Cloud Commander acquired permissions
Permissions acquired in the MSP partner tenant
During application registration in your MSP partner tenant, we acquire the following permissions and roles. For more information about each of the Microsoft Entra ID roles, see All roles | Microsoft Learn.
Permission | Microsoft Entra ID role | Partner Center role |
---|---|---|
Access Partner Center | Global administrator | |
Manage delegated admin relationships with customers | Admin agent | |
Read and write all groups | Global administrator | |
Read and write group memberships | Global administrator | |
Read directory data | Directory Reader | |
Sign me in and read my profile | User Administrator | |
Access the directory as me | Directory Reader | |
Read and write all users' authentication methods | Authentication Administrator | |
Read and write all users' full profiles | User Administrator | |
Read organization information | Global Reader | |
Read domains | Domain Name Administrator | |
Maintain access to data I have given access to | User Administrator |
Permissions acquired in the customer's tenant through GDAP
In the customer tenant, Cloud Commander requires access to both Microsoft 365 and Azure services. This access is granted via Granular Delegated Admin Privileges (GDAP), which allows for more precise and secure permission management than other methods, and it avoids the risks associated with broad admin access. For Microsoft 365, roles are included in the GDAP relationship. For Azure, the CSP’s privileged admin rights acquired through default Admin On Behalf Of (AOBO) are used.
Microsoft 365
When you onboard customer tenants in Cloud Commander, we acquire customer approval for the following permissions and Microsoft Entra ID roles. For more information about each of the Microsoft Entra ID roles, see All roles | Microsoft Learn.
Permission Microsoft Entra ID role Create and manage enterprise apps Application administrator Access authentication methods Authentication administrator Manage MFA and password policies Authentication policy administrator Manage Azure information protection Azure information protection administrator Manage application registrations Cloud application administrator Manage Entra ID devices Cloud device administrator Manage compliance configurations in Entra ID and M365 Compliance administrator Manage CA policies Conditional access administrator Read directory data Directory readers Read/write directory data Directory writers Read domains Domain name administrator Read and manage Exchange Exchange administrator Manage groups and their settings Groups administrator Invite guest users Guest inviter Manage AD users and their configuration and sync with Entra ID Hybrid identity administrator Manage Intune enrolled devices Intune administrator Manage product licenses License administrator Reset passwords Password administrator Manage user’s authentication methods and MFA Privileged authentication administrator Manage role assignments and PIM Privileged role administrator Manage security configurations in Entra ID and M365 Security administrator Manage the SharePoint service SharePoint administrator Manage the Teams service Teams administrator Read usage report data Usage summary reports reader Manage users User administrator Microsoft Azure management
For Azure Management, read/write permissions are not defined by the GDAP relationship. Provided that the service principal is granted access to the customer's Azure subscriptions, the Directory Reader role in GDAP is sufficient.
By default, the partner that provisioned the customer subscriptions already has owner permissions through Admin on Behalf of (AOBO) and the GDAP acts only as a secure, customer-controlled way of authenticating against the customer’s Azure site. The partner's Admin agent role controls who can read/write Azure resources.
In summary, GDAP acts as authentication to Azure management, not as its permission system. Azure already has fine-grained Identity Access Management (IAM) roles and AOBO management capabilities from the partner side.
For more information, see:
Related articles
Updated: Dec 18, 2024