AZ_RESET_PASSWORD
Summary
FSProtect ACL Alias
AZ_RESET_PASSWORD
Azure Alias
Reset user passwords
Affected Object Types
AZ Users
Exploitation Certainty
Certain
Graph Permission / Role
Global Administrator, Privileged Authentication Administrator, Authentication Administrator, User Administrator, Password Administrator / Helpdesk Administrator, Partner Tier1 Support, Partner Tier2 Support.
Description
AZ_RESET_PASSWORD represents the ability for a principal (user, service principal, or group) to reset another user’s password in Microsoft Entra ID.
Resetting a password grants the actor full access to the target user’s account, allowing them to:
Sign in as the user using the new password.
Access all cloud resources the user can access (Azure, M365, SaaS apps).
Perform privileged operations as the target if the user has admin rights.
In hybrid environments with password write-back enabled, reset the on-prem Active Directory password as well — enabling full compromise of on-prem infrastructure.
Because password reset = account takeover, AZ_RESET_PASSWORD is one of the most sensitive capabilities in Entra ID.
Identification
PowerShell
You can identify AZ_RESET_PASSWORD permission on azure with these scripts
Azure CLI
Relevant roles:
Global Administrator
Privileged Authentication Administrator
Authentication Administrator
User Administrator
Password Administrator / Helpdesk Administrator
Partner Tier1 Support
Partner Tier2 Support
Anyone assigned (directly or via group) to these roles effectively has AZ_RESET_PASSWORD.
Azure GUI
Directory roles whose members can reset passwords
Open Microsoft Entra admin center.
Go to Identity → Roles & administrators.
Locate these roles:
Global Administrator (GA)
Privileged Authentication Administrator (PRA)
Authentication Administrator
User Administrator
Password Administrator / Helpdesk Administrator
Partner Tier1 Support
Partner Tier2 Support
Click each → Assignments:
Any assigned user, service principal, or group can reset passwords.
If a group is assigned, enumerate all transitive members.
Exploitation
Azure GUI
Open Microsoft Entra admin center → Identity → Users.
Select the target user.
Click Reset password.
Generate a new password or receive the automatically created temporary password.
You can now sign in as that user (subject to MFA).
Mitigation
Limit directory roles that can reset passwords
Open Microsoft Entra admin center → Roles & administrators.
Review assignments for:
Global Administrator
Privileged Authentication Administrator
Authentication Administrator
User Administrator
Password Administrator / Helpdesk Administrator
Partner Tier1 Support
Partner Tier2 Support
Remove permissions where not required:
Select assignment → Remove assignment
For roles assigned to groups:
Ensure group membership is tightly controlled
Avoid broad groups like “All IT”
Harden password reset & hybrid flows
Go to Identity → Protection → Password reset.
Restrict SSPR to specific groups, not all users.
Require strong authentication methods for resets.
If password write-back is enabled:
Ensure only required identities can reset hybrid passwords.
Regularly review privileged hybrid accounts.
Detection
Detect “Reset password” directly in Audit logs.
Go to Microsoft Entra ID → Audit logs.
Click Category: All → select GroupManagement → Apply.
If the Activity column is hidden: Manage view → Edit columns → check Activity, Initiated by (actor), Target → Apply.
Last updated
Was this helpful?