Skip to content

Commit 74379ed

Browse files
authored
Merge pull request #202827 from curtand/entra062401
Azure AD Entra PIM rebranding 01
2 parents 9268d27 + bc8be9c commit 74379ed

11 files changed

+23
-23
lines changed

articles/active-directory/privileged-identity-management/azure-ad-pim-approval-workflow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.subservice: pim
1212
ms.topic: how-to
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 10/07/2021
15+
ms.date: 06/24/2022
1616
ms.author: curtand
1717
ms.reviewer: shaunliu
1818
ms.custom: pim
@@ -21,7 +21,7 @@ ms.collection: M365-identity-device-management
2121

2222
# Approve or deny requests for Azure AD roles in Privileged Identity Management
2323

24-
With Azure Active Directory (Azure AD) Privileged Identity Management (PIM), you can configure roles to require approval for activation, and choose one or multiple users or groups as delegated approvers. Delegated approvers have 24 hours to approve requests. If a request is not approved within 24 hours, then the eligible user must re-submit a new request. The 24 hour approval time window is not configurable.
24+
With Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra, you can configure roles to require approval for activation, and choose one or multiple users or groups as delegated approvers. Delegated approvers have 24 hours to approve requests. If a request is not approved within 24 hours, then the eligible user must re-submit a new request. The 24 hour approval time window is not configurable.
2525

2626
## View pending requests
2727

articles/active-directory/privileged-identity-management/azure-pim-resource-rbac.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,14 +11,14 @@ ms.service: active-directory
1111
ms.subservice: pim
1212
ms.topic: how-to
1313
ms.workload: identity
14-
ms.date: 04/20/2021
14+
ms.date: 06/24/2022
1515
ms.author: curtand
1616
ms.reviewer: shaunliu
1717
ms.collection: M365-identity-device-management
1818
---
1919
# View activity and audit history for Azure resource roles in Privileged Identity Management
2020

21-
With Azure Active Directory (Azure AD) Privileged Identity Management (PIM), you can view activity, activations, and audit history for Azure resources roles within your organization. This includes subscriptions, resource groups, and even virtual machines. Any resource within the Azure portal that leverages the Azure role-based access control functionality can take advantage of the security and lifecycle management capabilities in Privileged Identity Management. If you want to retain audit data for longer than the default retention period, you can use Azure Monitor to route it to an Azure storage account. For more information, see [Archive Azure AD logs to an Azure storage account](../reports-monitoring/quickstart-azure-monitor-route-logs-to-storage-account.md).
21+
With Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra, you can view activity, activations, and audit history for Azure resources roles within your organization. This includes subscriptions, resource groups, and even virtual machines. Any resource within the Azure portal that leverages the Azure role-based access control functionality can take advantage of the security and lifecycle management capabilities in Privileged Identity Management. If you want to retain audit data for longer than the default retention period, you can use Azure Monitor to route it to an Azure storage account. For more information, see [Archive Azure AD logs to an Azure storage account](../reports-monitoring/quickstart-azure-monitor-route-logs-to-storage-account.md).
2222

2323
> [!NOTE]
2424
> If your organization has outsourced management functions to a service provider who uses [Azure Lighthouse](../../lighthouse/overview.md), role assignments authorized by that service provider won't be shown here.

articles/active-directory/privileged-identity-management/concept-privileged-access-versus-role-assignable.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 05/18/2022
13+
ms.date: 06/24/2022
1414
ms.author: curtand
1515
ms.reviewer: shaunliu
1616
ms.custom: pim
@@ -23,7 +23,7 @@ Privileged Identity Management (PIM) supports the ability to enable privileged a
2323

2424
## What are Azure AD role-assignable groups?
2525

26-
Azure Active Directory (Azure AD) lets you assign a cloud Azure AD security group to an Azure AD role. A Global Administrator or Privileged Role Administrator must create a new security group and make the group role-assignable at creation time. Only the Global Administrator, Privileged Role Administrator, or the group Owner role assignments can change the membership of the group. Also, no other users can reset the password of the users who are members of the group. This feature helps prevent an admin from elevating to a higher privileged role without going through a request and approval procedure.
26+
Azure Active Directory (Azure AD), part of Microsoft Entra, lets you assign a cloud Azure AD security group to an Azure AD role. A Global Administrator or Privileged Role Administrator must create a new security group and make the group role-assignable at creation time. Only the Global Administrator, Privileged Role Administrator, or the group Owner role assignments can change the membership of the group. Also, no other users can reset the password of the users who are members of the group. This feature helps prevent an admin from elevating to a higher privileged role without going through a request and approval procedure.
2727

2828
## What are Privileged Access groups?
2929

articles/active-directory/privileged-identity-management/groups-activate-roles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 02/02/2022
13+
ms.date: 02/24/2022
1414
ms.author: curtand
1515
ms.reviewer: shaunliu
1616
ms.custom: pim
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
# Activate my privileged access group roles in Privileged Identity Management
2121

22-
Use Privileged Identity Management (PIM) to allow eligible role members for privileged access groups to schedule role activation for a specified date and time. They can also select a activation duration up to the maximum duration configured by administrators.
22+
Use Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra,to allow eligible role members for privileged access groups to schedule role activation for a specified date and time. They can also select a activation duration up to the maximum duration configured by administrators.
2323

2424
This article is for eligible members who want to activate their privileged access group role in Privileged Identity Management.
2525

articles/active-directory/privileged-identity-management/groups-approval-workflow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: conceptual
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 10/07/2021
13+
ms.date: 06/24/2022
1414
ms.author: curtand
1515
ms.reviewer: shaunliu
1616
ms.custom: pim
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
# Approve activation requests for privileged access group members and owners (preview)
2121

22-
With Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), you can configure privileged access group members and owners to require approval for activation, and choose users or groups from your Azure AD organization as delegated approvers. We recommend selecting two or more approvers for each group to reduce workload for the privileged role administrator. Delegated approvers have 24 hours to approve requests. If a request is not approved within 24 hours, then the eligible user must re-submit a new request. The 24 hour approval time window is not configurable.
22+
With Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra, you can configure privileged access group members and owners to require approval for activation, and choose users or groups from your Azure AD organization as delegated approvers. We recommend selecting two or more approvers for each group to reduce workload for the privileged role administrator. Delegated approvers have 24 hours to approve requests. If a request is not approved within 24 hours, then the eligible user must re-submit a new request. The 24 hour approval time window is not configurable.
2323

2424
Follow the steps in this article to approve or deny requests for Azure resource roles.
2525

articles/active-directory/privileged-identity-management/groups-assign-member-owner.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: conceptual
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 02/02/2022
13+
ms.date: 06/24/2022
1414
ms.author: curtand
1515
ms.reviewer: shaunliu
1616
ms.custom: pim
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
# Assign eligibility for a privileged access group (preview) in Privileged Identity Management
2121

22-
Azure Active Directory (Azure AD) Privileged Identity Management (PIM) can help you manage the eligibility and activation of assignments to privileged access groups in Azure AD. You can assign eligibility to members or owners of the group.
22+
Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra, can help you manage the eligibility and activation of assignments to privileged access groups in Azure AD. You can assign eligibility to members or owners of the group.
2323

2424
When a role is assigned, the assignment:
2525
- Can't be assigned for a duration of less than five minutes

articles/active-directory/privileged-identity-management/groups-audit.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,14 +11,14 @@ ms.service: active-directory
1111
ms.topic: article
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 10/07/2021
14+
ms.date: 06/24/2022
1515
ms.author: curtand
1616
ms.reviewer: shaunliu
1717
ms.collection: M365-identity-device-management
1818
---
1919
# Audit activity history for privileged access group assignments (preview) in Privileged Identity Management
2020

21-
With Privileged Identity Management (PIM), you can view activity, activations, and audit history for Azure privileged access group members and owners within your Azure Active Directory (Azure AD) organization.
21+
With Privileged Identity Management (PIM), you can view activity, activations, and audit history for Azure privileged access group members and owners within your organization in Azure Active Directory (Azure AD), part of Microsoft Entra.
2222

2323
> [!NOTE]
2424
> If your organization has outsourced management functions to a service provider who uses [Azure Lighthouse](../../lighthouse/overview.md), role assignments authorized by that service provider won't be shown here.

articles/active-directory/privileged-identity-management/groups-discover-groups.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,15 +10,15 @@ ms.topic: how-to
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 12/02/2020
13+
ms.date: 06/24/2022
1414
ms.author: curtand
1515
ms.reviewer: shaunliu
1616
ms.collection: M365-identity-device-management
1717
---
1818

1919
# Bring privileged access groups (preview) into Privileged Identity Management
2020

21-
In Azure Active Directory (Azure AD), you can assign Azure AD built-in roles to cloud groups to simplify how you manage role assignments. To protect Azure AD roles and to secure access, you can now use Privileged Identity Management (PIM) to manage just-in-time access for members or owners of these groups. To manage an Azure AD role-assignable group as a privileged access group in Privileged Identity Management, you must bring it under management in PIM.
21+
In Azure Active Directory (Azure AD), part of Microsoft Entra, you can assign Azure AD built-in roles to cloud groups to simplify how you manage role assignments. To protect Azure AD roles and to secure access, you can now use Privileged Identity Management (PIM) to manage just-in-time access for members or owners of these groups. To manage an Azure AD role-assignable group as a privileged access group in Privileged Identity Management, you must bring it under management in PIM.
2222

2323
## Identify groups to manage
2424

articles/active-directory/privileged-identity-management/groups-features.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.subservice: pim
1212
ms.topic: overview
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 04/18/2022
15+
ms.date: 06/24/2022
1616
ms.author: curtand
1717
ms.custom: pim
1818
ms.collection: M365-identity-device-management
@@ -23,9 +23,9 @@ ms.collection: M365-identity-device-management
2323

2424
# Management capabilities for Privileged Access groups (preview)
2525

26-
In Privileged Identity Management (PIM), you can now assign eligibility for membership or ownership of privileged access groups. Starting with this preview, you can assign Azure Active Directory (Azure AD) built-in roles to cloud groups and use PIM to manage group member and owner eligibility and activation. For more information about role-assignable groups in Azure AD, see [Use Azure AD groups to manage role assignments](../roles/groups-concept.md).
26+
In Privileged Identity Management (PIM), you can now assign eligibility for membership or ownership of privileged access groups. Starting with this preview, you can assign built-in roles in Azure Active Directory (Azure AD), part of Microsoft Entra, to cloud groups and use PIM to manage group member and owner eligibility and activation. For more information about role-assignable groups in Azure AD, see [Use Azure AD groups to manage role assignments](../roles/groups-concept.md).
2727

28-
> [!Important]
28+
> [!IMPORTANT]
2929
> To provide a group of users with just-in-time access to roles with permissions in SharePoint, Exchange, or Security & Compliance Center, be sure to make permanent assignments of users to the group, and then assign the group to a role as eligible for activation. If instead you assign a role permanently to a group and and assign users to be eligible to group membership, it might take significant time to have all permissions of the role activated and ready to use.
3030
3131
> [!NOTE]

articles/active-directory/privileged-identity-management/groups-renew-extend.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,15 +11,15 @@ ms.workload: identity
1111
ms.tgt_pltfrm: na
1212
ms.topic: how-to
1313
ms.subservice: pim
14-
ms.date: 10/07/2021
14+
ms.date: 06/24/2022
1515
ms.author: curtand
1616
ms.custom: pim
1717
ms.collection: M365-identity-device-management
1818
---
1919

2020
# Extend or renew privileged access group assignments (preview) in Privileged Identity Management
2121

22-
Azure Active Directory (Azure AD) Privileged Identity Management (PIM) provides controls to manage the access and assignment lifecycle for privileged access groups. Administrators can assign roles using start and end date-time properties. When the assignment end approaches, Privileged Identity Management sends email notifications to the affected users or groups. It also sends email notifications to administrators of the resource to ensure that appropriate access is maintained. Assignments might be renewed and remain visible in an expired state for up to 30 days, even if access is not extended.
22+
Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra, provides controls to manage the access and assignment lifecycle for privileged access groups. Administrators can assign roles using start and end date-time properties. When the assignment end approaches, Privileged Identity Management sends email notifications to the affected users or groups. It also sends email notifications to administrators of the resource to ensure that appropriate access is maintained. Assignments might be renewed and remain visible in an expired state for up to 30 days, even if access is not extended.
2323

2424
## Who can extend and renew
2525

0 commit comments

Comments
 (0)