Open Source · MIT License

Activate PIM roles
without the friction

Three products, one goal: streamline and enhance the Microsoft Entra ID Privileged Identity Management experience.

Three tools, one ecosystem

Choose the integration that fits your workflow — from command-line to cloud portal.

PowerShell Module

Activate and manage PIM eligible roles from the terminal. Supports Entra roles, Azure Resource roles, and PIM for Groups. Install from the PowerShell Gallery in seconds.

Self-Hosted Web App

A PowerShell Pode server running in Docker. Deploy to your own Azure Container App with a 1-click Bicep template. Supports federated managed identity, certificate, and client-secret authentication.

Hosted Portal

A zero-backend browser SPA hosted on Azure Static Web Apps. No server, no secrets stored — MSAL handles authentication entirely in your browser. Supports bulk activation and saved activation profiles (IndexedDB).

Built with security first

Every product in this ecosystem is designed to minimise credential exposure and attack surface.

No secrets in code

Federated managed identity eliminates client secrets entirely. Certificates are stored in Azure Key Vault.

Browser-only Portal

The hosted Portal has no backend — your tokens never leave the browser. Profiles are stored in your own IndexedDB.

Delegated only

All API calls use delegated user tokens. No application permissions, no service-account credentials.

Open source · MIT

Every line of code is public and auditable. No telemetry, no analytics, no tracking.