Skip to content

Commit af0c185

Browse files
committed
per Jeremy
1 parent 517af7b commit af0c185

File tree

1 file changed

+1
-2
lines changed

1 file changed

+1
-2
lines changed

articles/active-directory/roles/groups-concept.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,6 @@ Role-assignable groups have the following restrictions:
3838
- The `isAssignableToRole` property is **immutable**. Once a group is created with this property set, it can't be changed.
3939
- You can't make an existing group a role-assignable group.
4040
- A maximum of 500 role-assignable groups can be created in a single Azure AD organization (tenant).
41-
- You can't assign licenses to a role-assignable group.
4241

4342
## How are role-assignable groups protected?
4443

@@ -53,7 +52,7 @@ Role-assignable groups are designed to help prevent potential breaches by having
5352
- By default, only Global Administrators and Privileged Role Administrators can manage the membership of a role-assignable group, but you can delegate the management of role-assignable groups by adding group owners.
5453
- For Microsoft Graph, the *RoleManagement.ReadWrite.Directory* permission is required to be able to manage the membership of role-assignable groups. The *Group.ReadWrite.All* permission won't work.
5554
- To prevent elevation of privilege, only a Privileged Authentication Administrator or a Global Administrator can change the credentials or reset MFA or modify sensitive attributes for members and owners of a role-assignable group.
56-
- Group nesting is not supported. A group can't be added as a member of a role-assignable group.
55+
- Group nesting is not supported.
5756

5857
## Use PIM to make a group eligible for a role assignment
5958

0 commit comments

Comments
 (0)