What are the default user permissions in Azure Active Directory?
In Azure Active Directory (Azure AD), all users are granted a set of default permissions. A user's access consists of the type of user, their role assignments, and their ownership of individual objects.
This article describes those default permissions and compares the member and guest user defaults. The default user permissions can be changed only in user settings in Azure AD.
Member and guest users
The set of default permissions depends on whether the user is a native member of the tenant (member user) or whether the user is brought over from another directory as a business-to-business (B2B) collaboration guest (guest user). For more information about adding guest users, see What is Azure AD B2B collaboration?. Here are the capabilities of the default permissions:
Member users can register applications, manage their own profile photo and mobile phone number, change their own password, and invite B2B guests. These users can also read all directory information (with a few exceptions).
Guest users have restricted directory permissions. They can manage their own profile, change their own password, and retrieve some information about other users, groups, and apps. However, they can't read all directory information.
For example, guest users can't enumerate the list of all users, groups, and other directory objects. Guests can be added to administrator roles, which grant them full read and write permissions. Guests can also invite other guests.
Compare member and guest default permissions
Area | Member user permissions | Default guest user permissions | Restricted guest user permissions |
---|---|---|---|
Users and contacts |
|
|
|
Groups |
|
|
|
Applications |
|
|
|
Devices |
|
No permissions | No permissions |
Organization |
|
|
|
Roles and scopes |
|
No permissions | No permissions |
Subscriptions |
|
No permissions | No permissions |
Policies |
|
No permissions | No permissions |
Restrict member users' default permissions
It's possible to add restrictions to users' default permissions.
You can restrict default permissions for member users in the following ways:
Caution
Using the Restrict access to Azure AD administration portal switch is NOT a security measure. For more information on the functionality, see the table below.
Permission | Setting explanation |
---|---|
Register applications | Setting this option to No prevents users from creating application registrations. You can then grant the ability back to specific individuals, by adding them to the application developer role. |
Allow users to connect work or school account with LinkedIn | Setting this option to No prevents users from connecting their work or school account with their LinkedIn account. For more information, see LinkedIn account connections data sharing and consent. |
Create security groups | Setting this option to No prevents users from creating security groups. Global administrators and user administrators can still create security groups. To learn how, see Azure Active Directory cmdlets for configuring group settings. |
Create Microsoft 365 groups | Setting this option to No prevents users from creating Microsoft 365 groups. Setting this option to Some allows a set of users to create Microsoft 365 groups. Global administrators and user administrators can still create Microsoft 365 groups. To learn how, see Azure Active Directory cmdlets for configuring group settings. |
Restrict access to Azure AD administration portal | What does this switch do? No lets non-administrators browse the Azure AD administration portal. Yes Restricts non-administrators from browsing the Azure AD administration portal. Non-administrators who are owners of groups or applications are unable to use the Azure portal to manage their owned resources. What does it not do? When should I use this switch? When should I not use this switch? How do I grant only a specific non-administrator users the ability to use the Azure AD administration portal? Restrict access to the Entra administration portal |
Restrict non-admin users from creating tenants | Users can create tenants in the Azure AD and Entra administration portal under Manage tenant. The creation of a tenant is recorded in the Audit log as category DirectoryManagement and activity Create Company. Anyone who creates a tenant becomes the Global Administrator of that tenant. The newly created tenant doesn't inherit any settings or configurations. What does this switch do? How do I grant only a specific non-administrator users the ability to create new tenants? |
Restrict non-admin users from reading BitLocker key(s) for their owned devices | Setting this option to Yes restricts users from being able to self-service recover BitLocker key(s) for their owned devices. Setting this option to No allows users to recover their BitLocker key(s). |
Read other users | This setting is available in Microsoft Graph and PowerShell only. Setting this flag to $false prevents all non-admins from reading user information from the directory. This flag doesn't prevent reading user information in other Microsoft services like Exchange Online.This setting is meant for special circumstances, so we don't recommend setting the flag to |
The Restrict non-admin users from creating tenants option is shown below
Restrict guest users' default permissions
You can restrict default permissions for guest users in the following ways.
Note
The Guest user access restrictions setting replaced the Guest users permissions are limited setting. For guidance on using this feature, see Restrict guest access permissions in Azure Active Directory.
Permission | Setting explanation |
---|---|
Guest user access restrictions | Setting this option to Guest users have the same access as members grants all member user permissions to guest users by default. Setting this option to Guest user access is restricted to properties and memberships of their own directory objects restricts guest access to only their own user profile by default. Access to other users is no longer allowed, even when they're searching by user principal name, object ID, or display name. Access to group information, including groups memberships, is also no longer allowed. This setting doesn't prevent access to joined groups in some Microsoft 365 services like Microsoft Teams. To learn more, see Microsoft Teams guest access. Guest users can still be added to administrator roles regardless of this permission setting. |
Guests can invite | Setting this option to Yes allows guests to invite other guests. To learn more, see Configure external collaboration settings. |
Object ownership
Application registration owner permissions
When a user registers an application, they're automatically added as an owner for the application. As an owner, they can manage the metadata of the application, such as the name and permissions that the app requests. They can also manage the tenant-specific configuration of the application, such as the single sign-on (SSO) configuration and user assignments.
An owner can also add or remove other owners. Unlike global administrators, owners can manage only the applications that they own.
Enterprise application owner permissions
When a user adds a new enterprise application, they're automatically added as an owner. As an owner, they can manage the tenant-specific configuration of the application, such as the SSO configuration, provisioning, and user assignments.
An owner can also add or remove other owners. Unlike global administrators, owners can manage only the applications that they own.
Group owner permissions
When a user creates a group, they're automatically added as an owner for that group. As an owner, they can manage properties of the group (such as the name) and manage group membership.
An owner can also add or remove other owners. Unlike global administrators and user administrators, owners can manage only the groups that they own.
To assign a group owner, see Managing owners for a group.
Ownership permissions
The following tables describe the specific permissions in Azure AD that member users have over owned objects. Users have these permissions only on objects that they own.
Owned application registrations
Users can perform the following actions on owned application registrations:
Action | Description |
---|---|
microsoft.directory/applications/audience/update | Update the applications.audience property in Azure AD. |
microsoft.directory/applications/authentication/update | Update the applications.authentication property in Azure AD. |
microsoft.directory/applications/basic/update | Update basic properties on applications in Azure AD. |
microsoft.directory/applications/credentials/update | Update the applications.credentials property in Azure AD. |
microsoft.directory/applications/delete | Delete applications in Azure AD. |
microsoft.directory/applications/owners/update | Update the applications.owners property in Azure AD. |
microsoft.directory/applications/permissions/update | Update the applications.permissions property in Azure AD. |
microsoft.directory/applications/policies/update | Update the applications.policies property in Azure AD. |
microsoft.directory/applications/restore | Restore applications in Azure AD. |
Owned enterprise applications
Users can perform the following actions on owned enterprise applications. An enterprise application consists of a service principal, one or more application policies, and sometimes an application object in the same tenant as the service principal.
Action | Description |
---|---|
microsoft.directory/auditLogs/allProperties/read | Read all properties (including privileged properties) on audit logs in Azure AD. |
microsoft.directory/policies/basic/update | Update basic properties on policies in Azure AD. |
microsoft.directory/policies/delete | Delete policies in Azure AD. |
microsoft.directory/policies/owners/update | Update the policies.owners property in Azure AD. |
microsoft.directory/servicePrincipals/appRoleAssignedTo/update | Update the servicePrincipals.appRoleAssignedTo property in Azure AD. |
microsoft.directory/servicePrincipals/appRoleAssignments/update | Update the users.appRoleAssignments property in Azure AD. |
microsoft.directory/servicePrincipals/audience/update | Update the servicePrincipals.audience property in Azure AD. |
microsoft.directory/servicePrincipals/authentication/update | Update the servicePrincipals.authentication property in Azure AD. |
microsoft.directory/servicePrincipals/basic/update | Update basic properties on service principals in Azure AD. |
microsoft.directory/servicePrincipals/credentials/update | Update the servicePrincipals.credentials property in Azure AD. |
microsoft.directory/servicePrincipals/delete | Delete service principals in Azure AD. |
microsoft.directory/servicePrincipals/owners/update | Update the servicePrincipals.owners property in Azure AD. |
microsoft.directory/servicePrincipals/permissions/update | Update the servicePrincipals.permissions property in Azure AD. |
microsoft.directory/servicePrincipals/policies/update | Update the servicePrincipals.policies property in Azure AD. |
microsoft.directory/signInReports/allProperties/read | Read all properties (including privileged properties) on sign-in reports in Azure AD. |
Owned devices
Users can perform the following actions on owned devices:
Action | Description |
---|---|
microsoft.directory/devices/bitLockerRecoveryKeys/read | Read the devices.bitLockerRecoveryKeys property in Azure AD. |
microsoft.directory/devices/disable | Disable devices in Azure AD. |
Owned groups
Users can perform the following actions on owned groups.
Note
Owners of dynamic groups must have a global administrator, group administrator, Intune administrator, or user administrator role to edit group membership rules. For more information, see Create or update a dynamic group in Azure Active Directory.
Action | Description |
---|---|
microsoft.directory/groups/appRoleAssignments/update | Update the groups.appRoleAssignments property in Azure AD. |
microsoft.directory/groups/basic/update | Update basic properties on groups in Azure AD. |
microsoft.directory/groups/delete | Delete groups in Azure AD. |
microsoft.directory/groups/members/update | Update the groups.members property in Azure AD. |
microsoft.directory/groups/owners/update | Update the groups.owners property in Azure AD. |
microsoft.directory/groups/restore | Restore groups in Azure AD. |
microsoft.directory/groups/settings/update | Update the groups.settings property in Azure AD. |
Next steps
- To learn more about the Guest user access restrictions setting, see Restrict guest access permissions in Azure Active Directory.
- To learn more about how to assign Azure AD administrator roles, see Assign a user to administrator roles in Azure Active Directory.
- To learn more about how resource access is controlled in Microsoft Azure, see Understanding resource access in Azure.
- For more information on how Azure AD relates to your Azure subscription, see How Azure subscriptions are associated with Azure Active Directory.
- Manage users.
Feedback
Submit and view feedback for