property | value |
tags | azure-ad,azure-cloud,pkm-pocket-pipeline |
url | |
original_word_count | 2075 |
Article Excerpt
Global Admin role is the most powerfull administrator role in Azure AD. It is (almost) equivalent to the local system rigths in traditional Windows environment: If you are a Global Admin, there is no security! As a Global Admin, there are no limits what you are allowed to do.
Long Summary
Global Admins in Azure AD have the most powerful administrator role, granting them access to all administrative features of Azure AD and Office/Microsoft 365 services. With AADInternals v0.4.0, Global Admins can elevate themselves to User Access Administrators, assign themselves the Virtual Machine Contributor role, and harvest usersβ credentials with PTASpy. They can also set usersβ MFA settings using MSOnline PowerShell module, and change the default MFA method, MFA phone number, and MFA device of the user.
The article explains how Global Admins can create backdoors to Azure AD in order to gain persistent access to the system. The three backdoors discussed are ConvertTo-AADIntBackdoor, Desktop SSO, and Pass-through Authentication. ConvertTo-AADIntBackdoor is a PowerShell command that allows Global Admins to create a backdoor with a given domain name and use the ImmutableId of a user to create a SAML token and use it to get an OAuth Access Token. Desktop SSO is a feature that allows users to log in to their accounts without having to enter their passwords, and Pass-through Authentication is a feature that allows users to log in to their accounts without having to enter their passwords. Global Admins can create a backdoor to Azure AD by installing the authentication agent, configuring it with their own tenant, changing the certificate to one they created during the PTA agent registration, and installing PTASpy.
It is important to note that all Global Admins' actions are logged to audit logs, and that Desktop SSO and PTA backdoors DO NOT bypass MFA. It is also important to ensure that Global Admins are trustworthy and that their access is monitored. With the right backdoors, Global Admins can access users' information, send emails on their names, and much more.
Overall, Global Admins have a wide range of capabilities that can be used to compromise Azure AD and Office/Microsoft 365 services. It is important to be aware of the backdoors they can create and the risks associated with them.
Short Summary
π Keys of the kingdom: Playing God as Global Admin
ππ½ Global Admin role is the most powerfull administrator role in Azure AD. It is (almost) equivalent to the local system rigths in traditional Windows environment: If you are a Global Admin, there is no security! As a Global Admin, there are no limits what you are allowed to do. ππ½ Global Admins in Azure AD have the most powerful administrator role. ππ½ They have access to all administrative features of Azure AD and Office/Microsoft 365 services. ππ½ With AADInternals v0.4.0, Global Admins can elevate themselves to User Access Administrators. ππ½ They can assign themselves the Virtual Machine Contributor role. ππ½ They can harvest users' credentials with PTASpy. ππ½ Global Admins can set users' MFA settings using MSOnline PowerShell module. ππ½ They can change the default MFA method, MFA phone number, and MFA device of the user. ππ½ The article explains how Global Admins can create backdoors to Azure AD. ππ½ The three discussed backdoors are ConvertTo-AADIntBackdoor, Desktop SSO, and Pass-through Authentication. ππ½ Global Admins can access users' information, send emails on their names, and more.
π source link: https://aadinternals.com/post/admin/
π summarized content: https://hut.threathunterz.com/battlefield-intel/articles-and-reports/keys-of-the-kingdom-playing-god-as-global-admin
#GlobalAdmins #AzureAD #Backdoors #SecurityRisks #AccessControl