Table of Contents

RoleManagementPolicy.Read.Directory

Allows the app to read policies for privileged role-based access control (RBAC) assignments of your company's directory, on behalf of the signed-in user.

Merill's Note

For an app to access data in Microsoft Graph, the user or administrator must grant it the permissions it needs. This article lists all the Microsoft Graph APIs and your tenant data that can be accessed by the application (vendor/developer) if you consent to the RoleManagementPolicy.Read.Directory permission.

If you need to create an audit report of the permissions granted to all the apps in your tenant, you can run the Export-MsIdAppConsentGrantReport command. See How To: Run a quick OAuth app audit of your tenant

Category Application Delegated
Identifier fdc4c997-9942-4479-bfcb-75a36d1138df 3de2cdbe-0ff5-47d5-bdee-7f45b4749ead
DisplayText Read all policies for privileged role assignments of your company's directory Read all policies for privileged role assignments of your company's directory
Description Allows the app to read policies for privileged role-based access control (RBAC) assignments of your company's directory, without a signed-in user. Allows the app to read policies for privileged role-based access control (RBAC) assignments of your company's directory, on behalf of the signed-in user.
AdminConsentRequired Yes Yes

Graph Methods

API supports delegated access (access on behalf of a user)
API supports app-only access (access without a user)

Methods

Resources

Granting this permission allows the calling application to access (and/or update) the following information in your tenant.

Graph reference: unifiedRoleManagementPolicy

Property Type Description
description String Description for the policy.
displayName String Display name for the policy.
id String Unique identifier for the policy.
isOrganizationDefault Boolean This can only be set to true for a single tenant-wide policy which will apply to all scopes and roles. Set the scopeId to / and scopeType to Directory. Supports $filter (eq, ne).
lastModifiedBy identity The identity who last modified the role setting.
lastModifiedDateTime DateTimeOffset The time when the role setting was last modified.
scopeId String The identifier of the scope where the policy is created. Can be / for the tenant or a group ID. Required.
scopeType String The type of the scope where the policy is created. One of Directory, DirectoryRole, Group. Required.