Published Aug 13, 2025
Starting September 15, 2025, Microsoft Teams PowerShell Module requires updated application permissions for Entra applications using Administrative Units: RoleManagement.Read.Directory for all and GroupMember.Read.All for specific cmdlets. Organizations must review and update these permissions to avoid service disruption.
Updated September 2, 2025: We have updated the content. Thank you for your patience.
Introduction
We are reaching out to inform you of an important security and authentication update that may impact your integration with the Microsoft Teams PowerShell Module. As part of our ongoing commitment to strengthening security across Microsoft 365 services, we are updating the authentication requirements for application-based authentication with Administrative Units in the Teams PowerShell Module.
These changes are designed to ensure that Entra applications with Administrative Units used for backend access to Teams PowerShell are properly scoped and secured. If your organization uses Entra applications to automate or manage Teams via PowerShell, action is required to avoid service disruption.
When will this happen
This change will take effect on Monday, September 15, 2025.
How this affects your organization
If your organization uses Entra applications to authenticate against the Microsoft Teams PowerShell Module, you must update the Application permissions to avoid disruption.
Specifically:
*-CsGroupPolicyAssignment
*-CsGroupPolicyPackageAssignment
No changes are required for delegated permissions.
What you can do to prepare
To ensure uninterrupted access:
1. Review your Entra applications:
2. Update API permissions:
GroupMember.Read.All
RoleManagement.Read.Directory
3. Test your integrations to confirm continued functionality.
Learn more: Application-based authentication in Teams PowerShell Module.
Compliance considerations
No compliance considerations identified, review as appropriate for your organization.