rbac
9 TopicsAdmin‑On‑Behalf‑Of issue when purchasing subscription
Hello everyone! I want to reach out to you on the internet and ask if anyone has the same issue as we do when creating PAYG Azure subscriptions in a customer's tenant, in which we have delegated access via GDAP through PartnerCenter. It is a bit AI formatted question. When an Azure NCE subscription is created for a customer via an Indirect Provider portal, the CSP Admin Agent (foreign principal) is not automatically assigned Owner on the subscription. As a result: AOBO (Admin‑On‑Behalf‑Of) does not activate The subscription is invisible to the partner when accessing Azure via Partner Center service links The partner cannot manage and deploy to a subscription they just provided This breaks the expected delegated administration flow. Expected Behavior For CSP‑created Azure subscriptions: The CSP Admin Agent group should automatically receive Owner (or equivalent) on the subscription AOBO should work immediately, without customer involvement The partner should be able to see the subscription in Azure Portal and deploy resources Actual Behavior Observed For Azure NCE subscriptions created via an Indirect Provider: No RBAC assignment is created for the foreign AdminAgent group The subscription is visible only to users inside the customer tenant Partner Center role (Admin Agent foreign group) is present, but without Azure RBAC. Required Customer Workaround For each new Azure NCE subscription, the customer must: Sign in as Global Admin Use “Elevate access to manage all Azure subscriptions and management groups” Assign themselves Owner on the subscription Manually assign Owner to the partner’s foreign AdminAgent group Only after this does AOBO start working. Example Partner tries to access the subscription: https://portal.azure.com/#@customer.onmicrosoft.com/resource/subscriptions/<subscription-id>/overview But there is no subscription visible "None of the entries matched the given filter" https://learn.microsoft.com/en-us/azure/role-based-access-control/elevate-access-global-admin?tabs=azure-portal%2Centra-audit-logs#step-1-elevate-access-for-a-global-administrator from the customer's global admin. and manual RBAC fix in Cloud console: az role assignment create \ --assignee-object-id "<AdminAgent-Foreign-Group-ObjectId>" \ --role "Owner" \ --scope "/subscriptions/<subscription-id>" \ --assignee-principal-type "ForeignGroup" After this, AOBO works as expected for delegated administrators (foreign user accounts). Why This Is a Problem Partners sell Azure subscriptions that they cannot access Forces resources from customers to involvement from customers Breaks delegated administration principles For Indirect CSPs managing many tenants, this is a decent operational blocker. Key Question to Microsoft / Community Does anyone else struggle with this? Is this behavior by design for Azure NCE + Indirect CSP? Am I missing some point of view on why not to do it in the suggested way?64Views0likes0CommentsAzure API Management Gateway - RBAC on the API level
Is it possible to grant access on specific APIs implementation, making users able to see some APIs but not others inside the same Azure API Management Gateway? For example: User1 can manage green ones, but not red ones. Thanks.286Views0likes3CommentsAAD Conditional Access policies vs Control Access RBAC
Hi community. Could someone explain me the difference between Conditional Access and Control Access RBAC policies? If I understood, with conditional access I configure how a user (internal/external) could login in Azure environment and/or Apps, for example by enabling the MFA or geographical location, and so on. Instead, with conditional access (RBAC) policies I could specify what users/groups (internals/externals) can do: for example I can enable read only privileges for a group for Azure vNet access, or admin privileges for Azure Sentinel. Is it correct? Thank you allSolved7.4KViews1like1CommentProblem: Configure Session Host RBAC Permission for WVD MSIX App Atache
Hi, i‘m trying to setup MSIX AppAtache in My Demo Environment. The WVD Service is Setup using Azure AD Domain Services. I‘m now stuck at the point, where i need do grand RBAC Permission (for Session Hosts) to the Azure File Share. - i created the group AADS_SessionHosts in the Azure AD - When i try to ad the SessionHost Computer Objects in the Azure AD Domain Services, to this group an Error occurse. Error Message = Not the Right Permissions. But i‘m loged in with my AADDS Administrator Account. Is there anybody who can give an advise how to solve this one ? Have a Great Weekend! Cheers.!1.2KViews0likes2CommentsAzure Event Hubs Managed Service Identity (MSI) and Role-based access control (RBAC) (preview) released!
First published on on Dec 20, 2017 We are happy to announce the preview release of Managed Service Identity (MSI) and Role-based access control (RBAC) for Azure Event Hubs.4.9KViews0likes0CommentsAzure Service Bus Managed Service Identity (MSI) and Role-based access control (RBAC) (preview) released!
First published on on Dec 20, 2017 We are happy to announce the preview release of Managed Service Identity (MSI) and Role-based access control (RBAC) for Azure Service Bus.2.7KViews0likes0CommentsCan I use Azure Just in Time (JIT) RBAC without PIM e.g. as a standalone solution
Hello I saw a video show PIM (Privilaged Access Management) and part of it Showed using Just In Time administration to allow a user (after MFA authentication) to elevate to admin to do some work for a set period of time). I need to know more about JIT for RBAC whereby I want to for example give someone the ability to elevate their role (to contributor for example) via MFA or some kind of admin approval, so they can perform a task then their contributor role expires (without necessarily using PIM). However I am having great difficultly finding vidoes, documentation (prefer good videos if available) showing how to set this up and make it work with a few examples and what level of Azure subscription you need to allow JIT RBAC Can someone please advise and point me towards some good vidoes or blog articles on this please Thanks __AAnotherUser7.1KViews0likes1CommentAPI Management with RBAC refererence
Greetings all. I am staerting this conversation, as I have a requirement for a client to implement API management with RBAC. The client will have a group of developers working on different sets of API (Products). A group of developers (maybe in RBAC) working on a Product should not be able to access API sets (products) maintained by another set of developers. I could not find an example for this anywhere on Channel 9 or MVA. Anybody has any info on ths topic? Any guidance or help will be appreciated. Thanks.1.2KViews0likes1Comment