Skip to content

Commit 73aa9c1

Browse files
authored
Fixed some bugs in permission descriptions
1 parent 650a967 commit 73aa9c1

File tree

1 file changed

+22
-27
lines changed

1 file changed

+22
-27
lines changed

articles/active-directory/users-groups-roles/roles-custom-available-permissions.md

Lines changed: 22 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -20,32 +20,25 @@ ms.collection: M365-identity-device-management
2020

2121
This article contains the currently available app registration permissions for custom role definitions in Azure Active Directory (Azure AD).
2222

23-
## Single-tenant v. multi-tenant permissions
23+
## Permissions for managing single-directory applications
2424

25-
Custom role permissions differ for single-tenant and multi-tenant applications. Single-tenant applications are available only to users in the Azure AD organization where the application is registered. Multi-tenant applications are available to all Azure AD organizations. Single-tenant applications are defined as having **Supported account types** set to "Accounts in this organizational directory only." In the Graph API, single-tenant applications have the signInAudience property set to "AzureADMyOrg."
25+
When choosing the permissions for your custom role, you have the option to grant access to manage only single-directory applications. Single-directory applications are available only to users in the Azure AD organization where the application is registered. Single-directory applications are defined as having **Supported account types** set to "Accounts in this organizational directory only." In the Graph API, single-directory applications have the signInAudience property set to "AzureADMyOrg."
2626

27-
## Application registration subtypes and permissions
27+
To grant access to manage only single-directory applications, use the permissions below with the subtype **applications.myOrganization**. For example, microsoft.directory/applications.myOrganization/basic/update.
2828

2929
See the [custom roles overview](roles-custom-overview.md) for an explanation of what the general terms subtype, permission, and property set mean. The following information is specific to application registrations.
3030

31-
### Subtypes
32-
33-
There is just one app registration subtype - applications.myOrganization. For example, microsoft.directory/applications.myOrganization/basic/update. This subtype is set on the **Authentication** page for a specific app registration, and corresponds to setting the signInAudience property to "AzureADMyOrg" using Graph API or PowerShell. The subtype restricts the permission to app registrations that are marked as accessible only by accounts in your organization (single-tenant applications).
34-
35-
You can use the restricted permission to grant read or manage permissions to internal applications only without granting read or manage permissions to applications accessible by accounts in other organizations.
36-
37-
There are applications.myOrganization versions of all read and update permissions as well as the delete permission. There is no applications.myOrganization version of create at this time. Standard permissions (for example, microsoft.directory/applications/basic/update) grant read or management permissions for all app registration types.
31+
### Create and delete
3832

39-
![Declare a single-tenant application or multi-tenant application](./media/roles-custom-available-permissions/supported-account-types.png)
33+
There are two permissions available for granting the ability to create application registrations, each with different behavior:
4034

41-
Details for the following permissions for the custom roles preview are listed in [Available custom role permissions in Azure Active Directory](roles-custom-available-permissions.md).
35+
#### microsoft.directory/applications/createAsOwner
4236

43-
### Create and delete
37+
Assigning this permission results in the creator being added as the first owner of the created app registration, and the created app registration will count against the creator's 250 created objects quota.
4438

45-
There are two permissions available for granting the ability to create application registrations, each with different behavior:
39+
#### microsoft.directory/applications/create
4640

47-
- **microsoft.directory/applications/createAsOwner**: Assigning this permission results in the creator being added as the first owner of the created app registration, and the created app registration will count against the creator's 250 created objects quota.
48-
- **microsoft.directory/applicationPolicies/create**: Assigning this permission results in the creator not being added as the first owner of the created app registration, and the created app registration will not count against the creator's 250 created objects quota. Use this permission carefully, because there is nothing preventing the assignee from creating app registrations until the directory-level quota is hit. If both permissions are assigned, this permission takes precedence.
41+
Assigning this permission results in the creator not being added as the first owner of the created app registration, and the created app registration will not count against the creator's 250 created objects quota. Use this permission carefully, because there is nothing preventing the assignee from creating app registrations until the directory-level quota is hit. If both permissions are assigned, this permission takes precedence.
4942

5043
If both permissions are assigned, the /create permission will take precedence. Though the /createAsOwner permission does not automatically add the creator as the first owner, owners can be specified during the creation of the app registration when using Graph APIs or PowerShell cmdlets.
5144

@@ -74,26 +67,22 @@ All member users in the organization can read app registration information by de
7467

7568
#### microsoft.directory/applications/allProperties/read
7669

77-
Ability to read all properties of single-tenant and multi-tenant applications outside of sensitive properties like credentials.
70+
Ability to read all properties of single-tenant and multi-tenant applications outside of properties that cannot be read in any situation like credentials.
7871

7972
#### microsoft.directory/applications.myOrganization/allProperties/read
8073

8174
Grants the same permissions as microsoft.directory/applications/allProperties/read, but only for single-tenant applications.
8275

83-
#### microsoft.directory/applications/standard/read: Grants access to all fields on the application registration branding page
84-
85-
![This permission grants access to the app registration branding page](./media/roles-custom-available-permissions/app-registration-branding.png)
86-
87-
#### microsoft.directory/applications.myOrganization/standard/read
88-
89-
Grants the same permissions as microsoft.directory/applications/standard/read, but for only single-tenant applications.
90-
9176
#### microsoft.directory/applications/owners/read
9277

9378
Grants the ability to read owners property on single-tenant and multi-tenant applications. Grants access to all fields on the application registration owners page:
9479

9580
![This permissions grants access to the app registration owners page](./media/roles-custom-available-permissions/app-registration-owners.png)
9681

82+
#### microsoft.directory/applications/standard/read: Grants access to all fields on the application registration branding page
83+
84+
![This permission grants access to the app registration branding page](./media/roles-custom-available-permissions/app-registration-branding.png)
85+
9786
Grants access to the following properties on the application entity:
9887

9988
- AllowActAsForAllClients
@@ -131,19 +120,25 @@ Grants access to the following properties on the application entity:
131120
- WebApp
132121
- WwwHomepage
133122

123+
#### microsoft.directory/applications.myOrganization/standard/read
124+
125+
Grants the same permissions as microsoft.directory/applications/standard/read, but for only single-tenant applications.
126+
134127
### Update
135128

136129
#### microsoft.directory/applications/allProperties/update
137130

131+
Ability to update all properties on single-directory and multi-directory applications.
132+
138133
#### microsoft.directory/applications.myOrganization/allProperties/update
139134

140135
Grants the same permissions as microsoft.directory/applications/allProperties/update, but only for single-tenant applications.
141136

142137
#### microsoft.directory/applications/audience/update
143138

144-
Grants access to all fields on the application registration authentication page:
139+
Ability to update the supported account type (signInAudience) property on single-directory and multi-directory applications.
145140

146-
![This permission grants access to app registration authentication page](./media/roles-custom-available-permissions/supported-account-types.png)
141+
![This permission grants access to app registration supported account type property on authentication page](./media/roles-custom-available-permissions/supported-account-types.png)
147142

148143
Grants access to the following properties on the application resource:
149144

0 commit comments

Comments
 (0)