Azure AD Assign Roles to Group - azure

I have azure personal account and I have a Global Administrator and Privileged Role Administrator in Azure
when I go to Groups ==> new group I don't see the new checkbox
Azure AD roles can be assigned to the group checkbox. please let me know what I am missing

To get the Azure AD roles can be assigned to the group (Preview) feature visibility in the Azure portal you need to have Azure AD Premium P1 license in your Azure AD organization
If you won't have the right license you will not be able to use this feature
For more information please refer this document

Related

Azure resource access management and its relation with tenant

Azure ARM handles identity requirements for the requests it receives through Azure AD. The requesting user should be a valid Azure AD user with a valid identity and authorization roles. The azure subscription for which the request is made should comply to deployment limits and biling policies.
There is a role of Azure Tenant that is associated with requesting user and Subscription. What role these tenants play and what is the workflow ?
I'm not sure what you mean exactly by the role of the Azure tenant in this context, but you can assign roles at the tenant scope and that's what the ARM template documentation describes. For example, you can assign an Owner role to a user at the tenant scope so that the user is an Owner of the tenant. As for the relationship between tenants and subscriptions, multiple subscriptions can trust the same Azure AD tenant, but each subscription can only trust a single tenant. You can associate a subscription with a tenant by logging in and selecting the Subscription, and then changing the directory. With a Global Admin or User Admin role, you can add or remove users from your tenant.
As I'm sure you already know, an Azure tenant is a dedicated and trusted instance of Azure AD. Typically, each tenant represents a single organization. The words "tenant" and "directory" are used interchangeably. The tenant is an account in Azure that comes with a subdomain and an associated Azure Active Directory. In order to use an Azure Active Directory you need to become a tenant within the system. So a tenant is basically securing a .onmicrosoft.com subdomain. At that point you would have one account registered in your Azure AD.
So in the context of the ARM template, you need an Azure tenant to house your users and link to your subscriptions.
A tenant represents an organization in Azure Active Directory. It's a dedicated Azure AD service instance that an organization receives and owns when it signs up for a Microsoft cloud service such as Azure, Microsoft Intune, or Microsoft 365. Each Azure AD tenant is distinct and separate from other Azure AD tenants. Once you have an Azure AD tenant, you can define an application and assign it permissions so it can call REST APIs. Your organization may already have an Azure AD tenant that you can use for your application.
In Azure AD, users are segmented into tenants. A tenant is a logical construct that represents a secure, dedicated instance of Azure AD typically associated with an organization. Each subscription is associated with an Azure AD tenant. Next, the ARM checks whether the user has sufficient permission to access a resource using Azure RBAC (Role based Access Control) which manages the permissions. An Azure role specifies a set of permissions a user may take on a specific resource. Next, the resource request is checked against an Azure Resource Policy which are defined to allow specific operations for a specific resource. Next, ARM checks the Azure subscription limit for the specific resources in that subscription for resource groups. And finally, the financial commitment associated with the subscription is checked as a final control before deploying the resource for management through the ARM.
ARM flow and working
Please find the below Microsoft documentation for your reference: -
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/govern/resource-consistency/resource-access-management
Thanking you,

Azure global admin cannot(disabled) add roles under "Access Control(IAM)"

I activated my global admin role in Privileged Identity Management like so
When I navigate to the Access Control blade under a subscription, I see the Add role assignment options disabled.
Doesn't global admin has global rights and can do this?
Thanks
Doesn't global admin has global rights and can do this?
No. You're global admin in your Azure AD so you can perform all operations in Azure AD. Azure AD roles are different than Azure Subscription roles.
To be able to perform IAM related activities in an Azure Subscription, you must be assigned an Owner or User Access Administrator role in that Azure Subscription.
Considering you're the global admin in your Azure AD, you can elevate your permissions to perform IAM activities in Azure Subscription. Please see this link for more details: https://learn.microsoft.com/en-us/azure/role-based-access-control/elevate-access-global-admin.
Other option would be to ask someone in your team with proper access in the Azure Subscription to assign you in Owner or User Access Administrator role.
Azure roles happen to be different than Azure AD roles.
By default AD roles manage AD and azure roles manage azure resources. However there are some cross roles which can access resources across when needed. more information here
Since Global Administrator is a cross-service role, he can elevate himself by granting himself the user access administrator role as here. Then I was able to see the disabled options, enabled.
more information

Azure Policy to limit number of global administrator users

We need to create azure policy to restrict user count with global administrator role to 5 at a time. But there is no reference of how can we get the role and count its member in azure policy. Please let me know no how can I approach this.
Note We need azure policy and not power-shell or portal steps to limit the restriction.
It is not possible to manage Azure AD roles using Azure Policies, Global Administrator is an Azure Ad role. Please refer this document .
Azure Policy doesn't restrict actions (also called operations)and azure policies are different, its for Azure Resources not for Azure AD.

Azure AD create user group for Application

I have created a group with some users in my Azure AD.
https://learn.microsoft.com/en-us/azure/active-directory/active-directory-groups-create-azure-portal
(membership i set to assigned)
Now i want to assign these users to a application inside the AD.
https://learn.microsoft.com/en-us/azure/active-directory/active-directory-accessmanagement-group-saasapps
In the classic portal (step 4) there is only a users tab at my application not a groups and users.
In the new portal there is users and groups but the groups won't show up.
I tried this also in the
Somehow, when i use the add user/group button, i find all my users from the AD but not the group i created.
Update:
My APP was not created as Enterprise Apllication.Instead i created the APP just as new Application registration (Web app / API).
But it is also listed in the Enterprise Applications list
Question:
What could be the reason for this?
Solution:
It is a license problem, so we didn't get this feature at all.
Using Azure Active Directory (Azure AD) with an Azure AD Premium or
Azure AD Basic license, you can use groups to assign access to a SaaS
application that's integrated with Azure AD.
As the documentation mentioned, Using Azure Active Directory (Azure AD) with an Azure AD Premium or Azure AD Basic license, you can use groups to assign access to a SaaS application that's integrated with Azure AD.
Here the screenshot about the premium Azure AD, please check it:
Under the Azure Active Directory editions documentation it states Group-based access management / provisioning is an Azure AD Basic feature. This is also covered in the Azure AD Premium P1/P2 SKU.
"Group-Based Access Management" is the feature name for having the ability to assign a group to an application.
Azure Active Directory Free is available to configure 10 applications to Azure Active Directory and assign user access based by user assignment - not group assignment.
Here is a chart that outlines FREE, BASIC, PREMIUM P1, PREMIUM P2

Authorization of web app to Azure AD role or group

Do we need Azure Active directory premium to do Role-based or Group based Authorization ?
I ask this question because my Azure portal is not giving me "Users" tab as mentioned in this link.
Group-based access is a Basic/Premium feature as defined here.
Using Azure Active Directory (Azure AD) with an Azure AD Premium or Azure AD Basic license, you can use groups to assign access to a SaaS application that's integrated with Azure AD.
You can only assign individual users to apps after you enable User assignment required to access app. But the Users tab should definitely be available though.

Resources