You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/grant-admin-consent.md
+6-7Lines changed: 6 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Grant tenant-wide admin consent to an application
3
-
description: Learn how to grant tenant-wide consent to an application so that end-users are not prompted for consent when signing in to an application.
3
+
description: Learn how to grant tenant-wide consent to an application so that end-users aren't prompted for consent when signing in to an application.
4
4
services: active-directory
5
5
author: eringreenlee
6
6
manager: CelesteDG
@@ -25,7 +25,7 @@ When you grant tenant-wide admin consent to an application, you give the applica
25
25
26
26
By default, granting tenant-wide admin consent to an application will allow all users to access the application unless otherwise restricted. To restrict which users can sign-in to an application, configure the app to [require user assignment](application-properties.md#assignment-required) and then [assign users or groups to the application](assign-user-or-group-access-portal.md).
27
27
28
-
Granting tenant-wide admin consent may revoke any permissions which had previously been granted tenant-wide for that application. Permissions which have previously been granted by users on their own behalf will not be affected.
28
+
Granting tenant-wide admin consent may revoke any permissions that had previously been granted tenant-wide for that application. Permissions that have previously been granted by users on their own behalf won't be affected.
29
29
30
30
## Prerequisites
31
31
@@ -90,7 +90,7 @@ As always, carefully review the permissions an application requests before grant
90
90
91
91
In the following example, you'll grant delegated permissions defined by a resource enterprise application to a client enterprise application on behalf of all users.
92
92
93
-
In the example, the resource enterprise application is Microsoft Graph of object ID `7ea9e944-71ce-443d-811c-71e8047b557a`. The Microsoft Graph defines the delegated permissions `User.Read.All` and `Group.Read.All`. The consentType is AllPrincipals, indicating that you're consenting on behalf of all users in the tenant. The object ID of the client enterprise application is `b0d9b9e3-0ecf-4bfd-8dab-9273dd055a941`.
93
+
In the example, the resource enterprise application is Microsoft Graph of object ID `7ea9e944-71ce-443d-811c-71e8047b557a`. The Microsoft Graph defines the delegated permissions,`User.Read.All` and `Group.Read.All`. The consentType is `AllPrincipals`, indicating that you're consenting on behalf of all users in the tenant. The object ID of the client enterprise application is `b0d9b9e3-0ecf-4bfd-8dab-9273dd055a941`.
94
94
95
95
> [!CAUTION]
96
96
> Be careful! Permissions granted programmatically are not subject to review or confirmation. They take effect immediately.
## Grant admin consent for application permissions
133
133
134
-
In the following example you grant the Microsoft Graph enterprise application (the principal of ID `b0d9b9e3-0ecf-4bfd-8dab-9273dd055a94`) an app role (application permission) of ID `df021288-bdef-4463-88db-98f22de89214` that's exposed by a resource enterprise application of ID `7ea9e944-71ce-443d-811c-71e8047b557a`.
134
+
In the following example, you grant the Microsoft Graph enterprise application (the principal of ID `b0d9b9e3-0ecf-4bfd-8dab-9273dd055a94`) an app role (application permission) of ID `df021288-bdef-4463-88db-98f22de89214` that's exposed by a resource enterprise application of ID `7ea9e944-71ce-443d-811c-71e8047b557a`.
135
135
136
136
1. Connect to Microsoft Graph PowerShell:
137
137
@@ -168,7 +168,7 @@ Use [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) to gr
168
168
169
169
In the following example, you'll grant delegated permissions defined by a resource enterprise application to a client enterprise application on behalf of all users.
170
170
171
-
In the example, the resource enterprise application is Microsoft Graph of object ID `7ea9e944-71ce-443d-811c-71e8047b557a`. The Microsoft Graph defines the delegated permissions `User.Read.All` and `Group.Read.All`. The consentType is AllPrincipals, indicating that you're consenting on behalf of all users in the tenant. The object ID of the client enterprise application is `b0d9b9e3-0ecf-4bfd-8dab-9273dd055a941`.
171
+
In the example, the resource enterprise application is Microsoft Graph of object ID `7ea9e944-71ce-443d-811c-71e8047b557a`. The Microsoft Graph defines the delegated permissions,`User.Read.All` and `Group.Read.All`. The consentType is `AllPrincipals`, indicating that you're consenting on behalf of all users in the tenant. The object ID of the client enterprise application is `b0d9b9e3-0ecf-4bfd-8dab-9273dd055a941`.
172
172
173
173
> [!CAUTION]
174
174
> Be careful! Permissions granted programmatically are not subject to review or confirmation. They take effect immediately.
@@ -199,7 +199,7 @@ In the example, the resource enterprise application is Microsoft Graph of object
199
199
```
200
200
## Grant admin consent for application permissions
201
201
202
-
In the following example you grant the Microsoft Graph enterprise application (the principal of ID `b0d9b9e3-0ecf-4bfd-8dab-9273dd055a94`) an app role (application permission) of ID `df021288-bdef-4463-88db-98f22de89214` that's exposed by a resource enterprise application of ID `7ea9e944-71ce-443d-811c-71e8047b557a`.
202
+
In the following example, you grant the Microsoft Graph enterprise application (the principal of ID `b0d9b9e3-0ecf-4bfd-8dab-9273dd055a94`) an app role (application permission) of ID `df021288-bdef-4463-88db-98f22de89214` that's exposed by a resource enterprise application of ID `7ea9e944-71ce-443d-811c-71e8047b557a`.
203
203
204
204
1. Retrieve the app roles defined by Microsoft graph in your tenant. Identify the app role that you'll grant the client enterprise application. In this example, the app role ID is `df021288-bdef-4463-88db-98f22de89214`
205
205
@@ -219,7 +219,6 @@ In the following example you grant the Microsoft Graph enterprise application (t
# Review permissions granted to enterprise applications
22
22
23
23
In this article, you'll learn how to review permissions granted to applications in your Azure Active Directory (Azure AD) tenant. You may need to review permissions when you've detected a malicious application or the application has been granted more permissions than is necessary.
24
24
25
-
The steps in this article apply to all applications that were added to your Azure Active Directory (Azure AD) tenant via user or admin consent. For more information on consenting to applications, see [Azure Active Directory consent framework](../develop/consent-framework.md).
25
+
The steps in this article apply to all applications that were added to your Azure Active Directory (Azure AD) tenant via user or admin consent. For more information on consenting to applications, see [User and admin consent](user-admin-consent-overview.md).
26
26
27
27
## Prerequisites
28
28
@@ -32,7 +32,7 @@ To review permissions granted to applications, you need:
32
32
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator.
33
33
- A Service principal owner who isn't an administrator is able to invalidate refresh tokens.
34
34
35
-
## Review application permissions
35
+
## Review permissions
36
36
37
37
:::zone pivot="portal"
38
38
@@ -53,6 +53,9 @@ Each option generates PowerShell scripts that enable you to control user access
53
53
54
54
:::zone pivot="aad-powershell"
55
55
56
+
## Revoke permissions
57
+
58
+
56
59
Using the following Azure AD PowerShell script revokes all permissions granted to an application.
0 commit comments