Skip to content

Commit b34c526

Browse files
committed
Screenshots and activate steps
1 parent 4369759 commit b34c526

File tree

7 files changed

+10
-8
lines changed

7 files changed

+10
-8
lines changed

articles/role-based-access-control/check-access.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: rolyon
66
manager: amycolannino
77
ms.service: role-based-access-control
88
ms.topic: quickstart
9-
ms.date: 07/18/2023
9+
ms.date: 12/09/2024
1010
ms.author: rolyon
1111
ms.custom: mode-other
1212
#Customer intent: As a new user, I want to quickly see access for myself, user, group, or application, to make sure they have the appropriate permissions.
@@ -58,7 +58,7 @@ If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, [M
5858

5959
1. Select **Access control (IAM)**.
6060

61-
1. On the **My access** tab, view your role assignments at this scope and inherited to this scope. Assignments at child scopes aren't listed.
61+
1. On the **Check access** tab, view your role assignments at this scope and inherited to this scope. Assignments at child scopes aren't listed.
6262

6363
The following shows an example of the Access control (IAM) page for a resource group.
6464

@@ -79,7 +79,7 @@ If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, [M
7979

8080
1. Select **Access control (IAM)**.
8181

82-
1. On the **My access** tab, select the **Check access** button.
82+
1. On the **Check access** tab, select the **Check access** button.
8383

8484
A **Check access** pane appears.
8585

@@ -103,7 +103,7 @@ If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, [M
103103

104104
1. Select **Access control (IAM)**.
105105

106-
1. On the **My access** tab, select the **Check access** button.
106+
1. On the **Check access** tab, select the **Check access** button.
107107

108108
A **Check access** pane appears.
109109

@@ -121,9 +121,11 @@ If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, [M
121121
- Deny assignments managed by Azure.
122122
- Classic Service Administrator or Co-Administrator assignments for classic deployments.
123123

124-
You also see a **Eligible assignments** tab with [eligible and time-bound role assignments](pim-integration.md).
124+
:::image type="content" source="./media/check-access/rg-check-access-assignments-user-pim.png" alt-text="Screenshot of role assignments pane for a user for PIM integration." lightbox="./media/check-access/rg-check-access-assignments-user-pim.png":::
125125

126-
:::image type="content" source="./media/check-access/rg-check-access-assignments-user-pim.png" alt-text="Screenshot of role and deny assignments pane for a user for PIM integration." lightbox="./media/check-access/rg-check-access-assignments-user-pim.png":::
126+
You also see a **Eligible assignments** tab with any eligible and time-bound role assignments. To start the activatation process, you can add a check mark next to a role you want to activate and then select **Activate role**. For more information, see [Eligible and time-bound role assignments](pim-integration.md) and [Activate eligible Azure role assignments](role-assignments-eligible-activate.md).
127+
128+
:::image type="content" source="./media/check-access/rg-check-access-assignments-user-pim-eligible.png" alt-text="Screenshot of role assignments pane and the Eligible assignments tab for a user for PIM integration." lightbox="./media/check-access/rg-check-access-assignments-user-pim-eligible.png":::
127129

128130
---
129131

23.5 KB
Loading
47.5 KB
Loading
15.6 KB
Loading
-4.6 KB
Loading
-718 Bytes
Loading

articles/role-based-access-control/role-assignments-eligible-activate.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: rolyon
55
manager: amycolannino
66
ms.service: role-based-access-control
77
ms.topic: how-to
8-
ms.date: 11/11/2024
8+
ms.date: 12/09/2024
99
ms.author: rolyon
1010
---
1111

@@ -37,7 +37,7 @@ These steps describe how to activate an eligible role assignment using the Azure
3737

3838
1. Click **Access control (IAM)**.
3939

40-
1. Click **Activate role**.
40+
1. In the **Action** column, click **Activate** for the role you want to activate.
4141

4242
The **assignments** pane appears and lists your eligible role assignments.
4343

0 commit comments

Comments
 (0)