Skip to content

Commit 9f5999d

Browse files
#ATCP - Update
Sensitive attributes of members of the Role assignable groups can only be modified by GA or Privileged Admins. This is different from direct assignment and should be called out in this document
1 parent 91c1194 commit 9f5999d

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/active-directory/roles/groups-concept.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ Role-assignable groups are designed to help prevent potential breaches by having
5151
- The membership type for role-assignable groups must be Assigned and can't be an Azure AD dynamic group. Automated population of dynamic groups could lead to an unwanted account being added to the group and thus assigned to the role.
5252
- By default, only Global Administrators and Privileged Role Administrators can manage the membership of a role-assignable group, but you can delegate the management of role-assignable groups by adding group owners.
5353
- RoleManagement.ReadWrite.Directory Microsoft Graph permission is required to be able to manage the membership of such groups; Group.ReadWrite.All won't work.
54-
- To prevent elevation of privilege, only a Privileged Authentication Administrator or a Global Administrator can change the credentials or reset MFA for members and owners of a role-assignable group.
54+
- To prevent elevation of privilege, only a Privileged Authentication Administrator or a Global Administrator can change the credentials or reset MFA or modify sensitive attributes for members and owners of a role-assignable group.
5555
- Group nesting is not supported. A group can't be added as a member of a role-assignable group.
5656

5757
## Use PIM to make a group eligible for a role assignment

0 commit comments

Comments
 (0)