Description
Restrict access to the Microsoft Entra ID administration center to administrators only.
NOTE: This only affects access to the Entra ID administrator's web portal. This setting does not prohibit privileged users from using other methods such as Rest API or Powershell to obtain sensitive information from Microsoft Entra ID.
Rationaleβ
The Microsoft Entra ID administrative center has sensitive data and permission settings. All non-administrators should be prohibited from accessing any Microsoft Entra ID data in the administration center to avoid exposure.
Impactβ
All administrative tasks will need to be done by Administrators, causing additional overhead in management of users and resources.
Auditβ
From Azure Portalβ
- From Azure Home select the Portal Menu.
- Select
Microsoft Entra ID
. - Under
Manage
, selectUsers
. - Under
Manage
, selectUser settings
. - Under
Administration centre
, ensure thatRestrict access to Microsoft Entra admin center
is set toYes
.
Default Valueβ
By default, Restrict access to Microsoft Entra admin center
is set to No
.
Referencesβ
- https://docs.microsoft.com/en-us/azure/active-directory/active-directory-assign-admin-roles-azure-portal
- https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-governance-strategy#gs-2-define-and-implement-enterprise-segmentationseparation-of-duties-strategy
- https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-governance-strategy#gs-6-define-and-implement-identity-and-privileged-access-strategy
- https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-privileged-access#pa-1-separate-and-limit-highly-privilegedadministrative-users