Understanding Azure Eligible Assignments and Permissions

Author

Reads 1K

Focused detail of a modern server rack with blue LED indicators in a data center.
Credit: pexels.com, Focused detail of a modern server rack with blue LED indicators in a data center.

Eligible assignments in Azure are based on the resource provider and the resource type.

To assign a role to a user, you need to have the "Microsoft.Authorization/roleAssignments/write" permission.

Permissions for eligible assignments are determined by the Azure role definitions.

The "Owner" role has the "Microsoft.Authorization/roleAssignments/write" permission, allowing them to assign roles to users.

Option 1: List

To list eligible and time-bound role assignments, you can use the Azure portal. Sign in to the Azure portal and open the Access control (IAM) page, then select the Role assignments tab. You can filter the eligible and time-bound role assignments, group and sort by State, and look for role assignments that aren't the Active permanent type.

You can also use the Azure portal to review role assignments. Click Azure AD roles > Assignments to see the user you added, which will have a role assigned through PIM that needs to be activated. Under eligible assignments, you'll see the user you added, and under Active assignments, you'll see users who currently have roles.

Credit: youtube.com, Azure AD Roles & administrators | Built-in Roles #PIM Eligible Vs Active assignments #infotechie365

To list eligible and time-bound role assignments using the Azure portal, follow these steps:

  • Sign in to the Azure portal
  • Open the Access control (IAM) page
  • Select the Role assignments tab
  • Filter the eligible and time-bound role assignments
  • Group and sort by State
  • Look for role assignments that aren't the Active permanent type

Alternatively, you can use the ARM API to list eligible and time-bound role assignments. For more information, see the PIM ARM API reference.

Creating and Managing Assignments

To create and manage assignments in Azure, you can use the RoleEligibilityScheduleRequest and RoleAssignmentScheduleRequest options. These options allow you to list eligible and time-bound role assignments.

You can also use the Azure portal to review role assignments. Click Azure AD roles > Assignments, and under eligible assignments, you'll see the users who have a role assigned through PIM that needs to be activated.

To update or remove an existing role assignment, follow these steps: Open Microsoft Entra Privileged Identity Management, select Azure resources, select the resource type you want to manage, and select the role that you want to update or remove. Find the role assignment on the Eligible roles or Active roles tabs, and select Add or View/Edit in the Condition column for the role assignment.

Limiting Assignment Creation

Computer server in data center room
Credit: pexels.com, Computer server in data center room

You can use Azure Policy to limit the creation of eligible or time-bound role assignments if your organization has process or compliance reasons to limit the use of Privileged Identity Management (PIM).

Azure Policy provides a way to enforce rules and regulations across your organization, ensuring that only authorized users can create eligible or time-bound role assignments.

To limit the creation of eligible or time-bound role assignments, you can create a custom policy that excludes specific identities or adds additional parameters and checks for other allow conditions.

The following roles can have conditions added: Storage Blob Data Contributor, Storage Blob Data Owner, and Storage Blob Data Reader.

You can also use Azure attribute-based access control (Azure ABAC) to add conditions on eligible role assignments using Microsoft Entra PIM for Azure resources.

Here are some limitations on role assignments:

  • A role assignment can't be assigned for a duration of less than five minutes.
  • A role assignment can't be removed within five minutes of it being assigned.

Note that these limitations apply to built-in roles only, and may be subject to change in future updates.

Converting Time-Bound Assignments to Permanent

Computer server in data center room
Credit: pexels.com, Computer server in data center room

You can convert eligible and time-bound role assignments to active permanent in your organization, but be aware that removing role assignments can potentially cause disruptions in your environment.

To convert these role assignments, you have two options: using the Azure portal or using PowerShell.

If you choose to use the Azure portal, you'll need to follow these steps: select the Eligible permanent, Eligible time-bound, and Active time-bound links for each role assignment, then select Active for the assignment type and Permanent for the assignment duration.

Alternatively, if you prefer to use PowerShell, you can follow these steps: retrieve and save the list of all eligible and time-bound role assignments, then use the New-AzRoleEligibilityScheduleRequest command to remove your eligible role assignments and the New-AzRoleAssignment command to create an active permanent role assignment.

It's essential to understand the impact of removing role assignments before you perform these steps, as it can cause disruptions in your environment.

White Cloud in the Sky
Credit: pexels.com, White Cloud in the Sky

Here's a summary of the steps to convert time-bound assignments to permanent:

Assignment Conditions and Eligibility

Assignment conditions and eligibility are crucial components of Azure's Privileged Identity Management (PIM) feature. You can use Azure attribute-based access control (Azure ABAC) to add conditions on eligible role assignments using Microsoft Entra PIM for Azure resources.

With Microsoft Entra PIM, your end users must activate an eligible role assignment to get permission to perform certain actions. Conditions enable you to limit a user's role permissions to a resource using fine-grained conditions. This also allows you to secure the role assignment with a time-bound setting, approval workflow, audit trail, and so on.

You can add conditions to refine Azure resource access for specific roles, such as Storage Blob Data Owner, Storage Blob Data Reader, and Storage Blob Data Contributor. These roles can have conditions added to limit a user's role permissions to a resource using fine-grained conditions.

Credit: youtube.com, How to assign roles to users in Azure || Difference between Active and Eligible ?||Azure||Part1

Some built-in roles can have conditions added, including Storage Blob Data Contributor, Storage Blob Data Owner, and Storage Blob Data Reader. However, currently, the following conditions are applied to these roles: a role assignment can't be assigned for a duration of less than five minutes, and a role assignment can't be removed within five minutes of it being assigned.

Here are some key details about assignment conditions and eligibility:

  • Conditions can be added to refine Azure resource access for specific roles.
  • Some built-in roles can have conditions added, including Storage Blob Data Contributor, Storage Blob Data Owner, and Storage Blob Data Reader.
  • Conditions applied to these roles include a minimum assignment duration of five minutes and a minimum removal delay of five minutes.

By using assignment conditions and eligibility, you can ensure that users only have access to the resources and permissions they need, when they need them. This helps to improve security and reduce the risk of unauthorized access.

Frequently Asked Questions

What are Azure role assignments?

Azure role assignments refer to the process of granting access to Azure resources by assigning roles to users, groups, or identities at a specific scope. This allows you to manage and control who can perform certain actions on your Azure resources.

What is assignment in Azure?

In Azure, a role assignment grants a principal access to a specific resource, controlling their level of access and permissions. Learn more about how to manage role assignments for secure resource access.

Lamar Smitham

Writer

Lamar Smitham is a seasoned writer with a passion for crafting informative and engaging content. With a keen eye for detail and a knack for simplifying complex topics, Lamar has established himself as a trusted voice in the industry. Lamar's areas of expertise include Microsoft Licensing, where he has written in-depth articles that provide valuable insights for businesses and individuals alike.

Love What You Read? Stay Updated!

Join our community for insights, tips, and more.