Skip to content

Commit 7bc7c40

Browse files
committed
minor fix
1 parent 40095f7 commit 7bc7c40

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

articles/active-directory/manage-apps/configure-permission-classifications.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ In this example, we've classified the minimum set of permission required for sin
5252

5353
:::zone pivot="aad-powershell"
5454

55-
You can use the latest [Azure AD PowerShell](/powershell/module/azuread/??preserve-view=true&view=azureadps-2.0), to classify permissions. Permission classifications are configured on the **ServicePrincipal** object of the API that publishes the permissions.
55+
You can use the latest [Azure AD PowerShell](/powershell/module/azuread/?preserve-view=true&view=azureadps-2.0), to classify permissions. Permission classifications are configured on the **ServicePrincipal** object of the API that publishes the permissions.
5656

5757
Run the following command to connect to Azure AD PowerShell. To consent to the required scopes, sign in with one of the roles listed in the prerequisite section of this article.
5858

@@ -129,7 +129,7 @@ Connect-AzureAD -Scopes "Application.ReadWrite.All", "Directory.ReadWrite.All",
129129

130130
:::zone pivot="ms-powershell"
131131

132-
You can use Microsoft Graph PowerShell](/powershell/microsoftgraph/get-started?view=graph-powershell-1.0), to classify permissions. Permission classifications are configured on the **ServicePrincipal** object of the API that publishes the permissions.
132+
You can use [Microsoft Graph PowerShell](/powershell/microsoftgraph/get-started?view=graph-powershell-1.0), to classify permissions. Permission classifications are configured on the **ServicePrincipal** object of the API that publishes the permissions.
133133

134134
Run the following command to connect to Microsoft Graph PowerShell. To consent to the required scopes, sign in with one of the roles listed in the prerequisite section of this article.
135135

@@ -139,33 +139,33 @@ Connect-MgGraph -Scopes "Application.ReadWrite.All", "Directory.ReadWrite.All",
139139

140140
### List current permission classifications for an API
141141

142-
1. Retrieve the servicePrincipal object for the API
142+
1. Retrieve the servicePrincipal object for the API:
143143

144144
```powershell
145145
$api = Get-MgServicePrincipal -Filter "displayName eq 'Microsoft Graph'"
146146
```
147147

148-
1. Read the delegated permission classifications for the API
148+
1. Read the delegated permission classifications for the API:
149149

150150
```powershell
151151
Get-MgServicePrincipalDelegatedPermissionClassification -ServicePrincipalId $api.Id
152152
```
153153

154154
### Classify a permission as "Low impact"
155155

156-
1. Retrieve the servicePrincipal object for the API
156+
1. Retrieve the servicePrincipal object for the API:
157157

158158
```powershell
159159
$api = Get-MgServicePrincipal -Filter "displayName eq 'Microsoft Graph'"
160160
```
161161

162-
1. Find the delegated permission you would like to classify
162+
1. Find the delegated permission you would like to classify:
163163

164164
```powershell
165165
$delegatedPermission = $api.Oauth2PermissionScopes | Where-Object {$_.Value -eq "openid"}
166166
```
167167

168-
1. Set the permission classification
168+
1. Set the permission classification:
169169

170170
```powershell
171171
$params = @{
@@ -183,21 +183,21 @@ Connect-MgGraph -Scopes "Application.ReadWrite.All", "Directory.ReadWrite.All",
183183

184184
### Remove a delegated permission classification
185185

186-
1. Retrieve the servicePrincipal object for the API
186+
1. Retrieve the servicePrincipal object for the API:
187187

188188
```powershell
189189
$api = Get-MgServicePrincipal -Filter "displayName eq 'Microsoft Graph'"
190190
```
191191

192-
1. Find the delegated permission classification you wish to remove
192+
1. Find the delegated permission classification you wish to remove:
193193

194194
```powershell
195195
$classifications= Get-MgServicePrincipalDelegatedPermissionClassification -ServicePrincipalId $api.Id
196196
197197
$classificationToRemove = $classifications | Where-Object {$_.PermissionName -eq "openid"}
198198
```
199199

200-
1. Delete the permission classification
200+
1. Delete the permission classification:
201201

202202
```powershell
203203
Remove-MgServicePrincipalDelegatedPermissionClassification -DelegatedPermissionClassificationId $classificationToRemove.Id -ServicePrincipalId $api.id
@@ -214,13 +214,13 @@ You need to consent to the following permissions:
214214

215215
Run the following queries on Microsoft Graph explorer to add a delegated permissions classification for an application.
216216

217-
1. List current permission classifications for an API
217+
1. List current permission classifications for an API.
218218

219219
```http
220220
GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000-c000-000000000000')/delegatedPermissionClassifications
221221
```
222222

223-
1. Add a delegated permission classification for an application. In the following example, we classify the permission as "low impact".
223+
1. Add a delegated permission classification for an API. In the following example, we classify the permission as "low impact".
224224

225225
```http
226226
POST https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000-c000-000000000000')/delegatedPermissionClassifications
@@ -232,7 +232,7 @@ Run the following queries on Microsoft Graph explorer to add a delegated permiss
232232
}
233233
```
234234

235-
Run the following query on Microsoft Graph explorer to remove a delegated permissions classification for an application.
235+
Run the following query on Microsoft Graph explorer to remove a delegated permissions classification for an API.
236236

237237
```http
238238
DELETE https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000-c000-000000000000')/delegatedPermissionClassifications/QUjntFaOC0i-i5EDSLGLTAE

0 commit comments

Comments
 (0)