Understanding resource access in Azure
Updated: October 29, 2014
|This topic explains concepts about using subscription administrators to control resource access in the full Azure portal. As an alternative, the Azure Preview portal provides role-based access control so Azure resources can be managed more precisely.|
In October 2013, the Azure Management Portal and Service Management APIs were integrated with Azure Active Directory in order to lay the groundwork for improving the user experience for managing access to Windows Azure resources. Azure Active Directory already provides great capabilities such as user management, on-premises directory sync, multi-factor authentication, and application access control. Naturally, these should also be made available for managing Azure resources across-the-board.
Access control in Azure starts from a billing perspective. The owner of an Azure account, accessed by visiting the Windows Azure Accounts Center, is the Account Administrator (AA). Subscriptions are a container for billing, but they also act as a security boundary: each subscription has a Service Administrator (SA) who can add, remove, and modify Azure resources in that subscription by using the Azure Management Portal. The default SA of a new subscription is the AA, but the AA can change the SA in the Azure Accounts Center.
Subscriptions also have an association with a directory. The directory defines a set of users. These can be users from the work or school that created the directory or they can be external users (that is, Microsoft Accounts). Subscriptions are accessible by a subset of those directory users who have been assigned as either Service Administrator (SA) or Co-Administrator (CA); the only exception is that, for legacy reasons, Microsoft Accounts (formerly Windows Live ID) can be assigned as SA or CA without being present in the directory.
Functionality within the Azure Management Portal enables SAs that are signed in using a Microsoft Account to change the directory that a subscription is associated with by using the Edit Directory command on the Subscriptions page in Settings. Note that this operation has implications on the access control of that subscription.
|The Edit Directory command in the Azure Management Portal is not available to users who are signed in using a work or school account because those accounts can sign in only to the directory to which they belong.|
In the simple case, an organization (such as Contoso) will enforce billing and access control across the same set of subscriptions. That is, the directory is associated to subscriptions that are owned by a single Azure Account. Upon successful login to the Azure Management Portal, users see two collections of resources (depicted in orange in the previous illustration):
Directories where their user account exists (sourced or added as a foreign principal). Note that the directory used for login isn’t relevant to this computation, so your directories will always be shown regardless of where you logged in.
Resources that are part of subscriptions that are associated with the directory used for login AND which the user can access (where they are an SA or CA).
Users with subscriptions across multiple directories have the ability to switch the current context of the Azure Management Portal by using the subscription filter. Under the covers, this results in a separate login to a different directory, but this is accomplished seamlessly using single sign-on (SSO).
Operations such as moving resources between subscriptions can be more difficult as a result of this single directory view of subscriptions. To perform the resource transfer, it may be necessary to first use the Edit Directory command on the Subscriptions page in Settings to associate the subscriptions to the same directory.