DeviceManagementRBAC.Read.All
Allows the app to read the properties relating to the Microsoft Intune Role-Based Access Control (RBAC) settings.
Using the Microsoft Graph APIs to configure Intune controls and policies still requires that the Intune service is correctly licensed by the customer.
These permissions aren't supported for personal Microsoft accounts.
Merill's Note
For an app to access data in Microsoft Graph, the user or administrator must grant it the permissions it needs. This article lists all the Microsoft Graph APIs and your tenant data that can be accessed by the application (vendor/developer) if you consent to the
DeviceManagementRBAC.Read.All
permission.If you need to create an audit report of the permissions granted to all the apps in your tenant, you can run the
Export-MsIdAppConsentGrantReport
command. See How To: Run a quick OAuth app audit of your tenant
Category | Application | Delegated |
---|---|---|
Identifier | 58ca0d9a-1575-47e1-a3cb-007ef2e4583b | 49f0cc30-024c-4dfd-ab3e-82e137ee5431 |
DisplayText | Read Microsoft Intune RBAC settings | Read Microsoft Intune RBAC settings |
Description | Allows the app to read the properties relating to the Microsoft Intune Role-Based Access Control (RBAC) settings, without a signed-in user. | Allows the app to read the properties relating to the Microsoft Intune Role-Based Access Control (RBAC) settings. |
AdminConsentRequired | Yes | Yes |
Graph Methods
→ API supports delegated access (access on behalf of a user)
→ API supports app-only access (access without a user)
Methods | |
---|---|
Resources
Granting this permission allows the calling application to access (and/or update) the following information in your tenant.
- deviceAndAppManagementAssignedRoleDetail
- deviceAndAppManagementAssignedRoleDetails
- deviceAndAppManagementRoleAssignment
- deviceAndAppManagementRoleDefinition
- deviceManagement
- operationApprovalPolicy
- operationApprovalPolicySet
- operationApprovalRequest
- operationApprovalRequestEntityStatus
- intune-rbac-operationapprovalsource
- rbacApplicationMultiple
- resourceOperation
- roleAssignment
- roleDefinition
- roleManagement
- rolePermission
- roleScopeTag
- roleScopeTagAutoAssignment
- unifiedRoleAssignment
- unifiedRoleAssignmentMultiple
- unifiedRoleDefinition
Graph reference: deviceAndAppManagementAssignedRoleDetail
Property | Type | Description |
---|---|---|
roleDefinitions | deviceAndAppManagementAssignedRoleDefinition collection | A collection of RoleDefinitions represents the various administrative roles that define permissions and access levels within Microsoft Intune. Each RoleDefinition outlines a set of permissions that determine the actions an admin or user can perform in the Intune environment. These permissions can include actions like reading or writing to specific resources, managing device configurations, deploying policies, or handling user data. RoleDefinitions are critical for enforcing role-based access control (RBAC), ensuring that administrators can only interact with the features and data relevant to their responsibilities. RoleDefinitions in Intune can either be built-in roles provided by Microsoft or custom roles created by an organization to tailor access based on specific needs. These definitions are referenced when assigning roles to users or groups, effectively controlling the scope of their administrative privileges. The collection of RoleDefinitions is managed through the Intune console or the Graph API, allowing for scalable role management across large environments. This property is read-only. |
permissions | String collection | The list of permissions assigned to a specific user based on their associated role definitions. Each permission defines the specific actions the user can perform on Intune resources, such as managing devices, applications, or configurations. Some possible values are: Microsoft.Intune/MobileApps/Read, Microsoft.Intune/DeviceConfigurations/Write, Microsoft.Intune/ManagedDevices/Retire, and Microsoft.Intune/DeviceCompliancePolicies/Assign. This Permissions property provides a comprehensive view of the user's effective access rights, ensuring that they can only perform actions relevant to their assigned roles. This property is read-only. |