Raw New Markdown
Generating updated version of doc...
Rendered New Markdown
Generating updated version of doc...
---
title: Assign Azure roles to external users using the Azure portal - Azure RBAC
description: Learn how to grant access to Azure resources for users external to an organization using the Azure portal and Azure role-based access control (Azure RBAC).
author: rolyon
manager: pmwongera
ms.service: role-based-access-control
ms.topic: how-to
ms.date: 03/30/2025
ms.author: rolyon
ms.custom:
- it-pro
- subject-rbac-steps
- sfi-image-nochange
---
# Assign Azure roles to external users using the Azure portal
[Azure role-based access control (Azure RBAC)](overview.md) allows better security management for large organizations and for small and medium-sized businesses working with external collaborators, vendors, or freelancers that need access to specific resources in your environment, but not necessarily to the entire infrastructure or any billing-related scopes. You can use the capabilities in [Microsoft Entra B2B](../active-directory/external-identities/what-is-b2b.md) to collaborate with external users and you can use Azure RBAC to grant just the permissions that external users need in your environment.
## Prerequisites
To assign Azure roles or remove role assignments, you must have:
- `Microsoft.Authorization/roleAssignments/write` and `Microsoft.Authorization/roleAssignments/delete` permissions, such as [User Access Administrator](built-in-roles.md#user-access-administrator) or [Owner](built-in-roles.md#owner)
## When would you invite external users?
Here are a couple example scenarios when you might invite users to your organization and grant permissions:
- Allow an external self-employed vendor that only has an email account to access your Azure resources for a project.
- Allow an external partner to manage certain resources or an entire subscription.
- Allow support engineers not in your organization (such as Microsoft support) to temporarily access your Azure resource to troubleshoot issues.
## Permission differences between member users and guest users
Users of a directory with member type (member users) have different permissions by default than users invited from another directory as a B2B collaboration guest (guest users). For example, member users can read almost all directory information while guest users have restricted directory permissions. For more information about member users and guest users, see [What are the default user permissions in Microsoft Entra ID?](../active-directory/fundamentals/users-default-permissions.md).
## Invite an external user to your directory
Follow these steps to invite an external user to your directory in Microsoft Entra ID.
1. Sign in to the [Azure portal](https://portal.azure.com).
1. Make sure your organization's external collaboration settings are configured such that you're allowed to invite external users. For more information, see [Configure external collaboration settings](../active-directory/external-identities/external-collaboration-settings-configure.md).
1. Select **Microsoft Entra ID** > **Users**.
1. Select **New user** > **Invite external user**.
:::image type="content" source="media/role-assignments-external-users/invite-external-user.png" alt-text="Screenshot of Invite external user page in Azure portal." lightbox="media/role-assignments-external-users/invite-external-user.png":::
1. Follow the steps to invite an external user. For more information, see [Add Microsoft Entra B2B collaboration users in the Azure portal](../active-directory/external-identities/add-users-administrator.md#add-guest-users-to-the-directory).
After you invite an external user to the directory, you can either send the external user a direct link to a shared app, or the external user can select the accept invitation link in the invitation email.
:::image type="content" source="./media/role-assignments-external-users/invite-email.png" alt-text="Screenshot of external user invite email." lightbox="./media/role-assignments-external-users/invite-email.png":::
For the external user to be able to access your directory, they must complete the invitation process.
:::image type="content" source="./media/role-assignments-external-users/invite-review-permissions.png" alt-text="Screenshot of external user invite review permissions." lightbox="./media/role-assignments-external-users/invite-review-permissions.png":::
For more information about the invitation process, see [Microsoft Entra B2B collaboration invitation redemption](../active-directory/external-identities/redemption-experience.md).
## Assign a role to an external user
In Azure RBAC, to grant access, you assign a role. To assign a role to an external user, you follow [same steps](/azure/role-based-access-control/role-assignments-portal) as you would for a member user, group, service principal, or managed identity. Follow these steps assign a role to an external user at different scopes.
1. Sign in to the [Azure portal](https://portal.azure.com).
1. In the Search box at the top, search for the scope you want to grant access to. For example, search for **Management groups**, **Subscriptions**, **Resource groups**, or a specific resource.
1. Select the specific resource for that scope.
1. Select **Access control (IAM)**.
The following shows an example of the Access control (IAM) page for a resource group.
:::image type="content" source="./media/shared/rg-access-control.png" alt-text="Screenshot of Access control (IAM) page for a resource group." lightbox="./media/shared/rg-access-control.png":::
1. Select the **Role assignments** tab to view the role assignments at this scope.
1. Select **Add** > **Add role assignment**.
If you don't have permissions to assign roles, the **Add role assignment** option will be disabled.
:::image type="content" source="./media/shared/add-role-assignment-menu.png" alt-text="Screenshot of Add > Add role assignment menu." lightbox="./media/shared/add-role-assignment-menu.png":::
The **Add role assignment** page opens.
1. On the **Role** tab, select a role such as **Virtual Machine Contributor**.
:::image type="content" source="./media/shared/roles.png" alt-text="Screenshot of Add role assignment page with Roles tab." lightbox="./media/shared/roles.png":::
1. On the **Members** tab, select **User, group, or service principal**.
:::image type="content" source="./media/shared/members.png" alt-text="Screenshot of Add role assignment page with Members tab." lightbox="./media/shared/members.png":::
1. Select **Select members**.
1. Find and select the external user. If you don't see the user in the list, you can type in the **Select** box to search the directory for display name or email address.
You can type in the **Select** box to search the directory for display name or email address.
:::image type="content" source="./media/role-assignments-external-users/select-members.png" alt-text="Screenshot of Select members pane." lightbox="./media/role-assignments-external-users/select-members.png":::
1. Select **Select** to add the external user to the Members list.
1. On the **Review + assign** tab, select **Review + assign**.
After a few moments, the external user is assigned the role at the selected scope.
:::image type="content" source="./media/role-assignments-external-users/access-control-role-assignments.png" alt-text="Screenshot of role assignment for Virtual Machine Contributor." lightbox="./media/role-assignments-external-users/access-control-role-assignments.png":::
## Assign a role to an external user not yet in your directory
To assign a role to an external user, you follow [same steps](/azure/role-based-access-control/role-assignments-portal) as you would for a member user, group, service principal, or managed identity.
If the external user is not yet in your directory, you can invite the user directly from the Select members pane.
1. Sign in to the [Azure portal](https://portal.azure.com).
1. In the Search box at the top, search for the scope you want to grant access to. For example, search for **Management groups**, **Subscriptions**, **Resource groups**, or a specific resource.
1. Select the specific resource for that scope.
1. Select **Access control (IAM)**.
1. Select **Add** > **Add role assignment**.
If you don't have permissions to assign roles, the **Add role assignment** option will be disabled.
:::image type="content" source="./media/shared/add-role-assignment-menu.png" alt-text="Screenshot of Add > Add role assignment menu." lightbox="./media/shared/add-role-assignment-menu.png":::
The **Add role assignment** page opens.
1. On the **Role** tab, select a role such as **Virtual Machine Contributor**.
1. On the **Members** tab, select **User, group, or service principal**.
:::image type="content" source="./media/shared/members.png" alt-text="Screenshot of Add role assignment page with Members tab." lightbox="./media/shared/members.png":::
1. Select **Select members**.
1. In the **Select** box, type the email address of the person you want to invite and select that person.
:::image type="content" source="./media/role-assignments-external-users/select-members-new-guest.png" alt-text="Screenshot of invite external user in Select members pane." lightbox="./media/role-assignments-external-users/select-members-new-guest.png":::
1. Select **Select** to add the external user to the Members list.
1. On the **Review + assign** tab, select **Review + assign** to add the external user to your directory, assign the role, and send an invite.
After a few moments, you'll see a notification of the role assignment and information about the invite.
:::image type="content" source="./media/role-assignments-external-users/invited-user-notification.png" alt-text="Screenshot of role assignment and invited user notification." lightbox="./media/role-assignments-external-users/invited-user-notification.png":::
1. To manually invite the external user, right-click and copy the invitation link in the notification. Don't select the invitation link because it starts the invitation process.
The invitation link will have the following format:
`https://login.microsoftonline.com/redeem?rd=https%3a%2f%2finvitations.microsoft.com%2fredeem%2f%3ftenant%3d0000...`
1. Send the invitation link to the external user to complete the invitation process.
For more information about the invitation process, see [Microsoft Entra B2B collaboration invitation redemption](../active-directory/external-identities/redemption-experience.md).
## Remove an external user from your directory
Before you remove an external user from a directory, you should first remove any role assignments for that external user. Follow these steps to remove an external user from a directory.
1. Open **Access control (IAM)** at a scope, such as management group, subscription, resource group, or resource, where the external user has a role assignment.
1. Select the **Role assignments** tab to view all the role assignments.
1. In the list of role assignments, add a check mark next to the external user with the role assignment you want to remove.
:::image type="content" source="./media/role-assignments-external-users/remove-role-assignment-select.png" alt-text="Screenshot of selected role assignment to remove." lightbox="./media/role-assignments-external-users/remove-role-assignment-select.png":::
1. Select **Remove**.
:::image type="content" source="./media/shared/remove-role-assignment.png" alt-text="Screenshot of Remove role assignment message." lightbox="./media/shared/remove-role-assignment.png":::
1. In the remove role assignment message that appears, select **Yes**.
1. Select the **Classic administrators** tab.
1. If the external user has a Co-Administrator assignment, add a check mark next to the external user and select **Remove**.
1. In the left navigation bar, select **Microsoft Entra ID** > **Users**.
1. Select the external user you want to remove.
1. Select **Delete**.
:::image type="content" source="./media/role-assignments-external-users/delete-guest-user.png" alt-text="Screenshot of deleting an external user." lightbox="./media/role-assignments-external-users/delete-guest-user.png":::
1. In the delete message that appears, select **Yes**.
## Troubleshoot
### External user cannot browse the directory
External users have restricted directory permissions. For example, external users can't browse the directory and can't search for groups or applications. For more information, see [What are the default user permissions in Microsoft Entra ID?](../active-directory/fundamentals/users-default-permissions.md).
:::image type="content" source="./media/role-assignments-external-users/directory-no-users.png" alt-text="Screenshot of external user can't browse users in a directory." lightbox="./media/role-assignments-external-users/directory-no-users.png":::
If an external user needs additional privileges in the directory, you can assign a Microsoft Entra role to the external user. If you really want an external user to have full read access to your directory, you can add the external user to the [Directory Readers](../active-directory/roles/permissions-reference.md#directory-readers) role in Microsoft Entra ID. For more information, see [Add Microsoft Entra B2B collaboration users in the Azure portal](../active-directory/external-identities/add-users-administrator.md).
:::image type="content" source="./media/role-assignments-external-users/directory-roles.png" alt-text="Screenshot of assigning Directory Readers role." lightbox="./media/role-assignments-external-users/directory-roles.png":::
### External user cannot browse users, groups, or service principals to assign roles
External users have restricted directory permissions. Even if an external user is an [Owner](built-in-roles.md#owner) at a scope, if they try to assign a role to grant someone else access, they can't browse the list of users, groups, or service principals.
:::image type="content" source="./media/role-assignments-external-users/directory-no-browse.png" alt-text="Screenshot of external user can't browse security principals to assign roles." lightbox="./media/role-assignments-external-users/directory-no-browse.png":::
If the external user knows someone's exact sign-in name in the directory, they can grant access. If you really want an external user to have full read access to your directory, you can add the external user to the [Directory Readers](../active-directory/roles/permissions-reference.md#directory-readers) role in Microsoft Entra ID. For more information, see [Add Microsoft Entra B2B collaboration users in the Azure portal](../active-directory/external-identities/add-users-administrator.md).
### External user cannot register applications or create service principals
External users have restricted directory permissions. If an external user needs to be able to register applications or create service principals, you can add the external user to the [Application Developer](../active-directory/roles/permissions-reference.md#application-developer) role in Microsoft Entra ID. For more information, see [Add Microsoft Entra B2B collaboration users in the Azure portal](../active-directory/external-identities/add-users-administrator.md).
:::image type="content" source="./media/role-assignments-external-users/directory-access-denied.png" alt-text="Screenshot of external user can't register applications." lightbox="./media/role-assignments-external-users/directory-access-denied.png":::
### External user does not see the new directory
If an external user has been granted access to a directory, but they don't see the new directory listed in the Azure portal when they try to switch in their **Directories** page, make sure the external user has completed the invitation process. For more information about the invitation process, see [Microsoft Entra B2B collaboration invitation redemption](../active-directory/external-identities/redemption-experience.md).
### External user does not see resources
If an external user has been granted access to a directory, but they don't see the resources they have been granted access to in the Azure portal, make sure the external user has selected the correct directory. An external user might have access to multiple directories. To switch directories, in the upper left, select **Settings** > **Directories**, and then select the appropriate directory.
:::image type="content" source="./media/role-assignments-external-users/directory-switch.png" alt-text="Screenshot of Portal setting Directories section in Azure portal." lightbox="./media/role-assignments-external-users/directory-switch.png":::
## Next steps
- [Add Microsoft Entra B2B collaboration users in the Azure portal](../active-directory/external-identities/add-users-administrator.md)
- [Properties of a Microsoft Entra B2B collaboration user](../active-directory/external-identities/user-properties.md)
- [The elements of the B2B collaboration invitation email - Microsoft Entra ID](../active-directory/external-identities/invitation-email-elements.md)