From cf4cbe2250db218254f969df534828260abd39ab Mon Sep 17 00:00:00 2001 From: Peter Lorenzen Date: Thu, 24 Oct 2024 19:22:11 +0200 Subject: [PATCH] Update pim-resource-roles-assign-roles.md --- .../pim-resource-roles-assign-roles.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/id-governance/privileged-identity-management/pim-resource-roles-assign-roles.md b/docs/id-governance/privileged-identity-management/pim-resource-roles-assign-roles.md index 23f6484bcad..780d16a7639 100644 --- a/docs/id-governance/privileged-identity-management/pim-resource-roles-assign-roles.md +++ b/docs/id-governance/privileged-identity-management/pim-resource-roles-assign-roles.md @@ -47,7 +47,7 @@ For more information, see [What is Azure attribute-based access control (Azure A Follow these steps to make a user eligible for an Azure resource role. -1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Access Administrator](~/identity/role-based-access-control/permissions-reference.md#user-administrator). +1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a User Access Administrator. 1. Browse to **Identity governance** > **Privileged Identity Management** > **Azure resources**.