Privileged Identity Management
Privileged Identity Management (PIM) in Azure AD
- Providing just-in-time privileged access to Azure AD and Azure resources.
- Assigning time-bound access to resources by using start and end dates.
- Requiring approval to activate privileged roles.
- Enforcing Azure Multi-factor Authentication (MFA) to activate any role.
- Using justification to understand why users activate.
- Getting notifications when privileged roles are activated.
- Conducting access reviews to ensure that users still need roles.
- Downloading an audit history for an internal or external audit.
Prerequisites
- Azure AD Premium P2
- Enterprise Mobility + Security (EMS) E5
Configure PIM
Steps for PIM Setup
- Discover Azure resources from Azure AD Privileged Management blade.
- Grant access to other personnel to manage PIM- The default Global Administrator assigns others to the Privileged Role Administrator.
- Elevate access for a Global Administrator- This one enables you to view all the resources and assign access in any subscription or management group in the directory.
Audit PIM
Navigate to audit history
Audit History Graph
Microsoft Identity Manager (MIM)
It allows the organizations to manage the users, credentials policies, and access within their organizations and hybrid environments. It simplifies the identity lifecycle management with the help of automated workflows, business rules, and easy integration with heterogenous platforms across the datacenter. MIM also enables AD to have right users and access rights for on-premises app. On-premises AD, Azure AD, or a hybrid combination of the two, all can provide services for the user and device authentication, identity and role management, and provisioning.
Hybrid Identities
Nowadays, identity has become a common factor among many services such as Microsoft Office 365 and Xbox Live, where the person is the center of services. Your digital identity is the combination of who you are and what you're allowed to do i.e.:
Credentials + Privileges = digital identity
As these identities have more than the normal user rights, if they are compromised then, it can allow malicious hacker to access sensitive corporate assets; hence, securing these privileged identities is a crucial step to establish security assurances for business assets in a modern organization. Azure AD PIM is recommended as the service to help protect your privileged accounts.
Evolution of identities
The following steps can be taken for a password-less world:
- Enforce MFA- Conform to Fast Identity Online (FIDO) 2.0 standard, so you will need a PIN and a biometric for authentication rather than a password. Windows Hello is a good example, but use the MFA method that works for your organization.
- Reduce legacy authentication workflows- The apps that requires password can be placed into a separate user access portal and migrate the users to modern authentication flows most of the time. At Microsoft only 10% of the users enter a password on a given day.
- Remove passwords- Create consistency across Azure AD and AD to allow the administrators to remove passwords from identity directory.
Comments
Post a Comment