Skip to main content
SpecterOps home page
Search...
⌘K
Support
Contact Us
Contact Us
Search...
Navigation
Edge Reference
AZMGDirectory_ReadWrite_All
Home
BloodHound
API Reference
Webinars
Community
Query Library
OpenGraph Library
Blog
Get Started with BloodHound
Introduction to BloodHound
Quickstart
Security Concepts
Core Concepts
Manage Privilege Zones
Privilege Zone Membership
OpenGraph
Data Collection
Overview
SharpHound Enterprise
AzureHound Enterprise
Community Edition
Collection Operations
Analyzing & Using Data
Overview
Posture Page
Accept Attack Path Findings
Explore the Graph
Privilege Zones
Configuration
Manage BloodHound
Overview
BloodHound Configuration
BloodHound Configuration Supplement
Authentication and Authorization
Compliance Framework
Secure Deployment Practices
API & Integrations
Overview
BloodHound API
Integrations
Resources
Resources
Node Reference
Edge Reference
About BloodHound Edges
Traversable and Non-Traversable Edge Types
AbuseTGTDelegation
ADCSESC1
ADCSESC10a
ADCSESC10b
ADCSESC13
ADCSESC3
ADCSESC4
ADCSESC6a
ADCSESC6b
ADCSESC9a
ADCSESC9b
AddAllowedToAct
AddKeyCredentialLink
AddMember
AddSelf
AdminTo
AllExtendedRights
AllowedToAct
AllowedToDelegate
AZAddMembers
AZAddOwner
AZAddSecret
AZAKSContributor
AZAppAdmin
AZAutomationContributor
AZAvereContributor
AZCloudAppAdmin
AZContains
AZContributor
AZExecuteCommand
AZGetCertificates
AZGetKeys
AZGetSecrets
AZGlobalAdmin
AZHasRole
AZKeyVaultContributor
AZLogicAppContributor
AZManagedIdentity
AZMemberOf
AZMGAddMember
AZMGAddOwner
AZMGAddSecret
AZMGAppRoleAssignment_ReadWrite_All
AZMGApplication_ReadWrite_All
AZMGDirectory_ReadWrite_All
AZMGGrantAppRoles
AZMGGrantRole
AZMGGroupMember_ReadWrite_All
AZMGGroup_ReadWrite_All
AZMGRoleManagement_ReadWrite_Directory
AZMGServicePrincipalEndpoint_ReadWrite_All
AZNodeResourceGroup
AZOwner
AZOwns
AZPrivilegedAuthAdmin
AZPrivilegedRoleAdmin
AZResetPassword
AZRoleApprover
AZRoleEligible
AZRunsAs
AZScopedTo
AZUserAccessAdministrator
AZVMAdminLogin
AZVMContributor
AZWebsiteContributor
CanPSRemote
CanRDP
ClaimSpecialIdentity
CoerceAndRelayNTLMToADCS
CoerceAndRelayNTLMToLDAP
CoerceAndRelayNTLMToLDAPS
CoerceAndRelayNTLMToSMB
CoerceToTGT
Contains
CrossForestTrust
DCFor
DCSync
DelegatedEnrollmentAgent
DumpSMSAPassword
Enroll
EnrollOnBehalfOf
EnterpriseCAFor
ExecuteDCOM
ExtendedByPolicy
ForceChangePassword
GenericAll
GenericWrite
GetChanges
GetChangesAll
GetChangesInFilteredSet
GoldenCert
GPLink
HasSession
HasSIDHistory
HasTrustKeys
HostsCAService
IssuedSignedBy
LocalToComputer
ManageCA
ManageCertificates
MemberOf
MemberOfLocalGroup
NTAuthStoreFor
OIDGroupLink
Owns
PropagatesACEsTo
ProtectAdminGroups
PublishedTo
ReadGMSAPassword
ReadLAPSPassword
RemoteInteractiveLogonRight
RootCAFor
SameForestTrust
SpoofSIDHistory
SQLAdmin
SyncLAPSPassword
SyncedToADUser
SyncedToEntraUser
TrustedForNTAuth
WriteAccountRestrictions
WriteDacl
WriteGPLink
WriteOwner
WritePKIEnrollmentFlag
WritePKINameFlag
WriteSPN
Glossary
Community and Support
Overview
Release Notes
Additional Training and Resources
Get Help and Use the BloodHound Community
Legacy BloodHound
On this page
Abuse Info
Opsec Considerations
References
Edge Reference
AZMGDirectory_ReadWrite_All
This edge is created when a Service Principal has been granted the Directory.ReadWrite.All edge.
Abuse Info
The edge is not abusable, but is used during post-processing to create abusable edges.
Opsec Considerations
No opsec considerations apply to this edge.
References
https://attack.mitre.org/techniques/T1098/
https://posts.specterops.io/azure-privilege-escalation-via-service-principal-abuse-210ae2be2a5
AZMGApplication_ReadWrite_All
AZMGGrantAppRoles
⌘I