What are the default user permissions in Microsoft Entra ID?
מאמר
In Microsoft Entra ID, all users are granted a set of default permissions. A user's access consists of the type of user, their role assignments, and their ownership of individual objects.
This article describes those default permissions and compares the member and guest user defaults. The default user permissions can be changed only in user settings in Microsoft Entra ID.
Member and guest users
The set of default permissions depends on whether the user is a native member of the tenant (member user) or is brought over from another directory, such as a business-to-business (B2B) collaboration guest (guest user). For more information about adding guest users, see What is Microsoft Entra B2B collaboration?. Here are the capabilities of the default permissions:
Member users can register applications, manage their own profile photo and mobile phone number, change their own password, and invite B2B guests. These users can also read all directory information (with a few exceptions).
Guest users have restricted directory permissions. They can manage their own profile, change their own password, and retrieve some information about other users, groups, and apps. However, they can't read all directory information.
For example, guest users can't enumerate the list of all users, groups, and other directory objects. Guests can be added to administrator roles, which grant them full read and write permissions. Guests can also invite other guests.
Compare member and guest default permissions
Area
Member user permissions
Default guest user permissions
Restricted guest user permissions
Users and contacts
Enumerate the list of all users and contacts
Read all public properties of users and contacts
Invite guests
Change their own password
Manage their own mobile phone number
Manage their own photo
Invalidate their own refresh tokens
Read their own properties
Read display name, email, sign-in name, photo, user principal name, and user type properties of other users and contacts
Change their own password
Search for another user by object ID (if allowed)
Read manager and direct report information of other users
Read their own properties
Change their own password
Manage their own mobile phone number
Groups
Create security groups
Create Microsoft 365 groups
Enumerate the list of all groups
Read all properties of groups
Read nonhidden group membership
Read hidden Microsoft 365 group membership for joined groups
Manage properties, ownership, and membership of groups that the user owns
Add guests to owned groups
Manage group membership settings
Delete owned groups
Restore owned Microsoft 365 groups
Read properties of nonhidden groups, including membership and ownership (even nonjoined groups)
Read hidden Microsoft 365 group membership for joined groups
Search for groups by display name or object ID (if allowed)
Read object ID for joined groups
Read membership and ownership of joined groups in some Microsoft 365 apps (if allowed)
Applications
Register (create) new applications
Enumerate the list of all applications
Read properties of registered and enterprise applications
Manage application properties, assignments, and credentials for owned applications
Create or delete application passwords for users
Delete owned applications
Restore owned applications
List permissions granted to applications
Read properties of registered and enterprise applications
List permissions granted to applications
Read properties of registered and enterprise applications
List permissions granted to applications
Devices
Enumerate the list of all devices
Read all properties of devices
Manage all properties of owned devices
No permissions
No permissions
Organization
Read all company information
Read all domains
Read configuration of certificate-based authentication
Read all partner contracts
Read multitenant organization basic details and active tenants
Read company display name
Read all domains
Read configuration of certificate-based authentication
Read company display name
Read all domains
Roles and scopes
Read all administrative roles and memberships
Read all properties and membership of administrative units
No permissions
No permissions
Subscriptions
Read all licensing subscriptions
Enable service plan memberships
No permissions
No permissions
Policies
Read all properties of policies
Manage all properties of owned policies
No permissions
No permissions
Terms of use
Read terms of use a user has accepted.
Read terms of use a user has accepted.
Read terms of use a user has accepted.
Restrict member users' default permissions
It's possible to add restrictions to users' default permissions.
You can restrict default permissions for member users in the following ways:
זהירות
Using the Restrict access to Microsoft Entra administration portal switch is NOT a security measure. For more information on the functionality, see the following table.
Permission
Setting explanation
Register applications
Setting this option to No prevents users from creating application registrations. You can then grant the ability back to specific individuals, by adding them to the application developer role.
Allow users to connect work or school account with LinkedIn
Setting this option to No prevents users from creating security groups. Those users assigned at least the User Administrators role can still create security groups. To learn how, see Microsoft Entra cmdlets for configuring group settings.
Create Microsoft 365 groups
Setting this option to No prevents users from creating Microsoft 365 groups. Setting this option to Some allows a set of users to create Microsoft 365 groups. Anyone assigned at least the User Administrator role can still create Microsoft 365 groups. To learn how, see Microsoft Entra cmdlets for configuring group settings.
Restrict access to Microsoft Entra administration portal
What does this switch do? No lets nonadministrators browse the Microsoft Entra administration portal. Yes Restricts nonadministrators from browsing the Microsoft Entra administration portal. Nonadministrators who are owners of groups or applications are unable to use the Azure portal to manage their owned resources.
What does it not do? It doesn't restrict access to Microsoft Entra data using PowerShell, Microsoft GraphAPI, or other clients such as Visual Studio. It doesn't restrict access as long as a user is assigned a custom role (or any role).
When should I use this switch? Use this option to prevent users from misconfiguring the resources that they own.
When should I not use this switch? Don't use this switch as a security measure. Instead, create a Conditional Access policy that targets Windows Azure Service Management API that blocks nonadministrators access to Windows Azure Service Management API.
How do I grant only a specific non-administrator users the ability to use the Microsoft Entra administration portal? Set this option to Yes, then assign them a role like global reader.
Restrict access to the Microsoft Entra administration portal A Conditional Access policy that targets Windows Azure Service Management API targets access to all Azure management.
Restrict non-admin users from creating tenants
Users can create tenants in the Microsoft Entra ID and Microsoft Entra administration portal under Manage tenant. The creation of a tenant is recorded in the Audit log as category DirectoryManagement and activity Create Company. By default, the user who creates a Microsoft Entra tenant is automatically assigned the Global Administrator role. The newly created tenant doesn't inherit any settings or configurations.
What does this switch do? Setting this option to Yes restricts creation of Microsoft Entra tenants to anyone assigned at least the Tenant Creator role. Setting this option to No allows nonadmin users to create Microsoft Entra tenants. Tenant create continues to be recorded in the Audit log.
How do I grant only a specific non-administrator users the ability to create new tenants? Set this option to Yes, then assign them the Tenant Creator role.
Restrict users from recovering the BitLocker key(s) for their owned devices
This setting can be found in the Microsoft Entra admin center in the Device Settings. Setting this option to Yes restricts users from being able to self-service recover BitLocker key(s) for their owned devices. Users must contact their organization's helpdesk to retrieve their BitLocker keys. Setting this option to No allows users to recover their BitLocker keys.
Read other users
This setting is available in Microsoft Graph and PowerShell only. Setting this flag to $false prevents all nonadmins from reading user information from the directory. This flag might prevent reading user information in other Microsoft services like Microsoft Teams.
This setting is meant for special circumstances, so we don't recommend setting the flag to $false.
The Restricted non-admin users from creating tenants option is shown in the following screenshot.
Restrict guest users' default permissions
You can restrict default permissions for guest users in the following ways.
Setting this option to Guest users have the same access as members grants all member user permissions to guest users by default.
Setting this option to Guest user access is restricted to properties and memberships of their own directory objects restricts guest access to only their own user profile by default. Access to other users is no longer allowed, even when they're searching by user principal name, object ID, or display name. Access to group information, including groups memberships, is also no longer allowed.
This setting doesn't prevent access to joined groups in some Microsoft 365 services like Microsoft Teams. To learn more, see Microsoft Teams guest access.
Guest users can still be added to administrator roles regardless of this permission setting.
When a user registers an application, they're automatically added as an owner for the application. As an owner, they can manage the metadata of the application, such as the name and permissions that the app requests. They can also manage the tenant-specific configuration of the application, such as the single sign-on (SSO) configuration and user assignments.
An owner can also add or remove other owners. Unlike those users assigned at least the Application Administrator role, owners can manage only the applications that they own.
Enterprise application owner permissions
When a user adds a new enterprise application, they're automatically added as an owner. As an owner, they can manage the tenant-specific configuration of the application, such as the SSO configuration, provisioning, and user assignments.
An owner can also add or remove other owners. Unlike those users assigned at least the Application Administrator role, owners can manage only the applications that they own.
Group owner permissions
When a user creates a group, they're automatically added as an owner for that group. As an owner, they can manage properties of the group (such as the name) and manage group membership.
An owner can also add or remove other owners. Unlike those users assigned at least the Groups Administrator role, owners can manage only the groups that they own and they can add or remove group members only if the group's membership type is Assigned.
The following tables describe the specific permissions in Microsoft Entra ID that member users have over objects they own. Users have these permissions only on objects that they own.
Owned application registrations
Users can perform the following actions on owned application registrations:
Action
Description
microsoft.directory/applications/audience/update
Update the applications.audience property in Microsoft Entra ID.
Update the applications.permissions property in Microsoft Entra ID.
microsoft.directory/applications/policies/update
Update the applications.policies property in Microsoft Entra ID.
microsoft.directory/applications/restore
Restore applications in Microsoft Entra ID.
Owned enterprise applications
Users can perform the following actions on owned enterprise applications. An enterprise application consists of a service principal, one or more application policies, and sometimes an application object in the same tenant as the service principal.
Action
Description
microsoft.directory/auditLogs/allProperties/read
Read all properties (including privileged properties) on audit logs in Microsoft Entra ID.
microsoft.directory/policies/basic/update
Update basic properties on policies in Microsoft Entra ID.
microsoft.directory/policies/delete
Delete policies in Microsoft Entra ID.
microsoft.directory/policies/owners/update
Update the policies.owners property in Microsoft Entra ID.