Skip to content

Commit 219ed6e

Browse files
authored
Merge pull request #104439 from davidmu1/usersgroupsroles1
Usersgroupsroles1
2 parents c40290a + 6e892f1 commit 219ed6e

9 files changed

+35
-34
lines changed

articles/active-directory/users-groups-roles/directory-assign-admin-roles.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Application Administrators can manage application credentials that allows them t
5555

5656
If an application is assigned to any other role that are not mentioned above, then Application Administrator cannot manage credentials of that application.
5757

58-
This role also grants the ability to _consent_ to delegated permissions and application permissions, with the exception of permissions on the Microsoft Graph and Azure AD Graph.
58+
This role also grants the ability to _consent_ to delegated permissions and application permissions, with the exception of permissions on the Microsoft Graph API.
5959

6060
> [!IMPORTANT]
6161
> This exception means that you can still consent to permissions for _other_ apps (e.g. third party apps or apps that you have registered), but not to permissions on Azure AD itself. You can still _request_ these permissions as part of the app registration, but _granting_ (i.e. consenting to) these permissions requires an Azure AD admin. This means that a malicious user cannot easily elevate their permissions, for example by creating and consenting to an app that can write to the entire directory and through that app's permissions elevate themselves to become a global admin.
@@ -121,7 +121,7 @@ Makes purchases, manages subscriptions, manages support tickets, and monitors se
121121

122122
### [Cloud Application Administrator](#cloud-application-administrator-permissions)
123123

124-
Users in this role have the same permissions as the Application Administrator role, excluding the ability to manage application proxy. This role grants the ability to create and manage all aspects of enterprise applications and application registrations. This role also grants the ability to consent to delegated permissions, and application permissions excluding Microsoft Graph and Azure AD Graph. Users assigned to this role are not added as owners when creating new application registrations or enterprise applications.
124+
Users in this role have the same permissions as the Application Administrator role, excluding the ability to manage application proxy. This role grants the ability to create and manage all aspects of enterprise applications and application registrations. This role also grants the ability to consent to delegated permissions, and application permissions excluding the Microsoft Graph API. Users assigned to this role are not added as owners when creating new application registrations or enterprise applications.
125125

126126
Cloud Application Administrators can manage application credentials that allows them to impersonate the application. So, users assigned to this role can manage application credentials of only those applications that are either not assigned to any Azure AD roles or those assigned to following admin roles only:
127127
* Application Developer
@@ -197,14 +197,14 @@ This is a legacy role that is to be assigned to applications that do not support
197197
Users with this role have global permissions within Microsoft Dynamics 365 Online, when the service is present, as well as the ability to manage support tickets and monitor service health. More information at [Use the service admin role to manage your tenant](https://docs.microsoft.com/dynamics365/customer-engagement/admin/use-service-admin-role-manage-tenant).
198198

199199
> [!NOTE]
200-
> In Microsoft Graph API, Azure AD Graph API, and Azure AD PowerShell, this role is identified as "Dynamics 365 Service Administrator." It is "Dynamics 365 Administrator" in the [Azure portal](https://portal.azure.com).
200+
> In the Microsoft Graph API and Azure AD PowerShell, this role is identified as "Dynamics 365 Service Administrator." It is "Dynamics 365 Administrator" in the [Azure portal](https://portal.azure.com).
201201
202202
### [Exchange Administrator](#exchange-service-administrator-permissions)
203203

204204
Users with this role have global permissions within Microsoft Exchange Online, when the service is present. Also has the ability to create and manage all Office 365 Groups, manage support tickets, and monitor service health. More information at [About Office 365 admin roles](https://support.office.com/article/About-Office-365-admin-roles-da585eea-f576-4f55-a1e0-87090b6aaa9d).
205205

206206
> [!NOTE]
207-
> In Microsoft Graph API, Azure AD Graph API, and Azure AD PowerShell, this role is identified as "Exchange Service Administrator." It is "Exchange Administrator" in the [Azure portal](https://portal.azure.com). It is "Exchange Online administrator" in the [Exchange admin center](https://go.microsoft.com/fwlink/p/?LinkID=529144).
207+
> In the Microsoft Graph API and Azure AD PowerShell, this role is identified as "Exchange Service Administrator." It is "Exchange Administrator" in the [Azure portal](https://portal.azure.com). It is "Exchange Online administrator" in the [Exchange admin center](https://go.microsoft.com/fwlink/p/?LinkID=529144).
208208
209209
### [External Identity Provider Administrator](#external-identity-provider-administrator-permissions)
210210

@@ -218,7 +218,7 @@ This administrator manages federation between Azure Active Directory tenants and
218218
Users with this role have access to all administrative features in Azure Active Directory, as well as services that use Azure Active Directory identities like Microsoft 365 security center, Microsoft 365 compliance center, Exchange Online, SharePoint Online, and Skype for Business Online. The person who signs up for the Azure Active Directory tenant becomes a global administrator. There can be more than one global administrator at your company. Global admins can reset the password for any user and all other administrators.
219219

220220
> [!NOTE]
221-
> In Microsoft Graph API, Azure AD Graph API, and Azure AD PowerShell, this role is identified as "Company Administrator". It is "Global Administrator" in the [Azure portal](https://portal.azure.com).
221+
> In the Microsoft Graph API and Azure AD PowerShell, this role is identified as "Company Administrator". It is "Global Administrator" in the [Azure portal](https://portal.azure.com).
222222
>
223223
>
224224
@@ -271,7 +271,7 @@ Users with this role can change passwords, invalidate refresh tokens, manage ser
271271
272272
Delegating administrative permissions over subsets of users and applying policies to a subset of users is possible with [Administrative Units (now in public preview)](https://docs.microsoft.com/azure/active-directory/users-groups-roles/directory-administrative-units).
273273

274-
This role was previously called "Password Administrator" in the [Azure portal](https://portal.azure.com/). The "Helpdesk Administrator" name in Azure AD now matches its name in Azure AD PowerShell, Azure AD Graph API and Microsoft Graph API.
274+
This role was previously called "Password Administrator" in the [Azure portal](https://portal.azure.com/). The "Helpdesk Administrator" name in Azure AD now matches its name in Azure AD PowerShell and the Microsoft Graph API.
275275

276276
### [Intune Administrator](#intune-service-administrator-permissions)
277277

@@ -280,7 +280,7 @@ Users with this role have global permissions within Microsoft Intune Online, whe
280280
This role can create and manage all security groups. However, Intune Admin does not have admin rights over Office groups. That means the admin cannot update owners or memberships of all Office groups in the tenant. However, he/she can manage the Office group that he creates which comes as a part of his/her end user privileges. So, any Office group (not security group) that he/she creates should be counted against his/her quota of 250.
281281

282282
> [!NOTE]
283-
> In Microsoft Graph API, Azure AD Graph API, and Azure AD PowerShell, this role is identified as "Intune Service Administrator ". It is "Intune Administrator" in the [Azure portal](https://portal.azure.com).
283+
> In the Microsoft Graph API and Azure AD PowerShell, this role is identified as "Intune Service Administrator ". It is "Intune Administrator" in the [Azure portal](https://portal.azure.com).
284284
285285
### [Kaizala Administrator](#kaizala-administrator-permissions)
286286

@@ -323,7 +323,7 @@ Users with this role have limited ability to manage passwords. This role does no
323323
Users with this role have global permissions within Microsoft Power BI, when the service is present, as well as the ability to manage support tickets and monitor service health. More information at [Understanding the Power BI admin role](https://docs.microsoft.com/power-bi/service-admin-role).
324324

325325
> [!NOTE]
326-
> In Microsoft Graph API, Azure AD Graph API, and Azure AD PowerShell, this role is identified as "Power BI Service Administrator ". It is "Power BI Administrator" in the [Azure portal](https://portal.azure.com).
326+
> In the Microsoft Graph API and Azure AD PowerShell, this role is identified as "Power BI Service Administrator ". It is "Power BI Administrator" in the [Azure portal](https://portal.azure.com).
327327
328328
### [Power Platform Administrator](#power-platform-administrator-permissions)
329329

@@ -405,21 +405,21 @@ Windows Defender ATP and EDR | View and investigate alerts. When you turn on rol
405405
Users with this role can open support requests with Microsoft for Azure and Office 365 services, and views the service dashboard and message center in the [Azure portal](https://portal.azure.com) and [Microsoft 365 admin center](https://admin.microsoft.com). More information at [About admin roles](https://support.office.com/article/About-Office-365-admin-roles-da585eea-f576-4f55-a1e0-87090b6aaa9d).
406406

407407
> [!NOTE]
408-
> In Microsoft Graph API, Azure AD Graph API, and Azure AD PowerShell, this role is identified as "Service Support Administrator." It is "Service Administrator" in the [Azure portal](https://portal.azure.com), the [Microsoft 365 admin center](https://admin.microsoft.com), and the Intune portal.
408+
> In the Microsoft Graph API and Azure AD PowerShell, this role is identified as "Service Support Administrator." It is "Service Administrator" in the [Azure portal](https://portal.azure.com), the [Microsoft 365 admin center](https://admin.microsoft.com), and the Intune portal.
409409
410410
### [SharePoint Administrator](#sharepoint-service-administrator-permissions)
411411

412412
Users with this role have global permissions within Microsoft SharePoint Online, when the service is present, as well as the ability to create and manage all Office 365 Groups, manage support tickets, and monitor service health. More information at [About admin roles](https://support.office.com/article/About-Office-365-admin-roles-da585eea-f576-4f55-a1e0-87090b6aaa9d).
413413

414414
> [!NOTE]
415-
> In Microsoft Graph API, Azure AD Graph API, and Azure AD PowerShell, this role is identified as "SharePoint Service Administrator." It is "SharePoint Administrator" in the [Azure portal](https://portal.azure.com).
415+
> In the Microsoft Graph API and Azure AD PowerShell, this role is identified as "SharePoint Service Administrator." It is "SharePoint Administrator" in the [Azure portal](https://portal.azure.com).
416416
417417
### [Skype for Business / Lync Administrator](#lync-service-administrator-permissions)
418418

419419
Users with this role have global permissions within Microsoft Skype for Business, when the service is present, as well as manage Skype-specific user attributes in Azure Active Directory. Additionally, this role grants the ability to manage support tickets and monitor service health, and to access the Teams and Skype for Business Admin Center. The account must also be licensed for Teams or it can't run Teams PowerShell cmdlets. More information at [About the Skype for Business admin role](https://support.office.com/article/about-the-skype-for-business-admin-role-aeb35bda-93fc-49b1-ac2c-c74fbeb737b5) and Teams licensing information at [Skype for Business and Microsoft Teams add-on licensing](https://docs.microsoft.com/skypeforbusiness/skype-for-business-and-microsoft-teams-add-on-licensing/skype-for-business-and-microsoft-teams-add-on-licensing)
420420

421421
> [!NOTE]
422-
> In Microsoft Graph API, Azure AD Graph API, and Azure AD PowerShell, this role is identified as "Lync Service Administrator." It is "Skype for Business Administrator" in the [Azure portal](https://portal.azure.com/).
422+
> In the Microsoft Graph API and Azure AD PowerShell, this role is identified as "Lync Service Administrator." It is "Skype for Business Administrator" in the [Azure portal](https://portal.azure.com/).
423423
424424
### [Teams Communications Administrator](#teams-communications-administrator-permissions)
425425

@@ -1681,7 +1681,7 @@ Can manage all aspects of users and groups, including resetting passwords for li
16811681

16821682
## Role template IDs
16831683

1684-
Role template IDs are used mainly by Graph API or PowerShell users.
1684+
Role template IDs are used mainly by the Microsoft Graph API or PowerShell users.
16851685

16861686
Graph displayName | Azure portal display name | directoryRoleTemplateId
16871687
----------------- | ------------------------- | -------------------------

articles/active-directory/users-groups-roles/domains-manage.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -99,12 +99,12 @@ An error is returned when:
9999

100100
If you find that any of the conditions haven’t been met, manually clean up the references and try to delete the domain again.
101101

102-
## Use PowerShell or Graph API to manage domain names
102+
## Use PowerShell or the Microsoft Graph API to manage domain names
103103

104-
Most management tasks for domain names in Azure Active Directory can also be completed using Microsoft PowerShell, or programmatically using Azure AD Graph API.
104+
Most management tasks for domain names in Azure Active Directory can also be completed using Microsoft PowerShell, or programmatically using the Microsoft Graph API.
105105

106106
* [Using PowerShell to manage domain names in Azure AD](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0#domains)
107-
* [Using Graph API to manage domain names in Azure AD](https://msdn.microsoft.com/Library/Azure/Ad/Graph/api/domains-operations)
107+
* [Domain resource type](https://docs.microsoft.com/graph/api/resources/domain?view=graph-rest-1.0)
108108

109109
## Next steps
110110

articles/active-directory/users-groups-roles/licensing-directory-independence.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ You can configure each Azure AD tenant independently to get data synchronized fr
4141
To add an Azure AD tenant in the Azure portal, sign in to [the Azure portal](https://portal.azure.com) with an account that is an Azure AD global administrator, and, on the left, select **New**.
4242

4343
> [!NOTE]
44-
> Unlike other Azure resources, your tenants are not child resources of an Azure subscription. If your Azure subscription is canceled or expired, you can still access your tenant data using Azure PowerShell, the Azure Graph API, or the Microsoft 365 admin center. You can also [associate another subscription with the tenant](../fundamentals/active-directory-how-subscriptions-associated-directory.md).
44+
> Unlike other Azure resources, your tenants are not child resources of an Azure subscription. If your Azure subscription is canceled or expired, you can still access your tenant data using Azure PowerShell, the Microsoft Graph API, or the Microsoft 365 admin center. You can also [associate another subscription with the tenant](../fundamentals/active-directory-how-subscriptions-associated-directory.md).
4545
>
4646
4747
## Next steps

articles/active-directory/users-groups-roles/licensing-service-plan-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ When managing licenses in [the Azure portal](https://portal.azure.com/#blade/Mic
2727

2828
- **Product name**: Used in management portals
2929
- **String ID**: Used by PowerShell v1.0 cmdlets when performing operations on licenses
30-
- **GUID**: GUID used by Azure AD Graph and Microsoft Graph
30+
- **GUID**: GUID used by the Microsoft Graph API
3131
- **Service plans included**: A list of service plans in the product that correspond to the string ID and GUID
3232
- **Service plans included (friendly names)**: A list of service plans (friendly names) in the product that correspond to the string ID and GUID
3333

articles/active-directory/users-groups-roles/roles-assign-graph.md

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ ms.reviewer: vincesm
1414
ms.custom: it-pro
1515
ms.collection: M365-identity-device-management
1616
---
17-
# Assign custom admin roles using Graph API in Azure Active Directory
17+
# Assign custom admin roles using the Microsoft Graph API in Azure Active Directory
1818

19-
You can automate how you assign roles to user accounts Microsoft Graph API. This article covers POST, GET, and DELETE operations on roleAssignments.
19+
You can automate how you assign roles to user accounts using the Microsoft Graph API. This article covers POST, GET, and DELETE operations on roleAssignments.
2020

2121
## Required permissions
2222

@@ -29,7 +29,8 @@ HTTP request to create a role assignment between a user and a role definition.
2929
POST
3030

3131
``` HTTP
32-
https://graph.windows.net/<tenantDomain-or-tenantId>/roleAssignments?api-version=1.61-internal
32+
POST https://graph.microsoft.com/beta/roleManagement/directory/roleAssignments
33+
Content-type: application/json
3334
```
3435

3536
Body
@@ -53,7 +54,7 @@ HTTP request to create a role assignment where the principal or role definition
5354
POST
5455

5556
``` HTTP
56-
https://graph.windows.net/<tenantDomain-or-tenantId>/roleAssignments?api-version=1.61-internal
57+
https://graph.microsoft.com/beta/roleManagement/directory/roleAssignments
5758
```
5859

5960
Body
@@ -80,7 +81,7 @@ HTTP request to create a single resource scoped role assignment on a built-in ro
8081
POST
8182

8283
``` HTTP
83-
https://graph.windows.net/<tenantDomain-or-tenantId>/roleAssignments?api-version=1.61-internal
84+
https://graph.microsoft.com/beta/roleManagement/directory/roleAssignments
8485
```
8586

8687
Body
@@ -124,7 +125,7 @@ HTTP request to get a role assignment for a given principal
124125
GET
125126

126127
``` HTTP
127-
https://graph.windows.net/<tenantDomain-or-tenantId>/roleAssignments?api-version=1.61-internal&$filter=principalId eq ‘<object-id-of-principal>’
128+
https://graph.microsoft.com/beta/roleManagement/directory/roleAssignments&$filter=principalId eq ‘<object-id-of-principal>’
128129
```
129130

130131
Response
@@ -150,7 +151,7 @@ HTTP request to get a role assignment for a given role definition.
150151
GET
151152

152153
``` HTTP
153-
https://graph.windows.net/<tenantDomain-or-tenantId>/roleAssignments?api-version=1.61-internal&$filter=roleDefinitionId eq ‘<object-id-or-template-id-of-role-definition>’
154+
https://graph.microsoft.com/beta/roleManagement/directory/roleAssignments&$filter=roleDefinitionId eq ‘<object-id-or-template-id-of-role-definition>’
154155
```
155156

156157
Response
@@ -170,15 +171,15 @@ HTTP request to get a role assignment by ID.
170171
GET
171172

172173
``` HTTP
173-
https://graph.windows.net/<tenantDomain-or-tenantId>/roleAssignments/<id-of-role-assignment>?api-version=1.61-internal
174+
GET https://graph.microsoft.com/beta/roleManagement/directory/roleAssignments/lAPpYvVpN0KRkAEhdxReEJC2sEqbR_9Hr48lds9SGHI-1
174175
```
175176

176177
Response
177178

178179
``` HTTP
179180
HTTP/1.1 200 OK
180181
{
181-
"id":"mhxJMipY4UanIzy2yE-r7JIiSDKQoTVJrLE9etXyrY0-1"
182+
"id":"mhxJMipY4UanIzy2yE-r7JIiSDKQoTVJrLE9etXyrY0-1",
182183
"principalId":"ab2e1023-bddc-4038-9ac1-ad4843e7e539",
183184
"roleDefinitionId":"10dae51f-b6af-4016-8d66-8c2a99b929b3",
184185
"resourceScopes":["/"]
@@ -192,7 +193,7 @@ HTTP request to delete a role assignment between a user and a role definition.
192193
DELETE
193194

194195
``` HTTP
195-
https://graph.windows.net/<tenantDomain-or-tenantId>/roleAssignments/<id-of-role-assignment>?api-version=1.61-internal
196+
GET https://graph.microsoft.com/beta/roleManagement/directory/roleAssignments/lAPpYvVpN0KRkAEhdxReEJC2sEqbR_9Hr48lds9SGHI-1
196197
```
197198

198199
Response
@@ -205,7 +206,7 @@ HTTP request to delete a role assignment that no longer exists
205206
DELETE
206207

207208
``` HTTP
208-
https://graph.windows.net/<tenantDomain-or-tenantId>/roleAssignments/<id-of-role-assignment>?api-version=1.61-internal
209+
GET https://graph.microsoft.com/beta/roleManagement/directory/roleAssignments/lAPpYvVpN0KRkAEhdxReEJC2sEqbR_9Hr48lds9SGHI-1
209210
```
210211

211212
Response
@@ -219,7 +220,7 @@ HTTP request to delete a role assignment between self and built-in role definiti
219220
DELETE
220221

221222
``` HTTP
222-
https://graph.windows.net/<tenantDomain-or-tenantId>/roleAssignments/<id-of-role-assignment>?api-version=1.61-internal
223+
GET https://graph.microsoft.com/beta/roleManagement/directory/roleAssignments/lAPpYvVpN0KRkAEhdxReEJC2sEqbR_9Hr48lds9SGHI-1
223224
```
224225

225226
Response

0 commit comments

Comments
 (0)