Securing Entra ID: Fixing 5 IAM Misconfigurations in My Azure Lab

Written by:

Overview

In this lab, I built a sandbox Microsoft Entra ID environment and intentionally misconfigured it to simulate real world IAM security risks. I then audited the environment, identified 5 critical issues and applied best-practice remediations.

Lab Environment Setup

Platform: https://entra.microsoft.com

Tenant: Azure Free Tier

Users Created:

  • admin.shaun – Global Admin
  • intern.kevin – Intern
  • hr.jane – HR
  • sales.kyle – Sales
  • sec.auditor – Security Auditor
  • contractor.bob – External/Orphaned account

Misconfiguration #1: Intern with Global Admin Access

inter.kevin was assigned the Global Administrator role, the highest privilege role in Entra ID.

This is a problem for obvious reasons, an intern should never have unrestricted access to identity, application and policy configuration. This would violate least privilege and create a massive risk vector.

Remediation:

  • Removed Global Admin role
  • Assigned no role
  • Documented justification for role changes
intern.kevin was assigned Gobal Admin role
Global Admin role has been removed from intern.kevin user

Misconfiguration #2: HR Staff Assigned App Administrator Role

hr.jane was given the Application Administrator role. Allowing her to register, manage and delete enterprise apps.

This is an issue because it enables an HR user to install or misconfigure OAuth-integrated apps or expose sensitive APIs without security oversight.

Remediation:

  • Removed Application Admin role
  • Assigned no role (default user permissions only)

Role Review: hr.jane

Job Title: HR Representative

Risk Level: Medium. Could lead to backdoor data access or third-party integration abuse.

Why It’s a problem: Allows full app registration and management rights, which there is no technical justification, HR staff do not manage enterprise apps.

Recommendation: Remove direct Application Administrator role. Scoped future app access through group-based permissions.

Status: Remediated

Application Admin role removed from user hr.jane

Misconfiguration #3: No MFA Configured for Global Admin

admin.shaun had no Multifactor Authentication (MFA) methods enabled, and no Conditional Access enforcing MFA.

This is a problem because a privileged account with no MFA is a top-tier risk for credential theft and lateral movement.

Remediation:

  • Enabled Authenticator App on admin.shaun
  • Created Conditional access policy: Enforce MFA for all users
no MFA methods enabled for admin.shaun

Misconfiguration #4: Overprivileged User Roles Across Department

Users across multiple departments were granted broad roles:

  • hr.jane -> Application Admin
  • sales.kyle -> User Admin

This is a problem because unscoped privileges introduce lateral attack potential. If one user is compromised, the attacker gains high-value access to apps, users, or cloud policies

Role Review: sales.kyle

Job Title: Sales Representative

Risk Level: Medium

Why It’s a problem: Allows password reset, user creation and group management, which Kyle doesn’t need.

Recommendation: Remove direct role. assign only scoped access via group-based policies if needed.

Status: Remediated

User Administrator role removed from user sales.kyle

Misconfiguration #5: Orphaned Account with Security Role

contractor.bob was assigned Security Reader role but was not assigned to any group, monitored project, or team.

This is a problem because its a case of access without ownership. It’s a ghost account that could he hijacked without anyone noticing.

Remediation:

  • Flagged the account as orphaned
  • Disabled sign-in and issued access review
  • Create onboarding/offboarding checklist

MisconfigurationRisk LevelResolution
Intern w/ Global AdminCriticalRole Revoked
HR with App AdminHighRole removed, policy created
No MFA on AdminCriticalMFA enforced via Conditional Access
Overprivileged UsersMediumScoped roles applied
Orphaned ContractorMediumDiasbled

Final Thoughts

This lab gave me real-world experience simulating identity-based risk, performing access audits, and applying security best practices in Entra ID.

Tools Used:

  • Microsoft Entra Portal
  • Azure Role Management
  • Conditional Access
  • Authentication Methods Console

Leave a comment