Managing external identities to enable secure access for partners, customers, and other non-employees
To create a new administrative account in Microsoft Entra ID and assign the Global Administrator role while ensuring security, follow these best practices:
- Use a Cloud-only Account: It is generally recommended to use a cloud-only account for the Global Administrator role instead of a synced on-premises account. This helps in reducing potential security risks associated with on-premises accounts and ensures that the account is managed entirely within the cloud environment.
- Assigning the Global Administrator Role: After creating the user account, you can assign the Global Administrator role by navigating to the user’s profile, selecting "Assigned roles," and then adding the Global Administrator role. However, be mindful of the principle of least privilege; if the user only needs to manage specific resources, consider assigning a less privileged role such as User Administrator or Billing Administrator.
- Break-Glass Account: To ensure that the Global Administrator account serves as a break-glass account in case of MFA failure, you should:
- Create the account with a unique username and password.
- Ensure that this account is not used for regular administrative tasks to minimize exposure.
- Keep the account credentials secure and accessible only to trusted personnel.
- Consider not enforcing MFA on this account, but ensure it is monitored and used only in emergencies.
- Enforce MFA: For all administrative accounts, including the Global Administrator, it is crucial to enforce Multi-Factor Authentication (MFA). Make sure the new admin sets up the Microsoft Authenticator app during their first login to enhance security.
By following these guidelines, you can create a secure administrative account that has the necessary access while minimizing potential security risks.