技能 编程开发 Azure 特权身份管理

Azure 特权身份管理

v20260317
implementing-privileged-identity-management-with-azure
使用 Microsoft Graph API 配置 Azure AD 的特权身份管理,操作 eligible/active 角色、申请即时激活、审计日志并强化 MFA 与审批策略,确保零信任环境下的特权访问合规。
获取技能
273 次下载
概览

Implementing Privileged Identity Management with Azure

Overview

Azure AD Privileged Identity Management (PIM) enforces just-in-time privileged access by converting permanent role assignments to eligible assignments that require activation. This skill uses the Microsoft Graph API to enumerate active and eligible role assignments, create eligibility schedule requests, configure role management policies (MFA requirements, approval workflows, maximum activation duration), audit PIM activation logs, and identify over-privileged permanent assignments that should be converted to eligible.

Prerequisites

  • Python 3.9+ with msal, requests
  • Azure AD application registration with RoleManagement.ReadWrite.Directory, RoleEligibilitySchedule.ReadWrite.Directory permissions
  • Microsoft Entra ID P2 or Microsoft Entra ID Governance license

Key Operations

  1. List eligible assignments — GET /roleManagement/directory/roleEligibilityScheduleInstances
  2. Create eligibility requests — POST /roleManagement/directory/roleEligibilityScheduleRequests
  3. Activate eligible role — POST /roleManagement/directory/roleAssignmentScheduleRequests with action=selfActivate
  4. Audit role activations — GET /auditLogs/directoryAudits filtered by PIM activities
  5. Review role policies — GET /policies/roleManagementPolicies to check MFA/approval requirements

Output

JSON audit report with permanent vs. eligible assignment counts, over-privileged accounts, policy compliance status, and recent activation history.

信息
Category 编程开发
Name implementing-privileged-identity-management-with-azure
版本 v20260317
大小 9.65KB
更新时间 2026-03-18
语言