maciejrebisz.com

IT

A standard AzureAD user have access to browse the admin portal – Mobile-First Cloud-First

maximios June 28, 2022

In a on-premise Active Directory a normal user can read the directory by default using a LDAP browser. We put firewall and other security measure in place so that it is impossible to reach from the outside.

When we sync all our users to Azure Active Directory – I often see that no security measure are in place. In my work I see a lot of installations where ADFS is the only security measure – ADFS is used to login in to Azure AD without having the users password in the cloud – but the ADFS is setup to allow all authenticated users.

Last week I was at a customer where I showed them that a standard user can get access to browse there AzureAD users, groups and enterprise apps in the AzureAD. This was not acceptable by there security department, and I totally agree. So we used Azure AD conditional access to control the access both for on-premise users and cloud only users.

What is the problem:

When a user log in to the old Azure AD portal https://manage.windowsazure.com the user gets this message:

No access – no problem!

When the user log in to the new Azure AD portal https://aad.portal.azure.com the use gets this:

Yes there is settings and data a standard users cannot see, like “Users Sign-ins” and the user cannot change anything in AzureAD.

It is the same if the standard user logs in to https://portal.azure.com but then the user can see under “My permissions” that there is no access to any subscriptions and there is no access to other resources in Azure.

Standard user can create a support ticket on:

  • Billing
  • Subscription management

What is the solutions:

The quick fix for this is Conditional Access on the cloud App Microsoft Azure Management.

How to setup Conditional Access for Microsoft Azure Management:

Login with a admin to https://aad.portal.azure.com

Go to Security – Conditional access

Click New policy

Give the CA policy a name

Click on Users and groups

Select All users

Remember to select a Exclude user or you have removed your access to change this policy

Select Exclude

Click Select excluded users

Select a group with least one global admin !!!

Select Cloud apps

Click Select apps

Search for Microsoft Azure Management and select the app

Select Conditions

Select Client apps

Click Yes – the both Browser and Mobile apps and desktop clients will be blocked

Info: Use Locations if you only whats this to apply outside your trusted network

Select Grant

Click Block access

Click On to enable the Conditional Access policy

Now you have blocked the access for standard users from accessing your AzureAD.

When the policies is in effect the user will get this message when accessing the Azure portal from a browser or from the mobile Azure app

There is also another way to do this:

Conditional Access requires Azure AD Premium license – if you don’t have that there is also another way.

This will only apply to standard users – and not a user with privileged access (User administrator, password administrator, etc.) and you cannot do inside/outside rule like in the Conditional Access.

Inside the Azure AD you can set:

Go to User settings – Administration portal

Restrict Access to Azure AD administration portal to Yes.

This will not block your users from accessing https://portal.azure.com

This will only create a Access denied when accessing the AzureAD.

Related Posts

IT /

Intune – Windows device enrollment restrictions – Cloud First

IT /

How to add “hidden” Windows UWP to Windows Store for Business – Cloud First

IT /

Office 2016 Active Directory-Based activation – Cloud First

‹ How to use Windows Autopilot from Microsoft Store for Business(WMfB) – Mobile-First Cloud-First › How to deploy Autopilot device fast with MDT – Mobile-First Cloud-First

Recent Posts

  • Intune – Windows device enrollment restrictions – Cloud First
  • How to add “hidden” Windows UWP to Windows Store for Business – Cloud First
  • Office 2016 Active Directory-Based activation – Cloud First
  • How to deploy Windows Local Experience Packs with Intune – Cloud First
  • Conditional Access for Outlook Web Access (OWA) – Cloud First

Recent Comments

No comments to show.

Archives

  • November 2025
  • October 2025
  • August 2025
  • July 2025
  • June 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • November 2024
  • September 2024
  • July 2024
  • June 2024
  • March 2024
  • December 2023
  • August 2023
  • June 2023
  • March 2023
  • February 2023
  • December 2022
  • September 2022
  • August 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • October 2021
  • September 2021
  • August 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • February 2020
  • January 2020
  • December 2019
  • October 2019
  • September 2019
  • June 2019
  • April 2019
  • March 2019
  • February 2019
  • March 2018
  • February 2018
  • December 2017
  • October 2017
  • August 2017

Categories

  • IT

Back to Top

© maciejrebisz.com 2026
Powered by WordPress • Themify WordPress Themes