Skip to content

This project demonstrates a governance-driven identity management task in **Microsoft Entra ID:** replacing a Global Administrator (GA) assignment with a more appropriate Privileged Role Administrator (PRA) role. This supports least-privilege design, limits risk exposure, and exercises role reassignment processes in a real-world tenant simulation.

License

Notifications You must be signed in to change notification settings

Compcode1/change-ga-to-pra

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

Project 2 – Change Global Administrator to Privileged Role Administrator

This project demonstrates a governance-driven identity management task in Microsoft Entra ID: replacing a Global Administrator (GA) assignment with a more appropriate Privileged Role Administrator (PRA) role. This supports least-privilege design, limits risk exposure, and exercises role reassignment processes in a real-world tenant simulation.

Scenario

A user currently holds the Global Administrator role in a Microsoft Entra tenant. As part of a security review, the tenant owner decides to remove this broad privilege and instead assign the Privileged Role Administrator role to the user. The PRA role allows management of directory roles but does not include full tenant authority. This change ensures better alignment with the user’s responsibilities.

Step-by-Step Action Flow (Simulated)

Navigate to Microsoft Entra Admin Center → Identity → Users

Locate the user janeadmin@contoso.com

Remove Global Administrator from Assigned roles

Assign the role Privileged Role Administrator

Confirm the user now appears with only the PRA role

Optional: log in as janeadmin@contoso.com and validate role management behavior in Entra portal

Entra Control Stack Mapping Layer Description Layer 1 – Authority Definition ✅ Touched. A tenant-level administrator with the proper role management privileges executes the change. No emergency access accounts are modified. Layer 2 – Scope Boundaries ❌ Not affected. Role is assigned tenant-wide; no Administrative Unit (AU) scoping is used. Layer 3 – Test Identity Validation ✅ Active validation. After confirming removal of GA rights, the janeadmin@contoso.com user signs in and attempts role assignments. This confirms that the PRA role is functioning and that GA authority has been removed. Layer 4 – External Entry Controls ❌ Not affected. This action applies to an internal user; no B2B or guest access is involved. Layer 5 – Privilege Channels ✅ Core focus. The project replaces one high-privilege role (GA) with a narrower privilege channel (PRA), reducing exposure to tenant-wide controls. Layer 6 – Device Trust Enforcement ❌ Not affected. No device trust or compliance requirements are altered. Layer 7 – Continuous Verification ✅ Optional follow-up. Access reviews or sign-in log reviews could be scheduled to track usage of PRA assignments over time.

Outcome: The user janeadmin@contoso.com now holds the Privileged Role Administrator role instead of Global Administrator Tenant privileges are reduced and more aligned with operational needs Audit logs confirm both role removal and reassignment Optional sign-in simulation confirms practical limitations of the new role

Governance Takeaways: Global Administrator should be used sparingly and only when truly necessary PRA provides enough authority to manage most directory-level privileges without overexposing the tenant This project supports a layered, maintainable privilege model and contributes to Zero Trust governance

About

This project demonstrates a governance-driven identity management task in **Microsoft Entra ID:** replacing a Global Administrator (GA) assignment with a more appropriate Privileged Role Administrator (PRA) role. This supports least-privilege design, limits risk exposure, and exercises role reassignment processes in a real-world tenant simulation.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published