You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Privileged Identity Management in Azure Active Directory (Azure AD) now supports just-in-time and time-bound assignment to custom roles created for Application Management in the Identity and Access Management administrative experience. For more information about creating custom roles to delegate application management in Azure AD, see [Custom administrator roles in Azure Active Directory (preview)](../users-groups-roles/roles-custom-overview.md).
28
28
29
29
> [!NOTE]
30
-
> Azure AD custom roles are not integrated with the built-in directory roles during preview. Once the capability is generally available, role management will take place in the built-in roles experience.
30
+
> Azure AD custom roles are not integrated with the built-in directory roles during preview. Once the capability is generally available, role management will take place in the built-in roles experience. If you see the following banner, these roles should be managed [in the built-in roles experience](pim-how-to-activate-role.md) and this article does not apply:
31
+
>
32
+
> [](media/pim-how-to-add-role-to-user/pim-new-version.png#lightbox)
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/azure-ad-custom-roles-assign.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,9 @@ This article tells you how to use Privileged Identity Management (PIM) to create
31
31
- For information about how to grant another administrator access to manage Privileged Identity Management, see [Grant access to other administrators to manage Privileged Identity Management](pim-how-to-give-access-to-pim.md).
32
32
33
33
> [!NOTE]
34
-
> Azure AD custom roles are not integrated with the built-in directory roles during preview. Once the capability is generally available, role management will take place in the built-in roles experience.
34
+
> Azure AD custom roles are not integrated with the built-in directory roles during preview. Once the capability is generally available, role management will take place in the built-in roles experience. If you see the following banner, these roles should be managed [in the built-in roles experience](pim-how-to-activate-role.md) and this article does not apply:
35
+
>
36
+
> [](media/pim-how-to-add-role-to-user/pim-new-version.png#lightbox)
A privileged role administrator can change the role settings that apply to a user when they activate their assignment to a custom role and for other application administrators that are assigning custom roles.
28
28
29
+
> [!NOTE]
30
+
> Azure AD custom roles are not integrated with the built-in directory roles during preview. Once the capability is generally available, role management will take place in the built-in roles experience. If you see the following banner, these roles should be managed [in the built-in roles experience](pim-how-to-activate-role.md) and this article does not apply:
31
+
>
32
+
> [](media/pim-how-to-add-role-to-user/pim-new-version.png#lightbox)
33
+
29
34
## Open role settings
30
35
31
36
Follow these steps to open the settings for an Azure AD role.
@@ -94,7 +99,7 @@ If you want to require approval to activate a role, follow these steps.
94
99
95
100
## Next steps
96
101
97
-
-[Activate an Azure AD custom role](azure-ad-custom-roles-assign.md)
102
+
-[Activate an Azure AD custom role](azure-ad-custom-roles-activate.md)
98
103
-[Assign an Azure AD custom role](azure-ad-custom-roles-assign.md)
99
104
-[Remove or update an Azure AD custom role assignment](azure-ad-custom-roles-update-remove.md)
100
105
-[Role definitions in Azure AD](../users-groups-roles/directory-assign-admin-roles.md)
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/azure-ad-custom-roles-update-remove.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,9 @@ This article tells you how to use Privileged Identity Management (PIM) to update
30
30
- If you haven't used Privileged Identity Management yet, get more information at [Start using Privileged Identity Management](pim-getting-started.md).
31
31
32
32
> [!NOTE]
33
-
> Azure AD custom roles are not integrated with the built-in directory roles during preview. Once the capability is generally available, role management role management will take place in the built-in roles experience.
33
+
> Azure AD custom roles are not integrated with the built-in directory roles during preview. Once the capability is generally available, role management will take place in the built-in roles experience. If you see the following banner, these roles should be managed [in the built-in roles experience](pim-how-to-add-role-to-user.md) and this article does not apply:
34
+
>
35
+
> [](media/pim-how-to-add-role-to-user/pim-new-version.png#lightbox)
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/azure-ad-pim-approval-workflow.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.topic: article
14
14
ms.tgt_pltfrm: na
15
15
ms.workload: identity
16
16
ms.subservice: pim
17
-
ms.date: 11/12/2019
17
+
ms.date: 02/07/2020
18
18
ms.author: curtand
19
19
ms.custom: pim
20
20
ms.collection: M365-identity-device-management
@@ -26,28 +26,28 @@ With Azure Active Directory (Azure AD) Privileged Identity Management (PIM), you
26
26
27
27
## Determine your version of PIM
28
28
29
-
Beginning in November 2019, the Azure AD roles portion of Privileged Identity Management is being updated to a new version that matches the experiences for Azure resource roles. This creates additional features as well as [changes to the existing API](azure-ad-roles-features.md#api-changes). While the new version is being rolled out, which procedures that you follow in this article depend on version of Privileged Identity Management you currently have. Follow the steps in this section to determine which version of Privileged Identity Management you have. After you know your version of Privileged Identity Management, you can select the procedures in this article that match that version.
29
+
Beginning in November 2019, the Azure AD roles portion of Privileged Identity Management is being updated to a new version that matches the experiences for Azure roles. This creates additional features as well as [changes to the existing API](azure-ad-roles-features.md#api-changes). While the new version is being rolled out, which procedures that you follow in this article depend on version of Privileged Identity Management you currently have. Follow the steps in this section to determine which version of Privileged Identity Management you have. After you know your version of Privileged Identity Management, you can select the procedures in this article that match that version.
30
30
31
31
1. Sign in to the [Azure portal](https://portal.azure.com/) with a user who is in the [Privileged role administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator) role.
32
32
1. Open **Azure AD Privileged Identity Management**. If you have a banner on the top of the overview page, follow the instructions in the **New version** tab of this article. Otherwise, follow the instructions in the **Previous version** tab.
33
33
34
-

34
+
[](media/pim-how-to-add-role-to-user/pim-new-version.png#lightbox)
35
35
36
36
Follow the steps in this article to approve or deny requests for Azure AD roles.
37
37
38
38
# [New version](#tab/new)
39
39
40
40
## View pending requests
41
41
42
-
As a delegated approver, you'll receive an email notification when an Azure resource role request is pending your approval. You can view these pending requests in Privileged Identity Management.
42
+
As a delegated approver, you'll receive an email notification when an Azure AD role request is pending your approval. You can view these pending requests in Privileged Identity Management.
43
43
44
44
1. Sign in to the [Azure portal](https://portal.azure.com/).
45
45
46
46
1. Open **Azure AD Privileged Identity Management**.
47
47
48
48
1. Select **Approve requests**.
49
49
50
-

50
+

51
51
52
52
In the **Requests for role activations** section, you'll see a list of requests pending your approval.
53
53
@@ -61,7 +61,7 @@ As a delegated approver, you'll receive an email notification when an Azure reso
61
61
62
62
1. Select **Approve**. You will receive an Azure notification of your approval.
63
63
64
-

64
+
)
65
65
66
66
## Deny requests
67
67
@@ -80,10 +80,10 @@ Here's some information about workflow notifications:
80
80
- Approvers are notified by email when a request for a role is pending their review. Email notifications include a direct link to the request, where the approver can approve or deny.
81
81
- Requests are resolved by the first approver who approves or denies.
82
82
- When an approver responds to the request, all approvers are notified of the action.
83
-
-Resource administrators are notified when an approved user becomes active in their role.
83
+
-Global admins and Privileged role admins are notified when an approved user becomes active in their role.
84
84
85
85
>[!NOTE]
86
-
>A resource administrator who believes that an approved user should not be active can remove the active role assignment in Privileged Identity Management. Although resource administrators are not notified of pending requests unless they are an approver, they can view and cancel pending requests for all users by viewing pending requests in Privileged Identity Management.
86
+
>A Global admin or Privileged role admin who believes that an approved user should not be active can remove the active role assignment in Privileged Identity Management. Although administrators are not notified of pending requests unless they are an approver, they can view and cancel any pending requests for all users by viewing pending requests in Privileged Identity Management.
87
87
88
88
# [Previous version](#tab/previous)
89
89
@@ -129,7 +129,7 @@ As a delegated approver, you'll receive an email notification when an Azure AD r
129
129
130
130

131
131
132
-
1.Click**Deny**.
132
+
1.Select**Deny**.
133
133
134
134
The Status symbol will be updated with your denial.
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/azure-ad-roles-features.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,6 +28,7 @@ The management experience for Azure AD roles in Privileged Identity Management h
28
28
29
29
With the update being currently rolled out, we are merging the two into a single management experience, and in it you get the same functionality for Azure AD roles as for Azure resource roles. This article informs you of the updated features and any requirements.
30
30
31
+
31
32
## Time-bound assignments
32
33
33
34
Previously in Privileged Identity Management for Azure AD roles, you were familiar with role assignments with two possible states – *eligible* and *permanent*. Now you can set a start and end time for each type of assignment. This addition gives you four possible states in which you can place an assignment:
0 commit comments