Skip to content

Commit 866c749

Browse files
committed
Tweaks, PIM link
1 parent fb70581 commit 866c749

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/role-based-access-control/pim-integration.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -58,15 +58,15 @@ If you want to see which users are using the PIM funcationality, here are option
5858

5959
### Option 2: List using PowerShell
6060

61-
There isn't single PowerShell command that can list both the eligible and active time-bound role assignments. To list your eligible role assignments, use the [Get-AzRoleEligibilitySchedule](/powershell/module/az.resources/get-azroleeligibilityschedule) command. To list your active role assignments, use the [Get-AzRoleAssignmentSchedule](/powershell/module/az.resources/get-azroleassignmentschedule) command.
61+
There isn't a single PowerShell command that can list both the eligible and active time-bound role assignments. To list your eligible role assignments, use the [Get-AzRoleEligibilitySchedule](/powershell/module/az.resources/get-azroleeligibilityschedule) command. To list your active role assignments, use the [Get-AzRoleAssignmentSchedule](/powershell/module/az.resources/get-azroleassignmentschedule) command.
6262

6363
This example shows how to list eligible and time-bound role assignments in a subscription, which includes these role assignment types:
6464

6565
- Eligible permanent
6666
- Eligible time-bound
6767
- Active time-bound
6868

69-
The `Where-Object` condition filters out active permanent role assignments that are available with Azure RBAC functionality today without PIM.
69+
The `Where-Object` command filters out active permanent role assignments that are available with Azure RBAC functionality without PIM.
7070

7171
```powershell
7272
Get-AzRoleEligibilitySchedule -Scope /subscriptions/<subscriptionId>
@@ -81,7 +81,7 @@ If your organization has process or compliance reasons to limit the use of PIM,
8181

8282
### Option 1: Convert using the Azure portal
8383

84-
1. On the **Role assignments** tab and **State** column, select the **Eligible permanent**, **Eligible time-bound**, and **Active time-bound** links for each role assignment you want to convert.
84+
1. In the Azure portal, on the **Role assignments** tab and **State** column, select the **Eligible permanent**, **Eligible time-bound**, and **Active time-bound** links for each role assignment you want to convert.
8585

8686
1. In the **Edit assignment** pane, select **Active** for the assignment type and **Permanent** for the assignment duration.
8787

@@ -231,5 +231,5 @@ For information about how to assign an Azure Policy with parameters, see [Tutori
231231

232232
## Next steps
233233

234-
- [Steps to assign an Azure role](role-assignments-steps.md)
235234
- [Assign Azure roles using the Azure portal](role-assignments-portal.yml)
235+
- [What is Microsoft Entra Privileged Identity Management?](/entra/id-governance/privileged-identity-management/pim-configure)

0 commit comments

Comments
 (0)