Skip to content

Commit 9c0dbe6

Browse files
authored
Merge pull request #238542 from rolyon/rolyon-aadroles-admin-units-restricted-management-preview-v2
[Azure AD roles] Restricted management administrative units v2 (Preview)
2 parents d9b2f3f + dcacb7e commit 9c0dbe6

12 files changed

+260
-50
lines changed

articles/active-directory/roles/TOC.yml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,12 @@
2020
href: m365-workload-docs.md
2121
- name: Use groups to manage role assignments
2222
href: groups-concept.md
23-
- name: Administrative units
24-
href: administrative-units.md
23+
- name: Administrative units
24+
items:
25+
- name: Administrative units
26+
href: administrative-units.md
27+
- name: Restricted management
28+
href: admin-units-restricted-management.md
2529
- name: Best practices
2630
href: best-practices.md
2731
- name: Security

articles/active-directory/roles/admin-units-faq-troubleshoot.yml

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ metadata:
1010
ms.topic: faq
1111
ms.subservice: roles
1212
ms.workload: identity
13-
ms.date: 06/30/2022
13+
ms.date: 06/09/2023
1414
ms.author: rolyon
1515
ms.reviewer: anandy
1616
ms.custom: oldportal;it-pro;
@@ -117,6 +117,21 @@ sections:
117117
answer: |
118118
No.
119119
120+
- name: Restricted management administrative units (Preview)
121+
questions:
122+
- question: |
123+
I am the owner of a group that is a member of a restricted management administrative unit. How are my permissions affected?
124+
answer: |
125+
As an owner of a protected group, you won't be able to manage it just based on ownership. Managing protected resources currently require a role to be assigned at the restricted management administrative unit scope of the protected resource.
126+
- question: |
127+
How are my Microsoft 365 resources affected by using restricted management administrative units?
128+
answer: |
129+
Currently, securing Azure AD resources in restricted management administrative units is supported. Resources managed outside of Azure AD aren't supported.
130+
- question: |
131+
I'm unable to modify a member of a restricted management administrative unit.
132+
answer: |
133+
The user, group, or device is a member of restricted management administrative unit. Management rights are limited to administrators scoped to that administrative unit.
134+
120135
additionalContent: |
121136
122137
## Next steps

articles/active-directory/roles/admin-units-manage.md

Lines changed: 86 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.topic: how-to
1010
ms.subservice: roles
1111
ms.workload: identity
12-
ms.date: 01/25/2023
12+
ms.date: 06/09/2023
1313
ms.author: rolyon
1414
ms.reviewer: anandy
1515
ms.custom: oldportal;it-pro;
@@ -18,6 +18,10 @@ ms.collection: M365-identity-device-management
1818

1919
# Create or delete administrative units
2020

21+
> [!IMPORTANT]
22+
> Restricted management administrative units are currently in PREVIEW.
23+
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
24+
2125
Administrative units let you subdivide your organization into any unit that you want, and then assign specific administrators that can manage only the members of that unit. For example, you could use administrative units to delegate permissions to administrators of each school at a large university, so they could control access, manage users, and set policies only in the School of Engineering.
2226

2327
This article describes how to create or delete administrative units to restrict the scope of role permissions in Azure Active Directory (Azure AD).
@@ -26,8 +30,10 @@ This article describes how to create or delete administrative units to restrict
2630

2731
- Azure AD Premium P1 or P2 license for each administrative unit administrator
2832
- Azure AD Free licenses for administrative unit members
29-
- Privileged Role Administrator or Global Administrator
33+
- Privileged Role Administrator role
34+
- Microsoft.Graph module when using [Microsoft Graph PowerShell](/powershell/microsoftgraph/installation)
3035
- AzureAD module when using PowerShell
36+
- AzureADPreview module when using PowerShell and restricted management administrative units
3137
- Admin consent when using Graph explorer for Microsoft Graph API
3238

3339
For more information, see [Prerequisites to use PowerShell or Graph Explorer](prerequisites.md).
@@ -48,6 +54,8 @@ You can create a new administrative unit by using either the Azure portal, Power
4854

4955
1. In the **Name** box, enter the name of the administrative unit. Optionally, add a description of the administrative unit.
5056

57+
1. If you don't want tenant-level administrators to be able to access this administrative unit, set the **Restricted management administrative unit** toggle to **Yes**. For more information, see [Restricted management administrative units](admin-units-restricted-management.md).
58+
5159
![Screenshot showing the Add administrative unit page and the Name box for entering the name of the administrative unit.](./media/admin-units-manage/add-new-admin-unit.png)
5260

5361
1. Optionally, on the **Assign roles** tab, select a role and then select the users to assign the role to with this administrative unit scope.
@@ -60,29 +68,59 @@ You can create a new administrative unit by using either the Azure portal, Power
6068

6169
### PowerShell
6270

63-
Use the [New-AzureADMSAdministrativeUnit](/powershell/module/azuread/new-azureadmsadministrativeunit) command to create a new administrative unit.
71+
# [Microsoft Graph PowerShell](#tab/ms-powershell)
72+
73+
Use the [Connect-MgGraph](/powershell/microsoftgraph/authentication-commands?branch=main#using-connect-mggraph) command to sign in to your tenant and consent to the required permissions.
6474

6575
```powershell
66-
New-AzureADMSAdministrativeUnit -Description "West Coast region" -DisplayName "West Coast"
76+
Connect-MgGraph -Scopes "AdministrativeUnit.ReadWrite.All"
6777
```
6878

69-
### Microsoft Graph PowerShell
79+
Use the [New-MgDirectoryAdministrativeUnit](/powershell/module/microsoft.graph.identity.directorymanagement/new-mgdirectoryadministrativeunit?branch=main) command to create a new administrative unit.
7080

71-
Use the [New-MgDirectoryAdministrativeUnit](/powershell/module/microsoft.graph.identity.directorymanagement/new-mgdirectoryadministrativeunit) command to create a new administrative unit.
81+
```powershell
82+
$params = @{
83+
DisplayName = "Seattle District Technical Schools"
84+
Description = "Seattle district technical schools administration"
85+
Visibility = "HiddenMembership"
86+
}
87+
$adminUnitObj = New-MgDirectoryAdministrativeUnit -BodyParameter $params
88+
```
89+
90+
Use the [New-MgDirectoryAdministrativeUnit (beta)](/powershell/module/microsoft.graph.identity.directorymanagement/new-mgdirectoryadministrativeunit?view=graph-powershell-beta&preserve-view=true&branch=main) command to create a new restricted management administrative unit. Set the `IsMemberManagementRestricted` property to `$true`.
7291

7392
```powershell
74-
Import-Module Microsoft.Graph.Identity.DirectoryManagement
93+
Select-MgProfile -Name beta
7594
$params = @{
76-
DisplayName = "Seattle District Technical Schools"
77-
Description = "Seattle district technical schools administration"
78-
Visibility = "HiddenMembership"
95+
DisplayName = "Contoso Executive Division"
96+
Description = "Contoso Executive Division administration"
97+
Visibility = "HiddenMembership"
98+
IsMemberManagementRestricted = $true
7999
}
80-
New-MgDirectoryAdministrativeUnit -BodyParameter $params
100+
$restrictedAU = New-MgDirectoryAdministrativeUnit -BodyParameter $params
81101
```
82102

103+
# [Azure AD PowerShell](#tab/aad-powershell)
104+
105+
[!INCLUDE [Azure AD PowerShell migration](../includes/aad-powershell-migration-include.md)]
106+
107+
Use the [New-AzureADMSAdministrativeUnit](/powershell/module/azuread/new-azureadmsadministrativeunit?branch=main) command to create a new administrative unit.
108+
109+
```powershell
110+
$adminUnitObj = New-AzureADMSAdministrativeUnit -Description "West Coast region" -DisplayName "West Coast"
111+
```
112+
113+
Use the [New-AzureADMSAdministrativeUnit (preview)](/powershell/module/azuread/new-azureadmsadministrativeunit?view=azureadps-2.0-preview&preserve-view=true&branch=main) command to create a new restricted management administrative unit. Set the `IsMemberManagementRestricted` parameter to `$true`.
114+
115+
```powershell
116+
$restrictedAU = New-AzureADMSAdministrativeUnit -DisplayName "Contoso Executive Division" -IsMemberManagementRestricted $true
117+
```
118+
119+
---
120+
83121
### Microsoft Graph API
84122

85-
Use the [Create administrativeUnit](/graph/api/administrativeunit-post-administrativeunits) API to create a new administrative unit.
123+
Use the [Create administrativeUnit](/graph/api/administrativeunit-post-administrativeunits?branch=main) API to create a new administrative unit.
86124

87125
Request
88126

@@ -99,6 +137,24 @@ Body
99137
}
100138
```
101139

140+
Use the [Create administrativeUnit (beta)](/graph/api/directory-post-administrativeunits?view=graph-rest-beta&preserve-view=true&branch=main) API to create a new restricted management administrative unit. Set the `isMemberManagementRestricted` property to `true`.
141+
142+
Request
143+
144+
```http
145+
POST https://graph.microsoft.com/beta/administrativeUnits
146+
```
147+
148+
Body
149+
150+
```http
151+
{
152+
"displayName": "Contoso Executive Division",
153+
"description": "This administrative unit contains executive accounts of Contoso Corp.",
154+
"isMemberManagementRestricted": true
155+
}
156+
```
157+
102158
## Delete an administrative unit
103159

104160
In Azure AD, you can delete an administrative unit that you no longer need as a unit of scope for administrative roles. Before you delete the administrative unit, you should remove any role assignments with that administrative unit scope.
@@ -125,13 +181,28 @@ In Azure AD, you can delete an administrative unit that you no longer need as a
125181

126182
### PowerShell
127183

128-
Use the [Remove-AzureADMSAdministrativeUnit](/powershell/module/azuread/remove-azureadmsadministrativeunit) command to delete an administrative unit.
184+
# [Microsoft Graph PowerShell](#tab/ms-powershell)
185+
186+
Use the [Remove-MgDirectoryAdministrativeUnit](/powershell/module/microsoft.graph.identity.directorymanagement/remove-mgdirectoryadministrativeunit?branch=main) command to delete an administrative unit.
187+
188+
```powershell
189+
$adminUnitObj = Get-MgDirectoryAdministrativeUnit -Filter "DisplayName eq 'Seattle District Technical Schools'"
190+
Remove-MgDirectoryAdministrativeUnit -AdministrativeUnitId $adminUnitObj.Id
191+
```
192+
193+
# [Azure AD PowerShell](#tab/aad-powershell)
194+
195+
[!INCLUDE [Azure AD PowerShell migration](../includes/aad-powershell-migration-include.md)]
196+
197+
Use the [Remove-AzureADMSAdministrativeUnit](/powershell/module/azuread/remove-azureadmsadministrativeunit?branch=main) command to delete an administrative unit.
129198

130199
```powershell
131-
$adminUnitObj = Get-AzureADMSAdministrativeUnit -Filter "displayname eq 'DeleteMe Admin Unit'"
200+
$adminUnitObj = Get-AzureADMSAdministrativeUnit -Filter "DisplayName eq 'Seattle District Technical Schools'"
132201
Remove-AzureADMSAdministrativeUnit -Id $adminUnitObj.Id
133202
```
134203

204+
---
205+
135206
### Microsoft Graph API
136207

137208
Use the [Delete administrativeUnit](/graph/api/administrativeunit-delete) API to delete an administrative unit.
@@ -144,3 +215,4 @@ DELETE https://graph.microsoft.com/v1.0/directory/administrativeUnits/{admin-uni
144215

145216
- [Add users, groups, or devices to an administrative unit](admin-units-members-add.md)
146217
- [Assign Azure AD roles with administrative unit scope](admin-units-assign-roles.md)
218+
- [Azure AD administrative units: Troubleshooting and FAQ](admin-units-faq-troubleshoot.yml)

articles/active-directory/roles/admin-units-members-add.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.topic: how-to
1010
ms.subservice: roles
1111
ms.workload: identity
12-
ms.date: 10/05/2022
12+
ms.date: 06/09/2023
1313
ms.author: rolyon
1414
ms.reviewer: anandy
1515
ms.custom: oldportal;it-pro;
@@ -18,7 +18,7 @@ ms.collection: M365-identity-device-management
1818

1919
# Add users, groups, or devices to an administrative unit
2020

21-
In Azure Active Directory (Azure AD), you can add users, groups, or devices to an administrative unit to restrict the scope of role permissions. Adding a group to an administrative unit brings the group itself into the management scope of the administrative unit, but **not** the members of the group. For additional details on what scoped administrators can do, see [Administrative units in Azure Active Directory](administrative-units.md).
21+
In Azure Active Directory (Azure AD), you can add users, groups, or devices to an administrative unit to limit the scope of role permissions. Adding a group to an administrative unit brings the group itself into the management scope of the administrative unit, but **not** the members of the group. For additional details on what scoped administrators can do, see [Administrative units in Azure Active Directory](administrative-units.md).
2222

2323
This article describes how to add users, groups, or devices to administrative units manually. For information about how to add users or devices to administrative units dynamically using rules, see [Manage users or devices for an administrative unit with dynamic membership rules](admin-units-members-dynamic.md).
2424

articles/active-directory/roles/admin-units-members-list.md

Lines changed: 38 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.topic: how-to
1010
ms.subservice: roles
1111
ms.workload: identity
12-
ms.date: 06/01/2022
12+
ms.date: 06/09/2023
1313
ms.author: rolyon
1414
ms.reviewer: anandy
1515
ms.custom: oldportal;it-pro;
@@ -82,6 +82,20 @@ You can list the users, groups, or devices in administrative units using the Azu
8282

8383
![Screenshot of All devices page with an administrative unit filter.](./media/admin-units-members-list/device-admin-unit-filter.png)
8484

85+
### List the restricted management administrative units for a single user or group
86+
87+
1. Sign in to the [Azure portal](https://portal.azure.com).
88+
89+
1. Select **Azure Active Directory**.
90+
91+
1. Select **Users** or **Groups** and then select the user or group you want to list their restricted management administrative units.
92+
93+
1. Select **Administrative units** to list all the administrative units where the user or group is a member.
94+
95+
1. In the **Restricted management** column, look for administrative units that are set to **Yes**.
96+
97+
![Screenshot of the Administrative units page with the Restricted management column.](./media/admin-units-members-list/list-restricted-management-admin-unit.png)
98+
8599
## PowerShell
86100

87101
Use the [Get-AzureADMSAdministrativeUnit](/powershell/module/azuread/get-azureadmsadministrativeunit) and [Get-AzureADMSAdministrativeUnitMember](/powershell/module/azuread/get-azureadmsadministrativeunitmember) commands to list users or groups for an administrative unit.
@@ -146,40 +160,55 @@ foreach ($member in (Get-AzureADMSAdministrativeUnitMember -Id $adminUnitObj.Id)
146160

147161
## Microsoft Graph API
148162

149-
Use the [List members](/graph/api/administrativeunit-list-members) API to list users or groups for an administrative unit.
150-
151-
Use the [List members (Beta)](/graph/api/administrativeunit-list-members?view=graph-rest-beta&preserve-view=true) API to list devices for an administrative unit.
152-
153163
### List the administrative units for a user
154164

165+
Use the user [List memberOf](/graph/api/user-list-memberof) API to list the administrative units a user is a direct member of.
166+
155167
```http
156168
GET https://graph.microsoft.com/v1.0/users/{user-id}/memberOf/$/Microsoft.Graph.AdministrativeUnit
157169
```
158170

159171
### List the administrative units for a group
160172

173+
Use the group [List memberOf](/graph/api/group-list-memberof) API to list the administrative units a group is a direct member of.
174+
161175
```http
162176
GET https://graph.microsoft.com/v1.0/groups/{group-id}/memberOf/$/Microsoft.Graph.AdministrativeUnit
163177
```
164178

165179
### List the administrative units for a device
166180

181+
Use the [List device memberships](/graph/api/device-list-memberof) API to list the administrative units a device is a direct member of.
182+
167183
```http
168-
GET https://graph.microsoft.com/beta/devices/{device-id}/memberOf/$/Microsoft.Graph.AdministrativeUnit
184+
GET https://graph.microsoft.com/v1.0/devices/{device-id}/memberOf/$/Microsoft.Graph.AdministrativeUnit
169185
```
170186

171-
### List the groups for an administrative unit
187+
### List the users, groups, or devices for an administrative unit
188+
189+
Use the [List members](/graph/api/administrativeunit-list-members) API to list the users, groups, or devices for an administrative unit. For member type, specify `microsoft.graph.user`, `microsoft.graph.group`, or `microsoft.graph.device`.
172190

173191
```http
174192
GET https://graph.microsoft.com/v1.0/directory/administrativeUnits/{admin-unit-id}/members/$/microsoft.graph.group
175193
```
176194

177-
### List the devices for an administrative unit
195+
### List whether a single user is in a restricted management administrative unit
196+
197+
Use the [Get a user (beta)](/graph/api/user-get?view=graph-rest-beta&preserve-view=true) API to determine whether a user is in a restricted management administrative unit. Look at the value of the `isManagementRestricted` property. If the property is `true`, it is in a restricted management administrative unit. If the property is `false`, empty, or null, it is not in a restricted management administrative unit.
178198

179199
```http
180-
GET https://graph.microsoft.com/beta/administrativeUnits/{admin-unit-id}/members/$/microsoft.graph.device
200+
GET https://graph.microsoft.com/beta/users/{user-id}
181201
```
182202

203+
Response
204+
205+
```
206+
{
207+
"displayName": "John",
208+
"isManagementRestricted": true,
209+
"userPrincipalName": "[email protected]",
210+
}
211+
```
183212

184213
## Next steps
185214

articles/active-directory/roles/admin-units-members-remove.md

Lines changed: 4 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.topic: how-to
1010
ms.subservice: roles
1111
ms.workload: identity
12-
ms.date: 03/22/2022
12+
ms.date: 06/09/2023
1313
ms.author: rolyon
1414
ms.reviewer: anandy
1515
ms.custom: oldportal;it-pro;
@@ -128,26 +128,12 @@ Remove-AzureADMSAdministrativeUnitMember -ObjectId $adminUnitId -MemberId $devic
128128
```
129129
## Microsoft Graph API
130130

131-
Use the [Remove a member](/graph/api/administrativeunit-delete-members) API to remove users or groups from an administrative unit.
131+
Use the [Remove a member](/graph/api/administrativeunit-delete-members) API to remove users, groups, or devices from an administrative unit. For `{member-id}`, specify the user, group, or device ID.
132132

133-
Use the [Remove a member (Beta)](/graph/api/administrativeunit-delete-members?view=graph-rest-beta&preserve-view=true) API to remove devices from an administrative unit.
134-
135-
### Remove users from an administrative unit
136-
137-
```http
138-
DELETE https://graph.microsoft.com/v1.0/directory/administrativeUnits/{admin-unit-id}/members/{user-id}/$ref
139-
```
140-
141-
### Remove groups from an administrative unit
142-
143-
```http
144-
DELETE https://graph.microsoft.com/v1.0/directory/administrativeUnits/{admin-unit-id}/members/{group-id}/$ref
145-
```
146-
147-
### Remove devices from an administrative unit
133+
### Remove users, groups, or devices from an administrative unit
148134

149135
```http
150-
DELETE https://graph.microsoft.com/beta/administrativeUnits/{admin-unit-id}/members/{device-id}/$ref
136+
DELETE https://graph.microsoft.com/v1.0/directory/administrativeUnits/{admin-unit-id}/members/{member-id}/$ref
151137
```
152138

153139
## Next steps

0 commit comments

Comments
 (0)