You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The following table shows the least privileged permission or permissions required to call this API on each supported resource type. Follow [best practices](/graph/permissions-overview#best-practices-for-using-microsoft-graph-permissions) to request least privileged permissions. For details about delegated and application permissions, see [Permission types](/graph/permissions-overview#permission-types). To learn more about these permissions, see the [permissions reference](/graph/permissions-reference).
61
22
62
23
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
@@ -69,6 +30,18 @@ The following table shows the least privileged permission or permissions require
Copy file name to clipboardExpand all lines: api-reference/beta/includes/rbac-for-apis/rbac-approleassignments-apis-read.md
+14-12Lines changed: 14 additions & 12 deletions
Original file line number
Diff line number
Diff line change
@@ -3,15 +3,17 @@ author: psignoret
3
3
ms.topic: include
4
4
---
5
5
6
-
In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
7
-
8
-
- Directory Readers
9
-
- Guest Inviter - Read app role assignments for users only
10
-
- Directory Synchronization Accounts - for Microsoft Entra Connect and Microsoft Entra Cloud Sync services
11
-
- Directory Writer
12
-
- Hybrid Identity Administrator
13
-
- Identity Governance Administrator
14
-
- Privileged Role Administrator
15
-
- User Administrator
16
-
- Application Administrator
17
-
- Cloud Application Administrator
6
+
> [!IMPORTANT]
7
+
>
8
+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation:
9
+
>
10
+
> - Guest Inviter - Read app role assignments for users only
11
+
> - Directory Readers
12
+
> - Directory Synchronization Accounts - for Microsoft Entra Connect and Microsoft Entra Cloud Sync services
0 commit comments