|
36389 | 36389 | "ownerSecurityGroup": "cpcgraph" |
36390 | 36390 | } |
36391 | 36391 | }, |
| 36392 | + "RoleManagement.Read.Defender": { |
| 36393 | + "schemes": { |
| 36394 | + "DelegatedWork": { |
| 36395 | + "adminDisplayName": "Read M365 Defender RBAC configuration", |
| 36396 | + "adminDescription": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, on behalf of the signed-in user. This includes reading M365 Defender role definitions and role assignments.", |
| 36397 | + "userDisplayName": "Read M365 Defender RBAC configuration", |
| 36398 | + "userDescription": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, on behalf of the signed-in user. This includes reading M365 Defender role definitions and role assignments.", |
| 36399 | + "requiresAdminConsent": true, |
| 36400 | + "privilegeLevel": 3 |
| 36401 | + }, |
| 36402 | + "Application": { |
| 36403 | + "adminDisplayName": "Read M365 Defender RBAC configuration", |
| 36404 | + "adminDescription": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, without a signed-in user.", |
| 36405 | + "requiresAdminConsent": true, |
| 36406 | + "privilegeLevel": 4 |
| 36407 | + } |
| 36408 | + }, |
| 36409 | + "pathSets": [ |
| 36410 | + { |
| 36411 | + "schemeKeys": [ |
| 36412 | + "DelegatedWork", |
| 36413 | + "Application" |
| 36414 | + ], |
| 36415 | + "methods": [ |
| 36416 | + "GET" |
| 36417 | + ], |
| 36418 | + "paths": { |
| 36419 | + "/rolemanagement/defender/roleassignments": "least=DelegatedWork,Application", |
| 36420 | + "/rolemanagement/defender/roleassignments/{id}": "least=DelegatedWork,Application", |
| 36421 | + "/rolemanagement/defender/roledefinitions": "least=DelegatedWork,Application", |
| 36422 | + "/rolemanagement/defender/roledefinitions/{id}": "least=DelegatedWork,Application" |
| 36423 | + } |
| 36424 | + } |
| 36425 | + ], |
| 36426 | + "ownerInfo": { |
| 36427 | + "ownerSecurityGroup": "mdatpUrbac" |
| 36428 | + } |
| 36429 | + }, |
36392 | 36430 | "RoleManagement.Read.Directory": { |
36393 | 36431 | "schemes": { |
36394 | 36432 | "DelegatedWork": { |
|
36595 | 36633 | "ownerSecurityGroup": "cpcgraph" |
36596 | 36634 | } |
36597 | 36635 | }, |
| 36636 | + "RoleManagement.ReadWrite.Defender": { |
| 36637 | + "schemes": { |
| 36638 | + "DelegatedWork": { |
| 36639 | + "adminDisplayName": "Read M365 Defender RBAC configuration", |
| 36640 | + "adminDescription": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, on behalf of the signed-in user. This includes reading M365 Defender role definitions and role assignments.", |
| 36641 | + "userDisplayName": "Read M365 Defender RBAC configuration", |
| 36642 | + "userDescription": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, on behalf of the signed-in user. This includes reading M365 Defender role definitions and role assignments.", |
| 36643 | + "requiresAdminConsent": true, |
| 36644 | + "privilegeLevel": 3 |
| 36645 | + }, |
| 36646 | + "Application": { |
| 36647 | + "adminDisplayName": "Read M365 Defender RBAC configuration", |
| 36648 | + "adminDescription": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, without a signed-in user.", |
| 36649 | + "requiresAdminConsent": true, |
| 36650 | + "privilegeLevel": 4 |
| 36651 | + } |
| 36652 | + }, |
| 36653 | + "pathSets": [ |
| 36654 | + { |
| 36655 | + "schemeKeys": [ |
| 36656 | + "DelegatedWork", |
| 36657 | + "Application" |
| 36658 | + ], |
| 36659 | + "methods": [ |
| 36660 | + "GET" |
| 36661 | + ], |
| 36662 | + "paths": { |
| 36663 | + "/roleManagement/defender/roleassignments": "", |
| 36664 | + "/roleManagement/defender/roleassignments/{id}": "", |
| 36665 | + "/rolemanagement/defender/roledefinitions": "", |
| 36666 | + "/rolemanagement/defender/roledefinitions/{id}": "" |
| 36667 | + } |
| 36668 | + }, |
| 36669 | + { |
| 36670 | + "schemeKeys": [ |
| 36671 | + "DelegatedWork", |
| 36672 | + "Application" |
| 36673 | + ], |
| 36674 | + "methods": [ |
| 36675 | + "POST" |
| 36676 | + ], |
| 36677 | + "paths": { |
| 36678 | + "/roleManagement/defender/roleassignments": "least=DelegatedWork,Application", |
| 36679 | + "/rolemanagement/defender/roledefinitions": "least=DelegatedWork,Application" |
| 36680 | + } |
| 36681 | + }, |
| 36682 | + { |
| 36683 | + "schemeKeys": [ |
| 36684 | + "DelegatedWork", |
| 36685 | + "Application" |
| 36686 | + ], |
| 36687 | + "methods": [ |
| 36688 | + "DELETE", |
| 36689 | + "PATCH" |
| 36690 | + ], |
| 36691 | + "paths": { |
| 36692 | + "/roleManagement/defender/roleassignments/{id}": "least=DelegatedWork,Application", |
| 36693 | + "/rolemanagement/defender/roledefinitions/{id}": "least=DelegatedWork,Application" |
| 36694 | + } |
| 36695 | + } |
| 36696 | + ], |
| 36697 | + "ownerInfo": { |
| 36698 | + "ownerSecurityGroup": "mdatpUrbac" |
| 36699 | + } |
| 36700 | + }, |
36598 | 36701 | "RoleManagement.ReadWrite.Directory": { |
36599 | 36702 | "schemes": { |
36600 | 36703 | "DelegatedWork": { |
|
0 commit comments