A cloud-based identity and access management service for securing user authentication and resource access
In an Azure AD B2C tenant, only users with appropriate administrator roles can assign elevated roles to other users. If current accounts do not have those permissions, a higher-privileged administrator must grant them.
Use the following approaches, depending on what is missing:
- Verify tenant creation/administration restrictions (if you also need to create or manage tenants)
- Sign in to the Azure portal.
- Go to Microsoft Entra ID → User settings.
- Under Default user role permissions, check Restrict non-admin users from creating tenants.
- If this setting is No and elevated access is still needed, an existing administrator must assign the Tenant Creator or other appropriate admin roles. If the setting is greyed out, the signed-in account is not an administrator and cannot change it; an existing admin must do this.
- Use an administrator to assign roles in the B2C tenant
- An account with at least Privileged Role Administrator (or another role that can manage directory roles) must:
- Sign in to the Azure portal and switch to the Azure AD B2C tenant via Directories + subscriptions.
- Go to Azure AD B2C → Users.
- Select the user that needs an elevated role.
- Select Assigned roles → Add assignments.
- Choose the required role (for example, Application administrator, External Identity Provider Administrator, B2C User Flow Administrator, etc.) and select Add.
- An account with at least Privileged Role Administrator (or another role that can manage directory roles) must:
- If the elevated role is for a service or tool account
- Create or use a dedicated directory user in the B2C tenant and assign the specific roles needed for that tool:
- In Microsoft Entra ID → Users, select New user → Create user.
- Provide username and name, save the initial password.
- Under the user’s role settings, assign roles such as External Identity Provider Administrator and B2C User Flow Administrator as required.
- Create or use a dedicated directory user in the B2C tenant and assign the specific roles needed for that tool:
- If role assignment is blocked in the Azure portal (IAM)
- When trying to assign Azure roles (for example, to manage resource groups for monitoring or integrations), and Add role assignment is disabled or fails:
- Ensure the signed-in account has a role that includes
Microsoft.Authorization/roleAssignments/write(for example, Role Based Access Control Administrator) at the relevant scope (subscription, resource group, or resource). - If the account lacks this, a higher-privileged admin at that scope must grant the necessary role first.
- Ensure the signed-in account has a role that includes
- When trying to assign Azure roles (for example, to manage resource groups for monitoring or integrations), and Add role assignment is disabled or fails:
If no one in the organization has a global/admin-level account for the tenant, or all such accounts are inaccessible, the only resolution path is to contact Microsoft support (for example, via a billing or existing subscription) to recover or re-establish an administrator, and then use that account to assign the required roles.
References:
- Azure AD B2C: Frequently asked questions (FAQ)
- Review tenant creation permission in Azure Active Directory B2C
- Manage administrator accounts in Azure Active Directory B2C
- Troubleshoot Azure RBAC
- Configure TheAccessHub Admin Tool with Azure Active Directory B2C
- Monitor Azure AD B2C with Azure Monitor