Skip to content

Commit 7142ade

Browse files
authored
Merge pull request #103267 from curtand/pim0104
[Azure AD PIM] GitHub issue and default tab update
2 parents a97aeeb + 6aee2d2 commit 7142ade

File tree

6 files changed

+268
-268
lines changed

6 files changed

+268
-268
lines changed

articles/active-directory/privileged-identity-management/azure-ad-pim-approval-workflow.md

Lines changed: 44 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -35,103 +35,103 @@ Beginning in November 2019, the Azure AD roles portion of Privileged Identity Ma
3535

3636
Follow the steps in this article to approve or deny requests for Azure AD roles.
3737

38-
# [Previous version](#tab/previous)
38+
# [New version](#tab/new)
3939

4040
## View pending requests
4141

42-
As a delegated approver, you'll receive an email notification when an Azure AD role request is pending your approval. You can view these pending requests in Privileged Identity Management.
42+
As a delegated approver, you'll receive an email notification when an Azure resource role request is pending your approval. You can view these pending requests in Privileged Identity Management.
4343

4444
1. Sign in to the [Azure portal](https://portal.azure.com/).
4545

4646
1. Open **Azure AD Privileged Identity Management**.
4747

48-
1. Click **Azure AD roles**.
49-
50-
1. Click **Approve requests**.
48+
1. Select **Approve requests**.
5149

52-
![Azure AD roles - Approve requests](./media/azure-ad-pim-approval-workflow/approve-requests.png)
50+
![Approve requests - Azure resources page showing request to review](./media/pim-resource-roles-approval-workflow/resources-approve-requests.png)
5351

54-
You'll see a list of requests pending your approval.
52+
In the **Requests for role activations** section, you'll see a list of requests pending your approval.
5553

5654
## Approve requests
5755

58-
1. Select the requests you want to approve and then click **Approve** to open the Approve selected requests pane.
56+
1. Find and select the request that you want to approve. An approve or deny page appears.
5957

60-
![Approve requests list with Approve option highlighted](./media/azure-ad-pim-approval-workflow/pim-approve-requests-list.png)
58+
![Approve requests - approve or deny pane with details and Justification box](./media/azure-ad-pim-approval-workflow/resources-approve-pane.png)
6159

62-
1. In the **Approve reason** box, type a reason.
60+
1. In the **Justification** box, enter the business justification.
6361

64-
![Approve selected requests pane with a approve reason](./media/azure-ad-pim-approval-workflow/pim-approve-selected-requests.png)
62+
1. Select **Approve**. You will receive an Azure notification of your approval.
6563

66-
1. Click **Approve**.
64+
![Approve notification showing request was approved](./media/pim-resource-roles-approval-workflow/resources-approve-notification.png)
6765

68-
The Status symbol will be updated with your approval.
66+
## Deny requests
6967

70-
![Approve selected requests pane after Approve button clicked](./media/azure-ad-pim-approval-workflow/pim-approve-status.png)
68+
1. Find and select the request that you want to deny. An approve or deny page appears.
7169

72-
## Deny requests
70+
![Approve requests - approve or deny pane with details and Justification box](./media/pim-resource-roles-approval-workflow/resources-approve-pane.png)
7371

74-
1. Select the requests you want to deny and then click **Deny** to open the Deny selected requests pane.
72+
1. In the **Justification** box, enter the business justification.
7573

76-
![Approve requests list with Deny option highlighted](./media/azure-ad-pim-approval-workflow/pim-deny-requests-list.png)
74+
1. Select **Deny**. A notification appears with your denial.
7775

78-
1. In the **Deny reason** box, type a reason.
76+
## Workflow notifications
7977

80-
![Deny selected requests pane with a deny reason](./media/azure-ad-pim-approval-workflow/pim-deny-selected-requests.png)
78+
Here's some information about workflow notifications:
8179

82-
1. Click **Deny**.
80+
- Approvers are notified by email when a request for a role is pending their review. Email notifications include a direct link to the request, where the approver can approve or deny.
81+
- Requests are resolved by the first approver who approves or denies.
82+
- When an approver responds to the request, all approvers are notified of the action.
83+
- Resource administrators are notified when an approved user becomes active in their role.
8384

84-
The Status symbol will be updated with your denial.
85+
>[!NOTE]
86+
>A resource administrator who believes that an approved user should not be active can remove the active role assignment in Privileged Identity Management. Although resource administrators are not notified of pending requests unless they are an approver, they can view and cancel pending requests for all users by viewing pending requests in Privileged Identity Management.
8587
86-
# [New version](#tab/new)
88+
# [Previous version](#tab/previous)
8789

8890
## View pending requests
8991

90-
As a delegated approver, you'll receive an email notification when an Azure resource role request is pending your approval. You can view these pending requests in Privileged Identity Management.
92+
As a delegated approver, you'll receive an email notification when an Azure AD role request is pending your approval. You can view these pending requests in Privileged Identity Management.
9193

9294
1. Sign in to the [Azure portal](https://portal.azure.com/).
9395

9496
1. Open **Azure AD Privileged Identity Management**.
9597

96-
1. Select **Approve requests**.
98+
1. Click **Azure AD roles**.
9799

98-
![Approve requests - Azure resources page showing request to review](./media/pim-resource-roles-approval-workflow/resources-approve-requests.png)
100+
1. Click **Approve requests**.
99101

100-
In the **Requests for role activations** section, you'll see a list of requests pending your approval.
102+
![Azure AD roles - Approve requests](./media/azure-ad-pim-approval-workflow/approve-requests.png)
103+
104+
You'll see a list of requests pending your approval.
101105

102106
## Approve requests
103107

104-
1. Find and select the request that you want to approve. An approve or deny page appears.
108+
1. Select the requests you want to approve and then click **Approve** to open the Approve selected requests pane.
105109

106-
![Approve requests - approve or deny pane with details and Justification box](./media/azure-ad-pim-approval-workflow/resources-approve-pane.png)
110+
![Approve requests list with Approve option highlighted](./media/azure-ad-pim-approval-workflow/pim-approve-requests-list.png)
107111

108-
1. In the **Justification** box, enter the business justification.
112+
1. In the **Approve reason** box, type a reason.
109113

110-
1. Select **Approve**. You will receive an Azure notification of your approval.
114+
![Approve selected requests pane with a approve reason](./media/azure-ad-pim-approval-workflow/pim-approve-selected-requests.png)
111115

112-
![Approve notification showing request was approved](./media/pim-resource-roles-approval-workflow/resources-approve-notification.png)
116+
1. Click **Approve**.
113117

114-
## Deny requests
118+
The Status symbol will be updated with your approval.
115119

116-
1. Find and select the request that you want to deny. An approve or deny page appears.
120+
![Approve selected requests pane after Approve button clicked](./media/azure-ad-pim-approval-workflow/pim-approve-status.png)
117121

118-
![Approve requests - approve or deny pane with details and Justification box](./media/pim-resource-roles-approval-workflow/resources-approve-pane.png)
122+
## Deny requests
119123

120-
1. In the **Justification** box, enter the business justification.
124+
1. Select the requests you want to deny and then click **Deny** to open the Deny selected requests pane.
121125

122-
1. Select **Deny**. A notification appears with your denial.
126+
![Approve requests list with Deny option highlighted](./media/azure-ad-pim-approval-workflow/pim-deny-requests-list.png)
123127

124-
## Workflow notifications
128+
1. In the **Deny reason** box, type a reason.
125129

126-
Here's some information about workflow notifications:
130+
![Deny selected requests pane with a deny reason](./media/azure-ad-pim-approval-workflow/pim-deny-selected-requests.png)
127131

128-
- Approvers are notified by email when a request for a role is pending their review. Email notifications include a direct link to the request, where the approver can approve or deny.
129-
- Requests are resolved by the first approver who approves or denies.
130-
- When an approver responds to the request, all approvers are notified of the action.
131-
- Resource administrators are notified when an approved user becomes active in their role.
132+
1. Click **Deny**.
132133

133-
>[!NOTE]
134-
>A resource administrator who believes that an approved user should not be active can remove the active role assignment in Privileged Identity Management. Although resource administrators are not notified of pending requests unless they are an approver, they can view and cancel pending requests for all users by viewing pending requests in Privileged Identity Management.
134+
The Status symbol will be updated with your denial.
135135

136136
---
137137

articles/active-directory/privileged-identity-management/pim-deployment-plan.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.topic: conceptual
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 11/08/2019
13+
ms.date: 02/04/2020
1414
ms.author: curtand
1515
ms.custom:
1616
ms.collection: M365-identity-device-management
@@ -115,7 +115,7 @@ The following section helps you identify all the stakeholders that are involved
115115

116116
As part of the planning process, you must first consent to and enable Privileged Identity Management by following our [start using Privileged Identity Management](pim-getting-started.md) article. Enabling Privileged Identity Management gives you access to some features that are specifically designed to help with your deployment.
117117

118-
If your objective is to deploy Privileged Identity Management for Azure resources, you should follow our [discover Azure resources to manage in Privileged Identity Management](pim-resource-roles-discover-resources.md) article. Only owners of each resource, resource group, and subscription will be able to discover them inside Privileged Identity Management. If you are a Global Administrator trying to deploy Privileged Identity Management for your Azure resources, you can [elevate access to manage all Azure subscriptions](../../role-based-access-control/elevate-access-global-admin.md?toc=%2fazure%2factive-directory%2fprivileged-identity-management%2ftoc.json) to give yourself access to all Azure resources in the directory for discovery. However, we advise that you get approval from each of your subscription owners before managing their resources with Privileged Identity Management.
118+
If your objective is to deploy Privileged Identity Management for Azure resources, you should follow our [discover Azure resources to manage in Privileged Identity Management](pim-resource-roles-discover-resources.md) article. Only owners of subscriptions and management groups can discover and onboard these resources onto Privileged Identity Management. After it is onboarded, the PIM functionality is available for owners at all levels including management group, subscription, resource group, and resource. If you are a Global Administrator trying to deploy Privileged Identity Management for your Azure resources, you can [elevate access to manage all Azure subscriptions](../../role-based-access-control/elevate-access-global-admin.md?toc=%2fazure%2factive-directory%2fprivileged-identity-management%2ftoc.json) to give yourself access to all Azure resources in the directory for discovery. However, we advise that you get approval from each of your subscription owners before managing their resources with Privileged Identity Management.
119119

120120
### Enforce principle of least privilege
121121

@@ -193,7 +193,7 @@ If there are any roles with guest users assigned, they are particularly vulnerab
193193
> [!TIP]
194194
> :heavy_check_mark: **Microsoft recommends** you manage all roles with guest users using Privileged Identity Management to reduce risk associated with compromised guest user accounts.
195195
196-
Reader roles like the Directory Reader, Message Center Reader, and Security Reader are sometimes believed to be less important compared to other roles as they don’t have write permission. However, we have seen some customers also protect these roles because attackers who have gained access to these accounts may be able to read sensitive data, such as personally identifiable information (PII). You should take this into consideration when deciding whether reader roles in your organization need to be managed using Privileged Identity Management.
196+
Reader roles like the Directory Reader, Message Center Reader, and Security Reader are sometimes believed to be less important compared to other roles as they don’t have write permission. However, we have seen some customers also protect these roles because attackers who have gained access to these accounts may be able to read sensitive data, such as personal data. You should take this into consideration when deciding whether reader roles in your organization need to be managed using Privileged Identity Management.
197197

198198
#### Azure resource roles
199199

0 commit comments

Comments
 (0)