AZ_OWNER

Summary

FSProtect ACL Alias

AZ_OWNER

Entra ID (Azure AD) Alias

Owner

Affected Object Types

Groups, Applications, Service Principals, Devices

Exploitation Certainty

Certain

Graph Permission / Role

Object-level owner assignment via Group Owners, Application Owners, or Service Principal Owners

Description

AZ_OWNER represents the ownership relationship in Microsoft Entra ID (Azure AD) where a principal (user or service principal) has been designated as an Owner of an object. Ownership in Entra ID grants significant privileges depending on the object type:

  • Group Owner: Can add/remove members, modify group properties, and manage group settings. For role-assignable groups, this allows privilege escalation by adding members who inherit directory roles.

  • Application Owner: Can modify application configurations, add credentials (secrets/certificates), change redirect URIs, and manage API permissions. This can lead to credential theft and unauthorized access.

  • Service Principal Owner: Can modify the service principal configuration, add credentials, and change authentication settings. Compromising this can allow impersonation of the application.

  • Device Owner: Can manage device properties and settings.

Ownership is a critical control point that attackers target for privilege escalation and persistence.

Identification

PowerShell

Azure CLI

Azure GUI

Group Owners

  • Open Microsoft Entra admin center -> Groups -> select the target group.

  • Go to Owners in the left menu.

Application Owners

  • Open Microsoft Entra admin center -> Applications -> App registrations -> select the target app.

  • Go to Owners in the left menu.

Service Principal Owners

  • Open Microsoft Entra admin center -> Applications -> Enterprise applications -> select the target app.

  • Go to Owners in the left menu.

Device Owners

  • Open Microsoft Entra admin center -> Devices -> All devices -> select the target device.

  • Go to Registered owners in the device details.

Exploitation

Group Owner Exploitation

As a Group Owner, add yourself or a controlled identity to gain the group's privileges:

Application Owner Exploitation

As an Application Owner, add credentials to impersonate the application:

Service Principal Owner Exploitation

As a Service Principal Owner, add credentials to impersonate the service principal:

Device Owner Exploitation

Device ownership has limited direct exploitation potential. As a Device Owner, you can:

  • Modify device properties and extension attributes

  • Enable/disable the device

  • Manage BitLocker recovery keys (if applicable)

Note: Device ownership is more relevant for Intune-managed devices where additional management capabilities may be available.

Mitigation

  • Minimize the number of owners for sensitive objects (groups, applications, service principals).

    • Go to Microsoft Entra ID -> Groups / App registrations / Enterprise applications.

    • Select the object -> Owners -> remove unnecessary owners.

  • Use Privileged Identity Management (PIM) for just-in-time owner access to sensitive objects.

  • Monitor owner assignments and alert on unexpected changes.

  • Avoid assigning ownership to regular users for applications that have sensitive permissions.

  • Implement Access Reviews for application and group owners:

    • Go to Identity Governance -> Access Reviews -> New access review.

    • Select the target and configure owner reviews.

Detection

Detect ownership changes in Audit logs.

  • Go to Microsoft Entra ID -> Audit logs.

  • Filter by activities:

    • Add owner to group

    • Remove owner from group

    • Add owner to application

    • Remove owner from application

    • Add owner to service principal

    • Remove owner from service principal

Monitor for suspicious patterns:

  • Owner additions to role-assignable groups.

  • Owner additions to applications with privileged API permissions.

  • Credential additions to applications shortly after owner assignment.

  • Ownership changes outside of change management windows.

References

  • https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/groups-concept

  • https://learn.microsoft.com/en-us/powershell/module/az.resources/get-azadgroupowner

  • https://learn.microsoft.com/en-us/powershell/module/az.resources/get-azadapplication

  • https://learn.microsoft.com/en-us/powershell/module/az.resources/get-azadserviceprincipal

  • https://learn.microsoft.com/en-us/powershell/module/az.resources/new-azadappcredential

  • https://learn.microsoft.com/en-us/powershell/module/az.resources/add-azadgroupmember

  • https://learn.microsoft.com/en-us/cli/azure/ad/group/owner

  • https://learn.microsoft.com/en-us/cli/azure/ad/app/owner

  • https://posts.specterops.io/azure-privilege-escalation-via-azure-api-permissions-abuse-74aee1006f48

Last updated

Was this helpful?