Skip to content

Commit bfad15d

Browse files
Merge pull request #230600 from omondiatieno/revoke-permissions-update
update description and headings to clarify on revoking permissions
2 parents 1f981be + 6e67bc8 commit bfad15d

File tree

1 file changed

+13
-7
lines changed

1 file changed

+13
-7
lines changed

articles/active-directory/manage-apps/manage-application-permissions.md

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
title: Review permissions granted to applications
3-
description: Learn how to review and manage permissions for an application in Azure Active Directory.
3+
description: Learn how to review and revoke permissions, and invalidate refresh tokens for an application in Azure Active Directory.
44
services: active-directory
55
author: Jackson-Woods
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 11/22/2022
11+
ms.date: 03/16/2023
1212
ms.author: jawoods
1313
ms.reviewer: phsignor
1414
zone_pivot_groups: enterprise-apps-all
@@ -20,9 +20,9 @@ ms.collection: M365-identity-device-management
2020

2121
# Review permissions granted to enterprise applications
2222

23-
In this article, you'll learn how to review permissions granted to applications in your Azure Active Directory (Azure AD) tenant. You may need to review permissions when you've detected a malicious application or the application has been granted more permissions than is necessary.
23+
In this article, you learn how to review permissions granted to applications in your Azure Active Directory (Azure AD) tenant. You may need to review permissions when you've detected a malicious application or the application has been granted more permissions than is necessary. You learn how to revoke permissions granted to the application using Microsoft Graph API and existing versions of PowerShell.
2424

25-
The steps in this article apply to all applications that were added to your Azure Active Directory (Azure AD) tenant via user or admin consent. For more information on consenting to applications, see [User and admin consent](user-admin-consent-overview.md).
25+
The steps in this article apply to all applications that were added to your Azure AD tenant via user or admin consent. For more information on consenting to applications, see [User and admin consent](user-admin-consent-overview.md).
2626

2727
## Prerequisites
2828

@@ -53,7 +53,9 @@ Each option generates PowerShell scripts that enable you to control user access
5353

5454
:::zone pivot="aad-powershell"
5555

56-
Using the following Azure AD PowerShell script revokes all permissions granted to an application.
56+
## Review and revoke permissions
57+
58+
Use the following Azure AD PowerShell script to revoke all permissions granted to an application.
5759

5860
```powershell
5961
Connect-AzureAD -Scopes "Application.ReadWrite.All", "Directory.ReadWrite.All", "DelegatedPermissionGrant.ReadWrite.All" "AppRoleAssignment.ReadWrite.All",
@@ -100,7 +102,9 @@ $assignments | ForEach-Object {
100102

101103
:::zone pivot="ms-powershell"
102104

103-
Using the following Microsoft Graph PowerShell script revokes all permissions granted to an application.
105+
## Review and revoke permissions
106+
107+
Use the following Microsoft Graph PowerShell script to revoke all permissions granted to an application.
104108

105109
```powershell
106110
Connect-MgGraph -Scopes "Application.ReadWrite.All", "Directory.ReadWrite.All", "DelegatedPermissionGrant.ReadWrite.All", "AppRoleAssignment.ReadWrite.All"
@@ -152,9 +156,11 @@ $spApplicationPermissions = Get-MgServicePrincipalAppRoleAssignedTo -ServicePrin
152156

153157
:::zone pivot = "ms-graph"
154158

159+
## Review and revoke permissions
160+
155161
To review permissions, Sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) with one of the roles listed in the prerequisite section.
156162

157-
You'll need to consent to the following permissions:
163+
You need to consent to the following permissions:
158164

159165
`Application.ReadWrite.All`, `Directory.ReadWrite.All`, `DelegatedPermissionGrant.ReadWrite.All`, `AppRoleAssignment.ReadWrite.All`.
160166

0 commit comments

Comments
 (0)