Minimum Permissions for Entra ID RPC
Secret Server requires proper permissions to perform remote password changing (RPC). The privileged Secret Server RPC service principal used for RPC of an Entra ID user account secret must be assigned to the User Administrator role.
Assigning a Secret to the User Administrator Role
-
Log into the Entra ID or Azure AD Portal (https://portal.azure.com).
-
Go to Microsoft Entra ID > Roles and Administrators.
-
Select the User Administrator role.
-
Click Add Assignments.
-
Search for the desired service principal. This is the account to give permissions to, in this case, the registered application.
-
Click Add.
Assigning the Privileged Authentication Administrator Role for Administrator Accounts
To perform remote password changing for Entra ID administrator accounts, the service principal must be assigned the Privileged Authentication Administrator role.
-
Locate the service principal:
-
In the Microsoft Entra admin center, go to Azure Active Directory > App registrations.
-
Find the app registration you want to manage and note its Application (client) ID.
-
-
Find the corresponding service principal:
-
Go to Azure Active Directory > Enterprise applications.
-
Search for the application name or filter by the Application (client) ID.
-
-
Assign the role:
-
Select the service principal.
-
Navigate to Roles and administrators, then click Add assignments.
-
Search for and select the Privileged Authentication Administrator role.
-
Choose the user, group, or service principal.
-
Click Add to finalize the assignment.
-
See Entra ID service principal for more details.