
docs.microsoft.com/en-us/powershell/module/aipservice/connect-aipservice
Preview meta tags from the docs.microsoft.com website.
Linked Hostnames
7- 5 links tolearn.microsoft.com
- 4 links todocs.microsoft.com
- 3 links togo.microsoft.com
- 1 link toaka.ms
- 1 link toapi.aadrm.com
- 1 link totechcommunity.microsoft.com
- 1 link towww.microsoft.com
Thumbnail

Search Engine Appearance
Connect-AipService (AIPService)
The Connect-AipService cmdlet connects you to Azure Information Protection so that you can then run administrative commands for the protection service for your tenant. This cmdlet can also be used by a partner company that manages your tenant. You must run this cmdlet before you can run the other cmdlets in this module. To connect to Azure Information Protection, use an account that is one of the following: A global admin for your Office 365 tenant. A global administrator for your Azure AD tenant. However, this account cannot be a Microsoft account (MSA) or from another Azure tenant. A user account from your tenant that has been granted administrative rights to Azure Information Protection by using the Add-AipServiceRoleBasedAdministrator cmdlet. An Azure AD admin role of Azure Information Protection administrator, Compliance administrator, or Compliance data administrator. Tip If you are not prompted for your credentials, and you see an error message such as Cannot use this feature without credentials, verify that Internet Explorer is configured to use Windows integrated authentication. If this setting is not enabled, enable it, restart Internet Explorer, and then retry authentication to the Information Protection service.
Bing
Connect-AipService (AIPService)
The Connect-AipService cmdlet connects you to Azure Information Protection so that you can then run administrative commands for the protection service for your tenant. This cmdlet can also be used by a partner company that manages your tenant. You must run this cmdlet before you can run the other cmdlets in this module. To connect to Azure Information Protection, use an account that is one of the following: A global admin for your Office 365 tenant. A global administrator for your Azure AD tenant. However, this account cannot be a Microsoft account (MSA) or from another Azure tenant. A user account from your tenant that has been granted administrative rights to Azure Information Protection by using the Add-AipServiceRoleBasedAdministrator cmdlet. An Azure AD admin role of Azure Information Protection administrator, Compliance administrator, or Compliance data administrator. Tip If you are not prompted for your credentials, and you see an error message such as Cannot use this feature without credentials, verify that Internet Explorer is configured to use Windows integrated authentication. If this setting is not enabled, enable it, restart Internet Explorer, and then retry authentication to the Information Protection service.
DuckDuckGo
Connect-AipService (AIPService)
The Connect-AipService cmdlet connects you to Azure Information Protection so that you can then run administrative commands for the protection service for your tenant. This cmdlet can also be used by a partner company that manages your tenant. You must run this cmdlet before you can run the other cmdlets in this module. To connect to Azure Information Protection, use an account that is one of the following: A global admin for your Office 365 tenant. A global administrator for your Azure AD tenant. However, this account cannot be a Microsoft account (MSA) or from another Azure tenant. A user account from your tenant that has been granted administrative rights to Azure Information Protection by using the Add-AipServiceRoleBasedAdministrator cmdlet. An Azure AD admin role of Azure Information Protection administrator, Compliance administrator, or Compliance data administrator. Tip If you are not prompted for your credentials, and you see an error message such as Cannot use this feature without credentials, verify that Internet Explorer is configured to use Windows integrated authentication. If this setting is not enabled, enable it, restart Internet Explorer, and then retry authentication to the Information Protection service.
General Meta Tags
55- titleConnect-AipService (AIPService) | Microsoft Learn
- charsetutf-8
- viewportwidth=device-width, initial-scale=1.0
- color-schemelight dark
- descriptionThe Connect-AipService cmdlet connects you to Azure Information Protection so that you can then run administrative commands for the protection service for your tenant. This cmdlet can also be used by a partner company that manages your tenant. You must run this cmdlet before you can run the other cmdlets in this module. To connect to Azure Information Protection, use an account that is one of the following: A global admin for your Office 365 tenant. A global administrator for your Azure AD tenant. However, this account cannot be a Microsoft account (MSA) or from another Azure tenant. A user account from your tenant that has been granted administrative rights to Azure Information Protection by using the Add-AipServiceRoleBasedAdministrator cmdlet. An Azure AD admin role of Azure Information Protection administrator, Compliance administrator, or Compliance data administrator. Tip If you are not prompted for your credentials, and you see an error message such as Cannot use this feature without credentials, verify that Internet Explorer is configured to use Windows integrated authentication. If this setting is not enabled, enable it, restart Internet Explorer, and then retry authentication to the Information Protection service.
Open Graph Meta Tags
6- og:typewebsite
- og:image:altMicrosoft Learn
- og:imagehttps://learn.microsoft.com/en-us/media/open-graph-image.png
- og:titleConnect-AipService (AIPService)
- og:urlhttps://learn.microsoft.com/en-us/powershell/module/aipservice/connect-aipservice?view=azureipps
Twitter Meta Tags
2- twitter:cardsummary_large_image
- twitter:site@MicrosoftLearn
Link Tags
6- canonicalhttps://learn.microsoft.com/en-us/powershell/module/aipservice/connect-aipservice?view=azureipps
- dns-prefetch//target.microsoft.com
- dns-prefetch//microsoftmscompoc.tt.omtrdc.net
- preconnect//mscom.demdex.net
- preload/static/third-party/adobe-target/at-js/2.9.0/at.js
Links
16- https://aka.ms/yourcaliforniaprivacychoices
- https://api.aadrm.com
- https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-authenticate-service-principal-powershell
- https://docs.microsoft.com/en-us/enterprise-mobility-security/solutions/ems-aip-premium-govt-service-description
- https://docs.microsoft.com/en-us/information-protection/develop/concept-api-permissions