Skip to content

Commit 9a5000c

Browse files
authored
Update directory.read.all.md
Change link to Entra admin roles
1 parent 246431c commit 9a5000c

File tree

1 file changed

+4
-5
lines changed

1 file changed

+4
-5
lines changed

includes/permissions-notes/directory.read.all.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,10 @@ ms.localizationpriority: high
44

55
<!-- markdownlint-disable MD002 MD041 -->
66

7-
> [!CAUTION]
8-
> Directory permissions provide the highest level of privilege for accessing directory resources such as [user](/graph/api/resources/user), [group](/graph/api/resources/group), and [device](/graph/api/resources/device) in an organization.
9-
>
10-
> They also exclusively control access to other directory resources like: [organizational contacts](/graph/api/resources/orgcontact?view=graph-rest-beta&preserve-view=true) and [schema extensions](/graph/api/resources/schemaextension?view=graph-rest-beta&preserve-view=true), as well as many directory resources including administrative units, directory roles, directory settings, and policies.
7+
> Directory permissions grant broad access to directory (Microsoft Entra ID) resources such as [user](/graph/api/resources/user), [group](/graph/api/resources/group), and [device](/graph/api/resources/device) in an organization. Whenever possible, choose permissions specific to these resources and avoid using directory permissions.
8+
>
9+
> Directory permissions might be deprecated in the future.
1110
12-
Before December 3rd, 2020, when the application permission *Directory.Read.All* was granted, the [Directory Readers](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#directory-readers-permissions) directory role was also assigned to the app's service principal. This directory role isn't removed automatically when the associated application permissions are revoked. To remove an application's access to read or write to the directory, customers must also remove any directory roles that were granted to the application.
11+
Before December 3rd, 2020, when the application permission *Directory.Read.All* was granted, the [Directory Readers](/entra/identity/role-based-access-control/permissions-reference#directory-writers) directory role was also assigned to the app's service principal. This directory role isn't removed automatically when the associated application permissions are revoked. To remove an application's access to read or write to the directory, customers must also remove any directory roles that were granted to the application.
1312

1413
A service update disabling this behavior began rolling out on December 3rd, 2020. Deployment to all customers completed on January 11th, 2021. Directory roles are no longer automatically assigned when application permissions are granted.

0 commit comments

Comments
 (0)