Hi @Abdulkadir, Mohammed , for your situation I would use RBAC. You can create a custom role in Entra ID that has the necessary permissions to manage the group, but does not have the permission to delete the group. You can then assign this custom role to the service desk members who need to manage the group.
Here's a high-level overview of how to accomplish this:
- Create a Custom Role:
- Go to the Entra ID portal.
- Navigate to "Roles and administrators" and click on "New custom role."
- Provide a name and description for the custom role.
- Define Permissions:
- In the "Permissions" tab, add the necessary permissions for managing group membership without including permissions for deleting the group. For example, you can include:
-
microsoft.directory/groups.security.assignedMembership/basic/update
-
microsoft.directory/groups.security.assignedMembership/create
-
microsoft.directory/groups.security.assignedMembership/delete
-
microsoft.directory/groups.security.assignedMembership/members/update
-
microsoft.directory/groups.security.assignedMembership/owners/update
- Avoid adding permissions like
microsoft.directory/groups/delete
to prevent group deletion.
- Assign the Custom Role:
- Once the custom role is created, navigate to the group you want to protect.
- Assign the custom role to the service desk members or any other users who need to manage the group membership.
- Verify Role Assignment:
- Verify that the users with the custom role can manage group membership but do not have the ability to delete the group.
I would also look into Privileged Identity Management for greater control over resources.
Please let me know if you have any questions and I can help you further.
If this answer helps you please mark "Accept Answer" so other users can reference it.
Thank you,
James