Skip to content

Commit 6b3f7a3

Browse files
committed
Exchange admin center update known issue
1 parent a201a97 commit 6b3f7a3

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/active-directory/roles/groups-concept.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: roles
1010
ms.topic: article
11-
ms.date: 01/26/2022
11+
ms.date: 02/10/2022
1212
ms.author: rolyon
1313
ms.reviewer: vincesm
1414
ms.custom: it-pro
@@ -72,10 +72,10 @@ The following scenarios are not supported:
7272
The following are known issues with role-assignable groups:
7373

7474
- *Azure AD P2 licensed customers only*: Even after deleting the group, it is still shown an eligible member of the role in PIM UI. Functionally there's no problem; it's just a cache issue in the Azure portal.
75-
- Use the modern [Exchange admin center](https://admin.exchange.microsoft.com) for role assignments via group membership. The old Exchange admin center doesn't support this feature yet. Exchange PowerShell cmdlets will work as expected.
76-
- Permissions granted via [Azure AD Privileged Identity Management](../privileged-identity-management/pim-configure.md) won't work for Rules, Organization, or Public Folders in the modern [Exchange admin center](https://admin.exchange.microsoft.com). For more information, see [What's new in the Exchange admin center in Exchange Online](/exchange/whats-new#february-2021).
75+
- Use the new [Exchange admin center](/exchange/exchange-admin-center) for role assignments via group membership. The old Exchange admin center doesn't support this feature yet. Exchange PowerShell cmdlets will work as expected.
76+
- If an administrator role is assigned to a role-assignable group instead of individual users, members of the group will not be able to access Rules, Organization, or Public Folders in the new [Exchange admin center](/exchange/exchange-admin-center). The workaround is to assign the role directly to users instead of the group.
7777
- Azure Information Protection Portal (the classic portal) doesn't recognize role membership via group yet. You can [migrate to the unified sensitivity labeling platform](/azure/information-protection/configure-policy-migrate-labels) and then use the Office 365 Security & Compliance center to use group assignments to manage roles.
78-
- [Apps admin center](https://config.office.com/) doesn't support this feature yet. Assign users directly to Office Apps Administrator role.
78+
- [Apps admin center](https://config.office.com/) doesn't support this feature yet. Assign the Office Apps Administrator role directly to users.
7979

8080
## License requirements
8181

0 commit comments

Comments
 (0)