Permissions required to run Remove-AzureRMAdGroup - azure

I'm using an SPN to remove an Azure AD group (Remove-AzureRMAdGroup), but get the error insufficient privileges.
I granted the SPN the following permissions:
Active Directory Graph (2)
- Application Read and write all applications
- Application Read and write directory data
Microsoft Graph (1)
- Application Read and write groups
What permissions are apparently missing here? If we assign the SPN the Azure AD role UserAccountAdmin it works, but we'd prefer to have least privileged access.

Currently, the Read and write directory data permission does not include the ability to do any deletions such as deleting groups. What you need is microsoft.directory/groups/delete permission.
But there is no support today for custom roles in Azure Active Directory. Only the predefined Administrator Roles. You have to grant the SPN the Azure AD role User administrator role which include group deletion permission.
Here are the steps.

Related

Adding Users to the AAD Group via MS Graph

I am trying to add users to the AD Group via MS Graph API using application permission, and can't give GroupMamber.ReadwriteAll permission as this will allow app registration to add people to any group which is a security concern. My app registration is the owner of the AAD group.
Any help is much appreciated.
Thanks.
Please note that, to add users to the Azure AD Group via MS Graph API, you must have one of the below permissions as mentioned in this MsDoc.
Without having at least one of the above permissions, you cannot add users to the Azure AD group.
I assigned the app as owner of the group like below:
I tried to add users to the Azure AD group without granting any of the above permissions and got the error like below:
After granting the required permission, I was able to add the user to Azure AD group successfully like below:

How to restrict deletion of security group in Azure?

Is there any Azure policy can be in place which will restict users so that they Can NOT delete any of the Security groups in Azure? even if they can PIM up below roles:
User Admin
Privileged auth admin
Application admin
Conditional access admin
Privillaged role admin
Identity Governance admin
Security Admin
Thanks.
• For now, no such policy can be applied that prevents security group deletion in Azure. But there is a way through which you can prevent security group deletion through assigned Azure AD roles in Azure. For this purpose, you will have to ensure that you don’t assign Azure AD built-in roles like ‘User Administrator, Privileged authentication administrator, etc.’ directly with the default assigned permissions to these roles to any of the user or a group of users in your Azure AD tenant.
Then, create custom Azure AD roles according to your specific requirement with the required permissions only as described in the documentation link as below: -
https://learn.microsoft.com/en-us/azure/role-based-access-control/custom-roles
https://learn.microsoft.com/en-us/azure/active-directory/roles/custom-create
• Once the custom required Azure PIM specific roles are created, then assign these PIM roles to the required users or a group of users as you deem correct. But do ensure that ‘microsoft.directory/groups/delete’ and ‘microsoft.directory/accessReviews/definitions.groups/delete’ permissions are not assigned to any of these custom PIM roles created and also bar from assigning the built-in Azure AD roles under Privileged Identity Management to any of the users, as these permissions only give the assigned role/user the rights to delete a security group.
In this way, you can restrict the users of PIM and other custom roles or default roles, maybe for that matter, to prevent deleting any security groups in Azure.
Short answer is no, there is no such built-in policy. You would have to rely on custom RBAC roles instead of the built-in roles.
For example, you want to use the NotAction and add this action to it microsoft.directory/groups/delete.
https://learn.microsoft.com/en-us/azure/active-directory/roles/permissions-reference
You can try to use Azure Resources Lock which will protect your resources from accidental deletion, no matter the user permissions. Check this link for more details about Azure resource locks:
https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/lock-resources?tabs=json

Failed to grant "read" permissions to the Managed Instance

I create an azure managed instance, I want to set one account to active directory admin ,But I cannot grant "read" permission to the MI like below screenshot
Obviously, you do not have an administrator role. You need to have your tenant administrator grant you the company administrator or global administrator
role.
Log in to Azure as a global administrator>Azure AD>users>select user>Assigned roles

Azure service principal - API permissions vs. AD Role

I have an application that needs to create AD groups and update their memberships via Graph API. I'll be using a service principal to do so.
I'm trying to understand the difference between:
assigning the service principal to an Azure AD role (for example, "User Administrator": https://learn.microsoft.com/en-us/azure/active-directory/roles/delegate-by-task#groups)
adding API permissions to the service principal (for example, Microsoft Graph API's "Group.ReadWrite.All": https://learn.microsoft.com/en-us/azure/active-directory/roles/delegate-by-task#groups)
What are the differences here? Do they both effectively give the same permissions?
A built-in role is just a collection of permissions so your answer can be yes. If you grant the same permissions in as a built-in role then you will get the same effective permissions. The "User Administrator" role has the following permissions:
https://learn.microsoft.com/en-us/azure/active-directory/roles/permissions-reference#user-administrator
We created built-in roles to make it easier for users to quickly get role based access control in place. If built-in roles don't meet your needs, you can always create a custom role.
I'm mulling over the same question - which approach is better, MS Graph permissions or built-in roles. I'm leaning towards the built in roles for easier visibility and the potential to assign the permissions to groups.
Unless things have changed very recently you can only create AAD custom roles for a subset of "Application Administrator" permissions - not for any permissions.

Azure AD application permissions: Is it possible to get permissions which comes under "Other permissions granted for tenant"?

I am creating an application in Azure AD and assigning "Application" permissions to that applications using Microsoft graph APIs.
When I update the permissions ("requiredResourceAccess" array) for that application, which also includes removing some previously granted permissions. Previously granted permissions which are removed while updating an application comes under "Other permissions granted for tenant".
When I execute Microsoft graph API "https://graph.microsoft.com/v1.0/applications/{id}" to get application's properties, I only get permissions which comes under "Configured permissions" in "requiredResourceAccess" array.
Is there a way/ API which also lists the permissions under "Other permissions granted for tenant"?
Thanks.
You can List appRoleAssignments to get all the application permissions which have been granted to a service principal.
GET https://graph.microsoft.com/v1.0/servicePrincipals/{service_principal_object_id}/appRoleAssignments
{service_principal_object_id} is the object id of the enterprise application associated with the app registration.
Find it here:
Please note this API lists all the application permissions, including Configured permissions and Other permissions granted for tenant.

Resources