Skip to content

Commit 9c73238

Browse files
committed
more updates
1 parent 0901050 commit 9c73238

File tree

2 files changed

+15
-13
lines changed

2 files changed

+15
-13
lines changed

articles/active-directory/manage-apps/grant-admin-consent.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Grant tenant-wide admin consent to an application
3-
description: Learn how to grant tenant-wide consent to an application so that end-users are not prompted for consent when signing in to an application.
3+
description: Learn how to grant tenant-wide consent to an application so that end-users aren't prompted for consent when signing in to an application.
44
services: active-directory
55
author: eringreenlee
66
manager: CelesteDG
@@ -25,7 +25,7 @@ When you grant tenant-wide admin consent to an application, you give the applica
2525

2626
By default, granting tenant-wide admin consent to an application will allow all users to access the application unless otherwise restricted. To restrict which users can sign-in to an application, configure the app to [require user assignment](application-properties.md#assignment-required) and then [assign users or groups to the application](assign-user-or-group-access-portal.md).
2727

28-
Granting tenant-wide admin consent may revoke any permissions which had previously been granted tenant-wide for that application. Permissions which have previously been granted by users on their own behalf will not be affected.
28+
Granting tenant-wide admin consent may revoke any permissions that had previously been granted tenant-wide for that application. Permissions that have previously been granted by users on their own behalf won't be affected.
2929

3030
## Prerequisites
3131

@@ -90,7 +90,7 @@ As always, carefully review the permissions an application requests before grant
9090

9191
In the following example, you'll grant delegated permissions defined by a resource enterprise application to a client enterprise application on behalf of all users.
9292

93-
In the example, the resource enterprise application is Microsoft Graph of object ID `7ea9e944-71ce-443d-811c-71e8047b557a`. The Microsoft Graph defines the delegated permissions `User.Read.All` and `Group.Read.All`. The consentType is AllPrincipals, indicating that you're consenting on behalf of all users in the tenant. The object ID of the client enterprise application is `b0d9b9e3-0ecf-4bfd-8dab-9273dd055a941`.
93+
In the example, the resource enterprise application is Microsoft Graph of object ID `7ea9e944-71ce-443d-811c-71e8047b557a`. The Microsoft Graph defines the delegated permissions, `User.Read.All` and `Group.Read.All`. The consentType is `AllPrincipals`, indicating that you're consenting on behalf of all users in the tenant. The object ID of the client enterprise application is `b0d9b9e3-0ecf-4bfd-8dab-9273dd055a941`.
9494

9595
> [!CAUTION]
9696
> Be careful! Permissions granted programmatically are not subject to review or confirmation. They take effect immediately.
@@ -131,7 +131,7 @@ New-MgOauth2PermissionGrant -BodyParameter $params |
131131
```
132132
## Grant admin consent for application permissions
133133

134-
In the following example you grant the Microsoft Graph enterprise application (the principal of ID `b0d9b9e3-0ecf-4bfd-8dab-9273dd055a94`) an app role (application permission) of ID `df021288-bdef-4463-88db-98f22de89214` that's exposed by a resource enterprise application of ID `7ea9e944-71ce-443d-811c-71e8047b557a`.
134+
In the following example, you grant the Microsoft Graph enterprise application (the principal of ID `b0d9b9e3-0ecf-4bfd-8dab-9273dd055a94`) an app role (application permission) of ID `df021288-bdef-4463-88db-98f22de89214` that's exposed by a resource enterprise application of ID `7ea9e944-71ce-443d-811c-71e8047b557a`.
135135

136136
1. Connect to Microsoft Graph PowerShell:
137137

@@ -168,7 +168,7 @@ Use [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) to gr
168168

169169
In the following example, you'll grant delegated permissions defined by a resource enterprise application to a client enterprise application on behalf of all users.
170170

171-
In the example, the resource enterprise application is Microsoft Graph of object ID `7ea9e944-71ce-443d-811c-71e8047b557a`. The Microsoft Graph defines the delegated permissions `User.Read.All` and `Group.Read.All`. The consentType is AllPrincipals, indicating that you're consenting on behalf of all users in the tenant. The object ID of the client enterprise application is `b0d9b9e3-0ecf-4bfd-8dab-9273dd055a941`.
171+
In the example, the resource enterprise application is Microsoft Graph of object ID `7ea9e944-71ce-443d-811c-71e8047b557a`. The Microsoft Graph defines the delegated permissions, `User.Read.All` and `Group.Read.All`. The consentType is `AllPrincipals`, indicating that you're consenting on behalf of all users in the tenant. The object ID of the client enterprise application is `b0d9b9e3-0ecf-4bfd-8dab-9273dd055a941`.
172172

173173
> [!CAUTION]
174174
> Be careful! Permissions granted programmatically are not subject to review or confirmation. They take effect immediately.
@@ -199,7 +199,7 @@ In the example, the resource enterprise application is Microsoft Graph of object
199199
```
200200
## Grant admin consent for application permissions
201201

202-
In the following example you grant the Microsoft Graph enterprise application (the principal of ID `b0d9b9e3-0ecf-4bfd-8dab-9273dd055a94`) an app role (application permission) of ID `df021288-bdef-4463-88db-98f22de89214` that's exposed by a resource enterprise application of ID `7ea9e944-71ce-443d-811c-71e8047b557a`.
202+
In the following example, you grant the Microsoft Graph enterprise application (the principal of ID `b0d9b9e3-0ecf-4bfd-8dab-9273dd055a94`) an app role (application permission) of ID `df021288-bdef-4463-88db-98f22de89214` that's exposed by a resource enterprise application of ID `7ea9e944-71ce-443d-811c-71e8047b557a`.
203203

204204
1. Retrieve the app roles defined by Microsoft graph in your tenant. Identify the app role that you'll grant the client enterprise application. In this example, the app role ID is `df021288-bdef-4463-88db-98f22de89214`
205205

@@ -219,7 +219,6 @@ In the following example you grant the Microsoft Graph enterprise application (t
219219
"appRoleId": "df021288-bdef-4463-88db-98f22de89214"
220220
}
221221
```
222-
223222
:::zone-end
224223

225224
## Next steps

articles/active-directory/manage-apps/manage-application-permissions.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 10/23/2021
11+
ms.date: 11/07/2022
1212
ms.author: jawoods
1313
ms.reviewer: phsignor
1414
zone_pivot_groups: enterprise-apps-minus-graph
@@ -18,11 +18,11 @@ ms.collection: M365-identity-device-management
1818

1919
---
2020

21-
# Review permissions granted to applications
21+
# Review permissions granted to enterprise applications
2222

2323
In this article, you'll learn how to review permissions granted to applications in your Azure Active Directory (Azure AD) tenant. You may need to review permissions when you've detected a malicious application or the application has been granted more permissions than is necessary.
2424

25-
The steps in this article apply to all applications that were added to your Azure Active Directory (Azure AD) tenant via user or admin consent. For more information on consenting to applications, see [Azure Active Directory consent framework](../develop/consent-framework.md).
25+
The steps in this article apply to all applications that were added to your Azure Active Directory (Azure AD) tenant via user or admin consent. For more information on consenting to applications, see [User and admin consent](user-admin-consent-overview.md).
2626

2727
## Prerequisites
2828

@@ -32,7 +32,7 @@ To review permissions granted to applications, you need:
3232
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator.
3333
- A Service principal owner who isn't an administrator is able to invalidate refresh tokens.
3434

35-
## Review application permissions
35+
## Review permissions
3636

3737
:::zone pivot="portal"
3838

@@ -53,6 +53,9 @@ Each option generates PowerShell scripts that enable you to control user access
5353

5454
:::zone pivot="aad-powershell"
5555

56+
## Revoke permissions
57+
58+
5659
Using the following Azure AD PowerShell script revokes all permissions granted to an application.
5760

5861
```powershell
@@ -72,7 +75,7 @@ $spOAuth2PermissionsGrants | ForEach-Object {
7275
# Get all application permissions for the service principal
7376
$spApplicationPermissions = Get-AzureADServiceAppRoleAssignedTo -ObjectId $sp.ObjectId -All $true | Where-Object { $_.PrincipalType -eq "ServicePrincipal" }
7477
75-
# Remove all delegated permissions
78+
# Remove all application permissions
7679
$spApplicationPermissions | ForEach-Object {
7780
Remove-AzureADServiceAppRoleAssignment -ObjectId $_.PrincipalId -AppRoleAssignmentId $_.objectId
7881
}
@@ -107,7 +110,7 @@ $sp = Get-MgServicePrincipal -ServicePrincipalID "$ServicePrincipalID"
107110
108111
Example: Get-MgServicePrincipal -ServicePrincipalId '22c1770d-30df-49e7-a763-f39d2ef9b369'
109112
110-
# Get all application permissions for the service principal
113+
# Get all delegated permissions for the service principal
111114
$spOAuth2PermissionsGrants= Get-MgOauth2PermissionGrant -All| Where-Object { $_.clientId -eq $sp.Id }
112115
113116
# Remove all delegated permissions

0 commit comments

Comments
 (0)