Table of Contents

RoleAssignmentSchedule.Remove.Directory

Allows the app to delete the active role-based access control (RBAC) assignments for your company's directory, on behalf of the signed-in user.

Merill's Note

For an app to access data in Microsoft Graph, the user or administrator must grant it the permissions it needs. This article lists all the Microsoft Graph APIs and your tenant data that can be accessed by the application (vendor/developer) if you consent to the RoleAssignmentSchedule.Remove.Directory permission.

If you need to create an audit report of the permissions granted to all the apps in your tenant, you can run the Export-MsIdAppConsentGrantReport command. See How To: Run a quick OAuth app audit of your tenant

Category Application Delegated
Identifier d3495511-98b7-4df3-b317-4e35c19f6129 f71cd05c-3fdb-4568-aef2-e1cf62ee20d4
DisplayText Delete all active role assignments of your company's directory Delete all active role assignments for your company's directory
Description Delete all active privileged role-based access control (RBAC) assignments of your company's directory, without a signed-in user. Allows the app to delete the active role-based access control (RBAC) assignments for your company's directory, on behalf of the signed-in user.
AdminConsentRequired Yes Yes

Graph Methods

Resources

Granting this permission allows the calling application to access (and/or update) the following information in your tenant.

Graph reference: requestSchedule

Property Type Description
expiration expirationPattern When the eligible or active assignment expires.
recurrence patternedRecurrence The frequency of the eligible or active assignment. This property is currently unsupported in PIM.
startDateTime DateTimeOffset When the eligible or active assignment becomes active.