You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/configure-permission-classifications.md
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ The minimum permissions needed to do basic sign-in are `openid`, `profile`, `ema
30
30
To configure permission classifications, you need:
31
31
32
32
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
33
-
- One of the following roles: An administrator, or owner of the service principal.
33
+
- One of the following roles: A global administrator, or owner of the service principal.
34
34
35
35
## Manage permission classifications
36
36
@@ -57,7 +57,7 @@ You can use the latest [Azure AD PowerShell](/powershell/module/azuread/?preserv
57
57
Run the following command to connect to Azure AD PowerShell. To consent to the required scopes, sign in with one of the roles listed in the prerequisite section of this article.
@@ -134,7 +134,7 @@ You can use [Microsoft Graph PowerShell](/powershell/microsoftgraph/get-started?
134
134
Run the following command to connect to Microsoft Graph PowerShell. To consent to the required scopes, sign in with one of the roles listed in the prerequisite section of this article.
To configure permissions classifications for an enterprise application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) with one of the roles listed in the prerequisite section.
title: Assign, update, list, or remove custom security attributes for an application (Preview) - Azure Active Directory
2
+
title: Manage custom security attributes for an application (Preview) - Azure Active Directory
3
3
description: Assign, update, list, or remove custom security attributes for an application that has been registered with your Azure Active Directory (Azure AD) tenant.
4
4
services: active-directory
5
5
author: omondiatieno
6
6
ms.service: active-directory
7
7
ms.subservice: app-mgmt
8
8
ms.topic: how-to
9
9
ms.workload: identity
10
-
ms.date: 02/20/2023
10
+
ms.date: 02/28/2023
11
11
ms.author: jomondi
12
12
ms.reviewer: rolyon
13
+
zone_pivot_groups: enterprise-apps-all
14
+
13
15
---
14
16
15
-
# Assign, update, list, or remove custom security attributes for an application (Preview)
17
+
# Manage custom security attributes for an application (Preview)
16
18
17
19
> [!IMPORTANT]
18
20
> Custom security attributes are currently in PREVIEW.
@@ -26,18 +28,25 @@ To assign or remove custom security attributes for an application in your Azure
-[AzureADPreview](https://www.powershellgallery.com/packages/AzureADPreview) version 2.0.2.138 or later when using PowerShell
31
+
- Make sure you have existing custom security attributes. To learn how to create a security attribute, see [Add or deactivate custom security attributes in Azure AD](../fundamentals/custom-security-attributes-add.md).
32
+
30
33
31
34
> [!IMPORTANT]
32
-
> By default, [Global Administrator](../roles/permissions-reference.md#global-administrator) and other administrator roles do not have permissions to read, define, or assign custom security attributes.
35
+
> By default, [Global Administrator](../roles/permissions-reference.md#global-administrator) and other administrator roles don't have permissions to read, define, or assign custom security attributes.
33
36
34
-
## Assign custom security attributes to an application
37
+
## Assign, update, list, or remove custom attributes for an application
35
38
36
-
1. Sign in to the [Azure portal](https://portal.azure.com) or [Azure AD admin center](https://aad.portal.azure.com).
39
+
Learn how to work with custom attributes for applications in Azure AD.
40
+
### Assign custom security attributes to an application
37
41
38
-
1. Make sure that you have existing custom security attributes. For more information, see [Add or deactivate custom security attributes in Azure AD](../fundamentals/custom-security-attributes-add.md).
39
42
40
-
1. Select **Azure Active Directory** > **Enterprise applications**.
43
+
:::zone pivot="portal"
44
+
45
+
Undertake the following steps to assign custom security attributes through the Azure portal.
46
+
47
+
1. Sign in to the [Azure portal](https://portal.azure.com) or [Azure AD admin center](https://aad.portal.azure.com).
48
+
49
+
1. Select **Azure Active Directory**, then select **Enterprise applications**.
41
50
42
51
1. Find and select the application you want to add a custom security attribute to.
43
52
@@ -55,39 +64,39 @@ To assign or remove custom security attributes for an application in your Azure
55
64
- For predefined custom security attribute values, select a value from the **Assigned values** list.
56
65
- For multi-valued custom security attributes, select **Add values** to open the **Attribute values** pane and add your values. When finished adding values, select **Done**.
57
66
58
-

67
+

59
68
60
69
1. When finished, select **Save** to assign the custom security attributes to the application.
61
70
62
-
## Update custom security attribute assignment values for an application
71
+
###Update custom security attribute assignment values for an application
63
72
64
73
1. Sign in to the [Azure portal](https://portal.azure.com) or [Azure AD admin center](https://aad.portal.azure.com).
65
74
66
-
1. Select **Azure Active Directory** >**Enterprise applications**.
75
+
1. Select **Azure Active Directory**, then select**Enterprise applications**.
67
76
68
77
1. Find and select the application that has a custom security attribute assignment value you want to update.
69
78
70
79
1. In the Manage section, select **Custom security attributes (preview)**.
71
80
72
81
1. Find the custom security attribute assignment value you want to update.
73
82
74
-
Once you have assigned a custom security attribute to an application, you can only change the value of the custom security attribute. You can't change other properties of the custom security attribute, such as attribute set or custom security attribute name.
83
+
Once you've assigned a custom security attribute to an application, you can only change the value of the custom security attribute. You can't change other properties of the custom security attribute, such as attribute set or custom security attribute name.
75
84
76
85
1. Depending on the properties of the selected custom security attribute, you can update a single value, select a value from a predefined list, or update multiple values.
77
86
78
87
1. When finished, select **Save**.
79
88
80
-
## Filter applications based on custom security attributes
89
+
###Filter applications based on custom security attributes
81
90
82
-
You can filter the list of custom security attributes assigned to applications on the All applications page.
91
+
You can filter the list of custom security attributes assigned to applications on the **All applications** page.
83
92
84
93
1. Sign in to the [Azure portal](https://portal.azure.com) or [Azure AD admin center](https://aad.portal.azure.com).
85
94
86
-
1. Select **Azure Active Directory** >**Enterprise applications**.
95
+
1. Select **Azure Active Directory**, then select**Enterprise applications**.
87
96
88
97
1. Select **Add filters** to open the Pick a field pane.
89
98
90
-
If you don't see Add filters, click the banner to enable the Enterprise applications search preview.
99
+
If you don't see **Add filters**, select the banner to enable the Enterprise applications search preview.
91
100
92
101
1. For **Filters**, select **Custom security attribute**.
93
102
@@ -101,25 +110,28 @@ You can filter the list of custom security attributes assigned to applications o
101
110
102
111
1. To apply the filter, select **Apply**.
103
112
104
-
## Remove custom security attribute assignments from applications
113
+
###Remove custom security attribute assignments from applications
105
114
106
115
1. Sign in to the [Azure portal](https://portal.azure.com) or [Azure AD admin center](https://aad.portal.azure.com).
107
116
108
-
1. Select **Azure Active Directory** >**Enterprise applications**.
117
+
1. Select **Azure Active Directory**, then select**Enterprise applications**.
109
118
110
119
1. Find and select the application that has the custom security attribute assignments you want to remove.
111
120
112
-
1. In the Manage section, select **Custom security attributes (preview)**.
121
+
1. In the **Manage** section, select **Custom security attributes (preview)**.
113
122
114
123
1. Add check marks next to all the custom security attribute assignments you want to remove.
115
124
116
125
1. Select **Remove assignment**.
117
126
118
-
## PowerShell
127
+
:::zone-end
128
+
129
+
:::zone pivot="aad-powershell"
130
+
### PowerShell
119
131
120
132
To manage custom security attribute assignments for applications in your Azure AD organization, you can use PowerShell. The following commands can be used to manage assignments.
121
133
122
-
####Assign a custom security attribute with a multi-string value to an application (service principal)
134
+
### Assign a custom security attribute with a multi-string value to an application (service principal)
123
135
124
136
Use the [Set-AzureADMSServicePrincipal](/powershell/module/azuread/set-azureadmsserviceprincipal) command to assign a custom security attribute with a multi-string value to an application (service principal).
####Update a custom security attribute with a multi-string value for an application (service principal)
154
+
### Update a custom security attribute with a multi-string value for an application (service principal)
143
155
144
-
Use the [Set-AzureADMSServicePrincipal](/powershell/module/azuread/set-azureadmsserviceprincipal) command to update a custom security attribute with a multi-string value for an application (service principal).
156
+
Provide the new set of attribute values that you would like to reflect on the application. In this example, we're adding one more value for project attribute.
####Get the custom security attribute assignments for an application (service principal)
174
+
### Get the custom security attribute assignments for an application (service principal)
163
175
164
176
Use the [Get-AzureADMSServicePrincipal](/powershell/module/azuread/get-azureadmsserviceprincipal) command to get the custom security attribute assignments for an application (service principal).
To manage custom security attribute assignments for applications in your Azure AD organization, you can use Microsoft Graph PowerShell. The following commands can be used to manage assignments.
188
+
189
+
### Assign a custom security attribute with a multi-string value to an application (service principal)
190
+
191
+
Use the [Set-AzureADMSServicePrincipal](/powershell/module/azuread/set-azureadmsserviceprincipal) command to assign a custom security attribute with a multi-string value to an application (service principal).
### Update a custom security attribute with a multi-string value for an application (service principal)
218
+
219
+
Provide the new set of attribute values that you would like to reflect on the application. In this example, we're adding one more value for project attribute.
To manage custom security attribute assignments for applications in your Azure AD organization, you can use the Microsoft Graph API. The following API calls can be made to manage assignments.
264
+
:::zone pivot="ms-graph"
265
+
266
+
To manage custom security attribute assignments for applications in your Azure AD organization, you can use the Microsoft Graph API. Make the following API calls to manage assignments.
174
267
175
268
For other similar Microsoft Graph API examples for users, see [Assign, update, list, or remove custom security attributes for a user](../enterprise-users/users-custom-security-attributes.md#microsoft-graph-api) and [Examples: Assign, update, list, or remove custom security attribute assignments using the Microsoft Graph API](/graph/custom-security-attributes-examples).
176
269
177
-
####Assign a custom security attribute with a string value to an application (service principal)
270
+
### Assign a custom security attribute with a multi-string value to an application (service principal)
178
271
179
-
Use the [Update servicePrincipal](/graph/api/serviceprincipal-update?view=graph-rest-beta&preserve-view=true) API to assign a custom security attribute with a string value to a user.
272
+
Use the [Update servicePrincipal](/graph/api/serviceprincipal-update?view=graph-rest-beta&preserve-view=true) API to assign a custom security attribute with a string value to an application.
### Update a custom security attribute with a multi-string value for an application (service principal)
299
+
300
+
Provide the new set of attribute values that you would like to reflect on the application. In this example, we're adding one more value for project attribute.
#### Get the custom security attribute assignments for an application (service principal)
319
+
###Filter applications based on custom security attributes
201
320
202
-
Use the [Get servicePrincipal](/graph/api/serviceprincipal-get?view=graph-rest-beta&preserve-view=true) API to get the custom security attribute assignments for an application (service principal).
321
+
This example filters a list of applications with a custom security attribute assignment that equals the specified value.
203
322
204
323
```http
205
-
GET https://graph.microsoft.com/beta/servicePrincipals/{id}?$select=customSecurityAttributes
324
+
GET https://graph.microsoft.com/beta/servicePrincipals?$count=true&$select=id,displayName,customSecurityAttributes&$filter=customSecurityAttributes/Engineering/Project eq 'Baker'ConsistencyLevel: eventual
206
325
```
207
326
208
-
If there are no custom security attributes assigned to the application or if the calling principal does not have access, the response will look like:
327
+
### Remove custom security attribute assignments from an application
328
+
329
+
In this example, we remove a custom security attribute assignment that supports multiple values.
0 commit comments