Edit

Share via


Role-based access control

Use role-based access control in the Microsoft Intune admin center to manage who has access to your organization's resources and what they can do with those resources.

Built-in roles

Windows Autopatch enables role-based access control to use the least privileged access to distribute and delegate Windows Update management in Microsoft Intune.

Important

To successfully manage Windows Autopatch as a lower privilege role, the user must have both Autopatch Admin permissions and Policy and Profile admin permissions.

The permissions defined in Windows Autopatch administrator or Windows Autopatch reader roles are used to manage Autopatch groups, support requests, Autopatch messages, and Autopatch reports.

To manage update policies and Windows Update reports, Device Configuration permission is required. This permission is available in built-in roles such as the Policy and Profile Manager roles.

Policy and Profile Manager roles

Policy and Profile Manager roles include device configuration permissions for managing Intune policies including the following Update policies:

  • Update rings
  • Quality updates
  • Feature updates
  • Driver updates

Windows Autopatch Administrator

The Windows Autopatch Administrator role manages all aspects of Windows Autopatch:

Windows Autopatch Reader

Windows Autopatch Reader can view Windows Autopatch data available in Microsoft Intune but can't make changes.

Update policy roles

To manage Windows quality update, update rings, Windows feature update, driver update, Microsoft 365 Apps, and Microsoft Edge policies the user must have full Device Configuration permissions. The following table is the full list of update management roles:

Intune role Update policies
Policy & Profile Manager Read/Write
Helpdesk Operator Read
Read-only Operator Read
Autopatch Administrator No permission
Autopatch Reader No permission

To successfully manage Windows Autopatch as a lower privilege role, the user must have both Autopatch Admin permissions and the Policy and Profile admin permissions.

Microsoft Entra roles

The following Microsoft Entra roles can access Windows Autopatch features via the Microsoft Intune portal.

Microsoft Entra role All Windows Autopatch data Tenant Administration > Windows Autopatch
Global Administrator Read/Write Read/Write
Intune Service Administrator Read/Write Read/Write
Global Reader Read Read
Service Support Administrator No permission Read

Tenant Administration/Windows Autopatch/All

Security Admin No permission Read

Tenant Administration/Windows Autopatch/All

Security Reader No permission Read

Tenant Administration/Windows Autopatch/All

Billing Administrator No permission Read

Tenant Administration/Windows Autopatch/All

Helpdesk Administrator No permission Read

Tenant Administration/Windows Autopatch/All

Custom roles

You can create two custom roles that include permissions required for a specific job role.

To achieve all-up update management, make sure that the groups assigned to the Autopatch custom role are also a member of the Policy & Profile Manager role or a custom role with equivalent permissions.

Navigate to Tenant Administration > Roles > Create Custom role > Windows Autopatch to create a custom role.

Permission Description
Role Assignments/Create Create an Autopatch role for operations that are performed on Autopatch resources.
Role Assignments/Update Update role for Autopatch, where Edit operations are performed on Autopatch resources.
Role Assignments/Delete Delete role for Autopatch, where delete operations are performed on Autopatch resources.
Roles/Read View permissions, role definitions, and role assignments for Autopatch role. View operation or actions are performed on Autopatch resources.
Autopatch Groups/Read Read Autopatch groups and its properties.
Autopatch Groups/Create Create Autopatch groups, add group assignments, and configure release settings.
Autopatch Groups/Edit Edit Autopatch groups, modify release settings, and manage group assignments.
Autopatch Groups/Delete Delete Autopatch groups.
Reports/Read Read and export Autopatch quality and feature update reports.
Reports/DiscoverDevices Allows Device report action to discover devices.
Reports/AssignRing Allows Device ring assignment to Autopatch groups.
Reports/ExcludeDevices Perform exclude devices action on the Device reports.
Reports/RestoreExcludedDevices Perform Restore action on the Device reports.
Support requests/Read Read existing Autopatch support requests and responses.
Messages/Read Read published Autopatch and Service Health Dashboard messages.

Scopes

Windows Autopatch supports Intune scope tags and scoped groups to be used for distributed update management. Use Microsoft Intune to create and manage scope tags.

  • Windows Autopatch supports Intune scope for Autopatch groups, Autopatch role assignments, update policies, and reports.
  • Autopatch messages, support, and Admin contacts don't support scopes.
  • Autopatch groups created by scoped admins are assigned to the same scope tags as the user.
  • Only scoped admins, with the same scope tags assigned to them, can edit and manage Autopatch groups.
  • When you create Autopatch groups and assign scope tags, the update policies created inherit the same scope tags.
  • The devices assigned to Autopatch groups don't inherit the Autopatch group scope tags. Use Intune to assign scope tag to devices.

Permissions for Autopatch groups

Autopatch groups create Microsoft Entra groups and update policies and assign the policies to the group as part of its workflow. To successfully complete the workflow, both permissions are required. The option to create Autopatch groups is only available when the user has both the permissions enabled.

  1. Device Configuration, all permissions
  2. Windows Autopatch group, all permissions

Windows Autopatch groups that are assigned scoped tags are only visible to users with those exact scope tags. This ensures the IT admin can manage the ring-based rollouts using Autopatch groups and aren't affected by scope discrepancies.

Note

The Autopatch group workflow creates deployment rings and assigns update policies to them. If the Autopatch role includes All devices in scope, the policy administration role must have All devices and All Users in its scope.

Lack of Microsoft Entra permissions can prevent the logged-in user from creating Groups. The user must have sufficient permission to create Groups. For more information, see How to set up self-service group management or Create Groups permissions.

When the user is assigned scoped groups, they can only assign scoped groups for distribution into deployment rings.

Scoped admins and Autopatch groups

In Intune scoped admins, only an admin user that is assigned specific scope tags and Scoped Groups, can assign policies only to Scoped Groups.

Note

Intune administrators or update administrators with All devices and All users scopes can't see the Pending assignment workflow; this only affects roles that have scopes assigned through specific Scoped Groups.

Scoped admins and Autopatch group workflow

As part of the Autopatch group creation workflow, Windows Autopatch creates Microsoft Entra groups and update policies for the selected deployment settings. To assign the update policies to the newly created deployment rings, you must include the Autopatch group as a Scoped Group in the role that contains Device Configuration permissions.

Note

An Intune administrator or a Role Administrator must assign the newly created Windows Autopatch group as a scoped group before the Autopatch group can be used by the scoped Admin.

Once the Autopatch group, in Pending Assignment status, is added as a scoped group, the scoped admin can assign the update policies the Autopatch group becomes Active.

The following table explains the high-level workflow:

Step Description Who
Step 1: Create an Autopatch group Create an Autopatch group. Autopatch groups register devices with the Windows Autopatch service when you either create or edit an Autopatch group.

The Autopatch group, deployment rings, and the update policies are created.

You can view the update policies under Windows updates.

Scoped admin
Step 2: Contact your Intune Administrator or Role administrator to assign the Autopatch parent group as a Scoped Group for your role Include the following information:
  • The name of the Autopatch parent group. Select the Pending Assignment status flyout to find the name.
  • Your Intune role that has Device Configuration permissions for update management
Scoped admin
Step 3: Assign the Autopatch parent group as the Scoped Group for the role with Device Configuration permission Add the Autopatch parent as the Scoped Group using Assign scoped group. Intune Administrator or Intune Role Administrator
Step 4: Complete the policy assignments so Autopatch groups are ready for use Select Complete group assignments if the Autopatch group remains in Pending assignment status, and the Assign scoped group step isn't yet complete.

Once the policy assignment is successful, the Autopatch group is set to Active and ready for use.

The Scoped group assignment might not be immediately available. It might take up to 10 minutes to take effect.

Scoped admin

Assign scope tags to Autopatch groups

Note

If you're assigning scope tags to existing Autopatch groups, the scope admin must be included as a Scoped Group in their role with Device Configuration permissions to manage the Autopatch group.

Windows Autopatch creates a parent group that nests the Autopatch group and deployment rings which can be added as the Scoped Group. You can find the parent group name in the Autopatch group properties.

  1. In the Microsoft Intune admin center, navigate to Tenant Administration > Autopatch groups > select a group. All rings and policies of the Autopatch group have the same scope.
  2. In the Add group to ring option, select the Microsoft Entra groups to be assigned to the Autopatch group. Only groups with scope objects are available for selection.
  3. Navigate to Properties > Scope (Tags) > Edit > Select scope tags > select the tags that you want to add to the profile. You can assign a maximum of 100 scope tags to an object.
    1. The Scope Group section is displayed when the service detects Autopatch groups that are created before role-based access controls. This indicates that a Microsoft Entra group is created, which can be added as a Scoped Group. A scoped admin can manage this Autopatch group if included in their scope.
    2. Follow the steps in the Scoped admins and Autopatch group workflow section to assign scoped groups.
  4. Select Review + save.

Known issues

Windows 365 Enterprise gives IT admins the option to register devices with Windows Autopatch as part of the Windows 365 provisioning policy creation. You must be an Intune Service administrator to complete this action.

General troubleshooting

Scenario Message Cause Solution
You receive an error message when you try to create, edit, or delete an Autopatch group. You don't have sufficient permission to modify this Autopatch group. You can only modify Autopatch groups that match your assigned scope. This Autopatch group has additional assigned Scope tags that don't match your role assignment.

Or

The Autopatch group submission failed, and the logged in user has scope tags assigned.

The problem occurs when you edit an Autopatch group, and the service detected a mismatch in your scope tags. Verify the scope tags assigned to the Autopatch group and Policy assignment role. The Policy assignment role might have more scope tags but must include all the scope tags assigned to the Autopatch group.
You receive an error message when you choose a device and the Assign ring device action in the Autopatch groups membership report. You don't have sufficient permission, or the scope required to assign devices. The problem occurs when Autopatch is unable to populate the Autopatch group list, because of a mismatch in scope tags. Verify the scope tags for the Autopatch groups and your role. Ensure they share at least one scope tag.
You receive an error message when you choose a device and the Assign ring device action in the Autopatch groups membership report. You don't have sufficient Autopatch group permission to complete this action. The minimum of Autopatch Group Read permission is required. To move devices between Autopatch deployment rings, you need permission to read Autopatch groups. Ensure your role includes Autopatch Group/Read permission. Navigate to Tenant Administration > Roles > My permission.
You receive an error message when you select a device in the Autopatch groups membership report. Access Denied You don't have the Intune permission to view the properties of the device. Ensure your role includes Managed devices/Read permission. Navigate to Tenant Administration > Roles > My permission.
You can only see the Releases, Update rings, and Monitor tabs when logged in as a delegated Windows Autopatch administrator. You don't have all the required permission to view Windows Update. Ensure your role includes Organization/Read permission. Navigate to Tenant Administration > Roles > My permission.
You receive an error message when you try to edit a preexisting Autopatch group that was newly assigned a scope tag. You successfully added the parent scope group into the Policy assignment role. You don't have sufficient permission to modify this Autopatch group. You can only modify Autopatch groups that match your assigned scope. This Autopatch group has additional assigned Scope tags that don't match your role assignment. The issue occurs when the service detects that the logged in user "Assigned Entra Group" isn't in the scoped group for the Autopatch admin role. This happens with preexisting Autopatch groups. Add the Assigned Entra group as the scoped group to the Autopatch admin role.