CustomSecAttributeAuditLogs.Read.All
Allows the app to read audit logs for events that contain information about custom security attributes, on behalf of the signed-in user.
Merill's Note
For an app to access data in Microsoft Graph, the user or administrator must grant it the permissions it needs. This article lists all the Microsoft Graph APIs and your tenant data that can be accessed by the application (vendor/developer) if you consent to the
CustomSecAttributeAuditLogs.Read.All
permission.If you need to create an audit report of the permissions granted to all the apps in your tenant, you can run the
Export-MsIdAppConsentGrantReport
command. See How To: Run a quick OAuth app audit of your tenant
Category | Application | Delegated |
---|---|---|
Identifier | 2a4f026d-e829-4e84-bdbf-d981a2703059 | 1fcdeaab-b519-44dd-bffc-ed1fd15a24e0 |
DisplayText | Read all custom security attribute audit logs | Read custom security attribute audit logs |
Description | Allows the app to read all audit logs for events that contain information about custom security attributes, without a signed-in user. | Allows the app to read audit logs for events that contain information about custom security attributes, on behalf of the signed-in user. |
AdminConsentRequired | Yes | Yes |
Graph Methods
→ API supports delegated access (access on behalf of a user)
→ API supports app-only access (access without a user)
Methods |
---|
Resources
Granting this permission allows the calling application to access (and/or update) the following information in your tenant.
Graph reference: customSecurityAttributeAudit
Property | Type | Description |
---|---|---|
activityDateTime | DateTimeOffset | Indicates the date and time the activity was performed. The Timestamp type is always in UTC time. For example, midnight UTC on Jan 1, 2024 is 2024-01-01T00:00:00Z . Supports $filter (eq , ge , le ). |
activityDisplayName | String | Indicates the activity name or the operation name. For example: "Add custom security attribute definition in an attribute set" or "Update attribute values assigned to a user." For a list of activities logged, refer to Microsoft Entra audit log categories and activities. Supports $filter (eq , startswith ). |
additionalDetails | keyValue collection | Indicates additional details on the activity. |
category | String | Indicates the resource category that's targeted by the activity. Custom security attribute activities are logged in a single category: AttributeManagement . |
correlationId | String | Indicates a unique ID that helps correlate activities that span across various services. Can be used to trace logs across services. |
id | String | Indicates the unique ID for the activity. Inherited from entity. |
initiatedBy | auditActivityInitiator | Indicates information about the user or app initiated the activity. Supports $filter (eq ) for user/id, user/displayName, user/userPrincipalName, app/appId, app/displayName; and $filter (startswith ) for user/userPrincipalName. |
loggedByService | String | Indicates information on which service initiated the activity. For example: Core Directory . Supports $filter (eq ). |
operationType | String | Indicates the type of operation that was performed. The possible values include but aren't limited to the following: Add , Assign , Update , Unassign , and Delete . |
result | operationResult | Indicates the result of the activity. The possible values are: success , failure , timeout , unknownFutureValue . |
resultReason | String | Indicates the reason for failure if the result is failure or timeout . |
targetResources | targetResource collection | Indicates information on which resource was changed due to the activity. The target resource type can be User , App , or Other . Supports $filter (eq ) for id and displayName; and $filter (startswith ) for displayName. |
userAgent | String | Type of user agent used by a user in the activity. |