Lab 07: PIM - Portal Solution
Step-by-step portal walkthrough for all lab tasks
Task 1: Explore PIM Dashboard
Step 1.1: Access PIM
- Go to Microsoft Entra admin center → https://entra.microsoft.com
- Navigate to Identity governance → Privileged Identity Management
- You'll see the PIM Quick Start page
Step 1.2: Explore My Roles
- In PIM, click My roles in the left menu
- You'll see tabs:
- Entra ID roles - Your eligible/active directory roles
- Azure resources - Your eligible/active Azure RBAC roles
- Groups - Your eligible/active group memberships
- Note which roles you have as "Eligible" vs "Active"
Step 1.3: Review Current Assignments (Admin View)
- Click Manage → Entra ID roles
- Click Roles to see all roles
- Click Assignments to see all current assignments
- Use filters to view:
- Eligible assignments - Users who can activate
- Active assignments - Users who currently have the role
- Look for roles with "Permanent" status (no end date)
✅ Checkpoint: You understand the PIM interface and current state
Task 2: Configure PIM Settings for Global Administrator
Step 2.1: Access Role Settings
- In PIM → Manage → Entra ID roles
- Click Settings
- Find Global Administrator and click on it
- Click Edit (or the role name opens settings)
Step 2.2: Configure Activation Settings
Under Activation tab:
| Setting | Value |
|---|---|
| Activation maximum duration (hours) | 4 |
| On activation, require | ✅ Azure MFA |
| Require justification on activation | ✅ Yes |
| Require ticket information on activation | ☐ No |
| Require approval to activate | ✅ Yes |
Step 2.3: Configure Approvers
- Under "Select approver(s)", click Select member(s)
- Search for and select the approving admin (yourself or another admin)
- Click Select
Step 2.4: Configure Assignment Settings
Under Assignment tab:
| Setting | Value |
|---|---|
| Allow permanent eligible assignment | ✅ Yes |
| Expire eligible assignments after | (leave default or set 365 days) |
| Allow permanent active assignment | ☐ No |
| Expire active assignments after | 4 hours |
| Require Azure MFA on active assignment | ✅ Yes |
| Require justification on active assignment | ✅ Yes |
Step 2.5: Configure Notifications
Under Notification tab:
- Configure who receives emails for various events
- Recommended: Enable notifications for role activations
Step 2.6: Save Settings
- Click Update
- Confirm the settings are saved
✅ Checkpoint: Global Administrator has strict PIM requirements
Task 3: Create an Eligible Assignment
Step 3.1: Add Eligible Assignment
- In PIM → Manage → Entra ID roles → Assignments
- Click + Add assignments
- Select role: User Administrator
- Select member(s): Click, then search for User1
- Click Next
Step 3.2: Configure Assignment Type
- Assignment type: Select Eligible
- Permanently eligible: Leave UNCHECKED
- Assignment starts: Today
- Assignment ends: Select a date 6 months from now
- Click Assign
Step 3.3: Verify Assignment
- Go to Assignments tab
- Filter by Eligible assignments
- Confirm User1 shows as eligible for User Administrator
- Verify there's NO active assignment for User1
✅ Checkpoint: User1 is eligible but not active for User Administrator
Task 4: Configure PIM Settings for User Administrator Role
Step 4.1: Access Settings
- In PIM → Manage → Entra ID roles → Settings
- Click User Administrator
- Click Edit
Step 4.2: Configure Activation
| Setting | Value |
|---|---|
| Activation maximum duration (hours) | 8 |
| On activation, require | ✅ Azure MFA |
| Require justification on activation | ✅ Yes |
| Require ticket information | ☐ No |
| Require approval to activate | ☐ No |
Step 4.3: Configure Assignment
| Setting | Value |
|---|---|
| Allow permanent eligible | ✅ Yes |
| Allow permanent active | ☐ No |
| Expire active assignments after | 8 hours |
Step 4.4: Configure Notifications
- Under Notification tab
- For "Send notifications when eligible members activate this role":
- Add admin email addresses as recipients
- Click Update
✅ Checkpoint: User Administrator configured for self-service activation with MFA
Task 5: Activate a Role (User Experience)
Step 5.1: Sign In as Eligible User
- Open InPrivate/Incognito browser
- Go to https://entra.microsoft.com
- Sign in as User1 (the eligible user)
Step 5.2: Navigate to My Roles
- In Entra admin center, search for "PIM" or navigate to:
- Identity governance → Privileged Identity Management
- Click My roles
- Click Entra ID roles tab
Step 5.3: Activate the Role
- Find User Administrator in the "Eligible assignments" section
- Click Activate
- A panel opens on the right
Step 5.4: Complete Activation Form
- Duration: Select hours (e.g., 2 hours)
- Note: Cannot exceed maximum set in role settings (8 hours)
- Reason: Enter justification
- Example: "Creating test users for Project Alpha development environment"
- Complete MFA if prompted
- Click Activate
Step 5.5: Verify Activation
- Wait a moment for activation to process
- Refresh the page
- The role should now appear under Active assignments
- Note the End time - this is when access automatically expires
Step 5.6: Test the Role
- Navigate to Identity → Users → All users
- Try to create a new user (you now have permission)
- The action should succeed
✅ Checkpoint: User1 successfully activated User Administrator role
Task 6: Configure PIM for Azure RBAC Roles
Step 6.1: Discover Azure Resources
- In PIM → Manage → Azure resources
- If you see "No resources found":
- Click Discover resources
- Select your subscription
- Click Manage resource
- Wait for discovery to complete
Step 6.2: Navigate to Resource
- Click on your subscription (or expand to find a resource group)
- You'll see the Azure RBAC PIM interface
Step 6.3: Add Eligible Assignment
- Click Assignments (under the resource)
- Click + Add assignments
- Select role: Contributor
- Select member(s): User2
- Click Next
- Assignment type: Eligible
- Permanently eligible: Uncheck
- End date: 6 months from now
- Click Assign
Step 6.4: Configure Role Settings
- In the Azure resource view, click Settings
- Click Contributor
- Click Edit
- Configure:
- Maximum activation duration: 8 hours
- Require MFA: Yes
- Require justification: Yes
- Click Update
✅ Checkpoint: User2 can activate Contributor role on Azure resources
Task 7: Approve/Deny PIM Requests
Step 7.1: Access Approval Queue
- Sign in as an approver (the admin designated in role settings)
- Navigate to PIM → Approve requests
- You'll see tabs:
- Entra ID roles
- Azure resources
- Groups
Step 7.2: Review Pending Request
- If there are pending requests, click on one
- Review:
- Who is requesting
- What role they want
- Their justification
- Requested duration
Step 7.3: Process the Request
To Approve:
- Click Approve
- Add a comment (optional): "Approved for project work"
- Confirm
To Deny:
- Click Deny
- Add a reason (required): "Please submit a ticket first with manager approval"
- Confirm
Step 7.4: Verify Notification
- Requester receives email notification of decision
- If approved, role is now active for them
✅ Checkpoint: You can process PIM approval requests
Task 8: Create an Access Review
Step 8.1: Navigate to Access Reviews
- In PIM → Manage → Entra ID roles
- Click Access reviews
- Click + New
Step 8.2: Configure Review Basics
| Field | Value |
|---|---|
| Review name | Quarterly User Admin Review |
| Description | Quarterly review of User Administrator role assignments |
| Start date | Today |
| Frequency | Quarterly |
| Duration (days) | 14 |
| End | Never (or select an end date) |
Step 8.3: Configure Scope
- Scope: Select User Administrator role
- Review type: Select assignment types to review:
- ✅ Active
- ✅ Eligible
Step 8.4: Configure Reviewers
| Setting | Value |
|---|---|
| Select reviewers | Selected user(s) or group(s) OR Members (self) |
| Reviewers | Add yourself or a security group |
| Fallback reviewers | Add backup reviewer |
For self-review: Select Members (self)
Step 8.5: Configure Completion Settings
| Setting | Value |
|---|---|
| Auto apply results to resource | ✅ Yes |
| If reviewers don't respond | Remove access |
| Action to apply on denied guest users | N/A for this role |
Step 8.6: Review and Create
- Click Next: Review + Create
- Review all settings
- Click Create
✅ Checkpoint: Access review is scheduled to run quarterly
Task 9: Review PIM Audit Logs
Step 9.1: Access Audit History
- In PIM → Manage → Entra ID roles
- Click Resource audit or Directory roles audit
Step 9.2: Filter Audit Logs
Use filters to find specific events:
- Activity: Add member to role completed, Remove member from role, Update role settings
- Date range: Last 7 days
- Status: Succeeded, Failed
Step 9.3: Review Key Events
Look for these types of entries:
- Add member to role in PIM completed - When eligible assignment created
- Add member to role completed - When role was activated
- Remove member from role completed - When activation expired or role removed
- Update role settings - When admin changed PIM settings
Step 9.4: Export Audit Data
- Click Export
- Download as CSV for compliance reporting
✅ Checkpoint: You can audit all PIM activity
Task 10: Configure PIM Alerts
Step 10.1: Access Alerts
- In PIM → Manage → Entra ID roles
- Click Alerts
- You'll see a list of built-in alerts
Step 10.2: Review Built-in Alerts
| Alert | Description |
|---|---|
| Roles are being assigned outside of PIM | Detects direct role assignments bypassing PIM |
| Potential stale Global Administrator accounts | Accounts not signing in |
| Too many Global Administrators | More than threshold configured |
| Administrators aren't using privileged roles | Eligible users not activating |
| Roles don't require MFA for activation | Security gap |
Step 10.3: Configure Alert Settings
- Click on an alert (e.g., "Too many Global Administrators")
- Click Setting
- Configure:
- Threshold (e.g., alert when more than 5 Global Admins)
- Whether alert is enabled
- Click Update
Step 10.4: View Alert Status
- Alerts show Triggered if condition is met
- Click Dismiss to acknowledge (alert will re-trigger if condition persists)
- Click Scan to manually check for issues
✅ Checkpoint: PIM alerts are configured for proactive monitoring
Summary Checklist
| Task | Status |
|---|---|
| Explored PIM dashboard | ☐ |
| Configured Global Admin role settings | ☐ |
| Created eligible assignment for User1 | ☐ |
| Configured User Administrator settings | ☐ |
| Tested role activation as user | ☐ |
| Configured PIM for Azure resources | ☐ |
| Processed approval request | ☐ |
| Created access review | ☐ |
| Reviewed PIM audit logs | ☐ |
| Configured PIM alerts | ☐ |