Skip to content

Commit f28fea4

Browse files
authored
Merge pull request #91621 from jelledruyts/jelledruyts-6841
Clarified exception for granting permissions with Application Admin role
2 parents 1050755 + b1ecee0 commit f28fea4

File tree

1 file changed

+7
-1
lines changed

1 file changed

+7
-1
lines changed

articles/active-directory/users-groups-roles/directory-assign-admin-roles.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@ ms.date: 09/20/2019
1414
ms.author: curtand
1515
ms.reviewer: vincesm
1616
ms.custom: it-pro
17+
ms.custom: fasttrack-edit
1718

1819
ms.collection: M365-identity-device-management
1920
---
@@ -46,11 +47,16 @@ The following administrator roles are available:
4647

4748
### [Application Administrator](#application-administrator-permissions)
4849

49-
Users in this role can create and manage all aspects of enterprise applications, application registrations, and application proxy settings. This role also grants the ability to consent to delegated permissions, and application permissions excluding Microsoft Graph and Azure AD Graph. Users assigned to this role are not added as owners when creating new application registrations or enterprise applications.
50+
Users in this role can create and manage all aspects of enterprise applications, application registrations, and application proxy settings. Note that users assigned to this role are not added as owners when creating new application registrations or enterprise applications.
5051

5152
> [!IMPORTANT]
5253
> This role grants the ability to manage application credentials. Users assigned this role can add credentials to an application, and use those credentials to impersonate the application’s identity. If the application’s identity has been granted access to Azure Active Directory, such as the ability to create or update User or other objects, then a user assigned to this role could perform those actions while impersonating the application. This ability to impersonate the application’s identity may be an elevation of privilege over what the user can do via their role assignments in Azure AD. It is important to understand that assigning a user to the Application Administrator role gives them the ability to impersonate an application’s identity.
5354
55+
This role also grants the ability to _consent_ to delegated permissions and application permissions, with the exception of permissions on the Microsoft Graph and Azure AD Graph.
56+
57+
> [!IMPORTANT]
58+
> This exception means that you can still consent to permissions for _other_ apps (e.g. third party apps or apps that you have registered), but not to permissions on Azure AD itself. You can still _request_ these permissions as part of the app registration, but _granting_ (i.e. consenting to) these permissions requires an Azure AD admin. This means that a malicious user cannot easily elevate their permissions, for example by creating and consenting to an app that can write to the entire directory and through that app's permissions elevate themselves to become a global admin.
59+
5460
### [Application Developer](#application-developer-permissions)
5561

5662
Users in this role can create application registrations when the "Users can register applications" setting is set to No. This role also grants permission to consent on one's own behalf when the "Users can consent to apps accessing company data on their behalf" setting is set to No. Users assigned to this role are added as owners when creating new application registrations or enterprise applications.

0 commit comments

Comments
 (0)