Skip to content

Commit 6df5e19

Browse files
committed
Add tabs for log entries section
1 parent 6157450 commit 6df5e19

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

articles/role-based-access-control/elevate-access-global-admin.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -342,6 +342,8 @@ When you call `elevateAccess`, you create a role assignment for yourself, so to
342342
343343
When access is elevated, an entry is added to the logs. As a Global Administrator in Microsoft Entra ID, you might want to check when access was elevated and who did it. Elevate access log entries do not appear in the standard activity logs, but instead appear in the Directory Activity logs. This section describes different ways that you can view the elevate access log entries.
344344
345+
# [Azure portal](#tab/azure-portal)
346+
345347
### View elevate access log entries using the Azure portal
346348
347349
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
@@ -356,6 +358,8 @@ When access is elevated, an entry is added to the logs. As a Global Administrato
356358
357359
![Screenshot showing directory activity logs in Monitor.](./media/elevate-access-global-admin/monitor-directory-activity.png)
358360
361+
# [Azure CLI](#tab/azure-cli)
362+
359363
### View elevate access log entries using Azure CLI
360364
361365
1. Use the [az login](/cli/azure/reference-index#az-login) command to sign in as Global Administrator.
@@ -413,6 +417,8 @@ A user in the group can now periodically run the [az rest](/cli/azure/reference-
413417
az rest --url "https://management.azure.com/providers/Microsoft.Insights/eventtypes/management/values?api-version=2015-04-01&$filter=eventTimestamp ge '2021-09-10T20:00:00Z'" > output.txt
414418
```
415419

420+
---
421+
416422
## Next steps
417423

418424
- [Understand the different roles](rbac-and-directory-admin-roles.md)

0 commit comments

Comments
 (0)