Skip to content

Commit 737e3c2

Browse files
authored
Merge pull request #25424 from microsoftgraph/rbac-oauth2permissionsgrants
Entra admin roles - oauth2permissionsgrants
2 parents f7c3240 + 5252466 commit 737e3c2

8 files changed

+87
-73
lines changed

api-reference/beta/includes/rbac-for-apis/rbac-oauth2permissiongrant-apis-read.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,14 @@ author: psignoret
33
ms.topic: include
44
---
55

6-
In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
7-
8-
- Application Administrator
9-
- Application Developer
10-
- Cloud Application Administrator
11-
- Directory Writers
12-
- Privileged Role Administrator
13-
- User Administrator
14-
- Directory Readers
15-
- Global Reader
6+
> [!IMPORTANT]
7+
>
8+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation:
9+
> - Global Reader
10+
> - Directory Readers
11+
> - Application Administrator
12+
> - Application Developer
13+
> - Cloud Application Administrator
14+
> - Directory Writers
15+
> - Privileged Role Administrator
16+
> - User Administrator

api-reference/beta/includes/rbac-for-apis/rbac-oauth2permissiongrant-apis-write.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,12 @@ author: psignoret
33
ms.topic: include
44
---
55

6-
In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
7-
8-
- Application Administrator
9-
- Application Developer
10-
- Cloud Application Administrator
11-
- Directory Writers
12-
- Privileged Role Administrator
13-
- User Administrator
6+
> [!IMPORTANT]
7+
>
8+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation:
9+
> - Application Administrator
10+
> - Application Developer
11+
> - Cloud Application Administrator
12+
> - Directory Writers
13+
> - Privileged Role Administrator
14+
> - User Administrator

api-reference/beta/includes/rbac-for-apis/rbac-oauth2permissiongrant-serviceprincipal-apis-read.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,15 @@ author: psignoret
33
ms.topic: include
44
---
55

6-
In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
7-
8-
- Application Administrator
9-
- Application Developer
10-
- Cloud Application Administrator
11-
- Directory Writers
12-
- Privileged Role Administrator
13-
- User Administrator
14-
- Directory Readers
15-
- Global Reader
16-
- Directory Synchronization Accounts - for Microsoft Entra Connect and Microsoft Entra Cloud Sync services
6+
> [!IMPORTANT]
7+
>
8+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation:
9+
> - Directory Readers
10+
> - Global Reader
11+
> - Application Developer
12+
> - Directory Writers
13+
> - Cloud Application Administrator
14+
> - Application Administrator
15+
> - Privileged Role Administrator
16+
> - User Administrator
17+
> - Directory Synchronization Accounts - for Microsoft Entra Connect and Microsoft Entra Cloud Sync services

api-reference/beta/includes/rbac-for-apis/rbac-oauth2permissiongrant-users-apis-read.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,16 @@ author: psignoret
33
ms.topic: include
44
---
55

6-
In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
6+
> [!IMPORTANT]
7+
>
8+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation:
9+
> - Guest Inviter
10+
> - Global Reader
11+
> - Directory Readers
12+
> - Application Developer
13+
> - Directory Writers
14+
> - Cloud Application Administrator
15+
> - Application Administrator
16+
> - Privileged Role Administrator
17+
> - User Administrator
718
8-
- Application Administrator
9-
- Application Developer
10-
- Cloud Application Administrator
11-
- Directory Writers
12-
- Privileged Role Administrator
13-
- User Administrator
14-
- Directory Readers
15-
- Global Reader
16-
- Guest Inviter

api-reference/v1.0/includes/rbac-for-apis/rbac-oauth2permissiongrant-apis-read.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,14 @@ author: psignoret
33
ms.topic: include
44
---
55

6-
In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
7-
8-
- Directory Readers
9-
- Global Reader
6+
> [!IMPORTANT]
7+
>
8+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation:
9+
> - Global Reader
10+
> - Directory Readers
11+
> - Application Administrator
12+
> - Application Developer
13+
> - Cloud Application Administrator
14+
> - Directory Writers
15+
> - User Administrator
16+
> - Privileged Role Administrator

api-reference/v1.0/includes/rbac-for-apis/rbac-oauth2permissiongrant-apis-write.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@ author: psignoret
33
ms.topic: include
44
---
55

6-
In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
7-
8-
- Application Administrator
9-
- Application Developer
10-
- Cloud Application Administrator
11-
- Directory Writers
12-
- Privileged Role Administrator
13-
- User Administrator
6+
> [!IMPORTANT]
7+
>
8+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation:
9+
> - Application Developer
10+
> - Cloud Application Administrator
11+
> - Directory Writers
12+
> - User Administrator
13+
> - Privileged Role Administrator

api-reference/v1.0/includes/rbac-for-apis/rbac-oauth2permissiongrant-serviceprincipal-apis-read.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,15 @@ author: psignoret
33
ms.topic: include
44
---
55

6-
In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
7-
8-
- Application Administrator
9-
- Application Developer
10-
- Cloud Application Administrator
11-
- Directory Writers
12-
- Privileged Role Administrator
13-
- User Administrator
14-
- Directory Readers
15-
- Global Reader
16-
- Directory Synchronization Accounts - for Microsoft Entra Connect and Microsoft Entra Cloud Sync services
6+
> [!IMPORTANT]
7+
>
8+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation:
9+
> - Directory Readers
10+
> - Global Reader
11+
> - Application Developer
12+
> - Directory Writers
13+
> - Cloud Application Administrator
14+
> - Application Administrator
15+
> - Privileged Role Administrator
16+
> - User Administrator
17+
> - Directory Synchronization Accounts - for Microsoft Entra Connect and Microsoft Entra Cloud Sync services

api-reference/v1.0/includes/rbac-for-apis/rbac-oauth2permissiongrant-users-apis-read.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,15 @@ author: psignoret
33
ms.topic: include
44
---
55

6-
In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
7-
8-
- Application Administrator
9-
- Application Developer
10-
- Cloud Application Administrator
11-
- Directory Writers
12-
- Privileged Role Administrator
13-
- User Administrator
14-
- Directory Readers
15-
- Global Reader
16-
- Guest Inviter
6+
> [!IMPORTANT]
7+
>
8+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation:
9+
> - Guest Inviter
10+
> - Global Reader
11+
> - Directory Readers
12+
> - Application Developer
13+
> - Directory Writers
14+
> - Cloud Application Administrator
15+
> - Application Administrator
16+
> - Privileged Role Administrator
17+
> - User Administrator

0 commit comments

Comments
 (0)