You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritise this request
Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritise the request
If you are interested in working on this issue or have submitted a pull request, please leave a comment
Description
Currently, there is no native support in the Terraform Azure Provider for managing Just-in-Time (JIT) access to subscription-level roles (e.g., Owner, Contributor, etc.) through Privileged Identity Management (PIM). These roles are critical for managing Azure resources and can pose significant security risks if assigned permanently without appropriate controls.
This feature request proposes adding support for managing JIT eligibility of subscription-level roles via PIM, allowing users to be made eligible for specific roles at the subscription or resource group level. Activation would then be possible by azurerm_pim_active_role_assignment.
By implementing this feature, organizations would be able to automate the assignment of eligible roles to users (e.g., Owner, Contributor) within Azure subscriptions and resource groups, and enforce a temporary activation process for those roles to minimize the risk of excessive privileges and improve security. Currently a role assignment can be given, via azurerm_role_assignment, however, for security reasons it would be better to prevent granting privileges permanently.
Since the Azure AD provider is only for Entra / Azure AD i think the PIM role management for resources is out of scope and better handled in the Azure RM provider.
Community Note
Description
Currently, there is no native support in the Terraform Azure Provider for managing Just-in-Time (JIT) access to subscription-level roles (e.g., Owner, Contributor, etc.) through Privileged Identity Management (PIM). These roles are critical for managing Azure resources and can pose significant security risks if assigned permanently without appropriate controls.
This feature request proposes adding support for managing JIT eligibility of subscription-level roles via PIM, allowing users to be made eligible for specific roles at the subscription or resource group level. Activation would then be possible by
azurerm_pim_active_role_assignment
.By implementing this feature, organizations would be able to automate the assignment of eligible roles to users (e.g., Owner, Contributor) within Azure subscriptions and resource groups, and enforce a temporary activation process for those roles to minimize the risk of excessive privileges and improve security. Currently a role assignment can be given, via
azurerm_role_assignment
, however, for security reasons it would be better to prevent granting privileges permanently.New or Affected Resource(s)
azurerm_pim_eligible_role_assignment
Potential Terraform Configuration
The text was updated successfully, but these errors were encountered: