You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can use the latest Azure AD PowerShell Preview module, [AzureADPreview](/powershell/module/azuread/?preserve-view=true&view=azureadps-2.0-preview), to classify permissions. Permission classifications are configured on the **ServicePrincipal** object of the API that publishes the permissions.
51
+
:::zone-end
52
52
53
-
#### List the current permission classifications for an API
53
+
:::zone pivot="aad-powershell"
54
+
55
+
You can use the latest [Azure AD PowerShell](/powershell/module/azuread/?view=azureadps-2.0), to classify permissions. Permission classifications are configured on the **ServicePrincipal** object of the API that publishes the permissions.
56
+
57
+
Run the following command to connect to Azure AD PowerShell. To consent to the required scopes, sign in with one of the roles listed in the prerequisite section of this article.
1. Retrieve the **ServicePrincipal** object for the API. Here we retrieve the ServicePrincipal object for the Microsoft Graph API:
72
82
@@ -91,7 +101,7 @@ You can use the latest Azure AD PowerShell Preview module, [AzureADPreview](/pow
91
101
-Classification "low"
92
102
```
93
103
94
-
####Remove a delegated permission classification
104
+
### Remove a delegated permission classification
95
105
96
106
1. Retrieve the **ServicePrincipal** object for the API. Here we retrieve the ServicePrincipal object for the Microsoft Graph API:
97
107
@@ -115,11 +125,123 @@ You can use the latest Azure AD PowerShell Preview module, [AzureADPreview](/pow
115
125
-ServicePrincipalId $api.ObjectId `
116
126
-Id $classificationToRemove.Id
117
127
```
128
+
:::zone-end
118
129
119
-
---
130
+
:::zone pivot="ms-powershell"
120
131
121
-
## Next steps
132
+
You can use Microsoft Graph PowerShell](/powershell/microsoftgraph/get-started?view=graph-powershell-1.0), to classify permissions. Permission classifications are configured on the **ServicePrincipal** object of the API that publishes the permissions.
133
+
134
+
Run the following command to connect to Microsoft Graph PowerShell. To consent to the required scopes, sign in with one of the roles listed in the prerequisite section of this article.
To configure permissions classifications for an enterprise application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) with one of the roles listed in the prerequisite section.
210
+
211
+
You'll need to consent to the following permissions:
0 commit comments