Skip to content

Commit b776090

Browse files
committed
licensing updates
1 parent c48f2d5 commit b776090

File tree

1 file changed

+1
-7
lines changed

1 file changed

+1
-7
lines changed

articles/active-directory/privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -26,16 +26,10 @@ The need for access to privileged Azure resource and Azure AD roles by employees
2626

2727
To create access reviews for Azure resources, you must be assigned to the [Owner](../../role-based-access-control/built-in-roles.md#owner) or the [User Access Administrator](../../role-based-access-control/built-in-roles.md#user-access-administrator) role for the Azure resources. To create access reviews for Azure AD roles, you must be assigned to the [Global Administrator](../roles/permissions-reference.md#global-administrator) or the [Privileged Role Administrator](../roles/permissions-reference.md#privileged-role-administrator) role.
2828

29-
For **Service Principals** only, an Entra Workload Identities Premium plan is also required. To make use of workload identity risk, including the new **Risky workload identities** blade and the **Workload identity detections** tab in the **Risk detections** blade in the portal, you must have the following.
29+
Access Reviews for **Service Principals** requires an Entra Workload Identities Premium plan.
3030

3131
- Workload Identities Premium licensing: You can view and acquire licenses on the [Workload Identities blade](https://portal.azure.com/#view/Microsoft_Azure_ManagedServiceIdentity/WorkloadIdentitiesBlade) in the Azure portal.
32-
- One of the following administrator roles assigned
33-
- Global Administrator
34-
- Security Administrator
35-
- Security Operator
36-
- Security Reader
3732

38-
Users assigned the Conditional Access administrator role can create policies that use risk as a condition.
3933

4034
## Create access reviews
4135

0 commit comments

Comments
 (0)