Microsoft Entra ID / Azure Active 
                      Directory Roles

Microsoft Entra ID / Azure Active Directory Roles

Introduction

Sometimes, we may have confusion between two terms - Azure AD roles and Azure roles i.e. role-based access control in Azure. In this article, I will explain some of the core differentiation between those two terms.

Step 1; Explain the difference between Azure AD Roles and Azure Roles Step 2: Create the Admin Department and add two users to it Step

3: Assign the Global Administrator Role to User A Step

4: Show all the steps it took the Global Admin to Log in into the Azure Portal with his new credentials Step

5:Let the Global Administrator create/onboard a new member to the Admin Department

What are Azure AD Roles?

Azure AD is nothing but an identity store in Azure. Here we can define users, groups, applications, and service principles. These users can authenticate onto Azure and they can access resources that are part of Azure subscription.

We can assign Azure AD roles to a user and these permissions are normally given to manage the various aspects of Azure AD.

Let’s say we want to give a user the ability to register applications in Azure, then we can assign them as application administrator role or let's say we want to give the ability for a user to manage groups, then we can assign the group's administrator role to the user.

Azure AD roles are used to manage access to Azure AD resources. These resources include Azure AD itself and other Microsoft 365 platforms such as Exchange and SharePoint

The scope of Azure AD roles is at the tenant level. In other words, these roles apply to the entire Azure AD environment for a specific organization or subscription.

Examples of Azure AD Roles:

Global Administrator: Has full access to all Azure AD resources.

User Administrator: Manages user accounts and groups.

Application Administrator: Manages applications registered in Azure AD.

Security Administrator: Manages security-related settings.

What is Azure Roles (Role-Based Access Control - RBAC):

Azure roles are used to manage access to Azure resources. These resources include virtual machines, storage accounts, subscriptions, and more. On the other hand, role-based access control (RBAC) is meant to authorize a user to use resources in Azure.

So for example, you could give a role for a user to go ahead and give them the ability to create a storage account or to manage resource groups.

Role-based access control can be given at the management group level, subscription level, resource group level, or at the resource level.

Management Group: Applies to a group of subscriptions.

Subscription: Applies to a specific subscription.

Resource Group: Applies to resources within a resource group.

Resource: Applies to individual resources.

Examples of Azure Roles:

Owner
This role has full access to all the resources and can delegate access to others.
Contributor
This role can create and manage all types of resources, but can’t grant access to other users and groups.
Reader
This role can view existing Azure resources.

Custom Roles: Organizations can create custom roles with specific permissions.

2: Create the Admin Department and add two users to it Step search for “Microsoft Entra ID” and click on it, first we be creating users and proceed to create a group that will represent the admin department:

CREATE USER;

1 Click on the user under overview

2 Select new user and click on create new user

3: Basic; under basic proceed to identity and give your user “User principal name”

4: Display name you want and click on Auto-generate password to create your own password or you leave it to the generated one.

5: Click on Review and create

6: Creating a group

creating group is the first steps to take before creating admin department

Search for and select Azure Active Directory

On the Active Directory page, click on Groups and then select + New group.

Fill Out the New Group Form:

Click Create:

Your group will be created, and you can now add members to it.

Click on member and see the user we create

3: Assign the Global Administrator Role to User A Step

Let’s walk through the steps to assign the Global Administrator role to a user in Microsoft Entra ID

As a Global Admin, you have the authority to assign roles to users

Navigate to Users > Active users

Choose the user you want to make an admin.

Click on Assigned roles

Click on add assignment

Select Manage roles:

Pick the admin access you want the user to have (e.g., Global Administrator) and click add.

4: Show all the steps it took the Global Admin to Log in into the Azure Portal with his new credentials Step.

Let’s simplify the sign-in process for a Global Admin to access the Azure Portal portal.azure.com with new credentials.

Open your web browser and go to the Azure Portal or Incognito window

On the sign-in page, type your email address

using the credentials that’s the user-email and password that was selected when the user was created that was used during the creation process.

Click the Sign In button, and you’re authenticated

Sign in on with the User principal name

sign in the password you create or the generated one

then update your password

Ask later

5: Let the Global Administrator create/onboard a new member to the Admin Department.

Navigate to Users: From the left navigation pane, click on Users.

Click on + Add a user

Fill in the required details for the new user

select assignment, click on group

Under select group, click on the group we are adding to, and Assign the appropriate role.

Click on Review + create and CREATE

Navigate to All user and see all the user, new user as been added under member

New member under Admin Department Member group Create.

If you now go to the Role assignments tab, you will now see the role assigned to the user as a Reader.

As a Global Administrator, you can grant additional permissions or roles to the new user as needed ( granting admin roles, access to specific resources, etc.).

Summary

Azure AD roles are used to manage access to Azure AD resources, whereas Azure roles are used to manage access to Azure resources.

The scope of Azure AD roles is at the tenant level, whereas the scope of Azure roles can be specified at multiple levels including management group, subscription, resource group, resource.

I hope you found this information useful!