Create and Manage Azure Active Directory Administrative Units
Administrative Units (AUs) are logical entities that allow Azure Active Directory (AAD) tenant administrators to limit the scope of AAD administrative roles, such as User Account Administrator. Still in public preview at the time of this writing and only available as part of an AAD Premium subscription, the ability to limit the scope of administrative roles gives tenant administrators greater flexibility when assigning permissions.
In this article, I’ll walk you through upgrading to an Azure AD Premium trial and show you how to create and manage Administrative Units with PowerShell so that you can limit the scope of administrative roles to specific AUs.
Upgrading to AAD Premium
You’ll need to upgrade to AAD Premium before it’s possible to use Administrative Units. If you don’t already have a premium subscription, you can upgrade to a trial by following the instructions below. Open the Azure management portal and sign in:
- In the blue panel on the left, scroll down and click ACTIVE DIRECTORY.
- On the right of the portal, click the AD that you want to upgrade. In the GET STARTED section, click Try it now under Get Azure AD Premium.
- You’ll be redirected to the Licenses tab. Click TRY AZURE ACTIVE DIRECTORY PREMIUM NOW.
- In the Activate Azure AD Premium trial dialog, click OK to confirm that you want to enable the 90-day trial.
You might need to wait a few minutes while the trial is set up.
Managing AUs with Windows PowerShell
At the time of writing, AUs can only be managed using Windows PowerShell. Before you can use PowerShell to manage Azure Active Directory, you’ll need to have the Microsoft Online Services Sign-In Assistant for IT Professionals RTW and Azure Active Directory Module for Windows PowerShell (64-bit version) installed on a local management PC. As of October 2014, the 32-bit version of the module has been discontinued.
If you already have the AAD module for Windows PowerShell installed, you can check the version number by running the cmdlet below in a PowerShell prompt. If it’s lower than 1.0.8070.2, then you’ll need to update the module.
Before installing the new AAD module, remove Windows Azure Active Directory Module for Windows PowerShell, or Microsoft Online Services Module for Windows PowerShell if already installed on your PC.
Connecting to Azure Active DirectoryTo make a connection to your Azure Active Directory subscription, run the following PowerShell cmdlet and enter the account information for a Global Administrator:
Creating an Administrative UnitOnce you've got your management PC set up and made a connection to your AAD subscription using PowerShell, you can create an Administrative Unit using the New-MsolAdministrativeUnit cmdlet:
To confirm that the AU was successfully created and to see any other AUs that might already exist in AAD, run the command below and you should see the new Administrative Unit listed in the output:
Adding a User to an Administrative UnitBefore we can add users to the AU, we need to get both the user's and AU's object IDs. In this example, I'm going to add a user account (user1) to the London AU, and another user (useradmin) to the User Account Administrator role, scoped by the London AU, meaning that useradmin will only be able to modify account parameters for user accounts associated with the London AU. It should also be noted that users can be associated with more than one AU. If you want to add a new user to AAD for the purposes of this exercise, run the New-MsolUser cmdlet as shown, replacing mydomain.onmicrosoft.com with your domain name as appropriate:
Now we'll create two variables to hold the relevant objects for user1 and the London AU, respectively:
While it's not necessary, if you want to see the actual object IDs in the console, run the following two Write-Host cmdlets:
Finally, we'll use the Add-MsolAdministrativeUnitMember cmdlet to add user1 to the AU:
To confirm that user1 is now associated with the London AU, run the command below and you'll see a list of the AUs that user1 belongs to:
Alternatively, you can list all the users associated with a given AU using the Get-MsolAdministrativeUnitMember cmdlet:
Scoping Administrative RolesNow we have an AU with at least one associated user, we need to add useradmin to the User Account Administrator role, but scoped by the London Administrative Unit. Remember that this means useradmin will only be allowed to perform actions permitted by the User Account Administrator role on users associated with the London AU, not on all AAD users. Let's start by listing all the defined roles in AAD:
I'll reuse the $au variable defined in the last step and add the $role variable to hold information about the User Account Administrator role. I'll also redefine the $user variable to get the object ID for the useradmin account, which I've already created in AAD. The Add-MsolScopedRoleMember cmdlet adds useradmin to the User Account Administrator role, but limits the user's scope as defined by the specified Administrative Unit:
To check that the user was added to the role and scoped by AU, run the command below. All users that are a member of the given role and scoped by the specified AU will be listed in the output:
Testing the ResultsAs my directory currently stands, useradmin should be able to perform any User Account Administrator operations on user1, but not on any other users because they are not associated with the London AU. So I'll log in with the useradmin account and try to set the UsageLocation parameter for user1, which needs to be a two letter country code. To log in with a different user account, I need to run Connect-MsolService again.
If the command runs successfully, there will be no output in the PowerShell prompt. But if you try to run the command again against a user that's not associated with the London AU, PowerShell will return an error: Set-MsolUser : Access Denied. You do not have permissions to call this cmdlet. We get this error because I'm trying to set the UsageLocation parameter on a user that isn't associated with any AU.
Removing Users from Scoped Roles and AUsLet's reverse all the configuration we performed above. We'll start by removing useradmin from the scoped administrative role. In the Remove-MsolScopedRoleMember cmdlet below, I'm continuing to use the variables defined in the previous steps. Don't forget, you will need to use Connect-MsolService again to sign in with a user that has been assigned the Global Administrator role to run the cmdlets below:
To check that useradmin has been removed from the scoped role:
Now let's remove user1 from the London AU:
And to check the current users associated with the London AU:
Removing an Administrative UnitFinally, if you want to delete an Administrative Unit, use the Remove-MsolAdministrativeUnit cmdlet with the AU's object ID:
More in Microsoft Azure
Microsoft Revises Restrictive Cloud Licensing Policies to Avoid EU Antitrust Probe
May 19, 2022 | Rabia Noureen
Microsoft's Azure AD Conditional Access Service Can Now Require Reauthentication
May 13, 2022 | Rabia Noureen
Microsoft Addresses Cross-Tenant Database Vulnerability in Azure PostgreSQL
Apr 29, 2022 | Rabia Noureen
Microsoft Simplifies IT Monitoring with New Azure Managed Grafana Service
Apr 19, 2022 | Rabia Noureen
Microsoft Adds Ampere ARM CPU Support to Azure Virtual Machines
Apr 5, 2022 | Rabia Noureen
System Center 2022 is Now Available with New Datacenter Management Capabilities
Apr 4, 2022 | Rabia Noureen
Most popular on petri