SC‑300 Study Portal Path 5

Unit 6: Exercise – Assign Azure resource roles in Privileged Identity Management

In this unit, you learn how to assign Azure resource roles using Microsoft Entra Privileged Identity Management (PIM). Unlike Microsoft Entra directory roles, Azure resource roles apply to subscriptions, management groups, resource groups, or individual Azure resources.

Using PIM for Azure resources ensures:

Azure resource roles supported by PIM

PIM can manage:

Common examples include:

Part 1: Discover and onboard Azure resources into PIM

Before assigning Azure roles, the resource must be onboarded into PIM.

Step 1: Open Privileged Identity Management

Step 2: Open Azure resources in PIM

This section is used only for Azure RBAC roles, not Microsoft Entra roles.

Step 3: Discover Azure resources

The discovery experience shows:

Step 4: Select and onboard a subscription

Step 5: Confirm onboarding

This action:

Part 2: Assign an Azure resource role (Eligible)

Step 6: Open the onboarded resource

This opens the resource overview page.

Step 7: View available Azure roles

This displays:

Step 8: Add a new role assignment

Step 9: Select role and member

Step 10: Configure assignment type and duration

Step 11: Configure assignment duration

This controls how long the user remains eligible.

Step 12: Complete the assignment

A status notification confirms that the role assignment was created successfully.

Part 3: Update or remove an Azure resource role assignment

Step 13: Open role assignments

Step 14: Review eligible assignments

Step 15: Remove a role assignment

The role assignment is removed immediately.

Key differences: Azure roles vs Microsoft Entra roles (exam focus)

AreaMicrosoft Entra rolesAzure resource roles
ScopeDirectory-wideSubscription / resource
Managed in PIM sectionMicrosoft Entra rolesAzure resources
Requires onboardingNoYes
RBAC modelEntra RBACAzure RBAC
Common examplesGlobal AdminOwner, Contributor

Key exam takeaways