Skip to content

Conversation

jonwbstr
Copy link

@jonwbstr jonwbstr commented Aug 8, 2025

As a partner I opened ticket 2502260010001012 back in February of this year. According to the response I received on that ticket today,

The recommended approach to workaround [Accounts using PIM not receiving email] is to have enabled admin accounts for "Break Glass" scenarios, assign an email account and then forward all notifications to a DL. We have a well documented procedure to configure it and it will allow you to get the notifications:Manage emergency access admin accounts - Microsoft Entra ID | Microsoft Learn.

This is a similar approach to the one I believe you’re currently applying as per our last conversation.

Since this article doesn't even give a gist of how to do what they indicate is well documented, I propose the following changes so that supports assessment of this article is at least sort of correct. Feel free to improve upon this guidance. Creating step by step guidance on how to make the break glass account mail enabled and setup the forward is not a high priority to me considering support believes the article already has that information. Hopefully someone on your team is already working on this!

This is the article where I was expecting to find the guidance support says exists in this article.
https://learn.microsoft.com/en-us/microsoft-365/business-premium/m365bp-protect-admin-accounts?view=o365-worldwide#create-a-user-account-for-yourself

Hope this helps!
-jon

According to ticket 2502260010001012 this article describes the workaround of using the break glass account to forward admin email notifications to admin accounts configured with PIM, or following Microsoft's guidance to have separate unlicensed global admin accounts and licensed mail-enabled users with no admin roles found in the following article

https://learn.microsoft.com/en-us/microsoft-365/business-premium/m365bp-protect-admin-accounts?view=o365-worldwide#create-a-user-account-for-yourself
Copy link
Contributor

@jonwbstr : Thanks for your contribution! The author(s) and reviewer(s) have been notified to review your proposed change.

Copy link
Contributor

Learn Build status updates of commit 6aca61c:

💡 Validation status: suggestions

File Status Preview URL Details
docs/identity/role-based-access-control/security-emergency-access.md 💡Suggestion Details

docs/identity/role-based-access-control/security-emergency-access.md

  • Line 63, Column 134: [Suggestion: preserve-view-not-set - See documentation] You've pinned this link to a specific version of content with the view parameter. It's recommended not to pin a version unless that version is A) not the default view and B) the context is about that version specifically. To proceed with pinning a version add the &preserve-view=true to the URL. Otherwise, remove the view parameter. URL: /microsoft-365/business-premium/m365bp-protect-admin-accounts?view=o365-worldwide&source=docs#protect-admin-accounts

For more details, please refer to the build report.

Note: Your PR may contain errors or warnings or suggestions unrelated to the files you changed. This happens when external dependencies like GitHub alias, Microsoft alias, cross repo links are updated. Please use these instructions to resolve them.

@jonwbstr
Copy link
Author

jonwbstr commented Aug 8, 2025

I'll fix the link and try again

@jonwbstr jonwbstr closed this Aug 8, 2025
@jonwbstr
Copy link
Author

jonwbstr commented Aug 8, 2025

New pull request is #1708

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants