Dec 01 2017 09:43 AM
Upon testing the different Admin Roles with PowerShell, I came across the fact that a standard user can run a lot of Get-Msol Cmdlets. Is there something that I missed to block standard user's from being able to make a connection through Powershell to Azure Active Directory?
Dec 01 2017 09:59 AM
You absolutely can, information and scripts available here.
Dec 02 2017 04:06 AM
SolutionUm, that article is for Azure PowerShell, not Azure AD. You cannot restrict users from using the MSOL/AzureAD, unless you are willing to block other things as well (read: Conditional access supposedly covers the admin endpoints now, but you cannot actually configure any explicit includes/excludes for those).
You can however limit the information they can get by configuring the following:
Set-MsolCompanySettings -UsersPermissionToReadOtherUsersEnabled $false
Similar concerns apply to the Azure AD portal btw, make sure to toggle the "Restrict access to the Azure AD administration portal" setting in the Azure AD blade.
Dec 04 2017 06:58 AM
Thank you Vasil! After reading the article I saw that it wasn't correct. Thank you for the answer.
Dec 11 2017 06:15 PM
Dec 12 2017 12:08 AM
Yup, figures, and it's probably related to the audit issue in general. They have promised to support legacy auth, and it should be coming soon (I hope). Until then, I guess good old AD FS claims rules are the only way to block things across the board.
Jan 08 2018 10:03 PM
Keep in mind too that a typical OnPrem AD provides full read access to the same information to any standard user.
Jan 08 2018 10:08 PM