IT:AD:Azure:Security:Role:Administration:Service Co-Administrator (CA)
- See also:
Summary
One of the 3 Administration Roles 1).
A Service Co-Administrator has exactly the same rights as a Service Administrator (SA), bar adding/removing other Service Co-Administrator (or the Service Administrator).
Notes
When a new Subscription is created, it will have an Account Administrator and a Service Administrator, but no Service Co-Administrator. They have to be added in a different way: * Add a Co-Administrator
A Service Administrator (SA) (of which there are only 1) can set up to 200 Service Co-Administrators.
Service Co-Administrator (CA) have the same permissions as the Service Administrator (SA) (ie, can create Services) – bar adding/removing Co-Administrators.
Relationship to BuiltIn Roles
But – as stated elsewhere 2) – if a user has no legacy Administrator Role of any kind (which is what happens when you update them from Service Co-Administrator (CA) role to Owner builtin role, you end up locking them out of the Classic Portal:
Due to this lockout, it is sometimes suggested on the web that AD admins be left as CAs. That's not usually required in Enterprises, as There is another way to administer AD – via the Office 365 Portal
That said, if you need to Admin ServiceBuses and other features not ported over from the Classic Portal to the IT:AD:Azure:Portal:Service Portal, then yes…the admin has to be a Service Co-Administrator.
Relationship to Azure AD Roles
Remembering that the Azure AD Service is not the same Service as AD itself is…not obvious.
Whereas the the creator of an Azure AD (which is generally the IT:AD:Azure:Security:Role:Administration:Account Administrator (AA)) is automatically made a Azure AD Global Administrator, others won't be – unless manually added and provisioned with an Azure AD administration role (they won't even see an AD to manage in their Portal)3).
