By default all the Azure AD users can go to the Azure portal and view the memberships of the Administrator roles, including Global Administrator Role. this will give opportunity to hacker to view the high privilege accounts if they get access to a casual user account and try to hack the high privilege account.
Is there a way to limit viewing and reading memberships of the Azure Administrator Roles to only administrators without breaking any functionalities.
I have implemented PIM, but I still think it is unnecessarily that all the Azure AD users are abled to view the Administrator role group memberships.
thanks, Majid
read the previous posts