Assign Azure roles to external users using the Azure portal

Azure role-based access control (Azure RBAC) allows better security management for large organizations and for small and medium-sized businesses working with external collaborators, vendors, or freelancers that need access to specific resources in your environment, but not necessarily to the entire infrastructure or any billing-related scopes. You can use the capabilities in Microsoft Entra B2B to collaborate with external users and you can use Azure RBAC to grant just the permissions that external users need in your environment.

Prerequisites

To assign Azure roles or remove role assignments, you must have:

  • Microsoft.Authorization/roleAssignments/write and Microsoft.Authorization/roleAssignments/delete permissions, such as User Access Administrator or Owner

When would you invite external users?

Here are a couple example scenarios when you might invite users to your organization and grant permissions:

  • Allow an external self-employed vendor that only has an email account to access your Azure resources for a project.
  • Allow an external partner to manage certain resources or an entire subscription.
  • Allow support engineers not in your organization (such as Microsoft support) to temporarily access your Azure resource to troubleshoot issues.

Permission differences between member users and guest users

Users of a directory with member type (member users) have different permissions by default than users invited from another directory as a B2B collaboration guest (guest users). For example, member users can read almost all directory information while guest users have restricted directory permissions. For more information about member users and guest users, see What are the default user permissions in Microsoft Entra ID?.

Invite an external user to your directory

Follow these steps to invite an external user to your directory in Microsoft Entra ID.

  1. Sign in to the Azure portal.

  2. Make sure your organization's external collaboration settings are configured such that you're allowed to invite external users. For more information, see Configure external collaboration settings.

  3. Select Microsoft Entra ID > Users.

  4. Select New user > Invite external user.

    Screenshot of Invite external user page in Azure portal.

  5. Follow the steps to invite an external user. For more information, see Add Microsoft Entra B2B collaboration users in the Azure portal.

After you invite an external user to the directory, you can either send the external user a direct link to a shared app, or the external user can select the accept invitation link in the invitation email.

Screenshot of external user invite email.

For the external user to be able to access your directory, they must complete the invitation process.

Screenshot of external user invite review permissions.

For more information about the invitation process, see Microsoft Entra B2B collaboration invitation redemption.

Assign a role to an external user

In Azure RBAC, to grant access, you assign a role. To assign a role to an external user, you follow same steps as you would for a member user, group, service principal, or managed identity. Follow these steps assign a role to an external user at different scopes.

  1. Sign in to the Azure portal.

  2. In the Search box at the top, search for the scope you want to grant access to. For example, search for Management groups, Subscriptions, Resource groups, or a specific resource.

  3. Select the specific resource for that scope.

  4. Select Access control (IAM).

    The following shows an example of the Access control (IAM) page for a resource group.

    Screenshot of Access control (IAM) page for a resource group.

  5. Select the Role assignments tab to view the role assignments at this scope.

  6. Select Add > Add role assignment.

    If you don't have permissions to assign roles, the Add role assignment option will be disabled.

    Screenshot of Add > Add role assignment menu.

    The Add role assignment page opens.

  7. On the Role tab, select a role such as Virtual Machine Contributor.

    Screenshot of Add role assignment page with Roles tab.

  8. On the Members tab, select User, group, or service principal.

    Screenshot of Add role assignment page with Members tab.

  9. Select Select members.

  10. Find and select the external user. If you don't see the user in the list, you can type in the Select box to search the directory for display name or email address.

    You can type in the Select box to search the directory for display name or email address.

    Screenshot of Select members pane.

  11. Select Select to add the external user to the Members list.

  12. On the Review + assign tab, select Review + assign.

    After a few moments, the external user is assigned the role at the selected scope.

    Screenshot of role assignment for Virtual Machine Contributor.

Assign a role to an external user not yet in your directory

To assign a role to an external user, you follow same steps as you would for a member user, group, service principal, or managed identity.

If the external user is not yet in your directory, you can invite the user directly from the Select members pane.

  1. Sign in to the Azure portal.

  2. In the Search box at the top, search for the scope you want to grant access to. For example, search for Management groups, Subscriptions, Resource groups, or a specific resource.

  3. Select the specific resource for that scope.

  4. Select Access control (IAM).

  5. Select Add > Add role assignment.

    If you don't have permissions to assign roles, the Add role assignment option will be disabled.

    Screenshot of Add > Add role assignment menu.

    The Add role assignment page opens.

  6. On the Role tab, select a role such as Virtual Machine Contributor.

  7. On the Members tab, select User, group, or service principal.

    Screenshot of Add role assignment page with Members tab.

  8. Select Select members.

  9. In the Select box, type the email address of the person you want to invite and select that person.

    Screenshot of invite external user in Select members pane.

  10. Select Select to add the external user to the Members list.

  11. On the Review + assign tab, select Review + assign to add the external user to your directory, assign the role, and send an invite.

    After a few moments, you'll see a notification of the role assignment and information about the invite.

    Screenshot of role assignment and invited user notification.

  12. To manually invite the external user, right-click and copy the invitation link in the notification. Don't select the invitation link because it starts the invitation process.

    The invitation link will have the following format:

    https://login.microsoftonline.com/redeem?rd=https%3a%2f%2finvitations.microsoft.com%2fredeem%2f%3ftenant%3d0000...

  13. Send the invitation link to the external user to complete the invitation process.

    For more information about the invitation process, see Microsoft Entra B2B collaboration invitation redemption.

Remove an external user from your directory

Before you remove an external user from a directory, you should first remove any role assignments for that external user. Follow these steps to remove an external user from a directory.

  1. Open Access control (IAM) at a scope, such as management group, subscription, resource group, or resource, where the external user has a role assignment.

  2. Select the Role assignments tab to view all the role assignments.

  3. In the list of role assignments, add a check mark next to the external user with the role assignment you want to remove.

    Screenshot of selected role assignment to remove.

  4. Select Remove.

    Screenshot of Remove role assignment message.

  5. In the remove role assignment message that appears, select Yes.

  6. Select the Classic administrators tab.

  7. If the external user has a Co-Administrator assignment, add a check mark next to the external user and select Remove.

  8. In the left navigation bar, select Microsoft Entra ID > Users.

  9. Select the external user you want to remove.

  10. Select Delete.

    Screenshot of deleting an external user.

  11. In the delete message that appears, select Yes.

Troubleshoot

External user cannot browse the directory

External users have restricted directory permissions. For example, external users can't browse the directory and can't search for groups or applications. For more information, see What are the default user permissions in Microsoft Entra ID?.

Screenshot of external user can't browse users in a directory.

If an external user needs additional privileges in the directory, you can assign a Microsoft Entra role to the external user. If you really want an external user to have full read access to your directory, you can add the external user to the Directory Readers role in Microsoft Entra ID. For more information, see Add Microsoft Entra B2B collaboration users in the Azure portal.

Screenshot of assigning Directory Readers role.

External user cannot browse users, groups, or service principals to assign roles

External users have restricted directory permissions. Even if an external user is an Owner at a scope, if they try to assign a role to grant someone else access, they can't browse the list of users, groups, or service principals.

Screenshot of external user can't browse security principals to assign roles.

If the external user knows someone's exact sign-in name in the directory, they can grant access. If you really want an external user to have full read access to your directory, you can add the external user to the Directory Readers role in Microsoft Entra ID. For more information, see Add Microsoft Entra B2B collaboration users in the Azure portal.

External user cannot register applications or create service principals

External users have restricted directory permissions. If an external user needs to be able to register applications or create service principals, you can add the external user to the Application Developer role in Microsoft Entra ID. For more information, see Add Microsoft Entra B2B collaboration users in the Azure portal.

Screenshot of external user can't register applications.

External user does not see the new directory

If an external user has been granted access to a directory, but they don't see the new directory listed in the Azure portal when they try to switch in their Directories page, make sure the external user has completed the invitation process. For more information about the invitation process, see Microsoft Entra B2B collaboration invitation redemption.

External user does not see resources

If an external user has been granted access to a directory, but they don't see the resources they have been granted access to in the Azure portal, make sure the external user has selected the correct directory. An external user might have access to multiple directories. To switch directories, in the upper left, select Settings > Directories, and then select the appropriate directory.

Screenshot of Portal setting Directories section in Azure portal.

Next steps