You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
PowerShell automation for Azure Privileged Identity Management.
Bulk-harden role policies. Clone settings across roles. Export assignments. Detect configuration drift. Approve or deny requests. Deploy full PIM models from JSON.
One PowerShell module covering Azure Resources, Entra ID Roles, and Security Groups — with cmdlets that do what the portal can't. Unified ARM and Graph APIs, 50+ commands, 4 Azure clouds.
🌐 Start here → The EasyPIM Adoption Hub walks you from first install to enterprise-grade PIM governance in three stages.
🚀 Quick Start
Install-Module EasyPIM, EasyPIM.Orchestrator -Force
# Harden 3 Entra roles in one shot — try that in the portalSet-PIMEntraRolePolicy-TenantID $tenantId`-RoleName "Global Administrator","Security Administrator","Exchange Administrator"`-ActivationRequirement "Justification","Ticketing","MultiFactorAuthentication"`-ActivationDuration "PT4H"# Audit every eligible assignment across a subscriptionGet-PIMAzureResourceEligibleAssignment-TenantID $tenantId-SubscriptionId $subId# Deploy a full PIM model from JSON — Entra + Azure + Groups in one runInvoke-EasyPIMOrchestrator-TenantId $tenantId-ConfigurationPath "./pim-config.json"
✨ Things The Portal Can't Do
⚡ Bulk-harden roles
Set MFA + justification + ticketing on 30 roles in one command
🔄 Clone role settings
Copy a hardened policy to other roles/users — no manual re-clicking
📊 Export & import
Assignments to CSV, full configs to JSON — audit-ready in seconds
🔍 Detect policy drift
Compare live state vs declared config, get a diff report