Skip to content

Commit 45a7032

Browse files
authored
Merge pull request #127452 from abhijeetsinha/patch-50
Update description of App Admin & Cloud App Admin
2 parents d471dad + 8cd3146 commit 45a7032

File tree

1 file changed

+6
-17
lines changed

1 file changed

+6
-17
lines changed

articles/active-directory/users-groups-roles/directory-assign-admin-roles.md

Lines changed: 6 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -51,19 +51,12 @@ The following administrator roles are available:
5151

5252
Users in this role can create and manage all aspects of enterprise applications, application registrations, and application proxy settings. Note that users assigned to this role are not added as owners when creating new application registrations or enterprise applications.
5353

54-
Application Administrators can manage application credentials that allows them to impersonate the application. So, users assigned to this role can manage application credentials of only those applications that are either not assigned to any Azure AD roles or those assigned to following admin roles only:
55-
56-
* Application Administrator
57-
* Application Developer
58-
* Cloud Application Administrator
59-
* Directory Readers
60-
61-
If an application is assigned to any other role that are not mentioned above, then Application Administrator cannot manage credentials of that application.
62-
6354
This role also grants the ability to _consent_ to delegated permissions and application permissions, with the exception of permissions on the Microsoft Graph API.
6455

6556
> [!IMPORTANT]
6657
> This exception means that you can still consent to permissions for _other_ apps (for example, non-Microsoft apps or apps that you have registered), but not to permissions on Azure AD itself. You can still _request_ these permissions as part of the app registration, but _granting_ (that is, consenting to) these permissions requires an Azure AD admin. This means that a malicious user cannot easily elevate their permissions, for example by creating and consenting to an app that can write to the entire directory and through that app's permissions elevate themselves to become a global admin.
58+
>
59+
>This role grants the ability to manage application credentials. Users assigned this role can add credentials to an application, and use those credentials to impersonate the application’s identity. If the application’s identity has been granted access to a resource, such as the ability to create or update User or other objects, then a user assigned to this role could perform those actions while impersonating the application. This ability to impersonate the application’s identity may be an elevation of privilege over what the user can do via their role assignments. It is important to understand that assigning a user to the Application Administrator role gives them the ability to impersonate an application’s identity.
6760
6861
### [Application Developer](#application-developer-permissions)
6962

@@ -120,15 +113,11 @@ Makes purchases, manages subscriptions, manages support tickets, and monitors se
120113

121114
### [Cloud Application Administrator](#cloud-application-administrator-permissions)
122115

123-
Users in this role have the same permissions as the Application Administrator role, excluding the ability to manage application proxy. This role grants the ability to create and manage all aspects of enterprise applications and application registrations. This role also grants the ability to consent to delegated permissions, and application permissions excluding the Microsoft Graph API. Users assigned to this role are not added as owners when creating new application registrations or enterprise applications.
124-
125-
Cloud Application Administrators can manage application credentials that allows them to impersonate the application. So, users assigned to this role can manage application credentials of only those applications that are either not assigned to any Azure AD roles or those assigned to following admin roles only:
116+
Users in this role have the same permissions as the Application Administrator role, excluding the ability to manage application proxy. This role grants the ability to create and manage all aspects of enterprise applications and application registrations. This role also grants the ability to consent to delegated permissions, and application permissions excluding Microsoft Graph and Azure AD Graph. Users assigned to this role are not added as owners when creating new application registrations or enterprise applications.
126117

127-
* Application Developer
128-
* Cloud Application Administrator
129-
* Directory Readers
118+
> [!IMPORTANT]
119+
> This role grants the ability to manage application credentials. Users assigned this role can add credentials to an application, and use those credentials to impersonate the application’s identity. If the application’s identity has been granted access to a resource, such as the ability to create or update User or other objects, then a user assigned to this role could perform those actions while impersonating the application. This ability to impersonate the application’s identity may be an elevation of privilege over what the user can do via their role assignments. It is important to understand that assigning a user to the Cloud Application Administrator role gives them the ability to impersonate an application’s identity.
130120
131-
If an application is assigned to any other role that are not mentioned above, then Cloud Application Administrator cannot manage credentials of that application.
132121

133122
### [Cloud Device Administrator](#cloud-device-administrator-permissions)
134123

@@ -1988,4 +1977,4 @@ Workplace Device Join | Deprecated | [Deprecated roles documentation](directory-
19881977

19891978
* To learn more about how to assign a user as an administrator of an Azure subscription, see [Manage access using Azure roles (Azure RBAC)](../../role-based-access-control/role-assignments-portal.md)
19901979
* To learn more about how resource access is controlled in Microsoft Azure, see [Understand the different roles](../../role-based-access-control/rbac-and-directory-admin-roles.md)
1991-
* For details on the relationship between subscriptions and an Azure AD tenant, or for instructions to associate or add a subscription, see [Associate or add an Azure subscription to your Azure Active Directory tenant](../fundamentals/active-directory-how-subscriptions-associated-directory.md)
1980+
* For details on the relationship between subscriptions and an Azure AD tenant, or for instructions to associate or add a subscription, see [Associate or add an Azure subscription to your Azure Active Directory tenant](../fundamentals/active-directory-how-subscriptions-associated-directory.md)

0 commit comments

Comments
 (0)