Skip to content

Commit ed2843d

Browse files
authored
Merge pull request #204724 from omondiatieno/update-consent-permissions-docs
update-consent-permissions-docs
2 parents a6ccc96 + 48bdec1 commit ed2843d

File tree

2 files changed

+14
-8
lines changed

2 files changed

+14
-8
lines changed

articles/active-directory/manage-apps/manage-application-permissions.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020

2121
# Review permissions granted to applications
2222

23-
In this article you'll learn how to review permissions granted to applications in your Azure Active Directory (Azure AD) tenant. You may need to review permissions when you have detected a malicious application or the application has been granted more permissions than is necessary.
23+
In this article, you'll learn how to review permissions granted to applications in your Azure Active Directory (Azure AD) tenant. You may need to review permissions when you've detected a malicious application or the application has been granted more permissions than is necessary.
2424

2525
The steps in this article apply to all applications that were added to your Azure Active Directory (Azure AD) tenant via user or admin consent. For more information on consenting to applications, see [Azure Active Directory consent framework](../develop/consent-framework.md).
2626

@@ -29,7 +29,9 @@ The steps in this article apply to all applications that were added to your Azur
2929
To review permissions granted to applications, you need:
3030

3131
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
32-
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
32+
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator.
33+
- A Service principal owner who isn't an administrator is able to invalidate refresh tokens.
34+
3335

3436
You can access the Azure AD portal to get contextual PowerShell scripts to perform the actions.
3537

@@ -42,7 +44,7 @@ To review application permissions:
4244
1. Select the application that you want to restrict access to.
4345
1. Select **Permissions**. In the command bar, select **Review permissions**.
4446
![Screenshot of the review permissions window.](./media/manage-application-permissions/review-permissions.png)
45-
1. Give a reason for why you want to review permissions for the application by selecting any of the options listed after the question , **Why do you want to review permissions for this application?**
47+
1. Give a reason for why you want to review permissions for the application by selecting any of the options listed after the question, **Why do you want to review permissions for this application?**
4648

4749
Each option generates PowerShell scripts that enable you to control user access to the application and to review permissions granted to the application. For information about how to control user access to an application, see [How to remove a user's access to an application](methods-for-removing-user-access.md)
4850

articles/active-directory/manage-apps/manage-consent-requests.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,15 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 11/25/2021
11+
ms.date: 07/14/2022
1212
ms.author: phsignor
1313
---
1414

1515
# Manage consent to applications and evaluate consent requests
1616

1717
Microsoft recommends that you [restrict user consent](../../active-directory/manage-apps/configure-user-consent.md) to allow users to consent only for apps from verified publishers, and only for permissions that you select. For apps that don't meet these criteria, the decision-making process will be centralized with your organization's security and identity administrator team.
1818

19-
After you've disabled or restricted user consent, you have several important steps to take to help keep your organization secure as you continue to allow business-critical applications to be used. These steps are crucial to minimize impact on your organization's support team and IT administrators, and to help prevent the use of unmanaged accounts in third-party applications.
19+
After you've disabled or restricted user consent, you have several important steps to take to help keep your organization secure as you continue to allow business-critical applications to be used. These steps are crucial to minimize impact on your organization's support team and IT administrators, and to help prevent the use of un-managed accounts in third-party applications.
2020

2121
## Process changes and education
2222

@@ -55,7 +55,7 @@ To minimize impact on trusted, business-critical applications that are already i
5555

5656
Granting tenant-wide admin consent is a sensitive operation. Permissions will be granted on behalf of the entire organization, and they can include permissions to attempt highly privileged operations. Examples of such operations are role management, full access to all mailboxes or all sites, and full user impersonation.
5757

58-
Before you grant tenant-wide admin consent, it's important to ensure that you trust the application and the application publisher for the level of access you're granting. If you aren't confident that you understand who controls the application and why the application is requesting the permissions, do *not* grant consent.
58+
Before you grant tenant-wide admin consent, it's important to ensure that you trust the application, and the application publisher for the level of access you're granting. If you aren't confident that you understand who controls the application and why the application is requesting the permissions, do *not* grant consent.
5959

6060
When you're evaluating a request to grant admin consent, here are some recommendations to consider:
6161

@@ -67,7 +67,7 @@ When you're evaluating a request to grant admin consent, here are some recommend
6767

6868
* Understand the permissions that are being requested.
6969

70-
The permissions requested by the application are listed in the [consent prompt](../develop/application-consent-experience.md). Expanding the permission title displays the permission’s description. The description for application permissions generally end in "without a signed-in user." The description for delegated permissions generally end with "on behalf of the signed-in user." Permissions for the Microsoft Graph API are described in [Microsoft Graph Permissions Reference](/graph/permissions-reference). Refer to the documentation for other APIs to understand the permissions they expose.
70+
The permissions requested by the application are listed in the [consent prompt](../develop/application-consent-experience.md). Expanding the permission title displays the permission’s description. The description for application permissions generally ends in "without a signed-in user." The description for delegated permissions generally end with "on behalf of the signed-in user." Permissions for the Microsoft Graph API are described in [Microsoft Graph Permissions Reference](/graph/permissions-reference). Refer to the documentation for other APIs to understand the permissions they expose.
7171

7272
If you don't understand a permission that's being requested, do *not* grant consent.
7373

@@ -87,13 +87,17 @@ When you're evaluating a request to grant admin consent, here are some recommend
8787

8888
For step-by-step instructions for granting tenant-wide admin consent from the Azure portal, see [Grant tenant-wide admin consent to an application](grant-admin-consent.md).
8989

90+
## Revoke tenant wide admin consent
91+
92+
To revoke tenant-wide admin consent, you can review and revoke the permissions previously granted to the application. For more information, see [review permissions granted to applications](manage-application-permissions.md). You can also remove user’s access to the application by [disabling user sign-in to application](disable-user-sign-in-portal.md) or by [hiding the application](hide-application-from-user-portal.md) so that it doesn’t appear in the My apps portal.
93+
9094
### Grant consent on behalf of a specific user
9195

9296
Instead of granting consent for the entire organization, an administrator can also use the [Microsoft Graph API](/graph/use-the-api) to grant consent to delegated permissions on behalf of a single user. For a detailed example that uses Microsoft Graph PowerShell, see [Grant consent on behalf of a single user by using PowerShell](grant-consent-single-user.md).
9397

9498
## Limit user access to applications
9599

96-
User access to applications can still be limited even when tenant-wide admin consent has been granted. For more information about how to require user assignment to an application, see [Methods for assigning users and groups](./assign-user-or-group-access-portal.md). Administrators can also limit user access to applications by disabling all future user consent operations to any application.
100+
User access to applications can still be limited even when tenant-wide admin consent has been granted. To limit user access, require user assignment to an application. For more information, see [Methods for assigning users and groups](./assign-user-or-group-access-portal.md). Administrators can also limit user access to applications by disabling all future user consent operations to any application.
97101

98102
For a broader overview, including how to handle more complex scenarios, see [Use Azure Active Directory (Azure AD) for application access management](what-is-access-management.md).
99103

0 commit comments

Comments
 (0)