You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/elevate-access-global-admin.md
+11-15Lines changed: 11 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ If you are a Global Administrator, there might be times when you want to do the
28
28
29
29
Microsoft Entra ID and Azure resources are secured independently from one another. That is, Microsoft Entra role assignments do not grant access to Azure resources, and Azure role assignments do not grant access to Microsoft Entra ID. However, if you are a [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator) in Microsoft Entra ID, you can assign yourself access to all Azure subscriptions and management groups in your tenant. Use this capability if you don't have access to Azure subscription resources, such as virtual machines or storage accounts, and you want to use your Global Administrator privilege to gain access to those resources.
30
30
31
-
When you elevate your access, you will be assigned the [User Access Administrator](built-in-roles.md#user-access-administrator) role in Azure at root scope (`/`). This allows you to view all resources and assign access in any subscription or management group in the tenant. User Access Administrator role assignments can be removed using Azure PowerShell, Azure CLI, or the REST API.
31
+
When you elevate your access, you are assigned the [User Access Administrator](built-in-roles.md#user-access-administrator) role in Azure at root scope (`/`). This allows you to view all resources and assign access in any subscription or management group in the tenant. User Access Administrator role assignments can be removed using Azure PowerShell, Azure CLI, or the REST API.
32
32
33
33
You should remove this elevated access once you have made the changes you need to make at root scope.
34
34
@@ -46,9 +46,7 @@ Follow these steps to elevate access for a Global Administrator using the Azure
46
46
47
47
If you are using Microsoft Entra Privileged Identity Management, [activate your Global Administrator role assignment](/entra/id-governance/privileged-identity-management/pim-how-to-activate-role).
48
48
49
-
1. Open **Microsoft Entra ID**.
50
-
51
-
1. Under **Manage**, select **Properties**.
49
+
1. Browse to **Microsoft Entra ID** > **Manage** > **Properties**.
52
50
53
51

54
52
@@ -63,13 +61,13 @@ Follow these steps to elevate access for a Global Administrator using the Azure
63
61
> [!NOTE]
64
62
> If you're using [Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-configure), deactivating your role assignment does not change the **Access management for Azure resources** toggle to **No**. To maintain least privileged access, we recommend that you set this toggle to **No** before you deactivate your role assignment.
65
63
66
-
1.Click**Save** to save your setting.
64
+
1.Select**Save** to save your setting.
67
65
68
66
This setting is not a global property and applies only to the currently signed in user. You can't elevate access for all members of the Global Administrator role.
69
67
70
68
1. Sign out and sign back in to refresh your access.
71
69
72
-
You should now have access to all subscriptions and management groups in your tenant. When you view the Access control (IAM) pane, you'll notice that you have been assigned the User Access Administrator role at root scope.
70
+
You should now have access to all subscriptions and management groups in your tenant. When you view the Access control (IAM) page, you'll notice that you have been assigned the User Access Administrator role at root scope.
73
71
74
72

75
73
@@ -85,11 +83,11 @@ To remove the User Access Administrator role assignment at root scope (`/`), fol
85
83
86
84
1. Sign in as the same user that was used to elevate access.
87
85
88
-
1.In the navigation list, click **Microsoft Entra ID**and then click**Properties**.
86
+
1.Browse to **Microsoft Entra ID**> **Manage** >**Properties**.
89
87
90
88
1. Set the **Access management for Azure resources** toggle back to **No**. Since this is a per-user setting, you must be signed in as the same user as was used to elevate access.
91
89
92
-
If you try to remove the User Access Administrator role assignment on the Access control (IAM) pane, you'll see the following message. To remove the role assignment, you must set the toggle back to **No** or use Azure PowerShell, Azure CLI, or the REST API.
90
+
If you try to remove the User Access Administrator role assignment on the Access control (IAM) page, you'll see the following message. To remove the role assignment, you must set the toggle back to **No** or use Azure PowerShell, Azure CLI, or the REST API.
93
91
94
92

95
93
@@ -343,15 +341,13 @@ If you have users with unnecessary elevated access, you should take immediate ac
343
341
344
342
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
345
343
346
-
1. Open **Microsoft Entra ID**.
347
-
348
-
1. Under **Manage**, select **Properties**.
344
+
1. Browse to **Microsoft Entra ID** > **Manage** > **Properties**.
349
345
350
346
1. Under **Access management for Azure resources**, look for the following banner.
351
347
352
348
`You have X users with elevated access. Microsoft Security recommends deleting access for users who have unnecessary elevated access. Manage elevated access users`
353
349
354
-
:::image type="content" source="./media/elevate-access-global-admin/elevated-access-users-banner.png" alt-text="Screenshot of banner that indicates there are users with elevated acccess." lightbox="./media/elevate-access-global-admin/elevated-access-users-banner.png":::
350
+
:::image type="content" source="./media/elevate-access-global-admin/elevated-access-users-banner.png" alt-text="Screenshot of banner that indicates there are users with elevated access." lightbox="./media/elevate-access-global-admin/elevated-access-users-banner.png":::
355
351
356
352
If you don't see this banner, you currently don't have any users in your tenant with elevated access.
357
353
@@ -361,7 +357,7 @@ If you have users with unnecessary elevated access, you should take immediate ac
361
357
362
358
The **Users with elevated access appears** pane appears with a list of users with elevated access in your tenant.
363
359
364
-
:::image type="content" source="./media/elevate-access-global-admin/elevated-access-users-pane.png" alt-text="Screenshot of Users with elevated access pane that lists users with elevated acccess." lightbox="./media/elevate-access-global-admin/elevated-access-users-pane.png":::
360
+
:::image type="content" source="./media/elevate-access-global-admin/elevated-access-users-pane.png" alt-text="Screenshot of Users with elevated access pane that lists users with elevated access." lightbox="./media/elevate-access-global-admin/elevated-access-users-pane.png":::
365
361
366
362
1. To remove elevated access for users, add a check mark next to the user and select **Remove**.
367
363
@@ -373,7 +369,7 @@ When access is elevated, an entry is added to the logs. As a Global Administrato
373
369
374
370
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
375
371
376
-
1. Open **Monitor** > **Activity log**.
372
+
1. Browse to **Monitor** > **Activity log**.
377
373
378
374
1. Change the **Activity** list to **Directory Activity**.
379
375
@@ -420,7 +416,7 @@ When access is elevated, an entry is added to the logs. As a Global Administrato
420
416
421
417
If you want to be able to periodically get the elevate access log entries, you can delegate access to a group and then use Azure CLI.
422
418
423
-
1. Open **Microsoft Entra ID** > **Groups**.
419
+
1. Browse to **Microsoft Entra ID** > **Groups**.
424
420
425
421
1. Create a new security group and note the group object ID.
0 commit comments