Skip to content

Commit 01a4b94

Browse files
authored
Merge pull request #25518 from microsoftgraph/rbac-deviceLocalCredentials
Entra admin roles - device local credentials
2 parents 2222ab6 + 3db2010 commit 01a4b94

8 files changed

+42
-68
lines changed

api-reference/beta/api/devicelocalcredentialinfo-get.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,18 @@ Choose the permission or permissions marked as least privileged for this API. Us
2424

2525
To access the actual passwords on the device, done by including `$select=credentials` as part of the query parameters, the app must be assigned the *DeviceLocalCredential.Read.All* permission and *DeviceLocalCredential.ReadBasic.All* is insufficient.
2626

27-
[!INCLUDE [rbac-device-local-credentials-apis-read](../includes/rbac-for-apis/rbac-device-local-credentials-apis-read.md)]
27+
> [!IMPORTANT]
28+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
29+
> - Cloud Device Administrator
30+
> - Helpdesk Administrator
31+
> - Intune Service Administrator
32+
> - Security Administrator
33+
> - Security Reader
34+
> - Global Reader
35+
>
36+
> To access the actual passwords on the device by using the `$select=credentials` query parameter, the following least privileged roles are supported:
37+
> - Cloud Device Administrator
38+
> - Intune Service Administrator
2839
2940
## HTTP request
3041
To get the device local credential for a specific device object:

api-reference/beta/api/directory-list-devicelocalcredentials.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,14 @@ Choose the permission or permissions marked as least privileged for this API. Us
2222
<!-- { "blockType": "permissions", "name": "directory_list_devicelocalcredentials" } -->
2323
[!INCLUDE [permissions-table](../includes/permissions/directory-list-devicelocalcredentials-permissions.md)]
2424

25-
[!INCLUDE [rbac-device-local-credentials-basic-apis-read](../includes/rbac-for-apis/rbac-device-local-credentials-basic-apis-read.md)]
25+
> [!IMPORTANT]
26+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
27+
> - Cloud Device Administrator
28+
> - Helpdesk Administrator
29+
> - Intune Service Administrator
30+
> - Security Administrator
31+
> - Security Reader
32+
> - Global Reader
2633
2734
## HTTP request
2835
To get a list of deviceLocalCredentialInfo within the tenant:

api-reference/beta/includes/rbac-for-apis/rbac-device-local-credentials-apis-read.md

Lines changed: 0 additions & 18 deletions
This file was deleted.

api-reference/beta/includes/rbac-for-apis/rbac-device-local-credentials-basic-apis-read.md

Lines changed: 0 additions & 13 deletions
This file was deleted.

api-reference/v1.0/api/devicelocalcredentialinfo-get.md

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,20 @@ Choose the permission or permissions marked as least privileged for this API. Us
2020
<!-- { "blockType": "permissions", "name": "devicelocalcredentialinfo_get" } -->
2121
[!INCLUDE [permissions-table](../includes/permissions/devicelocalcredentialinfo-get-permissions.md)]
2222

23-
To access the actual passwords on the device by using the `$select=credentials` query parameter, the app must be assigned the DeviceLocalCredential.Read.All permission. DeviceLocalCredential.ReadBasic.All is insufficient.
24-
25-
[!INCLUDE [rbac-device-local-credentials-apis-read](../includes/rbac-for-apis/rbac-device-local-credentials-apis-read.md)]
23+
To access the actual passwords on the device, done by including `$select=credentials` as part of the query parameters, the app must be assigned the *DeviceLocalCredential.Read.All* permission and *DeviceLocalCredential.ReadBasic.All* is insufficient.
24+
25+
> [!IMPORTANT]
26+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
27+
> - Cloud Device Administrator
28+
> - Helpdesk Administrator
29+
> - Intune Service Administrator
30+
> - Security Administrator
31+
> - Security Reader
32+
> - Global Reader
33+
>
34+
> To access the actual passwords on the device by using the `$select=credentials` query parameter, the following least privileged roles are supported:
35+
> - Cloud Device Administrator
36+
> - Intune Service Administrator
2637
2738
## HTTP request
2839
To get the device local credential for a specific device object:

api-reference/v1.0/api/directory-list-devicelocalcredentials.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,14 @@ Choose the permission or permissions marked as least privileged for this API. Us
2020
<!-- { "blockType": "permissions", "name": "directory_list_devicelocalcredentials" } -->
2121
[!INCLUDE [permissions-table](../includes/permissions/directory-list-devicelocalcredentials-permissions.md)]
2222

23-
[!INCLUDE [rbac-device-local-credentials-basic-apis-read](../includes/rbac-for-apis/rbac-device-local-credentials-basic-apis-read.md)]
23+
> [!IMPORTANT]
24+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
25+
> - Cloud Device Administrator
26+
> - Helpdesk Administrator
27+
> - Intune Service Administrator
28+
> - Security Administrator
29+
> - Security Reader
30+
> - Global Reader
2431
2532
## HTTP request
2633
To get a list of **deviceLocalCredentialInfo** objects within the tenant:

api-reference/v1.0/includes/rbac-for-apis/rbac-device-local-credentials-apis-read.md

Lines changed: 0 additions & 18 deletions
This file was deleted.

api-reference/v1.0/includes/rbac-for-apis/rbac-device-local-credentials-basic-apis-read.md

Lines changed: 0 additions & 13 deletions
This file was deleted.

0 commit comments

Comments
 (0)