Menu
Modern Workplace Blog
  • Home
  • About: Kenneth van Surksum
  • Cookie Policy
Modern Workplace Blog
March 2, 2020June 23, 2020

License requirements for administering Microsoft 365 services

Microsoft licensing is tough and vague but something we must deal with while implementing our solutions. I’m also aware that some of the features I describe on my blog are only available in the most expensive licensing options Microsoft provides, making some of the features I describe not usable for some of my readers.

Update June 23rd 2020: Microsoft has removed the Intune license requirement for administrators, see this blogpost by Peter van der Woude for more information: Quick tip: Allow access to unlicensed admins

If you administer Microsoft 365 services like Azure Active Directory (AzureAD), Exchange Online (EXO), SharePoint Online (SPO), Intune and many other products the license requirements for your administrative accounts are extra vague. I’ve asked Microsoft in December last year to clarify this, but until now no response was given.

There is some fragmented information available in the Microsoft documentation, that in combination with some other information to be found on the internet, like on twitter concludes that the license requirements are indeed very vague and could really use some official documentation from Microsoft to clear things up.

One thing in known, is that when asked about licensing requirements for the online services provided by Microsoft the statement returned is: “When the user benefits from the service, a license is required”

So let’s see what I found available online and see if it makes sense in some way…

Disclaimer: I don’t consider myself a Microsoft licensing expert and you therefore shouldn’t take anything I write here as being the truth from a licensing perspective. If you are in doubt, consult your licensing partner. This article was written on March 2nd 2020 and reflects the status of that point in time.

Azure Active Directory

Azure Active Directory comes in four editions—Free, Office 365 apps, Premium P1, and Premium P2 as detailed on the Azure Active Directory pricing page. Free has the lesser options while Premium P2 provides all the possible options.

When you buy one license for Azure AD Premium P2, either individually or as part of a suite license like M365 E5 or EMS E5 your whole Azure AD tenant will be put in Premium P2 mode, unlocking all of its capabilities.

Machine generated alternative text:
Azure Active Directory admin center 
Q 
O 
ksurksum@insight24.nl 
INSIG4T2a 
Documentation 
Dashboard 
All services 
FAVORITES 
Azure Active Directory 
users 
Enterprise applications 
Dashboard > Insight24 B.V. - Overview 
O Insight24 B.V. - Overview 
Active 
p Search (Ctrl+/) 
O Overview 
Getting started 
Diagnose and solve problems 
Manage 
users 
Groups 
Organizational relationships 
Roles end administrators 
Enterprise applications 
Devices 
App registrations 
Identity Governance 
Application proxy 
Licenses 
Azure AD Connect 
Custom domain names 
Mobility (MOM and MAN.") 
Password reset 
mpeny branding 
x 
Q) Switch directory 
Overview 
Delete directory 
Create e directory 
Whats new 
C) Got feedback? 
Insight24 B.V. 
insight24.nl 
Tenant ID 
Find 
users 
Search 
Azure AD Connect 
Status Not enabled 
Last sync Sync has never run 
Sign -ins 
Your role Power Bl administrator and 1 other roles More info 
Azure AD Premium P2
Azure AD functionality mode

That doesn’t mean though that you are entitled to use the Azure AD Premium P2 functionality for all your users, since the statement is, that if you benefit from the service, you need to buy a license.

Microsoft also makes a remark about this on their Microsoft 365 licensing guidance for security & compliance documentation page, stating “Some tenant services are not currently capable of limiting benefits to specific users. Efforts should be taken to limit the service benefits to licensed users. This will help avoid potential service disruption to your organization once targeting capabilities are available.“

Machine generated alternative text:
O Note 
Some tenant services are not currently capable of limiting benefits to specific users. Efforts should be taken to limit the service 
benefits to licensed users. This will help avoid potential service disruption to your organization once targeting capabilities are 
available.
Be warned…

Actually the Microsoft 365 licensing guidance for security & compliance documentation page gives us some more clues about the licenses needed for administrative accounts per feature. Take for example Azure Active Directory Identity Protection.

From the documentation page: How do users benefit from the service?

SecOps analysts and security professionals benefit from having consolidated views of flagged users and risk events based on machine learning algorithms. End users benefit from the automatic protection provided through risk-based Conditional Access and the improved security provided by acting on vulnerabilities.

Conclusion: So, based on this answer we can safely say that if your SecOps analyst and security professionals use an administrative account when they use consolidated views of flagged users and risk events that they must be licensed for Azure AD Premium P2.

Ok, that makes sense… and when it comes to some other examples as well like for example when using Azure AD Privileged Identity Management (PIM) – when you want to implement PIM for your administrative accounts, those accounts must be licensed.

It already becomes vague when looking at Microsoft Cloud App Security, here the documentation provides the following information:

Which users benefit from the service?

Licensed users of MCAS, Enterprise Mobility + Security E5/A5/G5, Microsoft 365 E5/A5/G5, and Microsoft 365 E5/A5/G5 Security can benefit from MCAS.

Licensed users of Azure AD P1 can benefit from the Discovery capabilities in MCAS.

To benefit from the Conditional Access App Control capabilities in MCAS, users must also be licensed for Azure Active Directory P1, which is included in Enterprise Mobility + Security E3/A3/G3, Enterprise Mobility + Security E5/A5/G5, Microsoft 365 E3/A3/G3, Microsoft 365 E5/A5/G5, and Microsoft 365 E5/A5/G5 Security.

To benefit from automatic labeling, users must be licensed for Azure Information Protection P2, which is included in Enterprise Mobility + Security E5/A5/G5, Microsoft 365 E5/A5/G5, and Microsoft 365 E5/A5/G5 Compliance.

For more information, see the Microsoft Cloud App Security Licensing Datasheet.

How do users benefit from the service?

MCAS discovers and assesses Shadow IT, provides threat protection across first- and third-party cloud apps, and protects information across first- and third-party cloud apps.

Conclusion: So, it’s clear that both users and administrators benefit from MCAS, but what’s not clear if administrative accounts should be licensed for Azure AD Premium P1 or Azure AD Premium P2 in order to administer MCAS. So overall we can conclude that it’s probably best to license your administrative accounts with Azure AD Premium P2 if that account benefits from any of the Premium P2 functionality.

But wait there is more…..

Last week I was triggered by a tweet from Tobias Zuegel (@MrAzureAD), who asked the following question:

Machine generated alternative text:
Tobias Zuegel I #AzureAD 
@MrAzureAD Feb 26 
How is #AzureAD Premium licensed when a physical user has more than one 
account (e.g. separation of duties). Do break-glass accounts need separate 
licenses? I have conflicting information from Microsoft @azuread 
@Alex_A_Simons 
0 17
Tweet from Tobias Zuegel

The thread which followed was actually very interesting to read, since it was answered by Alex Simons (@Alex_A_Simons) as well, who is Corporate Vice President PM, Microsoft Identity Division.

Tobias replies with mentioned that he has a written statement, stating that Azure AD Premium P1 and P2 are licensed per user and not per account, which was later confirmed by Alex Simons.

Machine generated alternative text:
Tobias Zuegel I #AzureAD 
@MrAzureAD Feb 26 
Thanks for the reply. I have a written statement from 2018 sent by a license 
clearing function in Redmond saying: "AAD PI and 92 are licensed per user 
not per account. Each user must be licensed for the service to use or benefit 
from it." Isn't that a contradiction? 
03
Licensed per user not per account
Machine generated alternative text:
Alex Simons @Alex_A_Simons • Feb 26 
Good news - legal and our licensing guru were able to quickly close on this. 
You only need one license per human. If the human is using two accounts, 
that one license covers both accounts. 
0 18
Confirmation from Alex Simons

Conclusion: If you have a normal account licensed for Azure AD Premium P2, your administrative account can also use the Azure AD Premium P2 functionality and be compliant with licensing requirements.

So does this mean that you don’t have to add a license to your administrative accounts?

Not really at the moment, for example when you want to make use of Azure AD Privileged Identity Management (PIM), the user which is managed by PIM must have a license or else the functionality won’t work. Alex Simons commented on that that Microsoft is working on removing that requirement though.

Machine generated alternative text:
Alex Simons 
@Alex_A_Simons 
Replying to @AlexFilipin @8bitcloudguy and 3 others 
Outside of PIM, we don't check to see if users are 
assigned licenses in AAD. It just creates un-necessary 
overhead/complexity for customers. We are putting 
plan in place to move PIM to this same model. 
8:27 PM • Feb 26, 2020 • Twitter Web App
Azure AD PIM license needed

How about other products, like Microsoft Intune and Exchange Online?

While for Azure Active Directory we at least now how someone with authority with Microsoft sees it, for other products within the Microsoft 365 suite it’s not that clear, let’s have a look at Microsoft Intune and Exchange Online

Microsoft Intune

For Intune I haven’t found any information on the Microsoft 365 licensing guidance for security & compliance documentation page. There is some licensing information on the Microsoft Intune licensing documentation page though stating:

The appropriate Microsoft Intune license is required if a user or device benefits directly or indirectly from the Microsoft Intune service, including access to the Microsoft Intune service through a Microsoft API.

I’ve also found some other License requirements when it comes to Microsoft Intune while working with the product, for example while installing the Intune Connector for Active Directory the installation wizard provides the following text:

Note: The Intune connector for Active Directory automatically downloads and installs updates. The user that signs in must have an Intune license installed.

Machine generated alternative text:
Enrollment 
Enroll the Intune connector for Active Directory by signing in with a licensed user account that has the 
Global Administrator or Intune Service Administrator role assigned to it 
Si n In 
Note: The Intune connector for Active Directory automatically downloads and installs updates. The user that 
signs in must have an Intune license installed 
P Statement
Intune connector for Active Directory

Conclusion: If you are currently administering Microsoft Intune, you must be licensed, even though in practical terms I haven’t experienced any issues while administering Intune using a non-licensed account in my test enviroment. Also any user accessing the Microsoft Intune service using the Microsoft API must be licensed.

Exchange Online

With Exchange Online I didn’t experience any issues when administering the service in my test tenant using a non-licensed administrative account. The Microsoft 365 licensing guidance for security & compliance documentation page raises some questions though, take for example Office 365 Advanced eDiscovery:

How do users benefit from the service?

A user benefits from Advanced eDiscovery when the user is selected as a data custodian (a person having administrative control of a document or electronic file) for a case.

How is the service provisioned/deployed?

By default, Advanced eDiscovery features are enabled at the tenant level for all users within the tenant when admins assign eDiscovery permissions in the Security & Compliance Center.

Conclusion: If you are a data custodian in a Advanced eDiscovery case, you must be licensed for the Advanced eDiscovery

Conclusion

I hope this article sheds some light on the complexity involved when it comes to licensing your administrative accounts. Personally I really hope Microsoft will make some changes to their products and unifies the statement that a human must be licensed instead of an account. That human, if having administrative rights and a separate administrative account can then have both a normal licensed account and an administrative “non-licensed” account to do his/her work. 

This will make our life as Modern Workplace designers and implementers so much easier in my opinion.

Please, do not give your normal user account administrative rights because of this conclusion so that you know for sure that you are properly licensed. Even when using PIM and giving a lifetime to the administrative rights, this opens the account for compromise.. For example, what happens if a user (who is temporary Global Administrator) via PIM opens an email with a malicious link..

Hopefully this article will trigger someone within Microsoft to clear up this confusion, if so I will update this article of course.

Tweet
Follow me
Tweet #WPNinjasNL

Continue Reading

← Microsoft is going to disable basic/legacy authentication for Exchange Online. What does that actually mean and does that impact me?
Lessons learned while implementing Azure AD Privileged Identity Management (PIM) →

7 thoughts on “License requirements for administering Microsoft 365 services”

  1. Pingback: Lessons learned while implementing Azure AD Privileged Identity Management (PIM) | Modern Workplace Blog
  2. Pingback: Azure AD Identity Protection deep dive | Modern Workplace Blog
  3. Pete Mitchell says:
    April 5, 2021 at 1:18 pm

    Has any progress been made on removing the license check from PIM? I’ve found no further information, and Alex Simons doesn’t seem interested in responding.

    Reply
    1. Kenneth says:
      April 7, 2021 at 10:17 am

      Hi Pete,

      I haven’t seen any update related to PIM where this check is removed unfortunately. I don’t see anything on the roadmap either: https://www.microsoft.com/en-us/microsoft-365/roadmap?filters=Azure%20Active%20Directory#owRoadmapMainContent

      Guess we have to be patient….

      /Kenneth

      Reply
  4. Pete Mitchell says:
    May 12, 2021 at 6:06 pm

    Thanks Kenneth. The answer we finally got back from Microsoft’s licensing group is essentially “we have no idea what you’re talking about. Here’s the licenses you need to buy for your admin accounts”. I rarely use Twitter so maybe I missed it, but it looks like the conversation with Alex Simons you reference no longer exists on his account. I wonder if he’s had to backtrack. I would think it would have been mentioned somewhere else in the last 15 months if it was still going to happen.

    Reply
  5. Daniel Bronco says:
    March 9, 2022 at 10:57 pm

    Thank you Kenneth for the information, very helpful and informative.

    Reply
  6. Elpida Rouka says:
    October 27, 2023 at 1:57 pm

    Dear Kenneth,

    I liked your article a lot so I wanted to contribute. Maybe something has changed since 2020 because in this link https://learn.microsoft.com/en-us/microsoft-365/enterprise/subscriptions-licenses-accounts-and-tenants-for-microsoft-cloud-offerings?view=o365-worldwide I can find the following note from MS:
    “A security best practice is to use separate user accounts that are assigned specific roles for administrative functions. These dedicated administrator accounts do not need to be assigned a license for the cloud services that they administer. For example, a SharePoint administrator account does not need to be assigned a Microsoft 365 license.”

    Therefore, it seems straightforward now, at least in theory.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Founding member of:

Recent Posts

  • MAM vs. MDM: Choosing the Right Mobile Management Approach
  • Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)
  • Navigating New Authentication Methods: SMS for Password Reset, Not for MFA
  • From SPF to DANE: Securing Microsoft 365 Email Communications
  • Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals

Books

System Center 2012 Service Manager Unleashed
Amazon
System Center 2012 R2 Configuration Manager Unleashed: Supplement to System Center 2012 Configuration Manager
Amazon
System Center Configuration Manager Current Branch Unleashed
Amazon
Mastering Windows 7 Deployment
Amazon
System Center 2012 Configuration Manager (SCCM) Unleashed
Amazon

Archives

  • February 2025
  • January 2025
  • September 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • September 2023
  • August 2023
  • February 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • May 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • August 2019
  • July 2019
  • November 2016
  • November 2015
  • June 2015
  • May 2015
  • November 2014
  • July 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • November 2013
  • August 2013
  • April 2013
  • March 2013
  • January 2013
  • December 2012
  • November 2012
  • August 2012
  • July 2012
  • June 2012

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Categories

  • ABM (4)
  • Advanced Threat Protection (4)
  • Announcement (44)
  • Azure (3)
  • AzureAD (73)
  • Certification (2)
  • Cloud App Security (5)
  • Conditional Access (58)
  • Configuration Manager (24)
  • Entra (2)
  • Entra Id (8)
  • Events (14)
  • Exchange Online (9)
  • Identity Protection (5)
  • Intune (27)
  • Licensing (2)
  • Microsoft Defender (1)
  • Microsoft Defender for Endpoint (1)
  • Microsoft Endpoint Manager (35)
  • Mobile Application Management (4)
  • Modern Workplace (74)
  • Office 365 (10)
  • Overview (11)
  • Power Platform (1)
  • PowerShell (2)
  • Presentations (9)
  • Privileged Identity Management (5)
  • Role Based Access Control (2)
  • Security (63)
  • Service Manager (4)
  • Speaking (30)
  • Troubleshooting (4)
  • Uncategorized (11)
  • Windows 10 (15)
  • Windows 11 (5)
  • Windows Update for Business (4)
  • WMUG.nl (16)
  • WPNinjasNL (32)

Tags

#ABM #AzureAD #community #conditionalaccess #ConfigMgr #IAM #Intune #m365 #MEM #MEMCM #microsoft365 #modernworkplace #office365 #security #webinar #wmug_nl ATP authentication strength AzureAD Branding Community Conditional Access ConfigMgr ConfigMgr 2012 Email EXO Identity Intune Licensing M365 MCAS MFA Modern Workplace Office 365 OSD PIM Policy Sets Presentation RBAC roles Security System Center Task Sequence troubleshooting webinar

Recent Comments

  • brc on Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals
  • [m365weekly] #186 – M365 Weekly Newsletter on MAM vs. MDM: Choosing the Right Mobile Management Approach
  • Dean Gross on Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)
  • nikhil tech on Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals
  • Kenneth on Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)

This information is provided “AS IS” with no warranties, confers no rights and is not supported by the author.

Copyright © 2021 by Kenneth van Surksum. All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

Shorthand: Don’t pass off my work as yours, it’s not nice.

©2025 Modern Workplace Blog | Powered by WordPress and Superb Themes!
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT