Skip to content

Authorization, Roles & PIM

Source: Azure Master Class v3 - Part 2 - Identity by John Savill
Timestamps: 01:13:40 - 01:35:00


Authorization Overview

📺 Video Reference: 01:13:40

Authentication proves who you are.
Authorization determines what you can do.

In the Entra ecosystem, authorization is handled through:

  • Entra ID Roles (manage identity plane)
  • Azure RBAC Roles (manage resource plane)

The Two Role Systems

📺 Video Reference: 01:14:24

Key Distinction

Role SystemScopeWhat It Manages
Entra ID RolesTenant-wideUsers, groups, apps, policies
Azure RBAC RolesSubscription hierarchyVMs, storage, networking

These Are DIFFERENT!

Global Administrator in Entra ID does NOT automatically have access to Azure subscriptions. These are separate role systems that must be explicitly connected.


Entra ID Roles Deep Dive

📺 Video Reference: 01:15:24

Global Administrator

The "god role" of Entra ID:

  • Full access to all Entra features
  • Can manage all aspects of the tenant
  • Should be limited to 2-4 people maximum

Global Admin Risk

Global Admin can:

  • Reset any password (including other admins)
  • Manage conditional access (can exclude themselves)
  • Delete the tenant

Protect this role with your life! 🛡️

Common Entra Roles

RolePurpose
Global AdministratorFull tenant access
Global ReaderRead everything, change nothing
User AdministratorManage users and groups
Groups AdministratorManage groups only
Application AdministratorManage app registrations
Cloud Application AdministratorManage enterprise apps
Authentication AdministratorManage authentication methods
Privileged Authentication AdministratorReset MFA for any user
Security AdministratorSecurity settings and policies
Conditional Access AdministratorManage CA policies
Billing AdministratorPurchases and subscriptions
Helpdesk AdministratorReset passwords, limited scope

Role Comparison: Cloud vs Regular

RoleDifference
Application AdministratorCan manage app credentials (secrets/certs)
Cloud Application AdministratorCannot manage app credentials

Administrative Units

📺 Video Reference: 01:18:34

Administrative Units (AUs) provide scoped delegation of Entra roles.

What Can Be in an Administrative Unit?

Object TypeSupported
Users
Groups
Devices
Applications
Service Principals

Restricted Management AUs

A more secure flavor:

TypeBehavior
Standard AUAU admins + Global Admins can manage
Restricted Management AUONLY AU admins can manage (even GA blocked)

Use Case: Sensitive Accounts

Put executive accounts in a Restricted Management AU. Even if an attacker compromises a Global Admin, they cannot touch those accounts.


Least Privilege Principle

📺 Video Reference: 01:20:06

The Problem

If I give you permanent Global Admin:

  • You're always vulnerable to attack
  • Token theft = full tenant compromise
  • No audit trail of when elevation happens

The Solution: Just-in-Time Access

Only have elevated permissions when you need them, for as long as you need them.


Privileged Identity Management (PIM)

📺 Video Reference: 01:20:51

PIM provides just-in-time privileged access with auditing and approval workflows.

PIM Concepts

TermMeaning
EligibleUser CAN activate the role
ActiveUser HAS the role right now
ActivateTransition from eligible to active

PIM Workflow

PIM Settings

SettingOptions
Activation duration30 min - 24 hours
Require justificationYes/No
Require approvalYes/No + Who approves
Require MFAYes/No
Require Conditional AccessYes/No
NotificationsEmail on activation

Eligible vs Active Assignments

TypeUse Case
EligibleUser must activate when needed (recommended)
ActiveAlways has the role (use sparingly)

Best Practice

  • Make most assignments eligible
  • Set short activation windows
  • Require justification
  • Enable notifications
  • Consider approval for critical roles

PIM for Azure RBAC

📺 Video Reference: 01:24:19

PIM also works for Azure resource roles:

ScopeExample
Management GroupEligible Owner at tenant root
SubscriptionEligible Contributor on Production
Resource GroupEligible VM Contributor on specific RG
ResourceEligible Key Vault Administrator

Same workflow: Eligible → Activate → Time-limited → Reverts


Emergency Access (Break Glass)

📺 Video Reference: 01:25:41

What If Everything Breaks?

Scenarios where normal admin access fails:

  • PIM is down
  • Conditional Access misconfiguration locks everyone out
  • MFA provider outage
  • Last Global Admin leaves company

Break Glass Accounts

Dedicated emergency accounts excluded from normal security controls:

PropertyConfiguration
TypeCloud-only (no sync dependency)
MFADifferent from normal (hardware FIDO2 in safe)
Conditional AccessExcluded from all policies
PasswordVery long, complex, stored securely
MonitoringAlert on ANY use

Never Use Normally

Break glass accounts should:

  • Never be used for daily work
  • Be tested quarterly (with documented process)
  • Trigger immediate alerts when used
  • Have password split between multiple people

Access Reviews

📺 Video Reference: 01:28:30

Automated review of access assignments.

What Can Be Reviewed?

TargetExample
Group membership"Do these users still need access to this group?"
App assignments"Should these users still have this app?"
Entra roles"Should John still be User Administrator?"
Azure roles"Should this service principal still be Contributor?"

Review Workflow

Reviewer Options

Reviewer TypeUse Case
ManagerReview their direct reports
SelfUsers justify their own access
Specific usersDesignated administrators
Group ownersReview their own groups

Auto-Actions

SettingBehavior
If reviewer doesn't respondRemove access / Keep access / No change
Apply results automaticallyYes / No
RecurrenceOne-time / Weekly / Monthly / Quarterly

Entra Permissions Management

📺 Video Reference: 01:31:00

A multi-cloud permissions governance solution (part of CIEM - Cloud Infrastructure Entitlement Management).

The Problem

Organizations have thousands of identities with permissions across:

  • Azure
  • AWS
  • GCP

How do you know:

  • What permissions do they have?
  • What permissions do they actually USE?
  • Are there overprivileged identities?

Permissions Creep Index (PCI)

High PCI = Identity has many permissions it doesn't use = Risk

Key Capabilities

FeatureDescription
DiscoveryFind all identities and permissions
AnalyticsIdentify overprivileged identities
Right-sizingRecommend minimal permissions
MonitoringAlert on anomalous behavior
RemediationAuto-adjust permissions

Multi-Cloud Coverage

CloudWhat's Analyzed
AzureRBAC roles, Entra roles
AWSIAM policies, roles
GCPIAM bindings, service accounts

Quick Reference

Role Assignment Decision Tree

PIM Best Practices Checklist

  • [ ] Use eligible (not active) assignments
  • [ ] Set maximum activation duration (4-8 hours)
  • [ ] Require justification for all activations
  • [ ] Enable notifications for role activations
  • [ ] Require approval for Global Admin and Security Admin
  • [ ] Conduct quarterly access reviews
  • [ ] Configure break glass accounts
  • [ ] Test break glass accounts quarterly
  • [ ] Monitor for PCI creep

Further Reading

Released under the MIT License.