Skip to content

Commit 6e3133c

Browse files
committed
Entra admin roles - CSAs
1 parent 32f3a05 commit 6e3133c

5 files changed

+31
-27
lines changed

api-reference/beta/includes/rbac-for-apis/rbac-customsecurityattibutes-apis-definition-assignment-read.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@ author: CecilyK
33
ms.topic: include
44
---
55

6-
In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following privileged roles are supported for this operation.
7-
8-
+ Attribute Assignment Reader
9-
+ Attribute Definition Reader
10-
+ Attribute Assignment Administrator
11-
+ Attribute Definition Administrator
12-
13-
By default, *Global Administrator* and other administrator roles don't have permissions to read, define, or assign custom security attributes.
6+
> [!IMPORTANT]
7+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following privileged roles are supported for this operation.
8+
> - Attribute Assignment Reader
9+
> - Attribute Definition Reader
10+
> - Attribute Assignment Administrator
11+
> - Attribute Definition Administrator
12+
>
13+
> By default, *Global Administrator* and other administrator roles don't have permissions to read, define, or assign custom security attributes.

api-reference/beta/includes/rbac-for-apis/rbac-customsecurityattibutes-apis-write.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ author: CecilyK
33
ms.topic: include
44
---
55

6-
In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. *Attribute Definition Administrator* is the only privileged role supported for this operation.
7-
8-
By default, *Global Administrator* and other administrator roles don't have permissions to read, define, or assign custom security attributes.
6+
> [!IMPORTANT]
7+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. *Attribute Definition Administrator* is the only privileged role supported for this operation.
8+
>
9+
> By default, *Global Administrator* and other administrator roles don't have permissions to read, define, or assign custom security attributes.

api-reference/beta/includes/rbac-for-apis/rbac-customsecurityattibutes-audit-apis-read.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,10 @@
22
author: rolyon
33
ms.topic: include
44
---
5-
In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following privileged roles are supported for this operation.
65

7-
- Attribute Log Reader
8-
- Attribute Log Administrator
9-
10-
By default, Global Administrator and other administrator roles do not have permissions to read custom security attribute audit logs.
6+
> [!IMPORTANT]
7+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following privileged roles are supported for this operation.
8+
> - Attribute Log Reader
9+
> - Attribute Log Administrator
10+
>
11+
> By default, Global Administrator and other administrator roles do not have permissions to read custom security attribute audit logs.

api-reference/v1.0/includes/rbac-for-apis/rbac-customsecurityattibutes-apis-definition-assignment-read.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,12 @@ author: CecilyK
33
ms.topic: include
44
---
55

6-
In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following privileged roles are supported for this operation.
7-
8-
+ Attribute Assignment Reader
9-
+ Attribute Definition Reader
10-
+ Attribute Assignment Administrator
11-
+ Attribute Definition Administrator
12-
13-
By default, *Global Administrator* and other administrator roles don't have permissions to read, define, or assign custom security attributes.
6+
> [!IMPORTANT]
7+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following privileged roles are supported for this operation.
8+
>
9+
> - Attribute Assignment Reader
10+
> - Attribute Definition Reader
11+
> - Attribute Assignment Administrator
12+
> - Attribute Definition Administrator
13+
>
14+
> By default, *Global Administrator* and other administrator roles don't have permissions to read, define, or assign custom security attributes.

api-reference/v1.0/includes/rbac-for-apis/rbac-customsecurityattibutes-apis-write.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ author: CecilyK
33
ms.topic: include
44
---
55

6-
In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. *Attribute Definition Administrator* is the only privileged role supported for this operation.
7-
8-
By default, *Global Administrator* and other administrator roles don't have permissions to read, define, or assign custom security attributes.
6+
> [!IMPORTANT]
7+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. *Attribute Definition Administrator* is the only privileged role supported for this operation.
8+
>
9+
> By default, *Global Administrator* and other administrator roles don't have permissions to read, define, or assign custom security attributes.

0 commit comments

Comments
 (0)