Managing access to Azure Copilot

Completed

By default, Azure Copilot is available to all users in a tenant. However, Global Administrators can manage access to Azure Copilot for their organization. Access can also be optionally granted to specific Microsoft Entra users or groups.

If Azure Copilot isn't available for a user, they see an unauthorized message when they select the Copilot button in the Azure portal.

Regardless of access to Azure Copilot, Azure Copilot itself only has access to resources that the user has access to. It can only take actions that the user has permission to perform and requires confirmation before making changes. Azure Copilot complies with all existing access management rules and protections such as Azure role-based access control (Azure RBAC), Privileged Identity Management, Azure Policy, and resource locks.

To manage access to Azure Copilot for users in your tenant, any Global Administrator in that tenant can follow these steps.

  1. Elevate your access so that your Global Administrator account can manage all subscriptions in your tenant.
  2. In the Azure portal, search for Azure Copilot admin center and select it.
  3. In Azure Copilot admin center, under Settings, select Access management.
  4. Select the toggle next to On for entire tenant to change it to Off for entire tenant.
  5. To grant access to specific Microsoft Entra users or groups, select Manage RBAC roles.
  6. Assign the Copilot for Azure User role to specific users or groups. For detailed steps, see Assign Azure roles using the Azure portal.
  7. When you're finished, remove your elevated access.

Global Administrators for a tenant can change the Access management selection at any time.

A screenshot the Azure portal where access to Azure Copilot is managed.