Skip to content

Commit b4bcb78

Browse files
committed
apply editing changes
1 parent b82973e commit b4bcb78

1 file changed

Lines changed: 10 additions & 10 deletions

File tree

support/entra/entra-id/users-groups-entra-apis/authorization-requestdenied-403-error-add-user-group.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -31,15 +31,15 @@ When you try to add a user to a group using Microsoft Graph API, you receive the
3131

3232
## Cause
3333

34-
This issue might occur if the group you tried to add the use to can't be managed by Microsoft Graph. Microsoft Graph only supports Microsoft 365 groups and Security groups.
34+
This issue might occur if the group you tried to add the user to can't be managed by Microsoft Graph. Microsoft Graph only supports Microsoft 365 groups and Security groups.
3535

3636
For the Microsoft Graph supported group types, see [Working with groups in Microsoft Graph](/graph/api/resources/groups-overview?view=graph-rest-1.0&tabs=http#group-types-in-microsoft-entra-id-and-microsoft-graph)
3737

3838
## Solution
3939

4040
### Step 1: Check the group type
4141

42-
Make sure that the group you are working is supported by Microsoft Graph.
42+
Make sure that the group you're working is supported by Microsoft Graph.
4343

4444
1. In Microsoft Graph, the type of group can be identified by the settings of its `groupTypes`, `mailEnabled`, and `securityEnabled` properties. Use the [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) tool to check the group's attributes:
4545

@@ -62,31 +62,31 @@ Make sure that the group you are working is supported by Microsoft Graph.
6262

6363
2. Review the following table to verify if the group type is supported by Microsoft Graph API. In the example response, the "Test group A" group is a security group. For more information, see [Working with groups in Microsoft Graph](/graph/api/resources/groups-overview?view=graph-rest-1.0&tabs=http#group-types-in-microsoft-entra-id-and-microsoft-graph).
6464

65-
| Type |groupTypes | mailEnabled | securityEnabled | Created and managed via the groups APIs |
65+
| Type |groupTypes | mailEnabled | securityEnabled | Can be managed by using Microsoft Graph APIs |
6666
|--|--|--|--|--|
6767
| [Microsoft 365 groups](#microsoft-365-groups) | `["Unified"]` | `true` | `true` or `false` | Yes |
6868
| [Security groups](#security-groups-and-mail-enabled-security-groups) | `[]` | `false` | `true` | Yes |
6969
| [Mail-enabled security groups](#security-groups-and-mail-enabled-security-groups) | `[]` | `true` | `true` | No; read-only through Microsoft Graph |
7070
| Distribution groups | `[]` | `true` | `false` | No; read-only through Microsoft Graph |
7171

7272
> [!NOTE]
73-
> - Group type cannot be changed after creation. For more information, see [Edit group settings](/entra/fundamentals/how-to-manage-groups#edit-group-settings).
74-
> - Dynamic groups (groupTypes contains "DynamicMembership") cannot have their membership managed via Microsoft Graph.
73+
> - Group type can't be changed after creation. For more information, see [Edit group settings](/entra/fundamentals/how-to-manage-groups#edit-group-settings).
74+
> - Dynamic groups (groupTypes contains "DynamicMembership") can't have their membership managed via Microsoft Graph.
7575
7676
### Step 2: Verify required permissions
7777

7878
Different group member types require specific permissions. For user-type membership, ensure that the application or account performing the operation has the `GroupMember.ReadWrite.All` permission.
7979

80-
Refer to the [Add members documentation](https://learn.microsoft.com/en-us/graph/api/group-post-members?view=graph-rest-1.0&tabs=http) for detailed permission requirements.
80+
For detailed permission requirements, see [Add members documentation](https://learn.microsoft.com/en-us/graph/api/group-post-members?view=graph-rest-1.0&tabs=http)
8181

8282
### Step 3: Check if the group is a role-assignable group
8383

84-
1. Role-assignable groups require additional permissions to manage their members. You can confirm if the group is role-assignable using Azure Portal or Microsoft Graph Explorer:
84+
1. Role-assignable groups require extra permissions to manage their members. You can confirm if the group is role-assignable using Azure Portal or Microsoft Graph Explorer:
8585

86-
**Azure Portal**
86+
**Azure portal**
8787

8888
1. In the [Azure portal](https://portal.azure.com), go to **Microsoft Entra ID**, select **Groups**, and then select **All groups**.
89-
1. Locate the group that you are working on, select **Properties**. Review the **Microsoft Entra role can be assigned to the group** option.
89+
1. Locate the group that you're working on, select **Properties**. Review the **Microsoft Entra role can be assigned to the group** option.
9090

9191
**Microsoft Graph Explorer:**
9292

@@ -108,6 +108,6 @@ Refer to the [Add members documentation](https://learn.microsoft.com/en-us/graph
108108
}
109109
```
110110
111-
2. If the group is role-assignable, you need the `RoleManagement.ReadWrite.Directory` permission in addition to `GroupMember.ReadWrite.All`. Fore more information, see [Add members documentation](/graph/api/group-post-members?view=graph-rest-1.0&tabs=http#permissions).
111+
2. If the group is role-assignable, you need the `RoleManagement.ReadWrite.Directory` permission in addition to `GroupMember.ReadWrite.All`. For more information, see [Add members documentation](/graph/api/group-post-members?view=graph-rest-1.0&tabs=http#permissions).
112112
113113
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]

0 commit comments

Comments
 (0)