Microsoft Entra Privileged Identity Management (PIM) helps organizations reduce security risks by enforcing just-in-time privileged access.
Instead of granting permanent administrator permissions, users are made eligible for admin roles and must activate them only when needed.
In this article, you’ll learn what PIM role activation means, why it matters, and how users can activate their eligible admin roles using both the Entra Admin Center and Microsoft Graph PowerShell.
PIM Eligible Role Activation is the process where a user temporarily enables an administrative role that they are eligible for.
When a user is assigned an eligible role (such as Global Administrator), they do not automatically have admin access. Instead, they must activate the role manually.
Activation provides:
In simple terms:
Eligibility means the role is available. Activation means the role is actually enabled.
Users must activate their PIM eligible roles because eligibility alone does not provide admin access.
When a role is assigned as eligible, it remains inactive by default. The user cannot perform administrative actions until the role is activated.
Activation is required to:
In short:
If a role is eligible, it is available.
If it is activated, it can be used.
Once the required work is done, the role automatically expires after the configured duration.
Follow these simple steps to activate your eligible admin role through the portal.
Step 1: Open Microsoft Entra Admin Center
Go to:
Sign in with your Entra ID user account.
Step 2: Navigate to Privileged Identity Management
From the left-hand menu:
Step 3: Open “My Roles”
Under PIM, click:
This section shows all roles that you are eligible to activate.
Step 4: Select the Role to Activate
Under Eligible assignments, choose the admin role you want to activate, such as:
You may be required to enter: Justification (mandatory in most organizations) and
Activation duration (example: 1 hour)
Step 5: Verify Active Role Assignment
After activation, the role will appear under:
You now have temporary administrator permissions.
Role activation can also be performed programmatically using Microsoft Graph PowerShell.
This is useful for automation or advanced administrative workflows.
$params = @{
"PrincipalId" = "d29e358a-a443-4d83-98b3-499a5405bb5b"
"RoleDefinitionId" = "88d8e3e3-8f55-4a1e-953a-9b9898b8876b"
"Justification" = "Activate assignment"
"DirectoryScopeId" = "/"
"Action" = "SelfActivate"
"ScheduleInfo" = @{
"StartDateTime" = Get-Date
"Expiration" = @{
"Type" = "AfterDuration"
"Duration" = "PT1H"
}
}
}
New-MgRoleManagementDirectoryRoleAssignmentScheduleRequest -BodyParameter $params |
Format-List Id, Status, Action, AppScopeId, DirectoryScopeId, RoleDefinitionID, IsValidationOnly,
Justification, PrincipalId, CompletedDateTime, CreatedDateTime, TargetScheduleID
This script activates the eligible role assignment for one hour (PT1H).
To successfully run this activation script, the user must have the appropriate Microsoft Graph PowerShell permissions, such as:
Without these permissions, the command will fail with authorization or access denied errors.
Always ensure you are connected to Graph using:
Connect-MgGraph -Scopes "RoleManagement.ReadWrite.Directory"
PIM eligible role activation is a critical part of securing privileged access in Microsoft Entra ID.
Instead of providing permanent administrator permissions, PIM ensures:
Whether activating through the Entra Admin Center or using Graph PowerShell, PIM role activation is a best practice every organization should enforce.
Did You Know? Managing Microsoft 365 applications is even easier with automation. Try our Graph PowerShell scripts to automate tasks like generating reports, cleaning up inactive Teams, or assigning licenses efficiently.
Ready to get the most out of Microsoft 365 tools? Explore our free Microsoft 365 administration tools to simplify your administrative tasks and boost productivity.
© Your Site Name. All Rights Reserved. Design by HTML Codex