Configure Privileged Identity Management (PIM) for Global Admin Role
What is Privileged Identity Management (PIM)?
Microsoft Entra Privileged Identity Management (PIM) is a service that enables you to manage, control, and monitor access to important resources in your organization. These include:
- Azure AD roles (e.g., Global Administrator, User Administrator)
- Azure resources (e.g., Subscriptions, Resource Groups)
With PIM, you can:
- Enforce just-in-time (JIT) role activation
- Require multi-factor authentication (MFA) for elevation
- Set approval workflows before granting privileges
- Limit activation duration for sensitive roles
- Implement audit and alerts on role usage
Why Use PIM for Global Administrator?
The Global Administrator role has the highest level of privilege in Microsoft Entra ID (formerly Azure AD). Assigning this role permanently increases the risk of:
- Accidental configuration changes
- Account compromise
- Non-compliance with security policies
PIM helps mitigate these risks by making the role eligible instead of permanent, and requiring users to activate the role only when needed — with appropriate controls.
Hands-On Lab: Configure PIM for Global Administrator Role
Prerequisites
- You must have at least Privileged Role Administrator or Global Administrator privileges.
- PIM is available in Azure AD Premium P2 license.
Step 1: Access Microsoft Entra Admin Center
- Go to: https://entra.microsoft.com
- Sign in with your admin credentials.
Step 2: Enable PIM
- In the left menu, go to “Identity” > “Privileged Identity Management”
- Click on “Azure AD roles”.
- If this is your first time, click “Consent to PIM” to enable it for your tenant.
Step 3: Assign the Global Administrator Role as Eligible
- Under Azure AD roles, click “Roles”.
- Search for and click “Global Administrator”.
- Click “Add assignments”.
- Set the following:
- Select member: Choose the user who needs this role.
- Assignment type: Choose Eligible.
- Start/End date: Optional (set validity duration).
- Click “Assign”.
Step 4: Configure Activation Settings
- Under Global Administrator > Settings, click “Edit”.
- Configure the following:
- Require MFA to activate: Yes
- Activation maximum duration (hours): e.g., 1 or 4
- Require justification on activation: Yes
- Require approval to activate: Optional, can be enabled
- Notification: Enable notifications to security team
- Click “Save”.
Step 5: Test Role Activation as User
- Sign in as the user assigned to the Global Admin role.
- Go to Entra Admin Center > Privileged Identity Management > My roles.
- Under Eligible roles, click “Activate” next to Global Administrator.
- Complete the required:
- MFA prompt
- Justification
- Approval (if configured)
- Click “Activate”.
- The role is now active for the configured duration.
Step 6: Monitor Role Activity
- As an admin, go to PIM > Audit History.
- Review role activations, justifications, and durations.
- Set up alerts and reviews under “Alerts” and “Access reviews”.
Additional Resources
Implementing PIM is a critical Zero Trust security control. By following the steps above, you ensure that your Microsoft Entra environment is resilient against identity-based threats.