Skip to content

Commit 7a0ad52

Browse files
authored
Merge pull request #187537 from rolyon/rolyon-abac-attributes-permissions-read
[Azure ABAC] Read permission update for Graph API
2 parents 16d239d + 7d6791b commit 7a0ad52

File tree

1 file changed

+1
-2
lines changed

1 file changed

+1
-2
lines changed

articles/active-directory/fundamentals/custom-security-attributes-overview.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: fundamentals
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 01/14/2022
11+
ms.date: 02/04/2022
1212
ms.collection: M365-identity-device-management
1313
---
1414

@@ -182,7 +182,6 @@ Here are some of the known issues with custom security attributes:
182182
- Global Administrators can read audit logs for custom security attribute definitions and assignments.
183183
- If you have an Azure AD Premium P2 license, you can't add eligible role assignments at attribute set scope.
184184
- If you have an Azure AD Premium P2 license, the **Assigned roles** page for a user does not list permanent role assignments at attribute set scope. The role assignments exist, but aren't listed.
185-
- If you use the Microsoft Graph API, delegated and application permissions are available to both read and write (*CustomSecAttributeAssignment.ReadWrite.All* and *CustomSecAttributeDefinition.ReadWrite.All*). However, read-only permissions currently are not available.
186185

187186
Depending on whether you have an Azure AD Premium P1 or P2 license, here are the role assignment tasks that are currently supported for custom security attribute roles:
188187

0 commit comments

Comments
 (0)