Skip to content

Add-AcctAzureADSecurityGroupMember

Adds an Azure AD security group to an assigned security group.

Syntax

Add-AcctAzureADSecurityGroupMember [-AccessToken] <String> [-GroupId] <String> [-RefGroupId] <String> [-BearerToken <String>] [-TraceParent <String>] [-TraceState <String>] [-VirtualSiteId <String>] [-AdminAddress <String>] [<CommonParameters>]

Detailed Description

Provides the ability to add a Citrix-created device security group as a member to an assigned security group..

Parameters

Name Description Required? Pipeline Input Default Value
AccessToken Access token of Microsoft Graph API. Make sure grant consent to following permissions: - Group.ReadWrite.All - GroupMember.ReadWrite.All true false
GroupId The assigned security group's ID. true false
RefGroupId The device security group's ID. true false
BearerToken Specifies the bearer token assigned to the calling user false false
TraceParent Specifies the trace parent assigned for internal diagnostic tracing use false false
TraceState Specifies the trace state assigned for internal diagnostic tracing use false false
VirtualSiteId Specifies the virtual site the PowerShell snap-in will connect to. false false
AdminAddress The address of a Citrix Virtual Apps and Desktops controller the PowerShell snap-in will connect to. You can provide this as a host name or an IP address. false false Localhost. Once a value is provided by any cmdlet, this value becomes the default.

Input Type

Return Values

Notes

In the case of failure the following errors can result.

  • PartialData: Only a subset of the available data was returned.

  • PermissionDenied: The user does not have administrative rights to perform this operation.

  • ConfigurationLoggingError: The operation could not be performed because of a configuration logging error

  • CommunicationError: An error occurred while communicating with the service.

  • InvalidFilter: A filtering expression was supplied that could not be interpreted for this cmdlet.

  • ExceptionThrown: An unexpected error occurred. To locate more details, see the Windows event logs on the controller being used or examine the XenDesktop logs. AzureADTenantIdMismatchAzureADAccessToken Mismatch between the given AzureADTenantID and TenantID in Azure AD AccessToken.

Examples

Example 1

C:\>Add-AcctAzureADSecurityGroupMember -AccessToken $accessToken -GroupId $groupId -RefGroupId $refGroupId"

                    True

Description

Adds the security group of a device as a direct member to an assigned security group.

Was this article helpful?