Skip to content

Commit ef565b5

Browse files
Merge pull request #250270 from omondiatieno/perms-classifications
permissions-classifications
2 parents 80cebab + 2affaab commit ef565b5

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/active-directory/manage-apps/configure-permission-classifications.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -37,10 +37,10 @@ To configure permission classifications, you need:
3737

3838
:::zone pivot="portal"
3939

40-
Follow these steps to classify permissions using the Azure portal:
40+
Follow these steps to classify permissions using the Microsoft Entra admin center:
4141

42-
1. Sign in to the [Azure portal](https://portal.azure.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator), [Application Administrator](../roles/permissions-reference.md#application-administrator), or [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator)
43-
1. Select **Azure Active Directory** > **Enterprise applications** > **Consent and permissions** > **Permission classifications**.
42+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
43+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Consent and permissions** > **Permission classifications**.
4444
1. Choose the tab for the permission classification you'd like to update.
4545
1. Choose **Add permissions** to classify another permission.
4646
1. Select the API and then select the delegated permission(s).
@@ -56,7 +56,7 @@ In this example, we've classified the minimum set of permission required for sin
5656

5757
You can use the latest [Azure AD PowerShell](/powershell/module/azuread/?preserve-view=true&view=azureadps-2.0), to classify permissions. Permission classifications are configured on the **ServicePrincipal** object of the API that publishes the permissions.
5858

59-
Run the following command to connect to Azure AD PowerShell. To consent to the required scopes, sign in with one of the roles listed in the prerequisite section of this article.
59+
Run the following command to connect to Azure AD PowerShell. To consent to the required scopes, sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
6060

6161
```powershell
6262
Connect-AzureAD
@@ -133,7 +133,7 @@ Connect-AzureAD
133133

134134
You can use [Microsoft Graph PowerShell](/powershell/microsoftgraph/get-started?preserve-view=true&view=graph-powershell-1.0), to classify permissions. Permission classifications are configured on the **ServicePrincipal** object of the API that publishes the permissions.
135135

136-
Run the following command to connect to Microsoft Graph PowerShell. To consent to the required scopes, sign in with one of the roles listed in the prerequisite section of this article.
136+
Run the following command to connect to Microsoft Graph PowerShell. To consent to the required scopes, sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
137137

138138
```powershell
139139
Connect-MgGraph -Scopes "Policy.ReadWrite.PermissionGrant".
@@ -204,7 +204,7 @@ Remove-MgServicePrincipalDelegatedPermissionClassification -DelegatedPermissionC
204204

205205
:::zone pivot="ms-graph"
206206

207-
To configure permissions classifications for an enterprise application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) with one of the roles listed in the prerequisite section.
207+
To configure permissions classifications for an enterprise application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
208208

209209
You need to consent to the `Policy.ReadWrite.PermissionGrant` permission.
210210

0 commit comments

Comments
 (0)