You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: includes/permissions-notes/directory.accessasuser.all.md
+2-30Lines changed: 2 additions & 30 deletions
Original file line number
Diff line number
Diff line change
@@ -5,34 +5,6 @@ ms.localizationpriority: high
5
5
<!-- markdownlint-disable MD002 MD041 -->
6
6
7
7
> [!CAUTION]
8
-
> Directory permissions provide the highest level of privilege for accessing directory resources such as [user](/graph/api/resources/user), [group](/graph/api/resources/group), and [device](/graph/api/resources/device) in an organization.
8
+
> Directory permissions grant broad access to directory (Microsoft Entra ID) resources such as [user](/graph/api/resources/user), [group](/graph/api/resources/group), and [device](/graph/api/resources/device) in an organization. Whenever possible, choose permissions specific to these resources and avoid using directory permissions.
9
9
>
10
-
> They also exclusively control access to other directory resources like [organizational contacts](/graph/api/resources/orgcontact) and [schema extensions](/graph/api/resources/schemaextension), as well as many directory resources including administrative units, directory roles, directory settings, and policies.
11
-
12
-
<!--
13
-
14
-
This section doesn't look correct; for example, you can create aapps using Directory.ReadWrite.All; Maybe it's out of date?
15
-
16
-
17
-
The _Directory.ReadWrite.All_ permission grants the following privileges:
18
-
19
-
- Full read of all directory resources (both declared properties and navigation properties)
20
-
- Create and update users
21
-
- Disable and enable users (but not Company Administrator)
22
-
- Set user alternative security ID (but not administrators)
23
-
- Create and update groups
24
-
- Manage group memberships
25
-
- Update group owner
26
-
- Manage license assignments
27
-
- Define schema extensions on applications
28
-
- Manage directory settings
29
-
- Manage admin consent workflow configuration (but not whether admin consent is required or who is authorized to grant admin consent)
30
-
31
-
And **doesn't grant* the following privileges:
32
-
33
-
- To reset user passwords.
34
-
- Updating another user's **businessPhones**, **mobilePhone**, or **otherMails** property is only allowed on users who are non-administrators or assigned one of the following roles: Directory Readers, Guest Inviter, Message Center Reader and Reports Reader. For more details, see Helpdesk (Password) Administrator in [Azure AD available roles](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#available-roles). This is the case for apps granted either the User.ReadWrite.All or Directory.ReadWrite.All delegated or application permissions.
35
-
- Deleting resources (including users or groups).
36
-
- Specifically excludes create or update for resources not listed above. This includes: application, oAuth2PermissionGrant, appRoleAssignment, device, servicePrincipal, organization, domains, and so on.
37
-
38
-
-->
10
+
> Directory permissions might be deprecated in the future.
Copy file name to clipboardExpand all lines: includes/permissions-notes/directory.read.all.md
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -5,10 +5,10 @@ ms.localizationpriority: high
5
5
<!-- markdownlint-disable MD002 MD041 -->
6
6
7
7
> [!CAUTION]
8
-
> Directory permissions provide the highest level of privilege for accessing directory resources such as [user](/graph/api/resources/user), [group](/graph/api/resources/group), and [device](/graph/api/resources/device) in an organization.
9
-
>
10
-
> They also exclusively control access to other directory resources like: [organizational contacts](/graph/api/resources/orgcontact?view=graph-rest-beta&preserve-view=true) and [schema extensions](/graph/api/resources/schemaextension?view=graph-rest-beta&preserve-view=true), as well as many directory resources including administrative units, directory roles, directory settings, and policies.
8
+
> Directory permissions grant broad access to directory (Microsoft Entra ID) resources such as [user](/graph/api/resources/user), [group](/graph/api/resources/group), and [device](/graph/api/resources/device) in an organization. Whenever possible, choose permissions specific to these resources and avoid using directory permissions.
9
+
>
10
+
> Directory permissions might be deprecated in the future.
11
11
12
-
Before December 3rd, 2020, when the application permission *Directory.Read.All* was granted, the [Directory Readers](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#directory-readers-permissions) directory role was also assigned to the app's service principal. This directory role isn't removed automatically when the associated application permissions are revoked. To remove an application's access to read or write to the directory, customers must also remove any directory roles that were granted to the application.
12
+
Before December 3rd, 2020, when the application permission *Directory.Read.All* was granted, the [Directory Readers](/entra/identity/role-based-access-control/permissions-reference#directory-writers) directory role was also assigned to the app's service principal. This directory role isn't removed automatically when the associated application permissions are revoked. To remove an application's access to read or write to the directory, customers must also remove any directory roles that were granted to the application.
13
13
14
14
A service update disabling this behavior began rolling out on December 3rd, 2020. Deployment to all customers completed on January 11th, 2021. Directory roles are no longer automatically assigned when application permissions are granted.
Copy file name to clipboardExpand all lines: includes/permissions-notes/directory.readwrite.all.md
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -4,11 +4,11 @@ ms.localizationpriority: high
4
4
5
5
<!-- markdownlint-disable MD002 MD041 -->
6
6
7
-
*Directory permissions are **not recommended** for use and might be deprecated in the future.*
8
-
9
7
> [!CAUTION]
10
-
> Directory.ReadWrite.All grants access that is broadly equivalent to a global tenant admin. Apps that are granted Directory.ReadWrite.All can manage the full range of directory resources, and they can manage authorization for *other* apps and users to access resources across the organization. This includes directory resources like [users](/graph/api/resources/user), [groups](/graph/api/resources/group), [applications](/graph/api/resources/application), and [devices](/graph/api/resources/device), and nondirectory resources in Exchange, SharePoint, Teams, and other services.
8
+
> Directory permissions grant broad access to directory (Microsoft Entra ID) resources such as [user](/graph/api/resources/user), [group](/graph/api/resources/group), and [device](/graph/api/resources/device) in an organization. Whenever possible, choose permissions specific to these resources and avoid using directory permissions.
9
+
>
10
+
> Directory permissions might be deprecated in the future.
11
11
12
-
Before December 3rd, 2020, when the application permission *Directory.ReadWrite.All* was granted, the [Directory Writers](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#directory-writers-permissions) directory role was also assigned. This directory role isn't removed automatically when the associated application permissions are revoked. To remove an application's access to read or write to the directory, customers must also remove any directory roles that were granted to the application.
12
+
Before December 3rd, 2020, when the application permission *Directory.ReadWrite.All* was granted, the [Directory Writers](/entra/identity/role-based-access-control/permissions-reference#directory-writers) directory role was also assigned. This directory role isn't removed automatically when the associated application permissions are revoked. To remove an application's access to read or write to the directory, customers must also remove any directory roles that were granted to the application.
13
13
14
14
A service update disabling this behavior began rolling out on December 3rd, 2020. Deployment to all customers completed on January 11, 2021. Directory roles are no longer automatically assigned when application permissions are granted.
0 commit comments