-| **Restrict access to Azure AD administration portal** | **What does this switch do?** </p><p>**No** lets non-administrators browse the Azure AD administration portal. </p><p>**Yes** Restricts non-administrators from browsing the Azure AD administration portal. Non-administrators who are owners of groups or applications are unable to use the Azure portal to manage their owned resources. </p><p></p><p>**What does it not do?** </p><p> It does not restrict access to Azure AD data using PowerShell or other clients such as Visual Studio. </p><p>It does not restrict access as long as a user is assigned a custom role (or any role). </p><p>It does not restrict access to Entra Portal. </p><p></p><p>**When should I use this switch?** </p><p>Use this to prevent users from misconfiguring the resources that they own. </p><p></p><p>**When should I not use this switch?** </p><p>Do not use this switch as a security measure. Instead, create a Conditional Access policy that targets Microsoft Azure Management will block non-administrators access to [Microsoft Azure Management](../conditional-access/concept-conditional-access-cloud-apps.md#microsoft-azure-management). </p><p></p><p> **How do I grant only a specific non-administrator users the ability to use the Azure AD administration portal?** </p><p> Set this option to **Yes**, then assign them a role like global reader. </p><p></p><p>**Restrict access to the Entra administration portal** </p><p>A Conditional Access policy that targets Microsoft Azure Management will target access to all Azure management. |
0 commit comments