Skip to content

Commit e286877

Browse files
committed
minor update
1 parent e630a2e commit e286877

File tree

1 file changed

+14
-17
lines changed

1 file changed

+14
-17
lines changed

articles/active-directory/manage-apps/assign-app-owners.md

Lines changed: 14 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,6 @@ ms.reviewer: saibandaru
1515
zone_pivot_groups: enterprise-apps-minus-aad-powershell
1616

1717
#Customer intent: As an Azure AD administrator, I want to assign owners to enterprise applications.
18-
1918
---
2019

2120
# Assign enterprise application owners
@@ -44,15 +43,15 @@ You'll need to consent to the `Application.ReadWrite.All` permission.
4443

4544
In the following example, the user's object ID is 8afc02cb-4d62-4dba-b536-9f6d73e9be26 and the applicationId is 46e6adf4-a9cf-4b60-9390-0ba6fb00bf6b.
4645

47-
```powershell
48-
Import-Module Microsoft.Graph.Applications
46+
```powershell
47+
Import-Module Microsoft.Graph.Applications
4948

50-
$params = @{
51-
"@odata.id" = "https://graph.microsoft.com/v1.0/directoryObjects/8afc02cb-4d62-4dba-b536-9f6d73e9be26"
52-
}
49+
$params = @{
50+
"@odata.id" = "https://graph.microsoft.com/v1.0/directoryObjects/8afc02cb-4d62-4dba-b536-9f6d73e9be26"
51+
}
5352

54-
New-MgServicePrincipalOwnerByRef -ServicePrincipalId '46e6adf4-a9cf-4b60-9390-0ba6fb00bf6b' -BodyParameter $params
55-
```
53+
New-MgServicePrincipalOwnerByRef -ServicePrincipalId '46e6adf4-a9cf-4b60-9390-0ba6fb00bf6b' -BodyParameter $params
54+
```
5655
:::zone-end
5756

5857
:::zone pivot="ms-graph"
@@ -63,22 +62,20 @@ You'll need to consent to the `Application.ReadWrite.All` permission.
6362

6463
Run the following Microsoft Graph query to assign an owner to an application. You need the object ID of the user you want to assign the application to. In the following example, the user's object ID is 8afc02cb-4d62-4dba-b536-9f6d73e9be26 and the appId is 46e6adf4-a9cf-4b60-9390-0ba6fb00bf6b.
6564

66-
```http
67-
POST https://graph.microsoft.com/v1.0/servicePrincipals(appId='46e6adf4-a9cf-4b60-9390-0ba6fb00bf6b')/owners/$ref
68-
Content-Type: application/json
65+
```http
66+
POST https://graph.microsoft.com/v1.0/servicePrincipals(appId='46e6adf4-a9cf-4b60-9390-0ba6fb00bf6b')/owners/$ref
67+
Content-Type: application/json
6968

70-
{
71-
"@odata.id": "https://graph.microsoft.com/v1.0/directoryObjects/8afc02cb-4d62-4dba-b536-9f6d73e9be26"
72-
}
73-
```
69+
{
70+
"@odata.id": "https://graph.microsoft.com/v1.0/directoryObjects/8afc02cb-4d62-4dba-b536-9f6d73e9be26"
71+
}
72+
```
7473

7574
:::zone-end
7675

77-
7876
> [!NOTE]
7977
> If the user setting **Restrict access to Azure AD administration portal** is set to `Yes`, non-admin users will not be able to use the Azure portal to manage the applications they own. For more information about the actions that can be performed on owned enterprise applications, see [Owned enterprise applications](../fundamentals/users-default-permissions.md#owned-enterprise-applications).
8078
81-
8279
## Next steps
8380

8481
- [Delegate app registration permissions in Azure Active Directory](../roles/delegate-app-roles.md)

0 commit comments

Comments
 (0)