Microsoft Entra PIM Best Practices
Audience: Security administrators, platform engineers, IT admins
Purpose: Configure and use PIM to enforce least-privilege access while minimizing elevation fatigue
Quick Links
| Resource | Description |
|---|---|
| Entra Portal - PIM | PIM activation page |
| My Roles | View and activate eligible roles |
| PIM Documentation | Microsoft documentation |
Overview
Microsoft Entra Privileged Identity Management (PIM) enables just-in-time (JIT) access for privileged roles. Instead of permanent admin assignments, users are made eligible for roles and activate them on demand for a limited time.
Key Benefits
| Benefit | Description |
|---|---|
| Least Privilege | No standing admin rights |
| Audit Trail | All activations logged with justification |
| Approval Workflow | Optional approval for sensitive roles |
| Time-Bound | Access automatically expires |
| MFA Enforcement | Require MFA at activation |
Eligible vs. Active Assignments
| Type | Description | Use Case |
|---|---|---|
| Eligible | User must activate to gain access | All regular admin roles |
| Active | User has standing access | Break-glass accounts only |
Aim for zero permanent active assignments for sensitive roles, except for break-glass emergency accounts.
Role Assignment Approaches
Approach 1: Group Eligible for Role
The recommended approach for most scenarios:
- Create a role-assignable group
- Assign the group as Eligible to the role
- Add users as permanent members of the group
- Users individually activate the role via PIM
Advantages:
- Immediate role enforcement (critical for M365 services)
- Simple activation workflow
- Clear audit trail per user
Use for: Exchange Admin, SharePoint Admin, Purview roles, and any role requiring immediate access
Approach 2: PIM-Controlled Group Membership
For bundling multiple roles under one activation:
- Create a role-assignable group
- Assign the group as Active to multiple roles
- Enable the group in PIM for Groups
- Users activate group membership to gain all roles
Advantages:
- Single activation grants multiple roles
- Reduces "elevation fatigue" for common role bundles
- Additional approval layer for the group
Use for: Helpdesk bundle (User Admin + Password Admin + Helpdesk Admin)
Group membership changes may take time to propagate to external services. Use Approach 1 for roles that require immediate enforcement.
Configuration Guide
Prerequisites
| Requirement | Details |
|---|---|
| License | Entra ID P2 or Entra ID Governance |
| Role | Privileged Role Administrator or Global Administrator |
| Users | All eligible users must be licensed |
Step 1: Create Role-Assignable Group
- Navigate to Entra ID → Groups → New group
- Set Group type: Security
- Enable: Microsoft Entra roles can be assigned to the group → Yes
- Set Membership type: Assigned (not Dynamic)
- Name following convention:
RAG - [Purpose]
The role-assignable setting is permanent and must be set at creation. You cannot convert existing groups.
Step 2: Assign Group to Role
For Approach 1 (Group eligible for role):
- Navigate to Entra ID → Roles and administrators
- Select the target role
- Click Add assignments
- Select your role-assignable group
- Set Assignment type: Eligible
- Configure duration and expiration
For Approach 2 (PIM for group membership):
- Navigate to Privileged Identity Management → Groups
- Click Discover groups and select your group
- Configure eligible member settings
Step 3: Configure Role Settings
- Navigate to PIM → Entra roles → Settings
- Select the role to configure
- Configure:
| Setting | Recommendation |
|---|---|
| Activation maximum duration | 4-8 hours for most roles |
| Require MFA | Yes |
| Require justification | Yes |
| Require approval | Yes for highly privileged roles |
| Approvers | Security team or role owners |
Step 4: Add Users to Group
- Navigate to your role-assignable group
- Add users as Members
- Users will now see the role as Eligible in PIM
User Activation Process
Activating a Role
- Navigate to My Roles
- Find the eligible role and click Activate
- Specify duration (up to maximum allowed)
- Enter justification (e.g., "Troubleshooting Exchange mailbox issue - Ticket #12345")
- Complete MFA if prompted
- If approval required, wait for approver response
Checking Active Roles
- Navigate to My Roles → Active assignments
- View currently active roles and expiration times
- Deactivate early if no longer needed
Best Practices Summary
Do
- ✅ Use role-assignable groups for all role assignments
- ✅ Require MFA and justification for all activations
- ✅ Require approval for Global Admin, Privileged Role Admin
- ✅ Set appropriate activation durations (4-8 hours typical)
- ✅ Maintain two break-glass accounts outside PIM
- ✅ Review eligible assignments quarterly
Don't
- ❌ Assign roles permanently (except break-glass)
- ❌ Use non-role-assignable groups for role assignment
- ❌ Mix Approach 1 and 2 for the same role/group
- ❌ Nest role-assignable groups
- ❌ Set activation durations longer than necessary
Example Architecture
| Group | Roles | Approach | Notes |
|---|---|---|---|
RAG - Helpdesk Admins | Helpdesk Admin, Password Admin, User Admin | Approach 2 | Bundle reduces multiple activations |
RAG - Exchange Admins | Exchange Administrator | Approach 1 | Immediate access required |
RAG - SharePoint Admins | SharePoint Administrator | Approach 1 | M365 service integration |
RAG - Global Admins | Global Administrator | Approach 1 | Requires approval |
Troubleshooting
| Issue | Resolution |
|---|---|
| Role not appearing in My Roles | Verify group membership; check license assignment |
| Activation fails | Check MFA status; verify approver availability |
| Access not working after activation | Wait 5-10 minutes for propagation; sign out and back in |
| Cannot see Discover Groups option | Verify Privileged Role Administrator role |
Related Resources
- Entra ID Overview — Identity management documentation
- Scope Groups & Naming — Group naming conventions
- Endpoint RBAC — Custom Intune roles
- Microsoft PIM Documentation — Official documentation