The Azure AD portal does not really provide an overview about all directory role assignments in your tenant. If you want to review existing Azure AD Directory roles a csv report will probably better server your needs. Therefore I created a PowerShell script to export the role assignments.

The Azure AD Portal only displays limited information about the assignments
### PowerShell Script

Find the PowerShell script in my techblog GitHub Repository.

Make sure that you have the AzureAD PowerShell module installed before running the script. You can install it by running “Install-Module AzureAD”.

PowerShell script output

Report

The report contains three columns:

  • Role (name of the directory role)
    • Note that the Global Administrator Role is represented as Company Administrator
  • Member
    • If the role is assigned to a user its the UserPrincipalName
    • If the role is assigned to a service principal its the display name with the Azure AD application ID in the brackets
  • ObjectType
    • Indicates whether the role is assigned to user account or a service principal
CSV file containing all assigned directory roles

Comparing reports

You can compare two reports with the following PowerShell code:

1
2
3
$firstReport = Import-Csv -Path "AzureADDirectoryRoleAssignments_2020-03-13 - Copy.csv" -Delimiter ";"
$secondReport = Import-Csv -Path "AzureADDirectoryRoleAssignments_2020-03-13.csv" -Delimiter ";"
Compare-Object $firstReport $secondReport

Counting assignments per directory role

If you want to count how many times each role is assigned, e.g. how many times is the Company Administrator (Global Administrator) role assigned you can process the date stored in “$roleAssignments

1
2
3
4
5
6
7
8
$roleAssignments | Group-Object -Property Role | Sort-Object -Descending | Select-Object -Property Name,Count

Name Count
---- -----
Directory Readers 5
Privileged Role Administrator 1
Security Administrator 1
Company Administrator 2

Other approaches

An even better approach is to use Azure AD Access reviewswhere users need to confirm their assigned directory role on a regular basis to keep it:

Azure AD Access Review

The downside here is that it requires Azure AD Premium P2 licenses .

Final words

Generating a report of assigned directory roles can provide you good insights and also be a motivation to verify if you’re really following the least privilege approach.

To end this post I have three questions as a take away for you which hopefully support your review process of the report:

  • Are new built-in roles available which better suit required permissions? Are you really using least privilege? (See Administrator role permissions in Azure Active Directory)
  • Have you considered Azure AD privileged Identity Management (PIM)?
  • Could you use service specific RBAC features with fine grained permissions instead of directory roles?