You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/roles/security-emergency-access.md
+32-2Lines changed: 32 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,13 +5,13 @@ services: active-directory
5
5
author: markwahl-msft
6
6
manager: karenhoran
7
7
ms.author: rolyon
8
-
ms.date: 11/05/2020
8
+
ms.date: 02/18/2022
9
9
ms.topic: conceptual
10
10
ms.service: active-directory
11
11
ms.subservice: roles
12
12
ms.workload: identity
13
13
ms.custom: it-pro
14
-
ms.reviewer: markwahl-msft
14
+
ms.reviewer: mwahl
15
15
ms.collection: M365-identity-device-management
16
16
---
17
17
@@ -36,6 +36,36 @@ An organization might need to use an emergency access account in the following s
36
36
37
37
Create two or more emergency access accounts. These accounts should be cloud-only accounts that use the \*.onmicrosoft.com domain and that are not federated or synchronized from an on-premises environment.
38
38
39
+
### How to create an emergency access account
40
+
41
+
1. Sign in to the [Azure portal](https://portal.azure.com) or [Azure AD admin center](https://aad.portal.azure.com) as an existing Global Administrator.
42
+
43
+
1. Select **Azure Active Directory** > **Users**.
44
+
45
+
1. Select **New user**.
46
+
47
+
1. Select **Create user**.
48
+
49
+
1. Give the account a **User name**.
50
+
51
+
1. Give the account a **Name**.
52
+
53
+
1. Create a long and complex password for the account.
54
+
55
+
1. Under **Roles**, assign the **Global Administrator** role.
56
+
57
+
1. Under **Usage location**, select the appropriate location.
58
+
59
+
:::image type="content" source="./media/security-emergency-access/create-emergency-access-account-azure-ad.png" alt-text="Creating an emergency access account in Azure AD." lightbox="./media/security-emergency-access/create-emergency-access-account-azure-ad.png":::
When configuring these accounts, the following requirements must be met:
40
70
41
71
- The emergency access accounts should not be associated with any individual user in the organization. Make sure that your accounts are not connected with any employee-supplied mobile phones, hardware tokens that travel with individual employees, or other employee-specific credentials. This precaution covers instances where an individual employee is unreachable when the credential is needed. It is important to ensure that any registered devices are kept in a known, secure location that has multiple means of communicating with Azure AD.
0 commit comments