Not able to access Azure Active Directory - azure

I have created a new account on portal.azure.com. When going to Azure Active Directory tab in account I am getting this error- Access denied You do not have access Looks like you don't have access to this content. To get access, please contact the owner.accessdenied

You need to have Global/Company Administrator set on your user in order to be able to view certain parts of Azure AAD. Your account administrator will be able to change the permission. See here for more information about roles in AAD

Related

Why can't my User login to the azure portal?

Background: I am trying to setup my azure infrastructure to deploy my new web app. I am working with an external contractor cloud engineer and I only want her to be able to setup my cloud infrastructure.
Steps: I have 1 Subscription and 1 Resource Group. I have created a User in my organisation (so not a guest) in Azure AD - I will share these details with her.
I have put this new User inside a User Group and I have permissioned the User Group (as a Contributor) against my Resource Group. I have shared the username and password with her.
Problem: When she logs on to portal.azure.com she gets the message "Your sign-in was successful, but you don't have permission to access this resource."
Clearly I am missing something? I thought this was straightforward... alas
TIA.
Sometimes this may happen due to the internal policy, make sure to recheck them once again.
After this if you create a personal login detail separately then it will work out.
Here is the reference of Your sign-in was successful but you don't have permission to access this resource for the same above.
If the user is a guest user incase, then administrator of guest tenant will delete your account from their tenant.
Here is the Reference given by #Amanpreet Singh.
Common steps to be followed as below,
After login to the Azure portal as a Admin.
Go to Azure Active Directory
Select the All services, then Azure AD Conditional Access.
Here you can select the restriction policy and / or make sure to recheck the Assignments from the Users & Groups of various permissions for your given user.
VPN....
I switched off my VPN and it then worked just fine. No idea why but it works and I can now log straight in to the portal

Insufficient permissions to create Azure DevOps project while having Owner permission

After being invited to a client's Azure account and having "Owner" role + access to "Azure AD user, group, service principal" granted I am able create App Services, import source from Github but when I try to create a DevOps project to start actual work I get an error:
Following the link towards more details I can see that its about permission issue but if I re-check my permissions:
It says "Owner" but the scope is: "This resource" - note that these infos are under the single Subscription that my client created, however if I click my name for detailed view on my identity I see "Guest":
What would be the proper way to grant me global permissions on my clients Azure account?
Thanks!
If you create a project, it will automatically create an AD App named like organizationname-projectname-513f22f1-befd-xxxxxxcfe90f1 in the App Registerations in your tenant.
To fix the issue, let the global admin of your tenant to modify the user settings. Navigate to the Azure Active Directory in the portal -> User settings -> set Users can register applications to Yes.
Then in the Manage external collaboration settings, set the Guest users permission are limited to No.
Besides, if you can get an administrator role, no matter the settings are, you can create the app directly.

Block user from portal.azure.com

My company is using Azure Active Directory. We are able to login into the Azure portal using AAD.
However, we only want a handful of employees to be able to login into the portal. All other employees should be kept out.
How do I accomplish this?
You cant do that if they are part of the AAD, you can however grant them no permissions, so they wont be able to see any resources or do anything on the portal
And you really dont have to do anything to acomplish that. Those are default permissions.
To check users permissions go to the portal and navigate to Azure AD blade.
Portal => AzureAd => Users => pick user => click Azure Resources on the left
Apply the Restrict access to Azure AD administration portal setting, which will block all access unless a user has Directory Reader or higher permissions in Azure AD
https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/users-default-permissions
As a Global admin:
Azure Active Directory
User Settings
Restrict access to Azure AD administration portal -> yes
Or you can just block sign in for the user in the user profile. By this, the blocked users will be denied to log in the portal.
Note: This operation requires the global admin.

Azure Active Directory - Access Denied in New Portal

Using old azure portal, I am able to navigate to Azure Active Directory. But with the new portal 'Portal.Azure.com', I am seeing 'Access Denied' error message.
This is the below exact message I am seeing in the portal.
"Access denied.
You do not have access
Looks like you don't have access to this content. To get access, please contact the owner."
If you use the external account to access Azure AD, such as MSA account(e.g. outlook.com, hotmail.com), and the account from other Azure AD tenant. You may experience the error message as below.
There are two methods to resolve this issue.
Method 1
Log in to new Azure Portal by using the account with Global Administrator permission for Azure AD. Navigate to the Azure Active Directory extension, from the User settings tab, toggle the setting Guest users permissions are limited to No.
Method 2
Log in to new Azure Portal by using the account with Global Administrator permission for Azure AD. Navigate to the Azure Active Directory extension, from the Users and Groups tab, search for the external account, and change the Directory Role to Global Administrator.
In my case the solution was different.
The clock on my machine got de-synchronized (lagging 13 hours behind) and when my browser was encrypting a security token to request a sensitive page at Azure Portal, this token was rejected by server and I received "Access denied" error page.
It seams like "time.windows.com" was providing a wrong world time to my computer (yes, it is insane) - I changed it to "time.nist.gov" via Control Panel / Date and Time / Internet Time / Change Settings. It immediately updated my computer with correct time.
Then I signed-out and singed-in to Azure Portal and it started working just fine.
As for me, is was to activate a subscription (adding a card bank).
Then I could access the services on my new Azure account

Failed to retrieve Azure auth token. Account must be added to the directory

I have an Active Directory object in Azure that has a native client application.
The application has all the necessary permissions to be accessed by the Service Management API.
In the AD directory, I have 2 users added. One is the account I was logged in as when I created the directory object. This account was added automatically when the directory was created. The other is one that I manually added after creating the directory object.
So, in the example below, Account 2 was the account I was logged in as when creating the directory. Account 1 I added manually.
When I try to retrieve an access token from the oauth2 endpoint with Account 2 credentials, I get the error:
AADSTS50034: To sign into this application the account must be added to the REDACTED directory.
The account is clearly added to the directory, however.
Furthermore, when I use the credentials for Account 1, I am able to successfully authenticate.
The only things I'm changing in my script are the username and password. The client ID and tenant ID remain the same.
Why am I getting the error above when the account I am using is clearly a user of the directory?
I found the answer in a different thread.
If I'm understanding it correctly, it seems like automated sign-in can only be done from an account sourced from Azure Active Directory, and not from a Microsoft account.
Link to answer
you can log-in with account2 also. You need to provide the directory name in the Sign-in context as the input. Accordingly, configure your "Startup.Auth.cs" in App_Start.
Account1 has the directory name or the custom domain name in the username with the help of which the Azure log-in gets you signed-in against. But, with account2, you have Microsoft account directory where your application is not registered.
Hence, you get the error.
Use this link for better concept. This sample code has used the sign-in for Azure AD user as well as Microsoft account user as in your case.

Resources