Skip to content
Permalink
Browse files

Merge remote-tracking branch 'origin/live'

  • Loading branch information...
Banani-Rath
Banani-Rath committed Feb 13, 2018
2 parents e23969f + e2b9341 commit f3c16348e75e7d051a101e0d12f10652c734efe8
@@ -1,6 +1,7 @@
{
"build_entry_point": "docs",
"need_generate_pdf": false,
"enable_incremental_build": false,
"need_generate_intellisense": false,
"docsets_to_publish": [
{
@@ -54,9 +54,11 @@ Accept wildcard characters: False
```

### -UsersPermissionToCreateGroupsEnabled
Indicates whether to allow users to create groups.
This setting is applied company-wide.
Set to $False to disable users' ability to create groups.
Indicates whether to allow users to create security groups.
This setting is applied company-wide. Set to $False to disable users' ability to create security groups.

> [!NOTE]
> For information on how to allow users to create Office 365 groups, please see [Azure Active Directory Cmdlets for Configuring Group Settings](https://docs.microsoft.com/en-us/azure/active-directory/active-directory-accessmanagement-groups-settings-cmdlets)
```yaml
Type: Boolean
@@ -74,7 +74,7 @@ ObjectId DisplayName UserPrincipalName
5e8b0f4d-2cd4-4e17-9467-b0f6a5c0c4d0 NewUser NewUser@Contoso.com Member
```

In the first step we create a new object called "$extension" with object type "System.Collections.Generic.Dictionary". In the next step we add the extensionattribute 's nameand value to the new object,and we display the object to see that we indeed created the correct obejct to serve as a parameter for the New-AzureADUser cmdlet.
In the first step we create a new object called "$extension" with object type "System.Collections.Generic.Dictionary". In the next step we add the extensionattribute 's name and value to the new object, and we display the object to see that we indeed created the correct object to serve as a parameter for the New-AzureADUser cmdlet.
In the last step we create the new user and set the extension attribute value.

## PARAMETERS
@@ -319,7 +319,7 @@ And finally you can pass this variable to the cmdlet:

Other attributes that can be set in the PasswordProfile are

$PasswordProfile.EnforceChangePasswordPolicy - a boolean indicating that the change password policy is enababled or disabled for this user
$PasswordProfile.EnforceChangePasswordPolicy - a boolean indicating that the change password policy is enabled or disabled for this user
$PasswordProfile.ForceChangePasswordNextLogin - a boolean indicating that the user must change the password at the next sign in


@@ -20,7 +20,7 @@ Remove-AzureADGroup -ObjectId <String> [-InformationAction <ActionPreference>] [
```

## DESCRIPTION
The **Remove-AzureADGroup** cmdlet removes a group from Azure Active Directory (AD). Note that a Unified Group can be restored withing 30 days after deletion using the Restore-AzureADMSDeletedDirectoryObject cmdlet. Security groups cannot be restored after deletion.
The **Remove-AzureADGroup** cmdlet removes a group from Azure Active Directory (AD). Note that a Unified Group can be restored within 30 days after deletion using the Restore-AzureADMSDeletedDirectoryObject cmdlet. Security groups cannot be restored after deletion.

## EXAMPLES

@@ -41,14 +41,27 @@ New-AzureADUser -UserPrincipalName "EastCoastHelpdeskAdmin@$initialDomain" -Disp
New-AzureADUser -UserPrincipalName "MobileUserAdmin@$initialDomain" -DisplayName "MobileUserAdmin" -PasswordProfile $passwordProfile -UsageLocation "US" -AccountEnabled $true -MailNickName "MobileUserAdmin"
# Enable the Helpdesk Administrator Role
$helpDeskAdminRole = New-Object Microsoft.Open.AzureAD.Model.DirectoryRole
$helpDeskAdminRole.RoleTemplateId = "729827e3-9c14-49f7-bb1b-9608f156bbb8"
Enable-AzureADDirectoryRole -DirectoryRole $helpDeskAdminRole
$haRole = "Helpdesk Administrator"
$role = Get-AzureADDirectoryRole | Where-Object {$_.displayName -eq $haRole}
if ($role -eq $null) {
# Instantiate an instance of the role template
$roleTemplate = Get-AzureADDirectoryRoleTemplate | Where-Object {$_.displayName -eq $haRole}
Enable-AzureADDirectoryRole -RoleTemplateId $roleTemplate.ObjectId
$role = Get-AzureADDirectoryRole | Where-Object {$_.displayName -eq $haRole}
}
# Enable the User Account Administrator Role
$userAdminAdminRole = New-Object Microsoft.Open.AzureAD.Model.DirectoryRole
$userAdminAdminRole.RoleTemplateId = "fe930be7-5e62-47db-91af-98c3a49a38b1"
Enable-AzureADDirectoryRole -DirectoryRole $userAdminAdminRole
$uaaRole = "User Account Administrator"
$role = Get-AzureADDirectoryRole | Where-Object {$_.displayName -eq $uaaRole}
if ($role -eq $null) {
# Instantiate an instance of the role template
$roleTemplate = Get-AzureADDirectoryRoleTemplate | Where-Object {$_.displayName -eq $uaaRole}
Enable-AzureADDirectoryRole -RoleTemplateId $roleTemplate.ObjectId
$role = Get-AzureADDirectoryRole | Where-Object {$_.displayName -eq $uaaRole}
}
```

@@ -109,6 +109,9 @@ Connect-AzureAD -AzureEnvironment "AzureGermanyCloud"
This example connects your PowerShell session to the German AzureAD environment.
See **Connect-AzureAD** for more information.

## Suggestions?

If you have suggestions on how to improve Azure Active Directory PowerShell, please do not hesitate to [let us know!](https://feedback.azure.com/forums/169401-azure-active-directory/category/165066-powershell)

## More about Windows PowerShell

0 comments on commit f3c1634

Please sign in to comment.
You can’t perform that action at this time.