β Step 0 β Prerequisites (Donβt Skip)
Before you configure PIM, confirm:
- You have the correct licensing for Entra PIM.
- You have at least one βbreak-glassβ account excluded from Conditional Access (stored securely).
- You know which scope(s) youβre protecting:
- Entra roles (e.g., Global Administrator, Privileged Role Administrator)
- Azure RBAC roles (e.g., Owner, Contributor, User Access Administrator)
FABS Tip: Start with the highest-impact roles first: Global Admin, Privileged Role Admin, Owner, User Access Administrator.
π Part A: Configure PIM for Microsoft Entra Roles
Step 1 β Open PIM
- Go to Microsoft Entra admin center
- Navigate to: Identity Governance β Privileged Identity Management
- Select: Microsoft Entra roles
Step 2 β Configure Role Settings (Activation Requirements)
- Choose a privileged role (e.g., Global Administrator)
- Open Role settings
- Configure Activation requirements, for example:
- β Require MFA on activation
- β Require justification
- β (Optional) Require ticket information (ServiceNow / Jira reference)
- β±οΈ Set Maximum activation duration (e.g., 1β4 hours)
- β (Optional) Require approval for activation
Best practice: Short durations + MFA + justification should be your baseline.
Step 3 β Configure Notifications
In the same role settings:
- Enable notifications to:
- Admins when a role is activated
- Users when they activate a role
- Security teams for high-privilege elevation
This is one of the quickest wins for governance and auditing.
Step 4 β Assign Users as Eligible (Not Active)
- Go to Assignments
- Select Add assignments
- Choose the role
- Add users/groups as Eligible
- Set an assignment duration (where applicable)
β Result: Users can elevate only when needed.
π Part B: Configure PIM for Azure RBAC Roles (Subscriptions/Resources)
Step 5 β Onboard Azure Resources into PIM
In PIM, go to:
- Azure resources β Discover resources
- Select the subscription(s) or management group(s)
- Click Manage resource
This enables PIM controls for Azure RBAC roles.
Step 6 β Configure Azure RBAC Role Settings (Owner/Contributor)
- In Azure resources, select your subscription
- Go to Roles
- Choose roles like:
- Owner
- Contributor
- User Access Administrator
- Configure activation:
- β Require MFA
- β Require justification
- β Optional approval
- β±οΈ Duration (recommend 1β2 hours for high privilege)
FABS Tip: Treat βUser Access Administratorβ as highly sensitive (it controls permissions).
Step 7 β Assign Eligible Roles at the Correct Scope
Assign eligible roles carefully:
- Prefer Management Group scope for platform teams
- Use Subscription scope for workload teams
- Avoid broad assignments at tenant root unless truly required
Then:
- Add assignments as Eligible
- Limit assignment duration if possible
β Part C: Operational Controls (Make PIM βStickβ)
Step 8 β Configure Approval Workflow for Production Roles
For production subscriptions or identity admin roles:
- Require approval for:
- Owner
- Global Administrator
- Privileged Role Administrator
- User Access Administrator
Approvers should be:
- Security team
- Platform leads
- On-call duty managers
Step 9 β Enable Alerts & Auditing
In PIM:
- Review Alerts regularly (e.g., too many admins, suspicious activations)
- Use Audit history to track:
- activations
- role changes
- approvals and denials
Best practice: Forward PIM logs to Sentinel / SIEM if you operate at enterprise scale.
Step 10 β Schedule Access Reviews
Use Access reviews to ensure eligible assignments remain valid:
- Quarterly for standard privileged roles
- Monthly for high-risk roles
- Tie to joiner/mover/leaver processes
π§ͺ Example Configuration (Recommended Baseline)
Hereβs a strong baseline for most Azure production environments:
Role: Owner (Production subscription)
- Eligible assignment only
- Require MFA β
- Require justification β
- Require approval β
- Activation duration: 1β2 hours β±οΈ
- Ticket required: Optional (recommended for ITIL environments) β
- Notifications: Admin + approver + user β
π§ FABS Solutions Best Practices Checklist
β Remove all permanent Owner/Global Admin assignments (except break-glass)
β Use PIM eligible roles as the default model
β Require MFA + justification for all privileged activations
β Require approval for production and identity admin roles
β Keep activation windows short
β Audit role activations and review access regularly
π References (Keep These Links)
- Microsoft PIM configuration guide:
https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-configure
Click Here To Return To Blog