Configure and manage Azure Active Directory roles
Azure Active Directory (Azure AD) is Microsoft’s cloud-based identity and access management service, which helps your employees sign in and access resources in:
External resources, such as Microsoft 365, the Azure portal, and thousands of other SaaS applications.
Internal resources, such as apps on your corporate network and intranet, along with any cloud apps developed by your own organization.
Who uses Azure AD?
Azure AD is intended for:
- IT admins - As an IT admin, you can use Azure AD to control access to your apps and your app resources, based on your business requirements. For example, you can use Azure AD to require multi-factor authentication when accessing important organizational resources. Additionally, you can use Azure AD to automate user provisioning between your existing Windows Server AD and your cloud apps, including Microsoft 365. Finally, Azure AD gives you powerful tools to automatically help protect user identities and credentials and to meet your access governance requirements.
- App developers - As an app developer, you can use Azure AD as a standards-based approach for adding single sign-on (SSO) to your app, allowing it to work with a user's pre-existing credentials. Azure AD also provides APIs that can help you build personalized app experiences using existing organizational data.
- Microsoft 365, Office 365, Azure, or Dynamics CRM Online subscribers - As a subscriber, you're already using Azure AD. Each Microsoft 365, Office 365, Azure, and Dynamics CRM Online tenant is automatically an Azure AD tenant. You can immediately start to manage access to your integrated cloud apps.
In Azure AD, if one of your users needs permission to manage Azure AD resources, you must assign them to a role that provides the permissions they need.
If you are new to Azure, you may find it a little challenging to understand all the different roles in Azure. The following section helps explain the following roles and provides additional information on Azure roles and Azure AD roles:
Classic subscription administrator roles
Azure AD roles
Azure AD roles
Azure AD roles are used to manage Azure AD resources in a directory such as create or edit users, assign administrative roles to others, reset user passwords, manage user licenses, and manage domains. The following table describes a few of the more important Azure AD roles.
|Azure AD role||Permissions||Notes|
||The person who signs up for the Azure Active Directory tenant becomes a Global Administrator.|
In the Azure portal, you can see the list of Azure AD roles on the Roles and administrators blade.
Differences between Azure roles and Azure AD roles
At a high level, Azure roles control permissions to manage Azure resources, while Azure AD roles control permissions to manage Azure AD resources. The following table compares some of the differences.
|Azure roles||Azure AD roles|
|Manage access to Azure resources||Manage access to Azure AD resources|
|Supports custom roles||Supports custom roles|
|Scope can be specified at multiple levels (management group, subscription, resource group, resource)||Scope is at the tenant level|
|Role information can be accessed in Azure portal, Azure CLI, Azure PowerShell, Azure Resource Manager templates, REST API||Role information can be accessed in Azure admin portal, Microsoft 365 admin center, Microsoft Graph, Azure AD PowerShell|
Do Azure roles and Azure AD roles overlap?
By default, Azure roles and Azure AD roles do not span Azure and Azure AD. However, if a Global Administrator elevates their access by choosing the Access management for Azure resources switch in the Azure portal, the Global Administrator will be granted the User Access Administrator role (an Azure role) on all subscriptions for a particular tenant. The User Access Administrator role enables the user to grant other users access to Azure resources. This switch can be helpful to regain access to a subscription.
Several Azure AD roles span Azure AD and Microsoft 365, such as the Global Administrator and User Administrator roles. For example, if you are a member of the Global Administrator role, you have global administrator capabilities in Azure AD and Microsoft 365, such as making changes to Microsoft Exchange and Microsoft SharePoint. However, by default, the Global Administrator doesn't have access to Azure resources.
A common way to assign Azure AD roles to a user is on the Assigned roles page for a user. You can also configure the user eligibility to be elevated just-in-time into a role using Privileged Identity Management (PIM).
If you have an Azure AD Premium P2 license plan and already use PIM, all role management tasks are performed in the Privileged Identity Management experience. This feature is currently limited to assigning only one role at a time. You can't currently select multiple roles and assign them to a user all at once.
Create and assign a custom role in Azure Active Directory
This section describes how to create new custom roles in Azure AD. For the basics of custom roles, see the custom roles overview. The role can be assigned either at the directory-level scope or an app registration resource scope only.
Custom roles can be created in the Roles and administrators tab on the Azure AD overview page.
Create a new custom role to grant access to manage app registrations
Sign in to the Azure AD admin center with Privileged role administrator or Global administrator permissions in the Azure AD organization.
Select Azure Active Directory > Roles and administrators > New custom role.
On the Basics tab, provide a name and description for the role and then click Next.
On the Permissions tab, select the permissions necessary to manage basic properties and credential properties of app registrations.
First, enter "credentials" in the search bar and select the
Next, enter "basic" in the search bar, select the
microsoft.directory/applications/basic/updatepermission, and then click Next.
On the Review + create tab, review the permissions and select Create.
Your custom role will show up in the list of available roles to assign.
Assign a custom role scoped to a resource
Like built-in roles, custom roles are assigned by default at the default organization-wide scope to grant access permissions over all app registrations in your organization. This approach allows you to give the user the permission to update credentials and basic properties of a single app without having to create a second custom role.
Sign in to the Azure AD admin center with Application developer permissions in the Azure AD organization.
Select App registrations.
Select the app registration to which you are granting access to manage. You might have to select All applications to see the complete list of app registrations in your Azure AD organization.
In the app registration, select Roles and administrators. If you haven't already created one, instructions are in the preceding procedure.
Select the role to open the Assignments page.
Select Add assignment to add a user. The user will be granted any permissions over only the selected app registration.