Overview
Restricted management administrative units in Microsoft Entra ID allow you to protect specific objects in your tenant from being modified by anyone except a designated set of administrators. This capability enables organizations to meet stringent security or compliance requirements without removing tenant-level role assignments from their administrators.
Benefits of Restricted Management Administrative Units
Restricted management administrative units can help manage access in your tenant for various scenarios
Protecting C-Level Executive Accounts
To ensure Helpdesk Administrators cannot reset passwords or access BitLocker recovery keys for executive accounts, these accounts can be added to a restricted management administrative unit. A trusted group of administrators can then be explicitly enabled to perform such actions.
Compliance Controls
For scenarios where resources must be managed exclusively by administrators from specific countries or regions, restricted management administrative units provide a robust solution to enforce this requirement. Even Global Administrators are required to explicitly assign themselves a scoped role within these units, ensuring their actions are auditable. Additionally, restricted management administrative units can safeguard Break Glass accounts by preventing unauthorized modifications or accidental deletions.
Securing Sensitive Applications
Organizations managing sensitive applications with security groups can use restricted management administrative units to ensure that only designated administrators can modify group memberships, preventing tenant-scoped administrators from accessing these controls.
Important Note:
Placing objects in restricted management administrative units imposes significant restrictions on who can make changes to the objects. This could potentially disrupt existing workflows.
License Requirements
Restricted management administrative units require a Microsoft Entra ID P1 license for each administrative unit administrator. Members of the administrative unit only require Microsoft Entra ID Free licenses.
Supported Objects
Microsoft Entra Object Type | Administrative Unit | Restricted Management Administrative Unit |
---|---|---|
Users | Yes | Yes |
Devices | Yes | Yes |
Groups (Security) | Yes | Yes |
Groups (Microsoft 365) | Yes | No |
Groups (Mail-enabled Security) | Yes | No |
Groups (Distribution) | Yes | No |
Blocked and Allowed Operations
For administrators not explicitly assigned to a restricted management administrative unit, the following operations are affected
Operation Type | Blocked | Allowed |
---|---|---|
Read standard properties like user principal name, user photo | ✓ | |
Modify any Microsoft Entra properties of the user, group, or device | ❌ | |
Delete the user, group, or device | ❌ | |
Update password for a user | ❌ | |
Modify owners or members of the group in the restricted unit | ❌ | |
Add users, groups, or devices in a restricted unit to Microsoft Entra groups | ✓ | |
Modify email and mailbox settings in Exchange | ✓ | |
Apply policies to a device using Intune | ✓ | |
Add or remove a group as a site owner in SharePoint | ✓ |
Object Modification: Who’s in Control?
User Role | Blocked | Allowed |
---|---|---|
Global Administrator | ❌ | |
Tenant-scoped administrators (including Global Administrator) | ❌ | |
Administrators assigned at the scope of the restricted management unit | ✓ | |
Administrators assigned at the scope of another restricted management unit which the object is a member | ✓ | |
Administrators assigned at the scope of a regular administrative unit which the object is a member | ❌ | |
Groups Administrator, User Administrator, and other scoped roles assigned at the scope of a resource | ❌ | |
Group or device owners | ❌ |
Challenges and Limitations
- The restricted management setting must be applied during the creation of the administrative unit and cannot be changed afterward.
- Groups in restricted management administrative units cannot leverage Microsoft Entra ID Governance features like Privileged Identity Management (PIM) or entitlement management.
- Role-assignable groups within a restricted management administrative unit cannot have their membership modified by anyone except for specific global roles.
- Certain actions, such as password resets for Global Administrators within restricted units, may require removal from the unit for modifications to be possible.
- Deleting a restricted management administrative unit can take up to 30 minutes to remove protections from former members.
Application Access and Permissions
Create Restricted management administrative units
Sign In: Access the Microsoft Entra admin center using an account with at least Privileged Role Administrator permissions.
Navigate to Admin Units: Go to Identity > Roles & admins > Admin units.
Add a New Unit: Click on Add to create a new administrative unit.
Next, we will assign the Helpdesk Administrator role. The account responsible for regional Helpdesk activities will be added via the Assign roles tab. There are 16 built-in roles available, and you can also add your custom Entra ID roles as needed
Using the same method, I will create an Administrative Unit for the UK, enabling Restricted Management and assigning a dedicated Helpdesk Administrator user.
In Microsoft Entra ID, users, groups, or devices can be added to an Administrative Unit to limit the scope of role permissions. When a group is added to an Administrative Unit, only the group itself falls within the management scope, not its members.
Users or devices can be added or removed manually. Alternatively, dynamic membership groups allow you to add or remove users or devices automatically based on defined rules.
You can manage this process through the Microsoft Entra admin center, where you can add users, groups, or devices individually, in bulk, or by creating a new group within an Administrative Unit.
For our testing, let's proceed to add users to this Administrative Unit.
Testing Restricted Management Admin Units
Test Case 1: The Helpdesk Administrator assigned to the our US-Executive Administrative Unit try to reset the passwords of members within that Administrative Unit.
We are unable to reset the password of a user in the UAE-Executive Accounts using the Helpdesk Administrator role assigned to the US Administrative Unit. An error is displayed during the reset process stating: "The password cannot be reset. This may be due to insufficient administrative privileges or an attempt to reset your own password."
In this case, the user does not have any assignments to this Administrative Unit and is not part of the Tenant Helpdesk Administrator role. Additionally, since this Target user is not part of a Restricted Management Administrative Unit, the corresponding banner is not displayed on the user properties.Test Case 4: The Global Administrator of the tenant attempts to reset the password for a user in the US-Executive Accounts [Restricted Management] Administrative unit.
Entra ID Tenant Global Administrator accounts are scoped at the directory (tenant) level.
We are unable to reset the password of a user who is part of the Restricted Management Administrative Unit (in this case, the US-Executive Accounts) using the Tenant Global Administrator account, as it has not been explicitly assigned to any admin roles within that Administrative Unit.
The screenshot below demonstrates that we can successfully reset the password of a user in an Administrative Unit that is not configured as a Restricted Management unit, using tenant-level privileges, even if the account is not directly assigned to roles within that Administrative Unit.
Pro Tip
Conclusion
Restricted Management Administrative Units in Microsoft Entra ID are an effective way to secure and manage critical resources within an organization. By restricting administrative access to specific objects and assigning roles with clearly defined scopes, they help protect sensitive accounts, ensure compliance, and prevent unauthorized or accidental changes.
This feature is particularly valuable for protecting executive accounts, emergency access accounts, or implementing region-specific controls. By using Restricted Management Administrative Units, organizations can maintain strict control over who can manage their most important resources, providing both security and accountability.
Incorporating these units into your identity management practices ensures a more secure and well-structured environment, giving you the confidence that your critical resources are in trusted hands.
0 Comments