Skip to content

Commit e6aab52

Browse files
authored
Merge pull request #92839 from curtand/pim1022
[Azure AD PIM] more editorial pass
2 parents ea15bda + 53a77cc commit e6aab52

10 files changed

+182
-177
lines changed

articles/active-directory/privileged-identity-management/pim-how-to-add-role-to-user.md

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.topic: conceptual
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 04/09/2019
13+
ms.date: 10/22/2019
1414
ms.author: curtand
1515
ms.collection: M365-identity-device-management
1616
---
@@ -33,25 +33,25 @@ Follow these steps to make a user eligible for an Azure AD admin role.
3333

3434
If you haven't started Privileged Identity Management in the Azure portal yet, go to [Start using Privileged Identity Management](pim-getting-started.md).
3535

36-
1. Click **Azure AD roles**.
36+
1. Select **Azure AD roles**.
3737

38-
1. Click **Roles** or **Members**.
38+
1. Select **Roles** or **Members**.
3939

4040
![Azure AD roles with Roles and Members menu options highlighted](./media/pim-how-to-add-role-to-user/pim-directory-roles.png)
4141

42-
1. Click **Add member** to open Add managed members.
42+
1. Select **Add member** to open Add managed members.
4343

44-
1. Click **Select a role**, click a role you want to manage, and then click **Select**.
44+
1. Select **Select a role**, select a role you want to manage, and then select **Select**.
4545

4646
![Select a role pane listing Azure AD roles](./media/pim-how-to-add-role-to-user/pim-select-a-role.png)
4747

48-
1. Click **Select members**, select the users you want to assign to the role, and then click **Select**.
48+
1. Select **Select members**, select the users you want to assign to the role, and then select **Select**.
4949

5050
![Select members pane where you can select a user](./media/pim-how-to-add-role-to-user/pim-select-members.png)
5151

52-
1. In Add managed members, click **OK** to add the user to the role.
52+
1. In Add managed members, select **OK** to add the user to the role.
5353

54-
1. In the list of roles, click the role you just assigned to see the list of members.
54+
1. In the list of roles, select the role you just assigned to see the list of members.
5555

5656
When the role is assigned, the user you selected will appear in the members list as **Eligible** for the role.
5757

@@ -67,15 +67,15 @@ By default, new users are only Eligible for an Azure AD admin role. Follow these
6767

6868
1. Open **Azure AD Privileged Identity Management**.
6969

70-
1. Click **Azure AD roles**.
70+
1. Select **Azure AD roles**.
7171

72-
1. Click **Members**.
72+
1. Select **Members**.
7373

7474
![Azure AD roles - Members list showing role and activation state](./media/pim-how-to-add-role-to-user/pim-directory-role-list-members.png)
7575

76-
1. Click an **Eligible** role that you want to make permanent.
76+
1. Select an **Eligible** role that you want to make permanent.
7777

78-
1. Click **More** and then click **Make perm**.
78+
1. Select **More** and then select **Make perm**.
7979

8080
![Pane listing a user that is eligible for a role with the More menu options open](./media/pim-how-to-add-role-to-user/pim-make-perm.png)
8181

@@ -111,7 +111,9 @@ Follow these steps to remove a specific user from an Azure AD admin role.
111111

112112
## Authorization error when assigning roles
113113

114-
If you recently enabled Privileged Identity Management for an Azure subscription and you get an authorization error when you try to make a user eligible for an Azure AD admin role, it might be because the MS-PIM service principal does not yet have the appropriate permissions. To assign roles, the MS-PIM service principal must be assigned the [User Access Administrator role](../../role-based-access-control/built-in-roles.md#user-access-administrator) in Azure role-based access control for Azure resource access (as opposed to Azure AD administration roles). Instead of waiting until MS-PIM is assigned the User Access Administrator role, you can assign it manually.
114+
Scenario: As an active owner or user access administrator for an Azure resource, you are able to see your resource inside Privileged Identity Management but can't perform any actions such as making an eligible assignment or viewing a list of role assignments from the resource overview page. Any of these actions results in an authorization error.
115+
116+
To assign roles, the MS-PIM service principal must be assigned the [User Access Administrator role](../../role-based-access-control/built-in-roles.md#user-access-administrator) in Azure role-based access control for Azure resource access (as opposed to Azure AD administration roles). Instead of waiting until MS-PIM is assigned the User Access Administrator role, you can assign it manually.
115117

116118
The following steps assign the User Access Administrator role to the MS-PIM service principal for a subscription.
117119

@@ -143,7 +145,6 @@ The following steps assign the User Access Administrator role to the MS-PIM serv
143145

144146
![Access control (IAM) blade showing User Access Administrator role assignment for MS-PIM](./media/pim-how-to-add-role-to-user/ms-pim-user-access-administrator.png)
145147

146-
147148
## Next steps
148149

149150
- [Configure Azure AD admin role settings in Privileged Identity Management](pim-how-to-change-default-settings.md)
Lines changed: 38 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Configure Azure AD role settings in PIM - Azure Active Directory | Microsoft Docs
2+
title: Configure Azure AD role settings in Privileged Identity Management - Azure Active Directory | Microsoft Docs
33
description: Learn how to configure Azure AD role settings in Azure AD Privileged Identity Management (PIM).
44
services: active-directory
55
documentationcenter: ''
@@ -11,14 +11,14 @@ ms.service: active-directory
1111
ms.topic: conceptual
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 05/31/2019
14+
ms.date: 10/22/2019
1515
ms.author: curtand
1616
ms.custom: pim
1717
ms.collection: M365-identity-device-management
1818
---
19-
# Configure Azure AD role settings in PIM
19+
# Configure Azure AD role settings in Privileged Identity Management
2020

21-
A privileged role administrator can customize Azure Active Directory (Azure AD) Privileged Identity Management (PIM) in their organization, including changing the experience for a user who is activating an eligible role assignment.
21+
A Privileged role administrator can customize Privileged Identity Management (PIM) in their Azure Active Directory (Azure AD) organization, including changing the experience for a user who is activating an eligible role assignment.
2222

2323
## Open role settings
2424

@@ -46,71 +46,68 @@ Use the **Activations** slider to set the maximum time, in hours, that a role st
4646

4747
## Notifications
4848

49-
Use the **Notifications** switch to specify whether administrators will receive email notifications when roles are activated. This can be useful for detecting unauthorized or illegitimate activations.
49+
Use the **Notifications** switch to specify whether administrators will receive email notifications when roles are activated. This notification can be useful for detecting unauthorized or illegitimate activations.
5050

5151
When set to **Enable**, notifications are sent to:
5252

53-
- Privileged Role Administrator
54-
- Security Administrator
55-
- Global Administrator
53+
- Privileged role administrator
54+
- Security administrator
55+
- Global administrator
5656

57-
For more information, see [Email notifications in PIM](pim-email-notifications.md).
57+
For more information, see [Email notifications in Privileged Identity Management](pim-email-notifications.md).
5858

5959
## Incident/Request ticket
6060

61-
Use the **Incident/Request ticket** switch to specify whether to require eligible administrators to include a ticket number when they activate their role. This can be useful when you perform role access audits.
61+
Use the **Incident/Request ticket** switch to require eligible administrators to include a ticket number when they activate their role. This practice can make role access audits more effective.
6262

6363
## Multi-Factor Authentication
6464

65-
Use the **Multi-Factor Authentication** switch to specify whether to require users to verify their identity with MFA before they can activate their roles. They only have to verify this once per session, not every time they activate a role. There are two tips to keep in mind when you enable MFA:
65+
Use the **Multi-Factor Authentication** switch to specify whether to require users to verify their identity with MFA before they can activate their roles. They only have to verify their identity once per session, not every time they activate a role. There are two tips to keep in mind when you enable MFA:
6666

67-
* Users who have Microsoft accounts for their email addresses (typically @outlook.com, but not always) cannot register for Azure MFA. If you want to assign roles to users with Microsoft accounts, you should either make them permanent admins or disable MFA for that role.
68-
* You cannot disable MFA for highly privileged roles for Azure AD and Office365. This is a safety feature because these roles should be carefully protected:
67+
- Users who have Microsoft accounts for their email addresses (typically @outlook.com, but not always) cannot register for Azure Multi-Factor Authentication. If you want to assign roles to users with Microsoft accounts, you should either make them permanent admins or disable multi-factor authentication for that role.
68+
- You cannot disable Azure Multi-Factor Authentication for highly privileged roles for Azure AD and Office 365. This safety feature helps protect the following roles:
6969

70-
* Azure Information Protection Administrator
71-
* Billing Administrator
72-
* Cloud Application Administrator
73-
* Compliance Administrator
74-
* Conditional Access Administrator
75-
* CRM Service Administrator
76-
* Customer LockBox Access Approver
77-
* Directory Writers
78-
* Exchange Administrator
79-
* Global Administrator
80-
* Intune Service Administrator
81-
* Power BI Service Administrator
82-
* Privileged Role Administrator
83-
* Security Administrator
84-
* SharePoint Service Administrator
85-
* Skype for Business Administrator
86-
* User Administrator
87-
88-
For more information, see [Multi-factor authentication (MFA) and PIM](pim-how-to-require-mfa.md).
70+
- Azure Information Protection administrator
71+
- Billing administrator
72+
- Cloud application administrator
73+
- Compliance administrator
74+
- Conditional access administrator
75+
- Dynamics 365 administrator
76+
- Customer LockBox access approver
77+
- Directory writers
78+
- Exchange administrator
79+
- Global administrator
80+
- Intune administrator
81+
- Power BI administrator
82+
- Privileged role administrator
83+
- Security administrator
84+
- SharePoint administrator
85+
- Skype for Business administrator
86+
- User administrator
87+
88+
For more information, see [Multi-factor authentication and Privileged Identity Management](pim-how-to-require-mfa.md).
8989

9090
## Require approval
9191

92-
If you want to require approval to activate a role, follow these steps.
92+
If you want to delegate the required approval to activate a role, follow these steps.
9393

9494
1. Set the **Require approval** switch to **Enabled**. The pane expands with options to select approvers.
9595

9696
![Azure AD roles - Settings - Require approval](./media/pim-how-to-change-default-settings/pim-directory-roles-settings-require-approval.png)
9797

98-
If you **DO NOT** specify any approvers, the Privileged Role Administrators become the default approvers. Privileged Role Administrators would be required to approve **ALL** activation requests for this role.
98+
If you don't specify any approvers, the Privileged role administrator becomes the default approver and is then required to approve all activation requests for this role.
9999

100100
1. To specify approvers, click **Select approvers**.
101101

102102
![Azure AD roles - Settings - Require approval](./media/pim-how-to-change-default-settings/pim-directory-roles-settings-require-approval-select-approvers.png)
103103

104-
1. Select one or more approvers and then click **Select**. You can select users or groups. At least 2 approvers is recommended. Self-approval is not allowed.
105-
106-
Your selections will appear in the list of selected approvers.
107-
108-
1. Once you have specified your all your role settings, click **Save** to save your changes.
104+
1. Select one or more approvers in addition to the Privileged role administrator and then click **Select**. You can select users or groups. We recommend at least two approvers is. Even if you add yourself as an approver, you can't self-approve a role activation. Your selections will appear in the list of selected approvers.
109105

106+
1. After you have specified your all your role settings, select **Save** to save your changes.
110107

111108
<!--PLACEHOLDER: Need an explanation of what the temporary Global Administrator setting is for.-->
112109

113110
## Next steps
114111

115-
- [Assign Azure AD roles in PIM](pim-how-to-add-role-to-user.md)
116-
- [Configure security alerts for Azure AD roles in PIM](pim-how-to-configure-security-alerts.md)
112+
- [Assign Azure AD roles in Privileged Identity Management](pim-how-to-add-role-to-user.md)
113+
- [Configure security alerts for Azure AD roles in Privileged Identity Management](pim-how-to-configure-security-alerts.md)

articles/active-directory/privileged-identity-management/pim-how-to-complete-review.md

Lines changed: 20 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -11,44 +11,51 @@ ms.service: active-directory
1111
ms.topic: conceptual
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 06/06/2017
14+
ms.date: 10/22/2019
1515
ms.author: curtand
1616
ms.custom: pim
1717
ms.collection: M365-identity-device-management
1818
---
19-
# Complete an access review of Azure AD roles in PIM
20-
Privileged role administrators can review privileged access once an [access review has been started](pim-how-to-start-security-review.md). Azure Active Directory (Azure AD) Privileged Identity Management (PIM) will automatically send an email prompting users to review their access. If a user did not get an email, you can send them the instructions in [how to perform an access review](pim-how-to-perform-security-review.md).
19+
# Complete an access review of Azure AD roles in Privileged Identity Management
20+
21+
Privileged role administrators can review privileged access once an [access review has been started](pim-how-to-start-security-review.md). Privileged Identity Management (PIM) will automatically send an email to users in your Azure Active Directory (Azure AD) organization prompting them to review their access. If a user did not get an email, you can send them the instructions in [how to perform an access review](pim-how-to-perform-security-review.md).
2122

2223
After the access review period is over, or all the users have finished their self-review, follow the steps in this article to manage the review and see the results.
2324

2425
## Manage access reviews
25-
1. Go to the [Azure portal](https://portal.azure.com/) and select the **Azure AD Privileged Identity Management** application on your dashboard.
26-
2. Select the **Access reviews** section of the dashboard.
27-
3. Select the access review that you want to manage.
2826

29-
On the access review's detail blade, there are a number options for managing that review.
27+
1. Go to the [Azure portal](https://portal.azure.com/) and select the **Azure AD Privileged Identity Management** service on your dashboard.
28+
1. Select the **Access reviews** section of the dashboard.
29+
1. Select the access review that you want to manage.
30+
31+
On the access review's detail blade, there are a number of options for managing that review.
3032

31-
![PIM access review buttons - screenshot](./media/pim-how-to-complete-review/review-buttons.png)
33+
![Privileged Identity Management access review buttons - screenshot](./media/pim-how-to-complete-review/review-buttons.png)
3234

3335
### Remind
34-
If an access review is set up so that the users review themselves, the **Remind** button sends out a notification.
36+
37+
If an access review is set up so that the users review themselves, the **Remind** button sends out a notification.
3538

3639
### Stop
40+
3741
All access reviews have an end date, but you can use the **Stop** button to finish it early. If any users haven't been reviewed by this time, they won't be able to after you stop the review. You cannot restart a review after it's been stopped.
3842

3943
### Apply
44+
4045
After an access review is completed, either because you reached the end date or stopped it manually, the **Apply** button implements the outcome of the review. If a user's access was denied in the review, this is the step that will remove their role assignment.
4146

4247
### Export
48+
4349
If you want to apply the results of the access review manually, you can export the review. The **Export** button will start downloading a CSV file. You can manage the results in Excel or other programs that open CSV files.
4450

4551
### Delete
46-
If you are not interested in the review any further, delete it. The **Delete** button removes the review from the PIM application.
52+
53+
If you are not interested in the review any further, delete it. The **Delete** button removes the review from the Privileged Identity Management service.
4754

4855
> [!IMPORTANT]
49-
> You will not get a warning before deletion occurs, so be sure that you want to delete that review.
56+
> You will not be required to confirm this destructive change, so verify that you want to delete that review.
5057
5158
## Next steps
5259

53-
- [Start an access review for Azure AD roles in PIM](pim-how-to-start-security-review.md)
54-
- [Perform an access review of my Azure AD roles in PIM](pim-how-to-perform-security-review.md)
60+
- [Start an access review for Azure AD roles in Privileged Identity Management](pim-how-to-start-security-review.md)
61+
- [Perform an access review of my Azure AD roles in Privileged Identity Management](pim-how-to-perform-security-review.md)

0 commit comments

Comments
 (0)