Skip to content

Commit 8b2559f

Browse files
authored
Merge pull request #93024 from curtand/pim1023
[Azure AD PIM] More editorial pass
2 parents e449bfb + 228994c commit 8b2559f

10 files changed

+194
-194
lines changed
Lines changed: 20 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Approve or deny requests for Azure resource roles in PIM - Azure Active Directory | Microsoft Docs
2+
title: Approve or deny requests for Azure resource roles in Privileged Identity Management - Azure Active Directory | Microsoft Docs
33
description: Learn how to approve or deny requests for Azure resource roles in Azure AD Privileged Identity Management (PIM).
44
services: active-directory
55
documentationcenter: ''
@@ -11,72 +11,68 @@ ms.topic: conceptual
1111
ms.tgt_pltfrm: na
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 04/09/2019
14+
ms.date: 10/23/2019
1515
ms.author: curtand
1616
ms.custom: pim
1717
ms.collection: M365-identity-device-management
1818
---
1919

20-
# Approve or deny requests for Azure resource roles in PIM
20+
# Approve or deny requests for Azure resource roles in Privileged Identity Management
2121

22-
With Azure Active Directory (Azure AD) Privileged Identity Management (PIM), you can configure roles to require approval for activation, and choose one or multiple users or groups as delegated approvers. Delegated approvers have 24 hours to approve requests. If a request is not approved within 24 hours, then the eligible user must re-submit a new request. The 24 hour approval time window is not configurable.
22+
With Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), you can configure roles to require approval for activation, and choose users or groups from your Azure AD organization as delegated approvers. We recommend selecting two or more approvers for each role to reduce workload for the privileged role administrator. Delegated approvers have 24 hours to approve requests. If a request is not approved within 24 hours, then the eligible user must re-submit a new request. The 24 hour approval time window is not configurable.
2323

2424
Follow the steps in this article to approve or deny requests for Azure resource roles.
2525

2626
## View pending requests
2727

28-
As a delegated approver, you'll receive an email notification when an Azure resource role request is pending your approval. You can view these pending requests in PIM.
28+
As a delegated approver, you'll receive an email notification when an Azure resource role request is pending your approval. You can view these pending requests in Privileged Identity Management.
2929

3030
1. Sign in to the [Azure portal](https://portal.azure.com/).
3131

3232
1. Open **Azure AD Privileged Identity Management**.
3333

34-
1. Click **Approve requests**.
34+
1. Select **Approve requests**.
3535

3636
![Approve requests - Azure resources page showing request to review](./media/pim-resource-roles-approval-workflow/resources-approve-requests.png)
3737

3838
In the **Requests for role activations** section, you'll see a list of requests pending your approval.
3939

4040
## Approve requests
4141

42-
1. Find and click the request that you want to approve. An approve or deny pane appears.
42+
1. Find and select the request that you want to approve. An approve or deny page appears.
4343

4444
![Approve requests - approve or deny pane with details and Justification box](./media/pim-resource-roles-approval-workflow/resources-approve-pane.png)
4545

46-
1. In the **Justification** box, type a reason.
46+
1. In the **Justification** box, enter the business justification.
4747

48-
1. Click **Approve**.
49-
50-
A notification appears with your approval.
48+
1. Select **Approve**. You will receive an Azure notification of your approval.
5149

5250
![Approve notification showing request was approved](./media/pim-resource-roles-approval-workflow/resources-approve-notification.png)
5351

5452
## Deny requests
5553

56-
1. Find and click the request that you want to deny. An approve or deny pane appears.
54+
1. Find and select the request that you want to deny. An approve or deny page appears.
5755

5856
![Approve requests - approve or deny pane with details and Justification box](./media/pim-resource-roles-approval-workflow/resources-approve-pane.png)
5957

60-
1. In the **Justification** box, type a reason.
61-
62-
1. Click **Deny**.
58+
1. In the **Justification** box, enter the business justification.
6359

64-
A notification appears with your denial.
60+
1. Select **Deny**. A notification appears with your denial.
6561

6662
## Workflow notifications
6763

6864
Here's some information about workflow notifications:
6965

70-
- All members of the approver list are notified by email when a request for a role is pending their review. Email notifications include a direct link to the request, where the approver can approve or deny.
71-
- Requests are resolved by the first member of the list who approves or denies.
72-
- When an approver responds to the request, all members of the approver list are notified of the action.
73-
- Resource administrators are notified when an approved member becomes active in their role.
66+
- Approvers are notified by email when a request for a role is pending their review. Email notifications include a direct link to the request, where the approver can approve or deny.
67+
- Requests are resolved by the first approver who approves or denies.
68+
- When an approver responds to the request, all approvers are notified of the action.
69+
- Resource administrators are notified when an approved user becomes active in their role.
7470

7571
>[!Note]
76-
>A resource administrator who believes that an approved member should not be active can remove the active role assignment in PIM. Although resource administrators are not notified of pending requests unless they are members of the approver list, they can view and cancel pending requests of all users by viewing pending requests in PIM.
72+
>A resource administrator who believes that an approved user should not be active can remove the active role assignment in Privileged Identity Management. Although resource administrators are not notified of pending requests unless they are an approver, they can view and cancel pending requests for all users by viewing pending requests in Privileged Identity Management.
7773
7874
## Next steps
7975

80-
- [Extend or renew Azure resource roles in PIM](pim-resource-roles-renew-extend.md)
81-
- [Email notifications in PIM](pim-email-notifications.md)
82-
- [Approve or deny requests for Azure AD roles in PIM](azure-ad-pim-approval-workflow.md)
76+
- [Extend or renew Azure resource roles in Privileged Identity Management](pim-resource-roles-renew-extend.md)
77+
- [Email notifications in Privileged Identity Management](pim-email-notifications.md)
78+
- [Approve or deny requests for Azure AD roles in Privileged Identity Management](azure-ad-pim-approval-workflow.md)
Lines changed: 27 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Assign Azure resource roles in PIM - Azure Active Directory | Microsoft Docs
2+
title: Assign Azure resource roles in Privileged Identity Management - Azure Active Directory | Microsoft Docs
33
description: Learn how to assign Azure resource roles in Azure AD Privileged Identity Management (PIM).
44
services: active-directory
55
documentationcenter: ''
@@ -11,60 +11,58 @@ ms.topic: conceptual
1111
ms.tgt_pltfrm: na
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 04/09/2019
14+
ms.date: 10/23/2019
1515
ms.author: curtand
1616
ms.custom: pim
1717
ms.collection: M365-identity-device-management
1818
---
1919

20-
# Assign Azure resource roles in PIM
20+
# Assign Azure resource roles in Privileged Identity Management
2121

2222
Azure Active Directory (Azure AD) Privileged Identity Management (PIM) can manage the built-in Azure resource roles, as well as custom roles, including (but not limited to):
2323

2424
- Owner
2525
- User Access Administrator
2626
- Contributor
2727
- Security Admin
28-
- Security Manager, and more
28+
- Security Manager
2929

3030
> [!NOTE]
31-
> Users or members of a group assigned to the Owner or User Access Administrator roles, and Global Administrators that enable subscription management in Azure AD are Resource Administrators. These administrators may assign roles, configure role settings, and review access using PIM for Azure resources. That is, the account won't have the rights to manage PIM for Resources if the user doesn't have a Resource Administrator role. View the list of [built-in roles for Azure resources](../../role-based-access-control/built-in-roles.md).
31+
> Users or members of a group assigned to the Owner or User Access Administrator subscription roles, and Azure AD Global administrators that enable subscription management in Azure AD have Resource administrator permissions by default. These administrators can assign roles, configure role settings, and review access using Privileged Identity Management for Azure resources. A user can't manage Privileged Identity Management for Resources without Resource administrator permissions. View the list of [built-in roles for Azure resources](../../role-based-access-control/built-in-roles.md).
3232
3333
## Assign a role
3434

3535
Follow these steps to make a user eligible for an Azure resource role.
3636

37-
1. Sign in to [Azure portal](https://portal.azure.com/) with a user that is a member of the [Privileged Role Administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator) role.
37+
1. Sign in to [Azure portal](https://portal.azure.com/) with a user that is a member of the [Privileged role administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator) role.
3838

39-
For information about how to grant another administrator access to manage PIM, see [Grant access to other administrators to manage PIM](pim-how-to-give-access-to-pim.md).
39+
For information about how to grant another administrator access to manage Privileged Identity Management, see [Grant access to other administrators to manage Privileged Identity Management](pim-how-to-give-access-to-pim.md).
4040

4141
1. Open **Azure AD Privileged Identity Management**.
4242

43-
If you haven't started PIM in the Azure portal yet, go to [Start using PIM](pim-getting-started.md).
44-
45-
1. Click **Azure resources**.
43+
1. Select **Azure resources**.
4644

4745
1. Use the **Resource filter** to filter the list of managed resources.
4846

4947
![List of Azure resources to manage](./media/pim-resource-roles-assign-roles/resources-list.png)
5048

51-
1. Click the resource you want to manage, such as a subscription or management group.
49+
1. Select the resource you want to manage, such as a subscription or management group.
5250

53-
1. Under Manage, click **Roles** to see the list of roles for Azure resources.
51+
1. Under Manage, select **Roles** to see the list of roles for Azure resources.
5452

5553
![Azure resources roles](./media/pim-resource-roles-assign-roles/resources-roles.png)
5654

57-
1. Click **Add member** to open the New assignment pane.
55+
1. Select **Add member** to open the New assignment pane.
5856

59-
1. Click **Select a role** to open the Select a role pane.
57+
1. Select **Select a role** to open the Select a role pane.
6058

6159
![New assignment pane](./media/pim-resource-roles-assign-roles/resources-select-role.png)
6260

63-
1. Click a role you want to assign and then click **Select**.
61+
1. Select a role you want to assign and then click **Select**.
6462

6563
The Select a member or group pane opens.
6664

67-
1. Click a member or group you want to assign to the role and then click **Select**.
65+
1. Select a member or group you want to assign to the role and then click **Select**.
6866

6967
![Select a member or group pane](./media/pim-resource-roles-assign-roles/resources-select-member-or-group.png)
7068

@@ -74,25 +72,25 @@ Follow these steps to make a user eligible for an Azure resource role.
7472

7573
![Memberships settings pane](./media/pim-resource-roles-assign-roles/resources-membership-settings-type.png)
7674

77-
PIM for Azure resources provides two distinct assignment types:
75+
Privileged Identity Management for Azure resources provides two distinct assignment types:
7876

7977
- **Eligible** assignments require the member of the role to perform an action to use the role. Actions might include performing a multi-factor authentication (MFA) check, providing a business justification, or requesting approval from designated approvers.
8078

8179
- **Active** assignments don't require the member to perform any action to use the role. Members assigned as active have the privileges assigned to the role at all times.
8280

83-
1. If the assignment should be permanent (permanently eligible or permanently assigned), select the **Permanently** check box.
81+
1. If the assignment should be permanent (permanently eligible or permanently assigned), select the **Permanently** checkbox.
8482

8583
Depending on the role settings, the check box might not appear or might be unmodifiable.
8684

8785
1. To specify a specific assignment duration, clear the check box and modify the start and/or end date and time boxes.
8886

8987
![Memberships settings - date and time](./media/pim-resource-roles-assign-roles/resources-membership-settings-date.png)
9088

91-
1. When finished, click **Done**.
89+
1. When finished, select **Done**.
9290

9391
![New assignment - Add](./media/pim-resource-roles-assign-roles/resources-new-assignment-add.png)
9492

95-
1. To create the new role assignment, click **Add**. A notification of the status is displayed.
93+
1. To create the new role assignment, select **Add**. A notification of the status is displayed.
9694

9795
![New assignment - Notification](./media/pim-resource-roles-assign-roles/resources-new-assignment-notification.png)
9896

@@ -102,26 +100,26 @@ Follow these steps to update or remove an existing role assignment.
102100

103101
1. Open **Azure AD Privileged Identity Management**.
104102

105-
1. Click **Azure resources**.
103+
1. Select **Azure resources**.
106104

107-
1. Click the resource you want to manage, such as a subscription or management group.
105+
1. Select the resource you want to manage, such as a subscription or management group.
108106

109-
1. Under Manage, click **Roles** to see the list of roles for Azure resources.
107+
1. Under Manage, select **Roles** to see the list of roles for Azure resources.
110108

111109
![Azure resource roles - Select role](./media/pim-resource-roles-assign-roles/resources-update-select-role.png)
112110

113-
1. Click the role that you want to update or remove.
111+
1. Select the role that you want to update or remove.
114112

115113
1. Find the role assignment on the **Eligible roles** or **Active roles** tabs.
116114

117115
![Update or remove role assignment](./media/pim-resource-roles-assign-roles/resources-update-remove.png)
118116

119-
1. Click **Update** or **Remove** to update or remove the role assignment.
117+
1. Select **Update** or **Remove** to update or remove the role assignment.
120118

121-
For information about extending a role assignment, see [Extend or renew Azure resource roles in PIM](pim-resource-roles-renew-extend.md).
119+
For information about extending a role assignment, see [Extend or renew Azure resource roles in Privileged Identity Management](pim-resource-roles-renew-extend.md).
122120

123121
## Next steps
124122

125-
- [Extend or renew Azure resource roles in PIM](pim-resource-roles-renew-extend.md)
126-
- [Configure Azure resource role settings in PIM](pim-resource-roles-configure-role-settings.md)
127-
- [Assign Azure AD roles in PIM](pim-how-to-add-role-to-user.md)
123+
- [Extend or renew Azure resource roles in Privileged Identity Management](pim-resource-roles-renew-extend.md)
124+
- [Configure Azure resource role settings in Privileged Identity Management](pim-resource-roles-configure-role-settings.md)
125+
- [Assign Azure AD roles in Privileged Identity Management](pim-how-to-add-role-to-user.md)
Lines changed: 21 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Complete an access review of Azure resource roles in PIM - Azure Active Directory | Microsoft Docs
2+
title: Complete an access review of Azure resource roles in Privileged Identity Management - Azure Active Directory | Microsoft Docs
33
description: Learn how to complete an access review of Azure resource roles in Azure AD Privileged Identity Management (PIM).
44
services: active-directory
55
documentationcenter: ''
@@ -11,19 +11,21 @@ ms.topic: conceptual
1111
ms.tgt_pltfrm: na
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 04/02/2018
14+
ms.date: 10/23/2019
1515
ms.author: curtand
1616
ms.custom: pim
1717
ms.collection: M365-identity-device-management
1818
---
1919

20-
# Complete an access review of Azure resource roles in PIM
21-
Privileged role administrators can review privileged access after an [access review has been started](pim-resource-roles-start-access-review.md). Azure Active Directory (Azure AD) Privileged Identity Management (PIM) automatically sends an email that prompts users to review their access. If a user doesn't receive an email, you can send them the instructions for [how to perform an access review](pim-resource-roles-perform-access-review.md).
20+
# Complete an access review of Azure resource roles in Privileged Identity Management
21+
22+
Privileged role administrators can review privileged access after they [start an access review](pim-resource-roles-start-access-review.md). Privileged Identity Management (PIM) in Azure Active Directory (Azure AD)automatically sends an email that prompts users to review their access. If a user doesn't receive an email, you can send them the instructions for [how to perform an access review](pim-resource-roles-perform-access-review.md).
2223

2324
After the access review period is over, or after all the users have finished their self-review, follow the steps in this article to manage the review and see the results.
2425

2526
## Manage access reviews
26-
1. Go to the [Azure portal](https://portal.azure.com/). Then, on the dashboard, select the **Azure resources** application.
27+
28+
1. Go to the [Azure portal](https://portal.azure.com/). On the dashboard, select the **Azure resources** service.
2729

2830
2. Select your resource.
2931

@@ -33,33 +35,39 @@ After the access review period is over, or after all the users have finished the
3335

3436
4. Select the access review that you want to manage.
3537

36-
On the detail blade of the access review, there are a number of options for managing that review. The options are as follows:
38+
On the detail page for the access review, there are a number of options for managing that review. The options are as follows:
3739

3840
![Options for managing a review - Stop, Reset, Apply, Delete](media/pim-resource-roles-complete-access-review/rbac-access-review-menu.png)
3941

4042
### Stop
41-
All access reviews have an end date, but you can use the **Stop** button to finish it early. All users who haven't finished their review by this time won't be able to finish it after you stop the review. You can't restart a review after it's been stopped.
43+
44+
All access reviews have an end date. Select **Stop** to finish it early. Any users who hasn't finished their review by this time won't be able to finish it after you stop the review. You can't restart a review after it's been stopped.
4245

4346
### Reset
44-
You can reset an access review to remove all decisions that are made on it. After you've reset an access review, all users are marked as unreviewed again.
47+
48+
You can reset an access review to remove all decisions that are made on it. After you've reset an access review, all users are marked as unreviewed again.
4549

4650
### Apply
47-
After an access review is complete, use the **Apply** button to implement the outcome of the review. If a user's access was denied in the review, this step removes their role assignment.
51+
52+
After an access review is complete, select **Apply** to implement the outcome of the review. If a user's access was denied in the review, this step removes their role assignment.
4853

4954
### Delete
50-
If you aren't interested in the review any more, delete it. The **Delete** button removes the review from the PIM application.
55+
56+
If you aren't interested in the review any more, delete it. Select **Delete** yo remove the review from the Privileged Identity Management service.
5157

5258
## Results
53-
On the **Results** page, view and download a list of your review results.
59+
60+
On the **Results** page, view and download a list of your review results.
5461

5562
![Results page listing users, outcome, reason, reviewed by, applied by, and apply result](media/pim-resource-roles-complete-access-review/rbac-access-review-results.png)
5663

5764
## Reviewers
65+
5866
View and add reviewers to your existing access review. Remind reviewers to complete their reviews.
5967

6068
![Reviewers page listing name and user principal name](media/pim-resource-roles-complete-access-review/rbac-access-review-reviewers.png)
6169

6270
## Next steps
6371

64-
- [Start an access review for Azure resource roles in PIM](pim-resource-roles-start-access-review.md)
65-
- [Perform an access review of my Azure resource roles in PIM](pim-resource-roles-perform-access-review.md)
72+
- [Start an access review for Azure resource roles in Privileged Identity Management](pim-resource-roles-start-access-review.md)
73+
- [Perform an access review of my Azure resource roles in Privileged Identity Management](pim-resource-roles-perform-access-review.md)

0 commit comments

Comments
 (0)