Jonas Ohmsen, a Microsoft Cloud Solution Architect, provides a guide on setting up a ConfigMgr Cloud Management Gateway (CMG) without requiring a Global Admin to use the ConfigMgr console. He also explains what a CMG is and how its setup appears in Azure.

Introducing the ConfigMgr CMG Least Privilege Setup Approach
Microsoft’s Cloud Solution Architect, Jonas Ohmsen, has developed an innovative approach to setting up a ConfigMgr Cloud Management Gateway (CMG) without requiring a Global Admin to use the ConfigMgr console. This is a significant development in the realm of cloud management, offering a more streamlined and secure setup process.
Understanding the Cloud Management Gateway (CMG)
Before diving into the new setup approach, it’s crucial to understand what a CMG is. Essentially, it’s a service that extends your Configuration Manager infrastructure to the internet, enabling management of your devices outside your organization’s network.
What’s New: The Least Privilege Approach
Ohmsen’s approach, dubbed the “Least Privilege Approach,” is a fresh take on CMG setup. It minimizes the need for high-level access, thereby enhancing security and efficiency.
“I’m a Microsoft Cloud Solution Architect and this blog post is meant as a guide to setup a ConfigMgr Cloud Management Gateway (CMG) without the need for a Global Admin to use the ConfigMgr console.”
Setting Up CMG in Azure: A Brief Overview
The setup process for CMG in Azure combines elements from the official documentation and Ohmsen’s personal insights on the product. The goal is to provide a comprehensive, user-friendly guide for tech enthusiasts.
Why This Is Important
This new approach to CMG setup is a game-changer for IT professionals. It simplifies the setup process, reduces the need for high-level access, and enhances the overall security of your cloud management infrastructure.
“This part is a mix of the official documentation and of my own view on the product.”
With this new approach, setting up a CMG is now more accessible and secure than ever before, making it an exciting development for all tech-savvy individuals and organizations.
From the Core Infrastructure and Security Blog