Skip to content

Commit acd9ef8

Browse files
authored
Merge pull request #203005 from curtand/entra0627
Last Entra updates for PIM
2 parents 2d5f489 + 63e7a89 commit acd9ef8

10 files changed

+17
-17
lines changed

articles/active-directory/privileged-identity-management/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
### YamlMime:Landing
22

33
title: Privileged Identity Management documentation
4-
summary: Azure Active Directory (Azure AD) Privileged Identity Management (PIM) enables you to limit standing administrator access to privileged roles, discover who has access, and review privileged access.
4+
summary: Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra, enables you to limit standing administrator access to privileged roles, discover who has access, and review privileged access.
55

66
metadata:
77
title: Privileged Identity Management documentation

articles/active-directory/privileged-identity-management/pim-resource-roles-custom-role-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,19 +10,19 @@ ms.topic: how-to
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 10/07/2021
13+
ms.date: 06/27/2022
1414
ms.author: curtand
1515
ms.reviewer: shaunliu
1616
ms.collection: M365-identity-device-management
1717
---
1818

1919
# Use Azure custom roles in Privileged Identity Management
2020

21-
You might need to apply strict Privileged Identity Management (PIM) settings to some users in a privileged role in your Azure Active Directory (Azure AD) organization, while providing greater autonomy for others. Consider for example a scenario in which your organization hires several contract associates to assist in the development of an application that will run in an Azure subscription.
21+
You might need to apply stricter just-in-time settings to some users in a privileged role in your organization in Azure Active Directory (Azure AD), part of Microsoft Entra, while providing greater autonomy for others. For example, if your organization hired several contract associates to help develop an application that will run in an Azure subscription.
2222

2323
As a resource administrator, you want employees to be eligible for access without requiring approval. However, all contract associates must be approved when they request access to the organization's resources.
2424

25-
Follow the steps outlined in the next section to set up targeted Privileged Identity Management settings for Azure resource roles.
25+
Follow the steps outlined in the next section to set up targeted Privileged Identity Management (PIM) settings for Azure resource roles.
2626

2727
## Create the custom role
2828

articles/active-directory/privileged-identity-management/pim-resource-roles-discover-resources.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,15 +10,15 @@ ms.topic: how-to
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 12/07/2021
13+
ms.date: 06/27/2022
1414
ms.author: curtand
1515
ms.reviewer: shaunliu
1616
ms.collection: M365-identity-device-management
1717
---
1818

1919
# Discover Azure resources to manage in Privileged Identity Management
2020

21-
Using Azure Active Directory (Azure AD) Privileged Identity Management (PIM), you can improve the protection of your Azure resources. This is helpful to:
21+
You can use Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra, to improve the protection of your Azure resources. This helps:
2222

2323
- Organizations that already use Privileged Identity Management to protect Azure AD roles
2424
- Management group and subscription owners who are trying to secure production resources

articles/active-directory/privileged-identity-management/pim-resource-roles-overview-dashboards.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.tgt_pltfrm: na
1212
ms.topic: how-to
1313
ms.subservice: pim
14-
ms.date: 10/07/2021
14+
ms.date: 06/27/2022
1515
ms.author: curtand
1616
ms.reviewer: shaunliu
1717
ms.custom: pim
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020

2121
# Use a resource dashboard to perform an access review in Privileged Identity Management
2222

23-
You can use a resource dashboard to perform an access review in Privileged Identity Management (PIM). The Admin View dashboard in Azure Active Directory (Azure AD) has three primary components:
23+
You can use a resource dashboard to perform an access review in Privileged Identity Management (PIM). The Admin View dashboard in Azure Active Directory (Azure AD), part of Microsoft Entra, has three primary components:
2424

2525
- A graphical representation of resource role activations
2626
- Charts that display the distribution of role assignments by assignment type

articles/active-directory/privileged-identity-management/pim-resource-roles-renew-extend.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.collection: M365-identity-device-management
2222

2323
# Extend or renew Azure resource role assignments in Privileged Identity Management
2424

25-
Azure Active Directory (Azure AD) Privileged Identity Management (PIM) provides controls to manage the access and assignment lifecycle for Azure resources. Administrators can assign roles using start and end date-time properties. When the assignment end approaches, Privileged Identity Management sends email notifications to the affected users or groups. It also sends email notifications to administrators of the resource to ensure that appropriate access is maintained. Assignments might be renewed and remain visible in an expired state for up to 30 days, even if access is not extended.
25+
Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra, provides controls to manage the access and assignment lifecycle for Azure resources. Administrators can assign roles using start and end date-time properties. When the assignment end approaches, Privileged Identity Management sends email notifications to the affected users or groups. It also sends email notifications to administrators of the resource to ensure that appropriate access is maintained. Assignments might be renewed and remain visible in an expired state for up to 30 days, even if access is not extended.
2626

2727
## Who can extend and renew?
2828

articles/active-directory/privileged-identity-management/pim-roles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.topic: conceptual
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 10/07/2021
14+
ms.date: 06/27/2022
1515
ms.author: curtand
1616
ms.reviewer: shaunliu
1717
ms.custom: pim ; H1Hack27Feb2017;oldportal;it-pro;
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020

2121
# Roles you can't manage in Privileged Identity Management
2222

23-
Azure Active Directory (Azure AD) Privileged Identity Management (PIM) enables you to manage all [Azure AD roles](../roles/permissions-reference.md) and all [Azure roles](../../role-based-access-control/built-in-roles.md). Azure roles can also include your custom roles attached to your management groups, subscriptions, resource groups, and resources. However, there are few roles that you cannot manage. This article describes the roles you can't manage in Privileged Identity Management.
23+
You can manage just-in-time assignments to all [Azure AD roles](../roles/permissions-reference.md) and all [Azure roles](../../role-based-access-control/built-in-roles.md) using Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra. Azure roles include built-in and custom roles attached to your management groups, subscriptions, resource groups, and resources. However, there are few roles that you can't manage. This article describes the roles you can't manage in Privileged Identity Management.
2424

2525
## Classic subscription administrator roles
2626

articles/active-directory/privileged-identity-management/pim-security-wizard.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.topic: how-to
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 10/07/2021
14+
ms.date: 06/27/2022
1515
ms.author: curtand
1616
ms.reviewer: shaunliu
1717
ms.custom: pim ; H1Hack27Feb2017
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020

2121
# Discovery and Insights (preview) for Azure AD roles (formerly Security Wizard)
2222

23-
If you're starting out with Privileged Identity Management (PIM) in your Azure Active Directory (Azure AD) organization, you can use the **Discovery and insights (preview)** page to get started. This feature shows you who is assigned to privileged roles in your organization and how to use PIM to quickly change permanent role assignments into just-in-time assignments. You can view or make changes to your permanent privileged role assignments in **Discovery and Insights (preview)**. It's an analysis tool and an action tool.
23+
If you're starting out using Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra, to manage role assignments in your organization, you can use the **Discovery and insights (preview)** page to get started. This feature shows you who is assigned to privileged roles in your organization and how to use PIM to quickly change permanent role assignments into just-in-time assignments. You can view or make changes to your permanent privileged role assignments in **Discovery and Insights (preview)**. It's an analysis tool and an action tool.
2424

2525
## Discovery and insights (preview)
2626

articles/active-directory/privileged-identity-management/pim-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection: M365-identity-device-management
1818

1919
# Troubleshoot access to Azure resources denied in Privileged Identity Management
2020

21-
Are you having a problem with Privileged Identity Management (PIM) in Azure Active Directory (Azure AD)? The information that follows can help you to get things working again.
21+
Are you having a problem with Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsft Entra? The information that follows can help you to get things working again.
2222

2323
## Access to Azure resources denied
2424

articles/active-directory/privileged-identity-management/powershell-for-azure-ad-roles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.collection: M365-identity-device-management
2121

2222
# PowerShell for Azure AD roles in Privileged Identity Management
2323

24-
This article contains instructions for using Azure Active Directory (Azure AD) PowerShell cmdlets to manage Azure AD roles in Privileged Identity Management (PIM). It also tells you how to get set up with the Azure AD PowerShell module.
24+
This article tells you how to use PowerShell cmdlets to manage Azure AD roles using Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra. It also tells you how to get set up with the Azure AD PowerShell module.
2525

2626
## Installation and Setup
2727

articles/active-directory/privileged-identity-management/subscription-requirements.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.topic: how-to
1414
ms.subservice: pim
15-
ms.date: 10/07/2021
15+
ms.date: 06/27/2022
1616
ms.author: curtand
1717
ms.reviewer: shaunliu
1818
ms.custom: pim
@@ -22,7 +22,7 @@ ms.collection: M365-identity-device-management
2222

2323
# License requirements to use Privileged Identity Management
2424

25-
To use Azure Active Directory (Azure AD) Privileged Identity Management (PIM), a directory must have a valid license. Furthermore, licenses must be assigned to the administrators and relevant users. This article describes the license requirements to use Privileged Identity Management.
25+
To use Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra, a tenant must have a valid license. Licenses must also be assigned to the administrators and relevant users. This article describes the license requirements to use Privileged Identity Management.
2626

2727
## Valid licenses
2828

0 commit comments

Comments
 (0)