Design and implement app management roles

Completed

This unit describes how to use permissions granted by custom roles in Microsoft Entra ID to address your application management needs. In Microsoft Entra ID, you can delegate application creation and management permissions by:

  • Restricting who can create applications and manage the applications they create.
  • Assigning one or more owners to an application. Assigning owners is a simple way to grant someone the ability to manage all aspects of Microsoft Entra ID configuration for a specific application.
  • Assigning a built-in administrative role that grants access to manage configuration in Microsoft Entra ID for all applications. Built-in roles are the recommended way to grant IT experts access to manage broad application configuration permissions without granting access to manage other parts of Microsoft Entra ID not related to application configuration.
  • Creating a custom role defining specific permissions and assigning it to someone either to the scope of a single application as a limited owner, or at the directory scope (all applications) as a limited administrator.

It's important to consider granting access using one of the above methods for two reasons. First, delegating the ability to perform administrative tasks reduces global administrator overhead. Second, using limited permissions improves your security posture and reduces the potential for unauthorized access.

Restrict who can create applications

In Microsoft Entra ID, all users can register application registrations and manage all aspects of applications they create. Everyone also has the ability to consent to apps accessing company data on their behalf. You can choose to selectively grant those permissions by setting the global switches to "No" and adding the selected users to the Application Developer role.

  1. Sign in to your Microsoft Entra organization with an account that's eligible for the Global Administrator role in your Microsoft Entra organization.

  2. Set one or both of the following:

    • On the User settings page for your organization, set the Users can register applications setting to No. This disables the default ability for users to create application registrations.
    • On the User Settings for enterprise applications, configure if users can add Gallery Apps to My App or if Office 365 apps appear in the Office portal.
    • On the Consent and Permissions settings for enterprise applications, set the Users can consent to applications accessing company data on their behalf setting to No. This disables the default ability for users to consent to applications accessing company data on their behalf.

Assign the Application Developer role to grant the ability to create application registrations when the Users can register applications setting is set to No. This role also grants permission to consent on one's own behalf when the Users can consent to apps accessing company data on their behalf setting is set to No. As a system behavior, when a user creates a new application registration, they're automatically added as the first owner. Ownership permissions give the user the ability to manage all aspects of an application registration or enterprise application that they own.

Assign application owners

Assigning owners is a simple way to grant the ability to manage all aspects of Microsoft Entra ID configuration for a specific application registration or enterprise application. As a system behavior, when a user creates a new application registration, they're automatically added as the first owner. Ownership permissions give the user the ability to manage all aspects of an application registration or enterprise application that they own. The original owner can be removed and additional owners can be added.

Enterprise application owners

As an owner, a user can manage the organization-specific configuration of the enterprise application, such as the SSO configuration, provisioning, and user assignments. An owner can also add or remove other owners. Unlike Global Administrators, owners can manage only the enterprise applications they own.

In some cases, enterprise applications created from the application gallery include both an enterprise application and an application registration. When this is true, adding an owner to the enterprise application automatically adds the owner to the corresponding application registration as an owner.

To assign an owner to an enterprise application

  1. Sign in to your Microsoft Entra organization with an account that's eligible for the Application Administrator or Cloud Application Administrator for the organization.
  2. On the App registrations page for the organization, select an app to open the Overview page for the app.
  3. Select Owners to see the list of the owners for the app.
  4. Select Add to select one or more owners to add to the app.

Important

Users and service principals can be owners of application registrations. Only users can be owners of enterprise applications. Groups cannot be assigned as owners of either.

Owners can add credentials to an application and use those credentials to impersonate the application’s identity. The application has more permissions than the owner, and thus would be an elevation of privilege over what the owner has access to as a user or service principal. Depending on the application's permissions, an application owner could potentially create or update users or other objects while impersonating the application.

Assign built-in application admin roles

Microsoft Entra ID has a set of built-in admin roles for granting access to manage configuration in Microsoft Entra ID for all applications. These roles are the recommended way to grant IT experts access to manage broad application configuration permissions without granting access to manage other parts of Microsoft Entra ID not related to application configuration.

  • Application Administrator: Users in this role can create and manage all aspects of enterprise applications, application registrations, and application proxy settings. This role also grants the ability to consent to delegated permissions and application permissions, excluding Microsoft Graph. Users assigned to this role aren't added as owners when creating new application registrations or enterprise applications.

  • Cloud Application Administrator: Users in this role have the same permissions as the Application Administrator role, excluding the ability to manage application proxy. Users assigned to this role aren't added as owners when creating new application registrations or enterprise applications.

    Important

    Application Administrators and Cloud Application Administrators can add credentials to an application and use those credentials to impersonate the application’s identity. The application has permissions that are an elevation of privilege over the admin role's permissions. Depending on the application's permissions, an admin in one of these roles could potentially create or update users or other objects while impersonating the application. Neither role grants the ability to manage Conditional Access settings.

Create and assign a custom role

Creating custom roles and assigning custom roles are separate steps:

  • Create a custom role definition and add permissions to it from a preset list. These are the same permissions used in the built-in roles.
  • Create a role assignment to assign the custom role.

This separation enables you to create a single role definition and then assign it many times at different scopes. A custom role can be assigned at organization-wide scope or at the scope of a single Microsoft Entra object. An example of an object scope is a single app registration. When an administrator uses different scopes, however, the same role definition can be assigned to one person over all of the app registrations in the organization, and then to another person over only a single app or specific app registrations.

Tips when creating and using custom roles for delegating application management:

  • Custom roles only grant access in the most current app registration screen of the Microsoft Entra admin center. They don't grant access in the legacy app registrations screen.
  • Custom roles don't grant access to the Microsoft Entra ID portal when the Restrict access to Microsoft Entra ID administration portal user setting is set to Yes.
  • For app registrations the user has access to, role assignments only show up in the All applications tab on the App registration page. They don't show up in the Owned applications tab.