Manual migration of Cloud Solution Provider from DAP to GDAP

In their drive to implement a Zero Trust strategy across their products, service and partner ecosystem, Microsoft have adopted a "least privilege access" approach to authentication . As part of this change, Microsoft announced that from the 22nd May 2023 they will begin transitioning active and inactive Delegated Admin Privileges (DAP) relationships to Granular Delegated Admin Privileges (GDAP) with limited Microsoft Entra ID roles, with existing DAP relationships removed within 30 days of DAP’s End of Life.

Depending on your integration model, this change may impact on how you authenticate with Microsoft Intune.

  • System integrator (SI) model: unaffected by this Microsoft change, and the integration will continue to function as normal

  • Cloud Solution Provider (CSP) model: requires a new Admin Relationship for each of the integrated customers

CSP integration: configure each customer's Admin Relationships

There are three steps in the admin relationship configuration process:

  1. Create a new Admin Relationship for the customer

  2. Configure the customer's Admin Relationship security group

  3. Remove the DAP relationship for the customer

Once the admin relationship are setup for each customer, the final stage is to switch your N-central integration to GDAP account enabled.

1. Create a new Admin Relationship for the customer

The first stage is to create a new Admin Relationship in the Microsoft Partner Center then send the invitation for the customer to accept and authorize the relationship.

  1. Log into the Microsoft Partner Center with your CSP Microsoft account credentials.

  2. Click on the Customers "Workspaces" tile, or from the menu, choose Customers.

  3. Search for and select the target customer .

  4. In the customer dialog, click on Admin Relationships in the left side menu.

  5. Click Request for new relationship.

  6. Complete the required fields in "Create an admin relationship request" dialog:

    • Admin relationship name: a unique name for the relationship, please be aware that the entered admin relationship name is visible to customers

    • Duration in days: less than or equal to 730 days

  7. Click Microsoft Entra ID role and choose the following roles to assume for your customer from the right-pane list:

    • Groups administrator

    • Intune administrator

    • Cloud device administrator

    • Application administrator

    • Directory writers

  8. Click Save to add these roles to the relationship.


  10. Click Finalize request to create the admin relationship invitation.

  11. In the returned dialog, copy the link from the Click to review and accept section, perhaps use the Copy to Clipboard or use the Open in email options, then click Done.

  12. Please ensure the correct Microsoft tenant account is selected.

  13. Send this to the customer to review and accept the invitation.

2. Configure the security group

After the customer accepts the admin relationship invitation, the next state is to configure their security groups.

  1. Go back to that customer's Admin relationships section.

  2. Click on the relationship name.

  3. Click Add security group.

  4. Select AdminAgents in the right-pane list.

  5. Click Next and ensure all the roles selected in the above step 7 are checked:

    • Groups administrator

    • Intune administrator

    • Cloud device administrator

    • Application administrator

    • Directory writers

  6. Click Save to confirm, and Done once complete to apply.

3. Remove the DAP relationship

The final stage is to remove the existing DAP relationship for the customer.

  1. Go to the Microsoft 365 admin center.

  2. Click on All tenants in the left-side menu.

  3. Search for, then click on the target customer in the list .

  4. Select Settings > Partner relationships in the left-side menu (click on Show all if the Settings menu is not visible).

  5. Click on the DAP relationship role under Other partner types.

  6. Click Remove Roles to delete.

The above steps must be completed for ALL customers. Click 1. Create a new Admin Relationship for the customer to return to the first step.

Switch to GDAP Relationship

After ALL the customers are migrated, the final stage is to switch on the GDAP account enabled toggle in N-central.

  1. Log into your N-central Dashboard.

  2. Go to Integrations > Microsoft Intune > Setup.

  3. Navigate to the "Change DAP/GDAP account relationship (Only for CSP accounts)" section.

  4. Switch the GDAP account enabled toggle to on.

  5. Once the dialog states "GDAP account enabled", click the Authorize GDAP Relationships button.

  6. An authorization window appears after you click on the Authorize GDAP Relationships button. Please be aware that some browser will consider this a pop-up and block the window from opening. To ensure the window opens, please allow pop-ups.

  7. Log in with the CSP Microsoft account credentials and wait for the flow to successfully finish.

Please be aware that it may take a up to a minute for the flow to successfully complete and up to an hour for all the modifications to propagate to Microsoft.


  1. If you receive the error, “Azure prerequisites not yet available. Please try again in a few minutes.”, click the Authorize GDAP Relationships button again in about 10 minutes (Azure does not always work in real-time).

  2. If the “Authorize GDAP” flow above finished successfully and the calls for some of the customers fail (i.e. failing to retrieve the Compliance or Configuration Profile details under the Intune Integration), in N-central, go to Integrations > Intune > Setup and remap that specific customer.

"Authentication failed. MFA required" errors indicate that the account does not meet the Partner Security Requirements. You will need to contact your customer and make sure that they comply with the Partner Security Requirements. Microsoft offers a guide on how to check if an account is compliant: Testing the Partner Security Requirements.