Skip to content

Commit 9cc9f1f

Browse files
Merge pull request #638 from msewaweru/freshness-assign-roles-PIM
Freshness: Assign Microsoft Entra roles in PIM
2 parents 6150fdf + f76d74a commit 9cc9f1f

File tree

4 files changed

+15
-10
lines changed

4 files changed

+15
-10
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,11 @@
44
"source_path": "microsoftgraph/graph-powershell-1.0/Microsoft.Graph.Calendar/Get-MgPlace.md",
55
"redirect_url": "https://learn.microsoft.com/en-us/powershell/microsoftgraph/?view=graph-powershell-1.0",
66
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "microsoftgraph/docs-conceptual/tutorial-pim.md",
10+
"redirect_url": "https://learn.microsoft.com/powershell/microsoftgraph/how-to-assign-microsoft-entra-roles-in-pim",
11+
"redirect_document_id": false
712
}
813
]
914
}

microsoftgraph/docs-conceptual/tutorial-pim.md renamed to microsoftgraph/docs-conceptual/how-to-assign-microsoft-entra-roles-in-pim.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: "Assign Microsoft Entra roles in Privileged Identity Management using Microsoft Graph PowerShell"
33
description: "Learn how to create eligible and active role assignments in Microsoft Entra Privileged Identity Management using Microsoft Graph PowerShell"
44

5-
ms.topic: tutorial
6-
ms.date: 01/31/2024
5+
ms.topic: how-to
6+
ms.date: 01/28/2025
77
author: msewaweru
88
manager: CelesteDG
99
ms.author: eunicewaweru
@@ -12,21 +12,21 @@ ms.reviewer: mandardalvi
1212
#customer intent: As an IT administrator using Microsoft Entra ID, I want to assign and manage admin roles in Privileged Identity Management using Microsoft Graph PowerShell, so that I can control and monitor access to privileged roles in my organization.
1313
---
1414

15-
# Tutorial: Assign Microsoft Entra roles in Privileged Identity Management using Microsoft Graph PowerShell
15+
# Assign Microsoft Entra roles in Privileged Identity Management using Microsoft Graph PowerShell
1616

1717
The Microsoft Entra Privileged Identity Management (PIM) service allows role administrators to make time-bound admin role assignments. Additionally, privileged role administrators can make users eligible for Microsoft Entra admin roles. An eligible administrator can activate the role when they need the role, and the permissions expire once the eligible administrator is done.
1818

19-
In this tutorial, you'll create, extend, activate, deactivate, and remove eligible role assignments.
19+
In this article, you create, extend, activate, deactivate, and remove eligible role assignments.
2020

2121
## Prerequisites
2222

23-
To successfully complete this tutorial, make sure you have the required prerequisites:
23+
To successfully complete this guide, make sure you have the required prerequisites:
2424

2525
1. Microsoft Graph PowerShell SDK is installed. Follow the [Install the Microsoft Graph PowerShell SDK](installation.md) guide to install the SDK.
2626
1. To use the Microsoft Entra Privileged Identity Management, you must have one of the following licenses:
2727
- Microsoft Entra ID P2
2828
- Enterprise Mobility + Security (EMS) E5 license
29-
1. Microsoft Graph PowerShell using a Privileged Role Administrator role and the appropriate permissions. For this tutorial, the `RoleManagement.ReadWrite.Directory` delegated permission is required. To set the permissions in Microsoft Graph PowerShell, run;
29+
1. Microsoft Graph PowerShell using a [Privileged Role Administrator](/entra/identity/role-based-access-control/permissions-reference#privileged-role-administrator) role and the appropriate permissions. For this guide, the `RoleManagement.ReadWrite.Directory` delegated permission is required. To set the permissions in Microsoft Graph PowerShell, run;
3030

3131
```powershell
3232
Connect-MgGraph -Scopes "RoleManagement.ReadWrite.Directory"
@@ -36,7 +36,7 @@ To successfully complete this tutorial, make sure you have the required prerequi
3636
3737
## Step 1: Create a user account
3838
39-
In this step, you'll create a user who will be the target of the admin assignments. When you make these calls, change `contoso.onmicrosoft.com` to the ___domain name of your tenant. You can find tenant information on the Microsoft Entra overview page.
39+
In this step, you create a user who is the target of the admin assignments. When you make these calls, change `contoso.onmicrosoft.com` to the ___domain name of your tenant. You can find tenant information on the Microsoft Entra overview page.
4040
4141
```powershell
4242
$passwordProfile =@{
@@ -176,7 +176,7 @@ There are two ways to create active role assignments:
176176
- An admin can directly create an active role assignment for a user without first creating an eligible role assignment.
177177
- A user can activate an existing eligible role assignment.
178178

179-
In this step, you'll activate the eligible role assignment created in step 2. To complete this step, sign in to the terminal as the user we created in step 1.
179+
In this step, you activate the eligible role assignment created in step 2. To complete this step, sign in to the terminal as the user we created in step 1.
180180

181181
```powershell
182182
$params = @{

microsoftgraph/docs-conceptual/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ landingContent:
6262
- text: Manage access to resources
6363
url: tutorial-entitlement-management.md
6464
- text: Assign Microsoft Entra roles in PIM
65-
url: tutorial-pim.md
65+
url: how-to-assign-microsoft-entra-roles-in-pim.md
6666
- text: Manage PIM policies
6767
url: how-to-manage-pim-policies.md
6868
- text: Grant and revoke delegated permissions

microsoftgraph/docs-conceptual/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
- name: Privileged Identity Management (PIM)
2626
items:
2727
- name: Assign Microsoft Entra roles in PIM
28-
href: tutorial-pim.md
28+
href: how-to-assign-microsoft-entra-roles-in-pim.md
2929
- name: Manage PIM policies
3030
href: how-to-manage-pim-policies.md
3131
- name: Grant API permissions

0 commit comments

Comments
 (0)