Hello Xiuyu Zheng,
Welcome to the Microsoft Q&A and thank you for posting your questions here.
Regarding your explanation, the first thing is to check if the Policy Enforcement Role is available and that you are eligible for it. You will need permissions like Microsoft.Authorization/PolicyAssignments/*
.
Secondly, if your organization uses Microsoft Entra Privileged Identity Management (PIM), you can request to activate this role. PIM helps manage, control, and monitor access within Azure AD, including privileged roles.
Reach out to your Azure AD administrator or the person responsible for role assignments in your organization. They can grant you the necessary permissions.
If your organization has a formal process for requesting roles, follow that process. This might involve submitting a request through a ticketing system or an internal portal.
Also, once you have been granted eligibility for the role, you can activate it through the Azure portal. Here’s how: In you Azure Portal, Navigate to All services and select the scope (e.g., Management groups, Subscriptions, or Resource groups). From Access control (IAM) and find the role you want to activate. Click Activate and specify the start time, duration, and reason for activation - https://learn.microsoft.com/en-us/azure/role-based-access-control/role-assignments-eligible-activate
Finally, after activation, verify that you have the necessary permissions to manage policy assignments.
I hope this is helpful! Do not hesitate to let me know if you have any other questions.
Please don't forget to close up the thread here by upvoting and accept it as an answer if it is helpful.