Skip to content

Commit 70dedb6

Browse files
committed
[Azure AD PIM] remove references to group role assignments
1 parent c9d9f0a commit 70dedb6

File tree

2 files changed

+8
-14
lines changed

2 files changed

+8
-14
lines changed

articles/active-directory/privileged-identity-management/pim-how-to-add-role-to-user.md

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -56,24 +56,18 @@ Follow these steps to make a user eligible for an Azure AD admin role.
5656

5757
1. Select a role you want to assign and then click **Select**.
5858

59-
The **Select a member or group** page opens.
60-
61-
1. Select a member or group you want to assign to the role and then select **Select**.
59+
1. Select a member to whom you want to assign to the role and then select **Select**.
6260

6361
![Select a member or group pane](./media/pim-resource-roles-assign-roles/resources-select-member-or-group.png)
6462

65-
The Membership settings pane opens.
66-
67-
1. In the **Assignment type** list, select **Eligible** or **Active**.
68-
69-
![Memberships settings pane](./media/pim-resource-roles-assign-roles/resources-membership-settings-type.png)
70-
71-
Privileged Identity Management for Azure resources provides two distinct assignment types:
63+
1. In the **Assignment type** list on the **Membership settings** pane, select **Eligible** or **Active**.
7264

7365
- **Eligible** assignments require the member of the role to perform an action to use the role. Actions might include performing a multi-factor authentication (MFA) check, providing a business justification, or requesting approval from designated approvers.
7466

7567
- **Active** assignments don't require the member to perform any action to use the role. Members assigned as active have the privileges assigned to the role at all times.
7668

69+
![Memberships settings pane](./media/pim-resource-roles-assign-roles/resources-membership-settings-type.png)
70+
7771
1. If the assignment should be permanent (permanently eligible or permanently assigned), select the **Permanently** checkbox.
7872

7973
Depending on the role settings, the check box might not appear or might be unmodifiable.

articles/active-directory/privileged-identity-management/pim-how-to-change-default-settings.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ Privileged Identity Management provides optional enforcement of Azure Multi-Fact
8484

8585
### Require Multi-Factor Authentication on active assignment
8686

87-
In some cases, you might want to assign a user or group to a role for a short duration (one day, for example). In this case, the assigned users don't need to request activation. In this scenario, Privileged Identity Management can't enforce multi-factor authentication when the user uses their role assignment because they are already active in the role from the time that it is assigned.
87+
In some cases, you might want to assign a user to a role for a short duration (one day, for example). In this case, the assigned users don't need to request activation. In this scenario, Privileged Identity Management can't enforce multi-factor authentication when the user uses their role assignment because they are already active in the role from the time that it is assigned.
8888

8989
To ensure that the resource administrator fulfilling the assignment is who they say they are, you can enforce multi-factor authentication on active assignment by checking the **Require Multi-Factor Authentication on active assignment** box.
9090

@@ -110,11 +110,11 @@ If you want to require approval to activate a role, follow these steps.
110110

111111
1. Check the **Require approval to activate** check box.
112112

113-
1. Select **Select approvers** to open the **Select a member or group** page.
113+
1. Select **Select approvers**.
114114

115115
![Select a user or group pane to select approvers](./media/pim-resource-roles-configure-role-settings/resources-role-settings-select-approvers.png)
116116

117-
1. Select at least one user or group and then click **Select**. You can add any combination of users and groups. You must select at least one approver. There are no default approvers.
117+
1. Select at least one user and then click **Select**. You must select at least one approver. There are no default approvers.
118118

119119
Your selections will appear in the list of selected approvers.
120120

@@ -203,7 +203,7 @@ If you want to delegate the required approval to activate a role, follow these s
203203

204204
![Azure AD roles - Settings - Require approval](./media/pim-how-to-change-default-settings/pim-directory-roles-settings-require-approval-select-approvers.png)
205205

206-
1. Select one or more approvers in addition to the Privileged role administrator and then click **Select**. You can select users or groups. We recommend that you add at least two approvers. Even if you add yourself as an approver, you can't self-approve a role activation. Your selections will appear in the list of selected approvers.
206+
1. Select one or more approvers in addition to the Privileged role administrator and then click **Select**. We recommend that you add at least two approvers. Even if you add yourself as an approver, you can't self-approve a role activation. Your selections will appear in the list of selected approvers.
207207

208208
1. After you have specified your all your role settings, select **Save** to save your changes.
209209

0 commit comments

Comments
 (0)