Страница:
AADMSGroup
Страницы
AADApplication
AADConditionalAccessPolicy
AADGroup
AADGroupLifecyclePolicy
AADGroupsNamingPolicy
AADGroupsSettings
AADMSGroup
AADMSGroupLifecyclePolicy
AADNamedLocationPolicy
AADPolicy
AADRoleDefinition
AADServicePrincipal
AADTenantDetails
AADTokenLifetimePolicy
Assessing
Automating
Breaking Changes Policy
Contribute to Microsoft365dsc.com
Develop a New Resource
EXOAcceptedDomain
EXOActiveSyncDeviceAccessRule
EXOAddressBookPolicy
EXOAddressList
EXOAntiPhishPolicy
EXOAntiPhishRule
EXOApplicationAccessPolicy
EXOAtpPolicyForO365
EXOAvailabilityAddressSpace
EXOAvailabilityConfig
EXOCASMailboxPlan
EXOClientAccessRule
EXODkimSigningConfig
EXOEmailAddressPolicy
EXOGlobalAddressList
EXOHostedConnectionFilterPolicy
EXOHostedContentFilterPolicy
EXOHostedContentFilterRule
EXOHostedOutboundSpamFilterPolicy
EXOHostedOutboundSpamFilterRule
EXOInboundConnector
EXOIntraOrganizationConnector
EXOJournalRule
EXOMailTips
EXOMailboxSettings
EXOMalwareFilterPolicy
EXOMalwareFilterRule
EXOManagementRole
EXOMobileDeviceMailboxPolicy
EXOOfflineAddressBook
EXOOnPremisesOrganization
EXOOrganizationConfig
EXOOrganizationRelationship
EXOOutboundConnector
EXOOwaMailboxPolicy
EXOPartnerApplication
EXOPolicyTipConfig
EXORemoteDomain
EXORoleAssignmentPolicy
EXOSafeAttachmentPolicy
EXOSafeAttachmentRule
EXOSafeLinksPolicy
EXOSafeLinksRule
EXOSharedMailbox
EXOSharingPolicy
EXOTransportRule
Exporting
Getting Started
Home
How to Create a M365DSC Blueprint
IntuneAppConfigurationPolicy
IntuneAppProtectionPolicyiOS
IntuneDeviceCategory
IntuneDeviceCompliancePolicyAndroid
IntuneDeviceCompliancePolicyAndroidWorkProfile
IntuneDeviceCompliancePolicyMacOS
IntuneDeviceCompliancePolicyWindows10
IntuneDeviceCompliancePolicyiOs
IntuneDeviceConfigurationPolicyAndroidWorkProfile
IntuneDeviceConfigurationPolicyWindows
IntuneDeviceConfigurationPolicyWindows10
IntuneDeviceConfigurationPolicyiOS
IntuneDeviceEnrollmentLimitRestriction
IntuneDeviceEnrollmentPlatformRestriction
Known Issues
Monitoring
O365AdminAuditLogConfig
O365Group
O365OrgCustomizationSetting
O365User
ODSP Permissions
ODSettings
PPPowerAppsEnvironment
PPTenantSettings
Permissions
PlannerBucket
PlannerPlan
PlannerTask
Reporting
Resources List
SCAuditConfigurationPolicy
SCCaseHoldPolicy
SCCaseHoldRule
SCComplianceCase
SCComplianceSearch
SCComplianceSearchAction
SCComplianceTag
SCDLPCompliancePolicy
SCDLPComplianceRule
SCDeviceConditionalAccessPolicy
SCDeviceConfigurationPolicy
SCFilePlanPropertyAuthority
SCFilePlanPropertyCategory
SCFilePlanPropertyCitation
SCFilePlanPropertyDepartment
SCFilePlanPropertyReferenceId
SCFilePlanPropertySubCategory
SCLabelPolicy
SCRetentionCompliancePolicy
SCRetentionComplianceRule
SCRetentionEventType
SCSensitivityLabel
SCSupervisoryReviewPolicy
SCSupervisoryReviewRule
SPOAccessControlSettings
SPOApp
SPOBrowserIdleSignout
SPOHomeSite
SPOHubSite
SPOOrgAssetsLibrary
SPOPropertyBag
SPOSearchManagedProperty
SPOSearchResultSource
SPOSharingSettings
SPOSite
SPOSiteAuditSettings
SPOSiteDesign
SPOSiteDesignRights
SPOSiteGroup
SPOSiteScript
SPOStorageEntity
SPOTenantCDNPolicy
SPOTenantCdnEnabled
SPOTenantSettings
SPOTheme
SPOUserProfileProperty
Setting up your Environment to Contribute to the Project
TeamsCallingPolicy
TeamsChannel
TeamsChannelTab
TeamsChannelsPolicy
TeamsClientConfiguration
TeamsEmergencyCallRoutingPolicy
TeamsEmergencyCallingPolicy
TeamsGuestCallingConfiguration
TeamsGuestMeetingConfiguration
TeamsGuestMessagingConfiguration
TeamsMeetingBroadcastConfiguration
TeamsMeetingBroadcastPolicy
TeamsMeetingConfiguration
TeamsMeetingPolicy
TeamsMessagingPolicy
TeamsPstnUsage
TeamsTeam
TeamsTenantDialPlan
TeamsUpgradeConfiguration
TeamsUpgradePolicy
TeamsUser
TeamsVoiceRoute
TeamsVoiceRoutingPolicy
Troubleshooting
What is Microsoft365DSC
6
AADMSGroup
Nik Charlebois редактировал(а) эту страницу 2021-06-30 11:28:48 -04:00
# AADMSGroup
Parameters
Parameter | Attribute | DataType | Description | Allowed Values |
---|---|---|---|---|
DisplayName | Key | String | DisplayName of the AADMS Group | |
MailNickname | Key | String | Specifies a mail nickname for the group. | |
Description | Write | String | Specifies a description for the group. | |
Id | Write | String | Specifies an ID for the group. | |
GroupTypes | Write | StringArray[] | Specifies that the group is a dynamic group. To create a dynamic group, specify a value of DynamicMembership. | |
MembershipRule | Write | String | Specifies the membership rule for a dynamic group. | |
MembershipRuleProcessingState | Write | String | Specifies the rule processing state. The acceptable values for this parameter are: On. Process the group rule or Paused. Stop processing the group rule. | On, Paused |
SecurityEnabled | Write | Boolean | Specifies whether the group is security enabled. For security groups, this value must be $True. | |
MailEnabled | Write | Boolean | Specifies whether this group is mail enabled. Currently, you cannot create mail enabled groups in Azure AD. | |
IsAssignableToRole | Write | Boolean | Specifies whether this group can be assigned a role. Only available when creating a group and can't be modified after group is created. | |
Visibility | Write | String | This parameter determines the visibility of the group's content and members list. | Public, Private, HiddenMembership |
Ensure | Write | String | Specify if the Azure AD Group should exist or not. | Present, Absent |
GlobalAdminAccount | Write | PSCredential | Credentials of the Azure Active Directory Admin | |
ApplicationId | Write | String | Id of the Azure Active Directory application to authenticate with. | |
TenantId | Write | String | Id of the Azure Active Directory tenant used for authentication. | |
CertificateThumbprint | Write | String | Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication. |
AADMSGroup
Description
This resource configures an Azure Active Directory group.
Azure AD Permissions
To authenticate via Azure Active Directory, this resource required the following Application permissions:
- Automate
- None
- Export
- None
NOTE: All permisions listed above require admin consent.
Examples
Example 1
This example is used to test new resources and showcase the usage of new resources being worked on. It is not meant to use as a production baseline.
Configuration Example
{
param(
[Parameter(Mandatory = $true)]
[PSCredential]
$credsGlobalAdmin
)
Import-DscResource -ModuleName Microsoft365DSC
node localhost
{
AADMSGroup MyGroups
{
DisplayName = "DSCGroup"
Description = "Microsoft DSC Group"
SecurityEnabled = $True
MailEnabled = $True
GroupTypes = @("Unified")
MailNickname = "M365DSC"
Visibility = "Private"
GlobalAdminAccount = $credsGlobalAdmin
Ensure = "Present"
}
}
}