Lab 01 Pim
Lab 01 Pim
Scenario
In this lab, you’ll learn how to use Azure Privileged Identity Management (PIM) to enable
just-in-time administration and control the number of users who can perform privileged
operations. You’ll also learn about the different directory roles available as well as newer
functionality that includes PIM being expanded to role assignments at the resource level.
Lessons include:
• Getting Started with PIM
• PIM Security Wizard
• PIM for Directory Roles
• PIM for Role Resources
The Managing Identities course also covers Azure RBAC and Azure Active Directory. This
content has been included here also to provide more context and foundation for the
remainder of the course.
Connect-AzureAD
Note: If you close your Cloud Shell session you may be required to enter this command
again throughout the labs.
3. Run the following PowerShell Commands to create an AD user and password in your
default domain
$PasswordProfile.Password = "Pa55w.rd"
$domainObj = get-azureaddomain
$domain = $domainObj[0].name
New-AzureADUser -DisplayName "Isabella Simonsen" -PasswordProfile
$PasswordProfile -UserPrincipalName "Isabella@$domain" -
AccountEnabled $true -MailNickName "Isabella" -UsageLocation "US"
Screenshot
7. Click the drop down arrow and select Activate on the Azure AD Premium P2
product.
Screenshot
You may need to log out of the Azure portal and log in again for this to refresh
Task 3: Discover resources
1. In the Azure Portal, click All services and search for and select Azure AD Privileged
Identity Management.
Screenshot
2. Click Azure resources.
Screenshot
3. Click Discover resources to launch the discovery experience.
Screenshot
4. On the Discovery pane, use Resource state filter and Select resource type to filter
the management groups or subscriptions you have write permission to. It’s probably
easiest to start with All initially.
Screenshot
5. Add a checkmark next to your Azure subscription.
Screenshot
6. Click Manage resource to start managing the selected resources.
Screenshot
7. Click Yes when prompted.
Note: You can only search for and select management group or subscription resources
to manage using PIM. When you manage a management group or a subscription in
PIM, you can also manage its child resources.
2. In the Azure Portal, click All services and search for and select Azure AD Privileged
Identity Management.
Screenshot
3. Select Azure AD Roles.
Screenshot
4. Click Roles.
Screenshot
5. Click Add assignments to open Add managed members.
Screenshot
6. Click the Select role dropdown and select Billing Administrator.
Screenshot
7. Click No member selected, select Isabella and then click Select.
Screenshot
8. On the Add assignments blade, click Next.
Screenshot
12. When the role is assigned, the user you selected will appear in the members list as
Eligible for the role.
2. In the Azure Portal, click All services and search for and select Azure AD Privileged
Identity Management.
Screenshot
3. Click Azure AD roles.
Screenshot
4. On the Quick start blade click Activate your role.
Screenshot
5. On the Billing Administrator role, scroll to the right and click Activate.
Screenshot
6. Click Additional verification required. Click to continue. You only have to
authenticate once per session. Run through the wizard to authenticate Isabella.
Screenshot
7. Once returned to the Azure Portal, enter an activation reason and click Activate.
Screenshot
By default, roles do not require approval unless configured explicitly in settings.
If the role does not require approval, it is activated and added to the list of active roles. If
you want to use the role right away, follow the steps in the next section.
If the role requires approval to activate, a notification will appear in the upper right corner
of your browser informing you the request is pending approval.
Task 2: Use a role immediately after activation
When you activate a role in PIM, it can take up to 10 minutes before you can access the
desired administrative portal or perform functions within a specific administrative
workload. To force an update of your permissions, use the Application access page as
described in the following steps.
1. Click Sign Out.
Screenshot
2. Log back in as Isabella.
Screenshot
4. Click Active roles to see your list of active roles.
Screenshot
5. Find the role you’re done using and then click Deactivate.
Screenshot
6. Click Deactivate again.
Screenshot
4. For the role that you want to cancel, click the Cancel button.
Note: The cancel button in this task is greyed out as the request was approved.
When you click Cancel, the request will be cancelled. To activate the role again, you will
have to submit a new request for activation.
2. From the PIM application main page click Azure AD Roles under the Manage section
click Access reviews and click > New.
Screenshot
3. Enter the following details and click Start:
Screenshot
3. Since you created the review, you appear as the only user in the review. Select the
check mark next to your name.
Screenshot
4. Close the Review Azure AD roles blade.
Screenshot
Screenshot
4. Click an alert name to see the settings for the preconfigured alerts.
6. Scroll down and select Require Approval and select your account as the approver
then click Select.
7. On the Edit role setting – Global Administrator blade, click Update.
Screenshot
Screenshot
4. Select Global Administrator and click + Add assignments.
8. Select My Roles.
Screenshot
9. Activate the Global Administrator Role.
Screenshot
10. Verify Isabella’s identity using the wizard.
Screenshot
11. Once you are returned to the Activate - Global Administrator blade, enter the
justification I need to carry out some administrative tasks and click Activate.
Screenshot
Screenshot
Note: You may need to refresh your browser to see the request.
4. Click the request from Isabella and enter the justification Granted for this task and
click Approve.
Screenshot
5. Switch back to the In Private Browsing session where Isabella is signed in and click My
Roles and click the Active roles tab. Note the status.
Screenshot
Depending on your audit history, a column chart is displayed along with the total
activations, max activations per day, and average activations per day.
At the bottom of the page, a table is displayed with information about each action in
the available audit history. The columns have the following meanings:
Column Description
Time When the action occurred.
Requestor User who requested the role activation
or change. If the value is Azure
System, check the Azure audit history
for more information.
Action Actions taken by the requestor.
Actions can include Assign, Unassign,
Activate, Deactivate, or
AddedOutsidePIM.
Member User who is activating or assigned to a
role.
Role Role assigned or activated by the user.
Reasoning Text that was entered into the reason
field during activation.
Expiration When an activated role expires.
Applies only to eligible role
assignments.
5. To sort the audit history, click the Time, Action, and Role buttons.