Skip to content

Commit c04314b

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 090044a + 0c5d0e5 commit c04314b

File tree

105 files changed

+1194
-1220
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

105 files changed

+1194
-1220
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10248,6 +10248,11 @@
1024810248
"redirect_url": "/azure/azure-portal/azure-portal-supported-browsers-devices",
1024910249
"redirect_document_id": true
1025010250
},
10251+
{
10252+
"source_path_from_root": "/articles/azure-portal/original-preferences.md",
10253+
"redirect_url": "/azure/azure-portal/set-preferences",
10254+
"redirect_document_id": true
10255+
},
1025110256
{
1025210257
"source_path_from_root": "/articles/azure-portal/admin-timeout.md",
1025310258
"redirect_url": "/azure/azure-portal/set-preferences#change-the-directory-timeout-setting-admin",

articles/active-directory/enterprise-users/groups-self-service-management.md

Lines changed: 2 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: enterprise-users
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 07/27/2021
13+
ms.date: 03/22/2022
1414
ms.author: curtand
1515
ms.reviewer: krbain
1616
ms.custom: "it-pro;seo-update-azuread-jan"
@@ -40,7 +40,7 @@ Groups created in | Security group default behavior | Microsoft 365 group defaul
4040

4141
## Make a group available for user self-service
4242

43-
1. Sign in to the [Azure AD admin center](https://aad.portal.azure.com) with an account that's been assigned the Global Administrator or Privileged Role Administrator role for the directory.
43+
1. Sign in to the [Azure portal](https://portal.azure.com) or [Azure AD admin center](https://aad.portal.azure.com) with an account that's been assigned the Global Administrator or Privileged Role Administrator role for the directory.
4444

4545
1. Select **Groups**, and then select **General** settings.
4646

@@ -71,9 +71,6 @@ The group settings enable to control who can create security and Microsoft 365 g
7171

7272
![Azure Active Directory security groups setting change.](./media/groups-self-service-management/security-groups-setting.png)
7373

74-
> [!NOTE]
75-
> The behavior of these settings recently changed. Make sure these settings are configured for your organization. For more information, see [Why were the group settings changed?](#why-were-the-group-settings-changed).
76-
7774
The following table helps you decide which values to choose.
7875

7976
| Setting | Value | Effect on your tenant |
@@ -89,12 +86,6 @@ Here are some additional details about these group settings.
8986
- If you want to enable some, but not all, of your users to create groups, you can assign those users a role that can create groups, such as [Groups Administrator](../roles/permissions-reference.md#groups-administrator).
9087
- These settings are for users and don't impact service principals. For example, if you have a service principal with permissions to create groups, even if you set these settings to **No**, the service principal will still be able to create groups.
9188

92-
### Why were the group settings changed?
93-
94-
The previous implementation of the group settings were named **Users can create security groups in Azure portals** and **Users can create Microsoft 365 groups in Azure portals**. The previous settings only controlled group creation in Azure portals and did not apply to API or PowerShell. The new settings control group creation in Azure portals, as well as, API and PowerShell. The new settings are more secure.
95-
96-
The default values for the new settings have been set to your previous API or PowerShell values. There is a possibility that the default values for the new settings are different than your previous values that controlled only the Azure portal behavior. Starting in May 2021, there was a transition period of a few weeks where you could select your preferred default value before the new settings took effect. Now that the new settings have taken effect, you are required to verify the new settings are configured for your organization.
97-
9889
## Next steps
9990

10091
These articles provide additional information on Azure Active Directory.

articles/active-directory/roles/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -114,6 +114,8 @@
114114
href: custom-enterprise-app-permissions.md
115115
- name: App consent permissions
116116
href: custom-consent-permissions.md
117+
- name: Device management permissions
118+
href: custom-device-permissions.md
117119
- name: Group management permissions
118120
href: custom-group-permissions.md
119121
- name: Azure AD service limits

articles/active-directory/roles/admin-units-assign-roles.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.topic: how-to
1010
ms.subservice: roles
1111
ms.workload: identity
12-
ms.date: 03/07/2022
12+
ms.date: 03/22/2022
1313
ms.author: rolyon
1414
ms.reviewer: anandy
1515
ms.custom: oldportal;it-pro;
@@ -41,6 +41,7 @@ The following Azure AD roles can be assigned with administrative unit scope:
4141
| Role | Description |
4242
| -----| ----------- |
4343
| [Authentication Administrator](permissions-reference.md#authentication-administrator) | Has access to view, set, and reset authentication method information for any non-admin user in the assigned administrative unit only. |
44+
| [Cloud Device Administrator](permissions-reference.md#cloud-device-administrator) | Limited access to manage devices in Azure AD. |
4445
| [Groups Administrator](permissions-reference.md#groups-administrator) | Can manage all aspects of groups in the assigned administrative unit only. |
4546
| [Helpdesk Administrator](permissions-reference.md#helpdesk-administrator) | Can reset passwords for non-administrators in the assigned administrative unit only. |
4647
| [License Administrator](permissions-reference.md#license-administrator) | Can assign, remove, and update license assignments within the administrative unit only. |

articles/active-directory/roles/admin-units-faq-troubleshoot.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ metadata:
1010
ms.topic: faq
1111
ms.subservice: roles
1212
ms.workload: identity
13-
ms.date: 11/04/2020
13+
ms.date: 03/22/2022
1414
ms.author: rolyon
1515
ms.reviewer: anandy
1616
ms.custom: oldportal;it-pro;
@@ -35,7 +35,7 @@ sections:
3535
- question: |
3636
I just added (or removed) a member of the administrative unit. Why is the member not showing up (or still showing up) on the user interface?
3737
answer: |
38-
Sometimes, the addition or removal of one or more members of an administrative unit might take a few minutes to be reflected on the **Administrative units** pane. Alternatively, you can go directly to the associated resource's properties and see whether the action has been completed. For more information about users and groups in administrative units, see [List users or groups in an administrative unit](admin-units-members-list.md).
38+
Sometimes, the addition or removal of one or more members of an administrative unit might take a few minutes to be reflected on the **Administrative units** pane. Alternatively, you can go directly to the associated resource's properties and see whether the action has been completed. For more information about members in administrative units, see [List users, groups, or devices in an administrative unit](admin-units-members-list.md).
3939
4040
- question: |
4141
I am a delegated Password Administrator on an administrative unit. Why am I unable to reset a specific user's password?
@@ -57,7 +57,7 @@ sections:
5757
Adding a group to an administrative unit brings the group itself into the management scope of any *User Administrator* who is also scoped to that administrative unit. User administrators for the administrative unit can manage the name and membership of the group itself. It does not grant the *User Administrator* permissions to manage the users of the group (for example, to reset their passwords). To grant the *User Administrator* the ability to manage users, the users have to be direct members of the administrative unit.
5858
5959
- question: |
60-
Can a resource (user or group) be a member of more than one administrative unit?
60+
Can a resource (user, group, or device) be a member of more than one administrative unit?
6161
answer: |
6262
Yes, a resource can be a member of more than one administrative unit. The resource can be managed by all organization-wide and administrative unit-scoped administrators who have permissions over the resource.
6363

articles/active-directory/roles/admin-units-manage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.topic: how-to
1010
ms.subservice: roles
1111
ms.workload: identity
12-
ms.date: 03/03/2022
12+
ms.date: 03/22/2022
1313
ms.author: rolyon
1414
ms.reviewer: anandy
1515
ms.custom: oldportal;it-pro;
@@ -128,5 +128,5 @@ DELETE https://graph.microsoft.com/v1.0/directory/administrativeUnits/{admin-uni
128128

129129
## Next steps
130130

131-
- [Add users or groups to an administrative unit](admin-units-members-add.md)
131+
- [Add users, groups, or devices to an administrative unit](admin-units-members-add.md)
132132
- [Assign Azure AD roles with administrative unit scope](admin-units-assign-roles.md)

articles/active-directory/roles/admin-units-members-add.md

Lines changed: 65 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Add users or groups to an administrative unit - Azure Active Directory
3-
description: Add users or groups to an administrative unit in Azure Active Directory
2+
title: Add users, groups, or devices to an administrative unit - Azure Active Directory
3+
description: Add users, groups, or devices to an administrative unit in Azure Active Directory
44
services: active-directory
55
documentationcenter: ''
66
author: rolyon
@@ -9,62 +9,77 @@ ms.service: active-directory
99
ms.topic: how-to
1010
ms.subservice: roles
1111
ms.workload: identity
12-
ms.date: 01/14/2022
12+
ms.date: 03/22/2022
1313
ms.author: rolyon
1414
ms.reviewer: anandy
1515
ms.custom: oldportal;it-pro;
1616
ms.collection: M365-identity-device-management
1717
---
1818

19-
# Add users or groups to an administrative unit
19+
# Add users, groups, or devices to an administrative unit
2020

21-
In Azure Active Directory (Azure AD), you can add users or groups to an administrative unit to restrict the scope of role permissions. For additional details on what scoped administrators can do, see [Administrative units in Azure Active Directory](administrative-units.md).
21+
> [!IMPORTANT]
22+
> Administrative units support for devices is currently in PREVIEW.
23+
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
24+
25+
In Azure Active Directory (Azure AD), you can add users, groups, or devices to an administrative unit to restrict the scope of role permissions. For additional details on what scoped administrators can do, see [Administrative units in Azure Active Directory](administrative-units.md).
2226

2327
## Prerequisites
2428

2529
- Azure AD Premium P1 or P2 license for each administrative unit administrator
2630
- Azure AD Free licenses for administrative unit members
2731
- Privileged Role Administrator or Global Administrator
2832
- AzureAD module when using PowerShell
33+
- AzureADPreview module when using PowerShell for devices
2934
- Admin consent when using Graph explorer for Microsoft Graph API
3035

3136
For more information, see [Prerequisites to use PowerShell or Graph Explorer](prerequisites.md).
3237

3338
## Azure portal
3439

35-
You can add users or groups to administrative units using the Azure portal. You can also add users in a bulk operation.
40+
You can add users, groups, or devices to administrative units using the Azure portal. You can also add users in a bulk operation.
3641

37-
### Add a single user or group to administrative units
42+
### Add a single user, group, or device to administrative units
3843

3944
1. Sign in to the [Azure portal](https://portal.azure.com) or [Azure AD admin center](https://aad.portal.azure.com).
4045

4146
1. Select **Azure Active Directory**.
4247

43-
1. Select **Users** or **Groups** and then select the user or group you want to add to an administrative unit.
48+
1. Select one of the following:
49+
50+
- **Users**
51+
- **Groups**
52+
- **Devices** > **All devices**
53+
54+
1. Select the user, group, or device you want to add to administrative units.
4455

4556
1. Select **Administrative units**.
4657

4758
1. Select **Assign to administrative unit**.
4859

4960
1. In the **Select** pane, select the administrative units and then select **Select**.
5061

51-
![Screenshot of the "Administrative units" pane for assigning a user to an administrative unit.](./media/admin-units-members-add/assign-users-individually.png)
62+
![Screenshot of the Administrative units page for adding a user to an administrative unit.](./media/admin-units-members-add/assign-users-individually.png)
5263

53-
### Add users or groups to a single administrative unit
64+
### Add users, groups, or devices to a single administrative unit
5465

5566
1. Sign in to the [Azure portal](https://portal.azure.com) or [Azure AD admin center](https://aad.portal.azure.com).
5667

5768
1. Select **Azure Active Directory**.
5869

59-
1. Select **Administrative units** and then select the administrative unit that you want to add users or groups to.
70+
1. Select **Administrative units** and then select the administrative unit that you want to add users, groups, or devices to.
71+
72+
1. Select one of the following:
6073

61-
1. Select **Users** or **Groups**.
74+
- **Users**
75+
- **Groups**
76+
- **Devices**
6277

63-
1. Select **Add member** or **Add**.
78+
1. Select **Add member**, **Add**, or **Add device**.
6479

65-
1. In the **Select** pane, select the users or groups you want to add to the administrative unit and then select **Select**.
80+
1. In the **Select** pane, select the users, groups, or devices you want to add to the administrative unit and then select **Select**.
6681

67-
![Screenshot of the administrative unit "Users" pane for assigning a user to an administrative unit.](./media/admin-units-members-add/assign-to-admin-unit.png)
82+
![Screenshot of adding multiple devices to an administrative unit.](./media/admin-units-members-add/admin-unit-members-add.png)
6883

6984
### Add users to an administrative unit in a bulk operation
7085

@@ -78,7 +93,7 @@ You can add users or groups to administrative units using the Azure portal. You
7893

7994
1. Select **Users** > **Bulk operations** > **Bulk add members**.
8095

81-
![Screenshot of the "Users" pane for assigning users to an administrative unit as a bulk operation.](./media/admin-units-members-add/bulk-assign-to-admin-unit.png)
96+
![Screenshot of the Users page for assigning users to an administrative unit as a bulk operation.](./media/admin-units-members-add/bulk-assign-to-admin-unit.png)
8297

8398
1. In the **Bulk add members** pane, download the comma-separated values (CSV) template.
8499

@@ -96,6 +111,8 @@ You can add users or groups to administrative units using the Azure portal. You
96111

97112
Use the [Add-AzureADMSAdministrativeUnitMember](/powershell/module/azuread/add-azureadmsadministrativeunitmember) command to add users or groups to an administrative unit.
98113

114+
Use the [Add-AzureADMSAdministrativeUnitMember (Preview)](/powershell/module/azuread/add-azureadmsadministrativeunitmember?view=azureadps-2.0-preview&preserve-view=true) command to add devices to an administrative unit.
115+
99116
### Add users to an administrative unit
100117

101118
```powershell
@@ -112,10 +129,21 @@ $groupObj = Get-AzureADGroup -Filter "displayname eq 'TestGroup'"
112129
Add-AzureADMSAdministrativeUnitMember -Id $adminUnitObj.Id -RefObjectId $groupObj.ObjectId
113130
```
114131

132+
### Add devices to an administrative unit
133+
134+
```powershell
135+
$adminUnitObj = Get-AzureADMSAdministrativeUnit -Filter "displayname eq 'Test administrative unit 2'"
136+
$deviceObj = Get-AzureADDevice -Filter "displayname eq 'TestDevice'"
137+
Add-AzureADMSAdministrativeUnitMember -Id $adminUnitObj.Id -RefObjectId $deviceObj.ObjectId
138+
```
139+
115140
## Microsoft Graph API
116141

117142
Use the [Add a member](/graph/api/administrativeunit-post-members) API to add users or groups to an administrative unit.
118143

144+
Use the [Add a member (Beta)](/graph/api/administrativeunit-post-members?view=graph-rest-beta&preserve-view=true) API to add devices to an administrative unit.
145+
146+
119147
### Add users to an administrative unit
120148

121149
Request
@@ -128,15 +156,15 @@ Body
128156

129157
```http
130158
{
131-
"@odata.id":"https://graph.microsoft.com/v1.0/users/{user-id}"
159+
"@odata.id":"https://graph.microsoft.com/v1.0/users/{user-id}"
132160
}
133161
```
134162

135163
Example
136164

137165
```http
138166
{
139-
"@odata.id":"https://graph.microsoft.com/v1.0/users/[email protected]"
167+
"@odata.id":"https://graph.microsoft.com/v1.0/users/[email protected]"
140168
}
141169
```
142170

@@ -152,20 +180,36 @@ Body
152180

153181
```http
154182
{
155-
"@odata.id":"https://graph.microsoft.com/v1.0/groups/{group-id}"
183+
"@odata.id":"https://graph.microsoft.com/v1.0/groups/{group-id}"
156184
}
157185
```
158186

159187
Example
160188

161189
```http
162190
{
163-
"@odata.id":"https://graph.microsoft.com/v1.0/groups/871d21ab-6b4e-4d56-b257-ba27827628f3"
191+
"@odata.id":"https://graph.microsoft.com/v1.0/groups/871d21ab-6b4e-4d56-b257-ba27827628f3"
192+
}
193+
```
194+
195+
### Add devices to an administrative unit
196+
197+
Request
198+
199+
```http
200+
POST https://graph.microsoft.com/beta/administrativeUnits/{admin-unit-id}/members/$ref
201+
```
202+
203+
Body
204+
205+
```http
206+
{
207+
"@odata.id":"https://graph.microsoft.com/beta/devices/{device-id}"
164208
}
165209
```
166210

167211
## Next steps
168212

169213
- [Administrative units in Azure Active Directory](administrative-units.md)
170214
- [Assign Azure AD roles with administrative unit scope](admin-units-assign-roles.md)
171-
- [Remove users or groups from an administrative unit](admin-units-members-remove.md)
215+
- [Remove users, groups, or devices from an administrative unit](admin-units-members-remove.md)

0 commit comments

Comments
 (0)