Table of Contents

RoleEligibilitySchedule.Remove.Directory

Allows the app to delete the eligible role-based access control (RBAC) assignments for your company's directory, on behalf of the signed-in user.

Merill's Note

For an app to access data in Microsoft Graph, the user or administrator must grant it the permissions it needs. This article lists all the Microsoft Graph APIs and your tenant data that can be accessed by the application (vendor/developer) if you consent to the RoleEligibilitySchedule.Remove.Directory permission.

If you need to create an audit report of the permissions granted to all the apps in your tenant, you can run the Export-MsIdAppConsentGrantReport command. See How To: Run a quick OAuth app audit of your tenant

Category Application Delegated
Identifier 79c7e69c-0d9f-4eff-97a8-49170a5a08ba 58ac4fa2-b484-4d6e-ba97-beee2a574220
DisplayText Delete all eligible role assignments of your company's directory Delete all eligible role assignments for your company's directory
Description Delete all eligible privileged role-based access control (RBAC) assignments of your company's directory, without a signed-in user. Allows the app to delete the eligible role-based access control (RBAC) assignments for your company's directory, on behalf of the signed-in user.
AdminConsentRequired Yes Yes

Graph Methods

Resources

Granting this permission allows the calling application to access (and/or update) the following information in your tenant.

Graph reference: requestSchedule

Property Type Description
expiration expirationPattern When the eligible or active assignment expires.
recurrence patternedRecurrence The frequency of the eligible or active assignment. This property is currently unsupported in PIM.
startDateTime DateTimeOffset When the eligible or active assignment becomes active.