SC‑300 Study Portal Path 5

Unit 3: Configure Privileged Identity Management for Azure resources

Privileged Identity Management (PIM) for Azure resources extends the same just-in-time, approval-based, and auditable access model used for Microsoft Entra roles to Azure subscriptions, management groups, and resources.

This capability is especially useful for:

Unlike Microsoft Entra roles, Azure role assignments directly control access to infrastructure and workloads. Improperly managed Azure roles can result in data exposure, service outages, or unauthorized changes to critical systems.

When to configure PIM for Azure resources

You should configure PIM for Azure resources when:

Best practice: There is no technical limit to how many Azure resources can be managed by PIM, but Microsoft recommends starting with your most critical production resources and expanding gradually.

Discover Azure resources for PIM management

Before Azure resources can be protected by PIM, they must be discovered and onboarded into PIM. Discovery identifies management groups and subscriptions that you have permission to manage.

Required permissions

To discover and manage Azure resources in PIM, you must be:

Step-by-step: Discover Azure resources

Launch the discovery experience

This opens the discovery interface where you can identify resources eligible for PIM management.

Filter and select resources

Important concept: When you manage a management group or subscription in PIM, you can also manage its child resources.

Manage selected resources

If prompted to confirm onboarding:

Once confirmed, the selected Azure resources are now under PIM management.

Managing child resources

When a management group or subscription is managed by PIM:

This ensures deliberate control over which resources are governed by PIM.

What changes after onboarding Azure resources into PIM

Once an Azure resource is managed by PIM:

Key takeaways for Unit 3