Skip to content

Commit 58e2c87

Browse files
authored
Merge pull request #188698 from rolyon/rolyon-rbac-emergency-access-update
[Azure AD roles] Create emergency access account
2 parents e34be13 + 05ba598 commit 58e2c87

File tree

2 files changed

+32
-2
lines changed

2 files changed

+32
-2
lines changed
61.1 KB
Loading

articles/active-directory/roles/security-emergency-access.md

Lines changed: 32 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ services: active-directory
55
author: markwahl-msft
66
manager: karenhoran
77
ms.author: rolyon
8-
ms.date: 11/05/2020
8+
ms.date: 02/18/2022
99
ms.topic: conceptual
1010
ms.service: active-directory
1111
ms.subservice: roles
1212
ms.workload: identity
1313
ms.custom: it-pro
14-
ms.reviewer: markwahl-msft
14+
ms.reviewer: mwahl
1515
ms.collection: M365-identity-device-management
1616
---
1717

@@ -36,6 +36,36 @@ An organization might need to use an emergency access account in the following s
3636

3737
Create two or more emergency access accounts. These accounts should be cloud-only accounts that use the \*.onmicrosoft.com domain and that are not federated or synchronized from an on-premises environment.
3838

39+
### How to create an emergency access account
40+
41+
1. Sign in to the [Azure portal](https://portal.azure.com) or [Azure AD admin center](https://aad.portal.azure.com) as an existing Global Administrator.
42+
43+
1. Select **Azure Active Directory** > **Users**.
44+
45+
1. Select **New user**.
46+
47+
1. Select **Create user**.
48+
49+
1. Give the account a **User name**.
50+
51+
1. Give the account a **Name**.
52+
53+
1. Create a long and complex password for the account.
54+
55+
1. Under **Roles**, assign the **Global Administrator** role.
56+
57+
1. Under **Usage location**, select the appropriate location.
58+
59+
:::image type="content" source="./media/security-emergency-access/create-emergency-access-account-azure-ad.png" alt-text="Creating an emergency access account in Azure AD." lightbox="./media/security-emergency-access/create-emergency-access-account-azure-ad.png":::
60+
61+
1. Select **Create**.
62+
63+
1. [Store account credentials safely](#store-account-credentials-safely).
64+
65+
1. [Monitor sign-in and audit logs](#monitor-sign-in-and-audit-logs).
66+
67+
1. [Validate accounts regularly](#validate-accounts-regularly).
68+
3969
When configuring these accounts, the following requirements must be met:
4070

4171
- The emergency access accounts should not be associated with any individual user in the organization. Make sure that your accounts are not connected with any employee-supplied mobile phones, hardware tokens that travel with individual employees, or other employee-specific credentials. This precaution covers instances where an individual employee is unreachable when the credential is needed. It is important to ensure that any registered devices are kept in a known, secure location that has multiple means of communicating with Azure AD.

0 commit comments

Comments
 (0)