Configure Azure AD role settings in Privileged Identity Management
In Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra, role settings define role assignment properties: MFA and approval requirements for activation, assignment maximum duration, notification settings, and more. Use the following steps to configure role settings and set up the approval workflow to specify who can approve or deny requests to elevate privilege.
You need to have Global Administrator or Privileged Role Administrator role to manage PIM role settings for Azure AD Role. Role settings are defined per role: all assignments for the same role follow the same role settings. Role settings of one role are independent from role settings of another role.
PIM role settings are also known as “PIM Policies”.
Open role settings
Follow these steps to open the settings for an Azure AD role.
Select Azure AD Privileged Identity Management -> Azure AD Roles -> Roles. On this page you can see list of Azure AD roles available in the tenant, including built-in and custom roles.
Select the role whose settings you want to configure.
Select Role settings. On the Role settings page you can view current PIM role settings for the selected role.
Select Edit to update role settings.
Once finished, select Update.
Role settings
Activation maximum duration
Use the Activation maximum duration slider to set the maximum time, in hours, that an activation request for a role assignment remains active before it expires. This value can be from one to 24 hours.
On activation, require multi-factor authentication
You can require users who are eligible for a role to prove who they are using Azure AD Multi-Factor Authentication before they can activate. Multi-factor authentication helps safeguard access to data and applications, providing another layer of security by using a second form of authentication.
Note
User may not be prompted for multi-factor authentication if they authenticated with strong credentials, or provided multi-factor authentication earlier in this session. If your goal is to ensure that users have to provide authentication during activation, you can use On activation, require Azure AD Conditional Access authentication context together with Authentication Strengths to require users to authenticate during activation using methods different from the one they used to sign-in to the machine. For example, if users sign-in to the machine using Windows Hello for Business, you can use “On activation, require Azure AD Conditional Access authentication context” and Authentication Strengths to require users to do Passwordless sign-in with Microsoft Authenticator when they activate the role. After the user provides Passwordless sign-in with Microsoft Authenticator once in this example, they'll be able to do their next activation in this session without additional authentication because Passwordless sign-in with Microsoft Authenticator will already be part of their token.
It's recommended to enable Azure AD Multi-Factor Authentication for all users. For more information, see Plan an Azure Active Directory Multi-Factor Authentication deployment.
On activation, require Azure AD Conditional Access authentication context (Public Preview)
You can require users who are eligible for a role to satisfy Conditional Access policy requirements: use specific authentication method enforced through Authentication Strengths, elevate the role from Intune compliant device, comply with Terms of Use, and more.
To enforce this requirement, you need to:
Create Conditional Access authentication context.
Configure Conditional Access policy that would enforce requirements for this authentication context.
Note
The scope of the Conditional Access policy should include all or eligible users for a role. Do not create a Conditional Access policy scoped to authentication context and directory role at the same time because during activation the user does not have a role yet, and the Conditional Access policy would not apply. See the note at the end of this section about a situation when you may need two Conditional Access policies, one scoped to the authentication context, and another scoped to the role.
Configure authentication context in PIM settings for the role.
Note
If PIM settings have “On activation, require Azure AD Conditional Access authentication context” configured, the Conditional Access policies define conditions a user needs to meet to satisfy the access requirements. This means that security principals with permissions to manage Conditional Access policies such as Conditional Access Administrators or Security Administrators may change requirements, remove them, or block eligible users from activating the role. Security principals that can manage the Conditional Access policies should be considered highly privileged and protected accordingly.
Note
We recommend creating and enabling a Conditional Access policy for the authentication context before authentication context is configured in PIM settings. As a backup protection mechanism, if there are no Conditional Access policies in the tenant that target authentication context configured in PIM settings, during PIM role activation, Azure AD Multi-Factor Authentication is required as the On activation, require multi-factor authentication setting would be set. This backup protection mechanism is designed to solely protect from a scenario when PIM settings were updated before the Conditional Access policy is created, due to a configuration mistake. This backup protection mechanism won't be triggered if the Conditional Access policy is turned off, in report-only mode, or has eligible user excluded from the policy.
Note
“On activation, require Azure AD Conditional Access authentication context” setting defines authentication context, requirements for which the user will need to satisfy when they activate the role. After the role is activated, this does not prevent users from using another browsing session, device, location, etc. to use permissions. For example, users may use an Intune compliant device to activate the role, then after the role is activated sign-in to the same user account from another device that is not Intune compliant, and use the previously activated role from there. To protect from this situation, create two Conditional Access policies:
- The first Conditional Access policy targeted to authentication context. It should have “All users” or eligible users in its scope. This policy will specify requirements the user needs to meet to activate the role.
- The second Conditional Access policy targeted to directory roles. This policy will specify requirements users need to meet to sign-in with directory role activated.
Both policies can enforce the same, or different, requirements depending on your needs.
Another option is to scope Conditional Access policies enforcing certain requirements to eligible users directly. For example you can require users eligible for certain roles to always use Intune compliant devices.
To learn more about Conditional Access authentication context, see Conditional Access: Cloud apps, actions, and authentication context.
Require justification on activation
You can require users to enter a business justification when they activate the eligible assignment.
Require ticket information on activation
You can require users to enter a support ticket number when they activate the eligible assignment. This is information-only field and correlation with information in any ticketing system is not enforced.
Require approval to activate
You can require approval for activation of eligible assignment. Approver doesn’t have to have any roles. When using this option, you have to select at least one approver (we recommend to select at least two approvers), there are no default approvers.
To learn more about approvals, see Approve or deny requests for Azure AD roles in Privileged Identity Management.
Assignment duration
You can choose from two assignment duration options for each assignment type (eligible and active) when you configure settings for a role. These options become the default maximum duration when a user is assigned to the role in Privileged Identity Management.
You can choose one of these eligible assignment duration options:
Setting | Description |
---|---|
Allow permanent eligible assignment | Resource administrators can assign permanent eligible assignment. |
Expire eligible assignment after | Resource administrators can require that all eligible assignments have a specified start and end date. |
And, you can choose one of these active assignment duration options:
Setting | Description |
---|---|
Allow permanent active assignment | Resource administrators can assign permanent active assignment. |
Expire active assignment after | Resource administrators can require that all active assignments have a specified start and end date. |
Note
All assignments that have a specified end date can be renewed by Global admins and Privileged role admins. Also, users can initiate self-service requests to extend or renew role assignments.
Require multi-factor authentication on active assignment
You can require that administrator provides multi-factor authentication when they create an active (as opposed to eligible) assignment. Privileged Identity Management can't enforce multi-factor authentication when the user uses their role assignment because they are already active in the role from the time that it is assigned.
Administrator may not be prompted for multi-factor authentication if they authenticated with strong credential or provided multi-factor authentication earlier in this session.
Require justification on active assignment
You can require that users enter a business justification when they create an active (as opposed to eligible) assignment.
In the Notifications tab on the role settings page, Privileged Identity Management enables granular control over who receives notifications and which notifications they receive.
- Turning off an email You can turn off specific emails by clearing the default recipient check box and deleting any other recipients.
- Limit emails to specified email addresses You can turn off emails sent to default recipients by clearing the default recipient check box. You can then add other email addresses as recipients. If you want to add more than one email address, separate them using a semicolon (;).
- Send emails to both default recipients and more recipients You can send emails to both default recipient and another recipient by selecting the default recipient checkbox and adding email addresses for other recipients.
- Critical emails only For each type of email, you can select the check box to receive critical emails only. What this means is that Privileged Identity Management will continue to send emails to the specified recipients only when the email requires an immediate action. For example, emails asking users to extend their role assignment will not be triggered while emails requiring admins to approve an extension request will be triggered.
Manage role settings using Microsoft Graph
To manage settings for Azure AD roles using PIM APIs in Microsoft Graph, use the unifiedRoleManagementPolicy resource type and related methods.
In Microsoft Graph, role settings are referred to as rules and they're assigned to Azure AD roles through container policies. Each Azure AD role is assigned a specific policy object. You can retrieve all policies that are scoped to Azure AD roles and for each policy, retrieve the associated collection of rules by using an $expand
query parameter. The syntax for the request is as follows:
GET https://graph.microsoft.com/v1.0/policies/roleManagementPolicies?$filter=scopeId eq '/' and scopeType eq 'DirectoryRole'&$expand=rules
For more information about managing role settings through PIM APIs in Microsoft Graph, see Role settings and PIM. For examples of updating rules, see Update rules in PIM using Microsoft Graph.
Next steps
Feedback
Submit and view feedback for