You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/users-groups-roles/directory-assign-admin-roles.md
+17-10Lines changed: 17 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,31 +47,37 @@ The following administrator roles are available:
47
47
Users in this role can create and manage all aspects of enterprise applications, application registrations, and application proxy settings. Note that users assigned to this role are not added as owners when creating new application registrations or enterprise applications.
48
48
49
49
Application Administrators can manage application credentials that allows them to impersonate the application. So, users assigned to this role can manage application credentials of only those applications that are either not assigned to any Azure AD roles or those assigned to following admin roles only:
50
+
50
51
* Application Administrator
51
52
* Application Developer
52
53
* Cloud Application Administrator
53
54
* Directory Readers
54
55
55
-
If an application is assigned to any other role that are not mentioned above, then Application Administrator cannot manage credentials of that application.
56
-
56
+
If an application is assigned to any other role that are not mentioned above, then Application Administrator cannot manage credentials of that application.
57
+
57
58
This role also grants the ability to _consent_ to delegated permissions and application permissions, with the exception of permissions on the Microsoft Graph API.
58
59
59
60
> [!IMPORTANT]
60
-
> This exception means that you can still consent to permissions for _other_ apps (e.g. third party apps or apps that you have registered), but not to permissions on Azure AD itself. You can still _request_ these permissions as part of the app registration, but _granting_ (i.e. consenting to) these permissions requires an Azure AD admin. This means that a malicious user cannot easily elevate their permissions, for example by creating and consenting to an app that can write to the entire directory and through that app's permissions elevate themselves to become a global admin.
61
+
> This exception means that you can still consent to permissions for _other_ apps (for example, non-Microsoft apps or apps that you have registered), but not to permissions on Azure AD itself. You can still _request_ these permissions as part of the app registration, but _granting_ (that is, consenting to) these permissions requires an Azure AD admin. This means that a malicious user cannot easily elevate their permissions, for example by creating and consenting to an app that can write to the entire directory and through that app's permissions elevate themselves to become a global admin.
Users in this role can create application registrations when the "Users can register applications" setting is set to No. This role also grants permission to consent on one's own behalf when the "Users can consent to apps accessing company data on their behalf" setting is set to No. Users assigned to this role are added as owners when creating new application registrations or enterprise applications.
The Authentication administrator role is currently in public preview. Users with this role can set or reset non-password credentials and can update passwords for all users. Authentication Administrators can require users to re-register against existing non-password credential (for example, MFA or FIDO) and revoke **remember MFA on the device**, which prompts for MFA on the next sign-in of users who are non-administrators or assigned the following roles only:
69
+
The Authentication administrator role is currently in public preview. Users with this role can set or reset non-password credentials for some users and can update passwords for all users. Authentication administrators can:
69
70
70
-
* Authentication Administrator
71
-
* Directory Readers
72
-
* Guest Inviter
73
-
* Message Center Reader
74
-
* Reports Reader
71
+
* Require users to re-register against existing non-password credentials (for example, MFA or FIDO)
72
+
* Revoke **remember MFA on the device**, which prompts for MFA on the next sign-in of users who are non-administrators or assigned the following roles only:
73
+
74
+
* Authentication Administrator
75
+
* Directory Readers
76
+
* Guest Inviter
77
+
* Message Center Reader
78
+
* Reports Reader
79
+
80
+
The [Privileged authentication administrator](#privileged-authentication-administrator) role has permission can force re-registration and MFA for all users.
75
81
76
82
> [!IMPORTANT]
77
83
> Users with this role can change credentials for people who may have access to sensitive or private information or critical configuration inside and outside of Azure Active Directory. Changing the credentials of a user may mean the ability to assume that user's identity and permissions. For example:
@@ -123,6 +129,7 @@ Makes purchases, manages subscriptions, manages support tickets, and monitors se
123
129
Users in this role have the same permissions as the Application Administrator role, excluding the ability to manage application proxy. This role grants the ability to create and manage all aspects of enterprise applications and application registrations. This role also grants the ability to consent to delegated permissions, and application permissions excluding the Microsoft Graph API. Users assigned to this role are not added as owners when creating new application registrations or enterprise applications.
124
130
125
131
Cloud Application Administrators can manage application credentials that allows them to impersonate the application. So, users assigned to this role can manage application credentials of only those applications that are either not assigned to any Azure AD roles or those assigned to following admin roles only:
132
+
126
133
* Application Developer
127
134
* Cloud Application Administrator
128
135
* Directory Readers
@@ -345,7 +352,7 @@ Users with this role can register printers and manage printer status in the Micr
Users with this role can set or reset non-password credentials for all users, including global administrators, and can update passwords for all users. Privileged Authentication Administrators can force users to re-register against existing non-password credential (e.g. MFA, FIDO) and revoke 'remember MFA on the device', prompting for MFA on the next login of all users.
355
+
Users with this role can set or reset non-password credentials for all users, including global administrators, and can update passwords for all users. Privileged Authentication Administrators can force users to re-register against existing non-password credential (such as MFA or FIDO) and revoke 'remember MFA on the device', prompting for MFA on the next sign-in of all users. The [Authentication administrator](#authentication-administrator) role can force re-registration and MFA for users and readers.
349
356
350
357
### [Privileged Role Administrator](#privileged-role-administrator-permissions)
Copy file name to clipboardExpand all lines: articles/active-directory/users-groups-roles/roles-custom-overview.md
+17-1Lines changed: 17 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.workload: identity
9
9
ms.subservice: users-groups-roles
10
10
ms.topic: article
11
-
ms.date: 11/08/2019
11
+
ms.date: 04/21/2020
12
12
ms.author: curtand
13
13
ms.reviewer: vincesm
14
14
ms.custom: it-pro
@@ -32,6 +32,22 @@ Once you’ve created your role definition, you can assign it to a user by creat
32
32
33
33
Azure AD built-in and custom roles operate on concepts similar to [Azure role-based access control](../../role-based-access-control/overview.md). The [difference between these two role-based access control systems](../../role-based-access-control/rbac-and-directory-admin-roles.md) is that Azure RBAC controls access to Azure resources such as virtual machines or storage using Azure Resource Management, and Azure AD custom roles control access to Azure AD resources using Graph API. Both systems leverage the concept of role definitions and role assignments.
34
34
35
+
### How Azure AD determines if a user has access to a resource
36
+
37
+
The following are the high-level steps that Azure AD uses to determine if you have access to a management resource. Use this information to troubleshoot access issues.
38
+
39
+
1. A user (or service principal) acquires a token to the Microsoft Graph or Azure AD Graph endpoint.
40
+
41
+
1. The user makes an API call to Azure Active Directory (Azure AD) via Microsoft Graph or Azure AD Graph using the issued token.
42
+
43
+
1. Depending on the circumstance, Azure AD takes one of the following actions:
44
+
45
+
- Evaluates the user’s role memberships based on the [wids claim](https://docs.microsoft.com/azure/active-directory/develop/access-tokens) in the user’s access token.
46
+
- Retrieves all the role assignments that apply for the user, either directly or via group membership, to the resource on which the action is being taken.
47
+
48
+
1. Azure AD determines if the action in the API call is included in the roles the user has for this resource.
49
+
1. If the user doesn't have a role with the action at the requested scope, access is not granted. Otherwise access is granted.
50
+
35
51
### Role assignments
36
52
37
53
A role assignment is the object that attaches a role definition to a user at a particular scope to grant Azure AD resource access. Access is granted by creating a role assignment, and access is revoked by removing a role assignment. At its core, a role assignment consists of three elements:
0 commit comments