Skip to content

Commit 28e8c26

Browse files
authored
Merge pull request #93319 from VinceSmith/patch-32
Fixed some bugs in permission descriptions
2 parents 0975c63 + 954974e commit 28e8c26

File tree

1 file changed

+21
-136
lines changed

1 file changed

+21
-136
lines changed

articles/active-directory/users-groups-roles/roles-custom-available-permissions.md

Lines changed: 21 additions & 136 deletions
Original file line numberDiff line numberDiff line change
@@ -20,32 +20,25 @@ ms.collection: M365-identity-device-management
2020

2121
This article contains the currently available app registration permissions for custom role definitions in Azure Active Directory (Azure AD).
2222

23-
## Single-tenant v. multi-tenant permissions
23+
## Permissions for managing single-directory applications
2424

25-
Custom role permissions differ for single-tenant and multi-tenant applications. Single-tenant applications are available only to users in the Azure AD organization where the application is registered. Multi-tenant applications are available to all Azure AD organizations. Single-tenant applications are defined as having **Supported account types** set to "Accounts in this organizational directory only." In the Graph API, single-tenant applications have the signInAudience property set to "AzureADMyOrg."
25+
When choosing the permissions for your custom role, you have the option to grant access to manage only single-directory applications. Single-directory applications are available only to users in the Azure AD organization where the application is registered. Single-directory applications are defined as having **Supported account types** set to "Accounts in this organizational directory only." In the Graph API, single-directory applications have the signInAudience property set to "AzureADMyOrg."
2626

27-
## Application registration subtypes and permissions
27+
To grant access to manage only single-directory applications, use the permissions below with the subtype **applications.myOrganization**. For example, microsoft.directory/applications.myOrganization/basic/update.
2828

2929
See the [custom roles overview](roles-custom-overview.md) for an explanation of what the general terms subtype, permission, and property set mean. The following information is specific to application registrations.
3030

31-
### Subtypes
32-
33-
There is just one app registration subtype - applications.myOrganization. For example, microsoft.directory/applications.myOrganization/basic/update. This subtype is set on the **Authentication** page for a specific app registration, and corresponds to setting the signInAudience property to "AzureADMyOrg" using Graph API or PowerShell. The subtype restricts the permission to app registrations that are marked as accessible only by accounts in your organization (single-tenant applications).
34-
35-
You can use the restricted permission to grant read or manage permissions to internal applications only without granting read or manage permissions to applications accessible by accounts in other organizations.
36-
37-
There are applications.myOrganization versions of all read and update permissions as well as the delete permission. There is no applications.myOrganization version of create at this time. Standard permissions (for example, microsoft.directory/applications/basic/update) grant read or management permissions for all app registration types.
31+
### Create and delete
3832

39-
![Declare a single-tenant application or multi-tenant application](./media/roles-custom-available-permissions/supported-account-types.png)
33+
There are two permissions available for granting the ability to create application registrations, each with different behavior:
4034

41-
Details for the following permissions for the custom roles preview are listed in [Available custom role permissions in Azure Active Directory](roles-custom-available-permissions.md).
35+
#### microsoft.directory/applications/createAsOwner
4236

43-
### Create and delete
37+
Assigning this permission results in the creator being added as the first owner of the created app registration, and the created app registration will count against the creator's 250 created objects quota.
4438

45-
There are two permissions available for granting the ability to create application registrations, each with different behavior:
39+
#### microsoft.directory/applications/create
4640

47-
- **microsoft.directory/applications/createAsOwner**: Assigning this permission results in the creator being added as the first owner of the created app registration, and the created app registration will count against the creator's 250 created objects quota.
48-
- **microsoft.directory/applicationPolicies/create**: Assigning this permission results in the creator not being added as the first owner of the created app registration, and the created app registration will not count against the creator's 250 created objects quota. Use this permission carefully, because there is nothing preventing the assignee from creating app registrations until the directory-level quota is hit. If both permissions are assigned, this permission takes precedence.
41+
Assigning this permission results in the creator not being added as the first owner of the created app registration, and the created app registration will not count against the creator's 250 created objects quota. Use this permission carefully, because there is nothing preventing the assignee from creating app registrations until the directory-level quota is hit. If both permissions are assigned, this permission takes precedence.
4942

5043
If both permissions are assigned, the /create permission will take precedence. Though the /createAsOwner permission does not automatically add the creator as the first owner, owners can be specified during the creation of the app registration when using Graph APIs or PowerShell cmdlets.
5144

@@ -74,81 +67,41 @@ All member users in the organization can read app registration information by de
7467

7568
#### microsoft.directory/applications/allProperties/read
7669

77-
Ability to read all properties of single-tenant and multi-tenant applications outside of sensitive properties like credentials.
70+
Ability to read all properties of single-tenant and multi-tenant applications outside of properties that cannot be read in any situation like credentials.
7871

7972
#### microsoft.directory/applications.myOrganization/allProperties/read
8073

8174
Grants the same permissions as microsoft.directory/applications/allProperties/read, but only for single-tenant applications.
8275

83-
#### microsoft.directory/applications/standard/read: Grants access to all fields on the application registration branding page
84-
85-
![This permission grants access to the app registration branding page](./media/roles-custom-available-permissions/app-registration-branding.png)
86-
87-
#### microsoft.directory/applications.myOrganization/standard/read
88-
89-
Grants the same permissions as microsoft.directory/applications/standard/read, but for only single-tenant applications.
90-
9176
#### microsoft.directory/applications/owners/read
9277

9378
Grants the ability to read owners property on single-tenant and multi-tenant applications. Grants access to all fields on the application registration owners page:
9479

9580
![This permissions grants access to the app registration owners page](./media/roles-custom-available-permissions/app-registration-owners.png)
9681

97-
Grants access to the following properties on the application entity:
98-
99-
- AllowActAsForAllClients
100-
- AllowPassthroughUsers
101-
- AppAddress
102-
- AppBrandingElements
103-
- AppCategory
104-
- AppCreatedDateTime
105-
- AppData
106-
- AppId
107-
- AppInformationalUrl
108-
- ApplicationTag
109-
- AppLogoUrl
110-
- AppMetadata
111-
- AppOptions
112-
- BinaryExtensionAttribute
113-
- BooleanExtensionAttribute
114-
- CountriesBlockedForMinors
115-
- CreatedOnBehalfOf
116-
- DateTimeExtensionAttribute
117-
- DisplayName
118-
- ExtensionAttributeDefinition
119-
- IntegerExtensionAttribute
120-
- KnownClientApplications
121-
- LargeIntegerExtensionAttribute
122-
- LegalAgeGroupRule
123-
- LocalizedAppBrandingElements
124-
- MainLogo
125-
- MsaAppId
126-
- ResourceApplicationSet
127-
- ServiceDiscoveryEndpoint
128-
- StringExtensionAttribute
129-
- TrustedCertificateSubject
130-
- WebApi
131-
- WebApp
132-
- WwwHomepage
82+
#### microsoft.directory/applications/standard/read
83+
84+
Grants access to read standard application registration properties. This includes properties across application registration pages.
85+
86+
#### microsoft.directory/applications.myOrganization/standard/read
87+
88+
Grants the same permissions as microsoft.directory/applications/standard/read, but for only single-tenant applications.
13389

13490
### Update
13591

13692
#### microsoft.directory/applications/allProperties/update
13793

94+
Ability to update all properties on single-directory and multi-directory applications.
95+
13896
#### microsoft.directory/applications.myOrganization/allProperties/update
13997

14098
Grants the same permissions as microsoft.directory/applications/allProperties/update, but only for single-tenant applications.
14199

142100
#### microsoft.directory/applications/audience/update
143101

144-
Grants access to all fields on the application registration authentication page:
145-
146-
![This permission grants access to app registration authentication page](./media/roles-custom-available-permissions/supported-account-types.png)
147-
148-
Grants access to the following properties on the application resource:
102+
Ability to update the supported account type (signInAudience) property on single-directory and multi-directory applications.
149103

150-
- AvailableToOtherTenants
151-
- SignInAudience
104+
![This permission grants access to app registration supported account type property on authentication page](./media/roles-custom-available-permissions/supported-account-types.png)
152105

153106
#### microsoft.directory/applications.myOrganization/audience/update
154107

@@ -160,20 +113,6 @@ Ability to update the reply URL, sign-out URL, implicit flow, and publisher doma
160113

161114
![Grants access to app registration authentication but not supported account types](./media/roles-custom-available-permissions/supported-account-types.png)
162115

163-
Grants access to the following properties on the application resource:
164-
165-
- AcceptMappedClaims
166-
- AccessTokenAcceptedVersion
167-
- AddIns
168-
- GroupMembershipClaims
169-
- IsDeviceOnlyAuthSupported
170-
- OAuth2LegacyUrlPathMatching
171-
- OauthOidcResponsePolicyBitmap
172-
- OptionalClaims
173-
- OrgRestrictions
174-
- PublicClient
175-
- UseCustomTokenSigningKey
176-
177116
#### microsoft.directory/applications.myOrganization/authentication/update
178117

179118
Grants the same permissions as microsoft.directory/applications/authentication/update, but only for single-tenant applications.
@@ -184,42 +123,6 @@ Ability to update the name, logo, homepage URL, terms of service URL, and privac
184123

185124
![This permission grants access to the app registration branding page](./media/roles-custom-available-permissions/app-registration-branding.png)
186125

187-
Grants access to the following properties on the application resource:
188-
189-
- AllowActAsForAllClients
190-
- AllowPassthroughUsers
191-
- AppAddress
192-
- AppBrandingElements
193-
- AppCategory
194-
- AppData
195-
- AppId
196-
- AppInformationalUrl
197-
- ApplicationTag
198-
- AppLogoUrl
199-
- AppMetadata
200-
- AppOptions
201-
- BinaryExtensionAttribute
202-
- BooleanExtensionAttribute
203-
- CountriesBlockedForMinors
204-
- CreatedOnBehalfOf
205-
- DateTimeExtensionAttribute
206-
- DisplayName
207-
- ExtensionAttributeDefinition
208-
- IntegerExtensionAttribute
209-
- KnownClientApplications
210-
- LargeIntegerExtensionAttribute
211-
- LegalAgeGroupRule
212-
- LocalizedAppBrandingElements
213-
- MainLogo
214-
- MsaAppId
215-
- ResourceApplicationSet
216-
- ServiceDiscoveryEndpoint
217-
- StringExtensionAttribute
218-
- TrustedCertificateSubject
219-
- WebApi
220-
- WebApp
221-
- WwwHomepage
222-
223126
#### microsoft.directory/applications.myOrganization/basic/update
224127

225128
Grants the same permissions as microsoft.directory/applications/basic/update, but only for single-tenant applications.
@@ -230,13 +133,6 @@ Ability to update the certificates and client secrets properties on single-tenan
230133

231134
![This permission grants access to the app registration certificates & secrets page](./media/roles-custom-available-permissions/app-registration-secrets.png)
232135

233-
Grants access to the following properties on the application resource:
234-
- AsymmetricKey
235-
- EncryptedSecretKey
236-
- KeyDescription
237-
- SharedKeyReference
238-
- TokenEncryptionKeyId
239-
240136
#### microsoft.directory/applications.myOrganization/credentials/update
241137

242138
Grants the same permissions as microsoft.directory/applications/credentials/update, but only for single-directory applications.
@@ -247,9 +143,6 @@ Ability to update the owner property on single-tenant and multi-tenant. Grants a
247143

248144
![This permissions grants access to the app registration owners page](./media/roles-custom-available-permissions/app-registration-owners.png)
249145

250-
Grants access to the following properties on the application resource:
251-
- Owners
252-
253146
#### microsoft.directory/applications.myOrganization/owners/update
254147

255148
Grants the same permissions as microsoft.directory/applications/owners/update, but only for single-tenant applications.
@@ -262,14 +155,6 @@ Ability to update the delegated permissions, application permissions, authorized
262155

263156
![This permissions grants access to the app registration Expose an API page](./media/roles-custom-available-permissions/app-registration-expose-api.png)
264157

265-
Grants access to the following properties on the application resource:
266-
267-
- AppIdentifierUri
268-
- Entitlement
269-
- PreAuthorizedApplications
270-
- RecordConsentConditions
271-
- RequiredResourceAccess
272-
273158
#### microsoft.directory/applications.myOrganization/permissions/update
274159

275160
Grants the same permissions as microsoft.directory/applications/permissions/update, but only for single-tenant applications.

0 commit comments

Comments
 (0)