What Is GDAP?
GDAP, or Granular Delegated Admin Privileges, is a security feature that provides partners with least-privileged access a follows the Zero Trust cybersecurity protocol and is designed to give your business full control over partner access to your cloud environment(s).
Unlike the previous system from Microsoft, Delegated Admin Privileges (DAP) or other traditional "all-or-nothing" access systems, GDAP empowers organizations like yours to grant highly specific, time-bound permissions to service providers, ensuring they access only what's necessary to provide support.
The evolution from DAP to GDAP
The Delegated Admin Privileges (DAP) program allowed Cloud Solution Providers (CSPs) to gain persistent, high-level access (typically Global Administrator or Helpdesk Administrator) to customer tenants once the customer accepted the reseller relationship. This access was broad and indefinite, and could only be revoked manually by either party.
Microsoft has since retired DAP because it posed significant security risks due to:
- Overprivileged access: Partners often had more access than necessary, violating the principle of least privilege.
- Persistent access: DAP relationships did not expire, increasing exposure to long-term threats.
- Attack surface: Threat actors exploited DAP relationships to launch broader attacks.
- Compliance concerns: Customers, especially in regulated industries, required time-bound and scoped access to meet internal and external compliance standards.
The improve the security posture, Granular Delegated Admin Privileges (GDAP) was introduced in August of 2022 to address these shortcomings. GDAP more closely aligns with Zero Trust principles and offers Role-based access control (RBAC) so partners like SoftwareOne can be assigned specific Microsoft Entra roles (e.g., Security Reader, License Administrator) instead of blanket Global Administrator permissions.
Furthermore, the customer is required to provide explicit consent for each GDAP relationship request. Each request specifies defined privilege roles and duration, as the GDAP relationship now includes an automatic expiry date ranging from 1 to 730 days, with the option of auto-extension.
Finally, GDAP uses Cross-Tenant Access Policies (XTAP) to enforce scoped access between SoftwareOne as your CSP and your Microsoft 365, Azure, or Dynamics tenant. XTAP leans on Microsoft Entra External ID to govern how organizations collaborate across tenant boundaries with technology built on the same guest access features you probably use daily in your own B2B Guest access scenarios.
So, when SoftwareOne requests access to your tenant XTAP ensures only approved roles (e.g., Security Reader) are granted, be assured that access is time-bound and revocable. You are also able to further reduce access friction with MFA claims enforcement through the SoftwareOne tenant. All this aligns with Zero Trust principles “never trust, always verify”.
Think of GDAP as a delegation framework. It enables role-based access control (RBAC), which limits each user or provider to the minimum of least privileges needed. So, whether you’re dealing with Microsoft 365, Azure, or Dynamics, GDAP ensures that service providers like SoftwareOne can offer efficient support without breaching your organizations security boundaries.