Skip to content

Commit 635c3fd

Browse files
Merge pull request #940 from microsoftgraph/dev
Merge dev into master
2 parents 527a67e + c135133 commit 635c3fd

File tree

2 files changed

+130
-9
lines changed

2 files changed

+130
-9
lines changed

permissions/new/ProvisioningInfo.json

Lines changed: 22 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5266,6 +5266,24 @@
52665266
"resourceAppId": ""
52675267
}
52685268
],
5269+
"FormsBody.ReadWrite.All": [
5270+
{
5271+
"id": "",
5272+
"scheme": "DelegatedWork",
5273+
"environment": "public",
5274+
"isHidden": true,
5275+
"isEnabled": true,
5276+
"resourceAppId": "c9a559d2-7aab-4f13-a6ed-e7e9c52aec87"
5277+
},
5278+
{
5279+
"id": "",
5280+
"scheme": "Application",
5281+
"environment": "public",
5282+
"isHidden": true,
5283+
"isEnabled": true,
5284+
"resourceAppId": "c9a559d2-7aab-4f13-a6ed-e7e9c52aec87"
5285+
}
5286+
],
52695287
"Goals-Export.Read.All": [
52705288
{
52715289
"scheme": "DelegatedWork",
@@ -10077,15 +10095,15 @@
1007710095
"id": "dd689728-6eb8-4deb-bd38-2924a935f3de",
1007810096
"scheme": "DelegatedWork",
1007910097
"environment": "public",
10080-
"isHidden": true,
10098+
"isHidden": false,
1008110099
"isEnabled": true,
1008210100
"resourceAppId": "8ee8fdad-f234-4243-8f3b-15c294843740"
1008310101
},
1008410102
{
1008510103
"id": "4d6e30d1-e64e-4ae7-bf9d-c706cc928cef",
1008610104
"scheme": "Application",
1008710105
"environment": "public",
10088-
"isHidden": true,
10106+
"isHidden": false,
1008910107
"isEnabled": true,
1009010108
"resourceAppId": "8ee8fdad-f234-4243-8f3b-15c294843740"
1009110109
}
@@ -10167,15 +10185,15 @@
1016710185
"id": "d8914f8f-9f64-4bd1-b4d3-f5a701ed8457",
1016810186
"scheme": "DelegatedWork",
1016910187
"environment": "public",
10170-
"isHidden": true,
10188+
"isHidden": false,
1017110189
"isEnabled": true,
1017210190
"resourceAppId": "8ee8fdad-f234-4243-8f3b-15c294843740"
1017310191
},
1017410192
{
1017510193
"id": "8b7e8c0a-7e9d-4049-97ec-04b5e1bcaf05",
1017610194
"scheme": "Application",
1017710195
"environment": "public",
10178-
"isHidden": true,
10196+
"isHidden": false,
1017910197
"isEnabled": true,
1018010198
"resourceAppId": "8ee8fdad-f234-4243-8f3b-15c294843740"
1018110199
}

permissions/new/permissions.json

Lines changed: 108 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -36389,6 +36389,44 @@
3638936389
"ownerSecurityGroup": "cpcgraph"
3639036390
}
3639136391
},
36392+
"RoleManagement.Read.Defender": {
36393+
"schemes": {
36394+
"DelegatedWork": {
36395+
"adminDisplayName": "Read M365 Defender RBAC configuration",
36396+
"adminDescription": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, on behalf of the signed-in user. This includes reading M365 Defender role definitions and role assignments.",
36397+
"userDisplayName": "Read M365 Defender RBAC configuration",
36398+
"userDescription": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, on behalf of the signed-in user. This includes reading M365 Defender role definitions and role assignments.",
36399+
"requiresAdminConsent": true,
36400+
"privilegeLevel": 3
36401+
},
36402+
"Application": {
36403+
"adminDisplayName": "Read M365 Defender RBAC configuration",
36404+
"adminDescription": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, without a signed-in user.",
36405+
"requiresAdminConsent": true,
36406+
"privilegeLevel": 4
36407+
}
36408+
},
36409+
"pathSets": [
36410+
{
36411+
"schemeKeys": [
36412+
"DelegatedWork",
36413+
"Application"
36414+
],
36415+
"methods": [
36416+
"GET"
36417+
],
36418+
"paths": {
36419+
"/rolemanagement/defender/roleassignments": "least=DelegatedWork,Application",
36420+
"/rolemanagement/defender/roleassignments/{id}": "least=DelegatedWork,Application",
36421+
"/rolemanagement/defender/roledefinitions": "least=DelegatedWork,Application",
36422+
"/rolemanagement/defender/roledefinitions/{id}": "least=DelegatedWork,Application"
36423+
}
36424+
}
36425+
],
36426+
"ownerInfo": {
36427+
"ownerSecurityGroup": "mdatpUrbac"
36428+
}
36429+
},
3639236430
"RoleManagement.Read.Directory": {
3639336431
"schemes": {
3639436432
"DelegatedWork": {
@@ -36595,6 +36633,71 @@
3659536633
"ownerSecurityGroup": "cpcgraph"
3659636634
}
3659736635
},
36636+
"RoleManagement.ReadWrite.Defender": {
36637+
"schemes": {
36638+
"DelegatedWork": {
36639+
"adminDisplayName": "Read M365 Defender RBAC configuration",
36640+
"adminDescription": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, on behalf of the signed-in user. This includes reading M365 Defender role definitions and role assignments.",
36641+
"userDisplayName": "Read M365 Defender RBAC configuration",
36642+
"userDescription": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, on behalf of the signed-in user. This includes reading M365 Defender role definitions and role assignments.",
36643+
"requiresAdminConsent": true,
36644+
"privilegeLevel": 3
36645+
},
36646+
"Application": {
36647+
"adminDisplayName": "Read M365 Defender RBAC configuration",
36648+
"adminDescription": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, without a signed-in user.",
36649+
"requiresAdminConsent": true,
36650+
"privilegeLevel": 4
36651+
}
36652+
},
36653+
"pathSets": [
36654+
{
36655+
"schemeKeys": [
36656+
"DelegatedWork",
36657+
"Application"
36658+
],
36659+
"methods": [
36660+
"GET"
36661+
],
36662+
"paths": {
36663+
"/roleManagement/defender/roleassignments": "",
36664+
"/roleManagement/defender/roleassignments/{id}": "",
36665+
"/rolemanagement/defender/roledefinitions": "",
36666+
"/rolemanagement/defender/roledefinitions/{id}": ""
36667+
}
36668+
},
36669+
{
36670+
"schemeKeys": [
36671+
"DelegatedWork",
36672+
"Application"
36673+
],
36674+
"methods": [
36675+
"POST"
36676+
],
36677+
"paths": {
36678+
"/roleManagement/defender/roleassignments": "least=DelegatedWork,Application",
36679+
"/rolemanagement/defender/roledefinitions": "least=DelegatedWork,Application"
36680+
}
36681+
},
36682+
{
36683+
"schemeKeys": [
36684+
"DelegatedWork",
36685+
"Application"
36686+
],
36687+
"methods": [
36688+
"DELETE",
36689+
"PATCH"
36690+
],
36691+
"paths": {
36692+
"/roleManagement/defender/roleassignments/{id}": "least=DelegatedWork,Application",
36693+
"/rolemanagement/defender/roledefinitions/{id}": "least=DelegatedWork,Application"
36694+
}
36695+
}
36696+
],
36697+
"ownerInfo": {
36698+
"ownerSecurityGroup": "mdatpUrbac"
36699+
}
36700+
},
3659836701
"RoleManagement.ReadWrite.Directory": {
3659936702
"schemes": {
3660036703
"DelegatedWork": {
@@ -47977,9 +48080,9 @@
4797748080
"schemes": {
4797848081
"DelegatedWork": {
4797948082
"adminDisplayName": "Read and write access to user profile",
47980-
"adminDescription": "Allows the app to read your profile. It also allows the app to update your profile information on your behalf.",
48083+
"adminDescription": "Allows the app to read your profile and basic company information. It also allows the app to update your profile information on your behalf.",
4798148084
"userDisplayName": "Read and update your profile",
47982-
"userDescription": "Allows the app to read your profile, and discover your group membership, reports and manager. It also allows the app to update your profile information on your behalf.",
48085+
"userDescription": "Allows the app to read your profile and basic company information, and discover your group membership, reports and manager. It also allows the app to update your profile information on your behalf.",
4798348086
"requiresAdminConsent": false,
4798448087
"privilegeLevel": 3
4798548088
},
@@ -48311,15 +48414,15 @@
4831148414
"schemes": {
4831248415
"DelegatedWork": {
4831348416
"adminDisplayName": "Read and write all users' full profiles",
48314-
"adminDescription": "Allows the app to read and write the full set of profile properties, reports, and managers of other users in your organization, on behalf of the signed-in user.",
48417+
"adminDescription": "Allows the app to read and write the full set of profile properties, reports, and managers of other users in your organization, and read basic company properties, on behalf of the signed-in user.",
4831548418
"userDisplayName": "Read and write all users' full profiles",
48316-
"userDescription": "Allows the app to read and write the full set of profile properties, reports, and managers of other users in your organization, on your behalf.",
48419+
"userDescription": "Allows the app to read and write the full set of profile properties, reports, and managers of other users in your organization, and read basic company properties, on your behalf.",
4831748420
"requiresAdminConsent": true,
4831848421
"privilegeLevel": 4
4831948422
},
4832048423
"Application": {
4832148424
"adminDisplayName": "Read and write all users' full profiles",
48322-
"adminDescription": "Allows the app to read and update user profiles without a signed in user.",
48425+
"adminDescription": "Allows the app to read and update user profiles and read basic company properties without a signed in user.",
4832348426
"requiresAdminConsent": true,
4832448427
"privilegeLevel": 4
4832548428
}

0 commit comments

Comments
 (0)