You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/devices/assign-local-admin.md
+23-35Lines changed: 23 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: devices
8
8
ms.topic: how-to
9
-
ms.date: 06/28/2019
9
+
ms.date: 02/08/2022
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
@@ -40,64 +40,53 @@ To view and update the membership of the global administrator role, see:
40
40
-[View all members of an administrator role in Azure Active Directory](../roles/manage-roles-portal.md)
41
41
-[Assign a user to administrator roles in Azure Active Directory](../fundamentals/active-directory-users-assign-role-azure-portal.md)
42
42
43
-
44
43
## Manage the device administrator role
45
44
46
-
In the Azure portal, you can manage the device administrator role on the **Devices** page. To open the **Devices** page:
47
-
48
-
1. Sign in to your [Azure portal](https://portal.azure.com) as a global administrator.
49
-
1. Search for and select *Azure Active Directory*.
50
-
1. In the **Manage** section, click **Devices**.
51
-
1. On the **Devices** page, click **Device settings**.
45
+
In the Azure portal, you can manage the device administrator role from **Device settings**.
52
46
53
-
To modify the device administrator role, configure **Additional local administrators on Azure AD joined devices**.
47
+
1. Sign in to the [Azure portal](https://portal.azure.com) as a global administrator.
48
+
1. Browse to **Azure Active Directory** > **Devices** > **Device settings**.
49
+
1. Select **Manage Additional local administrators on all Azure AD joined devices**.
50
+
1. Select **Add assignments** then choose the other administrators you want to add and select **Add**.
54
51
55
-

52
+
To modify the device administrator role, configure **Additional local administrators on all Azure AD joined devices**.
56
53
57
54
> [!NOTE]
58
-
> This option requires an Azure AD Premium tenant.
55
+
> This option requires Azure AD Premium licenses.
59
56
60
-
Device administrators are assigned to all Azure AD joined devices. You cannot scope device administrators to a specific set of devices. Updating the device administrator role doesn't necessarily have an immediate impact on the affected users. On devices where a user is already signed into, the privilege elevation takes place when *both* the below actions happen:
57
+
Device administrators are assigned to all Azure AD joined devices. You can’t scope device administrators to a specific set of devices. Updating the device administrator role doesn't necessarily have an immediate impact on the affected users. On devices where a user is already signed into, the privilege elevation takes place when *both* the below actions happen:
61
58
62
59
- Upto 4 hours have passed for Azure AD to issue a new Primary Refresh Token with the appropriate privileges.
63
60
- User signs out and signs back in, not lock/unlock, to refresh their profile.
64
-
- Users will not be listed in the local administrator group, the permissions are received through the Primary Refresh Token.
61
+
- Users won't be listed in the local administrator group, the permissions are received through the Primary Refresh Token.
65
62
66
63
> [!NOTE]
67
64
> The above actions are not applicable to users who have not signed in to the relevant device previously. In this case, the administrator privileges are applied immediately after their first sign-in to the device.
68
65
69
66
## Manage administrator privileges using Azure AD groups (preview)
70
67
71
-
Starting with Windows 10 version 2004, you can use Azure AD groups to manage administrator privileges on Azure AD joined devices with the [Restricted Groups](/windows/client-management/mdm/policy-csp-restrictedgroups) MDM policy. This policy allows you to assign individual users or Azure AD groups to the local administrators group on an Azure AD joined device, providing you the granularity to configure distinct administrators for different groups of devices.
72
-
73
-
> [!NOTE]
74
-
> Starting in the Windows 10 20H2 update, we recommend using [Local Users and Groups](/windows/client-management/mdm/policy-csp-localusersandgroups) policy instead of the Restricted Groups policy.
68
+
Starting with Windows 10 version 20H2, you can use Azure AD groups to manage administrator privileges on Azure AD joined devices with the [Local Users and Groups](/windows/client-management/mdm/policy-csp-localusersandgroups) MDM policy. This policy allows you to assign individual users or Azure AD groups to the local administrators group on an Azure AD joined device, providing you the granularity to configure distinct administrators for different groups of devices.
75
69
76
-
These policies can be configured in Intune using either [Custom OMA-URI Settings](/mem/intune/configuration/custom-settings-windows-10) or the [Local user group membership profile](/mem/intune/protect/endpoint-security-account-protection-policy#manage-local-groups-on-windows-devices) which is currently in preview as per the following [blog](https://techcommunity.microsoft.com/t5/intune-customer-success/new-settings-available-to-configure-local-user-group-membership/ba-p/3093207).
77
-
A few considerations for using either of these policies:
70
+
Currently, there's no UI in Intune to manage these policies and they need to be configured using [Custom OMA-URI Settings](/mem/intune/configuration/custom-settings-windows-10). A few considerations for using this policy:
78
71
79
72
- Adding Azure AD groups through the policy requires the group's SID that can be obtained by executing the [Microsoft Graph API for Groups](/graph/api/resources/group). The SID is defined by the property `securityIdentifier` in the API response.
80
73
81
-
-When Restricted Groups policy is enforced, any current member of the group that is not on the Members list is removed. So enforcing this policy with new members or groups will remove the existing administrators namely user who joined the device, the Device administrator role and Global administrator role from the device. To avoid removing existing members, you need to configure them as part of the Members list in the Restricted Groups policy. This limitation is addressed if you use the Local Users and Groups policy that allows incremental updates to group membership
74
+
-Administrator privileges using this policy are evaluated only for the following well-known groups on a Windows 10 device - Administrators, Users, Guests, Power Users, Remote Desktop Users and Remote Management Users.
82
75
83
-
-Administrator privileges using both policies are evaluated only for the following well-known groups on a Windows 10 device - Administrators, Users, Guests, Power Users, Remote Desktop Users and Remote Management Users.
76
+
-Managing local administrators using Azure AD groups isn't applicable to Hybrid Azure AD joined or Azure AD Registered devices.
84
77
85
-
- Managing local administrators using Azure AD groups is not applicable to Hybrid Azure AD joined or Azure AD Registered devices.
86
-
87
-
- While the Restricted Groups policy existed prior to Windows 10 version 2004, it did not support Azure AD groups as members of a device's local administrators group.
88
-
- Azure AD groups deployed to a device with either of the two policies do not apply to remote desktop connections. To control remote desktop permissions for Azure AD joined devices, you need to add the individual user's SID to the appropriate group.
78
+
- Azure AD groups deployed to a device with this policy don't apply to remote desktop connections. To control remote desktop permissions for Azure AD joined devices, you need to add the individual user's SID to the appropriate group.
89
79
90
80
> [!IMPORTANT]
91
81
> Windows sign-in with Azure AD supports evaluation of up to 20 groups for administrator rights. We recommend having no more than 20 Azure AD groups on each device to ensure that administrator rights are correctly assigned. This limitation also applies to nested groups.
92
82
93
-
94
83
## Manage regular users
95
84
96
85
By default, Azure AD adds the user performing the Azure AD join to the administrator group on the device. If you want to prevent regular users from becoming local administrators, you have the following options:
Windows Autopilot provides you with an option to prevent primary user performing the join from becoming a local administrator. You can accomplish this by [creating an Autopilot profile](/intune/enrollment-autopilot#create-an-autopilot-deployment-profile).
100
-
-[Bulk enrollment](/intune/windows-bulk-enroll) - An Azure AD join that is performed in the context of a bulk enrollment happens in the context of an auto-created user. Users signing in after a device has been joined are not added to the administrators group.
88
+
Windows Autopilot provides you with an option to prevent primary user performing the join from becoming a local administrator by [creating an Autopilot profile](/intune/enrollment-autopilot#create-an-autopilot-deployment-profile).
89
+
-[Bulk enrollment](/intune/windows-bulk-enroll) - An Azure AD join that is performed in the context of a bulk enrollment happens in the context of an auto-created user. Users signing in after a device has been joined aren't added to the administrators group.
101
90
102
91
## Manually elevate a user on a device
103
92
@@ -112,13 +101,12 @@ Additionally, you can also add users using the command prompt:
112
101
113
102
## Considerations
114
103
115
-
You cannot assign groups to the device administrator role, only individual users are allowed.
116
-
117
-
Device administrators are assigned to all Azure AD Joined devices. They can't be scoped to a specific set of devices.
118
-
119
-
When you remove users from the device administrator role, they still have the local administrator privilege on a device as long as they are signed in to it. The privilege is revoked during their next sign-in when a new primary refresh token is issued. This revocation, similar to the privilege elevation, could take upto 4 hours.
104
+
- You can only assign role based groups to the device administrator role.
105
+
- Device administrators are assigned to all Azure AD Joined devices. They can't be scoped to a specific set of devices.
106
+
- Local administrator rights on Windows devices aren't applicable to [Azure AD B2B guest users](../external-identities/what-is-b2b.md).
107
+
- When you remove users from the device administrator role, changes aren't instant. Users still have local administrator privilege on a device as long as they're signed in to it. The privilege is revoked during their next sign-in when a new primary refresh token is issued. This revocation, similar to the privilege elevation, could take upto 4 hours.
120
108
121
109
## Next steps
122
110
123
-
- To get an overview of how to manage device in the Azure portal, see [managing devices using the Azure portal](device-management-azure-portal.md)
124
-
- To learn more about device-based Conditional Access, see [configure Azure Active Directory device-based Conditional Access policies](../conditional-access/require-managed-devices.md).
111
+
- To get an overview of how to manage device in the Azure portal, see [managing devices using the Azure portal](device-management-azure-portal.md).
112
+
- To learn more about device-based Conditional Access, see [Conditional Access: Require compliant or hybrid Azure AD joined device](../conditional-access/howto-conditional-access-policy-compliant-device.md).
0 commit comments