Skip to content

Commit 4f463f0

Browse files
committed
Add link to constrained delegation
1 parent 129c41b commit 4f463f0

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/role-based-access-control/troubleshoot-limits.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -66,13 +66,13 @@ To reduce the number of role assignments in the subscription, add principals (us
6666

6767
This query checks active role assignments and doesn't consider eligible role assignments in [Microsoft Entra Privileged Identity Management](../active-directory/privileged-identity-management/pim-resource-roles-assign-roles.md).
6868

69-
If you are using [role assignment conditions](conditions-overview.md), you should use the Condition query. Otherwise, use the Default query.
69+
If you are using [role assignment conditions](conditions-overview.md) or [delegating role assignment management with conditions](delegate-role-assignments-overview.md), you should use the Conditions query. Otherwise, use the Default query.
7070

7171
# [Default](#tab/default)
7272

7373
[!INCLUDE [resource-graph-query-authorization-same-role-scope](../governance/includes/resource-graph/query/authorization-same-role-scope.md)]
7474

75-
# [Condition](#tab/condition)
75+
# [Conditions](#tab/conditions)
7676

7777
[!INCLUDE [resource-graph-query-authorization-same-role-scope-condition](../governance/includes/resource-graph/query/authorization-same-role-scope-condition.md)]
7878

@@ -150,13 +150,13 @@ To reduce the number of role assignments in the subscription, remove redundant r
150150

151151
This query checks active role assignments and doesn't consider eligible role assignments in [Microsoft Entra Privileged Identity Management](../active-directory/privileged-identity-management/pim-resource-roles-assign-roles.md).
152152

153-
If you are using [role assignment conditions](conditions-overview.md), you should use the Condition query. Otherwise, use the Default query.
153+
If you are using [role assignment conditions](conditions-overview.md) or [delegating role assignment management with conditions](delegate-role-assignments-overview.md), you should use the Conditions query. Otherwise, use the Default query.
154154

155155
# [Default](#tab/default)
156156

157157
[!INCLUDE [resource-graph-query-authorization-same-role-principal](../governance/includes/resource-graph/query/authorization-same-role-principal.md)]
158158

159-
# [Condition](#tab/condition)
159+
# [Conditions](#tab/conditions)
160160

161161
[!INCLUDE [resource-graph-query-authorization-same-role-principal-condition](../governance/includes/resource-graph/query/authorization-same-role-principal-condition.md)]
162162

@@ -220,13 +220,13 @@ To reduce the number of role assignments in the subscription, replace multiple b
220220

221221
This query checks active role assignments and doesn't consider eligible role assignments in [Microsoft Entra Privileged Identity Management](../active-directory/privileged-identity-management/pim-resource-roles-assign-roles.md).
222222

223-
If you are using [role assignment conditions](conditions-overview.md), you should use the Condition query. Otherwise, use the Default query.
223+
If you are using [role assignment conditions](conditions-overview.md) or [delegating role assignment management with conditions](delegate-role-assignments-overview.md), you should use the Conditions query. Otherwise, use the Default query.
224224

225225
# [Default](#tab/default)
226226

227227
[!INCLUDE [resource-graph-query-authorization-same-principal-scope](../governance/includes/resource-graph/query/authorization-same-principal-scope.md)]
228228

229-
# [Condition](#tab/condition)
229+
# [Condition](#tab/conditions)
230230

231231
[!INCLUDE [resource-graph-query-authorization-same-principal-scope-condition](../governance/includes/resource-graph/query/authorization-same-principal-scope-condition.md)]
232232

0 commit comments

Comments
 (0)