You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In Azure Active Directory (Azure AD), you typically assign Azure AD roles so that they apply to the entire tenant. However, you can also assign Azure AD roles for different resources, such as administrative units or application registrations. For example, you could assign the Helpdesk Administrator role so that it just applies to a particular administrative unit and not the entire tenant. The resources that a role assignment applies to is also call the scope. This article describes how to assign Azure AD roles at tenant, administrative unit, and application registration scopes. For more information about scope, see [Overview of RBAC in Azure AD](custom-overview.md#scope).
19
+
In Azure Active Directory (Azure AD), you typically assign Azure AD roles so that they apply to the entire tenant. However, you can also assign Azure AD roles for different resources, such as administrative units or application registrations. For example, you could assign the Helpdesk Administrator role so that it just applies to a particular administrative unit and not the entire tenant. The resources that a role assignment applies to is also called the scope. This article describes how to assign Azure AD roles at tenant, administrative unit, and application registration scopes. For more information about scope, see [Overview of RBAC in Azure AD](custom-overview.md#scope).
20
20
21
21
## Prerequisites
22
22
@@ -36,7 +36,7 @@ This section describes how to assign roles at the tenant scope.
36
36
37
37
1. Select **Azure Active Directory** > **Roles and administrators** to see the list of all available roles.
38
38
39
-

39
+

40
40
41
41
1. Select a role to see its assignments. To help you find the role you need, use **Add filters** to filter the roles.
# Overview of role-based access control in Azure Active Directory
20
20
21
-
This article describes how to understand Azure Active Directory (Azure AD) role-based access control. Azure AD roles allow you to grant granular permissions to your admins, abiding by the principle of least privilege. Azure AD built-in and custom roles operate on concepts similar to those you will find in [the role-based access control system for Azure resources](../../role-based-access-control/overview.md) (Azure roles). The [difference between these two role-based access control systems](../../role-based-access-control/rbac-and-directory-admin-roles.md) is:
21
+
This article describes how to understand Azure Active Directory (Azure AD) role-based access control. Azure AD roles allow you to grant granular permissions to your admins, abiding by the principle of least privilege. Azure AD built-in and custom roles operate on concepts similar to those you find in [the role-based access control system for Azure resources](../../role-based-access-control/overview.md) (Azure roles). The [difference between these two role-based access control systems](../../role-based-access-control/rbac-and-directory-admin-roles.md) is:
22
22
23
23
- Azure AD roles control access to Azure AD resources such as users, groups, and applications using the Microsoft Graph API
24
24
- Azure roles control access to Azure resources such as virtual machines or storage using Azure Resource Management
25
25
26
26
Both systems contain similarly used role definitions and role assignments. However, Azure AD role permissions can't be used in Azure custom roles and vice versa.
27
27
28
28
## Understand Azure AD role-based access control
29
-
Azure AD supports 2 types of roles definitions:
29
+
30
+
Azure AD supports two types of roles definitions:
31
+
30
32
*[Built-in roles](./permissions-reference.md)
31
33
*[Custom roles](./custom-create.md)
32
34
@@ -62,7 +64,7 @@ The following diagram shows an example of a role assignment. In this example, Ch
62
64
63
65
### Security principal
64
66
65
-
A security principal represents a user, group, or service principal that is assigned access to Azure AD resources. A user is an individual who has a user profile in Azure Active Directory. A group is a new Microsoft 365 or security group with the isAssignableToRole property set to true (currently in preview). A service principal is an identity created for use with applications, hosted services, and automated tools to access Azure AD resources.
67
+
A security principal represents a user, group, or service principal that is assigned access to Azure AD resources. A user is an individual who has a user profile in Azure Active Directory. A group is a new Microsoft 365 or security group that has been set as a [role-assignable group](groups-concept.md). A service principal is an identity created for use with applications, hosted services, and automated tools to access Azure AD resources.
66
68
67
69
### Role definition
68
70
@@ -89,9 +91,17 @@ If you specify an Azure AD resource as a scope, it can be one of the following:
89
91
90
92
For more information, see [Assign Azure AD roles at different scopes](assign-roles-different-scopes.md).
91
93
94
+
## Role assignment options
95
+
96
+
Azure AD provides multiple options for assigning roles:
97
+
98
+
- You can assign roles to users directly, which is the default way to assign roles. Both built-in and custom Azure AD roles can be assigned to users, based on access requirements. For more information, see [Assign Azure AD roles to users](manage-roles-portal.md).
99
+
- With Azure AD Premium P1, you can create role-assignable groups and assign roles to these groups. Assigning roles to a group instead of individuals allows for easy addition or removal of users from a role and creates consistent permissions for all members of the group. For more information, see [Assign Azure AD roles to groups](groups-assign-role.md).
100
+
- With Azure AD Premium P2, you can use Azure AD Privileged Identity Management (Azure AD PIM) to provide just-in-time access to roles. This feature allows you to grant time-limited access to a role to users who require it, rather than granting permanent access. It also provides detailed reporting and auditing capabilities. For more information, see [Assign Azure AD roles in Privileged Identity Management](../privileged-identity-management/pim-how-to-add-role-to-user.md).
101
+
92
102
## License requirements
93
103
94
-
Using built-in roles in Azure AD is free, while custom roles requires an Azure AD Premium P1 license. To find the right license for your requirements, see [Comparing generally available features of the Free and Premium editions](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing).
104
+
Using built-in roles in Azure AD is free, while custom roles require an Azure AD Premium P1 license. To find the right license for your requirements, see [Comparing generally available features of the Free and Premium editions](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing).
This section describes how an IT admin can assign Azure Active Directory (Azure AD) role to an Azure AD group.
21
+
To simplify role management, you can assign Azure AD roles to a group instead of individuals. This article describes how to assign Azure AD roles to [role-assignable groups](groups-concept.md) using the Azure portal, PowerShell, or Microsoft Graph API.
22
22
23
23
## Prerequisites
24
24
25
-
- Azure AD Premium P1 or P2 license
26
-
- Privileged Role Administrator or Global Administrator
27
-
- AzureAD module when using PowerShell
25
+
- Azure AD Premium P1 license
26
+
-[Privileged Role Administrator](./permissions-reference.md#privileged-role-administrator) role
27
+
- Microsoft.Graph module when using [Microsoft Graph PowerShell](/powershell/microsoftgraph/installation?branch=main)
28
+
- AzureAD module when using [Azure AD PowerShell](/powershell/azure/active-directory/overview?branch=main)
28
29
- Admin consent when using Graph explorer for Microsoft Graph API
29
30
30
31
For more information, see [Prerequisites to use PowerShell or Graph Explorer](prerequisites.md).
31
32
32
33
## Azure portal
33
34
34
-
Assigning a group to an Azure AD role is similar to assigning users and service principals except that only groups that are role-assignable can be used. In the Azure portal, only groups that are role-assignable are displayed.
35
+
Assigning an Azure AD role to a group is similar to assigning users and service principals except that only groups that are role-assignable can be used.
35
36
36
-
1. Sign in to the [Azure portal](https://portal.azure.com).
37
+
> [!TIP]
38
+
> These steps apply to customers that have an Azure AD Premium P1 license. If you have an Azure AD Premium P2 license in your tenant, you should instead follow steps in [Assign Azure AD roles in Privileged Identity Management](../privileged-identity-management/pim-how-to-add-role-to-user.md).
37
39
38
-
1.Select **Azure Active Directory** > **Roles and administrators** and select the role you want to assign.
40
+
1.Sign in to the [Azure portal](https://portal.azure.com) or [Microsoft Entra admin center](https://entra.microsoft.com).
39
41
40
-
1.On the ***role name*** page, select > **Add assignment**.
42
+
1.Select **Azure Active Directory**> **Roles and administrators** to see the list of all available roles.
41
43
42
-

44
+
:::image type="content" source="media/common/roles-and-administrators.png" alt-text="Screenshot of Roles and administrators page in Azure Active Directory." lightbox="media/common/roles-and-administrators.png":::
43
45
44
-
1. Select the group. Only the groups that can be assigned to Azure AD roles are displayed.
46
+
1. Select the role name to open the role. Don't add a check mark next to the role.
45
47
46
-
[](./media/groups-assign-role/eligible-groups.png#lightbox)
48
+
:::image type="content" source="media/common/role-select-mouse.png" alt-text="Screenshot that shows selecting a role." lightbox="media/common/role-select-mouse.png":::
47
49
48
-
1. Select **Add**.
50
+
1. Select **Add assignments**.
49
51
50
-
For more information on assigning role permissions, see [Assign administrator and non-administrator roles to users](../fundamentals/active-directory-users-assign-role-azure-portal.md).
52
+
If you see something different from the following screenshot, you might have Azure AD Premium P2. For more information, see [Assign Azure AD roles in Privileged Identity Management](../privileged-identity-management/pim-how-to-add-role-to-user.md).
53
+
54
+
:::image type="content" source="media/groups-assign-role/add-assignments.png" alt-text="Screenshot of Add assignments pane to assign role to users or groups." lightbox="media/groups-assign-role/add-assignments.png":::
55
+
56
+
1. Select the group you want to assign to this role. Only role-assignable groups are displayed.
57
+
58
+
If group isn't listed, you will need to create a role-assignable group. For more information, see [Create a role-assignable group in Azure Active Directory](groups-create-eligible.md).
59
+
60
+
1. Select **Add** to assign the role to the group.
$group = New-MgGroup -DisplayName "Contoso_Helpdesk_Administrators" -Description "This group has Helpdesk Administrator built-in role assigned to it in Azure AD." -MailEnabled:$false -SecurityEnabled -MailNickName "contosohelpdeskadministrators" -IsAssignableToRole:$true
73
+
```
74
+
75
+
### Get the role definition you want to assign
76
+
77
+
Use the [Get-MgRoleManagementDirectoryRoleDefinition](/powershell/module/microsoft.graph.devicemanagement.enrolment/get-mgrolemanagementdirectoryroledefinition?branch=main) command to get a role definition.
Use the [New-MgRoleManagementDirectoryRoleAssignment](/powershell/module/microsoft.graph.devicemanagement.enrolment/new-mgrolemanagementdirectoryroleassignment?branch=main) command to assign the role.
0 commit comments