Microsoft announced 16 new low-privileged access roles for Azure Active Directory service to help administrators to reduce the number of Global administrators in the directory.
Along with the 16 new roles, Microsoft also included a Global reader, which is the read-only version of the Global administrator role.
The Global reader role provides read-only access to all settings including Office 365, administrators can use them for planning, audits, investigations and administrative roles.
The new roles include authentication administrator and Privileged authentication administrator, which allows administrators to manage Azure AD roles and to grant granular permissions for credential management.
“As a best practice, we recommend having no more than five permanent Global administrators. To support this, our strategy is to provide built-in roles for 90 percent of your scenarios, and to provide the capability for you to build custom roles for requirements that are specific to your organization.”
The Microsoft Azure Active Directory is a cloud-based identity and access management service, with Azure you can limit the control over various apps based on the organization requirement.
Here you find the checklist of Active Directory Penetration Testing Checklist that helps security experts and penetration testers to secure network.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates
Microsoft has rolled out its April 2025 Patch Tuesday update, addressing 121 security vulnerabilities across…
In a disturbing evolution of financial fraud, cybercriminals are leveraging advanced techniques to exploit mobile…
A recently disclosed SQL injection vulnerability in older versions of the Shopware platform has raised…
A recent malware distribution scheme has been uncovered on SourceForge, the popular software hosting and…
Cybersecurity experts have uncovered an alarming escalation in cyber-espionage operations targeting Ukrainian critical sectors, as…
Vidar Stealer a notorious information-stealing malware has adopted a deceptive method to disguise itself as…