Skip to content

Commit 459b604

Browse files
committed
updates
1 parent e8be548 commit 459b604

1 file changed

Lines changed: 4 additions & 12 deletions

File tree

memdocs/intune/fundamentals/multi-admin-approval.md

Lines changed: 4 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: brenduns
99
ms.author: brenduns
1010
manager: dougeby
11-
ms.date: 08/15/2022
11+
ms.date: 08/17/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: fundamentals
@@ -44,15 +44,7 @@ Access policies are supported for the following resources:
4444

4545
## Prerequisites for access policies and approvers
4646

47-
To create an access policy, your account must have the following Intune role-based access control permissions:
48-
49-
- Group-*PENDING*
50-
- Explicit permission-*PENDING*
51-
52-
By default, the following Azure and Intune roles include these permissions:
53-
54-
- Azure Global Administrator
55-
- Intune Service Administrator
47+
To create an access policy, your account must be assigned the *Intune Service Administrator* or *Azure Global Administrator* role.
5648

5749
To be an approver, an account must be in the group that’s assigned to the access policy for a specific type of resource.
5850

@@ -129,8 +121,8 @@ You can cancel a request before it’s approved by selecting it from the My requ
129121
- Approved – This request is being processed by Intune.
130122
- Completed – This request has been successfully applied.
131123
- Rejected – This request was rejected by an approver.
132-
- Cancelled – This request was cancelled by the admin who submitted it.
124+
- Canceled – This request was canceled by the admin who submitted it.
133125

134126
## Next steps
135127

136-
128+
Manage [role-based access control](../fundamentals/role-based-access-control)

0 commit comments

Comments
 (0)