Skip to content

Commit b6b053c

Browse files
committed
Update rbac-directory-role-apis-read.md
1 parent 76b7eaf commit b6b053c

File tree

1 file changed

+44
-44
lines changed

1 file changed

+44
-44
lines changed
Lines changed: 44 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -1,44 +1,44 @@
1-
---
2-
author: DougKirschner
3-
ms.reviewer: msodsrbac
4-
ms.topic: include
5-
---
6-
7-
> [!IMPORTANT]
8-
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
9-
> - User Administrator
10-
> - Helpdesk Administrator
11-
> - Service Support Administrator
12-
> - Billing Administrator
13-
> - User
14-
> - Mailbox Administrator
15-
> - Directory Readers
16-
> - Directory Writers
17-
> - Application Administrator
18-
> - Security Reader
19-
> - Security Administrator
20-
> - Privileged Role Administrator
21-
> - Cloud Application Administrator
22-
> - Customer LockBox Access Approver
23-
> - Dynamics 365 Administrator
24-
> - Power BI Administrator
25-
> - Azure Information Protection Administrator
26-
> - Desktop Analytics Administrator
27-
> - License Administrator
28-
> - Microsoft Managed Desktop Administrator
29-
> - Authentication Administrator
30-
> - Privileged Authentication Administrator
31-
> - Teams Communications Administrator
32-
> - Teams Communications Support Engineer
33-
> - Teams Communications Support Specialist
34-
> - Teams Administrator
35-
> - Insights Administrator
36-
> - Compliance Data Administrator
37-
> - Security Operator
38-
> - Kaizala Administrator
39-
> - Global Reader
40-
> - Volume Licensing Business Center User
41-
> - Volume Licensing Service Center User
42-
> - Modern Commerce Administrator
43-
> - Microsoft Store for Business User
44-
> - Directory Reviewer
1+
---
2+
author: DougKirschner
3+
ms.reviewer: msodsrbac
4+
ms.topic: include
5+
---
6+
7+
> [!IMPORTANT]
8+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
9+
> - User Administrator
10+
> - Helpdesk Administrator
11+
> - Service Support Administrator
12+
> - Billing Administrator
13+
> - User
14+
> - Mailbox Administrator
15+
> - Directory Readers
16+
> - Directory Writers
17+
> - Application Administrator
18+
> - Security Reader
19+
> - Security Administrator
20+
> - Privileged Role Administrator
21+
> - Cloud Application Administrator
22+
> - Customer LockBox Access Approver
23+
> - Dynamics 365 Administrator
24+
> - Power BI Administrator
25+
> - Azure Information Protection Administrator
26+
> - Desktop Analytics Administrator
27+
> - License Administrator
28+
> - Microsoft Managed Desktop Administrator
29+
> - Authentication Administrator
30+
> - Privileged Authentication Administrator
31+
> - Teams Communications Administrator
32+
> - Teams Communications Support Engineer
33+
> - Teams Communications Support Specialist
34+
> - Teams Administrator
35+
> - Insights Administrator
36+
> - Compliance Data Administrator
37+
> - Security Operator
38+
> - Kaizala Administrator
39+
> - Global Reader
40+
> - Volume Licensing Business Center User
41+
> - Volume Licensing Service Center User
42+
> - Modern Commerce Administrator
43+
> - Microsoft Store for Business User
44+
> - Directory Reviewer

0 commit comments

Comments
 (0)