You can find additional information about such changes in additional feature and service specific audit trails. For example, Azure AD Privileged Identity Management (PIM) manages just-in-time (JIT) user role assignments. If you want to learn about changes to user role assignments that originate in Azure AD PIM, the Audit History report from the Azure AD PIM user experience in the Azure portal (portal.azure.com) provides information beyond what is available in the Azure audit trail.
The Actor that is listed in audit reports from the Azure Management Portal represents the user or service principal that makes the change in Azure AD. In Azure AD PIM, the service principal is named "MSPIM." By examining the Audit History log in the Azure AD PIM user experience, you can find additional information about role changes that are started through the Azure AD PIM service. Other services and third-party products have their own service principal.
Therefore, if you are using Azure AD PIM, we recommend that you also collect audit reports about changes in administrator roles from the Audit History in the Azure AD PIM user experience in the Azure portal (portal.azure.com). Similarly, other services in Microsoft Online Services may generate their own audit trail in addition to the log that is generated by Azure AD. Third-party products and services may also change user role assignments.
- Add member to role
- A user who is eligible for an Azure AD management role sets her role to Active in the PIM experience.
- A Privileged Role Administrator changes a user's role from Eligible to Permanent in the PIM experience.
- Remove member from role
- A user deactivates his role assignment, reverting it to Eligible for activation.
- A user role assignment expires and reverts to Eligible for activation.
- A Privileged Role Administrator changes a user's role from Permanent to Eligible.
Artikelnummer: 3175279 – Letzte Überarbeitung: 01.07.2016 – Revision: 1