Skip to content

Set-Acctazureadsecuritygroup

Updates the name of a specific security group.

Syntax

Set-AcctAzureADSecurityGroup [-AccessToken] <String> [-GroupId] <String> [-Name <String>] [-Description <String>] [-BearerToken <String>] [-TraceParent <String>] [-TraceState <String>] [-VirtualSiteId <String>] [-AdminAddress <String>] [<CommonParameters>]

Detailed Description

Provides the ability to rename a specific Azure AD security group.

Parameters

Name Description Required? Pipeline Input Default Value
AccessToken Access token of Microsoft Graph API. true false
GroupId Specifies the ID of a group in Azure AD. true false
Name The new name of the specific Azure AD group. false false
Description The new description of the specific Azure AD group. false false
BearerToken Specifies the bearer token assigned to the calling user false false
TraceParent Specifies the trace parent assigned for internal diagnostic tracing use false false
TraceState Specifies the trace state assigned for internal diagnostic tracing use false false
VirtualSiteId Specifies the virtual site the PowerShell snap-in will connect to. false false
AdminAddress The address of a Citrix Virtual Apps and Desktops controller the PowerShell snap-in will connect to. You can provide this as a host name or an IP address. false false Localhost. Once a value is provided by any cmdlet, this value becomes the default.

Input Type

Return Values

Notes

In the case of failure the following errors can result.
Error Codes
-----------
PartialData
Only a subset of the available data was returned.
PermissionDenied
The user does not have administrative rights to perform this operation.
ConfigurationLoggingError
The operation could not be performed because of a configuration logging error
CommunicationError
An error occurred while communicating with the service.
InvalidFilter
A filtering expression was supplied that could not be interpreted for this cmdlet.
ExceptionThrown
An unexpected error occurred. To locate more details, see the Windows event logs on the controller being used or examine the XenDesktop logs. AzureADTenantIdMismatchAzureADAccessToken
Mismatch between the given AzureADTenantID and TenantID in Azure AD AccessToken.

Examples

Example 1

C:\PS>Set-AcctAzureADSecurityGroup -AccessToken $accessToken -GroupId $gid -Name $name" -Description $description<br><br>                    success

Description

Update a Azure AD security group name or description.

Was this article helpful?