Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»PIM for Azure Resources

    PIM for Azure Resources

    May 14, 2025

    Privileged Identity Management

    Privileged Identity Management (PIM) is a service in Microsoft Entra ID that enables you to manage, control, and monitor access to important resources in your organization. These resources include those in Microsoft Entra ID, Azure, and other Microsoft Online Services such as Microsoft 365 or Microsoft Intune. This blog has been written to help those who want to set up just-in-time access for Azure resources and provide access to the subscription level only.

    Why do we need PIM for Azure Resources?

    Better Security for Important Access

    PIM ensures that only the right people can access essential systems when needed and only for a short time. This reduces the chances of misuse by someone with powerful access.

    Giving Only the Minimum Access

    PIM ensures that people only have the access they need to do their jobs. This means they can’t access anything unnecessary, keeping things secure.

    Time-Limited Access

    With PIM, users can get special access for a set period. Once the time is up, the access is automatically removed, preventing anyone from holding on to unnecessary permissions.

    Access When Needed

    PIM gives Just-in-Time (JIT) Access, meaning users can only request higher-level access when needed, and it is automatically taken away after a set time. This reduces the chances of having access for too long.

    Approval Process for Access

    PIM lets you set up a process where access needs to be approved by someone (like a manager or security) before it’s given. This adds another layer of control.

    Tracking and Monitoring

    PIM keeps detailed records of who asked for and received special access, when they accessed something, and what they did. This makes it easier to catch any suspicious activities.

    Temporary Admin Access

    Instead of giving someone admin access all the time, PIM allows it to be granted for specific tasks. Admins only get special access when needed, and for as long as necessary, so there is less risk.

    Meeting Legal and Security Standards

    Some industries require companies to follow strict rules (like protecting personal information). PIM helps meet these rules by controlling who has access and keeping track of it for audits.

     How to set up PIM in Azure

    Create Security Group & Map to Subscriptions

    • Step 1: Create security groups for each Azure subscription to manage access control.
      • The security groups are derived from Azure Entra IDs. As illustrated in the snapshot below, use the global search box in the Azure portal to find the appropriate services.

    Pim 1

     

    • Step 2: Select the service you need, then click New Group to create a new security group. Fill in all necessary details, including group name, description, and any other required attributes.

    Pim 2

     

      • Create a separate group for each subscription.
      • If your account includes two subscriptions, such as Prod and Non-Prod, create distinct security groups for each subscription. This allows users to request access to a specific subscription.
      • Make the user a member of both groups, enabling them to choose which subscription resources they wish to activate.
      • The screenshot below shows that the Demo-Group security group will be created and assigned to its corresponding subscription.

    Pim 3

     

    Navigate to PIM (Privileged Identity Management)

    • Step 3: In the Azure portal, navigate to Identity Governance and select Privileged Identity Management (PIM) to manage privileged access.

    Pim 4

     

    Enable PIM for Azure Resources

    • Step 4: You can select the specific section within PIM you wish to enable PIM for. For this setup, we are focusing on enabling PIM for subscription-level access to control who can activate privileged access for Azure subscriptions.
    • Step 5: Choose Azure Resources from the list of available options in PIM, as shown in the screenshot below.

    Pim 5

     

      • An assignment needs to be created for the groups we created so that members of those groups will see an option to activate access for their respective subscriptions.
    • Step 6: As per the screenshots below, once you select Azure resources, select the subscription and group for which you want to create assignments.

    Pim 6

     

    Pim 7

     

      • As per the image below, under the Resource section, subscription has been selected for which we want to give permission. Under Resource Type is subscription, choose the role you want to give permission to, and the Demo-Group security group is selected.

    Pim 8

     

    • Step 7: Once the assignment is complete, users who are part of a group need to log out and log back in to see the changes applied. To view and activate your assignments in PIM, follow the steps below:

    1. Navigate to the Assignments Section

    • Go to PIM (Privileged Identity Management) by selecting:
    • Entry ID → Identity Governance → PIM → Azure Resources → Activate Role.

    2. Select Your Assignment

    • In this section, you will see a list of the assignments for which you are eligible.

    3. Activate the Role

    • To activate a role, click on Activate. By default, the assignment will be set for 8 hours. If necessary, you may adjust the duration by justifying the requirement and enabling the assignment.

    4. Validation and Finalization

    • The system will take some time to validate your request. Once completed, the assignment will appear under the Active Assignments.

    Pim 12 1

     

    • Step 8: As shown in the screenshot below, the activation duration can be set to 24 hours by editing the assignment settings.

    Pim 10

     

      • You can modify the assignment settings and adjust the values according to your specific requirements. Please refer to the screenshot below for more details.

    Pim 11

     

    Conclusion

    Azure PIM helps make your system safer by ensuring that only the right people can access essential resources for a short time. It lets you give access when needed (just-in-time), require approval for special access, automatically manage who can access what, and keep track of everything. PIM is essential for organizations that want to limit who can access sensitive information, ensure only the necessary people have the correct permissions at the right time, and prevent unauthorized access.

    Source: Read More 

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleEnabling Subscriptions in Shopify
    Next Article Perficient’s “What If? So What?” Podcast Wins Gold at the 2025 Hermes Creative Awards

    Related Posts

    Development

    GPT-5 is Coming: Revolutionizing Software Testing

    July 22, 2025
    Development

    Win the Accessibility Game: Combining AI with Human Judgment

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-53478 – Mediawiki CheckUser Extension Cross-Site Scripting (XSS)

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-4937 – SourceCodester Apartment Visitor Management System SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Anthropic researchers say next-generation AI models will reduce humans to “meat robots” in a spectrum of crazy futures

    News & Updates
    Rilasciato DeaDBeeF 1.10: Un veterano del software libero che continua a evolversi

    Rilasciato DeaDBeeF 1.10: Un veterano del software libero che continua a evolversi

    Linux

    Highlights

    I’ve tested dozens of robot vacuums. These are the three I recommend most to family and friends

    June 20, 2025

    I test robot vacuums for a living and always have at least half a dozen…

    LPub3D is an LDraw editor for LEGO style digital building instructions

    May 3, 2025

    How Vue Composables Work – Explained with Code Examples

    June 13, 2025

    CVE-2025-4632 – Samsung MagicINFO 9 Server Path Traversal Write Arbitrary File Vulnerability

    May 13, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.