Azure AD Privileged Identity Management (PIM) enforces just-in-time privileged access by converting permanent role assignments to eligible assignments that require activation. This skill uses the Microsoft Graph API to enumerate active and eligible role assignments, create eligibility schedule requests, configure role management policies (MFA requirements, approval workflows, maximum activation duration), audit PIM activation logs, and identify over-privileged permanent assignments that should be converted to eligible.
msal, requests
RoleManagement.ReadWrite.Directory, RoleEligibilitySchedule.ReadWrite.Directory permissionsJSON audit report with permanent vs. eligible assignment counts, over-privileged accounts, policy compliance status, and recent activation history.