You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/pim-integration.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,15 +58,15 @@ If you want to see which users are using the PIM funcationality, here are option
58
58
59
59
### Option 2: List using PowerShell
60
60
61
-
There isn't single PowerShell command that can list both the eligible and active time-bound role assignments. To list your eligible role assignments, use the [Get-AzRoleEligibilitySchedule](/powershell/module/az.resources/get-azroleeligibilityschedule) command. To list your active role assignments, use the [Get-AzRoleAssignmentSchedule](/powershell/module/az.resources/get-azroleassignmentschedule) command.
61
+
There isn't a single PowerShell command that can list both the eligible and active time-bound role assignments. To list your eligible role assignments, use the [Get-AzRoleEligibilitySchedule](/powershell/module/az.resources/get-azroleeligibilityschedule) command. To list your active role assignments, use the [Get-AzRoleAssignmentSchedule](/powershell/module/az.resources/get-azroleassignmentschedule) command.
62
62
63
63
This example shows how to list eligible and time-bound role assignments in a subscription, which includes these role assignment types:
64
64
65
65
- Eligible permanent
66
66
- Eligible time-bound
67
67
- Active time-bound
68
68
69
-
The `Where-Object`condition filters out active permanent role assignments that are available with Azure RBAC functionality today without PIM.
69
+
The `Where-Object`command filters out active permanent role assignments that are available with Azure RBAC functionality without PIM.
@@ -81,7 +81,7 @@ If your organization has process or compliance reasons to limit the use of PIM,
81
81
82
82
### Option 1: Convert using the Azure portal
83
83
84
-
1.On the **Role assignments** tab and **State** column, select the **Eligible permanent**, **Eligible time-bound**, and **Active time-bound** links for each role assignment you want to convert.
84
+
1.In the Azure portal, on the **Role assignments** tab and **State** column, select the **Eligible permanent**, **Eligible time-bound**, and **Active time-bound** links for each role assignment you want to convert.
85
85
86
86
1. In the **Edit assignment** pane, select **Active** for the assignment type and **Permanent** for the assignment duration.
87
87
@@ -231,5 +231,5 @@ For information about how to assign an Azure Policy with parameters, see [Tutori
231
231
232
232
## Next steps
233
233
234
-
-[Steps to assign an Azure role](role-assignments-steps.md)
235
234
-[Assign Azure roles using the Azure portal](role-assignments-portal.yml)
235
+
-[What is Microsoft Entra Privileged Identity Management?](/entra/id-governance/privileged-identity-management/pim-configure)
0 commit comments