
docs.microsoft.com/en-us/powershell/module/aipservice/add-aipservicesuperuser
Preview meta tags from the docs.microsoft.com website.
Linked Hostnames
6- 5 links tolearn.microsoft.com
- 3 links togo.microsoft.com
- 2 links todocs.microsoft.com
- 1 link toaka.ms
- 1 link totechcommunity.microsoft.com
- 1 link towww.microsoft.com
Thumbnail

Search Engine Appearance
Add-AipServiceSuperUser (AIPService)
The Add-AipServiceSuperUser cmdlet adds an individual account to the super user list for your organization. This operation makes the account an owner for all content that is protected by your organization. This means that these super users can decrypt this rights-protected content and remove rights-protection from it, even if an expiration date has been set and expired. Typically, this level of access is required for legal eDiscovery and by auditing teams. However, before a super user can do these operations, the super user feature for Azure Information Protection must be enabled by using the Enable-AipServiceSuperUserFeature cmdlet. By default, the super user feature is not enabled. Specify the account by email address or service principal ID. To specify a user who does not have an email address, specify their User Principal Name instead. For more information, see Preparing users and groups for Azure Information Protection. To specify a group rather than individual users, use the Set-AipServiceSuperUserGroup cmdlet instead of this Add-AipServiceSuperUser cmdlet. You must use PowerShell to configure super users; you cannot do this configuration by using a management portal.
Bing
Add-AipServiceSuperUser (AIPService)
The Add-AipServiceSuperUser cmdlet adds an individual account to the super user list for your organization. This operation makes the account an owner for all content that is protected by your organization. This means that these super users can decrypt this rights-protected content and remove rights-protection from it, even if an expiration date has been set and expired. Typically, this level of access is required for legal eDiscovery and by auditing teams. However, before a super user can do these operations, the super user feature for Azure Information Protection must be enabled by using the Enable-AipServiceSuperUserFeature cmdlet. By default, the super user feature is not enabled. Specify the account by email address or service principal ID. To specify a user who does not have an email address, specify their User Principal Name instead. For more information, see Preparing users and groups for Azure Information Protection. To specify a group rather than individual users, use the Set-AipServiceSuperUserGroup cmdlet instead of this Add-AipServiceSuperUser cmdlet. You must use PowerShell to configure super users; you cannot do this configuration by using a management portal.
DuckDuckGo
Add-AipServiceSuperUser (AIPService)
The Add-AipServiceSuperUser cmdlet adds an individual account to the super user list for your organization. This operation makes the account an owner for all content that is protected by your organization. This means that these super users can decrypt this rights-protected content and remove rights-protection from it, even if an expiration date has been set and expired. Typically, this level of access is required for legal eDiscovery and by auditing teams. However, before a super user can do these operations, the super user feature for Azure Information Protection must be enabled by using the Enable-AipServiceSuperUserFeature cmdlet. By default, the super user feature is not enabled. Specify the account by email address or service principal ID. To specify a user who does not have an email address, specify their User Principal Name instead. For more information, see Preparing users and groups for Azure Information Protection. To specify a group rather than individual users, use the Set-AipServiceSuperUserGroup cmdlet instead of this Add-AipServiceSuperUser cmdlet. You must use PowerShell to configure super users; you cannot do this configuration by using a management portal.
General Meta Tags
55- titleAdd-AipServiceSuperUser (AIPService) | Microsoft Learn
- charsetutf-8
- viewportwidth=device-width, initial-scale=1.0
- color-schemelight dark
- descriptionThe Add-AipServiceSuperUser cmdlet adds an individual account to the super user list for your organization. This operation makes the account an owner for all content that is protected by your organization. This means that these super users can decrypt this rights-protected content and remove rights-protection from it, even if an expiration date has been set and expired. Typically, this level of access is required for legal eDiscovery and by auditing teams. However, before a super user can do these operations, the super user feature for Azure Information Protection must be enabled by using the Enable-AipServiceSuperUserFeature cmdlet. By default, the super user feature is not enabled. Specify the account by email address or service principal ID. To specify a user who does not have an email address, specify their User Principal Name instead. For more information, see Preparing users and groups for Azure Information Protection. To specify a group rather than individual users, use the Set-AipServiceSuperUserGroup cmdlet instead of this Add-AipServiceSuperUser cmdlet. You must use PowerShell to configure super users; you cannot do this configuration by using a management portal.
Open Graph Meta Tags
6- og:typewebsite
- og:image:altMicrosoft Learn
- og:imagehttps://learn.microsoft.com/en-us/media/open-graph-image.png
- og:titleAdd-AipServiceSuperUser (AIPService)
- og:urlhttps://learn.microsoft.com/en-us/powershell/module/aipservice/add-aipservicesuperuser?view=azureipps
Twitter Meta Tags
2- twitter:cardsummary_large_image
- twitter:site@MicrosoftLearn
Link Tags
6- canonicalhttps://learn.microsoft.com/en-us/powershell/module/aipservice/add-aipservicesuperuser?view=azureipps
- dns-prefetch//target.microsoft.com
- dns-prefetch//microsoftmscompoc.tt.omtrdc.net
- preconnect//mscom.demdex.net
- preload/static/third-party/adobe-target/at-js/2.9.0/at.js
Links
13- https://aka.ms/yourcaliforniaprivacychoices
- https://docs.microsoft.com/en-us/information-protection/plan-design/prepare
- https://docs.microsoft.com/en-us/powershell/module/msonline/new-msolserviceprincipalcredential?view=azureadps-1.0
- https://go.microsoft.com/fwlink/?LinkID=113216
- https://go.microsoft.com/fwlink/?LinkId=521839