- Entra ID roles, i.e. whether a given role is active or not
- Entra ID group membership, i.e. whether a given group is included in your Azure AD access tokens or not
- Azure resources, i.e. whether you have access to resources in Azure subscriptions
Microsoft provides just-in-time privilege capabilities via Privileged Identity Management (PIM), a feature of Entra ID. Via this capability, you can ensure that accounts must activate a given permission prior to usage to minimize the chance of a malicious party getting access or an authorized user accidentally making an impactful change. Permissions with the potential for high impact are great candidates for this type of additional access control.
The combination of an Entra ID sourced group, PIM activation, and Entra ID Access Review provide a strong access control combination to help ensure only the right people have access at the right time. However, it is possible to use a UW group with PIM, if an Entra ID Access Review is not required. PIM or this combination takes more effort to setup, requiring UW-IT involvement, so we do ask that customers limit requests for this capability to scenarios which justify the extra effort. PIM and Access Reviews do require the user to have UW Microsoft Advanced Service Level to satisfy Microsoft licensing requirements. To request PIM or the combination noted, please open a request to UW-IT (help@uw.edu) with a subject line of "Microsoft Infrastructure: PIM", with the details of your scenario.