Role-based administration control (RBAC) with Microsoft Intune
RBAC helps you control who can perform various Intune tasks within your organization, and who those tasks apply to. You can either use the built-in roles that cover some common Intune scenarios, or you can create your own roles. A role is defined by:
- Role definition: The name of a role, the resources it manages, and the permissions granted for each resource.
- Members: The user groups that are granted the permissions.
- Scope (Groups): The user or device groups that the members can manage.
- Scope (Tags): Tags where the role assignment applies.
- Assignment: When the definition, members, and scope have been configured, the role is assigned.
Starting at the new Azure portal, Azure Active Directory (Azure AD) provides two Directory Roles which can be used with Intune. These roles are granted full permission to perform all activities in Intune:
Global Administrator: Users with this role have access to all administrative features in Azure AD, as well as services that federate to Azure AD like Exchange Online, SharePoint Online, and Skype for Business Online. The person who signs up for the Azure AD tenant becomes a global administrator. Only global administrators can assign other Azure AD administrator roles. There can be more than one global administrator at your organization. Global admins can reset the password for any user and all other administrators.
Intune Service Administrator: Users with this role have global permissions within Intune when the service is present. Additionally, other than any superseding Azure restrictions, this role provides the ability to manage users, devices, and create and manage Intune groups.
Conditional Access Administrator: Users with this role only have permissions to view, create, modify, and delete conditional access policies.
The Intune Service Administrator role does not provide the ability to manage Azure AD’s conditional access settings. To be assigned an Intune role, the user must have an Intune license.
Intune also shows three Azure AD extensions: Users, Groups, and Conditional access, which are controlled using Azure AD RBAC. Additionally, the User Account Administrator only performs AAD user/group activities and does not have full permissions to perform all activities in Intune. For more information, see RBAC with Azure AD.
Roles created in the Intune classic portal
Only Intune Service Administrators users with "Full" permissions get migrated from the Intune classic portal to Intune in the Azure portal. You must reassign Intune Service Administrators users with "Read-Only" or "Helpdesk" access into the Intune roles in the Azure portal, and remove them from the classic portal.
You might need to keep the Intune Service Administrator access in the classic portal if your admins still need access to manage PCs using Intune.
You can assign built-in roles to groups without further configuration. You can't delete or edit a built-in role.
Help Desk Operator: Performs remote tasks on users and devices, and can assign applications or policies to users or devices.
Policy and Profile Manager: Manages compliance policy, configuration profiles, Apple enrollment, and corporate device identifiers.
Read Only Operator: Views user, device, enrollment, configuration, and application information. Can't make changes to Intune.
Application Manager: Manages mobile and managed applications, can read device information and can view device configuration profiles.
Intune Role Administrator: Manages custom Intune roles and adds assignments for built-in Intune roles. It's the only Intune role that can assign permissions to Administrators.
School Administrator: Manages Windows 10 devices in Intune for Education, and can take the following actions:
Permission Operation Audit Data Read DeviceConfigurations Assign, Create, Delete, Read, Update Device Enrollment Managers Read, Update Managed Devices Read, Update Mobile apps Assign, Create, Delete, Read, Update Reports Read Remote Actions Clean PC, Reboot, Remote Lock, Retire, Sync Devices, Wipe Organization Read
To assign a built-in role
Sign into the Azure portal.
Choose All services > Intune. Intune is located in the Monitoring + Management section.
On the Intune blade, choose Roles > All roles.
On the Intune roles - All roles blade, choose the built-in role you want to assign.
On the <role name> - Overview blade, choose Manage > Assignments.
On the custom role blade, choose Assign.
On the Role Assignments blade, enter an Assignment name and optional Assignment description for the assignment.
For Members (Groups), choose a group that contains the user you want to give the permissions to.
For Scope (Groups), choose a group containing the users who the member above will be allowed to manage.
For Scope (Tags), choose tags where this role assigment will be applied.
When you're done, choose OK. The new assignment is displayed in the list of assignments.
Intune RBAC table
- Download the Intune RBAC table to see more details on what each role can do.
You can create a custom role that includes any permissions required for a specific job function. For example, if an IT department group manages applications, policies, and configuration profiles, you can add all those permissions together in one custom role.
To create, edit, or assign roles, your account must have one of the following permissions in Azure AD:
- Global Administrator
- Intune Service Administrator
To create a custom role
Sign into the Azure portal with your Intune credentials.
Choose All services from the left menu, then type Intune in the text box filter.
Choose Intune > Roles > All roles > Add.
On the Add Custom Role blade, enter a name and description for the new role, then click Permissions.
On the Permissions blade, choose the permissions you want to use with this role. Use the Intune RBAC table to help you decide which permissions you want to apply.
On the Scope (Tags) blade, choose tags where this custom role will be applied.
When you're done, choose OK.
On the Add Custom Role blade, click Create. The new role is displayed in the list on the Intune roles - All roles blade.
To assign a custom role
Follow the same steps as To assign a built-in role and select the custom role.
We'd love to hear your thoughts. Choose the type you'd like to provide:
Our feedback system is built on GitHub Issues. Read more on our blog.