Skip to content

Commit c8dd3b0

Browse files
committed
add required permissions
1 parent c4c6f0f commit c8dd3b0

File tree

3 files changed

+14
-15
lines changed

3 files changed

+14
-15
lines changed

articles/active-directory/manage-apps/configure-permission-classifications.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ The minimum permissions needed to do basic sign-in are `openid`, `profile`, `ema
3030
To configure permission classifications, you need:
3131

3232
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
33-
- One of the following roles: An administrator, or owner of the service principal.
33+
- One of the following roles: A global administrator, or owner of the service principal.
3434

3535
## Manage permission classifications
3636

@@ -57,7 +57,7 @@ You can use the latest [Azure AD PowerShell](/powershell/module/azuread/?preserv
5757
Run the following command to connect to Azure AD PowerShell. To consent to the required scopes, sign in with one of the roles listed in the prerequisite section of this article.
5858

5959
```powershell
60-
Connect-AzureAD -Scopes "Application.ReadWrite.All", "Directory.ReadWrite.All", "DelegatedPermissionGrant.ReadWrite.All".
60+
Connect-AzureAD -Scopes "Policy.ReadWrite.PermissionGrant".
6161
```
6262

6363
### List the current permission classifications
@@ -134,7 +134,7 @@ You can use [Microsoft Graph PowerShell](/powershell/microsoftgraph/get-started?
134134
Run the following command to connect to Microsoft Graph PowerShell. To consent to the required scopes, sign in with one of the roles listed in the prerequisite section of this article.
135135

136136
```powershell
137-
Connect-MgGraph -Scopes "Application.ReadWrite.All", "Directory.ReadWrite.All", "DelegatedPermissionGrant.ReadWrite.All".
137+
Connect-MgGraph -Scopes "Policy.ReadWrite.PermissionGrant".
138138
```
139139

140140
### List current permission classifications for an API
@@ -208,9 +208,7 @@ Remove-MgServicePrincipalDelegatedPermissionClassification -DelegatedPermissionC
208208

209209
To configure permissions classifications for an enterprise application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) with one of the roles listed in the prerequisite section.
210210

211-
You need to consent to the following permissions:
212-
213-
`Application.ReadWrite.All`, `Directory.ReadWrite.All`, `DelegatedPermissionGrant.ReadWrite.All`.
211+
You need to consent to the `Policy.ReadWrite.PermissionGrant` permission.
214212

215213
Run the following queries on Microsoft Graph explorer to add a delegated permissions classification for an application.
216214

articles/active-directory/manage-apps/custom-security-attributes-apps.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -192,10 +192,10 @@ Use the [Set-AzureADMSServicePrincipal](/powershell/module/azuread/set-azureadms
192192

193193
Given the values
194194

195-
Attribute set: Engineering
196-
Attribute: Project
197-
Attribute data type: String
198-
Attribute value: "Baker"
195+
- Attribute set: Engineering
196+
- Attribute: Project
197+
- Attribute data type: String
198+
- Attribute value: "Baker"
199199

200200
```powershell
201201
#Retrieve the servicePrincipal
@@ -273,10 +273,10 @@ Use the [Update servicePrincipal](/graph/api/serviceprincipal-update?view=graph-
273273

274274
Given the values
275275

276-
Attribute set: Engineering
277-
Attribute: Project
278-
Attribute data type: Collection of Strings
279-
Attribute value: Baker"
276+
- Attribute set: Engineering
277+
- Attribute: Project
278+
- Attribute data type: String
279+
- Attribute value: "Baker"
280280

281281
```http
282282
PATCH https://graph.microsoft.com/beta/servicePrincipals/{id}

articles/active-directory/manage-apps/manage-app-consent-policies.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 01/26/2023
11+
ms.date: 02/28/2023
1212
ms.author: jomondi
1313
ms.reviewer: phsignor, yuhko
1414
ms.custom: contperf-fy21q2
@@ -122,6 +122,7 @@ Once the app consent policy has been created, you can [allow user consent](confi
122122

123123
To manage app consent policies, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) with one of the roles listed in the prerequisite section.
124124

125+
You need to consent to the `Policy.ReadWrite.PermissionGrant` permission.
125126
## List existing app consent policies
126127

127128
It's a good idea to start by getting familiar with the existing app consent policies in your organization:

0 commit comments

Comments
 (0)