Skip to content

Commit 67b40e4

Browse files
authored
Merge pull request #25700 from msewaweru/authopolicy-roles
Entra roles - Authorization Policy APIs
2 parents 5df3b0c + 5e94034 commit 67b40e4

8 files changed

+50
-2
lines changed

api-reference/beta/api/authorizationpolicy-get.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2525
<!-- { "blockType": "permissions", "name": "authorizationpolicy_get" } -->
2626
[!INCLUDE [permissions-table](../includes/permissions/authorizationpolicy-get-permissions.md)]
2727

28+
[!INCLUDE [rbac-authorization-policy-apis-read](../includes/rbac-for-apis/rbac-authorization-policy-apis-read.md)]
29+
2830
## HTTP request
2931

3032
<!-- { "blockType": "ignored" } -->

api-reference/beta/api/authorizationpolicy-update.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2525
<!-- { "blockType": "permissions", "name": "authorizationpolicy_update" } -->
2626
[!INCLUDE [permissions-table](../includes/permissions/authorizationpolicy-update-permissions.md)]
2727

28-
For delegated scenarios, the user needs to have the *Privileged Role Administrator* [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json).
28+
[!INCLUDE [rbac-authorization-policy-apis-update](../includes/rbac-for-apis/rbac-authorization-policy-apis-update.md)]
2929

3030
## HTTP request
3131

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
author: msewaweru
3+
ms.topic: include
4+
---
5+
6+
> [!IMPORTANT]
7+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
8+
> - Global Reader
9+
> - Security Reader
10+
> - Security Operator
11+
> - Security Administrator
12+
> - Cloud Device Administrator
13+
> - License Administrator
14+
> - Privileged Role Administrator
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
---
2+
author: msewaweru
3+
ms.topic: include
4+
---
5+
6+
> [!IMPORTANT]
7+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged role is supported for this operation.
8+
> - Privileged Role Administrator

api-reference/v1.0/api/authorizationpolicy-get.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2323
<!-- { "blockType": "permissions", "name": "authorizationpolicy_get" } -->
2424
[!INCLUDE [permissions-table](../includes/permissions/authorizationpolicy-get-permissions.md)]
2525

26+
[!INCLUDE [rbac-authorization-policy-apis-read](../includes/rbac-for-apis/rbac-authorization-policy-apis-read.md)]
27+
2628
## HTTP request
2729

2830
<!-- { "blockType": "ignored" } -->

api-reference/v1.0/api/authorizationpolicy-update.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2323
<!-- { "blockType": "permissions", "name": "authorizationpolicy_update" } -->
2424
[!INCLUDE [permissions-table](../includes/permissions/authorizationpolicy-update-permissions.md)]
2525

26-
For delegated scenarios, the user needs to have the *Privileged Role Administrator* [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json).
26+
[!INCLUDE [rbac-authorization-policy-apis-update](../includes/rbac-for-apis/rbac-authorization-policy-apis-update.md)]
2727

2828
## HTTP request
2929

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
author: msewaweru
3+
ms.topic: include
4+
---
5+
6+
> [!IMPORTANT]
7+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
8+
> - Global Reader
9+
> - Security Reader
10+
> - Security Operator
11+
> - Security Administrator
12+
> - Cloud Device Administrator
13+
> - License Administrator
14+
> - Privileged Role Administrator
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
---
2+
author: msewaweru
3+
ms.topic: include
4+
---
5+
6+
> [!IMPORTANT]
7+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged role is supported for this operation.
8+
> - Privileged Role Administrator

0 commit comments

Comments
 (0)