Adds an Azure AD security group to an assigned security group.
Add-AcctAzureADSecurityGroupMember [-AccessToken] <String> [-GroupId] <String> [-RefGroupId] <String> [-BearerToken <String>] [-TraceParent <String>] [-TraceState <String>] [-VirtualSiteId <String>] [-AdminAddress <String>] [<CommonParameters>]
Provides the ability to add a Citrix-created device security group as a member to an assigned security group..
|Name||Description||Required?||Pipeline Input||Default Value|
|AccessToken||Access token of Microsoft Graph API. Make sure grant consent to following permissions: - Group.ReadWrite.All - GroupMember.ReadWrite.All||true||false|
|GroupId||The assigned security group's ID.||true||false|
|RefGroupId||The device security group's ID.||true||false|
|BearerToken||Specifies the bearer token assigned to the calling user||false||false|
|TraceParent||Specifies the trace parent assigned for internal diagnostic tracing use||false||false|
|TraceState||Specifies the trace state assigned for internal diagnostic tracing use||false||false|
|VirtualSiteId||Specifies the virtual site the PowerShell snap-in will connect to.||false||false|
|AdminAddress||The address of a Citrix Virtual Apps and Desktops controller the PowerShell snap-in will connect to. You can provide this as a host name or an IP address.||false||false||Localhost. Once a value is provided by any cmdlet, this value becomes the default.|
In the case of failure the following errors can result.
PartialData: Only a subset of the available data was returned.
PermissionDenied: The user does not have administrative rights to perform this operation.
ConfigurationLoggingError: The operation could not be performed because of a configuration logging error
CommunicationError: An error occurred while communicating with the service.
InvalidFilter: A filtering expression was supplied that could not be interpreted for this cmdlet.
ExceptionThrown: An unexpected error occurred. To locate more details, see the Windows event logs on the controller being used or examine the XenDesktop logs. AzureADTenantIdMismatchAzureADAccessToken Mismatch between the given AzureADTenantID and TenantID in Azure AD AccessToken.
C:\>Add-AcctAzureADSecurityGroupMember -AccessToken $accessToken -GroupId $groupId -RefGroupId $refGroupId" True
Adds the security group of a device as a direct member to an assigned security group.