Manage access to Azure resources with Azure AD Privileged Identity Management
To protect privileged accounts from malicious cyber-attacks, you can use Azure Active Directory Privileged Identity Management (PIM) to lower the exposure time of privileges and increase your visibility into their use through reports and alerts. PIM does this by limiting users to only taking on their privileges "just in time" (JIT), or by assigning privileges for a shortened duration after which privileges are revoked automatically.
You can now use PIM with Azure role-based access control (RBAC) to manage, control, and monitor access to Azure resources. PIM can manage the membership of built-in and custom roles to help you:
- Enable on-demand, "just in time" access to Azure resources
- Expire resource access automatically for assigned users and groups
- Assign temporary access to Azure resources for quick tasks or on-call schedules
- Get alerts when new users or groups are assigned resource access, and when they activate eligible assignments
For more information, see What is Azure AD Privileged Identity Management?.
We'd love to hear your thoughts. Choose the type you'd like to provide:
Our feedback system is built on GitHub Issues. Read more on our blog.