You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/users-groups-roles/directory-assign-admin-roles.md
+9-6Lines changed: 9 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,18 +39,21 @@ The following administrator roles are available:
39
39
40
40
***[Application Developer](#application-developer)**: Users in this role can create application registrations when the "Users can register applications" setting is set to No. This role also allows members to consent on their own behalf when the "Users can consent to apps accessing company data on their behalf" setting is set to No. Members of this role are added as owners when creating new application registrations or enterprise applications.
41
41
42
-
***[Authentication Administrator](#authentication-administrator)**: Users with this role can set or reset non-password credentials. Authentication Administrators can force users to re-register against existing non-password credential (e.g. MFA, FIDO) and revoke ‘remember MFA on the device’, prompting for MFA on the next login of other users who are non-administrators or members of the following roles only:
42
+
***[Authentication Administrator](#authentication-administrator)**: Users with this role can set or reset non-password credentials. Authentication Administrators can require users to re-register against existing non-password credential (for example, MFA or FIDO) and revoke **remember MFA on the device**, pwhich rompts for MFA on the next sign-in of users who are non-administrators or members of the following roles only:
43
43
* Authentication Administrator
44
44
* Directory Readers
45
45
* Guest Inviter
46
46
* Message Center Reader
47
47
* Reports Reader
48
-
48
+
49
+
The Authentication administrator role is currently in public preview. This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
50
+
49
51
<b>Important</b>: Users with this role can change credentials for people who may have access to sensitive or private information or critical configuration inside and outside of Azure Active Directory. Changing the credentials of a user may mean the ability to assume that user's identity and permissions. For example:
52
+
50
53
* Application Registration and Enterprise Application owners, who can manage credentials of apps they own. Those apps may have privileged permissions in Azure AD and elsewhere not granted to Authentication Administrators. Through this path a Authentication Administrator may be able to assume the identity of an application owner and then further assume the identity of a privileged application by updating the credentials for the application.
51
-
*Azure subscription owners, who may have access to sensitive or private information or critical configuration in Azure.
52
-
*Security Group and Office 365 Group owners, who can manage group membership. Those groups may grant access to sensitive or private information or critical configuration in Azure AD and elsewhere.
53
-
*Administrators in other services outside of Azure AD like Exchange Online, Office Security and Compliance Center, and human resources systems.
54
+
*Azure subscription owners, who may have access to sensitive or private information or critical configuration in Azure.
55
+
*Security Group and Office 365 Group owners, who can manage group membership. Those groups may grant access to sensitive or private information or critical configuration in Azure AD and elsewhere.
56
+
*Administrators in other services outside of Azure AD like Exchange Online, Office Security and Compliance Center, and human resources systems.
54
57
* Non-administrators like executives, legal counsel, and human resources employees who may have access to sensitive or private information.
55
58
56
59
***[Billing Administrator](#billing-administrator)**: Makes purchases, manages subscriptions, manages support tickets, and monitors service health.
@@ -294,7 +297,7 @@ Can create application registrations independent of the ‘Users can register ap
294
297
| microsoft.aad.directory/servicePrincipals/createAsOwner | Create servicePrincipals in Azure Active Directory. Creator is added as the first owner, and the created object counts against the creator's 250 created objects quota. |
295
298
296
299
### Authentication Administrator
297
-
Allowed to view, set and reset authentication method information for any non-admin user.
300
+
Allowed to view, set, and reset authentication method information for any non-admin user.
0 commit comments