Skip to content

Commit 5c2a5b0

Browse files
committed
update permissions required
1 parent 49bd606 commit 5c2a5b0

File tree

1 file changed

+5
-7
lines changed

1 file changed

+5
-7
lines changed

articles/active-directory/manage-apps/configure-permission-classifications.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ The minimum permissions needed to do basic sign-in are `openid`, `profile`, `ema
3030
To configure permission classifications, you need:
3131

3232
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
33-
- One of the following roles: An administrator, or owner of the service principal.
33+
- One of the following roles: A global administrator, or owner of the service principal.
3434

3535
## Manage permission classifications
3636

@@ -57,7 +57,7 @@ You can use the latest [Azure AD PowerShell](/powershell/module/azuread/?preserv
5757
Run the following command to connect to Azure AD PowerShell. To consent to the required scopes, sign in with one of the roles listed in the prerequisite section of this article.
5858

5959
```powershell
60-
Connect-AzureAD -Scopes "Application.ReadWrite.All", "Directory.ReadWrite.All", "DelegatedPermissionGrant.ReadWrite.All".
60+
Connect-AzureAD -Scopes "Policy.ReadWrite.PermissionGrant".
6161
```
6262

6363
### List the current permission classifications
@@ -134,7 +134,7 @@ You can use [Microsoft Graph PowerShell](/powershell/microsoftgraph/get-started?
134134
Run the following command to connect to Microsoft Graph PowerShell. To consent to the required scopes, sign in with one of the roles listed in the prerequisite section of this article.
135135

136136
```powershell
137-
Connect-MgGraph -Scopes "Application.ReadWrite.All", "Directory.ReadWrite.All", "DelegatedPermissionGrant.ReadWrite.All".
137+
Connect-MgGraph -Scopes "Policy.ReadWrite.PermissionGrant".
138138
```
139139

140140
### List current permission classifications for an API
@@ -208,9 +208,7 @@ Remove-MgServicePrincipalDelegatedPermissionClassification -DelegatedPermissionC
208208

209209
To configure permissions classifications for an enterprise application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) with one of the roles listed in the prerequisite section.
210210

211-
You need to consent to the following permissions:
212-
213-
`Application.ReadWrite.All`, `Directory.ReadWrite.All`, `DelegatedPermissionGrant.ReadWrite.All`.
211+
You need to consent to the `Policy.ReadWrite.PermissionGrant` permission.
214212

215213
Run the following queries on Microsoft Graph explorer to add a delegated permissions classification for an application.
216214

@@ -244,4 +242,4 @@ DELETE https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0
244242
## Next steps
245243

246244
- [Manage app consent policies](manage-app-consent-policies.md)
247-
- [Permissions and consent in the Microsoft identity platform](../develop/v2-permissions-and-consent.md)
245+
- [Permissions and consent in the Microsoft identity platform](../develop/v2-permissions-and-consent.md)

0 commit comments

Comments
 (0)