You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/elevate-access-global-admin.md
+3-9Lines changed: 3 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -341,7 +341,7 @@ When you call `elevateAccess`, you create a role assignment for yourself, so to
341
341
342
342
When access is elevated, an entry is added to the logs. As a Global Administrator in Microsoft Entra ID, you might want to check when access was elevated and who did it. Elevate access log entries appear in both the Directory audit logs (Preview) and the Directory Activity logs. This section describes different ways that you can view the elevate access log entries.
When access is elevated, an entry is added to the logs. As a Global Administrator in Microsoft Entra ID, you might want to check when access was elevated and who did it. Elevate access log entries do not appear in the standard activity logs, but instead appear in the Directory Activity logs. This section describes different ways that you can view the elevate access log entries.
372
-
373
-
# [Azure portal](#tab/azure-portal)
374
-
375
-
#### View elevate access log entries using the Azure portal
371
+
### View elevate access log entries using the Azure portal
376
372
377
373
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
378
374
@@ -386,8 +382,6 @@ When access is elevated, an entry is added to the logs. As a Global Administrato
386
382
387
383

388
384
389
-
# [Azure CLI](#tab/azure-cli)
390
-
391
385
### View elevate access log entries using Azure CLI
392
386
393
387
1. Use the [az login](/cli/azure/reference-index#az-login) command to sign in as Global Administrator.
0 commit comments