Skip to content

Commit 770b6b8

Browse files
authored
Merge pull request #25613 from microsoftgraph/directoryPermissions
Update notes for directory permissions
2 parents cf808f3 + 8019257 commit 770b6b8

File tree

3 files changed

+10
-38
lines changed

3 files changed

+10
-38
lines changed

includes/permissions-notes/directory.accessasuser.all.md

Lines changed: 2 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -5,34 +5,6 @@ ms.localizationpriority: high
55
<!-- markdownlint-disable MD002 MD041 -->
66

77
> [!CAUTION]
8-
> Directory permissions provide the highest level of privilege for accessing directory resources such as [user](/graph/api/resources/user), [group](/graph/api/resources/group), and [device](/graph/api/resources/device) in an organization.
8+
> Directory permissions grant broad access to directory (Microsoft Entra ID) resources such as [user](/graph/api/resources/user), [group](/graph/api/resources/group), and [device](/graph/api/resources/device) in an organization. Whenever possible, choose permissions specific to these resources and avoid using directory permissions.
99
>
10-
> They also exclusively control access to other directory resources like [organizational contacts](/graph/api/resources/orgcontact) and [schema extensions](/graph/api/resources/schemaextension), as well as many directory resources including administrative units, directory roles, directory settings, and policies.
11-
12-
<!--
13-
14-
This section doesn't look correct; for example, you can create aapps using Directory.ReadWrite.All; Maybe it's out of date?
15-
16-
17-
The _Directory.ReadWrite.All_ permission grants the following privileges:
18-
19-
- Full read of all directory resources (both declared properties and navigation properties)
20-
- Create and update users
21-
- Disable and enable users (but not Company Administrator)
22-
- Set user alternative security ID (but not administrators)
23-
- Create and update groups
24-
- Manage group memberships
25-
- Update group owner
26-
- Manage license assignments
27-
- Define schema extensions on applications
28-
- Manage directory settings
29-
- Manage admin consent workflow configuration (but not whether admin consent is required or who is authorized to grant admin consent)
30-
31-
And **doesn't grant* the following privileges:
32-
33-
- To reset user passwords.
34-
- Updating another user's **businessPhones**, **mobilePhone**, or **otherMails** property is only allowed on users who are non-administrators or assigned one of the following roles: Directory Readers, Guest Inviter, Message Center Reader and Reports Reader. For more details, see Helpdesk (Password) Administrator in [Azure AD available roles](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#available-roles). This is the case for apps granted either the User.ReadWrite.All or Directory.ReadWrite.All delegated or application permissions.
35-
- Deleting resources (including users or groups).
36-
- Specifically excludes create or update for resources not listed above. This includes: application, oAuth2PermissionGrant, appRoleAssignment, device, servicePrincipal, organization, domains, and so on.
37-
38-
-->
10+
> Directory permissions might be deprecated in the future.

includes/permissions-notes/directory.read.all.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@ ms.localizationpriority: high
55
<!-- markdownlint-disable MD002 MD041 -->
66

77
> [!CAUTION]
8-
> Directory permissions provide the highest level of privilege for accessing directory resources such as [user](/graph/api/resources/user), [group](/graph/api/resources/group), and [device](/graph/api/resources/device) in an organization.
9-
>
10-
> They also exclusively control access to other directory resources like: [organizational contacts](/graph/api/resources/orgcontact?view=graph-rest-beta&preserve-view=true) and [schema extensions](/graph/api/resources/schemaextension?view=graph-rest-beta&preserve-view=true), as well as many directory resources including administrative units, directory roles, directory settings, and policies.
8+
> Directory permissions grant broad access to directory (Microsoft Entra ID) resources such as [user](/graph/api/resources/user), [group](/graph/api/resources/group), and [device](/graph/api/resources/device) in an organization. Whenever possible, choose permissions specific to these resources and avoid using directory permissions.
9+
>
10+
> Directory permissions might be deprecated in the future.
1111
12-
Before December 3rd, 2020, when the application permission *Directory.Read.All* was granted, the [Directory Readers](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#directory-readers-permissions) directory role was also assigned to the app's service principal. This directory role isn't removed automatically when the associated application permissions are revoked. To remove an application's access to read or write to the directory, customers must also remove any directory roles that were granted to the application.
12+
Before December 3rd, 2020, when the application permission *Directory.Read.All* was granted, the [Directory Readers](/entra/identity/role-based-access-control/permissions-reference#directory-writers) directory role was also assigned to the app's service principal. This directory role isn't removed automatically when the associated application permissions are revoked. To remove an application's access to read or write to the directory, customers must also remove any directory roles that were granted to the application.
1313

1414
A service update disabling this behavior began rolling out on December 3rd, 2020. Deployment to all customers completed on January 11th, 2021. Directory roles are no longer automatically assigned when application permissions are granted.

includes/permissions-notes/directory.readwrite.all.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,11 @@ ms.localizationpriority: high
44

55
<!-- markdownlint-disable MD002 MD041 -->
66

7-
*Directory permissions are **not recommended** for use and might be deprecated in the future.*
8-
97
> [!CAUTION]
10-
> Directory.ReadWrite.All grants access that is broadly equivalent to a global tenant admin. Apps that are granted Directory.ReadWrite.All can manage the full range of directory resources, and they can manage authorization for *other* apps and users to access resources across the organization. This includes directory resources like [users](/graph/api/resources/user), [groups](/graph/api/resources/group), [applications](/graph/api/resources/application), and [devices](/graph/api/resources/device), and nondirectory resources in Exchange, SharePoint, Teams, and other services.
8+
> Directory permissions grant broad access to directory (Microsoft Entra ID) resources such as [user](/graph/api/resources/user), [group](/graph/api/resources/group), and [device](/graph/api/resources/device) in an organization. Whenever possible, choose permissions specific to these resources and avoid using directory permissions.
9+
>
10+
> Directory permissions might be deprecated in the future.
1111
12-
Before December 3rd, 2020, when the application permission *Directory.ReadWrite.All* was granted, the [Directory Writers](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#directory-writers-permissions) directory role was also assigned. This directory role isn't removed automatically when the associated application permissions are revoked. To remove an application's access to read or write to the directory, customers must also remove any directory roles that were granted to the application.
12+
Before December 3rd, 2020, when the application permission *Directory.ReadWrite.All* was granted, the [Directory Writers](/entra/identity/role-based-access-control/permissions-reference#directory-writers) directory role was also assigned. This directory role isn't removed automatically when the associated application permissions are revoked. To remove an application's access to read or write to the directory, customers must also remove any directory roles that were granted to the application.
1313

1414
A service update disabling this behavior began rolling out on December 3rd, 2020. Deployment to all customers completed on January 11, 2021. Directory roles are no longer automatically assigned when application permissions are granted.

0 commit comments

Comments
 (0)