Menu
Modern Workplace Blog
  • Home
  • About: Kenneth van Surksum
  • Cookie Policy
Modern Workplace Blog
March 25, 2020March 26, 2020

Lessons learned while implementing Azure AD Privileged Identity Management (PIM)

In this blogpost I will share my experiences with implementing Azure AD Privileged Identity Management (PIM).  PIM is a service that enables you to manage, control, and monitor access to important resources in your Azure environment. These resources include resources in Azure AD, Azure, and other Microsoft Online Services like Exchange Online, SharePoint Online or Microsoft Intune. 

PIM provides the following functionality: 

  • Just-in-time privileged access to Azure AD and Azure resources 
  • Assign time-bound access to resources using start and end dates 
  • Require approval to activate privileged roles 
  • Enforce multi-factor authentication to activate any role 
  • Use justification to understand why users activate 
  • Get notifications when privileged roles are activated 
  • Conduct access reviews to ensure users still need roles 
  • Download audit history for internal or external audit 

This article will cover the following topics:

  • Securing Privileged Access
  • Licensing
  • Accessing PIM
  • Rights needed
  • How to request rights using PIM
  • How to configure PIM as a Privileged Role Administrator
  • Adding users as Eligible to Azure AD Roles
  • Modifying default role settings
  • How to approve requests for administrative rights
  • Reviewing all given access using Resource Audit
  • Azure Resources
  • Access Reviews
  • Alerts
  • Caveats and challenges
  • Conclusion
  • References

Note: This post reflects the status of Azure AD Privileged Identity Management as of March 24th 2020. Functionality may change, even right after this post has been published.

Securing Privileged Access

Implementing PIM should be part of a wider ranges of actions as described in the following Microsoft Docs article: Securing privileged access for hybrid and cloud deployments in Azure AD, cause besides implementing PIM you should also create emergency accounts, enable MFA, reduce the amount of people holding high privilege roles, implement regular access reviews and much more. Have a look at the documentation, it provides a 4 phased approach and must be part of your implementation.

Stages of the roadmap with time lines
The 4 stages for securing privileged access

Licensing

In order to use PIM, the account which benefits from the service (your Admin accounts) must be licensed for Azure AD Premium P2 (or any suite license having P2 on board) which has a list pricing of € 7,59 per user per month, see my other article titled: License requirements for administering Microsoft 365 services for some more context on that subject.

Azure AD Premium P2 license needed

Accessing PIM

Azure AD PIM is available via the Azure Portal (but also via the Azure AD admin center), you can search for it under All services, type in the first letters in this example “Pri” and Azure AD Privileged Identity Management should already be available in the list. If you hover over it, you can select the “star” which makes PIM available in the hamburger menu of your Azure portal page.

Machine generated alternative text:
Microsoft Azure 
All services 
Overview 
Categories 
All 
General 
Compute 
Networking 
Storage 
Web 
Mobile 
Containers 
Databases 
Analytics 
Blockchein 
Al + machine learning 
Internet of things 
Mixed reality 
Integration 
Identity 
Security 
Devops 
Migrate 
Monitor 
Management + governance 
Sesrcf7 resources, services. Enc docs (G+/) 
Private Link 
KeywdE 
Blueprints 
Azure Spring Cloud 
Integration accounts 
KeywdE Int.gGt& 
Q 
O 
PREVIEW 
PREVIEW 
PREVIEW 
o 
Private DNS zones 
KeywdE 
user privacy 
Bing Maps API for 
e 
nterprise 
Azure AD Privileged Identity Management 
KeywdE 
Azure AD Privileged 
Identity Management 
View 
https://portaI.azure.com/#bIade/Microsoft_Azure PIMCommon/CommonMenu81ade
Finding Azure AD Privileged Identity Management in the list of All Services

Rights needed

The first user enabling PIM will also receive the “Privileged Role Administrator” role, if you want to configure anything in PIM, being a Global Administrator is not sufficient, you’ll need the Privileged Role Administrator rights. Microsoft also mentions that the first account enabling PIM will receive the Security Administrator role, but I have no idea what the purpose of that would be. I successfully tested and was able to execute all tasks being a “Privileged Role Administrator” only.

How to request rights using PIM

An user accessing PIM can request to activate roles for which “eligibility” has been defined by a Privileged Role Administrator, how to do this will be described later in this post. In the example below we are going to request the Device Administrator rights. (which is actually a bad example, more on that later)

  • Start page, when accessing Azure AD Privileged Identity Management
  • Go to Tasks | My roles -> Eligible roles to see which roles are available to you
  • When selecting the Active Roles tab you can see which roles are currently enabled for your account
  • If you want to activate a Eligible role, you must click on Activate
  • In the Activate – Device Administrators screen you can use the slider to modify the duration and provide a reason (mandatory) on why the rights are needed
  • After clicking on Activate, a 3 stage process is being executed, after which the user must sign out
  • The user requesting roles, has audit information for his/her account available under My Audit History

The Microsoft best practice is only perform administrative duties on a so called “Privileged Access Workstation” also known as PAWs, see also Microsoft Cybersecurity Reference Architecture. For companies which do not have this implemented yet, it becomes tricky – let me explain why:

Most of the time, we use the so called “Manage People” or “Profiles” functionality provided by Modern browsers like Google Chrome or the new Microsoft Edge. Some users like to start their browser session for administrative purposes using InPrivate browsing.

You might have noticed the following behavior: If you work with the profile functionality in your default browser and open a link from an email, that link is opened in the last activated browser instance used. So, hypothetically if an user with administrative credentials logged in under his/her normal credentials receives a malicious email with a link which opens in a browser session having just received administrative rights, then you might have a serious security issue at your hands.

If you therefore cannot make use of PAWs, I advise to at least use a different browser for your administrative tasks. For example, use the new Edge for your normal browsing and set Edge as the default browser, and use Google Chrome for your administrative tasks.

How to configure PIM as a Privileged Role Administrator

When you have the Privileged Role Administrator role, you’ll notice that the “Assign Eligibility” option is not greyed out – for me personally this is the easiest indication that you can configure the roles within PIM.

Validate Privileged Role Administrator rights

Adding user as Eligible to Azure AD Roles

You can add users to roles using the following example, in this example we are going to add Ferry Kuhlman to the Billing Administrator role

  • Azure AD roles are available under Manage | Azure Roles , then continue to Manage | Roles -> Select the Billing Administrator role
  • Under Billing Administrator | Assignments you can see the currently Eligible users
  • When clicking on Add member, the following screen opens, under select a member select the user who you want added to this role
  • In this example, our user Ferry Kuhlman will be Eligble for the role within a timeframe of a year
  • Once saved, you can see that the user is now listed under Eligible roles
  • The users should now see, the new defined role as role to be activated

Modifying default role settings

Each role has some default settings, which can be modified individually. You can do this by clicking on either on Settings or on Role Settings, within the selected role. The same settings are accessible via Settings under the Manage section in the main portal.

From here you can make some adjustments for when this role is assigned to a user using PIM, you can modify these default settings by clicking on Edit. This will open the Edit role settings configuration wizard.

  • Modify role settings
  • Available settings for the Billing Administrator.
  • Activation tab
  • Assignment tab
  • Notification tab

The Edit role settings are provided in a tabbed wizard. The first tab provides settings for Activation of the role, here you can define the maximum duration of the activation, whether MFA is required for activation of the role, whether the activation must be justified, ticket information must be added and if the request must be approved. If so, here you can provide either a user or group who can approve the request.

The second tab provides settings for Assignment, here you can define whether the Eligible assignment can be assigned permanently (still get it?) or if each Eligible assignment should expire after a certain timeframe. Whether someone can be assigned permanently to the role (so the role is always active), and if that assignment expires whether or not. It’s also possible to require MFA when active assignments are being activated, and if justification for active assignments are needed.

The last tab provides settings for Notification, by default role assignment alerts are send to “Admin”, which translates to everyone having the Global Administrator role either permanent or eligible. When critical emails only is selected PIM only sends out emails requiring an immediate action.

How to approve requests for administrative rights

When approvement of the requested rights is needed, the user requesting the rights fills in the request form as normal. Instead of being activated directly, the request will have the status of Pending approval.

  • The user requesting the role should justify the reason why
  • After requesting the role, it will have the status of Pending Approval
  • The user or group defined who can approve this request, receive an email which looks similar to this one
  • The user who can approve the request, can select the request and either Approve or Deny the request.

Reviewing all given access using Resource Audit

As a Privileged Role Administrator you can use the Resource Audit functionality to review of the PIM activities, in the example below we filtered on Ferry and provided a very specific timeframe. If you click Export, a .CSV file will be downloaded which then can be used in either Excel, or even better PowerBI

Machine generated alternative text:
Microsoft Azure 
Dashboard > 
Resource audit 
Resource audit 
Identity 
Quick start 
Tasks 
My roles 
Pending requests 
Approve requests 
Review access 
Manage 
Roles 
R Members 
Alerts 
Access reviews 
Settings 
Activity 
al Resource audit 
My audit 
Export 
Time span 
Custom 
Sesrch resources, sennces. Enc docs (G +/) 
Audit type 
All 
Q 
O 
Original requestor 
Member 
Subject type 
All 
Primary target 
Billing Administrator 
Billing Administrator 
Billing Administrator 
Billing Administrator 
ksurksum@insight24.nl 
INSIGHT2a av. 
Status 
x 
v 
start 24-03-2020 19:1 5:00 
End 24-03-2020 
p Ferry 
Time 
24-3-2020 p.... 
24-3-2020 p.... 
24-3-2020 p.... 
24-3-2020 p.... 
Requestor 
Ferry Kuhlman 
Kenneth van Surksum 
Ferry Kuhlman 
Ferry Kuhlman 
Add member to role completed (PL.. 
Add member to role request appro... 
Add member to role approval requ... 
Add member to role requested (PI... 
Resource name 
Insight24 B.V. 
Insight24 B.V. 
Insight24 B.V. 
Insight24 B.V. 
Scope 
Insight24 B.V. 
Insight24 B.V. 
Insight24 B.V. 
Insight24 B.V. 
Subject 
Ferry Kuhlman 
Ferry Kuhlman 
Ferry Kuhlman 
Ferry Kuhlman 
Subject type 
user 
user 
user 
user 
https://portal.azure.com/#bIade/Microso ft_Azure_ PI MCommon/ResourceMenu 8 lade/ RoleSe ttings/res...
Resource Audit

Azure resources

Besides providing access to Azure roles, it’s also possible to use PIM to give access to your Azure resources.

In order to do so, the Azure resources must be discoverable, if you want to discover all it’s best to discover the Root Management Group since that will cover all subscriptions underneath. In the example below we will add a subscription.

  • Azure resources are available under Manage, click on Discover resources to discover
  • Once resources are discovered, you can manage them
  • Confirm to continue
  • For the resource, a dashboard with the current situation is availalbe
  • For the currently Active roles, we can modify them from Permanent to Eligible for example

Access Reviews

Access reviews are tasks with the purpose of reviewing who is member of a Azure AD role, for highly privileged roles it’s recommended to create Access Reviews which are performed by a Security administrator for example.

  • When creating Access Reviews some information must be provided
  • Some advanced settings are available as well
  • Once created the Access review will be visible under Access reviews
  • If a access review is needed, the user conducting the access review receives an email similar to this one
  • The reviewer can see the access review in the portal
  • In the review, the user can see who is currently an Global Administrator
  • The users can be selected, a justification must be provided and the access can either be Approved or Denied, depending on the settings in the Access review this can then be activated directly
  • A dashboard with the outcome of the access review is available

Alerts

Alerts can help to keep the environment optimized, it would better to call them recommendations, since they don’t provide the same functionality as Alerts in for example Azure Monitor. The following “Alerts” are available:

  • The organization doesn’t have Azure AD Premium P2
  • Roles don’t require multi-factor authentication for activation
  • Administrators aren’t using their privileged roles
  • Roles are being assigned outside of Privileged Identity Management
  • Roles are being activated too frequently
  • Potential stale accounts in a privileged role
  • There are too many global administrators
  • Active alerts
  • All available alerts
  • Edit alert setting example

Caveats and challenges

Based on my experiences so far, I found the following challenges, missing functionality and caveats.

Admins in notifications and no options to define default settings applicable to all roles at once

When you modify the role, you can define the notifications. For example, a Role activation alert is by default sent to Admin. But who is Admin? – after some testing I found out that Admin are permanent and eligible Global Administrators, and not the Privileged Role Administrator.

While you can provide additional recipients, you have to define that per role, which is a lot of work.

Feedback item: PIM – Configure default settings for all role assignments

Logging out from browser necessary in order to activate roles

I’ve seen a lot of admins struggle with the fact that they must logout from the browser and login again in order to receive their rights. While the reason for this is somewhat obvious when you are used to adding rights to on-premise accounts, I sometimes see issues where not all browser windows are closed and users have some strange experiences.

Not available from any of the other (Security) portals (M365,O365)

Azure AD PIM is only available to start from the Azure portal (or the Azure AD Admin portal) – but most of the time the rights are used for Intune, Exchange, SharePoint and other Office 365 related tasks. I would be nice to have links to PIM or PIM integrated from the portals in those environments as well.

Feedback item: PIM in Office 365 Admin Portal

You cannot make modifications to your own account

While from a security perspective this makes sense, you are not able to modify your own account. So when you are finished setting up PIM, make sure that you ask one of your colleagues to help you setup your own account correctly in PIM as well.

Exchange Administrator and other roles can take a while to propagate

In my experience it takes too long to propagate the Exchange Service Administrator role into the Exchange Administrative Center (EAC). In my experience it takes sometimes more than 20 minutes before the activated rights to become effective, which is not acceptable.

Experiences a similar issue while after activating the Global Administrator role, I was not able to make modifications to a Conditional Access policy. Even though the Azure AD portal listed me as a Global Administrator. After waiting a while, logging out and back on again, I was able to save the changes in the Conditional Access policy.

Microsoft recommends the following in that case:

In case of any delay after activation, follow these steps after you activate to use your Azure AD roles immediately.

  1. Open Azure AD Privileged Identity Management.
  2. Select My roles to see a list of your eligible Azure AD roles and Azure resource roles.
  3. Select Azure AD roles.
  4. Select the Active roles tab.
  5. Once the role is active, sign out of the portal and sign back in. The role should now be available to use.

Feedback item: PIM to work correctly with the Exchange Admin role

Device Administrator takes a long time to propagate

Keep in mind that Device Administrators are being added to the local administrator group of your Azure AD joined machines, even though the group is added, it can take up to 4 hours (the refresh time of the client) before a change to the group is reflected on the client itself. I’ve even seen longer times in the forums. Therefore using PIM for the Device Administrator role is not acceptable yet. See also my other blogpost on this topic: Challenges while managing administrative privileges on your Azure AD joined Windows 10 devices

Sometimes roles must be activated if you want to add them to other Azure AD configurations

Let’s take for example Admin consent requests, here you can define the users who can perform reviews. When selecting you can select only the active members of the Global, Application or Cloud Application Administrator role. Workaround is to either ask any users who you want to include to activate their role, or to make users temporarily permanent member of the role, include in reviewers and then make them Eligible again.

Feedback item: Make sure that in some situations Eligible users are selectable

Some more granular roles missing

Besides Exchange Service Administrator, EOL provides some other custom roles not available through Azure AD. It’s therefore not possible to make these roles available via PIM

Feedback item: Azure PIM support for custom Exchange RBAC Role Groups

Alerts are not send out

Alerts are only available in the console, no options to send them to other products like Azure Monitor, or email them when they are raised.

Feedback item: Expose AzureAD PIM Alerts via an API

Access Reviews on Azure roles

Currently it’s not possible to define Access Reviews on Azure roles, like contributor.

Feedback item: Access review

You cannot activate multiple roles at once

Say, for example you want to activate both Exchange Service Administrator and User Administrator you have to do that twice, which is time consuming.

I’ve found a utility called: “PIM ME NOW !” which is written by Jan Geisbauer which is capable of activating multiple roles at once. Jan provides the source, and some good examples on how to use the tool,

Feedback item: Be able to select multiple roles for a single user in PIM

License needed on your Admin account

See also my other blogpost on this topic, I really hope Microsoft is going to clarify this soon and make every license person based on not account based. See also my other blogpost on this topic: License requirements for administering Microsoft 365 services

Conclusion

While this article only touched some of the functionality that PIM provides I hope it gives a good idea of what it can do.

Even though there are many issues and caveats with the product, it’s still better than not having it implemented at all. Let’s hope Microsoft addresses the faced challenges with Azure AD PIM on short notice, making it an even more attractive must have tool.

References

License requirements for administering Microsoft 365 services

Securing privileged access for hybrid and cloud deployments in Azure AD

Create an access review of Azure AD roles in Privileged Identity Management

PIM ME NOW !

Tweet
Follow me
Tweet #WPNinjasNL

Continue Reading

← License requirements for administering Microsoft 365 services
Azure AD Identity Protection deep dive →

13 thoughts on “Lessons learned while implementing Azure AD Privileged Identity Management (PIM)”

  1. Bilal Zuberi says:
    June 2, 2020 at 3:33 am

    Hi, excellent post. Question, did you run into any production issues or other issues when enabling PIM for Azure Resources?

    Reply
    1. Kenneth says:
      June 15, 2020 at 12:46 pm

      Hi Bilal,

      Sorry for my late reply.
      To be honest, I haven’t done a big implementation in a production environment yet, so for now it was only limited to setting this up and verifying in my own test environment. I’m planning an implementation of PIM for Azure Resources at this moment though and if I find any lessons learned I will definitely post them online.

      Regards,
      Kenneth

      Reply
    2. Derek Davis says:
      August 21, 2020 at 6:33 pm

      I am currently running PIM in production, and have had some issues due to the lack of enterprise features in PIM. For example they didn’t have a search feature for the Azure AD role assignment for months. The Azure resources PIM, is lacking the ability to add users directly to services with RBAC, it must be done at the subscription level. You can also work with management groups to standardize your RBAC and policies for auditing, with Azure PIM you can assign roles to management groups and that would only extend to the subscriptions in that management group. There are other weird things, but by and large it is a pretty good product.

      Reply
  2. Vincent J Ann says:
    June 25, 2020 at 12:55 am

    Thanks for sharing this. Excellent and great attention to detail.

    Reply
  3. Gaurang says:
    August 5, 2020 at 3:43 pm

    Hi Kenneth,

    Nice information sharing and your experience, Thank you. I have one question about managing non-email enabled user who are some sort of Administrators in Azure AD. How do you run access review for such accounts where they need to respond to the reviews, etc.?

    Regards,
    Gaurang

    Reply
    1. Kenneth says:
      August 13, 2020 at 8:58 am

      Hi Guarang,

      I actually found a really nice article written by Michael Mardahl explaining a possible solution, see: https://msendpointmgr.com/2020/08/08/2-for-1-mail-enable-unlicensed-admin-accounts/

      Regards,

      Kenneth

      Reply
  4. Pingback: Assigning groups to Azure AD roles and Privileged access groups, a first look! | Modern Workplace Blog
  5. Pingback: Conditional Access demystified: My recommended default set of policies | Modern Workplace Blog
  6. Pingback: Azure Ad Pim - Start Using Pim - Azure Active Directory | Microsoft Docs
  7. Pingback: First look at Access Reviews for guests in all Teams and Microsoft 365 Groups | Modern Workplace Blog
  8. Pingback: First look at Access Reviews for guests in all Teams and Microsoft 365 Groups - Tech Daily Chronicle
  9. Pingback: Azure Ad Pim Portal » LoginCast.Com
  10. Martinez says:
    December 20, 2021 at 5:24 pm

    Hi,
    We are looking into PIM and seems to work fine.

    The only issue we have is conditional access, we have a conditional access policy that blocks access to the azure portal if there is no role assigned, and to go to PIM you need to go to the Azure portal…..
    Like a chicken and egg problem, does anyone has the same issue and have a nice solution for this ?

    Tnx.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Founding member of:

Recent Posts

  • MAM vs. MDM: Choosing the Right Mobile Management Approach
  • Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)
  • Navigating New Authentication Methods: SMS for Password Reset, Not for MFA
  • From SPF to DANE: Securing Microsoft 365 Email Communications
  • Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals

Books

System Center 2012 Service Manager Unleashed
Amazon
System Center 2012 R2 Configuration Manager Unleashed: Supplement to System Center 2012 Configuration Manager
Amazon
System Center Configuration Manager Current Branch Unleashed
Amazon
Mastering Windows 7 Deployment
Amazon
System Center 2012 Configuration Manager (SCCM) Unleashed
Amazon

Archives

  • February 2025
  • January 2025
  • September 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • September 2023
  • August 2023
  • February 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • May 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • August 2019
  • July 2019
  • November 2016
  • November 2015
  • June 2015
  • May 2015
  • November 2014
  • July 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • November 2013
  • August 2013
  • April 2013
  • March 2013
  • January 2013
  • December 2012
  • November 2012
  • August 2012
  • July 2012
  • June 2012

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Categories

  • ABM (4)
  • Advanced Threat Protection (4)
  • Announcement (44)
  • Azure (3)
  • AzureAD (73)
  • Certification (2)
  • Cloud App Security (5)
  • Conditional Access (58)
  • Configuration Manager (24)
  • Entra (2)
  • Entra Id (8)
  • Events (14)
  • Exchange Online (9)
  • Identity Protection (5)
  • Intune (27)
  • Licensing (2)
  • Microsoft Defender (1)
  • Microsoft Defender for Endpoint (1)
  • Microsoft Endpoint Manager (35)
  • Mobile Application Management (4)
  • Modern Workplace (74)
  • Office 365 (10)
  • Overview (11)
  • Power Platform (1)
  • PowerShell (2)
  • Presentations (9)
  • Privileged Identity Management (5)
  • Role Based Access Control (2)
  • Security (63)
  • Service Manager (4)
  • Speaking (30)
  • Troubleshooting (4)
  • Uncategorized (11)
  • Windows 10 (15)
  • Windows 11 (5)
  • Windows Update for Business (4)
  • WMUG.nl (16)
  • WPNinjasNL (32)

Tags

#ABM #AzureAD #community #conditionalaccess #ConfigMgr #IAM #Intune #m365 #MEM #MEMCM #microsoft365 #modernworkplace #office365 #security #webinar #wmug_nl ATP authentication strength AzureAD Branding Community Conditional Access ConfigMgr ConfigMgr 2012 Email EXO Identity Intune Licensing M365 MCAS MFA Modern Workplace Office 365 OSD PIM Policy Sets Presentation RBAC roles Security System Center Task Sequence troubleshooting webinar

Recent Comments

  • brc on Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals
  • [m365weekly] #186 – M365 Weekly Newsletter on MAM vs. MDM: Choosing the Right Mobile Management Approach
  • Dean Gross on Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)
  • nikhil tech on Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals
  • Kenneth on Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)

This information is provided “AS IS” with no warranties, confers no rights and is not supported by the author.

Copyright © 2021 by Kenneth van Surksum. All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

Shorthand: Don’t pass off my work as yours, it’s not nice.

©2025 Modern Workplace Blog | Powered by WordPress and Superb Themes!
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT