You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/users-groups-roles/directory-assign-admin-roles.md
+25-1Lines changed: 25 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -323,6 +323,10 @@ Users with this role have global permissions within Microsoft Power BI, when the
323
323
> [!NOTE]
324
324
> In Microsoft Graph API, Azure AD Graph API, and Azure AD PowerShell, this role is identified as "Power BI Service Administrator ". It is "Power BI Administrator" in the [Azure portal](https://portal.azure.com).
Users in this role can create and manage all aspects of environments, PowerApps, Flows, Data Loss Prevention policies. Additionally, users with this role have the ability to manage support tickets and monitor service health.
Users with this role can set or reset non-password credentials for all users, including global administrators, and can update passwords for all users. Privileged Authentication Administrators can force users to re-register against existing non-password credential (e.g. MFA, FIDO) and revoke ‘remember MFA on the device’, prompting for MFA on the next login of all users.
@@ -1341,7 +1345,6 @@ Can manage all aspects of the Power BI product.
1341
1345
> This role has additional permissions outside of Azure Active Directory. For more information, see role description above.
1342
1346
>
1343
1347
>
1344
-
1345
1348
|**Actions**|**Description**|
1346
1349
| --- | --- |
1347
1350
| microsoft.azure.serviceHealth/allEntities/allTasks | Read and configure Azure Service Health. |
@@ -1351,6 +1354,26 @@ Can manage all aspects of the Power BI product.
1351
1354
| microsoft.office365.serviceHealth/allEntities/allTasks | Read and configure Office 365 Service Health. |
1352
1355
| microsoft.office365.supportTickets/allEntities/allTasks | Create and manage Office 365 support tickets. |
1353
1356
1357
+
1358
+
### Power Platform Administrator permissions
1359
+
1360
+
Can create and manage all aspects of Microsoft Dynamics 365, PowerApps and Microsoft Flow.
1361
+
1362
+
> [!NOTE]
1363
+
> This role has additional permissions outside of Azure Active Directory. For more information, see role description above.
1364
+
>
1365
+
>
1366
+
|**Actions**|**Description**|
1367
+
| --- | --- |
1368
+
| microsoft.azure.serviceHealth/allEntities/allTasks | Read and configure Azure Service Health. |
1369
+
| microsoft.azure.supportTickets/allEntities/allTasks | Create and manage Azure support tickets. |
1370
+
| microsoft.dynamics365/allEntities/allTasks | Manage all aspects of Dynamics 365. |
1371
+
| microsoft.flow/allEntities/allTasks | Manage all aspects of Microsoft Flow. |
1372
+
| microsoft.powerApps/allEntities/allTasks | Manage all aspects of PowerApps. |
1373
+
| microsoft.office365.webPortal/allEntities/basic/read | Read basic properties on all resources in microsoft.office365.webPortal. |
1374
+
| microsoft.office365.serviceHealth/allEntities/allTasks | Read and configure Office 365 Service Health. |
1375
+
| microsoft.office365.supportTickets/allEntities/allTasks | Create and manage Office 365 support tickets. |
0 commit comments