PIM Roles
Privileged Identity Management (PIM) enables just-in-time privileged access to Azure AD and Azure resources. Admins request temporary elevation rather than having permanent privileged access.
Warning: PIM is an Azure AD Premium P2 feature. Eligible users need P2 licenses assigned to request role activation.
PIM Overview
- 18 — Roles Configured
- 45 — Eligible Assignments
- 7 — Active Now
- 3 — Pending Approval
Assignment Types
Eligible
User can request activation of the role when needed. Role is not active until user explicitly activates it. Best for privileged roles.
- Must request activation
- May require approval
- Time-limited activation
- Audit trail of activations
Active
Role is always active for the assigned user. Use sparingly for break-glass accounts or service principals.
- Always has permissions
- No activation needed
- Can be time-bound
- Use for emergencies only
Role Settings
Configure PIM settings for each role:
Activation Maximum Duration
How long a role stays active after activation (1-24 hours). Shorter durations are more secure.
Require Justification
User must provide reason for activation. Creates audit trail explaining why access was needed.
Require Ticket Information
Require ticket number from ITSM system. Links activation to documented change request.
Require Approval
Designated approvers must approve activation request before role becomes active.
Require MFA
User must complete MFA challenge when activating. Prevents activation from compromised sessions.
Notifications
Send email notifications on assignment, activation, and approval. Keep stakeholders informed of privileged access.
Activation Workflow
- Request Activation — User selects role and provides justification and duration.
- Complete MFA — If required, user completes multi-factor authentication.
- Approval (if required) — Approvers receive notification and approve or deny request.
- Role Activated — User has role permissions for the requested duration.
- Auto-Deactivation — Role automatically deactivates when duration expires.
Recommended PIM Configuration
Global Administrator (Critical)
- Max duration: 2 hours
- Require approval: Yes
- Require MFA: Yes
- Require justification: Yes
- Require ticket: Yes
Exchange Administrator (High)
- Max duration: 8 hours
- Require approval: No
- Require MFA: Yes
- Require justification: Yes
Helpdesk Administrator (Standard)
- Max duration: 8 hours
- Require approval: No
- Require MFA: Yes
- Require justification: Optional
Access Reviews
Regularly review PIM assignments to ensure they’re still needed:
- Schedule recurring reviews (monthly, quarterly)
- Reviewer verifies each assignment is still required
- Auto-remove assignments not confirmed
- Require justification for continued access
Audit & Reporting
Track all PIM activity:
- Role activations with timestamps and duration
- Approval actions (approved, denied, timed out)
- Assignment changes (added, removed, expired)
- Setting changes
- Export to SIEM for correlation
API Reference
GET /api/security/pim/roles— List PIM-enabled rolesGET /api/security/pim/roles/:roleId/assignments— List role assignmentsPOST /api/security/pim/roles/:roleId/activate— Activate role for userGET /api/security/pim/pending-approvals— List pending approval requestsPOST /api/security/pim/approvals/:id— Approve or deny request