Table of Contents

Application.Read.All

Allows the app to read applications and service principals on behalf of the signed-in user.

Merill's Note

For an app to access data in Microsoft Graph, the user or administrator must grant it the permissions it needs. This article lists all the Microsoft Graph APIs and your tenant data that can be accessed by the application (vendor/developer) if you consent to the Application.Read.All permission.

If you need to create an audit report of the permissions granted to all the apps in your tenant, you can run the Export-MsIdAppConsentGrantReport command. See How To: Run a quick OAuth app audit of your tenant

Category Application Delegated
Identifier 9a5d68dd-52b0-4cc2-bd40-abcf44ac3a30 c79f8feb-a9db-4090-85f9-90d820caa0eb
DisplayText Read all applications Read applications
Description Allows the app to read all applications and service principals without a signed-in user. Allows the app to read applications and service principals on behalf of the signed-in user.
AdminConsentRequired Yes Yes

Graph Methods

API supports delegated access (access on behalf of a user)
API supports app-only access (access without a user)

Methods
Application.Read.All and Policy.ReadWrite.ApplicationConfiguration
Application.Read.All and Policy.ReadWrite.ApplicationConfiguration
Application.Read.All and Policy.Read.All ▪️ Application.Read.All and Policy.ReadWrite.ApplicationConfiguration
Policy.Read.All and Application.Read.All ▪️ Policy.ReadWrite.ApplicationConfiguration and Application.Read.All
Policy.Read.All and Application.Read.All ▪️ Policy.ReadWrite.ApplicationConfiguration and Application.Read.All
Policy.Read.All and Application.Read.All ▪️ Policy.ReadWrite.ApplicationConfiguration and Application.Read.All
Policy.Read.All and Application.Read.All ▪️ Policy.ReadWrite.ApplicationConfiguration and Application.Read.All
Application.Read.All and Policy.ReadWrite.ConditionalAccess
Application.Read.All and Policy.ReadWrite.ApplicationConfiguration
Application.Read.All and Policy.ReadWrite.ConditionalAccess
AppRoleAssignment.ReadWrite.All and Application.Read.All
AppRoleAssignment.ReadWrite.All and Application.Read.All
AppRoleAssignment.ReadWrite.All and Application.Read.All
AppRoleAssignment.ReadWrite.All and Application.Read.All

Resources

Granting this permission allows the calling application to access (and/or update) the following information in your tenant.

Graph reference: administrativeUnit

Property Type Description
description String An optional description for the administrative unit. Supports $filter (eq, ne, in, startsWith), $search.
displayName String Display name for the administrative unit. Supports $filter (eq, ne, not, ge, le, in, startsWith, and eq on null values), $search, and $orderby.
id String Unique identifier for the administrative unit. Read-only. Supports $filter (eq).
membershipRule String The dynamic membership rule for the administrative unit. For more information about the rules you can use for dynamic administrative units and dynamic groups, see Manage rules for dynamic membership groups in Microsoft Entra ID.
membershipRuleProcessingState String Controls whether the dynamic membership rule is actively processed. Set to On to activate the dynamic membership rule, or Paused to stop updating membership dynamically.
membershipType String Indicates the membership type for the administrative unit. The possible values are: dynamic, assigned. If not set, the default value is null and the default behavior is assigned.
visibility String Controls whether the administrative unit and its members are hidden or public. Can be set to HiddenMembership. If not set, the default value is null and the default behavior is public. When set to HiddenMembership, only members of the administrative unit can list other members of the administrative unit.