Skip to content

Commit 2222ab6

Browse files
authored
Merge pull request #25519 from microsoftgraph/rbac-directoryRoles
Entra admin roles - directory roles/templates
2 parents 5b3f49b + 17bf961 commit 2222ab6

16 files changed

+121
-40
lines changed

api-reference/beta/api/directoryroletemplate-get.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,9 @@ Choose the permission or permissions marked as least privileged for this API. Us
2727
<!-- { "blockType": "permissions", "name": "directoryroletemplate_get" } -->
2828
[!INCLUDE [permissions-table](../includes/permissions/directoryroletemplate-get-permissions.md)]
2929

30+
> [!IMPORTANT]
31+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. *Global Reader* is the least privileged role supported for this operation.
32+
3033
## HTTP request
3134
<!-- { "blockType": "ignored" } -->
3235
```http

api-reference/beta/api/directoryroletemplate-list.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,9 @@ Choose the permission or permissions marked as least privileged for this API. Us
2727
<!-- { "blockType": "permissions", "name": "directoryroletemplate_list" } -->
2828
[!INCLUDE [permissions-table](../includes/permissions/directoryroletemplate-list-permissions.md)]
2929

30+
> [!IMPORTANT]
31+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. *Global Reader* is the least privileged role supported for this operation.
32+
3033
## HTTP request
3134
<!-- { "blockType": "ignored" } -->
3235
```http

api-reference/beta/includes/rbac-for-apis/rbac-directory-role-apis-read.md

Lines changed: 38 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -4,41 +4,41 @@ ms.reviewer: msodsrbac
44
ms.topic: include
55
---
66

7-
In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
8-
9-
- User Administrator
10-
- Helpdesk Administrator
11-
- Service Support Administrator
12-
- Billing Administrator
13-
- User
14-
- Mailbox Administrator
15-
- Directory Readers
16-
- Directory Writers
17-
- Application Administrator
18-
- Security Reader
19-
- Security Administrator
20-
- Privileged Role Administrator
21-
- Cloud Application Administrator
22-
- Customer LockBox Access Approver
23-
- Dynamics 365 Administrator
24-
- Power BI Administrator
25-
- Azure Information Protection Administrator
26-
- Desktop Analytics Administrator
27-
- License Administrator
28-
- Microsoft Managed Desktop Administrator
29-
- Authentication Administrator
30-
- Privileged Authentication Administrator
31-
- Teams Communications Administrator
32-
- Teams Communications Support Engineer
33-
- Teams Communications Support Specialist
34-
- Teams Administrator
35-
- Insights Administrator
36-
- Compliance Data Administrator
37-
- Security Operator
38-
- Kaizala Administrator
39-
- Global Reader
40-
- Volume Licensing Business Center User
41-
- Volume Licensing Service Center User
42-
- Modern Commerce Administrator
43-
- Microsoft Store for Business User
44-
- Directory Reviewer
7+
> [!IMPORTANT]
8+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
9+
> - User Administrator
10+
> - Helpdesk Administrator
11+
> - Service Support Administrator
12+
> - Billing Administrator
13+
> - User
14+
> - Mailbox Administrator
15+
> - Directory Readers
16+
> - Directory Writers
17+
> - Application Administrator
18+
> - Security Reader
19+
> - Security Administrator
20+
> - Privileged Role Administrator
21+
> - Cloud Application Administrator
22+
> - Customer LockBox Access Approver
23+
> - Dynamics 365 Administrator
24+
> - Power BI Administrator
25+
> - Azure Information Protection Administrator
26+
> - Desktop Analytics Administrator
27+
> - License Administrator
28+
> - Microsoft Managed Desktop Administrator
29+
> - Authentication Administrator
30+
> - Privileged Authentication Administrator
31+
> - Teams Communications Administrator
32+
> - Teams Communications Support Engineer
33+
> - Teams Communications Support Specialist
34+
> - Teams Administrator
35+
> - Insights Administrator
36+
> - Compliance Data Administrator
37+
> - Security Operator
38+
> - Kaizala Administrator
39+
> - Global Reader
40+
> - Volume Licensing Business Center User
41+
> - Volume Licensing Service Center User
42+
> - Modern Commerce Administrator
43+
> - Microsoft Store for Business User
44+
> - Directory Reviewer

api-reference/beta/includes/rbac-for-apis/rbac-directory-role-apis-write.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,5 +4,6 @@ ms.reviewer: msodsrbac
44
ms.topic: include
55
---
66

7-
In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. *Privileged Role Administrator* is the least privileged role supported for this operation.
7+
> [!IMPORTANT]
8+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. *Privileged Role Administrator* is the least privileged role supported for this operation.
89

api-reference/v1.0/api/directoryrole-delete-member.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2929
<!-- { "blockType": "permissions", "name": "directoryrole_delete_member" } -->
3030
[!INCLUDE [permissions-table](../includes/permissions/directoryrole-delete-member-permissions.md)]
3131

32+
[!INCLUDE [rbac-directory-role-apis-write](../includes/rbac-for-apis/rbac-directory-role-apis-write.md)]
33+
3234
## HTTP request
3335

3436
You can address the directory role using either its **id** or **roleTemplateId**.

api-reference/v1.0/api/directoryrole-delta.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2424
<!-- { "blockType": "permissions", "name": "directoryrole_delta" } -->
2525
[!INCLUDE [permissions-table](../includes/permissions/directoryrole-delta-permissions.md)]
2626

27+
[!INCLUDE [rbac-directory-role-apis-read](../includes/rbac-for-apis/rbac-directory-role-apis-read.md)]
28+
2729
## HTTP request
2830

2931
To begin tracking changes, you make a request including the **delta** function on the [directoryRole](../resources/directoryrole.md) resource.
@@ -43,7 +45,7 @@ You only need to specify any desired query parameters once upfront.
4345
In subsequent requests, copy and apply the `@odata.nextLink` or `@odata.deltaLink` URL from the previous response, as that URL already
4446
includes the encoded, desired parameters.
4547

46-
| Query parameter | Type |Description|
48+
| Query parameter | Type |Description|
4749
|:---------------|:--------|:----------|
4850
| $deltatoken | string | A [state token](/graph/delta-query-overview) returned in the `@odata.deltaLink` URL of the previous **delta** function call for the same resource collection, indicating the completion of that round of change tracking. Save and apply the entire `@odata.deltaLink` URL including this token in the first request of the next round of change tracking for that collection.|
4951
| $skiptoken | string | A [state token](/graph/delta-query-overview) returned in the `@odata.nextLink` URL of the previous **delta** function call, indicating there are further changes to be tracked in the same resource collection. |

api-reference/v1.0/api/directoryrole-get.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2727
<!-- { "blockType": "permissions", "name": "directoryrole_get" } -->
2828
[!INCLUDE [permissions-table](../includes/permissions/directoryrole-get-permissions.md)]
2929

30+
[!INCLUDE [rbac-directory-role-apis-read](../includes/rbac-for-apis/rbac-directory-role-apis-read.md)]
31+
3032
## HTTP request
3133

3234
You can address the directory role using either its **id** or **roleTemplateId**.

api-reference/v1.0/api/directoryrole-list-members.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
3030

3131
[!INCLUDE [limited-info](../../includes/limited-info.md)]
3232

33+
[!INCLUDE [rbac-directory-role-apis-read](../includes/rbac-for-apis/rbac-directory-role-apis-read.md)]
34+
3335
## HTTP request
3436

3537
You can address the directory role using either its **id** or **roleTemplateId**.

api-reference/v1.0/api/directoryrole-list-scopedmembers.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2525
<!-- { "blockType": "permissions", "name": "directoryrole_list_scopedmembers" } -->
2626
[!INCLUDE [permissions-table](../includes/permissions/directoryrole-list-scopedmembers-permissions.md)]
2727

28+
[!INCLUDE [rbac-directory-role-apis-read](../includes/rbac-for-apis/rbac-directory-role-apis-read.md)]
29+
2830
## HTTP request
2931

3032
You can address the directory role using either its **id** or **roleTemplateId**.

api-reference/v1.0/api/directoryrole-list.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2929
<!-- { "blockType": "permissions", "name": "directoryrole_list" } -->
3030
[!INCLUDE [permissions-table](../includes/permissions/directoryrole-list-permissions.md)]
3131

32+
[!INCLUDE [rbac-directory-role-apis-read](../includes/rbac-for-apis/rbac-directory-role-apis-read.md)]
33+
3234
## HTTP request
3335
<!-- { "blockType": "ignored" } -->
3436
```http

0 commit comments

Comments
 (0)