Skip to main content

Command Palette

Search for a command to run...

Understanding Roles in Azure, Microsoft Entra, and Microsoft 365

Updated
7 min read
S

Security-focused Cloud & Automation Engineer with a Master’s in Computer Science and 6+ years of experience automating and supporting enterprise IT environments across multi-site corporate and operational infrastructures. Proficient in Python scripting, Azure infrastructure, Windows Server, and identity management. Skilled in integrating third-party platforms, securing configurations, and streamlining operations. Currently pursuing the Cybersecurity Architect Expert certification with a strong focus on cloud security and automation.

A

I’m Amir Rouhanipoor, an IT Consultant specializing in Azure and cloud solutions. I help organizations streamline their IT and drive growth through secure, efficient cloud technologies.

When managing access and permissions in the Microsoft cloud ecosystem, it’s important to understand the different types of roles available across Azure, Microsoft Entra (formerly Azure Active Directory), and Microsoft 365. While they might seem similar at first glance, each serves a unique purpose within its own scope.

Azure Roles (RBAC)

Azure uses Role-Based Access Control (RBAC) to manage access to Azure resources. These roles determine what actions users can take on Azure services.

Common Built-in Azure Roles:

Role NameDescription
OwnerFull access to all resources, including the ability to delegate access to others.
ContributorCan create and manage all types of Azure resources but cannot grant access to others.
ReaderCan view existing Azure resources without making changes.
User Access AdministratorCan manage user access to Azure resources.
VM Administrator LoginLogin as administrator to VMs.
Virtual Machine User LoginLogin as regular user to VMs.
Privileged Role Admin(Privileged Role Administrator) Manage role assignments in Azure AD.
DevTest Labs UserManage DevTest Lab environments
Key Vault Secrets OfficerManage secrets only.

Custom Roles

You can also create custom roles tailored to specific needs using JSON to define:

  • Allowed actions

  • Denied actions

  • Assignable scopes


Microsoft Entra Roles (Azure AD Roles)

Microsoft Entra (formerly Azure Active Directory) uses its own set of roles to manage identity-related tasks such as users, groups, security policies, and authentication settings.

Common Entra (Azure AD) Roles:

Role NameDescription
Global AdministratorFull control over all aspects of Microsoft Entra ID and Microsoft 365 services.
User AdministratorManage users, groups, and helpdesk tasks (e.g., password resets).
Groups AdministratorManage group settings and memberships.
Helpdesk AdministratorReset passwords and monitor service health.
Billing AdministratorManage subscriptions, support tickets, and billing.
License AdministratorAssign and remove licenses from users.
Application AdministratorManage enterprise applications, including configuring SSO.
Cloud Application AdministratorSimilar to Application Admin, but limited to non-gallery apps.
Authentication AdministratorManage authentication methods, including password policies and MFA.
Privileged Role AdministratorManage role assignments (elevated access, including PIM).
Security AdministratorView and manage all security settings.
Security ReaderView security reports and settings without making changes.
Compliance AdministratorManage compliance data and configurations (e.g., M365 compliance center).
Conditional Access AdministratorCreate and manage Conditional Access policies.
Intune AdministratorManage Microsoft Intune and device configurations.
Directory ReadersRead basic directory info (used for apps or services needing read access).
Directory WritersAdd or update directory data (more permissions than Readers).
Exchange AdministratorManage Exchange Online settings and mailboxes.
Teams AdministratorManage Microsoft Teams settings.
SharePoint AdministratorManage SharePoint sites and settings.
Power Platform AdministratorManage Power Apps, Power Automate, and related settings.
Reports ReaderView usage reports and analytics across Microsoft 365.

🔐 Privileged Identity Management (PIM) Integration

Many of these roles can be made eligible through PIM, so they are only activated when needed, reducing security risks.

These roles are part of Microsoft Entra ID, which is the identity and access management service in Azure and are assigned at the directory/tenant level and are separate from Azure RBAC roles and are used to manage identity-related tasks, like users, groups, enterprise apps, security settings, and more.


Microsoft 365 Roles

Microsoft 365 has its own set of roles designed to manage specific M365 services like Exchange Online, SharePoint, and Teams.

Core Microsoft 365 Admin Roles

RoleDescription
Global AdministratorFull access to all Microsoft 365 services and settings. Can assign any admin role.
User AdministratorManage users, groups, and licenses. Reset passwords.
Billing AdministratorManage subscriptions, billing, invoices, and support tickets.
Password AdministratorReset passwords for most users (except admins like Global Admins).
License AdministratorAssign and remove product licenses from users.
Service Support AdministratorOpen support requests and view service health dashboard.
Global ReaderRead-only view across all Microsoft 365 admin centers. Great for auditors or managers.

Product-Specific Admin Roles

RoleManages
Exchange AdministratorMailboxes, mail flow, and Exchange Online settings.
Teams AdministratorTeams policies, meetings, messaging, and organization-wide settings.
SharePoint AdministratorSite collections, storage, and global SharePoint settings.
Skype for Business AdministratorLegacy Skype for Business settings.
Yammer AdministratorYammer configuration for Enterprise Networks.
Intune AdministratorDevices, compliance policies, and mobile app management (via Microsoft Intune).
Dynamics 365 AdministratorInstances, security roles, and Dynamics apps.
Power Platform AdministratorPower Apps, Power Automate, DLP policies, and environment settings.
Power BI AdministratorTenant-level settings for Power BI.

Security & Compliance Roles

RoleManages
Security AdministratorMicrosoft 365 Defender, security policies, alerts, and reports.
Security ReaderView-only access to security features and reports.
Compliance AdministratorCompliance portal, retention policies, labels, audit, etc.
eDiscovery ManagerContent search and eDiscovery cases.
Information Protection AdministratorSensitivity labels, encryption, and data loss prevention.
Privileged Role AdministratorAssign roles, manage PIM and admin access settings.
Audit Logs ReaderAccess to Microsoft 365 audit logs.

Support & Reporting Roles

RoleManages
Reports ReaderView usage reports and analytics across Microsoft 365 services.
Message Center ReaderRead-only access to Microsoft 365 Message Center for updates and alerts.
Service Health ReaderView service health reports and incidents across the organization.

🧠 Notes:

  • These roles are Entra ID (Azure AD) roles but are especially used for Microsoft 365 service management.

  • They can be assigned in both the Microsoft 365 admin center and the Entra admin center.

These roles are focused on M365 apps and services, and are often used alongside Entra roles.


Summary: Role Systems at a Glance

PlatformRole TypeScope
AzureRBAC Roles (Owner, Reader, etc.)Azure resources like VMs, databases, storage
Microsoft EntraDirectory Roles (Global Admin, User Admin, etc.)Identity and access management
Microsoft 365Service-Specific Roles (Exchange Admin, Teams Admin, etc.)Microsoft 365 service configuration and management

Does a Global Administrator Have Access to Azure Resources?

Yes — to Microsoft Entra (formerly Azure AD) and Microsoft 365

  • Full control over:

    • User and group management

    • Role assignments

    • Security configurations (e.g., MFA, Conditional Access)

    • Microsoft 365 tenant settings (e.g., organization-wide policies, service configurations)

• ❌ No — not automatically to Azure subscriptions or resources

Global Administrators do not have access to Azure resources like virtual machines, storage accounts, or databases

• To manage these, they must be explicitly assigned an Azure RBAC role (e.g., Owner, Contributor, Reader)


How Can a Global Administrator Gain Access to Azure Resources?

To manage Azure resources, the Global Administrator must:

  • Be assigned an Azure RBAC role such as Owner, Contributor, or Reader at the subscription, resource group, or resource level

  • Use Privileged Identity Management (PIM) to elevate their access (if available)


Using Privileged Identity Management (PIM)

If your organization uses Microsoft Entra PIM, a Global Administrator can activate temporary access to Azure resources by:

  1. Going to the Microsoft Entra Admin Center

  2. Navigating to Roles and Administrators

  3. Selecting Global Administrator

  4. Activating a role like Subscription Owner or Contributor via PIM

This is useful for just-in-time privileged access without assigning permanent roles.


Summary

RoleAccess to Azure Resources (RBAC)Access to Entra (Azure AD)
Global AdministratorNo (needs explicit assignment)Yes
Azure RBAC Roles (e.g., Owner)YesNo (unless also assigned Entra roles)
SystemUses Roles?Technically RBAC?Branded as “RBAC”?
Azure
Entra (Azure AD)❌ (branded as Directory Roles)
Microsoft 365❌ (branded as Admin Roles)
39 views

More from this blog

A

An Azure Cloud Lab Journey...

45 posts