How to Enable Privileged Identity Management (PIM)
Privileged Identity Management (PIM) in Entra ID gives users just-in-time access to admin roles rather than permanently assigning them. Instead of being a Global Admin all the time, a user activates the role for a defined period when needed, with MFA and optional approval. This reduces the attack surface of privileged accounts significantly.
How PIM works
Without PIM, admin roles are permanently assigned. With PIM, roles are eligible rather than active. To use an admin role, the user must activate it - providing MFA, a justification, and waiting for approval if required. The role is active for a configurable time then expires automatically.
Prerequisites
- Entra ID P2 licence (Microsoft 365 E5 or Entra ID P2 add-on)
- Global Administrator or Privileged Role Administrator to configure PIM
Enable PIM
PIM must be enabled once per tenant. You will be prompted to verify your identity and consent.
Assign eligible roles
- Select the role (e.g. Global Administrator)
- Select the members to make eligible
- Set assignment type to Eligible (not Active)
- Set an end date or leave as permanent eligibility
Configure role settings
Activating a role as a user
Users visit aka.ms/pim, click My roles, find the eligible role, and click Activate. They provide MFA and a justification. If approval is required, they wait before access is granted.
Monitoring and audit
PIM logs every activation - who, when, for how long, and the justification. This integrates with Microsoft Sentinel for SIEM ingestion.
Frequently Asked Questions
PIM requires Entra ID P2. This is included in Microsoft 365 E5 or available as an add-on. It is not included in Business Premium, E1, or E3.
Yes. Keep 2 break-glass emergency accounts as permanently active Global Admins and make all other admin assignments eligible.
Break-glass accounts are emergency Global Admin accounts not enrolled in MFA and excluded from Conditional Access policies. Used only if PIM or MFA is unavailable.