You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/pim-how-to-add-role-to-user.md
+15-14Lines changed: 15 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
10
10
ms.topic: conceptual
11
11
ms.workload: identity
12
12
ms.subservice: pim
13
-
ms.date: 04/09/2019
13
+
ms.date: 10/22/2019
14
14
ms.author: curtand
15
15
ms.collection: M365-identity-device-management
16
16
---
@@ -33,25 +33,25 @@ Follow these steps to make a user eligible for an Azure AD admin role.
33
33
34
34
If you haven't started Privileged Identity Management in the Azure portal yet, go to [Start using Privileged Identity Management](pim-getting-started.md).
35
35
36
-
1.Click**Azure AD roles**.
36
+
1.Select**Azure AD roles**.
37
37
38
-
1.Click**Roles** or **Members**.
38
+
1.Select**Roles** or **Members**.
39
39
40
40

41
41
42
-
1.Click**Add member** to open Add managed members.
42
+
1.Select**Add member** to open Add managed members.
43
43
44
-
1.Click**Select a role**, click a role you want to manage, and then click**Select**.
44
+
1.Select**Select a role**, select a role you want to manage, and then select**Select**.
45
45
46
46

47
47
48
-
1.Click**Select members**, select the users you want to assign to the role, and then click**Select**.
48
+
1.Select**Select members**, select the users you want to assign to the role, and then select**Select**.
49
49
50
50

51
51
52
-
1. In Add managed members, click**OK** to add the user to the role.
52
+
1. In Add managed members, select**OK** to add the user to the role.
53
53
54
-
1. In the list of roles, click the role you just assigned to see the list of members.
54
+
1. In the list of roles, select the role you just assigned to see the list of members.
55
55
56
56
When the role is assigned, the user you selected will appear in the members list as **Eligible** for the role.
57
57
@@ -67,15 +67,15 @@ By default, new users are only Eligible for an Azure AD admin role. Follow these
67
67
68
68
1. Open **Azure AD Privileged Identity Management**.
69
69
70
-
1.Click**Azure AD roles**.
70
+
1.Select**Azure AD roles**.
71
71
72
-
1.Click**Members**.
72
+
1.Select**Members**.
73
73
74
74

75
75
76
-
1.Click an **Eligible** role that you want to make permanent.
76
+
1.Select an **Eligible** role that you want to make permanent.
77
77
78
-
1.Click**More** and then click**Make perm**.
78
+
1.Select**More** and then select**Make perm**.
79
79
80
80

81
81
@@ -111,7 +111,9 @@ Follow these steps to remove a specific user from an Azure AD admin role.
111
111
112
112
## Authorization error when assigning roles
113
113
114
-
If you recently enabled Privileged Identity Management for an Azure subscription and you get an authorization error when you try to make a user eligible for an Azure AD admin role, it might be because the MS-PIM service principal does not yet have the appropriate permissions. To assign roles, the MS-PIM service principal must be assigned the [User Access Administrator role](../../role-based-access-control/built-in-roles.md#user-access-administrator) in Azure role-based access control for Azure resource access (as opposed to Azure AD administration roles). Instead of waiting until MS-PIM is assigned the User Access Administrator role, you can assign it manually.
114
+
Scenario: As an active owner or user access administrator for an Azure resource, you are able to see your resource inside Privileged Identity Management but can't perform any actions such as making an eligible assignment or viewing a list of role assignments from the resource overview page. Any of these actions results in an authorization error.
115
+
116
+
To assign roles, the MS-PIM service principal must be assigned the [User Access Administrator role](../../role-based-access-control/built-in-roles.md#user-access-administrator) in Azure role-based access control for Azure resource access (as opposed to Azure AD administration roles). Instead of waiting until MS-PIM is assigned the User Access Administrator role, you can assign it manually.
115
117
116
118
The following steps assign the User Access Administrator role to the MS-PIM service principal for a subscription.
117
119
@@ -143,7 +145,6 @@ The following steps assign the User Access Administrator role to the MS-PIM serv
143
145
144
146

145
147
146
-
147
148
## Next steps
148
149
149
150
-[Configure Azure AD admin role settings in Privileged Identity Management](pim-how-to-change-default-settings.md)
title: Configure Azure AD role settings in PIM - Azure Active Directory | Microsoft Docs
2
+
title: Configure Azure AD role settings in Privileged Identity Management - Azure Active Directory | Microsoft Docs
3
3
description: Learn how to configure Azure AD role settings in Azure AD Privileged Identity Management (PIM).
4
4
services: active-directory
5
5
documentationcenter: ''
@@ -11,14 +11,14 @@ ms.service: active-directory
11
11
ms.topic: conceptual
12
12
ms.workload: identity
13
13
ms.subservice: pim
14
-
ms.date: 05/31/2019
14
+
ms.date: 10/22/2019
15
15
ms.author: curtand
16
16
ms.custom: pim
17
17
ms.collection: M365-identity-device-management
18
18
---
19
-
# Configure Azure AD role settings in PIM
19
+
# Configure Azure AD role settings in Privileged Identity Management
20
20
21
-
A privileged role administrator can customize Azure Active Directory (Azure AD) Privileged Identity Management (PIM) in their organization, including changing the experience for a user who is activating an eligible role assignment.
21
+
A Privileged role administrator can customize Privileged Identity Management (PIM) in their Azure Active Directory (Azure AD) organization, including changing the experience for a user who is activating an eligible role assignment.
22
22
23
23
## Open role settings
24
24
@@ -46,71 +46,68 @@ Use the **Activations** slider to set the maximum time, in hours, that a role st
46
46
47
47
## Notifications
48
48
49
-
Use the **Notifications** switch to specify whether administrators will receive email notifications when roles are activated. This can be useful for detecting unauthorized or illegitimate activations.
49
+
Use the **Notifications** switch to specify whether administrators will receive email notifications when roles are activated. This notification can be useful for detecting unauthorized or illegitimate activations.
50
50
51
51
When set to **Enable**, notifications are sent to:
52
52
53
-
- Privileged Role Administrator
54
-
- Security Administrator
55
-
- Global Administrator
53
+
- Privileged role administrator
54
+
- Security administrator
55
+
- Global administrator
56
56
57
-
For more information, see [Email notifications in PIM](pim-email-notifications.md).
57
+
For more information, see [Email notifications in Privileged Identity Management](pim-email-notifications.md).
58
58
59
59
## Incident/Request ticket
60
60
61
-
Use the **Incident/Request ticket** switch to specify whether to require eligible administrators to include a ticket number when they activate their role. This can be useful when you perform role access audits.
61
+
Use the **Incident/Request ticket** switch to require eligible administrators to include a ticket number when they activate their role. This practice can make role access audits more effective.
62
62
63
63
## Multi-Factor Authentication
64
64
65
-
Use the **Multi-Factor Authentication** switch to specify whether to require users to verify their identity with MFA before they can activate their roles. They only have to verify this once per session, not every time they activate a role. There are two tips to keep in mind when you enable MFA:
65
+
Use the **Multi-Factor Authentication** switch to specify whether to require users to verify their identity with MFA before they can activate their roles. They only have to verify their identity once per session, not every time they activate a role. There are two tips to keep in mind when you enable MFA:
66
66
67
-
* Users who have Microsoft accounts for their email addresses (typically @outlook.com, but not always) cannot register for Azure MFA. If you want to assign roles to users with Microsoft accounts, you should either make them permanent admins or disable MFA for that role.
68
-
* You cannot disable MFA for highly privileged roles for Azure AD and Office365. This is a safety feature because these roles should be carefully protected:
67
+
- Users who have Microsoft accounts for their email addresses (typically @outlook.com, but not always) cannot register for Azure Multi-Factor Authentication. If you want to assign roles to users with Microsoft accounts, you should either make them permanent admins or disable multi-factor authentication for that role.
68
+
- You cannot disable Azure Multi-Factor Authentication for highly privileged roles for Azure AD and Office 365. This safety feature helps protect the following roles:
69
69
70
-
* Azure Information Protection Administrator
71
-
* Billing Administrator
72
-
* Cloud Application Administrator
73
-
* Compliance Administrator
74
-
* Conditional Access Administrator
75
-
* CRM Service Administrator
76
-
* Customer LockBox Access Approver
77
-
* Directory Writers
78
-
* Exchange Administrator
79
-
* Global Administrator
80
-
* Intune Service Administrator
81
-
* Power BI Service Administrator
82
-
* Privileged Role Administrator
83
-
* Security Administrator
84
-
* SharePoint Service Administrator
85
-
* Skype for Business Administrator
86
-
* User Administrator
87
-
88
-
For more information, see [Multi-factor authentication (MFA) and PIM](pim-how-to-require-mfa.md).
70
+
- Azure Information Protection administrator
71
+
- Billing administrator
72
+
- Cloud application administrator
73
+
- Compliance administrator
74
+
- Conditional access administrator
75
+
- Dynamics 365 administrator
76
+
- Customer LockBox access approver
77
+
- Directory writers
78
+
- Exchange administrator
79
+
- Global administrator
80
+
- Intune administrator
81
+
- Power BI administrator
82
+
- Privileged role administrator
83
+
- Security administrator
84
+
- SharePoint administrator
85
+
- Skype for Business administrator
86
+
- User administrator
87
+
88
+
For more information, see [Multi-factor authentication and Privileged Identity Management](pim-how-to-require-mfa.md).
89
89
90
90
## Require approval
91
91
92
-
If you want to require approval to activate a role, follow these steps.
92
+
If you want to delegate the required approval to activate a role, follow these steps.
93
93
94
94
1. Set the **Require approval** switch to **Enabled**. The pane expands with options to select approvers.
95
95
96
96

97
97
98
-
If you **DO NOT**specify any approvers, the Privileged Role Administrators become the default approvers. Privileged Role Administrators would be required to approve **ALL** activation requests for this role.
98
+
If you don't specify any approvers, the Privileged role administrator becomes the default approver and is then required to approve all activation requests for this role.
99
99
100
100
1. To specify approvers, click **Select approvers**.
101
101
102
102

103
103
104
-
1. Select one or more approvers and then click **Select**. You can select users or groups. At least 2 approvers is recommended. Self-approval is not allowed.
105
-
106
-
Your selections will appear in the list of selected approvers.
107
-
108
-
1. Once you have specified your all your role settings, click **Save** to save your changes.
104
+
1. Select one or more approvers in addition to the Privileged role administrator and then click **Select**. You can select users or groups. We recommend at least two approvers is. Even if you add yourself as an approver, you can't self-approve a role activation. Your selections will appear in the list of selected approvers.
109
105
106
+
1. After you have specified your all your role settings, select **Save** to save your changes.
110
107
111
108
<!--PLACEHOLDER: Need an explanation of what the temporary Global Administrator setting is for.-->
112
109
113
110
## Next steps
114
111
115
-
-[Assign Azure AD roles in PIM](pim-how-to-add-role-to-user.md)
116
-
-[Configure security alerts for Azure AD roles in PIM](pim-how-to-configure-security-alerts.md)
112
+
-[Assign Azure AD roles in Privileged Identity Management](pim-how-to-add-role-to-user.md)
113
+
-[Configure security alerts for Azure AD roles in Privileged Identity Management](pim-how-to-configure-security-alerts.md)
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/pim-how-to-complete-review.md
+20-13Lines changed: 20 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,44 +11,51 @@ ms.service: active-directory
11
11
ms.topic: conceptual
12
12
ms.workload: identity
13
13
ms.subservice: pim
14
-
ms.date: 06/06/2017
14
+
ms.date: 10/22/2019
15
15
ms.author: curtand
16
16
ms.custom: pim
17
17
ms.collection: M365-identity-device-management
18
18
---
19
-
# Complete an access review of Azure AD roles in PIM
20
-
Privileged role administrators can review privileged access once an [access review has been started](pim-how-to-start-security-review.md). Azure Active Directory (Azure AD) Privileged Identity Management (PIM) will automatically send an email prompting users to review their access. If a user did not get an email, you can send them the instructions in [how to perform an access review](pim-how-to-perform-security-review.md).
19
+
# Complete an access review of Azure AD roles in Privileged Identity Management
20
+
21
+
Privileged role administrators can review privileged access once an [access review has been started](pim-how-to-start-security-review.md). Privileged Identity Management (PIM) will automatically send an email to users in your Azure Active Directory (Azure AD) organization prompting them to review their access. If a user did not get an email, you can send them the instructions in [how to perform an access review](pim-how-to-perform-security-review.md).
21
22
22
23
After the access review period is over, or all the users have finished their self-review, follow the steps in this article to manage the review and see the results.
23
24
24
25
## Manage access reviews
25
-
1. Go to the [Azure portal](https://portal.azure.com/) and select the **Azure AD Privileged Identity Management** application on your dashboard.
26
-
2. Select the **Access reviews** section of the dashboard.
27
-
3. Select the access review that you want to manage.
28
26
29
-
On the access review's detail blade, there are a number options for managing that review.
27
+
1. Go to the [Azure portal](https://portal.azure.com/) and select the **Azure AD Privileged Identity Management** service on your dashboard.
28
+
1. Select the **Access reviews** section of the dashboard.
29
+
1. Select the access review that you want to manage.
30
+
31
+
On the access review's detail blade, there are a number of options for managing that review.
If an access review is set up so that the users review themselves, the **Remind** button sends out a notification.
36
+
37
+
If an access review is set up so that the users review themselves, the **Remind** button sends out a notification.
35
38
36
39
### Stop
40
+
37
41
All access reviews have an end date, but you can use the **Stop** button to finish it early. If any users haven't been reviewed by this time, they won't be able to after you stop the review. You cannot restart a review after it's been stopped.
38
42
39
43
### Apply
44
+
40
45
After an access review is completed, either because you reached the end date or stopped it manually, the **Apply** button implements the outcome of the review. If a user's access was denied in the review, this is the step that will remove their role assignment.
41
46
42
47
### Export
48
+
43
49
If you want to apply the results of the access review manually, you can export the review. The **Export** button will start downloading a CSV file. You can manage the results in Excel or other programs that open CSV files.
44
50
45
51
### Delete
46
-
If you are not interested in the review any further, delete it. The **Delete** button removes the review from the PIM application.
52
+
53
+
If you are not interested in the review any further, delete it. The **Delete** button removes the review from the Privileged Identity Management service.
47
54
48
55
> [!IMPORTANT]
49
-
> You will not get a warning before deletion occurs, so be sure that you want to delete that review.
56
+
> You will not be required to confirm this destructive change, so verify that you want to delete that review.
50
57
51
58
## Next steps
52
59
53
-
-[Start an access review for Azure AD roles in PIM](pim-how-to-start-security-review.md)
54
-
-[Perform an access review of my Azure AD roles in PIM](pim-how-to-perform-security-review.md)
60
+
-[Start an access review for Azure AD roles in Privileged Identity Management](pim-how-to-start-security-review.md)
61
+
-[Perform an access review of my Azure AD roles in Privileged Identity Management](pim-how-to-perform-security-review.md)
0 commit comments