Azure AD Privileged Identity Management

Azure AD Privileged Identity Management

 


Intro

Privileged Identity Management (PIM) is a service in Azure Active Directory (Azure AD) that enables you to manage, control, and monitor access to important resources in your organization.


Documentation

 


Tips and Tidbits

  • You need a Premium P2 license to use Priviledged Identity Management (PIM)

  • Privileged Identity Management (PIM) is a service in Azure Active Directory (Azure AD) that enables you to manage, control, and monitor access to important resources in your organization.

  • minimize the number of people who have access to secure information or resources.

  • give users just-in-time privileged access to Azure and Azure AD resources and can oversee what those users are doing with their privileged access.

  • Provide just-in-time (JIT) privileged access to Azure AD and Azure resources

  • Assign time-bound access to resources using start and end dates (can be used to grant temporary access to QA testers who need admin privs)

  • Require approval to activate privileged roles

  • Enforce multi-factor authentication to activate any role

  • Use justification to understand why users activate

  • Get notifications when privileged roles are activated

  • Conduct access reviews to ensure users still need roles

    • can be used for Azure AD roles,  Azure resource roles, or privileged access groups

      • Azure Resource roles can be scoped to different Azure resources

    • You can use Azure Active Directory (Azure AD) Privileged Identity Management (PIM) to create access reviews for privileged access to Azure resource and Azure AD roles.

    • You can also configure recurring access reviews that occur automatically. 

    • To create access reviews for Azure resources, you must be assigned to the Owner or the User Access Administrator role for the Azure resources.

    • To create access reviews for Azure AD roles, you must be assigned to the Global Administrator or the Privileged Role Administrator role

    • Create an access review of Azure resource and Azure AD roles in PIM

  • Download audit history for internal or external audit

  • Prevents removal of the last active Global Administrator role assignment

  • PIM can be used to identify the admin userswho have not signed-in the past 30 days

 


Multifactor authentication and Privileged Identity Management

 

  • Multifactor authentication and Privileged Identity Management

  • You can require that users (eg administrators) complete a multifactor authentication challenge when they sign in.

    • (but doesn’t use conditional access?)

  • You can also require that users complete a multifactor authentication challenge when they activate a role in Azure Active Directory (Azure AD) Privileged Identity Management (PIM).

    • This way, even if the user didn't complete multifactor authentication when they signed in, they'll be asked to do it by Privileged Identity Management.

 

Right now, Azure AD Multi-Factor Authentication only works with work or school accounts, not Microsoft personal accounts (usually a personal account that's used to sign in to Microsoft services such as Skype, Xbox, or Outlook.com). Because of this, anyone using a personal account can't be an eligible administrator because they can't use multifactor authentication to activate their roles