Dec 19 2016 02:21 AM
All o365 migrated users are able to list whole AAD directory when logging on azure portal. I think this is common since AAD is migrated to new portal. The current aad has no subscription activated (only used for O365), it's not possible to log on classic portal because there is no subscription. Is there a way to block this view for "normal/regular" user (roles)?
Dec 19 2016 11:37 AM
This has always been the case, anyone with access to your tenant could use PowerShell to list objects and their data. You can restrict it to an extent via:
Set-MsolCompanySettings -UsersPermissionToReadOtherUsersEnabled $false
For the case of the Azure (RM) portal, the AAD blade is still new (in preview), so you can expect this to change once it reaches GA.
Dec 20 2016 04:44 AM
Thank you that's true, but I don't expect "regular" user to use PS to obtain info. I would assume these settings are disabled by default for at lease user roles .. as well as adding new App Registrations.
Dec 20 2016 11:02 AM
Agreed, by they're aren't disabled, so if you want to beef up security you'll have to manually turn them on.
Dec 31 2016 02:27 AM
Jan 20 2017 09:45 PM
It is the same as your OnPrem AD - by default the whole directory is available as read-only to any authenticated user.
If you are not concerned about average users using Powershell, then I'd suggest you also not worry about average users using the admin portal and finding the right blade. Both are equally easy to do - but also equally unlikely for a standard user to stumble across.