AAD Privileged Identity Management: Use Time Based and Approvals with High-Privileged Account

Published April 13, 2022

Security Best Practices: Using Time-Based Restrictions and Approvals for Activation of High Privilege Accounts

When engaging with our clients, security and the following best practices are always a top priority. A typical engagement always means that we use a dedicated client and project site in our Microsoft 365 (M365) tenant to collaborate with our clients and to share information in an efficient and streamlined fashion. We provide our clients with guest access using our Extranet User Manager product, to ensure that all project related information is readily available 24/7.

More often than not, our clients also provide us with access credentials into their Production M365 tenants with admin privileges, which begs the question: how do we use these elevated admin privileges only when absolutely necessary? Not only is this very important for us as an organization from a liability and compliance point of view, but this also helps to promote security best practices and minimize the risk for our clients.

Azure AD (AAD) Privileged Identity Management to the Rescue

Effective identity management of all users accessing resources on an organization's M365 platform is of paramount importance. System administrators must utilize all tools at their disposal to ensure that users have access to only the resources they need, when they need it. This is where AAD privileged identity management comes into the picture. Among its most important features is the ability to assign Azure AD roles to a particular account and to control the activation of these roles through an approval process that ensures admin are aware at all times of who has access to what and with what level of privileges.

The following is a Privileged Identity Management workflow example that illustrates the high-level workflow involved in requesting access for assigned account roles.

Privileged Identity Management Workflow Example

Prerequisites

For the successful configuration of AAD Privileged Identity Management, one of the following licenses is required:

  • Azure AD Premium P2
  • Enterprise Mobility + Security (EMS) E5

The following is a brief guide on how to set up a global admin account such that it is requested, approved, and activated only when needed for essential admin tasks. This practice can be used for many types of roles but our focus for this article centres around global admin privileges; for a full set of features check out this Microsoft article.

Setting Up Time Limited Temporary Privileges Access: Administrator Tasks

The following is a step-by-step guide on how to set up global access privileges on a time-limited basis with an approval process. Activation requests are sent to configurable administrators for approval. User accounts should have already been provisioned in Azure AD.

  1. Login to portal.azure.com with an existing global admin account
  2. Click on "All Services"
  3. Search for "Azure AD Privileged Identity Management"
  4. Click on "Azure AD roles"
  5. Click on "Assign Eligibility"
  6. Search for "Global Administrator" in the "Search by role name" search box and select
  7. Click "Add assignments"
  8. Select members
  9. The following screen appears:
  10. Click Next
  11. "Assignment type" will be "Eligible"
  12. And confirm the "Permanently eligible" checkbox is checked
  13. Click Assign
  14. The user will appear under the "Eligible assignments"
  15. Now select "Settings"
  16. Click "Edit"
  17. Under "Activation", select the "Require approval to activate" checkbox
  18. Click "Select approvers" and select the approvers
  19. Click "Select" and then "Update"

User Tasks - Request Account Activation

  1. Login to portal.azure.com
  2. Navigate to All Services > Privileged Identity Management
  3. My roles
  4. An assignment for global admin will be displayed
  5. Click activate
  6. Set the duration of the assignment (up to 8 hours)
  7. Enter a reason for the session
  8. Click the activate button
  9. A notification will appear with the title "Your request is pending approval"

Administrator Tasks - Approve Requests

  1. Login to portal.azure.com
  2. Navigate to All Services > Privileged Identity Management
  3. Click on approve requests
  4. Under requests for role activation, click approve
  5. Enter a justification in the approval request screen
  6. Click the confirm button
Latest Articles
Part 2: Why Oversharing Is Your Biggest Copilot Risk (and How to Fix It) November 18, 2025 Part 2 of "Building Your 90-Day Microsoft Purview Rollout" emphasises a common overlooked risk in Mi…
Protecting Data Everywhere: Integrating with Microsoft Purview Information Protection November 13, 2025 As data travels through emails, Teams, cloud services, and AI tools, safeguarding sensitive data bec…
How We Leverage Microsoft 365 Backup with EUM Upgrades November 10, 2025 Envision IT now provides Microsoft 365 Backup—an enterprise-grade solution for protecting OneDrive, …
Building Your 90-Day Microsoft Purview Rollout — Part 1: The 90-Day Purview Rollout Plan November 6, 2025 Microsoft Purview Information Protection offers deep integration across Microsoft 365, Azure, and th…
Ready for Copilot? Ensure Your Data is Secure First with Microsoft Purview October 23, 2025 Ready for Copilot? Start with Governance. Learn why Microsoft Purview is the foundation for secure C…