Configure Privileged Identity Management for Azure resources
Using Azure AD PIM, you can improve the protection of your Azure resources. This is helpful to:
- Organizations that already use PIM to protect Azure AD roles.
- Management group and subscription owners who are trying to secure production resources.
When you first set up PIM for Azure resources, you need to discover and select the resources to protect with PIM. There's no limit to the number of resources that you can manage with PIM. However, we recommend starting with your most critical production resources.
Sign in to the Azure portal.
Open Azure AD Privileged Identity Management.
Select Azure resources.If this is your first time using PIM for Azure resources, you'll see a Discover resources page.
If another administrator in your organization is already managing Azure resources in PIM, you'll see a list of the resources that are currently being managed.
Select Discover resources to launch the discovery experience.
On the Discovery page, use Resource state filter and Select resource type to filter the management groups or subscriptions you have write permission to. It's probably easiest to start with All initially. You can search for and select management group or subscription resources to manage in PIM. When you manage a management group or a subscription in PIM, you can also manage its child resources.
When you add a new child Azure resource to a PIM-managed management group, you can bring the child resource under management by searching for it in PIM.
Select any unmanaged resources that you want to manage.
Select Manage resource to start managing the selected resources.
If you see a message to confirm the onboarding of the selected resource for management, select Yes
Need help? See our troubleshooting guide or provide specific feedback by reporting an issue.