You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Approve or deny requests for Azure resource roles in PIM - Azure Active Directory | Microsoft Docs
2
+
title: Approve or deny requests for Azure resource roles in Privileged Identity Management - Azure Active Directory | Microsoft Docs
3
3
description: Learn how to approve or deny requests for Azure resource roles in Azure AD Privileged Identity Management (PIM).
4
4
services: active-directory
5
5
documentationcenter: ''
@@ -11,72 +11,68 @@ ms.topic: conceptual
11
11
ms.tgt_pltfrm: na
12
12
ms.workload: identity
13
13
ms.subservice: pim
14
-
ms.date: 04/09/2019
14
+
ms.date: 10/23/2019
15
15
ms.author: curtand
16
16
ms.custom: pim
17
17
ms.collection: M365-identity-device-management
18
18
---
19
19
20
-
# Approve or deny requests for Azure resource roles in PIM
20
+
# Approve or deny requests for Azure resource roles in Privileged Identity Management
21
21
22
-
With Azure Active Directory (Azure AD) Privileged Identity Management (PIM), you can configure roles to require approval for activation, and choose one or multiple users or groups as delegated approvers. Delegated approvers have 24 hours to approve requests. If a request is not approved within 24 hours, then the eligible user must re-submit a new request. The 24 hour approval time window is not configurable.
22
+
With Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), you can configure roles to require approval for activation, and choose users or groups from your Azure AD organization as delegated approvers. We recommend selecting two or more approvers for each role to reduce workload for the privileged role administrator. Delegated approvers have 24 hours to approve requests. If a request is not approved within 24 hours, then the eligible user must re-submit a new request. The 24 hour approval time window is not configurable.
23
23
24
24
Follow the steps in this article to approve or deny requests for Azure resource roles.
25
25
26
26
## View pending requests
27
27
28
-
As a delegated approver, you'll receive an email notification when an Azure resource role request is pending your approval. You can view these pending requests in PIM.
28
+
As a delegated approver, you'll receive an email notification when an Azure resource role request is pending your approval. You can view these pending requests in Privileged Identity Management.
29
29
30
30
1. Sign in to the [Azure portal](https://portal.azure.com/).
31
31
32
32
1. Open **Azure AD Privileged Identity Management**.
33
33
34
-
1.Click**Approve requests**.
34
+
1.Select**Approve requests**.
35
35
36
36

37
37
38
38
In the **Requests for role activations** section, you'll see a list of requests pending your approval.
39
39
40
40
## Approve requests
41
41
42
-
1. Find and click the request that you want to approve. An approve or deny pane appears.
42
+
1. Find and select the request that you want to approve. An approve or deny page appears.
43
43
44
44

45
45
46
-
1. In the **Justification** box, type a reason.
46
+
1. In the **Justification** box, enter the business justification.
47
47
48
-
1. Click **Approve**.
49
-
50
-
A notification appears with your approval.
48
+
1. Select **Approve**. You will receive an Azure notification of your approval.
51
49
52
50

53
51
54
52
## Deny requests
55
53
56
-
1. Find and click the request that you want to deny. An approve or deny pane appears.
54
+
1. Find and select the request that you want to deny. An approve or deny page appears.
57
55
58
56

59
57
60
-
1. In the **Justification** box, type a reason.
61
-
62
-
1. Click **Deny**.
58
+
1. In the **Justification** box, enter the business justification.
63
59
64
-
A notification appears with your denial.
60
+
1. Select **Deny**. A notification appears with your denial.
65
61
66
62
## Workflow notifications
67
63
68
64
Here's some information about workflow notifications:
69
65
70
-
-All members of the approver list are notified by email when a request for a role is pending their review. Email notifications include a direct link to the request, where the approver can approve or deny.
71
-
- Requests are resolved by the first member of the list who approves or denies.
72
-
- When an approver responds to the request, all members of the approver list are notified of the action.
73
-
- Resource administrators are notified when an approved member becomes active in their role.
66
+
-Approvers are notified by email when a request for a role is pending their review. Email notifications include a direct link to the request, where the approver can approve or deny.
67
+
- Requests are resolved by the first approver who approves or denies.
68
+
- When an approver responds to the request, all approvers are notified of the action.
69
+
- Resource administrators are notified when an approved user becomes active in their role.
74
70
75
71
>[!Note]
76
-
>A resource administrator who believes that an approved member should not be active can remove the active role assignment in PIM. Although resource administrators are not notified of pending requests unless they are members of the approver list, they can view and cancel pending requests of all users by viewing pending requests in PIM.
72
+
>A resource administrator who believes that an approved user should not be active can remove the active role assignment in Privileged Identity Management. Although resource administrators are not notified of pending requests unless they are an approver, they can view and cancel pending requests for all users by viewing pending requests in Privileged Identity Management.
77
73
78
74
## Next steps
79
75
80
-
-[Extend or renew Azure resource roles in PIM](pim-resource-roles-renew-extend.md)
81
-
-[Email notifications in PIM](pim-email-notifications.md)
82
-
-[Approve or deny requests for Azure AD roles in PIM](azure-ad-pim-approval-workflow.md)
76
+
-[Extend or renew Azure resource roles in Privileged Identity Management](pim-resource-roles-renew-extend.md)
77
+
-[Email notifications in Privileged Identity Management](pim-email-notifications.md)
78
+
-[Approve or deny requests for Azure AD roles in Privileged Identity Management](azure-ad-pim-approval-workflow.md)
title: Assign Azure resource roles in PIM - Azure Active Directory | Microsoft Docs
2
+
title: Assign Azure resource roles in Privileged Identity Management - Azure Active Directory | Microsoft Docs
3
3
description: Learn how to assign Azure resource roles in Azure AD Privileged Identity Management (PIM).
4
4
services: active-directory
5
5
documentationcenter: ''
@@ -11,60 +11,58 @@ ms.topic: conceptual
11
11
ms.tgt_pltfrm: na
12
12
ms.workload: identity
13
13
ms.subservice: pim
14
-
ms.date: 04/09/2019
14
+
ms.date: 10/23/2019
15
15
ms.author: curtand
16
16
ms.custom: pim
17
17
ms.collection: M365-identity-device-management
18
18
---
19
19
20
-
# Assign Azure resource roles in PIM
20
+
# Assign Azure resource roles in Privileged Identity Management
21
21
22
22
Azure Active Directory (Azure AD) Privileged Identity Management (PIM) can manage the built-in Azure resource roles, as well as custom roles, including (but not limited to):
23
23
24
24
- Owner
25
25
- User Access Administrator
26
26
- Contributor
27
27
- Security Admin
28
-
- Security Manager, and more
28
+
- Security Manager
29
29
30
30
> [!NOTE]
31
-
> Users or members of a group assigned to the Owner or User Access Administrator roles, and Global Administrators that enable subscription management in Azure AD are Resource Administrators. These administrators may assign roles, configure role settings, and review access using PIM for Azure resources. That is, the account won't have the rights to manage PIM for Resources if the user doesn't have a Resource Administrator role. View the list of [built-in roles for Azure resources](../../role-based-access-control/built-in-roles.md).
31
+
> Users or members of a group assigned to the Owner or User Access Administrator subscription roles, and Azure AD Global administrators that enable subscription management in Azure AD have Resource administrator permissions by default. These administrators can assign roles, configure role settings, and review access using Privileged Identity Management for Azure resources. A user can't manage Privileged Identity Management for Resources without Resource administrator permissions. View the list of [built-in roles for Azure resources](../../role-based-access-control/built-in-roles.md).
32
32
33
33
## Assign a role
34
34
35
35
Follow these steps to make a user eligible for an Azure resource role.
36
36
37
-
1. Sign in to [Azure portal](https://portal.azure.com/) with a user that is a member of the [Privileged Role Administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator) role.
37
+
1. Sign in to [Azure portal](https://portal.azure.com/) with a user that is a member of the [Privileged role administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator) role.
38
38
39
-
For information about how to grant another administrator access to manage PIM, see [Grant access to other administrators to manage PIM](pim-how-to-give-access-to-pim.md).
39
+
For information about how to grant another administrator access to manage Privileged Identity Management, see [Grant access to other administrators to manage Privileged Identity Management](pim-how-to-give-access-to-pim.md).
40
40
41
41
1. Open **Azure AD Privileged Identity Management**.
42
42
43
-
If you haven't started PIM in the Azure portal yet, go to [Start using PIM](pim-getting-started.md).
44
-
45
-
1. Click **Azure resources**.
43
+
1. Select **Azure resources**.
46
44
47
45
1. Use the **Resource filter** to filter the list of managed resources.
48
46
49
47

50
48
51
-
1.Click the resource you want to manage, such as a subscription or management group.
49
+
1.Select the resource you want to manage, such as a subscription or management group.
52
50
53
-
1. Under Manage, click**Roles** to see the list of roles for Azure resources.
51
+
1. Under Manage, select**Roles** to see the list of roles for Azure resources.
PIM for Azure resources provides two distinct assignment types:
75
+
Privileged Identity Management for Azure resources provides two distinct assignment types:
78
76
79
77
-**Eligible** assignments require the member of the role to perform an action to use the role. Actions might include performing a multi-factor authentication (MFA) check, providing a business justification, or requesting approval from designated approvers.
80
78
81
79
-**Active** assignments don't require the member to perform any action to use the role. Members assigned as active have the privileges assigned to the role at all times.
82
80
83
-
1. If the assignment should be permanent (permanently eligible or permanently assigned), select the **Permanently**check box.
81
+
1. If the assignment should be permanent (permanently eligible or permanently assigned), select the **Permanently**checkbox.
84
82
85
83
Depending on the role settings, the check box might not appear or might be unmodifiable.
86
84
87
85
1. To specify a specific assignment duration, clear the check box and modify the start and/or end date and time boxes.
88
86
89
87

1.Click the role that you want to update or remove.
111
+
1.Select the role that you want to update or remove.
114
112
115
113
1. Find the role assignment on the **Eligible roles** or **Active roles** tabs.
116
114
117
115

118
116
119
-
1.Click**Update** or **Remove** to update or remove the role assignment.
117
+
1.Select**Update** or **Remove** to update or remove the role assignment.
120
118
121
-
For information about extending a role assignment, see [Extend or renew Azure resource roles in PIM](pim-resource-roles-renew-extend.md).
119
+
For information about extending a role assignment, see [Extend or renew Azure resource roles in Privileged Identity Management](pim-resource-roles-renew-extend.md).
122
120
123
121
## Next steps
124
122
125
-
-[Extend or renew Azure resource roles in PIM](pim-resource-roles-renew-extend.md)
126
-
-[Configure Azure resource role settings in PIM](pim-resource-roles-configure-role-settings.md)
127
-
-[Assign Azure AD roles in PIM](pim-how-to-add-role-to-user.md)
123
+
-[Extend or renew Azure resource roles in Privileged Identity Management](pim-resource-roles-renew-extend.md)
124
+
-[Configure Azure resource role settings in Privileged Identity Management](pim-resource-roles-configure-role-settings.md)
125
+
-[Assign Azure AD roles in Privileged Identity Management](pim-how-to-add-role-to-user.md)
title: Complete an access review of Azure resource roles in PIM - Azure Active Directory | Microsoft Docs
2
+
title: Complete an access review of Azure resource roles in Privileged Identity Management - Azure Active Directory | Microsoft Docs
3
3
description: Learn how to complete an access review of Azure resource roles in Azure AD Privileged Identity Management (PIM).
4
4
services: active-directory
5
5
documentationcenter: ''
@@ -11,19 +11,21 @@ ms.topic: conceptual
11
11
ms.tgt_pltfrm: na
12
12
ms.workload: identity
13
13
ms.subservice: pim
14
-
ms.date: 04/02/2018
14
+
ms.date: 10/23/2019
15
15
ms.author: curtand
16
16
ms.custom: pim
17
17
ms.collection: M365-identity-device-management
18
18
---
19
19
20
-
# Complete an access review of Azure resource roles in PIM
21
-
Privileged role administrators can review privileged access after an [access review has been started](pim-resource-roles-start-access-review.md). Azure Active Directory (Azure AD) Privileged Identity Management (PIM) automatically sends an email that prompts users to review their access. If a user doesn't receive an email, you can send them the instructions for [how to perform an access review](pim-resource-roles-perform-access-review.md).
20
+
# Complete an access review of Azure resource roles in Privileged Identity Management
21
+
22
+
Privileged role administrators can review privileged access after they [start an access review](pim-resource-roles-start-access-review.md). Privileged Identity Management (PIM) in Azure Active Directory (Azure AD)automatically sends an email that prompts users to review their access. If a user doesn't receive an email, you can send them the instructions for [how to perform an access review](pim-resource-roles-perform-access-review.md).
22
23
23
24
After the access review period is over, or after all the users have finished their self-review, follow the steps in this article to manage the review and see the results.
24
25
25
26
## Manage access reviews
26
-
1. Go to the [Azure portal](https://portal.azure.com/). Then, on the dashboard, select the **Azure resources** application.
27
+
28
+
1. Go to the [Azure portal](https://portal.azure.com/). On the dashboard, select the **Azure resources** service.
27
29
28
30
2. Select your resource.
29
31
@@ -33,33 +35,39 @@ After the access review period is over, or after all the users have finished the
33
35
34
36
4. Select the access review that you want to manage.
35
37
36
-
On the detail blade of the access review, there are a number of options for managing that review. The options are as follows:
38
+
On the detail page for the access review, there are a number of options for managing that review. The options are as follows:
37
39
38
40

39
41
40
42
### Stop
41
-
All access reviews have an end date, but you can use the **Stop** button to finish it early. All users who haven't finished their review by this time won't be able to finish it after you stop the review. You can't restart a review after it's been stopped.
43
+
44
+
All access reviews have an end date. Select **Stop** to finish it early. Any users who hasn't finished their review by this time won't be able to finish it after you stop the review. You can't restart a review after it's been stopped.
42
45
43
46
### Reset
44
-
You can reset an access review to remove all decisions that are made on it. After you've reset an access review, all users are marked as unreviewed again.
47
+
48
+
You can reset an access review to remove all decisions that are made on it. After you've reset an access review, all users are marked as unreviewed again.
45
49
46
50
### Apply
47
-
After an access review is complete, use the **Apply** button to implement the outcome of the review. If a user's access was denied in the review, this step removes their role assignment.
51
+
52
+
After an access review is complete, select **Apply** to implement the outcome of the review. If a user's access was denied in the review, this step removes their role assignment.
48
53
49
54
### Delete
50
-
If you aren't interested in the review any more, delete it. The **Delete** button removes the review from the PIM application.
55
+
56
+
If you aren't interested in the review any more, delete it. Select **Delete** yo remove the review from the Privileged Identity Management service.
51
57
52
58
## Results
53
-
On the **Results** page, view and download a list of your review results.
59
+
60
+
On the **Results** page, view and download a list of your review results.
0 commit comments