Skip to content

Commit e554680

Browse files
authored
Weekly Permissions sync 2025-05-07 (#1121)
1 parent 008c3cc commit e554680

File tree

2 files changed

+99
-2
lines changed

2 files changed

+99
-2
lines changed

permissions/new/ProvisioningInfo.json

Lines changed: 26 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7733,6 +7733,14 @@
77337733
"resourceAppId": ""
77347734
}
77357735
],
7736+
"OnlineMeetingArtifact.Read.Chat": [
7737+
{
7738+
"scheme": "Application",
7739+
"environment": "public",
7740+
"isHidden": true,
7741+
"resourceAppId": "26a18ebc-cdf7-4a6a-91cb-beb352805e81"
7742+
}
7743+
],
77367744
"OnlineMeetingArtifactInvite.Send.All": [
77377745
{
77387746
"id": "",
@@ -9048,15 +9056,15 @@
90489056
"id": "9ef7463f-1d39-406f-89ea-3483a4645e1c",
90499057
"scheme": "DelegatedWork",
90509058
"environment": "public",
9051-
"isHidden": true,
9059+
"isHidden": false,
90529060
"isEnabled": true,
90539061
"resourceAppId": "25254d2d-55ce-461a-b245-3258f0f6a24d"
90549062
},
90559063
{
90569064
"id": "a6325ae7-2b73-4dbd-abed-fbeacfbf8696",
90579065
"scheme": "Application",
90589066
"environment": "public",
9059-
"isHidden": true,
9067+
"isHidden": false,
90609068
"isEnabled": true,
90619069
"resourceAppId": "25254d2d-55ce-461a-b245-3258f0f6a24d"
90629070
}
@@ -14725,6 +14733,22 @@
1472514733
"resourceAppId": ""
1472614734
}
1472714735
],
14736+
"VirtualEvent.Read.Chat": [
14737+
{
14738+
"scheme": "Application",
14739+
"environment": "public",
14740+
"isHidden": true,
14741+
"resourceAppId": "26a18ebc-cdf7-4a6a-91cb-beb352805e81"
14742+
}
14743+
],
14744+
"VirtualEventRegistration-Anon.ReadWrite.Chat": [
14745+
{
14746+
"scheme": "Application",
14747+
"environment": "public",
14748+
"isHidden": true,
14749+
"resourceAppId": "26a18ebc-cdf7-4a6a-91cb-beb352805e81"
14750+
}
14751+
],
1472814752
"WindowsUpdates.Read.All": [
1472914753
{
1473014754
"id": "9528CE37-154E-4E4F-A0FC-12BAEFD85D51",

permissions/new/permissions.json

Lines changed: 73 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24745,8 +24745,10 @@
2474524745
],
2474624746
"paths": {
2474724747
"/identityprotection/riskyusers/confirmcompromised": "least=DelegatedWork,Application",
24748+
"/identityprotection/riskyusers/confirmSafe": "least=DelegatedWork,Application",
2474824749
"/identityprotection/riskyusers/dismiss": "least=DelegatedWork,Application",
2474924750
"/riskyusers/confirmcompromised": "least=DelegatedWork,Application",
24751+
"/riskyusers/confirmSafe": "least=DelegatedWork,Application",
2475024752
"/riskyusers/dismiss": "least=DelegatedWork,Application"
2475124753
}
2475224754
}
@@ -33414,6 +33416,76 @@
3341433416
"ownerSecurityGroup": "umtelivesite"
3341533417
}
3341633418
},
33419+
"Policy.ReadWrite.CrossTenantCapability": {
33420+
"authorizationType": "oAuth2",
33421+
"schemes": {
33422+
"DelegatedWork": {
33423+
"adminDisplayName": "Read and write your organization's M365 cross tenant access capabilities",
33424+
"adminDescription": "Allows the app to read and write your organization's M365 cross tenant access capabilities on behalf of the signed-in user.",
33425+
"userDisplayName": "Read and write your organization's M365 cross tenant access capabilities",
33426+
"userDescription": "Allows the app to read and write your organization's M365 cross tenant access capabilities on your behalf.",
33427+
"requiresAdminConsent": true,
33428+
"privilegeLevel": 4
33429+
},
33430+
"Application": {
33431+
"adminDisplayName": "Read and write your organization's M365 cross tenant access capabilities",
33432+
"adminDescription": "Allows the app to read and write your organization's M365 cross tenant access capabilities without a signed-in user.",
33433+
"requiresAdminConsent": true,
33434+
"privilegeLevel": 4
33435+
}
33436+
},
33437+
"pathSets": [
33438+
{
33439+
"schemeKeys": [
33440+
"DelegatedWork",
33441+
"Application"
33442+
],
33443+
"methods": [
33444+
"GET",
33445+
"POST"
33446+
],
33447+
"paths": {
33448+
"/policies/crosstenantaccesspolicy/default/m365Capabilities": "least=DelegatedWork,Application",
33449+
"/policies/crosstenantaccesspolicy/partners/{id}/m365Capabilities": "least=DelegatedWork,Application"
33450+
}
33451+
},
33452+
{
33453+
"schemeKeys": [
33454+
"DelegatedWork",
33455+
"Application"
33456+
],
33457+
"methods": [
33458+
"GET",
33459+
"PATCH"
33460+
],
33461+
"paths": {
33462+
"/policies/crosstenantaccesspolicy/default/m365Capabilities/calendarAvailabilityBasic": "least=DelegatedWork,Application",
33463+
"/policies/crosstenantaccesspolicy/default/m365Capabilities/calendarAvailabilityLimitedDetails": "least=DelegatedWork,Application",
33464+
"/policies/crosstenantaccesspolicy/default/m365Capabilities/crossTenantOpenProfileCard": "least=DelegatedWork,Application"
33465+
}
33466+
},
33467+
{
33468+
"schemeKeys": [
33469+
"DelegatedWork",
33470+
"Application"
33471+
],
33472+
"methods": [
33473+
"DELETE",
33474+
"GET",
33475+
"PATCH"
33476+
],
33477+
"paths": {
33478+
"/policies/crosstenantaccesspolicy/partners/{id}/m365Capabilities/calendarAvailabilityBasic": "least=DelegatedWork,Application",
33479+
"/policies/crosstenantaccesspolicy/partners/{id}/m365Capabilities/calendarAvailabilityLimitedDetails": "least=DelegatedWork,Application",
33480+
"/policies/crosstenantaccesspolicy/partners/{id}/m365Capabilities/crossTenantMigration": "least=DelegatedWork,Application",
33481+
"/policies/crosstenantaccesspolicy/partners/{id}/m365Capabilities/crossTenantOpenProfileCard": "least=DelegatedWork,Application"
33482+
}
33483+
}
33484+
],
33485+
"ownerInfo": {
33486+
"ownerSecurityGroup": "m365xtapnyx"
33487+
}
33488+
},
3341733489
"Policy.ReadWrite.DeviceConfiguration": {
3341833490
"authorizationType": "oAuth2",
3341933491
"schemes": {
@@ -51226,6 +51298,7 @@
5122651298
}
5122751299
},
5122851300
"VirtualEventRegistration-Anon.ReadWrite.All": {
51301+
"authorizationType": "oAuth2",
5122951302
"schemes": {
5123051303
"Application": {
5123151304
"adminDisplayName": "Read and write anonymous users' virtual event registrations",

0 commit comments

Comments
 (0)