Users assigned highly privileged roles shall not have permanent permissions
Description
Do not assign users to highly privileged roles using permanent active role assignments. Instead, assign users to eligible role assignments in a PAM/PIM system and provide an expiration period for active assignments requiring privileged users to reactivate their highly privileged roles upon expiration..
Policy
Permanent active role assignments shall not be allowed for highly privileged roles. Active assignments shall have an expiration period.
The only exception to the policy is the break-glass Global Administrator account.
Licensing Considerations
Azure AD P2 if using Azure AD PIM. This can be purchased standalone or is part of the following bundles:
EMS+E5
Microsoft 365 E5
Set Up Instructions
Deploy PIM: Plan a Privileged Identity Management deployment - Azure AD - Microsoft Entra | Microsoft Learn
End-User Impact
Level: Low
Impact is limited to users who are eligible to privileged roles which should be a small amount in the organization. These users will have to enter the Azure AD Admin center to activate their roles when needed.
Tips
The emergency break-glass account should be included in the permanent assignments for the Global Administrator role.
PowerShell Scripts
PowerShell for PIM: PowerShell for Azure AD roles in PIM - Azure AD - Microsoft Entra | Microsoft Learn
Videos
Last updated