Menu
Modern Workplace Blog
  • Home
  • About: Kenneth van Surksum
  • Cookie Policy
Modern Workplace Blog
December 4, 2019December 4, 2019

Implementing RBAC and Scoping in Microsoft Intune

When you create an Intune tenant within your environment, you execute the creation with an account which is Global Administrator within Azure Active Directory. And in my work as an indendent consultant I see a lot of companies which keep using the account with Global Administator rights to manage their Microsoft Intune environment as well.

While for initially setting up some Azure AD functionality Global Administrator rights might be needed, this is only the case during the setup phase. Once you have implemented your environment, you hardly ever need the Global Administrator rights and for most tasks they are not needed perse. Think of the Global Administrator rights as an equivalalent of the Forest Administrator/Schema Administrator group within Active Directory.

Disclaimer: This post is written on December 4th 2019 and reflects the state of this functionality at that point in time.

If you want to start implementing Role Based Access Control (RBAC) within Microsoft Intune you can delegate rights in several ways:

  1. There are roles within Azure AD which have rights to certain parts of Microsoft Intune, these roles are:
    1. Global Administrator: Global permissions within Microsoft Intune
    2. Intune Administrator: Global permissions within Microsoft Intune (the Intune Administrator)
    3. Compliance Administrator and Compliance Data Administrator: View all Intune Audit data
    4. Message Center Reader: monitor notifications and advisory health updates
    5. Global Reader, Security Administrator, Security operator and Security Reader: Views user, device, enrollment, configuration, and application information, but cannot make changes to Intune
  1. There are roles within Intune (called built-in roles):
    1. Help Desk Operator: Performs remote tasks on users and devices, and can assign applications or policies to users or devices.
    2. Policy and Profile Manager: Manages compliance policy, configuration profiles, Apple enrollment, corporate device identifiers, and security baselines.
    3. Read Only Operator: Views user, device, enrollment, configuration, and application information. Can’t make changes to Intune.
    4. Application Manager: Manages mobile and managed applications, can read device information and can view device configuration profiles.
    5. Intune Role Administrator: Manages custom Intune roles and adds assignments for built-in Intune roles. It’s the only Intune role that can assign permissions to Administrators.
    6. School Administrator: Manages Windows 10 devices in Intune for Education.
  1. You can create custom Azure AD and custom Intune roles if none of the provides roles supports your scenario

More information from Microsoft docs can be found here:

  • Role-based access control (RBAC) with Microsoft Intune
  • Administrator role permissions in Azure Active Directory
  • Create a custom role in Intune
  • Create and assign a custom role in Azure Active Directory

So, to conclude – if you need to setup Microsoft Intune you can also work with the Intune Administrator role – later you can make this role eligible for a select group of administrators if you have Privileged Identity Management (Azure AD PIM) available.

Licensing

In contradiction to Azure AD, where you could manage all of its functionality without a license. I’m not stating that a license for Azure AD administrative rights isn’t needed, since you need to protect that account as well, but for Administrative purposes only there are no license requirements. 

The licensing requirements for Intune state that a license is needed  if a user or device benefits directly or indirectly from the Microsoft Intune service, including access to the Microsoft Intune service through a Microsoft API. I’ve also seen this specific requirement mentioned when configuring the Intune Connector for Active Directory which you install if you want to Domain Join devices during Autopilot provisioning.

Intune connector for Active Directory

Assigning users versus groups to roles

For now, you can only assign users to Azure AD roles, even though this is a highly requested feature, Microsoft is struggling with the fact that if they allow Groups to be used to assign to Azure AD roles that there are many roles which can manage the groups, therefore making it hard to govern membership of privileged roles, which makes a lot of sense. See also this Uservoice item for some more context: Azure AD Role Delegation to Groups.

Within Microsoft Intune it is only possible to assign Intune roles to Azure AD groups, which is handy but also has the same govenance remarks, keep that in mind.

Scoping

Azure AD roles which provide rights to Microsoft Intune are global, which means that if an account is member of that specific role it can either read, write to all Intune data, or read/write to all Intune audit data.

When using Intune roles though we can scope based on so called Scope groups. Scope groups include Azure AD groups containing devices and/or users, most of the time a subset of all devices or users but can also be All Devices, All Users or All Devices and Users. By defining Scope Groups the administrative user can only assign apps or configuration to that Scope Group. If a user assigned to a Scope Group tries to assign to a group not part of its Scope Group he or she gets an access denied.

O 
You don't have enough permissions to assign this mobile app to one or more of your selected groups, contact your administrator.
Error when assigning to Azure AD group not part of Scope Group in role definition

Scope tags are used for defining what the scoped user can see (devices, content like Apps and configuration which is tagged for a certain scope). For tagging devices, there are PowerShell scripts available for example on the PowerShell Intune Examples page on Github

Building a demo scenario

Once combined we can create the following scenario’s (examples)

  • Create an Application Manager which can only manage devices for which the name starts with LPT and only manage the apps which are tagged LPTAPP.
  • Create an Application Manager which can only manage devices for which the name starts with DS and only mange the apps which are tagged DSAPP.
  • Create a Help Desk Operator which can only manage devices, apps and policies to devices and users in the London office

The RBAC implementation can be compared to the Role Based Access functionality we have within System Center Configuration Manager which I blogged about here: (even though written for ConfigMgr 2012 still valid for most part today)

  • Role Based Access Control in ConfigMgr 2012: Part 1 – Introduction
  • Role Based Access Control in ConfigMgr 2012: Part 2 Scenario
  • Role Based Access Control in ConfigMgr 2012: Part 3 Mapping OpCo roles to ConfigMgr roles
  • Role Based Access Control in ConfigMgr 2012: Part 4 Outcome

Simple scenario to demonstrate the Role Based Access Control Model

So I’ve created the following scenario, where we have two Intune Adminstrative users:

1. Ferry Kuhlman, who can only manage devices within the Help Desk Operator role which are part of the Azure AD group AAD_Intune_DeviceTestGroup1, which only contains DESKTOP-0T962JG and devices, content and configuration tagged with TestGroup1.

2. Stanley Messie, who can only manage devices within the Help Desk Operator role which are part of the Azure AD group AAD_Intune_DeviceTestGroup2 which only contains DESKTOP-336P247 and devices, content and configuration tagged with TestGroup2.

The Intune Administrator can see the following devices starting with Desktop (in my case 3)

Devices starting with DESKTOP in the Device overview

Preparation steps taken

1. The first thing we are going to do is create 2 admin groups, one for Ferry Kuhlman named AAD_Intune_AdminTestGroup1 and one for Stanley Messie named AAD_Intune_AdminTestGroup2.

2. Create Scope tags (Microsoft Endpoint Manager admin center | Tenant Admin | Intune roles | Scope (Tags) )

TestGroup1 and TestGroup2 created as scope tags

3. Tag some Apps with either TestGroup1 or TestGroup 2 scope tag

Google Chrome tagged for TestGroup1

3. Tag some policies with either TestGroup1 or Testgroup2 scope tag

Profile – W10 – Kiosk configuation policy tagged with TestGroup2

4. Tag some devices with either TestGroup1 or TestGroup2 scope tag

DESKTOP-P6R9QKF - Properties 
Tags 
+ Add 
Scope Tag 
Rename 
TestGroup I 
x 
x 
Overview 
Manage 
properties 
Monitor 
Hardware 
Discovered apps 
Device compliance 
Device configuration 
App configuration 
Security baselines 
Recovey keys 
Managed Apps 
Save X Discard 
Device name O 
DESKTOP-P6R9QKF 
Management name * 
Device category 
Unassigned 
Device ownership 
Corporate 
O To auto assign scope tags to devices, go to Roles Scope(Tags) > Assign scope tag to 
all devices in selected group. The scope tags will overwrite the assignments listed in 
this section. 
Scope (Tags) 
1 scope tag(s) selected
DESKTOP-P6R9QKF tagged for TestGroup1

Bringing it all together

In this example we are going to create the Help Desk Operator role for Ferry Kuhlman

1. Go to Microsoft Endpoint Manager Admin Center | Tenant Admin | All Roles

2. Select Help Desk Operator and click on Duplicate. Provide a name for this role (Help Desk Operator (TestGroup1) and under Scope (tags) select TestGroup1

Create duplicate of Help Desk Operator role

3. Go back to all roles and click on Help Desk Operator (TestGroup1) and go to Assignments

4. Click on + Assign to start the role assignment

5. Provide a name (TestGroup1) and optionally a description

6. Provide a member group which contains the user who should become member op the group (in our case AAD_Intune_AdminTestGroup1)

7. Provide a scope group which contains the device which the user can manage, in our (case AAD_Intune_DeviceTestGroup1)

8. Provide a scope tag, in our case TestGroup1

Provide a scope group

Repeat these steps for Stanley Messie as well

Outcome

When Ferry Kuhlman logs in to the Microsoft Endpoint Manager Admin Center he sees the following:

  • Ferry can only see devices tagged with TestGroup1
  • Ferry can only see apps tagged with TestGroup1
  • Ferry can only see configuration profiles tagged with TestGroup1
  • Ferry cannot assing to Azure AD groups not part of the Scope Group
  • Ferry can assign to Azure AD groups part of the scope group
  • Ferry cannot remove assignments for groups not part of the scope group

When Stanley Messie logs in to the Microsoft Endpoint Manager Admin Center he sees the following:

  • Stanley can only see devices tagged with TestGroup2
  • Stanley can only see Apps tagged with TestGroup2
  • Stanley can only see configuration profiles tagged with TestGroup2

Conclusion

Implementing Role Based Access Control with scoping for Intune doesn’t really provide a smooth experience yet. This mainly has to do with the fact that part of the functionality is provided by Intune roles (which support scoping) and part comes from Azure AD. As an example, what the administrative user can see under Users and Groups is depending on the rights that account has within Azure AD. If the administrative user is a normal user, what he/she can see is depending on the following setting: Restrict access to Azure AD administration portal.

Insight24 B.V. - User settings 
Azure 
Enterprise applications 
App registrations 
Identity Govemance 
Application prog 
Licenses 
Azure AD Connect 
Custom domain names 
Mobility (MDM and MAM) 
Password reset 
Company branding 
user settings 
properties 
Notifications settings 
Security 
E] save X 
Enterprise applications 
Manage how end users launch and view their applications 
App registrations 
users can register applications 
Administration portal 
Restrict access to Azure AD administration portal O 
Linkedln account connections 
Allow users to connect their or school account with Linkedln. 
Data sharing between Microsoft and Linkedln is not enabled until users consent to connect their Microsoft work or school account With their Linkedln account 
Learn more about Linkedln account connectionso 
Selected group 
External users 
Manage external collaboration settings
Restrict access to Azure AD administration portal

If this setting is set to Yes, then the administrative user doesn’t see any users, groups or Azure AD devices, but they do see the groups when they want to assign apps or configuration – which is confusing since they can select the group but get an access denied when they want to save the configuration if the selected group is not part of the Scope group.

Even though, with some rough edges, the functionality is usable and implementing RBAC is still advised, perhaps withouth the scoping to start with.

Tweet
Follow me
Tweet #WPNinjasNL

Continue Reading

← Intune: Choosing whether to assign to User or Device Groups
Challenges while managing administrative privileges on your Azure AD joined Windows 10 devices →

1 thought on “Implementing RBAC and Scoping in Microsoft Intune”

  1. Pingback: Connecting Microsoft Endpoint Manager to Apple Business Manager | Modern Workplace Blog

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Founding member of:

Recent Posts

  • MAM vs. MDM: Choosing the Right Mobile Management Approach
  • Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)
  • Navigating New Authentication Methods: SMS for Password Reset, Not for MFA
  • From SPF to DANE: Securing Microsoft 365 Email Communications
  • Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals

Books

System Center 2012 Service Manager Unleashed
Amazon
System Center 2012 R2 Configuration Manager Unleashed: Supplement to System Center 2012 Configuration Manager
Amazon
System Center Configuration Manager Current Branch Unleashed
Amazon
Mastering Windows 7 Deployment
Amazon
System Center 2012 Configuration Manager (SCCM) Unleashed
Amazon

Archives

  • February 2025
  • January 2025
  • September 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • September 2023
  • August 2023
  • February 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • May 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • August 2019
  • July 2019
  • November 2016
  • November 2015
  • June 2015
  • May 2015
  • November 2014
  • July 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • November 2013
  • August 2013
  • April 2013
  • March 2013
  • January 2013
  • December 2012
  • November 2012
  • August 2012
  • July 2012
  • June 2012

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Categories

  • ABM (4)
  • Advanced Threat Protection (4)
  • Announcement (44)
  • Azure (3)
  • AzureAD (73)
  • Certification (2)
  • Cloud App Security (5)
  • Conditional Access (58)
  • Configuration Manager (24)
  • Entra (2)
  • Entra Id (8)
  • Events (14)
  • Exchange Online (9)
  • Identity Protection (5)
  • Intune (27)
  • Licensing (2)
  • Microsoft Defender (1)
  • Microsoft Defender for Endpoint (1)
  • Microsoft Endpoint Manager (35)
  • Mobile Application Management (4)
  • Modern Workplace (74)
  • Office 365 (10)
  • Overview (11)
  • Power Platform (1)
  • PowerShell (2)
  • Presentations (9)
  • Privileged Identity Management (5)
  • Role Based Access Control (2)
  • Security (63)
  • Service Manager (4)
  • Speaking (30)
  • Troubleshooting (4)
  • Uncategorized (11)
  • Windows 10 (15)
  • Windows 11 (5)
  • Windows Update for Business (4)
  • WMUG.nl (16)
  • WPNinjasNL (32)

Tags

#ABM #AzureAD #community #conditionalaccess #ConfigMgr #IAM #Intune #m365 #MEM #MEMCM #microsoft365 #modernworkplace #office365 #security #webinar #wmug_nl ATP authentication strength AzureAD Branding Community Conditional Access ConfigMgr ConfigMgr 2012 Email EXO Identity Intune Licensing M365 MCAS MFA Modern Workplace Office 365 OSD PIM Policy Sets Presentation RBAC roles Security System Center Task Sequence troubleshooting webinar

Recent Comments

  • brc on Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals
  • [m365weekly] #186 – M365 Weekly Newsletter on MAM vs. MDM: Choosing the Right Mobile Management Approach
  • Dean Gross on Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)
  • nikhil tech on Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals
  • Kenneth on Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)

This information is provided “AS IS” with no warranties, confers no rights and is not supported by the author.

Copyright © 2021 by Kenneth van Surksum. All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

Shorthand: Don’t pass off my work as yours, it’s not nice.

©2025 Modern Workplace Blog | Powered by WordPress and Superb Themes!
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT