Block user from portal.azure.com - azure

My company is using Azure Active Directory. We are able to login into the Azure portal using AAD.
However, we only want a handful of employees to be able to login into the portal. All other employees should be kept out.
How do I accomplish this?

You cant do that if they are part of the AAD, you can however grant them no permissions, so they wont be able to see any resources or do anything on the portal
And you really dont have to do anything to acomplish that. Those are default permissions.
To check users permissions go to the portal and navigate to Azure AD blade.
Portal => AzureAd => Users => pick user => click Azure Resources on the left

Apply the Restrict access to Azure AD administration portal setting, which will block all access unless a user has Directory Reader or higher permissions in Azure AD
https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/users-default-permissions
As a Global admin:
Azure Active Directory
User Settings
Restrict access to Azure AD administration portal -> yes

Or you can just block sign in for the user in the user profile. By this, the blocked users will be denied to log in the portal.
Note: This operation requires the global admin.

Related

Cannot Restrict access to Azure AD administration portal

I am unable to select "Yes" on the Restrict access to Azure AD administration portal option for my Azure AD, even though I have the Global Administrator role. Every time I select yes and hit save I get an "insufficient privileges" message.
Ended up creating a new user and assigning the Global Administrator role to that user. The new user was then able to change the setting.

How to add users to Administrators group in new Azure API Management Developer Portal when only using Azure AD Identity?

I have an API Management instance running where users can login using only Azure AD. There is a single Administrators account, but it is using the legacy User/Password Identity. I cannot remove the user. I want to assign a user from the Azure AD to the Administrators group, but I can not figure out how.
I have followed these steps by Microsoft but they just seem to redirect me to the legacy portal (or the new Developer portal if I change the URL normally) with my default Administrators account logged in.
As far as I know, we can't add another user into "Administrators" group.
The document you provided is used to login another user(which is not admin) as administrator. So the result page shows your default administrators account. The title "How do I add a user to the Administrators group?" of the document is not very accurate.

How to delete a user from Azure AD B2C using the portal?

In Azure portal under Azure AD B2C -> Users, there are two users listed both of which I added while running some of the AD examples. I want to delete both users however the delete button is disabled. How to enable the button and delete the users please?
Edit: I want to remove the user from my tenant directory and any apps they are associated with. If the user is associated with other tenants I don't want to touch that configuration.
Under roles and administrators I am shown as "Global administrator".
This is a paid Azure subscription.
Is it possible you are logged in with the user that is selected in your screenshot? Because this is the only way I am able to reproduce the button being disabled.
Even if you are looking at a B2C directory, you will also have the "normal AAD" users in this list, which are used to manage the directory. This way it could look like you have a user which signed up using a B2C user journey, when in fact it was not.

Insufficient permissions to create Azure DevOps project while having Owner permission

After being invited to a client's Azure account and having "Owner" role + access to "Azure AD user, group, service principal" granted I am able create App Services, import source from Github but when I try to create a DevOps project to start actual work I get an error:
Following the link towards more details I can see that its about permission issue but if I re-check my permissions:
It says "Owner" but the scope is: "This resource" - note that these infos are under the single Subscription that my client created, however if I click my name for detailed view on my identity I see "Guest":
What would be the proper way to grant me global permissions on my clients Azure account?
Thanks!
If you create a project, it will automatically create an AD App named like organizationname-projectname-513f22f1-befd-xxxxxxcfe90f1 in the App Registerations in your tenant.
To fix the issue, let the global admin of your tenant to modify the user settings. Navigate to the Azure Active Directory in the portal -> User settings -> set Users can register applications to Yes.
Then in the Manage external collaboration settings, set the Guest users permission are limited to No.
Besides, if you can get an administrator role, no matter the settings are, you can create the app directly.

Azure AD App Read Group membership

I am creating a maintenance app to read all group membership from AAD.
When I logged in as user, I am able to read all details -Users and Groups. When I use powershell to read users details - I am able to do. My user have access to read AD User and Group details.
When I try to assign the permission to AD App it needs admin consent to read other user/group details. Basically Azure Graph RBAC reading other details always need admin consent. I want to accomplish the task with my user impersonation to the AD App without asking admin consent. Multifactor authentication always block me when I try to automate it. any help!
If you're an administrator, you can also consent to an application's delegated permissions on behalf of all the users in your tenant. This will prevent the consent dialog from appearing for every user in the tenant.
You can do this from the Azure portal from your application page. From the Settings blade for your application, click Required Permissions and click on the Grant Permissions button.
More details about Grant permissions to an APP in Azure AD, refer to this document.

Resources