Skip to content

Commit 535e466

Browse files
authored
Merge pull request #25425 from microsoftgraph/rbac-sp-SingleSignOnCredentials
Entra admin roles - SPs - single sign-on credentials
2 parents 737e3c2 + af57528 commit 535e466

5 files changed

+15
-8
lines changed

api-reference/beta/api/serviceprincipal-createpasswordsinglesignoncredentials.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2424
<!-- { "blockType": "permissions", "name": "serviceprincipal_createpasswordsinglesignoncredentials" } -->
2525
[!INCLUDE [permissions-table](../includes/permissions/serviceprincipal-createpasswordsinglesignoncredentials-permissions.md)]
2626

27-
> [!NOTE]
28-
> Users can create credentials for themselves. Service principal owners and admins with the following roles can create credentials for any user or group: GlobalAdministrator, ApplicationAdministrator, CloudApplicationAdministrator. To learn more, see [Directory roles](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#available-roles).
27+
[!INCLUDE [rbac-passwordsinglesignoncredentials-apis](../includes/rbac-for-apis/rbac-passwordsinglesignoncredentials-apis.md)]
2928

3029
## HTTP request
3130

api-reference/beta/api/serviceprincipal-deletepasswordsinglesignoncredentials.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2424
<!-- { "blockType": "permissions", "name": "serviceprincipal_deletepasswordsinglesignoncredentials" } -->
2525
[!INCLUDE [permissions-table](../includes/permissions/serviceprincipal-deletepasswordsinglesignoncredentials-permissions.md)]
2626

27-
> [!NOTE]
28-
> Users can create credentials for themselves. Service principal owners and admins with the following roles can create credentials for any user or group: GlobalAdministrator, ApplicationAdministrator, CloudApplicationAdministrator. To learn more, see [Directory roles](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#available-roles).
27+
[!INCLUDE [rbac-passwordsinglesignoncredentials-apis](../includes/rbac-for-apis/rbac-passwordsinglesignoncredentials-apis.md)]
2928

3029
## HTTP request
3130

api-reference/beta/api/serviceprincipal-getpasswordsinglesignoncredentials.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2424
<!-- { "blockType": "permissions", "name": "serviceprincipal_getpasswordsinglesignoncredentials" } -->
2525
[!INCLUDE [permissions-table](../includes/permissions/serviceprincipal-getpasswordsinglesignoncredentials-permissions.md)]
2626

27-
> [!NOTE]
28-
> Users can create credentials for themselves. Service principal owners and admins with the following roles can create credentials for any user or group: GlobalAdministrator, ApplicationAdministrator, CloudApplicationAdministrator. To learn more, see [Directory roles](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#available-roles).
27+
[!INCLUDE [rbac-passwordsinglesignoncredentials-apis](../includes/rbac-for-apis/rbac-passwordsinglesignoncredentials-apis.md)]
2928

3029
## HTTP request
3130

api-reference/beta/api/serviceprincipal-updatepasswordsinglesignoncredentials.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2424
<!-- { "blockType": "permissions", "name": "serviceprincipal_updatepasswordsinglesignoncredentials" } -->
2525
[!INCLUDE [permissions-table](../includes/permissions/serviceprincipal-updatepasswordsinglesignoncredentials-permissions.md)]
2626

27-
> [!NOTE]
28-
> Users can create credentials for themselves. Service principal owners and admins with the following roles can create credentials for any user or group: GlobalAdministrator, ApplicationAdministrator, CloudApplicationAdministrator. To learn more, see [Directory roles](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#available-roles).
27+
[!INCLUDE [rbac-passwordsinglesignoncredentials-apis](../includes/rbac-for-apis/rbac-passwordsinglesignoncredentials-apis.md)]
2928

3029
## HTTP request
3130

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
---
2+
author: psignoret
3+
ms.topic: include
4+
---
5+
6+
> [!IMPORTANT]
7+
>
8+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation:
9+
> - Users can create and manage credentials for themselves.
10+
> - Application Administrator
11+
> - Cloud Application Administrator

0 commit comments

Comments
 (0)