Microsoft gives its partners power to change AD privileges on customer systems – without permission
Somewhat counterintuitively, this is being done to improve security
Updated Microsoft has created a window of time in which its partners can – without permission – create new roles for themselves in customers' Active Directory implementations.
Which sounds bonkers, so let's explain why Microsoft has even entertained the prospect.
To begin, remember that criminals have figured out that attacking IT service providers offers a great way to find many other targets. Evidence of that approach can be found in attacks on ConnectWise, SolarWinds, Kaseya and other vendors that provide software to IT service providers.
Microsoft wised up to the fact that its partners would likely be targeted, too, and spotted a weakness in the delegated admin privileges (DAP) that partners are given to manage their customers' software purchases.
The company's fix is granular delegated admin privileges (GDAP) that, as the name implies, still allow partners to administer their customers but offers finer control and follows zero-trust principles so that partners are limited to certain actions.
Today, GDAP "allows the partner to request and the customer to approve specific Azure Active Directory roles, allowing the partner to perform admin activities on behalf of the customer."
Microsoft is very keen on GDAP. So keen that on June 30 it announced the following:
Microsoft's motive is simple: it wants partners to adopt GDAP so their interactions with customers are more secure.
Partners won't keep this power to change customer rigs forever. The tool will only work until October 31, 2022, and after that date customers will again have to approve the creation of new GDAP relationships.
But for the 98 days that elapse from this tool's debut to its end of life, partners can create GDAP roles without customer intervention.
The Register submits that criminals might be busy on those days, too – making just the sort of attacks on partners that Microsoft hopes GDAP will prevent.
- Microsoft postpones shift to New Commerce Experience subscriptions
- Microsoft 365, Office 365 price hikes delayed
- Five Eyes turn spotlight on MSPs: Potential weak links in IT supply-chain security
Microsoft will deliver more info about the tool on July 11.
Clearly, customers that work with Microsoft partners might want to have a chat about GDAP before the tool debuts. ®
Updated, 03:00 UTC, July 19th Microsoft has delayed the release of the tool it promised above to August 1st. The tool will still work until October 31st.
- Active Directory
- Advanced persistent threat
- Black Hat
- Bug Bounty
- Common Vulnerability Scoring System
- Cybersecurity and Infrastructure Security Agency
- Cybersecurity Information Sharing Act
- Data Breach
- Data Protection
- Data Theft
- Digital certificate
- Exchange Server
- Identity Theft
- Internet Explorer
- Kenna Security
- Microsoft 365
- Microsoft Build
- Microsoft Edge
- Microsoft Office
- Microsoft Surface
- Microsoft Teams
- Office 365
- Palo Alto Networks
- Patch Tuesday
- Remote Access Trojan
- RSA Conference
- SQL Server
- Trusted Platform Module
- Visual Studio
- Visual Studio Code
- Windows 10
- Windows 11
- Windows 7
- Windows 8
- Windows Server
- Windows Server 2003
- Windows Server 2008
- Windows Server 2012
- Windows Server 2013
- Windows Server 2016
- Windows XP
- Xbox 360
- Zero trust