Skip to content

Commit 6b59583

Browse files
committed
Acrolinx and browse step
1 parent 3afa635 commit 6b59583

File tree

1 file changed

+11
-15
lines changed

1 file changed

+11
-15
lines changed

articles/role-based-access-control/elevate-access-global-admin.md

Lines changed: 11 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ If you are a Global Administrator, there might be times when you want to do the
2828

2929
Microsoft Entra ID and Azure resources are secured independently from one another. That is, Microsoft Entra role assignments do not grant access to Azure resources, and Azure role assignments do not grant access to Microsoft Entra ID. However, if you are a [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator) in Microsoft Entra ID, you can assign yourself access to all Azure subscriptions and management groups in your tenant. Use this capability if you don't have access to Azure subscription resources, such as virtual machines or storage accounts, and you want to use your Global Administrator privilege to gain access to those resources.
3030

31-
When you elevate your access, you will be assigned the [User Access Administrator](built-in-roles.md#user-access-administrator) role in Azure at root scope (`/`). This allows you to view all resources and assign access in any subscription or management group in the tenant. User Access Administrator role assignments can be removed using Azure PowerShell, Azure CLI, or the REST API.
31+
When you elevate your access, you are assigned the [User Access Administrator](built-in-roles.md#user-access-administrator) role in Azure at root scope (`/`). This allows you to view all resources and assign access in any subscription or management group in the tenant. User Access Administrator role assignments can be removed using Azure PowerShell, Azure CLI, or the REST API.
3232

3333
You should remove this elevated access once you have made the changes you need to make at root scope.
3434

@@ -46,9 +46,7 @@ Follow these steps to elevate access for a Global Administrator using the Azure
4646

4747
If you are using Microsoft Entra Privileged Identity Management, [activate your Global Administrator role assignment](/entra/id-governance/privileged-identity-management/pim-how-to-activate-role).
4848

49-
1. Open **Microsoft Entra ID**.
50-
51-
1. Under **Manage**, select **Properties**.
49+
1. Browse to **Microsoft Entra ID** > **Manage** > **Properties**.
5250

5351
![Select Properties for Microsoft Entra properties - screenshot](./media/elevate-access-global-admin/azure-active-directory-properties.png)
5452

@@ -63,13 +61,13 @@ Follow these steps to elevate access for a Global Administrator using the Azure
6361
> [!NOTE]
6462
> If you're using [Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-configure), deactivating your role assignment does not change the **Access management for Azure resources** toggle to **No**. To maintain least privileged access, we recommend that you set this toggle to **No** before you deactivate your role assignment.
6563
66-
1. Click **Save** to save your setting.
64+
1. Select **Save** to save your setting.
6765

6866
This setting is not a global property and applies only to the currently signed in user. You can't elevate access for all members of the Global Administrator role.
6967

7068
1. Sign out and sign back in to refresh your access.
7169

72-
You should now have access to all subscriptions and management groups in your tenant. When you view the Access control (IAM) pane, you'll notice that you have been assigned the User Access Administrator role at root scope.
70+
You should now have access to all subscriptions and management groups in your tenant. When you view the Access control (IAM) page, you'll notice that you have been assigned the User Access Administrator role at root scope.
7371

7472
![Subscription role assignments with root scope - screenshot](./media/elevate-access-global-admin/iam-root.png)
7573

@@ -85,11 +83,11 @@ To remove the User Access Administrator role assignment at root scope (`/`), fol
8583

8684
1. Sign in as the same user that was used to elevate access.
8785

88-
1. In the navigation list, click **Microsoft Entra ID** and then click **Properties**.
86+
1. Browse to **Microsoft Entra ID** > **Manage** > **Properties**.
8987

9088
1. Set the **Access management for Azure resources** toggle back to **No**. Since this is a per-user setting, you must be signed in as the same user as was used to elevate access.
9189

92-
If you try to remove the User Access Administrator role assignment on the Access control (IAM) pane, you'll see the following message. To remove the role assignment, you must set the toggle back to **No** or use Azure PowerShell, Azure CLI, or the REST API.
90+
If you try to remove the User Access Administrator role assignment on the Access control (IAM) page, you'll see the following message. To remove the role assignment, you must set the toggle back to **No** or use Azure PowerShell, Azure CLI, or the REST API.
9391

9492
![Remove role assignments with root scope](./media/elevate-access-global-admin/iam-root-remove.png)
9593

@@ -343,15 +341,13 @@ If you have users with unnecessary elevated access, you should take immediate ac
343341
344342
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
345343
346-
1. Open **Microsoft Entra ID**.
347-
348-
1. Under **Manage**, select **Properties**.
344+
1. Browse to **Microsoft Entra ID** > **Manage** > **Properties**.
349345
350346
1. Under **Access management for Azure resources**, look for the following banner.
351347
352348
`You have X users with elevated access. Microsoft Security recommends deleting access for users who have unnecessary elevated access. Manage elevated access users`
353349
354-
:::image type="content" source="./media/elevate-access-global-admin/elevated-access-users-banner.png" alt-text="Screenshot of banner that indicates there are users with elevated acccess." lightbox="./media/elevate-access-global-admin/elevated-access-users-banner.png":::
350+
:::image type="content" source="./media/elevate-access-global-admin/elevated-access-users-banner.png" alt-text="Screenshot of banner that indicates there are users with elevated access." lightbox="./media/elevate-access-global-admin/elevated-access-users-banner.png":::
355351
356352
If you don't see this banner, you currently don't have any users in your tenant with elevated access.
357353
@@ -361,7 +357,7 @@ If you have users with unnecessary elevated access, you should take immediate ac
361357
362358
The **Users with elevated access appears** pane appears with a list of users with elevated access in your tenant.
363359
364-
:::image type="content" source="./media/elevate-access-global-admin/elevated-access-users-pane.png" alt-text="Screenshot of Users with elevated access pane that lists users with elevated acccess." lightbox="./media/elevate-access-global-admin/elevated-access-users-pane.png":::
360+
:::image type="content" source="./media/elevate-access-global-admin/elevated-access-users-pane.png" alt-text="Screenshot of Users with elevated access pane that lists users with elevated access." lightbox="./media/elevate-access-global-admin/elevated-access-users-pane.png":::
365361
366362
1. To remove elevated access for users, add a check mark next to the user and select **Remove**.
367363
@@ -373,7 +369,7 @@ When access is elevated, an entry is added to the logs. As a Global Administrato
373369
374370
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
375371
376-
1. Open **Monitor** > **Activity log**.
372+
1. Browse to **Monitor** > **Activity log**.
377373
378374
1. Change the **Activity** list to **Directory Activity**.
379375
@@ -420,7 +416,7 @@ When access is elevated, an entry is added to the logs. As a Global Administrato
420416
421417
If you want to be able to periodically get the elevate access log entries, you can delegate access to a group and then use Azure CLI.
422418
423-
1. Open **Microsoft Entra ID** > **Groups**.
419+
1. Browse to **Microsoft Entra ID** > **Groups**.
424420
425421
1. Create a new security group and note the group object ID.
426422

0 commit comments

Comments
 (0)