You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/check-access.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: rolyon
6
6
manager: amycolannino
7
7
ms.service: role-based-access-control
8
8
ms.topic: quickstart
9
-
ms.date: 07/18/2023
9
+
ms.date: 12/09/2024
10
10
ms.author: rolyon
11
11
ms.custom: mode-other
12
12
#Customer intent: As a new user, I want to quickly see access for myself, user, group, or application, to make sure they have the appropriate permissions.
@@ -58,7 +58,7 @@ If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, [M
58
58
59
59
1. Select **Access control (IAM)**.
60
60
61
-
1. On the **My access** tab, view your role assignments at this scope and inherited to this scope. Assignments at child scopes aren't listed.
61
+
1. On the **Check access** tab, view your role assignments at this scope and inherited to this scope. Assignments at child scopes aren't listed.
62
62
63
63
The following shows an example of the Access control (IAM) page for a resource group.
64
64
@@ -79,7 +79,7 @@ If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, [M
79
79
80
80
1. Select **Access control (IAM)**.
81
81
82
-
1. On the **My access** tab, select the **Check access** button.
82
+
1. On the **Check access** tab, select the **Check access** button.
83
83
84
84
A **Check access** pane appears.
85
85
@@ -103,7 +103,7 @@ If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, [M
103
103
104
104
1. Select **Access control (IAM)**.
105
105
106
-
1. On the **My access** tab, select the **Check access** button.
106
+
1. On the **Check access** tab, select the **Check access** button.
107
107
108
108
A **Check access** pane appears.
109
109
@@ -121,9 +121,11 @@ If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, [M
121
121
- Deny assignments managed by Azure.
122
122
- Classic Service Administrator or Co-Administrator assignments for classic deployments.
123
123
124
-
You also see a **Eligible assignments** tab with [eligible and time-bound role assignments](pim-integration.md).
124
+
:::image type="content" source="./media/check-access/rg-check-access-assignments-user-pim.png" alt-text="Screenshot of role assignments pane for a user for PIM integration." lightbox="./media/check-access/rg-check-access-assignments-user-pim.png":::
125
125
126
-
:::image type="content" source="./media/check-access/rg-check-access-assignments-user-pim.png" alt-text="Screenshot of role and deny assignments pane for a user for PIM integration." lightbox="./media/check-access/rg-check-access-assignments-user-pim.png":::
126
+
You also see a **Eligible assignments** tab with any eligible and time-bound role assignments. To start the activatation process, you can add a check mark next to a role you want to activate and then select **Activate role**. For more information, see [Eligible and time-bound role assignments](pim-integration.md) and [Activate eligible Azure role assignments](role-assignments-eligible-activate.md).
127
+
128
+
:::image type="content" source="./media/check-access/rg-check-access-assignments-user-pim-eligible.png" alt-text="Screenshot of role assignments pane and the Eligible assignments tab for a user for PIM integration." lightbox="./media/check-access/rg-check-access-assignments-user-pim-eligible.png":::
0 commit comments