Skip to content

Commit 5d5195d

Browse files
authored
Merge pull request #111809 from rolyon/rolyon-rbac-elevate-access-fixes
[Azure RBAC] Elevate access fixes
2 parents bd1a2d9 + a591598 commit 5d5195d

File tree

2 files changed

+6
-8
lines changed

2 files changed

+6
-8
lines changed

articles/role-based-access-control/elevate-access-global-admin.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,20 +13,20 @@ ms.devlang: na
1313
ms.topic: conceptual
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 12/03/2019
16+
ms.date: 04/17/2020
1717
ms.author: rolyon
1818
ms.reviewer: bagovind
1919

2020
---
21-
# Elevate access to manage all Azure subscriptions and management Groups
21+
# Elevate access to manage all Azure subscriptions and management groups
2222

2323
As a Global Administrator in Azure Active Directory (Azure AD), you might not have access to all subscriptions and management groups in your directory. This article describes the ways that you can elevate your access to all subscriptions and management groups.
2424

2525
[!INCLUDE [gdpr-dsr-and-stp-note](../../includes/gdpr-dsr-and-stp-note.md)]
2626

2727
## Why would you need to elevate your access?
2828

29-
If you are a Global Administrator, there might be times when you want to do the following:
29+
If you are a Global Administrator, there might be times when you want to do the following actions:
3030

3131
- Regain access to an Azure subscription or management group when a user has lost access
3232
- Grant another user or yourself access to an Azure subscription or management group
@@ -51,9 +51,7 @@ Follow these steps to elevate access for a Global Administrator using the Azure
5151

5252
1. Sign in to the [Azure portal](https://portal.azure.com) or the [Azure Active Directory admin center](https://aad.portal.azure.com) as a Global Administrator.
5353

54-
1. Search for and select **Azure Active Directory**.
55-
56-
![Select Azure Active Directory - screenshot](./media/elevate-access-global-admin/search-for-azure-active-directory.png)
54+
1. Open **Azure Active Directory**.
5755

5856
1. Under **Manage**, select **Properties**.
5957

@@ -94,7 +92,7 @@ To remove the User Access Administrator role assignment at root scope (`/`), fol
9492

9593
1. Set the **Access management for Azure resources** toggle back to **No**. Since this is a per-user setting, you must be signed in as the same user as was used to elevate access.
9694

97-
If you try to remove the User Access Administrator role assignment on the Access control (IAM) pane, you'll see the following message. To remove the role assignment, you must set set the toggle back to **No** or use Azure PowerShell, Azure CLI, or the REST API.
95+
If you try to remove the User Access Administrator role assignment on the Access control (IAM) pane, you'll see the following message. To remove the role assignment, you must set the toggle back to **No** or use Azure PowerShell, Azure CLI, or the REST API.
9896

9997
![Remove role assignments with root scope](./media/elevate-access-global-admin/iam-root-remove.png)
10098

@@ -229,7 +227,7 @@ You can list all of the deny assignments for a user at root scope (`/`).
229227

230228
### Remove elevated access
231229

232-
When you call `elevateAccess`, you create a role assignment for yourself, so to revoke those privileges you need to remove the User Access Administrator role assignment for yourself at root scope (`/`)
230+
When you call `elevateAccess`, you create a role assignment for yourself, so to revoke those privileges you need to remove the User Access Administrator role assignment for yourself at root scope (`/`).
233231

234232
1. Call [GET roleDefinitions](/rest/api/authorization/roledefinitions/get) where `roleName` equals User Access Administrator to determine the name ID of the User Access Administrator role.
235233

0 commit comments

Comments
 (0)