You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article contains the currently available app registration permissions for custom role definitions in Azure Active Directory (Azure AD).
22
22
23
-
## Single-tenant v. multi-tenant permissions
23
+
## Permissions for managing single-directory applications
24
24
25
-
Custom role permissions differ for single-tenant and multi-tenant applications. Single-tenant applications are available only to users in the Azure AD organization where the application is registered. Multi-tenant applications are available to all Azure AD organizations. Single-tenant applications are defined as having **Supported account types** set to "Accounts in this organizational directory only." In the Graph API, single-tenant applications have the signInAudience property set to "AzureADMyOrg."
25
+
When choosing the permissions for your custom role, you have the option to grant access to manage only single-directory applications. Single-directory applications are available only to users in the Azure AD organization where the application is registered. Single-directory applications are defined as having **Supported account types** set to "Accounts in this organizational directory only." In the Graph API, single-directory applications have the signInAudience property set to "AzureADMyOrg."
26
26
27
-
## Application registration subtypes and permissions
27
+
To grant access to manage only single-directory applications, use the permissions below with the subtype **applications.myOrganization**. For example, microsoft.directory/applications.myOrganization/basic/update.
28
28
29
29
See the [custom roles overview](roles-custom-overview.md) for an explanation of what the general terms subtype, permission, and property set mean. The following information is specific to application registrations.
30
30
31
-
### Subtypes
32
-
33
-
There is just one app registration subtype - applications.myOrganization. For example, microsoft.directory/applications.myOrganization/basic/update. This subtype is set on the **Authentication** page for a specific app registration, and corresponds to setting the signInAudience property to "AzureADMyOrg" using Graph API or PowerShell. The subtype restricts the permission to app registrations that are marked as accessible only by accounts in your organization (single-tenant applications).
34
-
35
-
You can use the restricted permission to grant read or manage permissions to internal applications only without granting read or manage permissions to applications accessible by accounts in other organizations.
36
-
37
-
There are applications.myOrganization versions of all read and update permissions as well as the delete permission. There is no applications.myOrganization version of create at this time. Standard permissions (for example, microsoft.directory/applications/basic/update) grant read or management permissions for all app registration types.
31
+
### Create and delete
38
32
39
-

33
+
There are two permissions available for granting the ability to create application registrations, each with different behavior:
40
34
41
-
Details for the following permissions for the custom roles preview are listed in [Available custom role permissions in Azure Active Directory](roles-custom-available-permissions.md).
Assigning this permission results in the creator being added as the first owner of the created app registration, and the created app registration will count against the creator's 250 created objects quota.
44
38
45
-
There are two permissions available for granting the ability to create application registrations, each with different behavior:
39
+
#### microsoft.directory/applications/create
46
40
47
-
-**microsoft.directory/applications/createAsOwner**: Assigning this permission results in the creator being added as the first owner of the created app registration, and the created app registration will count against the creator's 250 created objects quota.
48
-
-**microsoft.directory/applicationPolicies/create**: Assigning this permission results in the creator not being added as the first owner of the created app registration, and the created app registration will not count against the creator's 250 created objects quota. Use this permission carefully, because there is nothing preventing the assignee from creating app registrations until the directory-level quota is hit. If both permissions are assigned, this permission takes precedence.
41
+
Assigning this permission results in the creator not being added as the first owner of the created app registration, and the created app registration will not count against the creator's 250 created objects quota. Use this permission carefully, because there is nothing preventing the assignee from creating app registrations until the directory-level quota is hit. If both permissions are assigned, this permission takes precedence.
49
42
50
43
If both permissions are assigned, the /create permission will take precedence. Though the /createAsOwner permission does not automatically add the creator as the first owner, owners can be specified during the creation of the app registration when using Graph APIs or PowerShell cmdlets.
51
44
@@ -74,81 +67,41 @@ All member users in the organization can read app registration information by de
Ability to read all properties of single-tenant and multi-tenant applications outside of sensitive properties like credentials.
70
+
Ability to read all properties of single-tenant and multi-tenant applications outside of properties that cannot be read in any situation like credentials.
Grants the same permissions as microsoft.directory/applications/standard/read, but for only single-tenant applications.
90
-
91
76
#### microsoft.directory/applications/owners/read
92
77
93
78
Grants the ability to read owners property on single-tenant and multi-tenant applications. Grants access to all fields on the application registration owners page:
94
79
95
80

96
81
97
-
Grants access to the following properties on the application entity:
Grants access to all fields on the application registration authentication page:
145
-
146
-

147
-
148
-
Grants access to the following properties on the application resource:
102
+
Ability to update the supported account type (signInAudience) property on single-directory and multi-directory applications.
149
103
150
-
- AvailableToOtherTenants
151
-
- SignInAudience
104
+

@@ -160,20 +113,6 @@ Ability to update the reply URL, sign-out URL, implicit flow, and publisher doma
160
113
161
114

162
115
163
-
Grants access to the following properties on the application resource:
Grants the same permissions as microsoft.directory/applications/owners/update, but only for single-tenant applications.
@@ -262,14 +155,6 @@ Ability to update the delegated permissions, application permissions, authorized
262
155
263
156

264
157
265
-
Grants access to the following properties on the application resource:
0 commit comments