Skip to content

Commit 8b48f71

Browse files
author
Markus Vilcinskas
committed
mon110
1 parent 7a122a2 commit 8b48f71

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/reports-monitoring/howto-view-applied-conditional-access-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: active-directory
1212
ms.topic: how-to
1313
ms.workload: identity
1414
ms.subservice: report-monitor
15-
ms.date: 09/08/2022
15+
ms.date: 09/14/2022
1616
ms.author: markvi
1717
ms.reviewer: besiler
1818

@@ -85,7 +85,7 @@ The following built in roles grant permission to view sign-in logs:
8585

8686
## Permissions for client apps
8787

88-
If you use a client app to pull sign-in logs from Graph, your app needs permissions to receive the **appliedConditionalAccessPolicy**object from Graph. As a best practice, assign **Policy.Read.ConditionalAccess** because it's the least privileged permission. Any of the following permissions is sufficient for a client app to access applied CA policies in sign-in logs through Graph:
88+
If you use a client app to pull sign-in logs from Graph, your app needs permissions to receive the **appliedConditionalAccessPolicy**resource from Graph. As a best practice, assign **Policy.Read.ConditionalAccess** because it's the least privileged permission. Any of the following permissions is sufficient for a client app to access applied CA policies in sign-in logs through Graph:
8989

9090
Policy.Read.ConditionalAccess
9191

0 commit comments

Comments
 (0)