Skip to content

Commit 65babaa

Browse files
authored
Merge pull request #225161 from omondiatieno/assign-owner-updates
assign owners with Microsoft Graph
2 parents 8c30999 + d0b342c commit 65babaa

File tree

1 file changed

+46
-4
lines changed

1 file changed

+46
-4
lines changed

articles/active-directory/manage-apps/assign-app-owners.md

Lines changed: 46 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,19 +9,22 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: app-mgmt
1111
ms.topic: how-to
12-
ms.date: 12/05/2022
12+
ms.date: 01/26/2023
1313
ms.author: jomondi
1414
ms.reviewer: saibandaru
15-
#Customer intent: As an Azure AD administrator, I want to assign owners to enterprise applications.
15+
zone_pivot_groups: enterprise-apps-minus-aad-powershell
1616

17+
#Customer intent: As an Azure AD administrator, I want to assign owners to enterprise applications.
1718
---
1819

1920
# Assign enterprise application owners
2021

21-
As an [owner of an enterprise application](overview-assign-app-owners.md) in Azure Active Directory (Azure AD), a user can manage the organization-specific configuration of it, such as single sign-on, provisioning, and user assignments. An owner can also add or remove other owners. Unlike Global Administrators, owners can manage only the enterprise applications they own. In this article, you learn how to assign an owner of an application.
22+
An [owner of an enterprise application](overview-assign-app-owners.md) in Azure Active Directory (Azure AD) can manage the organization-specific configuration of the application, such as single sign-on, provisioning, and user assignments. An owner can also add or remove other owners. Unlike Global Administrators, owners can manage only the enterprise applications they own. In this article, you learn how to assign an owner of an application.
2223

2324
## Assign an owner
2425

26+
:::zone pivot="portal"
27+
2528
To assign an owner to an enterprise application:
2629

2730
1. Sign in to [your Azure AD organization](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview) with an account that is eligible for the **Application Administrator** role or the **Cloud Application Administrator** role for the organization.
@@ -30,10 +33,49 @@ To assign an owner to an enterprise application:
3033
4. Search for and select the user account that you want to be an owner of the application.
3134
5. Click **Select** to add the user account that you chose as an owner of the application.
3235

36+
:::zone-end
37+
38+
:::zone pivot="ms-powershell"
39+
40+
Use the following Microsoft Graph PowerShell cmdlet to add an owner to an enterprise application.
41+
42+
You'll need to consent to the `Application.ReadWrite.All` permission.
43+
44+
In the following example, the user's object ID is 8afc02cb-4d62-4dba-b536-9f6d73e9be26 and the applicationId is 46e6adf4-a9cf-4b60-9390-0ba6fb00bf6b.
45+
46+
```powershell
47+
Import-Module Microsoft.Graph.Applications
48+
49+
$params = @{
50+
"@odata.id" = "https://graph.microsoft.com/v1.0/directoryObjects/8afc02cb-4d62-4dba-b536-9f6d73e9be26"
51+
}
52+
53+
New-MgServicePrincipalOwnerByRef -ServicePrincipalId '46e6adf4-a9cf-4b60-9390-0ba6fb00bf6b' -BodyParameter $params
54+
```
55+
:::zone-end
56+
57+
:::zone pivot="ms-graph"
58+
59+
To assign an owner to an application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) with one of the roles listed in the prerequisite section.
60+
61+
You'll need to consent to the `Application.ReadWrite.All` permission.
62+
63+
Run the following Microsoft Graph query to assign an owner to an application. You need the object ID of the user you want to assign the application to. In the following example, the user's object ID is 8afc02cb-4d62-4dba-b536-9f6d73e9be26 and the appId is 46e6adf4-a9cf-4b60-9390-0ba6fb00bf6b.
64+
65+
```http
66+
POST https://graph.microsoft.com/v1.0/servicePrincipals(appId='46e6adf4-a9cf-4b60-9390-0ba6fb00bf6b')/owners/$ref
67+
Content-Type: application/json
68+
69+
{
70+
"@odata.id": "https://graph.microsoft.com/v1.0/directoryObjects/8afc02cb-4d62-4dba-b536-9f6d73e9be26"
71+
}
72+
```
73+
74+
:::zone-end
75+
3376
> [!NOTE]
3477
> If the user setting **Restrict access to Azure AD administration portal** is set to `Yes`, non-admin users will not be able to use the Azure portal to manage the applications they own. For more information about the actions that can be performed on owned enterprise applications, see [Owned enterprise applications](../fundamentals/users-default-permissions.md#owned-enterprise-applications).
3578
36-
3779
## Next steps
3880

3981
- [Delegate app registration permissions in Azure Active Directory](../roles/delegate-app-roles.md)

0 commit comments

Comments
 (0)