Skip to content

Commit 6e67bc8

Browse files
committed
minor edits
1 parent cb6aee6 commit 6e67bc8

File tree

1 file changed

+9
-5
lines changed

1 file changed

+9
-5
lines changed

articles/active-directory/manage-apps/manage-application-permissions.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 03/14/2023
11+
ms.date: 03/16/2023
1212
ms.author: jawoods
1313
ms.reviewer: phsignor
1414
zone_pivot_groups: enterprise-apps-all
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020

2121
# Review permissions granted to enterprise applications
2222

23-
In this article, you'll learn how to review permissions granted to applications in your Azure Active Directory (Azure AD) tenant. You may need to review permissions when you've detected a malicious application or the application has been granted more permissions than is necessary. You'll learn how to revoke permissions granted to the application using Microsoft Graph API and existing versions of PowerShell.
23+
In this article, you learn how to review permissions granted to applications in your Azure Active Directory (Azure AD) tenant. You may need to review permissions when you've detected a malicious application or the application has been granted more permissions than is necessary. You learn how to revoke permissions granted to the application using Microsoft Graph API and existing versions of PowerShell.
2424

2525
The steps in this article apply to all applications that were added to your Azure AD tenant via user or admin consent. For more information on consenting to applications, see [User and admin consent](user-admin-consent-overview.md).
2626

@@ -51,10 +51,10 @@ Each option generates PowerShell scripts that enable you to control user access
5151

5252
:::zone-end
5353

54-
## Revoke permissions
55-
5654
:::zone pivot="aad-powershell"
5755

56+
## Review and revoke permissions
57+
5858
Use the following Azure AD PowerShell script to revoke all permissions granted to an application.
5959

6060
```powershell
@@ -102,6 +102,8 @@ $assignments | ForEach-Object {
102102

103103
:::zone pivot="ms-powershell"
104104

105+
## Review and revoke permissions
106+
105107
Use the following Microsoft Graph PowerShell script to revoke all permissions granted to an application.
106108

107109
```powershell
@@ -154,9 +156,11 @@ $spApplicationPermissions = Get-MgServicePrincipalAppRoleAssignedTo -ServicePrin
154156

155157
:::zone pivot = "ms-graph"
156158

159+
## Review and revoke permissions
160+
157161
To review permissions, Sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) with one of the roles listed in the prerequisite section.
158162

159-
You'll need to consent to the following permissions:
163+
You need to consent to the following permissions:
160164

161165
`Application.ReadWrite.All`, `Directory.ReadWrite.All`, `DelegatedPermissionGrant.ReadWrite.All`, `AppRoleAssignment.ReadWrite.All`.
162166

0 commit comments

Comments
 (0)