RoleManagementPolicy.Read.AzureADGroup
Allows the app to read policies in Privileged Identity Management for Groups, on behalf of the signed-in user.
Merill's Note
For an app to access data in Microsoft Graph, the user or administrator must grant it the permissions it needs. This article lists all the Microsoft Graph APIs and your tenant data that can be accessed by the application (vendor/developer) if you consent to the
RoleManagementPolicy.Read.AzureADGroup
permission.If you need to create an audit report of the permissions granted to all the apps in your tenant, you can run the
Export-MsIdAppConsentGrantReport
command. See How To: Run a quick OAuth app audit of your tenant
Category | Application | Delegated |
---|---|---|
Identifier | 69e67828-780e-47fd-b28c-7b27d14864e6 | 7e26fdff-9cb1-4e56-bede-211fe0e420e8 |
DisplayText | Read all policies in PIM for Groups | Read all policies in PIM for Groups |
Description | Allows the app to read policies in Privileged Identity Management for Groups, without a signed-in user. | Allows the app to read policies in Privileged Identity Management for Groups, on behalf of the signed-in user. |
AdminConsentRequired | Yes | Yes |
Graph Methods
→ API supports delegated access (access on behalf of a user)
→ API supports app-only access (access without a user)
Methods | |
---|---|
Resources
Granting this permission allows the calling application to access (and/or update) the following information in your tenant.
- unifiedRoleManagementPolicy
- unifiedRoleManagementPolicyApprovalRule
- unifiedRoleManagementPolicyAssignment
- unifiedRoleManagementPolicyAuthenticationContextRule
- unifiedRoleManagementPolicyEnablementRule
- unifiedRoleManagementPolicyExpirationRule
- unifiedRoleManagementPolicyNotificationRule
- unifiedRoleManagementPolicyRule
Graph reference: unifiedRoleManagementPolicy
Property | Type | Description |
---|---|---|
description | String | Description for the policy. |
displayName | String | Display name for the policy. |
id | String | Unique identifier for the policy. |
isOrganizationDefault | Boolean | This can only be set to true for a single tenant-wide policy which will apply to all scopes and roles. Set the scopeId to / and scopeType to Directory . Supports $filter (eq , ne ). |
lastModifiedBy | identity | The identity who last modified the role setting. |
lastModifiedDateTime | DateTimeOffset | The time when the role setting was last modified. |
scopeId | String | The identifier of the scope where the policy is created. Can be / for the tenant or a group ID. Required. |
scopeType | String | The type of the scope where the policy is created. One of Directory , DirectoryRole , Group . Required. |