Skip to content

Commit a227c61

Browse files
Merge pull request #246354 from billmath/pim3
updating
2 parents b95c693 + 52fee0e commit a227c61

File tree

1 file changed

+14
-1
lines changed

1 file changed

+14
-1
lines changed

articles/active-directory/privileged-identity-management/concept-pim-for-groups.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.subservice: pim
1111
ms.topic: overview
1212
ms.tgt_pltfrm: na
1313
ms.workload: identity
14-
ms.date: 6/7/2023
14+
ms.date: 8/15/2023
1515
ms.author: billmath
1616
ms.custom: pim
1717
ms.collection: M365-identity-device-management
@@ -72,6 +72,19 @@ One group can be an eligible member of another group, even if one of those group
7272

7373
If a user is an active member of Group A, and Group A is an eligible member of Group B, the user can activate their membership in Group B. This activation will be only for the user that requested the activation for, it does not mean that the entire Group A becomes an active member of Group B.
7474

75+
## Privileged Identity Management and app provisioning (Public Preview)
76+
77+
If the group is configured for [app provisioning](../app-provisioning/index.yml), activation of group membership will trigger provisioning of group membership (and user account itself if it wasn’t provisioned previously) to the application using SCIM protocol.
78+
79+
In Public Preview we have a functionality that triggers provisioning right after group membership is activated in PIM.
80+
Provisioning configuration depends on the application. Generally, we recommend having at least two groups assigned to the application. Depending on the number of roles in your application, you may choose to define additional “privileged groups.”:
81+
82+
83+
|Group|Purpose|Members|Group membership|Role assigned in the application|
84+
|-----|-----|-----|-----|-----|
85+
|All users group|Ensure that all users that need access to the application are constantly provisioned to the application.|All users that need to access application.|Active|None, or low-privileged role|
86+
|Privileged group|Provide just-in-time access to privileged role in the application.|Users that need to have just-in-time access to privileged role in the application.|Eligible|Privileged role|
87+
7588
## Next steps
7689

7790
- [Bring groups into Privileged Identity Management](groups-discover-groups.md)

0 commit comments

Comments
 (0)