You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Microsoft.Graph module when using [Microsoft Graph PowerShell](/powershell/microsoftgraph/installation)
30
31
31
32
> [!IMPORTANT]
32
33
> By default, [Global Administrator](../roles/permissions-reference.md#global-administrator) and other administrator roles do not have permissions to read, define, or assign custom security attributes.
33
34
34
35
## Step 1: Figure out how to organize your attributes
35
36
36
-
Every custom security attribute must be part of an attribute set. An attribute set is a way to group and manage related custom security attributes. You'll need to figure out how you want to add attributes sets for your organization. For example, you might want to add attribute sets based on departments, teams, or projects. Your ability to grant access to custom security attributes will depend on how you organize your attribute sets.
37
+
Every custom security attribute definition must be part of an attribute set. An attribute set is a way to group and manage related custom security attributes. You'll need to figure out how you want to add attributes sets for your organization. For example, you might want to add attribute sets based on departments, teams, or projects. Your ability to grant access to custom security attributes will depend on how you organize your attribute sets.
37
38
38
39

39
40
@@ -111,7 +112,9 @@ To grant access to the appropriate people, follow these steps to assign one of t
111
112
112
113
### Assign roles at attribute set scope
113
114
114
-
#### Azure portal
115
+
The following examples show how to assign a custom security attribute role to a principal at an attribute set scope named Engineering.
116
+
117
+
# [Portal](#tab/azure-portal)
115
118
116
119
1. Sign in to the [Azure portal](https://portal.azure.com).
117
120
@@ -130,20 +133,20 @@ To grant access to the appropriate people, follow these steps to assign one of t
130
133
> [!NOTE]
131
134
> If you are using Azure AD Privileged Identity Management (PIM), eligible role assignments at attribute set scope currently aren't supported. Permanent role assignments at attribute set scope are supported, but the **Assigned roles** page for a user doesn't list the role assignments.
132
135
133
-
#### PowerShell
136
+
#[PowerShell](#tab/ms-powershell)
134
137
135
-
Use [New-AzureADMSRoleAssignment](/powershell/module/azuread/new-azureadmsroleassignment) to assign the role. The following example assigns the Attribute Assignment Administrator role to a principal with an attribute set scope named Engineering.
Use the [Create unified Role Assignment](/graph/api/rbacapplication-post-roleassignments?view=graph-rest-beta&preserve-view=true) API to assign the role. The following example assigns the Attribute Assignment Administrator role to a principal with an attribute set scope named Engineering.
Use [New-AzureADMSRoleAssignment](/powershell/module/azuread/new-azureadmsroleassignment) to assign the role. For more information, see [Assign Azure AD roles at different scopes](../roles/assign-roles-different-scopes.md).
POST https://graph.microsoft.com/beta/roleManagement/directory/roleAssignments
209
+
Content-type: application/json
179
210
180
-
Use the [Create unified Role Assignment](/graph/api/rbacapplication-post-roleassignments?view=graph-rest-beta&preserve-view=true) API to assign the role. For more information, see [Assign Azure AD roles at different scopes](../roles/assign-roles-different-scopes.md).
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/custom-security-attributes-troubleshoot.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: fundamentals
10
10
ms.workload: identity
11
11
ms.topic: how-to
12
-
ms.date: 02/20/2023
12
+
ms.date: 06/29/2023
13
13
ms.collection: M365-identity-device-management
14
14
---
15
15
@@ -27,7 +27,7 @@ When signed in to the Azure portal as Global Administrator and you try to access
27
27
28
28
**Cause**
29
29
30
-
Custom security attributes requires an Azure AD Premium P1 or P2 license.
30
+
Custom security attributes require an Azure AD Premium P1 or P2 license.
31
31
32
32
**Solution**
33
33
@@ -91,7 +91,7 @@ There are no custom security attributes defined and assigned yet for your tenant
91
91
92
92
**Solution 3**
93
93
94
-
Add and assign custom security attributes to users or enterprise applications. For more information, see [Add or deactivate custom security attributes in Azure AD](custom-security-attributes-add.md), [Assign, update, list, or remove custom security attributes for a user](../enterprise-users/users-custom-security-attributes.md), or [Assign, update, list, or remove custom security attributes for an application](../manage-apps/custom-security-attributes-apps.md).
94
+
Add and assign custom security attributes to users or enterprise applications. For more information, see [Add or deactivate custom security attribute definitions in Azure AD](custom-security-attributes-add.md), [Assign, update, list, or remove custom security attributes for a user](../enterprise-users/users-custom-security-attributes.md), or [Assign, update, list, or remove custom security attributes for an application](../manage-apps/custom-security-attributes-apps.md).
95
95
96
96
## Symptom - Custom security attributes cannot be deleted
97
97
@@ -101,7 +101,7 @@ Currently, you can only activate and deactivate custom security attribute defini
101
101
102
102
**Solution**
103
103
104
-
Deactivate the custom security attributes you no longer need. For more information, see [Add or deactivate custom security attributes in Azure AD](custom-security-attributes-add.md).
104
+
Deactivate the custom security attributes you no longer need. For more information, see [Add or deactivate custom security attribute definitions in Azure AD](custom-security-attributes-add.md).
105
105
106
106
## Symptom - Cannot add a role assignment at an attribute set scope using PIM
To manage custom security attribute assignments for applications in your Azure AD organization, you can use the Microsoft Graph API. Make the following API calls to manage assignments.
270
270
271
-
For other similar Microsoft Graph API examples for users, see [Assign, update, list, or remove custom security attributes for a user](../enterprise-users/users-custom-security-attributes.md#microsoft-graph-api) and [Examples: Assign, update, list, or remove custom security attribute assignments using the Microsoft Graph API](/graph/custom-security-attributes-examples).
271
+
For other similar Microsoft Graph API examples for users, see [Assign, update, list, or remove custom security attributes for a user](../enterprise-users/users-custom-security-attributes.md#powershell-or-microsoft-graph-api) and [Examples: Assign, update, list, or remove custom security attribute assignments using the Microsoft Graph API](/graph/custom-security-attributes-examples).
272
272
273
273
### Assign a custom security attribute with a multi-string value to an application (service principal)
0 commit comments