You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/manage-application-permissions.md
+53-8Lines changed: 53 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.topic: how-to
11
11
ms.date: 10/23/2021
12
12
ms.author: jawoods
13
13
ms.reviewer: phsignor
14
-
14
+
zone_pivot_groups: enterprise-apps-minus-graph
15
15
ms.collection: M365-identity-device-management
16
16
17
17
#customer intent: As an admin, I want to review permissions granted to applications so that I can restrict suspicious or over privileged applications.
@@ -32,10 +32,11 @@ To review permissions granted to applications, you need:
32
32
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator.
33
33
- A Service principal owner who isn't an administrator is able to invalidate refresh tokens.
34
34
35
+
## Review application permissions
35
36
36
-
You can access the Azure AD portal to get contextual PowerShell scripts to perform the actions.
37
+
:::zone pivot="portal"
37
38
38
-
## Review application permissions
39
+
You can access the Azure AD portal to get contextual PowerShell scripts to perform the actions.
39
40
40
41
To review application permissions:
41
42
@@ -48,9 +49,11 @@ To review application permissions:
48
49
49
50
Each option generates PowerShell scripts that enable you to control user access to the application and to review permissions granted to the application. For information about how to control user access to an application, see [How to remove a user's access to an application](methods-for-removing-user-access.md)
50
51
51
-
## Revoke permissions using PowerShell commands
52
+
:::zone-end
52
53
53
-
Using the following PowerShell script revokes all permissions granted to this application.
54
+
:::zone pivot="aad-powershell"
55
+
56
+
Using the following Azure AD PowerShell script revokes all permissions granted to an application.
> Revoking the current granted permission won't stop users from re-consenting to the application. If you want to block users from consenting, read [Configure how users consent to applications](configure-user-consent.md).
> Revoking the current granted permission won't stop users from re-consenting to the application. If you want to block users from consenting, read [Configure how users consent to applications](configure-user-consent.md).
0 commit comments