Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Never Stop Exploring (July 2025 Wallpapers Edition)

      June 30, 2025

      How AI further empowers value stream management

      June 27, 2025

      12 Top ReactJS Development Companies in 2025

      June 27, 2025

      Not sure where to go with AI? Here’s your roadmap.

      June 27, 2025

      I never thought I’d praise a kickstand power bank – until I tried this one

      June 30, 2025

      I replaced my work PC with this Alienware laptop – now I’m wondering why I hadn’t done this sooner

      June 30, 2025

      How to set up Alexa to receive notifications on Prime Day deals you want

      June 30, 2025

      How proxy servers actually work, and why they’re so valuable

      June 30, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      What’s the difference between named functions and arrow functions in JavaScript?

      June 30, 2025
      Recent

      What’s the difference between named functions and arrow functions in JavaScript?

      June 30, 2025

      Spring Boot + Swagger: A Complete Guide to API Documentation

      June 30, 2025

      Wire Room Math: AI + SME = (Less Compensation Paid) X (Headline Risk + Payment Errors)^2

      June 30, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Artix Linux: Introduzione di XLibre nelle Build Sperimentali

      June 30, 2025
      Recent

      Artix Linux: Introduzione di XLibre nelle Build Sperimentali

      June 30, 2025

      Orange Pi R2S Single Board Computer Running Linux: Introduction

      June 30, 2025

      vmstat – reports virtual memory statistics

      June 30, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»PIM for Azure Resources

    PIM for Azure Resources

    May 14, 2025

    Privileged Identity Management

    Privileged Identity Management (PIM) is a service in Microsoft Entra ID that enables you to manage, control, and monitor access to important resources in your organization. These resources include those in Microsoft Entra ID, Azure, and other Microsoft Online Services such as Microsoft 365 or Microsoft Intune. This blog has been written to help those who want to set up just-in-time access for Azure resources and provide access to the subscription level only.

    Why do we need PIM for Azure Resources?

    Better Security for Important Access

    PIM ensures that only the right people can access essential systems when needed and only for a short time. This reduces the chances of misuse by someone with powerful access.

    Giving Only the Minimum Access

    PIM ensures that people only have the access they need to do their jobs. This means they can’t access anything unnecessary, keeping things secure.

    Time-Limited Access

    With PIM, users can get special access for a set period. Once the time is up, the access is automatically removed, preventing anyone from holding on to unnecessary permissions.

    Access When Needed

    PIM gives Just-in-Time (JIT) Access, meaning users can only request higher-level access when needed, and it is automatically taken away after a set time. This reduces the chances of having access for too long.

    Approval Process for Access

    PIM lets you set up a process where access needs to be approved by someone (like a manager or security) before it’s given. This adds another layer of control.

    Tracking and Monitoring

    PIM keeps detailed records of who asked for and received special access, when they accessed something, and what they did. This makes it easier to catch any suspicious activities.

    Temporary Admin Access

    Instead of giving someone admin access all the time, PIM allows it to be granted for specific tasks. Admins only get special access when needed, and for as long as necessary, so there is less risk.

    Meeting Legal and Security Standards

    Some industries require companies to follow strict rules (like protecting personal information). PIM helps meet these rules by controlling who has access and keeping track of it for audits.

     How to set up PIM in Azure

    Create Security Group & Map to Subscriptions

    • Step 1: Create security groups for each Azure subscription to manage access control.
      • The security groups are derived from Azure Entra IDs. As illustrated in the snapshot below, use the global search box in the Azure portal to find the appropriate services.

    Pim 1

     

    • Step 2: Select the service you need, then click New Group to create a new security group. Fill in all necessary details, including group name, description, and any other required attributes.

    Pim 2

     

      • Create a separate group for each subscription.
      • If your account includes two subscriptions, such as Prod and Non-Prod, create distinct security groups for each subscription. This allows users to request access to a specific subscription.
      • Make the user a member of both groups, enabling them to choose which subscription resources they wish to activate.
      • The screenshot below shows that the Demo-Group security group will be created and assigned to its corresponding subscription.

    Pim 3

     

    Navigate to PIM (Privileged Identity Management)

    • Step 3: In the Azure portal, navigate to Identity Governance and select Privileged Identity Management (PIM) to manage privileged access.

    Pim 4

     

    Enable PIM for Azure Resources

    • Step 4: You can select the specific section within PIM you wish to enable PIM for. For this setup, we are focusing on enabling PIM for subscription-level access to control who can activate privileged access for Azure subscriptions.
    • Step 5: Choose Azure Resources from the list of available options in PIM, as shown in the screenshot below.

    Pim 5

     

      • An assignment needs to be created for the groups we created so that members of those groups will see an option to activate access for their respective subscriptions.
    • Step 6: As per the screenshots below, once you select Azure resources, select the subscription and group for which you want to create assignments.

    Pim 6

     

    Pim 7

     

      • As per the image below, under the Resource section, subscription has been selected for which we want to give permission. Under Resource Type is subscription, choose the role you want to give permission to, and the Demo-Group security group is selected.

    Pim 8

     

    • Step 7: Once the assignment is complete, users who are part of a group need to log out and log back in to see the changes applied. To view and activate your assignments in PIM, follow the steps below:

    1. Navigate to the Assignments Section

    • Go to PIM (Privileged Identity Management) by selecting:
    • Entry ID → Identity Governance → PIM → Azure Resources → Activate Role.

    2. Select Your Assignment

    • In this section, you will see a list of the assignments for which you are eligible.

    3. Activate the Role

    • To activate a role, click on Activate. By default, the assignment will be set for 8 hours. If necessary, you may adjust the duration by justifying the requirement and enabling the assignment.

    4. Validation and Finalization

    • The system will take some time to validate your request. Once completed, the assignment will appear under the Active Assignments.

    Pim 12 1

     

    • Step 8: As shown in the screenshot below, the activation duration can be set to 24 hours by editing the assignment settings.

    Pim 10

     

      • You can modify the assignment settings and adjust the values according to your specific requirements. Please refer to the screenshot below for more details.

    Pim 11

     

    Conclusion

    Azure PIM helps make your system safer by ensuring that only the right people can access essential resources for a short time. It lets you give access when needed (just-in-time), require approval for special access, automatically manage who can access what, and keep track of everything. PIM is essential for organizations that want to limit who can access sensitive information, ensure only the necessary people have the correct permissions at the right time, and prevent unauthorized access.

    Source: Read More 

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleEnabling Subscriptions in Shopify
    Next Article Perficient’s “What If? So What?” Podcast Wins Gold at the 2025 Hermes Creative Awards

    Related Posts

    Security

    ⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more

    June 30, 2025
    Security

    Over 1,200 Citrix servers unpatched against critical auth bypass flaw

    June 30, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-32958 – Adept Language GitHub Token Exposure

    Common Vulnerabilities and Exposures (CVEs)

    stack-back – automated incremental backups using restic

    Linux

    OpenAI Releases an Open‑Sourced Version of a Customer Service Agent Demo with the Agents SDK

    Machine Learning

    This Rubbish Icon Might Get a Makeover in Ubuntu 25.10

    Linux

    Highlights

    CVE-2025-32927 – Chimpstudio FoodBakery Deserialization of Untrusted Data Object Injection Vulnerability

    May 19, 2025

    CVE ID : CVE-2025-32927

    Published : May 19, 2025, 8:15 p.m. | 3 hours, 59 minutes ago

    Description : Deserialization of Untrusted Data vulnerability in Chimpstudio FoodBakery allows Object Injection.This issue affects FoodBakery: from n/a through 3.3.

    Severity: 9.8 | CRITICAL

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2023-53139 – Linux Kernel NFC fdp Null Pointer Dereference

    May 2, 2025

    Exposure Protocol: Information Disclosure in the Wild [Part 1]

    June 15, 2025

    CVE-2025-4094 – “Acunetix DIGITS WordPress OTP Brute Force Vulnerability”

    May 22, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.