Off-Prem

Channel

Microsoft extends deadline for partners to improve their clients' security with unauthorised Azure AD tweaks

Partners may be dragging the chain a little – perhaps you'd like to hurry them up?


Microsoft's campaign to improve the security of its customers and partners – by letting the latter set roles in clients' Azure Active Directory implementations without asking permission – has been extended by four months.

As The Register reported in July 2022, Microsoft has noted that IT service providers are a target for cyber criminals because cracking one partner could grant access to many thousands of machines.

Microsoft's precaution against that outcome is an upgrade to the delegated admin privileges (DAP) that partners are granted so they can tend clients' software purchases and systems.

The upgrade is called GDAP – granular delegated admin privileges – and implements zero-trust principles so that partners can still administer customers' software, but are restricted to certain activities and low levels of privilege.

Microsoft is so keen for partners to upgrade to GDAP it's allowed them to create the role in Active Directory without having to get customers' permission first.

But partners appear not to be rushing to implement GDAP. Microsoft set October 31 as the date on which it would discontinue the software that automates DAP to GDAP migrations.

An October 13 notice to partners reveals that software will now expire on March 1, 2023 – four months past the old deadline.

The ability to create a DAP relationship will also survive longer than intended – until January 17, 2023.

News of the deadline extensions was accompanied by the following hurry-up from Microsoft:

To avoid disruption to your business, we recommend that you do not delay until March 2023 and take action now to transition to GDAP for the level of access that you require to manage your customers.

Microsoft also pointed out that the GDAP roles that can be created by partners are limited, and customers will have to approve upgrades to more privileged roles. If partners hurry up and hit the deadline, it will therefore mean less of a need for their customers to rush either.

Redmond has had a tricky time with its partner community in 2022, with many pushing back against terms of the "New Commerce Experience" (NCE) that prioritizes sales of fixed-term subscriptions and makes it hard to acquire a perpetual license. Partner adoption of NCE was so slow that Microsoft extended its old licensing arrangements indefinitely and admitted the transition had negatively impacted revenue to a greater extent than anticipated.

Another partner-related issue is Microsoft's pricing for software licenses, which are considerably cheaper when run in the company’s own Azure cloud. Cloud partners pushed back against that, supported by the European Union deciding Microsoft pricing represented unfair competition that disadvantaged rival clouds. Microsoft introduced per-core licensing and said doing so should level the playing field. But as analyst Wesley Miller observed in this Twitter thread, Microsoft now offers three different pricing schemes: one on Azure, and two that serve different classes of partners.

Giving Azure customers better features, rights and privileges than it offers to users on other clouds is not exactly levelling the playing field, regardless of pricing. ®

Send us news
Post a comment

Microsoft hosts a security summit but no press, public allowed

CrowdStrike, other vendors, friendly govt reps…but not anyone who would tell you what happened

Microsoft security tools questioned for treating employees as threats

Cracked Labs examines how workplace surveillance turns workers into suspects

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

Microsoft patches scary wormable hijack-my-box-via-IPv6 security bug and others

Plus more pain for Intel which fixed 43 bugs, SAP and Adobe also in on the action

Microsoft's Patch Tuesday borks dual-boot Linux-Windows PCs

Plus: Three-year-old ProxyOracle flaw added to CISA's exploited bugs list

From Copilot to Copirate: How data thieves could hijack Microsoft's chatbot

Prompt injection, ASCII smuggling, and other swashbuckling attacks on the horizon

UK competition regulator's cloud probe remedies have global implications

Egress fees? Ticked. Spend discounts? Not yet. Software licensing? Might need to shape up, Microsoft

House to grill CrowdStrike exec on epic IT meltdown... no, not the CEO

VP Adam Meyers to testify about that faulty software update which ruined July and some of August

Proof-of-concept code released for zero-click critical IPv6 Windows hole

If you haven't deployed August's patches, get busy before others do

Copilot for Microsoft 365 might boost productivity if you survive the compliance minefield

Loads of governance issues to worry about, and the chance it might spout utter garbage

Microsoft pushing, pushing, pushing Edge in Defender slammed as a 'dark pattern'

Is it an ad? Or serious infosec advice?

If every PC is going to be an AI PC, they better be as good at all the things trad PCs can do

Microsoft's Copilot+ machines suck at one of computing's oldest use cases