Skip to content

Commit dcc804d

Browse files
committed
Weekly Permissions sync 2024-12-27
1 parent adf3d3b commit dcc804d

File tree

2 files changed

+125
-4
lines changed

2 files changed

+125
-4
lines changed

permissions/new/ProvisioningInfo.json

Lines changed: 22 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5266,6 +5266,24 @@
52665266
"resourceAppId": ""
52675267
}
52685268
],
5269+
"FormsBody.ReadWrite.All": [
5270+
{
5271+
"id": "",
5272+
"scheme": "DelegatedWork",
5273+
"environment": "public",
5274+
"isHidden": true,
5275+
"isEnabled": true,
5276+
"resourceAppId": "c9a559d2-7aab-4f13-a6ed-e7e9c52aec87"
5277+
},
5278+
{
5279+
"id": "",
5280+
"scheme": "Application",
5281+
"environment": "public",
5282+
"isHidden": true,
5283+
"isEnabled": true,
5284+
"resourceAppId": "c9a559d2-7aab-4f13-a6ed-e7e9c52aec87"
5285+
}
5286+
],
52695287
"Goals-Export.Read.All": [
52705288
{
52715289
"scheme": "DelegatedWork",
@@ -10077,15 +10095,15 @@
1007710095
"id": "dd689728-6eb8-4deb-bd38-2924a935f3de",
1007810096
"scheme": "DelegatedWork",
1007910097
"environment": "public",
10080-
"isHidden": true,
10098+
"isHidden": false,
1008110099
"isEnabled": true,
1008210100
"resourceAppId": "8ee8fdad-f234-4243-8f3b-15c294843740"
1008310101
},
1008410102
{
1008510103
"id": "4d6e30d1-e64e-4ae7-bf9d-c706cc928cef",
1008610104
"scheme": "Application",
1008710105
"environment": "public",
10088-
"isHidden": true,
10106+
"isHidden": false,
1008910107
"isEnabled": true,
1009010108
"resourceAppId": "8ee8fdad-f234-4243-8f3b-15c294843740"
1009110109
}
@@ -10167,15 +10185,15 @@
1016710185
"id": "d8914f8f-9f64-4bd1-b4d3-f5a701ed8457",
1016810186
"scheme": "DelegatedWork",
1016910187
"environment": "public",
10170-
"isHidden": true,
10188+
"isHidden": false,
1017110189
"isEnabled": true,
1017210190
"resourceAppId": "8ee8fdad-f234-4243-8f3b-15c294843740"
1017310191
},
1017410192
{
1017510193
"id": "8b7e8c0a-7e9d-4049-97ec-04b5e1bcaf05",
1017610194
"scheme": "Application",
1017710195
"environment": "public",
10178-
"isHidden": true,
10196+
"isHidden": false,
1017910197
"isEnabled": true,
1018010198
"resourceAppId": "8ee8fdad-f234-4243-8f3b-15c294843740"
1018110199
}

permissions/new/permissions.json

Lines changed: 103 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36389,6 +36389,44 @@
3638936389
"ownerSecurityGroup": "cpcgraph"
3639036390
}
3639136391
},
36392+
"RoleManagement.Read.Defender": {
36393+
"schemes": {
36394+
"DelegatedWork": {
36395+
"adminDisplayName": "Read M365 Defender RBAC configuration",
36396+
"adminDescription": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, on behalf of the signed-in user. This includes reading M365 Defender role definitions and role assignments.",
36397+
"userDisplayName": "Read M365 Defender RBAC configuration",
36398+
"userDescription": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, on behalf of the signed-in user. This includes reading M365 Defender role definitions and role assignments.",
36399+
"requiresAdminConsent": true,
36400+
"privilegeLevel": 3
36401+
},
36402+
"Application": {
36403+
"adminDisplayName": "Read M365 Defender RBAC configuration",
36404+
"adminDescription": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, without a signed-in user.",
36405+
"requiresAdminConsent": true,
36406+
"privilegeLevel": 4
36407+
}
36408+
},
36409+
"pathSets": [
36410+
{
36411+
"schemeKeys": [
36412+
"DelegatedWork",
36413+
"Application"
36414+
],
36415+
"methods": [
36416+
"GET"
36417+
],
36418+
"paths": {
36419+
"/rolemanagement/defender/roleassignments": "least=DelegatedWork,Application",
36420+
"/rolemanagement/defender/roleassignments/{id}": "least=DelegatedWork,Application",
36421+
"/rolemanagement/defender/roledefinitions": "least=DelegatedWork,Application",
36422+
"/rolemanagement/defender/roledefinitions/{id}": "least=DelegatedWork,Application"
36423+
}
36424+
}
36425+
],
36426+
"ownerInfo": {
36427+
"ownerSecurityGroup": "mdatpUrbac"
36428+
}
36429+
},
3639236430
"RoleManagement.Read.Directory": {
3639336431
"schemes": {
3639436432
"DelegatedWork": {
@@ -36595,6 +36633,71 @@
3659536633
"ownerSecurityGroup": "cpcgraph"
3659636634
}
3659736635
},
36636+
"RoleManagement.ReadWrite.Defender": {
36637+
"schemes": {
36638+
"DelegatedWork": {
36639+
"adminDisplayName": "Read M365 Defender RBAC configuration",
36640+
"adminDescription": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, on behalf of the signed-in user. This includes reading M365 Defender role definitions and role assignments.",
36641+
"userDisplayName": "Read M365 Defender RBAC configuration",
36642+
"userDescription": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, on behalf of the signed-in user. This includes reading M365 Defender role definitions and role assignments.",
36643+
"requiresAdminConsent": true,
36644+
"privilegeLevel": 3
36645+
},
36646+
"Application": {
36647+
"adminDisplayName": "Read M365 Defender RBAC configuration",
36648+
"adminDescription": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, without a signed-in user.",
36649+
"requiresAdminConsent": true,
36650+
"privilegeLevel": 4
36651+
}
36652+
},
36653+
"pathSets": [
36654+
{
36655+
"schemeKeys": [
36656+
"DelegatedWork",
36657+
"Application"
36658+
],
36659+
"methods": [
36660+
"GET"
36661+
],
36662+
"paths": {
36663+
"/roleManagement/defender/roleassignments": "",
36664+
"/roleManagement/defender/roleassignments/{id}": "",
36665+
"/rolemanagement/defender/roledefinitions": "",
36666+
"/rolemanagement/defender/roledefinitions/{id}": ""
36667+
}
36668+
},
36669+
{
36670+
"schemeKeys": [
36671+
"DelegatedWork",
36672+
"Application"
36673+
],
36674+
"methods": [
36675+
"POST"
36676+
],
36677+
"paths": {
36678+
"/roleManagement/defender/roleassignments": "least=DelegatedWork,Application",
36679+
"/rolemanagement/defender/roledefinitions": "least=DelegatedWork,Application"
36680+
}
36681+
},
36682+
{
36683+
"schemeKeys": [
36684+
"DelegatedWork",
36685+
"Application"
36686+
],
36687+
"methods": [
36688+
"DELETE",
36689+
"PATCH"
36690+
],
36691+
"paths": {
36692+
"/roleManagement/defender/roleassignments/{id}": "least=DelegatedWork,Application",
36693+
"/rolemanagement/defender/roledefinitions/{id}": "least=DelegatedWork,Application"
36694+
}
36695+
}
36696+
],
36697+
"ownerInfo": {
36698+
"ownerSecurityGroup": "mdatpUrbac"
36699+
}
36700+
},
3659836701
"RoleManagement.ReadWrite.Directory": {
3659936702
"schemes": {
3660036703
"DelegatedWork": {

0 commit comments

Comments
 (0)