Configure Azure resource role settings in Privileged Identity Management
When you configure Azure resource role settings, you define the default settings that are applied to Azure role assignments in Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra. Use the following procedures to configure the approval workflow and specify who can approve or deny requests.
Open role settings
Follow these steps to open the settings for an Azure resource role.
Open Azure AD Privileged Identity Management.
Select Azure resources.
Approver doesn't have to have any Azure or Azure AD role assigned.
Select the resource you want to manage, such as a subscription or management group.
Select the role whose settings you want to configure.
Select Edit to open the Edit role setting pane. The first tab allows you to update the configuration for role activation in Privileged Identity Management.
Select the Assignment tab or the Next: Assignment button at the bottom of the page to open the assignment setting tab. These settings control role assignments made inside the Privileged Identity Management interface.
Use the Notification tab or the Next: Activation button at the bottom of the page to get to the notification setting tab for this role. These settings control all the email notifications related to this role.
In the Notifications tab on the role settings page, Privileged Identity Management enables granular control over who receives notifications and which notifications they receive.
Turning off an email
You can turn off specific emails by clearing the default recipient check box and deleting any additional recipients.
Limit emails to specified email addresses
You can turn off emails sent to default recipients by clearing the default recipient checkbox. You can then add additional email addresses as additional recipients. If you want to add more than one email address, separate them using a semicolon (;).
Send emails to both default recipients and additional recipients
You can send emails to both default recipient and additional recipient by selecting the default recipient checkbox and adding email addresses for additional recipients.
Critical emails only
For each type of email, you can select the checkbox to receive critical emails only. What this means is that Privileged Identity Management will continue to send emails to the configured recipients only when the email requires an immediate action. For example, emails asking users to extend their role assignment will not be triggered while an emails requiring admins to approve an extension request will be triggered.
Select the Update button at any time to update the role settings.
You can choose from two assignment duration options for each assignment type (eligible and active) when you configure settings for a role. These options become the default maximum duration when a user is assigned to the role in Privileged Identity Management.
You can choose one of these eligible assignment duration options:
|Allow permanent eligible assignment||Resource administrators can assign permanent eligible assignment.|
|Expire eligible assignment after||Resource administrators can require that all eligible assignments have a specified start and end date.|
And, you can choose one of these active assignment duration options:
|Allow permanent active assignment||Resource administrators can assign permanent active assignment.|
|Expire active assignment after||Resource administrators can require that all active assignments have a specified start and end date.|
All assignments that have a specified end date can be renewed by resource administrators. Also, users can initiate self-service requests to extend or renew role assignments.
Require multifactor authentication
Privileged Identity Management provides optional enforcement of Azure AD Multi-Factor Authentication for two distinct scenarios.
On active assignment
This option requires admins must complete a multifactor authentication before creating an active (as opposed to eligible) role assignment. Privileged Identity Management can't enforce multifactor authentication when the user activates their role assignment because the user is already active in the role from the time that it is assigned.
To require multifactor authentication when creating an active role assignment, you can enforce multifactor authentication on active assignment by checking the Require Multi-Factor Authentication on active assignment box.
You can require users who are eligible for a role to prove who they are using Azure AD Multi-Factor Authentication before they can activate. Multifactor authentication ensures that the user is who they say they are with reasonable certainty. Enforcing this option protects critical resources in situations when the user account might have been compromised.
To require multifactor authentication before activation, check the Require Multi-Factor Authentication on activation box.
For more information, see Multifactor authentication and Privileged Identity Management.
Activation maximum duration
Use the Activation maximum duration slider to set the maximum time, in hours, that an activation request for a role assignment remains active before it expires. This value can be from one to 24 hours.
You can require that users enter a business justification when they activate. To require justification, check the Require justification on active assignment box or the Require justification on activation box.
Require approval to activate
If you want to require approval to activate a role, follow these steps.
Check the Require approval to activate check box.
Select Select approvers to open the Select a member or group page.
Select at least one user or group and then click Select. You can add any combination of users and groups. You must select at least one approver. There are no default approvers.
Your selections will appear in the list of selected approvers.
Once you have specified your all your role settings, select Update to save your changes.
Submit and view feedback for