You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: microsoftgraph/docs-conceptual/how-to-assign-microsoft-entra-roles-in-pim.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,8 @@
2
2
title: "Assign Microsoft Entra roles in Privileged Identity Management using Microsoft Graph PowerShell"
3
3
description: "Learn how to create eligible and active role assignments in Microsoft Entra Privileged Identity Management using Microsoft Graph PowerShell"
4
4
5
-
ms.topic: tutorial
6
-
ms.date: 01/31/2024
5
+
ms.topic: how-to
6
+
ms.date: 01/28/2025
7
7
author: msewaweru
8
8
manager: CelesteDG
9
9
ms.author: eunicewaweru
@@ -12,21 +12,21 @@ ms.reviewer: mandardalvi
12
12
#customer intent: As an IT administrator using Microsoft Entra ID, I want to assign and manage admin roles in Privileged Identity Management using Microsoft Graph PowerShell, so that I can control and monitor access to privileged roles in my organization.
13
13
---
14
14
15
-
# Tutorial: Assign Microsoft Entra roles in Privileged Identity Management using Microsoft Graph PowerShell
15
+
# Assign Microsoft Entra roles in Privileged Identity Management using Microsoft Graph PowerShell
16
16
17
17
The Microsoft Entra Privileged Identity Management (PIM) service allows role administrators to make time-bound admin role assignments. Additionally, privileged role administrators can make users eligible for Microsoft Entra admin roles. An eligible administrator can activate the role when they need the role, and the permissions expire once the eligible administrator is done.
18
18
19
-
In this tutorial, you'll create, extend, activate, deactivate, and remove eligible role assignments.
19
+
In this article, you create, extend, activate, deactivate, and remove eligible role assignments.
20
20
21
21
## Prerequisites
22
22
23
-
To successfully complete this tutorial, make sure you have the required prerequisites:
23
+
To successfully complete this guide, make sure you have the required prerequisites:
24
24
25
25
1. Microsoft Graph PowerShell SDK is installed. Follow the [Install the Microsoft Graph PowerShell SDK](installation.md) guide to install the SDK.
26
26
1. To use the Microsoft Entra Privileged Identity Management, you must have one of the following licenses:
27
27
- Microsoft Entra ID P2
28
28
- Enterprise Mobility + Security (EMS) E5 license
29
-
1. Microsoft Graph PowerShell using a Privileged Role Administrator role and the appropriate permissions. For this tutorial, the `RoleManagement.ReadWrite.Directory` delegated permission is required. To set the permissions in Microsoft Graph PowerShell, run;
29
+
1. Microsoft Graph PowerShell using a [Privileged Role Administrator](/entra/identity/role-based-access-control/permissions-reference#privileged-role-administrator) role and the appropriate permissions. For this guide, the `RoleManagement.ReadWrite.Directory` delegated permission is required. To set the permissions in Microsoft Graph PowerShell, run;
@@ -36,7 +36,7 @@ To successfully complete this tutorial, make sure you have the required prerequi
36
36
37
37
## Step 1: Create a user account
38
38
39
-
In this step, you'll create a user who will be the target of the admin assignments. When you make these calls, change `contoso.onmicrosoft.com` to the ___domain name of your tenant. You can find tenant information on the Microsoft Entra overview page.
39
+
In this step, you create a user who is the target of the admin assignments. When you make these calls, change `contoso.onmicrosoft.com` to the ___domain name of your tenant. You can find tenant information on the Microsoft Entra overview page.
40
40
41
41
```powershell
42
42
$passwordProfile =@{
@@ -176,7 +176,7 @@ There are two ways to create active role assignments:
176
176
- An admin can directly create an active role assignment for a user without first creating an eligible role assignment.
177
177
- A user can activate an existing eligible role assignment.
178
178
179
-
In this step, you'll activate the eligible role assignment created in step 2. To complete this step, sign in to the terminal as the user we created in step 1.
179
+
In this step, you activate the eligible role assignment created in step 2. To complete this step, sign in to the terminal as the user we created in step 1.
0 commit comments