Microsoft Global Secure Access built-in roles
Global Secure Access uses Role-Based Access Control (RBAC) to effectively manage administrative access. By default, Microsoft Entra ID requires specific administrator roles for accessing Global Secure Access.
This article details the built-in Microsoft Entra roles you can assign for managing Global Secure Access.
Global Administrator
Full access: This role grants administrators full permissions within Global Secure Access. They can manage policies, configure settings, and view logs; including Conditional Access scenarios, configurations for Private Access, write operations on application segments, and management of user assignments for traffic profiles.
Important
It's highly recommended to use a least privilege approach for security reasons. The Global Administrator role is only required to configure Office 365 logging as outlined in the table. For all other scnearios, use the least priveledge role required to administer the service. To learn more about least priveledge, see Least privileged roles by task in Microsoft Entra ID. To learn more about least privilege in Microsoft Entra ID Governance, see The principle of least privilege with Microsoft Entra ID Governance.
Security Administrator
Limited access: This role grants permissions to perform specific tasks, such as configuring remote networks, setting up security profiles, managing traffic forwarding profiles, and viewing traffic logs and alerts. However, security admins can't configure Private Access or enable Office 365 logging.
Global Secure Access Administrator
Limited access: This role grants permissions to perform specific tasks, such as configuring remote networks, setting up security profiles, managing traffic forwarding profiles, and viewing traffic logs and alerts. However, Global Secure Access admins can't configure Private Access, create or manage Conditional Access policies, manage user and group assignments, or configure Office 365 logging.
Note
To perform additional Microsoft Entra tasks, such as editing Conditional Access policies, you need to be both a GSA administrator and have at least one other administrator role assigned to you. Consult the Role-based permissions table above.
Conditional Access Administrator
Conditional Access management: This role can create and manage Conditional Access policies for Global Secure Access, such as managing all compliant network locations and utilizing Global Secure Access security profiles.
Application Administrator
Private Access configuration: This role can configure Private Access, including Quick Access, private network connectors, application segments, and enterprise applications.
Security Reader and Global Reader
Read-Only access: These roles have full read-only access to all aspects of Global Secure Access, except traffic logs. They can't change any settings or perform any actions.
Role-based permissions
The following Microsoft Entra ID admin roles have access to Global Secure Access:
Permissions | Global Admin | Security Admin | GSA Admin | CA Admin | Apps Admin | Global Reader | Security Reader |
---|---|---|---|---|---|---|---|
Configure Private Access (Quick Access, private network connectors, application segments, and enterprise apps) | ✅ | ✅ | |||||
Create and interact with Conditional Access policies | ✅ | ✅ | ✅ | ||||
Manage traffic forwarding profiles | ✅ | ✅ | ✅ | ||||
User and group assignments | ✅ | ✅ | |||||
Configure remote networks | ✅ | ✅ | ✅ | ||||
Security profiles | ✅ | ✅ | ✅ | ||||
View traffic logs and alerts | ✅ | ✅ | ✅ | ||||
View all other logs | ✅ | ✅ | ✅ | ✅ | ✅ | ||
Configure universal tenant restrictions and Global Secure Access signaling for Conditional Access | ✅ | ✅ | ✅ | ||||
Configure Office 365 logging | ✅ | ||||||
Read-only access to product settings | ✅ | ✅ | ✅ | ✅ | ✅ |