AZ_OWNER
Summary
FSProtect ACL Alias
AZ_OWNER
Entra ID (Azure AD) Alias
Owner
Affected Object Types
Groups, Applications, Service Principals, Devices
Exploitation Certainty
Certain
Graph Permission / Role
Object-level owner assignment via Group Owners, Application Owners, or Service Principal Owners
Description
AZ_OWNER represents the ownership relationship in Microsoft Entra ID (Azure AD) where a principal (user or service principal) has been designated as an Owner of an object. Ownership in Entra ID grants significant privileges depending on the object type:
Group Owner: Can add/remove members, modify group properties, and manage group settings. For role-assignable groups, this allows privilege escalation by adding members who inherit directory roles.
Application Owner: Can modify application configurations, add credentials (secrets/certificates), change redirect URIs, and manage API permissions. This can lead to credential theft and unauthorized access.
Service Principal Owner: Can modify the service principal configuration, add credentials, and change authentication settings. Compromising this can allow impersonation of the application.
Device Owner: Can manage device properties and settings.
Ownership is a critical control point that attackers target for privilege escalation and persistence.
Identification
PowerShell
Azure CLI
Azure GUI
Group Owners
Open Microsoft Entra admin center -> Groups -> select the target group.
Go to Owners in the left menu.
Application Owners
Open Microsoft Entra admin center -> Applications -> App registrations -> select the target app.
Go to Owners in the left menu.
Service Principal Owners
Open Microsoft Entra admin center -> Applications -> Enterprise applications -> select the target app.
Go to Owners in the left menu.
Device Owners
Open Microsoft Entra admin center -> Devices -> All devices -> select the target device.
Go to Registered owners in the device details.
Exploitation
Group Owner Exploitation
As a Group Owner, add yourself or a controlled identity to gain the group's privileges:
Application Owner Exploitation
As an Application Owner, add credentials to impersonate the application:
Service Principal Owner Exploitation
As a Service Principal Owner, add credentials to impersonate the service principal:
Device Owner Exploitation
Device ownership has limited direct exploitation potential. As a Device Owner, you can:
Modify device properties and extension attributes
Enable/disable the device
Manage BitLocker recovery keys (if applicable)
Note: Device ownership is more relevant for Intune-managed devices where additional management capabilities may be available.
Mitigation
Minimize the number of owners for sensitive objects (groups, applications, service principals).
Go to Microsoft Entra ID -> Groups / App registrations / Enterprise applications.
Select the object -> Owners -> remove unnecessary owners.
Use Privileged Identity Management (PIM) for just-in-time owner access to sensitive objects.
Monitor owner assignments and alert on unexpected changes.
Avoid assigning ownership to regular users for applications that have sensitive permissions.
Implement Access Reviews for application and group owners:
Go to Identity Governance -> Access Reviews -> New access review.
Select the target and configure owner reviews.
Detection
Detect ownership changes in Audit logs.
Go to Microsoft Entra ID -> Audit logs.
Filter by activities:
Add owner to group
Remove owner from group
Add owner to application
Remove owner from application
Add owner to service principal
Remove owner from service principal
Monitor for suspicious patterns:
Owner additions to role-assignable groups.
Owner additions to applications with privileged API permissions.
Credential additions to applications shortly after owner assignment.
Ownership changes outside of change management windows.
References
https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/groups-concept
https://learn.microsoft.com/en-us/powershell/module/az.resources/get-azadgroupowner
https://learn.microsoft.com/en-us/powershell/module/az.resources/get-azadapplication
https://learn.microsoft.com/en-us/powershell/module/az.resources/get-azadserviceprincipal
https://learn.microsoft.com/en-us/powershell/module/az.resources/new-azadappcredential
https://learn.microsoft.com/en-us/powershell/module/az.resources/add-azadgroupmember
https://learn.microsoft.com/en-us/cli/azure/ad/group/owner
https://learn.microsoft.com/en-us/cli/azure/ad/app/owner
https://posts.specterops.io/azure-privilege-escalation-via-azure-api-permissions-abuse-74aee1006f48
Last updated
Was this helpful?