In Microsoft environments, groups are everywhere. They grant access to SharePoint sites, Azure subscriptions, applications, file shares, and administrative roles (should be solved by PIM but you see them in the wild). But what happens when group membership becomes permanent, undocumented, and invisible?

That’s where Privileged Identity Management (PIM) for Groups comes in.

With Microsoft Entra ID, organizations can apply just-in-time (JIT) access not only to roles but also to security and Microsoft 365 groups.

Let’s break down why this matters.

The Hidden Risk of Permanent Group Membership

Many organizations already use Microsoft Entra Privileged Identity Management (PIM) to secure highly privileged roles such as Global Administrator and Application Administrator.

If you’re not leveraging PIM yet, I strongly recommend implementing it.
Niklas Tinner has you covered on how to do it right:

Privileged Identity Management (PIM) concept + setup
Introduction Privileged Identity Management (PIM) is no longer a hidden gem in the Microsoft cloud ecosystem. It was originally released almost 10 years ago! I know there is already a lot of great content out there on it, but this blog post will be my personal summary. What to expect

Here’s the oversight:

  • Security groups grant access to production systems.
  • Microsoft 365 groups provide access to sensitive Teams and SharePoint data.
  • Role-assignable groups are used to delegate Azure RBAC roles.

And yet, membership is often:

  • Permanent
  • Not reviewed
  • Not time-bound
  • Not approved

This creates standing privilege, which contradicts Zero Trust principles.

What Is PIM for Groups?

PIM for Groups extends just-in-time access to:

  • Security Groups
  • Microsoft 365 Groups
  • Role-Assignable Groups

Instead of being a permanent member, users become eligible members.

When access is needed, they:

  1. Activate membership
  2. Provide justification
  3. Complete MFA
  4. Get approval (if configured)
  5. Receive time-bound access

After expiration, access is automatically revoked and the member is removed from the group.

Why This Is a Game-Changer

1. Enforces Least Privilege

Users only have access when required and not 24/7.

2. Reduces Lateral Movement Risk

If an attacker compromises an account, they don’t automatically inherit high-impact group permissions by default. Apart from that you can secure them with an Authentication Context where you enforce Phishing-resistant MFA on every PIM-action.

3. Improves Audit & Compliance

Every activation is logged in Microsoft Entra ID audit logs and can be exported to Microsoft Sentinel or other SIEM solutions.

This provides traceability for ISO 27001, NIS2, FINMA, and internal governance frameworks.

Licensing Requirements

To use PIM for Groups, you need:

  • Microsoft Entra ID P2 licenses
    (or equivalent Microsoft 365 E5 licensing)

This is often already available in security-focused environments but underutilized.

Real-World Use Cases

There are many use cases where you can leverage Privileged Identity Management (PIM) for groups beyond just privileged role assignments.

For example, within internal IT teams, it’s common to see groups such as an "Azure Admins" group that grants elevated permissions. If you want to better secure these types of groups, PIM for Groups allows you to control and monitor membership through just-in-time access, approval workflows, and time-bound assignments.

A particularly valuable use case we experienced is, when you’re working with Entra Domain Services or a traditional Active Directory environment and have Group Writeback enabled via Entra Cloud Sync.

In this setup, groups managed in Entra ID can be written back to managed/on-premises Active Directory, allowing you to extend cloud-based governance such as PIM for Groups into your on-prem AD environment.

Now, consider RDP access. Outside of leveraging it through Global Secure Access, there’s no native way - without third-party tools - to enforce Just-In-Time (JIT) access or secure it effectively.

But here’s the exciting part: With PIM for Groups, you can secure RDP access natively, enabling time-bound, on-demand permissions without relying on external solutions.

💡
Important For this use case, you need either group writeback through Entra Cloud Sync enabled or Microsoft Entra Domain Services. Otherwise, it won’t work, because PIM for Groups and with that the membership is defined entirely in the cloud within Microsoft Entra ID.

🛠 Securing RDP Access with PIM for Groups

Operations engineers can activate:

  • Server access groups
  • Application admin groups
  • Infrastructure management groups

With:

  • Ticket reference enforcement
  • Approval workflows
  • Time-limited access

Enhancements within the workflow you can make:

PIM for Groups supports:

  • Approval workflows
  • Activation duration limits
  • Justification enforcement
  • Ticket number requirements
  • Access reviews
  • Notification policies

Combined with Conditional Access, it becomes a powerful Zero Trust control layer.

1. Checking Licencing Requirements

For each user leveraging PIM or PIM for Groups you need an Entra P2, so check that before heading into the configuration

https://m365maps.com/files/Entra-ID-Paid.htm

2. Setting up Authentication Context + CA Policy

Before we start with the PIM configuration, we make a smart step and pre-configure our CA Policy for requiring phishing-resistant MFA while

Under Conditional Access navigate to Authentication Contexts and create a new authentication context:

After that, go ahead and create a new conditional access policy (scoped to all users) and select the created authentication context:

You can now configure the Grant control to require a specific authentication strength. Whenever possible, choose a phishing-resistant method to significantly increase security. If the required option isn’t available, navigate to the Authentication Strengths settings. There, you can review the predefined strengths or create a custom one tailored to your requirements, which will then become selectable in your policy.

Finally, configure the Sign-in frequency to Every time. This ensures that phishing-resistant MFA is enforced for each PIM activation, requiring strong authentication.

After that, set the CA Policy to On and head back to the PIM settings.

2. Configuring the group

The group configuration is straightforward: create a security group, then navigate to the Privileged Identity Management section to configure the required settings.

Important sidenote
Whenever you assign privileged roles to a group (whether using PIM or not), ensure that you enable the immutable switch during group creation by selecting "Microsoft Entra roles can be assigned to the group." This setting ensures that only Privileged Role Administrators and Global Administrators can assign roles to the group. If this option is not enabled, it may lead to potential privilege escalation.

After enabling it, head to Settings > Member

Now you can configure the settings for PIM for this group and select the created authentication context and set the workflow settings - if you have configured PIM for privileged roles, this process is similar to it

Configure the Assignment settings according to your governance policies. For lifecycle and compliance reasons, I recommend avoiding permanent active assignments.

⚠️
Permanent eligible roles allow you to designate users as always eligible to join the PIM-configured group. Use this feature with caution, as it may bypass governance controls.

Now set the notification settings as you prefer

3. Add the assignments

Now after you have configured and saved the settings you can proceed and add the eligible members:

After that, the user is now able to use PIM and becoming a member of the group.

4. Activate the group membership

The user can now head into the Entra ID portal > ID Governance > My Roles > Groups and activate the role

After we click on activate the authentication context gets active and prompts us to continue with an additional verification step, where we do need to complete Phishing-resistant MFA - we additionally must insert informations about the Ticket number and a Reason.

After completing MFA, the user is added to the group, and the backsync synchronizes them into the on-premises group. In our setup, we use Entra Domain Services, with Entra ID as the source of truth, which syncs all Entra ID objects into Active Directory.

The only thing we must ensure is, that the selected group has now the needed RDP access for example.

💡
Thats just one useful usecase for PIM for Groups and I am sure, you will find many more in your environment 😉

Common Implementation Mistakes

We often see the feature mostly left unused or misconfigured for high-impact groups:

  • ❌ Using PIM for roles, but not for groups
  • ❌ Leaving role-assignable groups permanently assigned
  • ❌ No approval workflow for high-impact groups
  • ❌ No monitoring of activation patterns

In my opinion, PIM for Groups should be an integral part of your overall Privileged Access Strategy.

Strategic Recommendation

  1. Identifying high-impact groups
  2. Converting permanent members to eligible
  3. Implementing approval + justification
  4. Enabling logging and alerting
  5. Conducting quarterly access reviews

Begin by identifying high-impact groups by determining which accounts and permission groups carry particularly high risk or extensive access rights through groups. Permanent members of these groups should then be transitioned into eligible, but not continuously active, roles so that privileged access is granted only when genuinely needed. Where possible use PIM (Role-based).

Building on this, implement a clear approval and justification process to ensure that every activation is traceable and controlled. Complement this with comprehensive logging and alerting to detect suspicious activity at an early stage within your SIEM. Finally, conduct quarterly access reviews to regularly validate permissions and promptly remove any rights that are no longer required. This approach significantly reduces the attack surface while keeping additional operational effort to a minimum.

Final Thoughts

Zero Trust isn’t just about authentication. It’s about eliminating standing privilege everywhere including group membership. PIM for Groups and PIM itself is one of the most overlooked yet powerful controls inside Microsoft Entra ID.

If you’re already using PIM for roles, this should be your logical next step. 😉

⚠️ Disclaimer

The configurations shared in this post reflect my personal approach to solving this specific challenge. Every environment is unique, so adapt these solutions to fit your needs.

Happy configuring! 😊

The link has been copied!