You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/pim-configure.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.subservice: pim
12
12
ms.topic: overview
13
-
ms.date: 11/08/2019
13
+
ms.date: 04/21/2020
14
14
ms.author: curtand
15
15
ms.custom: pim
16
16
ms.collection: M365-identity-device-management
@@ -44,9 +44,7 @@ Once you set up Privileged Identity Management, you'll see **Tasks**, **Manage**
44
44
45
45
## Who can do what?
46
46
47
-
If you're the first person to use Privileged Identity Management, you are automatically assigned the [Security Administrator](../users-groups-roles/directory-assign-admin-roles.md#security-administrator) and [Privileged Role Administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator) roles in the directory.
48
-
49
-
For Azure AD roles in Privileged Identity Management, only a user who is in the Privileged Role Administrator role can manage assignments for other administrators. You can [grant access to other administrators to manage Privileged Identity Management](pim-how-to-give-access-to-pim.md). Global Administrators, Security Administrators, Global readers, and Security Readers can also view assignments to Azure AD roles in Privileged Identity Management.
47
+
For Azure AD roles in Privileged Identity Management, only a user who is in the Privileged role administrator or Global administrator role can manage assignments for other administrators. You can [grant access to other administrators to manage Privileged Identity Management](pim-how-to-give-access-to-pim.md). Global Administrators, Security Administrators, Global readers, and Security Readers can also view assignments to Azure AD roles in Privileged Identity Management.
50
48
51
49
For Azure resource roles in Privileged Identity Management, only a subscription administrator, a resource Owner, or a resource User Access administrator can manage assignments for other administrators. Users who are Privileged Role Administrators, Security Administrators, or Security Readers do not by default have access to view assignments to Azure resource roles in Privileged Identity Management.
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/pim-email-notifications.md
+13-1Lines changed: 13 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.tgt_pltfrm: na
11
11
ms.devlang: na
12
12
ms.topic: conceptual
13
13
ms.subservice: pim
14
-
ms.date: 01/05/2019
14
+
ms.date: 04/21/2020
15
15
ms.author: curtand
16
16
ms.reviewer: hanki
17
17
ms.custom: pim
@@ -72,6 +72,18 @@ The email includes four tiles:
72
72
73
73
The **Overview of your top roles** section lists the top five roles in your tenant based on total number of permanent and eligible administrators for each role. The **Take action** link opens the [PIM wizard](pim-security-wizard.md) where you can convert permanent administrators to eligible administrators in batches.
74
74
75
+
## Email timing for activation approvals
76
+
77
+
When users activates their role and the role setting requires approval, approvers will receive three emails for each approval:
78
+
79
+
- Request to approve or deny the user's activation request (sent by the request approval engine)
80
+
- The user's request is approved (sent by the request approval engine)
81
+
- The user's role is activated (sent by Privileged Identity Management)
82
+
83
+
The first two emails sent by the request approval engine can be delayed. Currently, 90% of emails take three to ten minutes, but for 1% customers it can be much longer, up to fifteen minutes.
84
+
85
+
If an approval request is approved in the Azure portal before the first email is sent, the first email will no longer be triggered and other approvers won't be notified by email of the approval request. It might appear as if the they didn't get an email but it's the expected behavior.
86
+
75
87
## PIM emails for Azure resource roles
76
88
77
89
Privileged Identity Management sends emails to Owners and User Access Administrators when the following events occur for Azure resource roles:
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/pim-getting-started.md
+27-18Lines changed: 27 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,16 +11,16 @@ ms.service: active-directory
11
11
ms.subservice: pim
12
12
ms.topic: conceptual
13
13
ms.workload: identity
14
-
ms.date: 03/13/2020
14
+
ms.date: 04/21/2020
15
15
ms.author: curtand
16
16
ms.custom: pim
17
17
ms.collection: M365-identity-device-management
18
18
---
19
19
# Start using Privileged Identity Management
20
20
21
-
With Privileged Identity Management (PIM), you can manage, control, and monitor access within your Azure Active Directory (Azure AD) organization. This scope includes access to Azure resources, Azure AD, and other Microsoft online services like Office 365 or Microsoft Intune.
21
+
This article describes how to enable Privileged Identity Management (PIM) and get started using it.
22
22
23
-
This article describes how to enable and get started using Privileged Identity Management.
23
+
Use Privileged Identity Management (PIM) to manage, control, and monitor access within your Azure Active Directory (Azure AD) organization. With PIM you can provide as-needed and just-in-time access to Azure resources, Azure AD, and other Microsoft online services like Office 365 or Microsoft Intune.
24
24
25
25
## Prerequisites
26
26
@@ -31,29 +31,38 @@ To use Privileged Identity Management, you must have one of the following licens
31
31
32
32
For more information, see [License requirements to use Privileged Identity Management](subscription-requirements.md).
33
33
34
-
## Sign up PIM for Azure AD roles
34
+
## Prepare PIM for Azure AD roles
35
35
36
-
Once you have enabled Privileged Identity Management for your directory, you'll need to sign up Privileged Identity Management to manage Azure AD roles.
36
+
Once you have enabled Privileged Identity Management for your directory, you can prepare Privileged Identity Management to manage Azure AD roles.
37
37
38
-
1. Open **Azure AD Privileged Identity Management**.
38
+
You should get started with Azure AD roles in the following order:
39
39
40
-
1. Select **Azure AD roles**.
40
+
1.[Configure role settings](pim-how-to-change-default-settings.md).
1.[Allow eligible users to activate their role just-in-time](pim-how-to-activate-role.md).
41
43
42
-

44
+
## Prepare PIM for Azure roles
43
45
44
-
1. Select **Sign up**.
46
+
Once you have enabled Privileged Identity Management for your directory, you can prepare Privileged Identity Management to manage Azure roles for Azure resource access on a subscription.
45
47
46
-
1. In the message that appears, click **Yes** to sign up Privileged Identity Management to manage Azure AD roles.
48
+
You should get started with Azure roles in the following order:
1.[Allow eligible users to activate their roles just-in-time](pim-resource-roles-activate-your-roles.md).
54
+
55
+
I think this is good, can we also add a section for Azure Resource roles. You can add the same three though they will link to the Azure Resource doc. And before these 3 points, Azure Resource will require customers to discover resources

49
60
50
-
When sign up completes, the Azure AD options will be enabled. You might need to refresh the portal.
51
61
52
-
For information about how to discover and select the Azure resources to protect with Privileged Identity Management, see [Discover Azure resources to manage in Privileged Identity Management](pim-resource-roles-discover-resources.md).
53
62
54
63
## Navigate to your tasks
55
64
56
-
Once Privileged Identity Management is set up, you can start your identity management tasks.
65
+
Once Privileged Identity Management is set up, you can learn your way around.
57
66
58
67

59
68
@@ -63,12 +72,12 @@ Once Privileged Identity Management is set up, you can start your identity manag
63
72
|**My requests**| Displays your pending requests to activate eligible role assignments. |
64
73
|**Approve requests**| Displays a list of requests to activate eligible roles by users in your directory that you are designated to approve. |
65
74
|**Review access**| Lists active access reviews you are assigned to complete, whether you're reviewing access for yourself or someone else. |
66
-
|**Azure AD roles**| Displays a dashboard and settings for privileged role administrators to manage Azure AD role assignments. This dashboard is disabled for anyone who isn't a privileged role administrator. These users have access to a special dashboard titled My view. The My view dashboard only displays information about the user accessing the dashboard, not the entire tenant. |
67
-
|**Azure resources**| Displays a dashboard and settings for privileged role administrators to manage Azure resource role assignments. This dashboard is disabled for anyone who isn't a privileged role administrator. These users have access to a special dashboard titled My view. The My view dashboard only displays information about the user accessing the dashboard, not the entire tenant. |
75
+
|**Azure AD roles**| Displays a dashboard and settings for Privileged role administrators to manage Azure AD role assignments. This dashboard is disabled for anyone who isn't a privileged role administrator. These users have access to a special dashboard titled My view. The My view dashboard only displays information about the user accessing the dashboard, not the entire tenant. |
76
+
|**Azure resources**| Displays a dashboard and settings for Privileged role administrators to manage Azure resource role assignments. This dashboard is disabled for anyone who isn't a privileged role administrator. These users have access to a special dashboard titled My view. The My view dashboard only displays information about the user accessing the dashboard, not the entire tenant. |
68
77
69
78
## Add a PIM tile to the dashboard
70
79
71
-
To make it easier to open Privileged Identity Management, add a Privileged Identity Management tile to your Azure portal dashboard.
80
+
To make it easier to open Privileged Identity Management, add a PIM tile to your Azure portal dashboard.
72
81
73
82
1. Sign in to the [Azure portal](https://portal.azure.com/).
74
83
@@ -89,4 +98,4 @@ To make it easier to open Privileged Identity Management, add a Privileged Ident
89
98
## Next steps
90
99
91
100
-[Assign Azure AD roles in Privileged Identity Management](pim-how-to-add-role-to-user.md)
92
-
-[Discover Azure resources to manage in Privileged Identity Management](pim-resource-roles-discover-resources.md)
101
+
-[Manage Azure resource access in Privileged Identity Management](pim-resource-roles-discover-resources.md)
If you're the first person to use Privileged Identity Management (PIM) in your Azure Active Directory (Azure AD)organization, you are presented with a wizard to get started. The wizard helps you understand the security risks of privileged identities and how to use Privileged Identity Management to reduce those risks. You don't need to make any changes to existing role assignments in the wizard, if you prefer to do it later.
23
23
24
+
> [!Important]
25
+
> The security wizard is temporarily unavailable. Thank you for your patience.
26
+
24
27
## Wizard overview
25
28
26
29
Before your organization starts using Privileged Identity Management, all role assignments are permanent: the users are always in these roles even if they do not presently need their privileges. The first step of the wizard shows you a list of high-privileged roles and how many users are currently in those roles. You can drill in to a particular role to learn more about users if one or more of them are unfamiliar.
27
30
28
31
The second step of the wizard gives you an opportunity to change administrator's role assignments.
29
32
30
33
> [!WARNING]
31
-
> It is important that you have at least one Global administrator, and more than one Privileged role administrator with an organizational account (not a Microsoft account). If there is only one Privileged role administrator, the organization can't manage Privileged Identity Management if that account is deleted.
34
+
> It is important that you have at least one Global administrator, and more than one Privileged role administrator with a work or school account (not a Microsoft account). If there is only one Privileged role administrator, the organization can't manage Privileged Identity Management if that account is deleted.
32
35
> Also, keep role assignments permanent if a user has a Microsoft account (in other words, an account they use to sign in to Microsoft services like Skype and Outlook.com). If you plan to require multi-factor authentication for activation for that role, that user will be locked out.
0 commit comments