Skip to content

Personas

This article describes the personas we've identified for Microsoft365DSC and provides additional insights about what each one is trying to achieve and how we recommend they configure authentication. For each persona, we provide the permissions that are required to either deploy configuration changes (including creating new instances of components) and to backup and monitor these configuration settings. If you are only interested in taking snapshots/backups of current configuration settings or to monitor existing settings for configuration drifts, then only read-only permissions are required (with some exceptions). On the other hand, if you are trying to create new instances of components (e.g., new policy) or to update existing ones, then write permissions will also be needed on top of the read permissions.

As mentioned in our User Guide section, there are three main types of authentication allowed in Microsoft365DSC:

  • Credentials: uses a user's account to authenticate using a username/password combination. This type of authentication requires Role-Based Access Control (RBAC) permissions to be granted to the account. For Microsoft Graph based resources, credential authentication requires a combination of RBAC roles on the user account and API Permissions granted to the Microsoft Graph Command Line Tools enterprise app. These roles and permissions can be determined by looking at the settings.json file of the associated resources you are trying to interact with.

Example: To use Credentials authentication to monitor Azure AD Conditional Access Policies, the user account needs Security Reader RBAC permission at minimum, and the Microsoft Graph Command Line Tools enterprise app needs the Policy.Read.All API permission.

  • Service Principal: requires defining an Azure AD app registration and granting it the proper API permissions (or assigning it RBAC roles). Authentication uses an Application ID with either a Certificate Thumbprint or an Application Secret.

  • Managed Identity: not covered in this article due to lack of support across all workloads. Refer to Authentication Examples for examples on how to use Managed Identity with resources.


Azure AD / Entra

Identity Administrator
Identity Administrator Description: The Identity Administrators are responsible for managing users and groups settings. They define what permissions users and service principals are granted in the tenant. They work with components such as:
  • AADAdministrativeUnit
  • AADApplication
  • AADGroups
  • AADGroupsNamingPolicy
  • AADRoleDefinition
  • AADServicePrincipal
  • AADUser
  • etc.
Associated Azure AD Roles: Create & Update
  • Groups Administrator
  • Identity Governance Administrator
  • Security Administrator
  • User Administrator
Export & Monitor
  • Global Reader
  • Security Reader

Security Administrator
Security Administrator Description: Security Administrators define and update Entra Identity policies and monitor them for configuration drift across tenants. Their goal is to ensure tenant security by enforcing authorized operations. They work with components such as:
  • AADAuthenticationMethodPolicy
  • AADAuthorizationPolicy
  • AADConditionalAccessPolicy
  • AADCrossTenantAccessPolicy
  • AADEntitlementManagementAccessPackage
  • etc.
Associated Azure AD Roles: Create & Update
  • Authentication Policy Administrator
  • Conditional Access Administrator
  • Privileged Role Administrator
  • Security Administrator
Export & Monitor
  • Global Reader
  • Security Reader

Exchange Online

Exchange Administrator
Exchange Administrator Description: Exchange Administrators ensure mail and calendar functionality and secure communications. They work with components such as:
  • EXOAntiphishPolicy
  • EXOMalwareFilterRule
  • EXOPerimeterConfiguration
  • EXOTransportRule
  • etc.
Associated Azure AD Roles: Create & Update
  • Exchange Administrator
Export & Monitor
  • Global Reader
  • Security Reader

Microsoft Teams

Teams Collaboration Administrator
Teams Collaboration Administrator Description: Teams Collaboration Administrators manage Teams collaboration features (channels, teams) and their policies (e.g., channel and messaging policies). They work with components such as:
  • TeamsAppPermissionPolicy
  • TeamsChannel
  • TeamsMessagingPolicy
  • TeamsShiftPolicy
  • etc.
Associated Azure AD Roles: Create & Update
  • Teams Administrator
Export & Monitor
  • Global Reader
Teams Voice Administrator
Teams Voice Administrator Description: Teams Voice Administrators manage voice features in Teams (IP phone policies, voicemail, dial plans). They work with components such as:
  • TeamsEmergencyCallingPolicy
  • TeamsIPPhonePolicy
  • TeamsOnlineVoicemailPolicy
  • TeamsTenantDialPlan
  • etc.
Associated Azure AD Roles: Create & Update
  • Teams Administrator
Export & Monitor
  • Global Reader