Lab 26: Configure Privileged Identity Management for Microsoft Entra roles
Login type = Microsoft 365 admin
Lab scenario
A Privileged role administrator can customize Privileged Identity Management (PIM) in their Microsoft Entra organization, including changing the experience for a user who is activating an eligible role assignment. You must become familiar with configuring PIM.
Estimated time: 30 minutes
NOTE - There have been on-going changes to requiring MFA in lab environments. When you switch between users to complete this lab, you may be prompted to set up MFA.
Exercise 1 - Configure Microsoft Entra role settings
Task 1 - Open role settings
Follow these steps to open the settings for an Microsoft Entra role.
-
Sign in to the https://entra.microsoft.com as a Global administrator.
-
Search for and then select Privileged Identity Management.
-
In the Privileged Identity Management page, in the left navigation, select Microsoft Entra roles.
-
On the Quick start page, in the left navigation, select Settings.
-
Review the list of roles and then, in the Search by role name, enter compliance.
-
In the results, select Compliance Administrator.
-
Review the role setting details information.
Task 2 - Require approval to activate
If setting multiple approvers, approval completes as soon as one of them approves or denies. You cannot require approval from at least two users. To require approval to activate a role, follow these steps.
-
In the Role setting details page, on the top menu, select Edit.
-
In the Edit role setting – Compliance Administrator page, select the Require approval to activate check box.
-
Select Select approvers.
-
In the Select a member pane, select your administrator account and then select Select.
-
Once you have configured the role settings, select Update to save your changes.
Exercise 2 - Use PIM to assign Microsoft Entra roles
Task 1 - Assign a role
With Microsoft Entra ID, a Global administrator can make permanent Microsoft Entra admin role assignments. These role assignments can be created using the Microsoft Entra admin center, the Azure portal, or using PowerShell commands.
The Privileged Identity Management (PIM) service also allows Privileged role administrators to make permanent admin role assignments. Additionally, Privileged role administrators can make users eligible for Microsoft Entra admin roles. An eligible administrator can activate the role when they need it, and then their permissions expire once they’re done.
Follow these steps to make a user eligible for an Microsoft Entra admin role.
-
Sign in to https://entra.microsoft.com using a Global Administrator account.
-
Search for and then select Privileged Identity Management.
Note - you can find it in the menu at Identity - Identity Governance - Privileged Identity Management.
-
In the Privileged Identity Management page, in the left navigation, select Microsoft Entra roles.
-
On the Quick start page, in the left navigation, select Roles.
-
On the top menu, select + Add assignments.
-
In the Add assignments page, on the Membership tab, review the settings.
-
Select the Select role menu and then select Compliance Administrator.
-
You can use the Search role by name filter to help located a role.
-
Under Select member(s), select No members selected.
-
In the Select a member pane, select Miriam Graham and then select Select.
-
In the Add assignments page, select Next.
-
On the Settings tab, under Assignment type, review the available options. For this task, use the default setting.
- Eligible assignments require the member of the role to perform an action to use the role. Actions might include performing a multi-factor authentication (MFA) check, providing a business justification, or requesting approval from designated approvers.
- Active assignments do not require the member to perform any action to use the role. Members assigned as active have the privileges always assigned to the role.
-
Review the remaining settings and then select Assign.
Task 2 - Log in with Miriam
- Open a new InPrivate browser window.
- Connect to the Microsoft Entra admin center (https://entra.microsoft.com). Note - If it opens with a user logged in, Select on their name in the upper-right corner and select Sign in as a different account.
-
Log in a Miriam.
Field Value Username MiriamG@ <<your domain.onmicrosoft.com>>
Password Enter the tenant’s admin password(Refer the Lab Resources tab to retrieve the tenant admin password) - From the Identity menu, open Users and then select All users.
- Find Miriam in the list of users
- On the Overview page, look for the Assigned roles.
- Select Eligible assignments.
- Notice that the Compliance Administrator role is now available to Miriam.
Task 3 - Activate your Microsoft Entra roles
When you need to assume an Microsoft Entra role, you can request activation by opening My roles in Privileged Identity Management.
- From the Search, resources, services, and docs bar, look for Privileged.
- Open the Privileged Identity Management page.
-
On the Privileged Identity Management page, in the left navigation menu, select My roles.
-
In the My roles page, review the list of Eligible assignments.
-
In the Compliance Administrator role row, select Activate.
-
In the Activate – Compliance Administrator pane, select Additional verification required and then follow the instructions to provide additional security verification. You are required to authenticate only once per session.
Verification - Based on our current lab environment configuration, you will be required configure MFA and log in successfully.
-
After you have completed the additional security verification, in the Activate – Compliance Administrator pane, in the Reason box, enter the This is my justification for activating this role.
Important Note - the principal of least prvilege, you should only activate the account for the amount of time you need it. If the work needed to be done, only takes 1.5 hours, then set the duration to two hours. Similarily, if you know that you won’t be able to do the work until after 3pm, choose a Custom activation time.
- Select Activate.
Task 4 - Assign a role with restricted scope
For certain roles, the scope of the granted permissions can be restricted to a single admin unit, service principal, or application. This procedure is an example if assigning a role that has the scope of an administrative unit.
- Remember to close out the browser windows for MiriamG, then open the Microsoft Entra admin center with your administrator account.
- Browse to the Privileged Identity Management page, and in the left navigation menu, select Azure Microsoft Entra roles.
- Select Roles.
-
In the Roles page, on the top menu, select + Add assignments.
-
In the Add assignments page, select the Select role menu and then select User administrator.
-
Select the Scope type menu and review the available options. For now, you will use the Directory scope type.
Tip - Go to https://docs.microsoft.com/en-us/azure/active-directory/roles/admin-units-manage for more information about the administrative unit scope type.
- As you did when assigning a role without a restricted scope, you would add members and complete the settings options. For now, select Cancel.
Task 5 - Update or remove an existing role assignment
Follow these steps to update or remove an existing role assignment.
-
In the Open Privileged Identity Management > Microsoft Entra roles page, in the left navigation, select Assignments.
-
In Assignments list, for Compliance Administrator, review the options in the Action column.
-
Select Update and review the options available in the Membership settings pane. When complete, close the pane.
-
Select Remove.
-
In the Remove dialog box, review the information and then select Yes.