+
1. Select **My roles** to see a list of your eligible Azure AD roles and Azure resource roles.
8383

84-
1. Click **Azure resource roles**.
84+
1. Select **Azure resource roles**.
8585

86-
1. Click the **Active roles** tab.
86+
1. Select the **Active roles** tab.
8787

8888
1. Once the role is active, sign out of the portal and sign back in.
8989

@@ -95,7 +95,7 @@ You can view the status of your pending requests to activate.
9595

9696
1. Open Azure AD Privileged Identity Management.
9797

98-
1. Click **My requests** to see a list of your Azure AD role and Azure resource role requests.
98+
1. Select **My requests** to see a list of your Azure AD role and Azure resource role requests.
9999

100100
![My requests - Azure resource page showing your pending requests](./media/pim-resource-roles-activate-your-roles/resources-my-requests.png)
101101

@@ -107,27 +107,27 @@ If you do not require activation of a role that requires approval, you can cance
107107

108108
1. Open Azure AD Privileged Identity Management.
109109

110-
1. Click **My requests**.
110+
1. Select **My requests**.
111111

112-
1. For the role that you want to cancel, click the **Cancel** link.
112+
1. For the role that you want to cancel, select the **Cancel** link.
113113

114-
When you click Cancel, the request will be canceled. To activate the role again, you will have to submit a new request for activation.
114+
When you select Cancel, the request will be canceled. To activate the role again, you will have to submit a new request for activation.
115115

116116
![My request list with Cancel action highlighted](./media/pim-resource-roles-activate-your-roles/resources-my-requests-cancel.png)
117117

118118
## Troubleshoot
119119

120120
### Permissions are not granted after activating a role
121121

122-
When you activate a role in PIM, the activation may not instantly propagate to all portals that require the privileged role. Sometimes, even if the change is propagated, web caching in a portal may result in the change not taking effect immediately. If your activation is delayed, here is what you should do.
122+
When you activate a role in Privileged Identity Management, the activation may not instantly propagate to all portals that require the privileged role. Sometimes, even if the change is propagated, web caching in a portal may result in the change not taking effect immediately. If your activation is delayed, here is what you should do.
123123

124124
1. Sign out of the Azure portal and then sign back in.
125125

126126
When you activate an Azure resource role, you will see the stages of your activation. Once all the stages are complete, you will see a **Sign out** link. You can use this link to sign out. This will solve most cases for activation delay.
127127

128-
1. In PIM, verify that you are listed as the member of the role.
128+
1. In Privileged Identity Management, verify that you are listed as the member of the role.
129129

130130
## Next steps
131131

132-
- [Extend or renew Azure resource roles in PIM](pim-resource-roles-renew-extend.md)
133-
- [Activate my Azure AD roles in PIM](pim-how-to-activate-role.md)
132+
- [Extend or renew Azure resource roles in Privileged Identity Management](pim-resource-roles-renew-extend.md)
133+
- [Activate my Azure AD roles in Privileged Identity Management](pim-how-to-activate-role.md)

0 commit comments

Comments
 (0)