Skip to content

Commit c69c2f1

Browse files
authored
Merge pull request #116117 from abhijeetsinha/patch-45
Removed 2 limitations of Global Reader
2 parents e2be93e + d319892 commit c69c2f1

File tree

1 file changed

+27
-28
lines changed

1 file changed

+27
-28
lines changed

articles/active-directory/users-groups-roles/directory-assign-admin-roles.md

Lines changed: 27 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -95,14 +95,6 @@ All enterprise Azure DevOps policies can be managed by users in this role.
9595

9696
Users with this role have all permissions in the Azure Information Protection service. This role allows configuring labels for the Azure Information Protection policy, managing protection templates, and activating protection. This role does not grant any permissions in Identity Protection Center, Privileged Identity Management, Monitor Office 365 Service Health, or Office 365 Security & Compliance Center.
9797

98-
### [B2C User Flow Administrator](#b2c-user-flow-administrator-permissions)
99-
100-
Users with this role can create and manage B2C User Flows (also called "built-in" policies) in the Azure portal. By creating or editing user flows, these users can change the html/CSS/javascript content of the user experience, change MFA requirements per user flow, change claims in the token, and adjust session settings for all policies in the Azure AD organization. On the other hand, this role does not include the ability to review user data, or make changes to the attributes that are included in the organization schema. Changes to Identity Experience Framework (also known as Custom) policies is also outside the scope of this role.
101-
102-
### [B2C User Flow Attribute Administrator](#b2c-user-flow-attribute-administrator-permissions)
103-
104-
Users with this role add or delete custom attributes available to all user flows in the Azure AD organization. As such, users with this role can change or add new elements to the end-user schema and impact the behavior of all user flows and indirectly result in changes to what data may be asked of end users and ultimately sent as claims to applications. This role cannot edit user flows.
105-
10698
### [B2C IEF Keyset Administrator](#b2c-ief-keyset-administrator-permissions)
10799

108100
User can create and manage policy keys and secrets for token encryption, token signatures, and claim encryption/decryption. By adding new keys to existing key containers, this limited administrator can rollover secrets as needed without impacting existing applications. This user can see the full content of these secrets and their expiration dates even after their creation.
@@ -209,6 +201,15 @@ Users with this role have global permissions within Microsoft Exchange Online, w
209201
> [!NOTE]
210202
> In the Microsoft Graph API and Azure AD PowerShell, this role is identified as "Exchange Service Administrator." It is "Exchange Administrator" in the [Azure portal](https://portal.azure.com). It is "Exchange Online administrator" in the [Exchange admin center](https://go.microsoft.com/fwlink/p/?LinkID=529144).
211203
204+
205+
### [External Id User Flow Administrator](#external-id-user-flow-administrator-permissions)
206+
207+
Users with this role can create and manage B2C User Flows (also called "built-in" policies) in the Azure portal. By creating or editing user flows, these users can change the html/CSS/javascript content of the user experience, change MFA requirements per user flow, change claims in the token, and adjust session settings for all policies in the Azure AD organization. On the other hand, this role does not include the ability to review user data, or make changes to the attributes that are included in the organization schema. Changes to Identity Experience Framework (also known as Custom) policies is also outside the scope of this role.
208+
209+
### [External Id User Flow Attribute Administrator](#external-id-user-flow-attribute-administrator-permissions)
210+
211+
Users with this role add or delete custom attributes available to all user flows in the Azure AD organization. As such, users with this role can change or add new elements to the end-user schema and impact the behavior of all user flows and indirectly result in changes to what data may be asked of end users and ultimately sent as claims to applications. This role cannot edit user flows.
212+
212213
### [External Identity Provider Administrator](#external-identity-provider-administrator-permissions)
213214

214215
This administrator manages federation between Azure AD organizations and external identity providers. With this role, users can add new identity providers and configure all available settings (e.g. authentication path, service ID, assigned key containers). This user can enable the Azure AD organization to trust authentications from external identity providers. The resulting impact on end-user experiences depends on the type of organization:
@@ -232,8 +233,6 @@ Users in this role can read settings and administrative information across Micro
232233
> [!NOTE]
233234
> Global reader role has a few limitations right now -
234235
>
235-
>- [OneDrive admin center](https://admin.onedrive.com/) - OneDrive admin center does not support the Global reader role.
236-
>- [Azure AD portal](https://portal.azure.com/#blade/Microsoft_AAD_IAM/StartboardApplicationsMenuBlade/AllApps/menuId/) - Global reader can't read the provisioning mode of an enterprise app.
237236
>- [M365 admin center](https://admin.microsoft.com/Adminportal/Home#/homepage) - Global reader can't read customer lockbox requests. You won't find the **Customer lockbox requests** tab under **Support** in the left pane of M365 Admin Center.
238237
>- [Office Security & Compliance Center](https://sip.protection.office.com/homepage) - Global reader can't read SCC audit logs, do content search, or see Secure Score.
239238
>- [Teams admin center](https://admin.teams.microsoft.com) - Global reader cannot read **Teams lifecycle**, **Analytics & reports**, **IP phone device management** and **App catalog**.
@@ -595,22 +594,6 @@ Can manage all aspects of the Azure Information Protection service.
595594
| microsoft.office365.serviceHealth/allEntities/allTasks | Read and configure Office 365 Service Health. |
596595
| microsoft.office365.supportTickets/allEntities/allTasks | Create and manage Office 365 support tickets. |
597596

598-
### B2C User Flow Administrator permissions
599-
600-
Create and manage all aspects of user flows.
601-
602-
| **Actions** | **Description** |
603-
| --- | --- |
604-
| microsoft.aad.b2c/userFlows/allTasks | Read and configure user flows in  Azure Active Directory B2C. |
605-
606-
### B2C User Flow Attribute Administrator permissions
607-
608-
Create and manage the attribute schema available to all user flows.
609-
610-
| **Actions** | **Description** |
611-
| --- | --- |
612-
| microsoft.aad.b2c/userAttributes/allTasks | Read and configure user attributes in  Azure Active Directory B2C. |
613-
614597
### B2C IEF Keyset Administrator permissions
615598

616599
Manage secrets for federation and encryption in the Identity Experience Framework.
@@ -1026,6 +1009,22 @@ Can manage all aspects of the Exchange product.
10261009
| microsoft.office365.usageReports/allEntities/read | Read Office 365 usage reports. |
10271010
| microsoft.office365.webPortal/allEntities/basic/read | Read basic properties on all resources in microsoft.office365.webPortal. |
10281011

1012+
### External Id User Flow Administrator permissions
1013+
1014+
Create and manage all aspects of user flows.
1015+
1016+
| **Actions** | **Description** |
1017+
| --- | --- |
1018+
| microsoft.aad.b2c/userFlows/allTasks | Read and configure user flows in  Azure Active Directory B2C. |
1019+
1020+
### External Id User Flow Attribute Administrator permissions
1021+
1022+
Create and manage the attribute schema available to all user flows.
1023+
1024+
| **Actions** | **Description** |
1025+
| --- | --- |
1026+
| microsoft.aad.b2c/userAttributes/allTasks | Read and configure user attributes in  Azure Active Directory B2C. |
1027+
10291028
### External Identity Provider Administrator permissions
10301029

10311030
Configure identity providers for use in direct federation.
@@ -1804,8 +1803,6 @@ Application Developer | Application developer | CF1C38E5-3621-4004-A7CB-879624DC
18041803
Authentication Administrator | Authentication administrator | c4e39bd9-1100-46d3-8c65-fb160da0071f
18051804
Azure DevOps Administrator | Azure DevOps administrator | e3973bdf-4987-49ae-837a-ba8e231c7286
18061805
Azure Information Protection Administrator | Azure Information Protection administrator | 7495fdc4-34c4-4d15-a289-98788ce399fd
1807-
B2C User flow Administrator | B2C User flow Administrator | 6e591065-9bad-43ed-90f3-e9424366d2f0
1808-
B2C User Flow Attribute Administrator | B2C User Flow Attribute Administrator | 0f971eea-41eb-4569-a71e-57bb8a3eff1e
18091806
B2C IEF Keyset Administrator | B2C IEF Keyset Administrator | aaf43236-0c0d-4d5f-883a-6955382ac081
18101807
B2C IEF Policy Administrator | B2C IEF Policy Administrator | 3edaf663-341e-4475-9f94-5c398ef6c070
18111808
Billing Administrator | Billing administrator | b0f54661-2d74-4c50-afa3-1ec803f12efe
@@ -1826,6 +1823,8 @@ Directory Readers | Directory readers | 88d8e3e3-8f55-4a1e-953a-9b9898b8876b
18261823
Directory Synchronization Accounts | Not shown because it shouldn't be used | d29b2b05-8046-44ba-8758-1e26182fcf32
18271824
Directory Writers | Not shown because it shouldn't be used | 9360feb5-f418-4baa-8175-e2a00bac4301
18281825
Exchange Service Administrator | Exchange administrator | 29232cdf-9323-42fd-ade2-1d097af3e4de
1826+
External Id User flow Administrator | External Id User flow Administrator | 6e591065-9bad-43ed-90f3-e9424366d2f0
1827+
External Id User Flow Attribute Administrator | External Id User Flow Attribute Administrator | 0f971eea-41eb-4569-a71e-57bb8a3eff1e
18291828
External Identity Provider Administrator | External Identity Provider Administrator | be2f45a1-457d-42af-a067-6ec1fa63bc45
18301829
Global Reader | Global reader | f2ef992c-3afb-46b9-b7cf-a126ee74c451
18311830
Groups Administrator | Groups administrator | fdd7a751-b60b-444a-984c-02652fe8fa1c

0 commit comments

Comments
 (0)