Skip to content

Commit 36902ed

Browse files
Merge pull request #245096 from rolyon/rolyon-aadroles-roles-global-secure-access
[Azure AD roles] Global Secure Access Administrator
2 parents 92c756e + 0d63c59 commit 36902ed

File tree

1 file changed

+38
-0
lines changed

1 file changed

+38
-0
lines changed

articles/active-directory/roles/permissions-reference.md

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,7 @@ This article lists the Azure AD built-in roles you can assign to allow managemen
6565
> | [Fabric Administrator](#fabric-administrator) | Can manage all aspects of the Fabric and Power BI products. | a9ea8996-122f-4c74-9520-8edcd192826c |
6666
> | [Global Administrator](#global-administrator) | Can manage all aspects of Azure AD and Microsoft services that use Azure AD identities. | 62e90394-69f5-4237-9190-012177145e10 |
6767
> | [Global Reader](#global-reader) | Can read everything that a Global Administrator can, but not update anything. | f2ef992c-3afb-46b9-b7cf-a126ee74c451 |
68+
> | [Global Secure Access Administrator](#global-secure-access-administrator) | Create and manage all aspects of Microsoft Entra Internet Access and Microsoft Entra Private Access, including managing access to public and private endpoints. | ac434307-12b9-4fa1-a708-88bf58caabc1 |
6869
> | [Groups Administrator](#groups-administrator) | Members of this role can create/manage groups, create/manage groups settings like naming and expiration policies, and view groups activity and audit reports. | fdd7a751-b60b-444a-984c-02652fe8fa1c |
6970
> | [Guest Inviter](#guest-inviter) | Can invite guest users independent of the 'members can invite guests' setting. | 95e79109-95c0-4d8e-aee3-d01accf2d47b |
7071
> | [Helpdesk Administrator](#helpdesk-administrator) | Can reset passwords for non-administrators and Helpdesk Administrators. | 729827e3-9c14-49f7-bb1b-9608f156bbb8 |
@@ -1223,6 +1224,43 @@ Users with this role **cannot** do the following:
12231224
> | microsoft.virtualVisits/allEntities/allProperties/read | Read all aspects of Virtual Visits |
12241225
> | microsoft.windows.updatesDeployments/allEntities/allProperties/read | Read all aspects of Windows Update Service |
12251226
1227+
## Global Secure Access Administrator
1228+
1229+
Assign the Global Secure Access Administrator role to users who need to do the following:
1230+
1231+
- Create and manage all aspects of Microsoft Entra Internet Access and Microsoft Entra Private Access
1232+
- Manage access to public and private endpoints
1233+
1234+
Users with this role **cannot** do the following:
1235+
1236+
- Cannot manage enterprise applications, application registrations, Conditional Access, or application proxy settings
1237+
1238+
[Learn more](../../global-secure-access/overview-what-is-global-secure-access.md)
1239+
1240+
> [!div class="mx-tableFixed"]
1241+
> | Actions | Description |
1242+
> | --- | --- |
1243+
> | microsoft.azure.supportTickets/allEntities/allTasks | Create and manage Azure support tickets |
1244+
> | microsoft.directory/applicationPolicies/standard/read | Read standard properties of application policies |
1245+
> | microsoft.directory/applications/applicationProxy/read | Read all application proxy properties |
1246+
> | microsoft.directory/applications/owners/read | Read owners of applications |
1247+
> | microsoft.directory/applications/policies/read | Read policies of applications |
1248+
> | microsoft.directory/applications/standard/read | Read standard properties of applications |
1249+
> | microsoft.directory/auditLogs/allProperties/read | Read all properties on audit logs, excluding custom security attributes audit logs |
1250+
> | microsoft.directory/conditionalAccessPolicies/standard/read | Read conditional access for policies |
1251+
> | microsoft.directory/connectorGroups/allProperties/read | Read all properties of application proxy connector groups |
1252+
> | microsoft.directory/connectors/allProperties/read | Read all properties of application proxy connectors |
1253+
> | microsoft.directory/crossTenantAccessPolicy/default/standard/read | Read basic properties of the default cross-tenant access policy |
1254+
> | microsoft.directory/crossTenantAccessPolicy/partners/standard/read | Read basic properties of cross-tenant access policy for partners |
1255+
> | microsoft.directory/crossTenantAccessPolicy/standard/read | Read basic properties of cross-tenant access policy |
1256+
> | microsoft.directory/namedLocations/standard/read | Read basic properties of custom rules that define network locations |
1257+
> | microsoft.directory/signInReports/allProperties/read | Read all properties on sign-in reports, including privileged properties |
1258+
> | microsoft.networkAccess/allEntities/allProperties/allTasks | Manage all aspects of Entra Network Access |
1259+
> | microsoft.office365.messageCenter/messages/read | Read messages in Message Center in the Microsoft 365 admin center, excluding security messages |
1260+
> | microsoft.office365.serviceHealth/allEntities/allTasks | Read and configure Service Health in the Microsoft 365 admin center |
1261+
> | microsoft.office365.supportTickets/allEntities/allTasks | Create and manage Microsoft 365 service requests |
1262+
> | microsoft.office365.webPortal/allEntities/standard/read | Read basic properties on all resources in the Microsoft 365 admin center |
1263+
12261264
## Groups Administrator
12271265

12281266
Users in this role can create/manage groups and its settings like naming and expiration policies. It is important to understand that assigning a user to this role gives them the ability to manage all groups in the organization across various workloads like Teams, SharePoint, Yammer in addition to Outlook. Also the user will be able to manage the various groups settings across various admin portals like Microsoft admin center, Azure portal, as well as workload specific ones like Teams and SharePoint admin centers.

0 commit comments

Comments
 (0)