PrivilegedAssignmentSchedule.Remove.AzureADGroup
Delete time-based assignment schedules for access to Azure AD groups, without a signed-in user.
Permission Details
Delete assignment schedules for access to Azure AD groups
Delete time-based assignment schedules for access to Azure AD groups, without a signed-in user.
55d1104b-3821-413d-b3ca-e2393d333cd3
Delete assignment schedules for access to Azure AD groups
Allows the app to delete time-based assignment schedules for access to Azure AD groups, on behalf of the signed-in user.
ca5fe595-68ff-4dfd-907d-4509501a0e49
Properties
Properties is shown from stable Microsoft Graph v1.0 metadata.
| Property | Type | Description |
|---|---|---|
accessReviews |
object |
|
appConsent |
object |
|
entitlementManagement |
object |
|
lifecycleWorkflows |
object |
|
privilegedAccess |
object |
|
termsOfUse |
object |
JSON Representation
JSON representation is shown from stable Microsoft Graph v1.0 metadata.
{
"accessReviews": {
"sample": "value"
},
"appConsent": {
"sample": "value"
},
"entitlementManagement": {
"sample": "value"
},
"lifecycleWorkflows": {
"sample": "value"
},
"privilegedAccess": {
"sample": "value"
},
"termsOfUse": {
"sample": "value"
}
}
Relationships
Relationships is shown from stable Microsoft Graph v1.0 metadata.
| Relationship | Type | Description |
|---|---|---|
accessReviews |
accessReviewSet |
Container for the base resources that expose the access reviews API and features. |
appConsent |
appConsent |
Container for base resources that expose the app consent request API and features. Currently exposes only the appConsentRequests resource. |
entitlementManagement |
entitlementManagement |
Container for entitlement management resources, including accessPackageCatalog, connectedOrganization, and entitlementManagementSettings. |
termsOfUse |
termsOfUseContainer |
Container for the resources that expose the terms of use API and its features, including agreements and agreementAcceptances. |
lifecycleWorkflows |
identityGovernance.lifecycleWorkflowsContainer |
Container for Lifecycle Workflow resources, including workflow, customTaskExtension, and lifecycleManagementSettings. |
privilegedAccess |
privilegedAccessRoot |
Container for the base resources that expose the API and features related to Privileged Identity Management (PIM) for Groups. |
catalogs |
accessPackageCatalog collection |
Related catalogs data exposed by this resource. |
permissionsAnalytics |
permissionsAnalyticsAggregation |
Related permissionsAnalytics data exposed by this resource. |
Graph Methods
Microsoft Graph v1.0 endpoints are mapped directly from refreshed Microsoft Learn permissions tables.
| Methods |
|---|
POST
/identityGovernance/privilegedAccess/group/assignmentScheduleRequests
|
Microsoft Graph beta endpoints are mapped directly from refreshed Microsoft Learn permissions tables.
| Methods |
|---|
POST
/identityGovernance/privilegedAccess/group/assignmentScheduleRequests
|
Microsoft Graph PowerShell v1.0 commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.
| Commands |
|---|
New-MgIdentityGovernancePrivilegedAccessGroupAssignmentScheduleRequest
/identityGovernance/privilegedAccess/group/assignmentScheduleRequests
Create assignmentScheduleRequest
|
Microsoft Graph PowerShell beta commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.
No deterministic PowerShell command map is available for this permission.
Browse PowerShell docsCode Examples
// Code snippets are only available for the latest version. Current version is 5.x
// Dependencies
using Microsoft.Graph.Models;
var requestBody = new PrivilegedAccessGroupAssignmentScheduleRequest
{
AccessId = PrivilegedAccessGroupRelationships.Member,
PrincipalId = "3cce9d87-3986-4f19-8335-7ed075408ca2",
GroupId = "68e55cce-cf7e-4a2d-9046-3e4e75c4bfa7",
Action = ScheduleRequestActions.AdminAssign,
ScheduleInfo = new RequestSchedule
{
StartDateTime = DateTimeOffset.Parse("2022-12-08T07:43:00.000Z"),
Expiration = new ExpirationPattern
{
Type = ExpirationPatternType.AfterDuration,
Duration = TimeSpan.Parse("PT2H"),
},
},
Justification = "Assign active member access.",
};
// To initialize your graphClient, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=csharp
var result = await graphClient.IdentityGovernance.PrivilegedAccess.Group.AssignmentScheduleRequests.PostAsync(requestBody);
const options = {
authProvider,
};
const client = Client.init(options);
const privilegedAccessGroupAssignmentScheduleRequest = {
accessId: 'member',
principalId: '3cce9d87-3986-4f19-8335-7ed075408ca2',
groupId: '68e55cce-cf7e-4a2d-9046-3e4e75c4bfa7',
action: 'adminAssign',
scheduleInfo: {
startDateTime: '2022-12-08T07:43:00.000Z',
expiration: {
type: 'afterDuration',
duration: 'PT2H'
}
},
justification: 'Assign active member access.'
};
await client.api('/identityGovernance/privilegedAccess/group/assignmentScheduleRequests')
.post(privilegedAccessGroupAssignmentScheduleRequest);
Import-Module Microsoft.Graph.Identity.Governance
$params = @{
accessId = "member"
principalId = "3cce9d87-3986-4f19-8335-7ed075408ca2"
groupId = "68e55cce-cf7e-4a2d-9046-3e4e75c4bfa7"
action = "adminAssign"
scheduleInfo = @{
startDateTime = [System.DateTime]::Parse("2022-12-08T07:43:00.000Z")
expiration = @{
type = "afterDuration"
duration = "PT2H"
}
}
justification = "Assign active member access."
}
New-MgIdentityGovernancePrivilegedAccessGroupAssignmentScheduleRequest -BodyParameter $params
# Code snippets are only available for the latest version. Current version is 1.x
from msgraph import GraphServiceClient
from msgraph.generated.models.privileged_access_group_assignment_schedule_request import PrivilegedAccessGroupAssignmentScheduleRequest
from msgraph.generated.models.privileged_access_group_relationships import PrivilegedAccessGroupRelationships
from msgraph.generated.models.schedule_request_actions import ScheduleRequestActions
from msgraph.generated.models.request_schedule import RequestSchedule
from msgraph.generated.models.expiration_pattern import ExpirationPattern
from msgraph.generated.models.expiration_pattern_type import ExpirationPatternType
# To initialize your graph_client, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=python
request_body = PrivilegedAccessGroupAssignmentScheduleRequest(
access_id = PrivilegedAccessGroupRelationships.Member,
principal_id = "3cce9d87-3986-4f19-8335-7ed075408ca2",
group_id = "68e55cce-cf7e-4a2d-9046-3e4e75c4bfa7",
action = ScheduleRequestActions.AdminAssign,
schedule_info = RequestSchedule(
start_date_time = "2022-12-08T07:43:00.000Z",
expiration = ExpirationPattern(
type = ExpirationPatternType.AfterDuration,
duration = "PT2H",
),
),
justification = "Assign active member access.",
)
result = await graph_client.identity_governance.privileged_access.group.assignment_schedule_requests.post(request_body)
App Registration
Navigate to Azure Portal
Go to App registrations in Microsoft Entra admin center
Add API Permission
Select your app → API permissions → Add a permission → Microsoft Graph
Select Permission Type
Choose Application permissions or delegated permissions and search for PrivilegedAssignmentSchedule.Remove.AzureADGroup
Grant Admin Consent
Application permissions always require admin consent.