Share via


Add-AipServiceRoleBasedAdministrator

Grants administrative rights to Azure Information Protection.

Syntax

Add-AipServiceRoleBasedAdministrator
   [-ObjectId <Guid>]
   [-Role <Role>]
   [<CommonParameters>]
Add-AipServiceRoleBasedAdministrator
   [-SecurityGroupDisplayName <String>]
   [-Role <Role>]
   [<CommonParameters>]
Add-AipServiceRoleBasedAdministrator
   [-EmailAddress <String>]
   [-Role <Role>]
   [<CommonParameters>]

Description

The Add-AipServiceRoleBasedAdministrator cmdlet grants administrative rights to the protection service from Azure Information Protection, so that administrators you delegate to configure this service can do so by using PowerShell commands.

You must use PowerShell to configure delegated administrative control for the protection service; you cannot do this configuration by using a management portal.

When you run this cmdlet, you can specify a user or a group in Azure AD, and you can run the cmdlet multiple times to add new users and new groups. To see the full list, use Get-AipServiceRoleBasedAdministrator.

If you specify a group, it can be any group in Azure AD and does not need to be mail-enabled. To specify a group that is not mail-enabled, use either the SecurityGroupDisplayName parameter, or the ObjectId parameter. You can also use these parameters or the EmailAddress parameter for a mail-enabled group.

For more information about the user and group requirements, see Preparing users and groups for Azure Information Protection. This information includes how to identify the different group types and how to find the values to specify them when you run this cmdlet.

After delegating control to other administrators, they might find it useful to reference a list of the cmdlets they can run, grouped by administrative task. For this information, see Administering the protection service by using PowerShell.

Note that these administrative roles are separate from the Azure Active Directory admin roles or Office 365 admin roles.

Examples

Example 1: Grant administrative rights by using a display name

PS C:\>Add-AipServiceRoleBasedAdministrator -SecurityGroupDisplayName "Finance Employees"

This command grants administrative rights to the protection service for the group that has a display name of Finance Employees.

Example 2: Grant administrative rights by using a GUID

PS C:\>Add-AipServiceRoleBasedAdministrator -ObjectId 2c8afe23-bf58-4289-bea1-05131aeb50ab

This command grants administrative rights to the protection service for the group that has the specified GUID.

Parameters

-EmailAddress

Specifies the email address of a user or group to have administrative rights for the protection service. If the user has no email address, specify the user's Universal Principal Name.

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:True
Accept wildcard characters:False

-ObjectId

Specifies the GUID of a user or group to have administrative rights for the protection service.

Type:Guid
Position:Named
Default value:None
Required:False
Accept pipeline input:True
Accept wildcard characters:False

-Role

Specifies a role of either Azure Information Protection service global administrator (the user can configure all aspects of the protection service by using PowerShell commands) or Azure Information Protection service connector administrator (the account is granted least privileges to configure and run the Rights Management (RMS) connector).

To specify these roles, use the following values:

  • GlobalAdministrator

  • ConnectorAdministrator

The default value is GlobalAdministrator.

Type:Role
Accepted values:GlobalAdministrator, ConnectorAdministrator
Position:Named
Default value:None
Required:False
Accept pipeline input:True
Accept wildcard characters:False

-SecurityGroupDisplayName

Specifies the display name of a user or group to have administrative rights for the protection service.

Type:String
Position:Named
Default value:None
Required:False
Accept pipeline input:True
Accept wildcard characters:False