Add co-administrator to B2C tenant to mange the directory - azure-active-directory

Could you please let me know, How we can be able to added the co-administrator or my colleague to the newly created B2C tenant as a Global admin.
I’m struggling to find the way out. I have gone through some article were it point to add/import the user from external Azure active directory as source using classic portal.
Scenario is: I’ve created the B2C tenant were I marked as GA. I want my colleague to manage the directory in my absence.
Have followed the guide to assign Admin Roles to a User in Azure AD. On the Step 5, select the Global Administrator under Directory Role
Still not able to connect through Powershell

Still not able to connect through Powershell
Do you mean your colleague can't use his Azure AD account to login your Azure AD with PowerShell? With this command Connect-AzureAD?
We can via Azure classic portal to add Global Admin role to your colleague's account, like this:
After that, we can use PowerShell to login your Azure AD with -TenantId, like this:
connect-azuread -TenantId 0e0a9c5d-xxxx-xxxx-xxxx-xxxx375bxxxx
============================
Update:
If you want make your account can login new azure portal, we should grant your account admin permission of this subscription, we can set this here:

Related

Grant Power BI Service Admin role to AAD Service Principal into O365 tenant

I'm setting up a Power BI auditing solution using an Azure Automation Account and the Power BI Powershell Cmdlets. In order to access PBI audit logs Power BI Services Admin role is needed.
This role can be granted to O365 Tenant users via Microsoft 365 admin center or via the Azure Portal using directory built-in roles.
This seems not that straightforward to me when I try to grant the given role to the AAD App Registration used to authorize the Power shell script in order to run programmatically. My question is: which is the best way to perform this operation on a service principal? I found a lot of documentation, but most of the time it is a bit confusing.
If I misunderstand your requirement, please let me know.
You mentioned we can add the role to service principal via Microsoft 365 admin center or via the Azure Portal using directory built-in roles. And then you want to know which is the best way to do this operation to allow you run the powershell script programmatically. So I think we can just use the powershell command which is shown in the tutorial you provided above, or you can refer to this tutorial to know more about this command.
Add-AzureADDirectoryRoleMember -ObjectId <the power bi admin role id> -RefObjectId <your service principal(or user) objectId>
Assign the role by this command, you can run it programmatically and without do the assign role operation in web page. I think this is the best way to do it.

Adding external users to Azure AD B2C without sign-in

I added to my Azure AD B2C option to log in by an external provider - Azure AD. Later on, I added my account from that tenant to Azure AD B2C as external users.
Unfortunately, when I log in, I get "User does not exist. Please sign up before you can sign in.".
When I use a different policy that allows me to sign in, my account is duplicated as Federated Azure Active Directory.
How we can prepopulate Azure AD B2C with external users to avoid signing in new accounts? I would like to move existing data from the tenant and avoid filling in unnecessary data. Moreover, I would like to allow particular users only to be able to log in to our application.
The problem here is that users added via the portal are essentially B2B or portal admin users.
These are not local accounts and hence cannot login to B2C.
If you have users in another AAD tenant that is federated with B2C, you do not have to manually add these users to B2C. A "linked account" (using the #EXT# format) is created when those users authenticate via their Azure AD.
I guess what you are saying is "avoid registering new users."
Azure B2C is for Consumer, not for Azure AD tenant. You should use Azure B2B feature to add guest user to your Azure AD B2C tenant and assign the necessary role/permissions to the guest user.
You could simply choose to use the + New guest user on Azure portal or Microsoft Graph API to add external users.

Why can't Azure B2C find the owner account when trying to login

I have created a B2C directory in Azure AD. It added my AD User from the main directory to that directory when creating the directory. I have configured it to utilize the signup-signin policy and that appears to be working because I was able to create an account and it logged me as the account was created. It is my understanding that the account that creates the directory is considered the owner of the directory and is identified as any other user. Is that correct? Anyway, I would think that I could log in as that user but it cannot even find the account.
The initial user that creates an Azure AD B2C tenant is associated as a guest user, via the Global Administrator role, with the Azure AD B2C directory.
A Global Administrator user can administer the Azure AD B2C directory, policies, and other Azure AD B2C settings.
A guest user cannot be authenticated by a sign-in policy because this policy is scoped to users that are created as local and social account users.

Azure Active Directory access denied

I am new to Azure and want to use "login with Microsoft" in one of my web apps.
For this I have created a new account on portal.azure.com.
When going to Azure Active Directory tab in account I am getting this error-
Access denied
You do not have access
Looks like you don't have access to this content. To get access, please contact the owner.
I found a similar question where they advice to login with Global Administrator permission for Azure AD.
Azure Active Directory - Access Denied in New Portal
But I don't know what is that Global Administrator permission for Azure AD is? I just signed up with my email and that's the one account all I have.
You need to create a "tenant" to do something with AD. Check the documentation
In short, login into azure portal, go here https://portal.azure.com/#create/Microsoft.AzureActiveDirectory and create new directory.
Global Administrator / Company Administrator: Users with this role have access to all administrative features in Azure Active Directory, as well as services that federate to Azure Active Directory like Exchange Online, SharePoint Online, and Skype for Business Online. The person who signs up for the Azure Active Directory tenant becomes a global administrator. Only global administrators can assign other administrator roles. There can be more than one global administrator at your company. Global admins can reset the password for any user and all other administrators.
Note: n Microsoft Graph API, Azure AD Graph API, and Azure AD PowerShell, this role is identified as "Company Administrator". It is "Global Administrator" in the Azure portal.
Details about the global administrator role
Assign a user to administrator roles in Azure Active Directory
You need to assign the co-admin as global administrator with using account admin user. Log in to new Azure Portal by using the account with Global Administrator permission for Azure AD. Navigate to the Azure Active Directory extension, from the Users and Groups tab, search for the external account, and change the Directory Role to Global Administrator.

On prem Active directory synced to Azure AD to allow on prem credentials to login to the portal

We have synced our on prem active directory to our Azure instance active directory using Azure AD connect (Express install). We can see the users in Azure from our on prem AD. The sync shows as successful.
Now we would like to use the domain name that we have synced to azure for user authentication in to the azure portal. The documentation that we have read says this is possible, but we can get it to work.
When we try to use an existing AD user we get the message that “We don’t recognize this users ID or password” but if we create a new user in Azure and assign it to our synced AD we can use it to login to the azure portal.
We have searched for a detailed document on prem AD synced to Azure AD to use for portal login and found some documents that we followed but did not help.
Can we use our on prem AD user name and password to allow users to login to the Azure portal?
Thanks for your help
John
yes, you can use users in Azure AD with tag "Sourced from: Local Active Direcotry" to login to azure portal.
The custom domain should be verified.
Password Synchronization should be enabled.
Also, assign coadmin right for at least one subscription to login to Management Portal.

Resources