Privileged Identity Management
PIM:
Privileged identity management is a
service that enables us to manage, control and monitor access to important
resources in the organization. These resources include resources like Entra ID,
Azure and other online services like M365 or Intune.
Privileged Identity Management provides time-based
and approval-based role activation to mitigate the risks of excessive,
unnecessary, or misused access permissions on resources that you care about.
· Provide just-in-time privileged
access to Microsoft Entra ID and Azure resources
· Assign time-bound access
to resources using start and end dates
· Require approval to
activate privileged roles
· Enforce multi-factor
authentication to activate any role
· Use justification to
understand why users activate
· Get notifications when
privileged roles are activated
· Conduct access
reviews to ensure users still need roles
· Download audit
history for internal or external audit
· Prevents removal of
the last active Global Administrator and Privileged
Role Administrator role assignments
P2 licence is required to access PIM.
Only Privileged Role Administrator or Global Administrator role can manage assignments
for other administrators. Global Administrators, Security Administrators,
Global Readers, and Security Readers can also view assignments.
What can you manage in PIM
Today, you can use PIM with:
Microsoft Entra roles – Sometimes referred
to as directory roles, Microsoft Entra roles include built-in and custom roles
to manage Microsoft Entra ID and other Microsoft 365 online services.
Azure roles – The role-based access control (RBAC) roles in Azure
that grants access to management groups, subscriptions, resource groups, and
resources.
PIM for Groups – To set up just-in-time access to member and owner
role of a Microsoft Entra security group. PIM foar Groups not only gives you an
alternative way to set up PIM for Microsoft Entra roles and Azure roles, but
also allows you to set up PIM for other permissions across Microsoft online
services like Intune, Azure Key Vaults, and Azure Information Protection. If
the group is configured for app provisioning, activation of group membership
triggers provisioning of group membership (and the user account, if it wasn’t
provisioned) to the application using the System for Cross-Domain Identity
Management (SCIM) protocol.
You can assign the following to these roles or
groups:
Users- To get just-in-time access to Microsoft Entra
roles, Azure roles, and PIM for Groups.
Groups- Anyone in a group to get just-in-time access to
Microsoft Entra roles and Azure roles. For Microsoft Entra roles, the group
must be a newly created cloud group that’s marked as assignable to a role while
for Azure roles, the group can be any Microsoft Entra security group. We don't
recommend assigning/nesting a group to a PIM for Groups.
PIM role assignments give you a secure way to grant
access to resources in your organization.
Below are major tasks which can be done using PIM:
1. Assign roles to
members (role assignment)
a. Eligible assignments - require
the member of the role to perform an action to use the role.
b. Active assignments - don't
require the member to perform any action to use the role.
2. Activate
Assignments
3. Approve or deny
requests
4. Extend and
renew assignment
For easy to understand below are the use cases for
PIM.
➢ A permanent role
assignment to USERA for the Security Administrator role.
➢ Configure
the USERA user to be eligible for the Billing Administrator and Global Reader
roles.
➢ Configure
the Global Reader role activation to require approval of the GLOBAL ADMIN user
➢ Configure
an access review of the Global Reader role and review auditing capabilities
Privileged Identity Management documentation | Microsoft
Learn
Comments
Post a Comment