You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/entra/entra-id/users-groups-entra-apis/authorization-requestdenied-403-error-add-user-group.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,15 +31,15 @@ When you try to add a user to a group using Microsoft Graph API, you receive the
31
31
32
32
## Cause
33
33
34
-
This issue might occur if the group you tried to add the use to can't be managed by Microsoft Graph. Microsoft Graph only supports Microsoft 365 groups and Security groups.
34
+
This issue might occur if the group you tried to add the user to can't be managed by Microsoft Graph. Microsoft Graph only supports Microsoft 365 groups and Security groups.
35
35
36
36
For the Microsoft Graph supported group types, see [Working with groups in Microsoft Graph](/graph/api/resources/groups-overview?view=graph-rest-1.0&tabs=http#group-types-in-microsoft-entra-id-and-microsoft-graph)
37
37
38
38
## Solution
39
39
40
40
### Step 1: Check the group type
41
41
42
-
Make sure that the group you are working is supported by Microsoft Graph.
42
+
Make sure that the group you're working is supported by Microsoft Graph.
43
43
44
44
1. In Microsoft Graph, the type of group can be identified by the settings of its `groupTypes`, `mailEnabled`, and `securityEnabled` properties. Use the [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) tool to check the group's attributes:
45
45
@@ -62,31 +62,31 @@ Make sure that the group you are working is supported by Microsoft Graph.
62
62
63
63
2. Review the following table to verify if the group type is supported by Microsoft Graph API. In the example response, the "Test group A" group is a security group. For more information, see [Working with groups in Microsoft Graph](/graph/api/resources/groups-overview?view=graph-rest-1.0&tabs=http#group-types-in-microsoft-entra-id-and-microsoft-graph).
64
64
65
-
| Type |groupTypes | mailEnabled | securityEnabled |Created and managed via the groups APIs |
65
+
| Type |groupTypes | mailEnabled | securityEnabled |Can be managed by using Microsoft Graph APIs |
66
66
|--|--|--|--|--|
67
67
|[Microsoft 365 groups](#microsoft-365-groups)|`["Unified"]`|`true`|`true` or `false`| Yes |
|[Mail-enabled security groups](#security-groups-and-mail-enabled-security-groups)|`[]`|`true`|`true`| No; read-only through Microsoft Graph |
70
70
| Distribution groups |`[]`|`true`|`false`| No; read-only through Microsoft Graph |
71
71
72
72
> [!NOTE]
73
-
> - Group type cannot be changed after creation. For more information, see [Edit group settings](/entra/fundamentals/how-to-manage-groups#edit-group-settings).
74
-
> - Dynamic groups (groupTypes contains "DynamicMembership") cannot have their membership managed via Microsoft Graph.
73
+
> - Group type can't be changed after creation. For more information, see [Edit group settings](/entra/fundamentals/how-to-manage-groups#edit-group-settings).
74
+
> - Dynamic groups (groupTypes contains "DynamicMembership") can't have their membership managed via Microsoft Graph.
75
75
76
76
### Step 2: Verify required permissions
77
77
78
78
Different group member types require specific permissions. For user-type membership, ensure that the application or account performing the operation has the `GroupMember.ReadWrite.All` permission.
79
79
80
-
Refer to the [Add members documentation](https://learn.microsoft.com/en-us/graph/api/group-post-members?view=graph-rest-1.0&tabs=http)for detailed permission requirements.
80
+
For detailed permission requirements, see [Add members documentation](https://learn.microsoft.com/en-us/graph/api/group-post-members?view=graph-rest-1.0&tabs=http)
81
81
82
82
### Step 3: Check if the group is a role-assignable group
83
83
84
-
1. Role-assignable groups require additional permissions to manage their members. You can confirm if the group is role-assignable using Azure Portal or Microsoft Graph Explorer:
84
+
1. Role-assignable groups require extra permissions to manage their members. You can confirm if the group is role-assignable using Azure Portal or Microsoft Graph Explorer:
85
85
86
-
**Azure Portal**
86
+
**Azure portal**
87
87
88
88
1. In the [Azure portal](https://portal.azure.com), go to **Microsoft Entra ID**, select **Groups**, and then select **All groups**.
89
-
1. Locate the group that you are working on, select **Properties**. Review the **Microsoft Entra role can be assigned to the group** option.
89
+
1. Locate the group that you're working on, select **Properties**. Review the **Microsoft Entra role can be assigned to the group** option.
90
90
91
91
**Microsoft Graph Explorer:**
92
92
@@ -108,6 +108,6 @@ Refer to the [Add members documentation](https://learn.microsoft.com/en-us/graph
108
108
}
109
109
```
110
110
111
-
2. If the group is role-assignable, you need the `RoleManagement.ReadWrite.Directory` permission in addition to `GroupMember.ReadWrite.All`. Fore more information, see [Add members documentation](/graph/api/group-post-members?view=graph-rest-1.0&tabs=http#permissions).
111
+
2. If the group is role-assignable, you need the `RoleManagement.ReadWrite.Directory` permission in addition to `GroupMember.ReadWrite.All`. For more information, see [Add members documentation](/graph/api/group-post-members?view=graph-rest-1.0&tabs=http#permissions).
112
112
113
113
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]
0 commit comments