You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/entra/entra-id/users-groups-entra-apis/authorization-requestdenied-403-error-add-user-group.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ When you try to add a user to a group using Microsoft Graph API, you receive the
18
18
```output
19
19
{
20
20
"error": {
21
-
"code": "Authorization\_RequestDenied",
21
+
"code": "Authorization_RequestDenied",
22
22
"message": "Insufficient privileges to complete the operation.",
23
23
"innerError": {
24
24
"date": "2024-05-07T15:39:39",
@@ -33,13 +33,13 @@ When you try to add a user to a group using Microsoft Graph API, you receive the
33
33
34
34
This issue might occur if the group you tried to add the user to can't be managed by Microsoft Graph. Microsoft Graph only supports Microsoft 365 groups and Security groups.
35
35
36
-
For the Microsoft Graph supported group types, see [Working with groups in Microsoft Graph](/graph/api/resources/groups-overview?view=graph-rest-1.0&tabs=http#group-types-in-microsoft-entra-id-and-microsoft-graph)
36
+
For the Microsoft Graph supported group types, see [Working with groups in Microsoft Graph](/graph/api/resources/groups-overview?view=graph-rest-1.0&tabs=http#group-types-in-microsoft-entra-id-and-microsoft-graph).
37
37
38
38
## Solution
39
39
40
40
### Step 1: Check the group type
41
41
42
-
Make sure that the group you're working is supported by Microsoft Graph.
42
+
Make sure that the group you trying to modify is supported by Microsoft Graph.
43
43
44
44
1. In Microsoft Graph, the type of group can be identified by the settings of its `groupTypes`, `mailEnabled`, and `securityEnabled` properties. Use the [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) tool to check the group's attributes:
45
45
@@ -60,13 +60,13 @@ Make sure that the group you're working is supported by Microsoft Graph.
60
60
61
61
```
62
62
63
-
2. Review the following table to verify if the group type is supported by Microsoft Graph API. In the example response, the "Test group A" group is a security group. For more information, see [Working with groups in Microsoft Graph](/graph/api/resources/groups-overview?view=graph-rest-1.0&tabs=http#group-types-in-microsoft-entra-id-and-microsoft-graph).
63
+
2. Review the following table to verify if the group type is supported by Microsoft Graph API. In the example response, the "Test group A" group is a security group. For more information, see [Working with groups in Microsoft Graph](/graph/api/resources/groups-overview).
64
64
65
65
| Type |groupTypes | mailEnabled | securityEnabled | Can be managed by using Microsoft Graph APIs |
66
66
|--|--|--|--|--|
67
-
|[Microsoft 365 groups](#microsoft-365-groups)|`["Unified"]`|`true`|`true` or `false`| Yes |
|[Mail-enabled security groups](/graph/api/resources/groups-overview#security-groups-and-mail-enabled-security-groups)|`[]`|`true`|`true`| No; read-only through Microsoft Graph |
70
70
| Distribution groups |`[]`|`true`|`false`| No; read-only through Microsoft Graph |
71
71
72
72
> [!NOTE]
@@ -86,7 +86,7 @@ For detailed permission requirements, see [Add members documentation](https://le
86
86
**Azure portal**
87
87
88
88
1. In the [Azure portal](https://portal.azure.com), go to **Microsoft Entra ID**, select **Groups**, and then select **All groups**.
89
-
1. Locate the group that you're working on, select **Properties**. Review the **Microsoft Entra role can be assigned to the group** option.
89
+
1. Locate the target group, select **Properties**. Review the **Microsoft Entra role can be assigned to the group** option.
0 commit comments