Azure Active Directory - Authentication Admins are unable to view Authentication methods

Matthew Taylor 1 Reputation point
2022-01-14T21:36:48.557+00:00

We've created a group in Azure Active Directory and assigned the role of "Authentication Admin". We've also added a second role "Help Desk Admin" (even though that shouldn't be necessary). The users that are members of this group should have the necessary permissions to go into a user's account and reset their password, re-register their MFA, or perform other MFA functions. However, when the members of this group with the proper roles go to do this, they get a message that says, "You do not have access to this data". I can't figure out why the roles we've assigned aren't working. Microsoft's documentation clearly states that this should work:
https://learn.microsoft.com/en-us/azure/active-directory/roles/permissions-reference#authentication-administrator

Microsoft Security | Microsoft Entra | Microsoft Entra ID
{count} votes

3 answers

Sort by: Most helpful
  1. Andy David - MVP 159.7K Reputation points MVP Volunteer Moderator
    2022-01-14T21:49:53.37+00:00

    I can see that option correctly with Auth Admin.

    Could be this just a caching delay from the group assignment? Is the assignment direct or eligible using PIM?

    If you assign the role directly to the user, does it work for them after that?


  2. Vasil Michev 123.7K Reputation points MVP Volunteer Moderator
    2022-01-15T07:25:06.803+00:00

    Are you trying to see this data on another admin user? Only Privileged Authentication Admins can do so, "regular" Authentication admins get access to "regular" users' data only.


  3. Matthew Taylor 1 Reputation point
    2022-01-28T20:16:32.103+00:00

    Not sure it's an answer, but after opening a ticket with Microsoft, the "fix" was to remove the users from the group, and then add them back in. They provided this article, https://learn.microsoft.com/en-us/azure/active-directory/roles/groups-concept#known-issues, which says the following known issue:

    "Azure Information Protection Portal (the classic portal) doesn't recognize role membership via group yet. You can migrate to the unified sensitivity labeling platform and then use the Office 365 Security & Compliance center to use group assignments to manage roles."

    Not sure this is really related or if this is some sort of bug, but they weren't able to find out any root cause.


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.