Skip to content

Commit a5f2d69

Browse files
authored
Merge pull request #111400 from curtand/shaun0414
[Azure AD PIM] raise CSAT for getting started
2 parents 7d80c9d + c32d116 commit a5f2d69

File tree

4 files changed

+47
-25
lines changed

4 files changed

+47
-25
lines changed

articles/active-directory/privileged-identity-management/pim-configure.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.workload: identity
1111
ms.subservice: pim
1212
ms.topic: overview
13-
ms.date: 11/08/2019
13+
ms.date: 04/21/2020
1414
ms.author: curtand
1515
ms.custom: pim
1616
ms.collection: M365-identity-device-management
@@ -44,9 +44,7 @@ Once you set up Privileged Identity Management, you'll see **Tasks**, **Manage**
4444

4545
## Who can do what?
4646

47-
If you're the first person to use Privileged Identity Management, you are automatically assigned the [Security Administrator](../users-groups-roles/directory-assign-admin-roles.md#security-administrator) and [Privileged Role Administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator) roles in the directory.
48-
49-
For Azure AD roles in Privileged Identity Management, only a user who is in the Privileged Role Administrator role can manage assignments for other administrators. You can [grant access to other administrators to manage Privileged Identity Management](pim-how-to-give-access-to-pim.md). Global Administrators, Security Administrators, Global readers, and Security Readers can also view assignments to Azure AD roles in Privileged Identity Management.
47+
For Azure AD roles in Privileged Identity Management, only a user who is in the Privileged role administrator or Global administrator role can manage assignments for other administrators. You can [grant access to other administrators to manage Privileged Identity Management](pim-how-to-give-access-to-pim.md). Global Administrators, Security Administrators, Global readers, and Security Readers can also view assignments to Azure AD roles in Privileged Identity Management.
5048

5149
For Azure resource roles in Privileged Identity Management, only a subscription administrator, a resource Owner, or a resource User Access administrator can manage assignments for other administrators. Users who are Privileged Role Administrators, Security Administrators, or Security Readers do not by default have access to view assignments to Azure resource roles in Privileged Identity Management.
5250

articles/active-directory/privileged-identity-management/pim-email-notifications.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.tgt_pltfrm: na
1111
ms.devlang: na
1212
ms.topic: conceptual
1313
ms.subservice: pim
14-
ms.date: 01/05/2019
14+
ms.date: 04/21/2020
1515
ms.author: curtand
1616
ms.reviewer: hanki
1717
ms.custom: pim
@@ -72,6 +72,18 @@ The email includes four tiles:
7272

7373
The **Overview of your top roles** section lists the top five roles in your tenant based on total number of permanent and eligible administrators for each role. The **Take action** link opens the [PIM wizard](pim-security-wizard.md) where you can convert permanent administrators to eligible administrators in batches.
7474

75+
## Email timing for activation approvals
76+
77+
When users activates their role and the role setting requires approval, approvers will receive three emails for each approval:
78+
79+
- Request to approve or deny the user's activation request (sent by the request approval engine)
80+
- The user's request is approved (sent by the request approval engine)
81+
- The user's role is activated (sent by Privileged Identity Management)
82+
83+
The first two emails sent by the request approval engine can be delayed. Currently, 90% of emails take three to ten minutes, but for 1% customers it can be much longer, up to fifteen minutes.
84+
85+
If an approval request is approved in the Azure portal before the first email is sent, the first email will no longer be triggered and other approvers won't be notified by email of the approval request. It might appear as if the they didn't get an email but it's the expected behavior.
86+
7587
## PIM emails for Azure resource roles
7688

7789
Privileged Identity Management sends emails to Owners and User Access Administrators when the following events occur for Azure resource roles:

articles/active-directory/privileged-identity-management/pim-getting-started.md

Lines changed: 27 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -11,16 +11,16 @@ ms.service: active-directory
1111
ms.subservice: pim
1212
ms.topic: conceptual
1313
ms.workload: identity
14-
ms.date: 03/13/2020
14+
ms.date: 04/21/2020
1515
ms.author: curtand
1616
ms.custom: pim
1717
ms.collection: M365-identity-device-management
1818
---
1919
# Start using Privileged Identity Management
2020

21-
With Privileged Identity Management (PIM), you can manage, control, and monitor access within your Azure Active Directory (Azure AD) organization. This scope includes access to Azure resources, Azure AD, and other Microsoft online services like Office 365 or Microsoft Intune.
21+
This article describes how to enable Privileged Identity Management (PIM) and get started using it.
2222

23-
This article describes how to enable and get started using Privileged Identity Management.
23+
Use Privileged Identity Management (PIM) to manage, control, and monitor access within your Azure Active Directory (Azure AD) organization. With PIM you can provide as-needed and just-in-time access to Azure resources, Azure AD, and other Microsoft online services like Office 365 or Microsoft Intune.
2424

2525
## Prerequisites
2626

@@ -31,29 +31,38 @@ To use Privileged Identity Management, you must have one of the following licens
3131

3232
For more information, see [License requirements to use Privileged Identity Management](subscription-requirements.md).
3333

34-
## Sign up PIM for Azure AD roles
34+
## Prepare PIM for Azure AD roles
3535

36-
Once you have enabled Privileged Identity Management for your directory, you'll need to sign up Privileged Identity Management to manage Azure AD roles.
36+
Once you have enabled Privileged Identity Management for your directory, you can prepare Privileged Identity Management to manage Azure AD roles.
3737

38-
1. Open **Azure AD Privileged Identity Management**.
38+
You should get started with Azure AD roles in the following order:
3939

40-
1. Select **Azure AD roles**.
40+
1. [Configure role settings](pim-how-to-change-default-settings.md).
41+
1. [Give eligible assignments](pim-how-to-add-role-to-user.md).
42+
1. [Allow eligible users to activate their role just-in-time](pim-how-to-activate-role.md).
4143

42-
![Sign up Privileged Identity Management for Azure AD roles](./media/pim-getting-started/sign-up-pim-azure-ad-roles.png)
44+
## Prepare PIM for Azure roles
4345

44-
1. Select **Sign up**.
46+
Once you have enabled Privileged Identity Management for your directory, you can prepare Privileged Identity Management to manage Azure roles for Azure resource access on a subscription.
4547

46-
1. In the message that appears, click **Yes** to sign up Privileged Identity Management to manage Azure AD roles.
48+
You should get started with Azure roles in the following order:
49+
50+
1. [Discover Azure resources](pim-resource-roles-discover-resources.md)
51+
1. [Configure role settings](pim-resource-roles-configure-role-settings.md).
52+
1. [Give eligible assignments](pim-resource-roles-assign-roles.md).
53+
1. [Allow eligible users to activate their roles just-in-time](pim-resource-roles-activate-your-roles.md).
54+
55+
I think this is good, can we also add a section for Azure Resource roles. You can add the same three though they will link to the Azure Resource doc. And before these 3 points, Azure Resource will require customers to discover resources
56+
57+
58+
https://review.docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-resource-roles-discover-resources?branch=pr-en-us-111400
4759

48-
![Sign up Privileged Identity Management for Azure AD roles message](./media/pim-getting-started/sign-up-pim-message.png)
4960

50-
When sign up completes, the Azure AD options will be enabled. You might need to refresh the portal.
5161

52-
For information about how to discover and select the Azure resources to protect with Privileged Identity Management, see [Discover Azure resources to manage in Privileged Identity Management](pim-resource-roles-discover-resources.md).
5362

5463
## Navigate to your tasks
5564

56-
Once Privileged Identity Management is set up, you can start your identity management tasks.
65+
Once Privileged Identity Management is set up, you can learn your way around.
5766

5867
![Navigation window in Privileged Identity Management showing Tasks and Manage options](./media/pim-getting-started/pim-quickstart-tasks.png)
5968

@@ -63,12 +72,12 @@ Once Privileged Identity Management is set up, you can start your identity manag
6372
| **My requests** | Displays your pending requests to activate eligible role assignments. |
6473
| **Approve requests** | Displays a list of requests to activate eligible roles by users in your directory that you are designated to approve. |
6574
| **Review access** | Lists active access reviews you are assigned to complete, whether you're reviewing access for yourself or someone else. |
66-
| **Azure AD roles** | Displays a dashboard and settings for privileged role administrators to manage Azure AD role assignments. This dashboard is disabled for anyone who isn't a privileged role administrator. These users have access to a special dashboard titled My view. The My view dashboard only displays information about the user accessing the dashboard, not the entire tenant. |
67-
| **Azure resources** | Displays a dashboard and settings for privileged role administrators to manage Azure resource role assignments. This dashboard is disabled for anyone who isn't a privileged role administrator. These users have access to a special dashboard titled My view. The My view dashboard only displays information about the user accessing the dashboard, not the entire tenant. |
75+
| **Azure AD roles** | Displays a dashboard and settings for Privileged role administrators to manage Azure AD role assignments. This dashboard is disabled for anyone who isn't a privileged role administrator. These users have access to a special dashboard titled My view. The My view dashboard only displays information about the user accessing the dashboard, not the entire tenant. |
76+
| **Azure resources** | Displays a dashboard and settings for Privileged role administrators to manage Azure resource role assignments. This dashboard is disabled for anyone who isn't a privileged role administrator. These users have access to a special dashboard titled My view. The My view dashboard only displays information about the user accessing the dashboard, not the entire tenant. |
6877

6978
## Add a PIM tile to the dashboard
7079

71-
To make it easier to open Privileged Identity Management, add a Privileged Identity Management tile to your Azure portal dashboard.
80+
To make it easier to open Privileged Identity Management, add a PIM tile to your Azure portal dashboard.
7281

7382
1. Sign in to the [Azure portal](https://portal.azure.com/).
7483

@@ -89,4 +98,4 @@ To make it easier to open Privileged Identity Management, add a Privileged Ident
8998
## Next steps
9099

91100
- [Assign Azure AD roles in Privileged Identity Management](pim-how-to-add-role-to-user.md)
92-
- [Discover Azure resources to manage in Privileged Identity Management](pim-resource-roles-discover-resources.md)
101+
- [Manage Azure resource access in Privileged Identity Management](pim-resource-roles-discover-resources.md)

articles/active-directory/privileged-identity-management/pim-security-wizard.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.topic: conceptual
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 11/08/2019
14+
ms.date: 04/21/2020
1515
ms.author: curtand
1616
ms.custom: pim ; H1Hack27Feb2017
1717
ms.collection: M365-identity-device-management
@@ -21,14 +21,17 @@ ms.collection: M365-identity-device-management
2121

2222
If you're the first person to use Privileged Identity Management (PIM) in your Azure Active Directory (Azure AD)organization, you are presented with a wizard to get started. The wizard helps you understand the security risks of privileged identities and how to use Privileged Identity Management to reduce those risks. You don't need to make any changes to existing role assignments in the wizard, if you prefer to do it later.
2323

24+
> [!Important]
25+
> The security wizard is temporarily unavailable. Thank you for your patience.
26+
2427
## Wizard overview
2528

2629
Before your organization starts using Privileged Identity Management, all role assignments are permanent: the users are always in these roles even if they do not presently need their privileges. The first step of the wizard shows you a list of high-privileged roles and how many users are currently in those roles. You can drill in to a particular role to learn more about users if one or more of them are unfamiliar.
2730

2831
The second step of the wizard gives you an opportunity to change administrator's role assignments.
2932

3033
> [!WARNING]
31-
> It is important that you have at least one Global administrator, and more than one Privileged role administrator with an organizational account (not a Microsoft account). If there is only one Privileged role administrator, the organization can't manage Privileged Identity Management if that account is deleted.
34+
> It is important that you have at least one Global administrator, and more than one Privileged role administrator with a work or school account (not a Microsoft account). If there is only one Privileged role administrator, the organization can't manage Privileged Identity Management if that account is deleted.
3235
> Also, keep role assignments permanent if a user has a Microsoft account (in other words, an account they use to sign in to Microsoft services like Skype and Outlook.com). If you plan to require multi-factor authentication for activation for that role, that user will be locked out.
3336
3437
## Run the wizard

0 commit comments

Comments
 (0)