You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/elevate-access-global-admin.md
+6-8Lines changed: 6 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,20 +13,20 @@ ms.devlang: na
13
13
ms.topic: conceptual
14
14
ms.tgt_pltfrm: na
15
15
ms.workload: identity
16
-
ms.date: 12/03/2019
16
+
ms.date: 04/17/2020
17
17
ms.author: rolyon
18
18
ms.reviewer: bagovind
19
19
20
20
---
21
-
# Elevate access to manage all Azure subscriptions and management Groups
21
+
# Elevate access to manage all Azure subscriptions and management groups
22
22
23
23
As a Global Administrator in Azure Active Directory (Azure AD), you might not have access to all subscriptions and management groups in your directory. This article describes the ways that you can elevate your access to all subscriptions and management groups.
If you are a Global Administrator, there might be times when you want to do the following:
29
+
If you are a Global Administrator, there might be times when you want to do the following actions:
30
30
31
31
- Regain access to an Azure subscription or management group when a user has lost access
32
32
- Grant another user or yourself access to an Azure subscription or management group
@@ -51,9 +51,7 @@ Follow these steps to elevate access for a Global Administrator using the Azure
51
51
52
52
1. Sign in to the [Azure portal](https://portal.azure.com) or the [Azure Active Directory admin center](https://aad.portal.azure.com) as a Global Administrator.
53
53
54
-
1. Search for and select **Azure Active Directory**.
55
-
56
-

54
+
1. Open **Azure Active Directory**.
57
55
58
56
1. Under **Manage**, select **Properties**.
59
57
@@ -94,7 +92,7 @@ To remove the User Access Administrator role assignment at root scope (`/`), fol
94
92
95
93
1. Set the **Access management for Azure resources** toggle back to **No**. Since this is a per-user setting, you must be signed in as the same user as was used to elevate access.
96
94
97
-
If you try to remove the User Access Administrator role assignment on the Access control (IAM) pane, you'll see the following message. To remove the role assignment, you must set set the toggle back to **No** or use Azure PowerShell, Azure CLI, or the REST API.
95
+
If you try to remove the User Access Administrator role assignment on the Access control (IAM) pane, you'll see the following message. To remove the role assignment, you must set the toggle back to **No** or use Azure PowerShell, Azure CLI, or the REST API.
98
96
99
97

100
98
@@ -229,7 +227,7 @@ You can list all of the deny assignments for a user at root scope (`/`).
229
227
230
228
### Remove elevated access
231
229
232
-
When you call `elevateAccess`, you create a role assignment for yourself, so to revoke those privileges you need to remove the User Access Administrator role assignment for yourself at root scope (`/`)
230
+
When you call `elevateAccess`, you create a role assignment for yourself, so to revoke those privileges you need to remove the User Access Administrator role assignment for yourself at root scope (`/`).
233
231
234
232
1. Call [GET roleDefinitions](/rest/api/authorization/roledefinitions/get) where `roleName` equals User Access Administrator to determine the name ID of the User Access Administrator role.
0 commit comments