Skip to content

Commit f8d7bbe

Browse files
committed
Simplify text
1 parent 6795c0d commit f8d7bbe

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/role-based-access-control/conditions-troubleshoot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ You don't meet the prerequisites. To use principal attributes, you must have **a
8282

8383
**Solution**
8484

85-
1. Open **Azure Active Directory** > **Custom security attributes** to see if custom security attributes have been defined and which attribute sets you have access to.
85+
1. Open **Azure Active Directory** > **Custom security attributes**.
8686

8787
If the **Custom security attributes** page is disabled, you don't have an Azure AD Premium P1 or P2 license. Open **Azure Active Directory** > **Overview** and check the license for your tenant.
8888

@@ -102,7 +102,7 @@ You don't meet the prerequisites. To use principal attributes, you must have **a
102102
> [!IMPORTANT]
103103
> By default, [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator) and other administrator roles do not have permissions to read, define, or assign custom security attributes.
104104
105-
1. If custom security attributes haven't been defined yet, assign the [Attribute Definition Administrator](../active-directory/roles/permissions-reference.md#attribute-definition-administrator) role at tenant scope, add an attribute set, and add custom security attributes. For more information, see [Add or deactivate custom security attributes in Azure AD](../active-directory/fundamentals/custom-security-attributes-add.md).
105+
1. If custom security attributes haven't been defined yet, assign the [Attribute Definition Administrator](../active-directory/roles/permissions-reference.md#attribute-definition-administrator) role at tenant scope and add custom security attributes. For more information, see [Add or deactivate custom security attributes in Azure AD](../active-directory/fundamentals/custom-security-attributes-add.md).
106106

107107
When finished, you should be able to read at least one attribute set. **Principal** should now appear in the **Attribute source** list when you add a role assignment with a condition.
108108

0 commit comments

Comments
 (0)