Skip to content

Commit c71d064

Browse files
authored
Merge pull request #25772 from microsoftgraph/permissions-reference/2024-11-25
2024-11-25: Automated permissions reference update
2 parents ec68b3b + 090e21c commit c71d064

File tree

1 file changed

+134
-1
lines changed

1 file changed

+134
-1
lines changed

concepts/permissions-reference.md

Lines changed: 134 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.localizationpriority: high
77
ms.topic: reference
88
ms.subservice: entra-applications
99
ms.custom: graphiamtop20, scenarios:getting-started
10-
ms.date: 11/18/2024
10+
ms.date: 11/25/2024
1111
#Customer intent: As a developer, I want to learn more about the permissions available in Microsoft Graph, so that I understand the impact of granting specific permissions to my app.
1212
---
1313

@@ -137,6 +137,17 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
137137

138138
---
139139

140+
### AiEnterpriseInteraction.Read
141+
142+
| Category | Application | Delegated |
143+
|--|--|--|
144+
| Identifier | - | 859cceb9-2ec2-4e48-bcd7-b8490b5248a5 |
145+
| DisplayText | - | Read user AI enterprise interactions. |
146+
| Description | - | Allows the app to read user AI enterprise interactions, on behalf of the signed-in user. |
147+
| AdminConsentRequired | - | No |
148+
149+
---
150+
140151
### AiEnterpriseInteraction.Read.All
141152

142153
| Category | Application | Delegated |
@@ -1373,6 +1384,28 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
13731384

13741385
---
13751386

1387+
### ConfigurationMonitoring.Read.All
1388+
1389+
| Category | Application | Delegated |
1390+
|--|--|--|
1391+
| Identifier | - | c645bb69-adc4-4242-b620-02e635f03bf6 |
1392+
| DisplayText | - | Read all Configuration Monitoring entities |
1393+
| Description | - | Allows the app to read all Configuration Monitoring entities on behalf of the signed-in user. |
1394+
| AdminConsentRequired | - | No |
1395+
1396+
---
1397+
1398+
### ConfigurationMonitoring.ReadWrite.All
1399+
1400+
| Category | Application | Delegated |
1401+
|--|--|--|
1402+
| Identifier | - | 54505ce9-e719-41f7-a7cc-dbe114e1d811 |
1403+
| DisplayText | - | Read and write all Configuration Monitoring entities |
1404+
| Description | - | Allows the app to read and write all Configuration Monitoring entities on behalf of the signed-in user. |
1405+
| AdminConsentRequired | - | No |
1406+
1407+
---
1408+
13761409
### ConsentRequest.Create
13771410

13781411
| Category | Application | Delegated |
@@ -1480,6 +1513,28 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
14801513

14811514
---
14821515

1516+
### CopilotSettings-LimitedMode.Read
1517+
1518+
| Category | Application | Delegated |
1519+
|--|--|--|
1520+
| Identifier | - | aeb2982d-632d-4155-b533-18756ab6fdd8 |
1521+
| DisplayText | - | Read organization-wide copilot limited mode setting |
1522+
| Description | - | Allows the app to read organization-wide copilot limited mode setting on behalf of the signed-in user. |
1523+
| AdminConsentRequired | - | Yes |
1524+
1525+
---
1526+
1527+
### CopilotSettings-LimitedMode.ReadWrite
1528+
1529+
| Category | Application | Delegated |
1530+
|--|--|--|
1531+
| Identifier | - | 4704e5b2-0ada-4aa0-b18c-00ad7525bc06 |
1532+
| DisplayText | - | Read and write organization-wide copilot limited mode setting |
1533+
| Description | - | Allows the app to read and write organization-wide copilot limited mode setting on behalf of the signed-in user. |
1534+
| AdminConsentRequired | - | Yes |
1535+
1536+
---
1537+
14831538
### CrossTenantInformation.ReadBasic.All
14841539

14851540
| Category | Application | Delegated |
@@ -2556,6 +2611,28 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
25562611

25572612
---
25582613

2614+
### FileIngestion.Ingest
2615+
2616+
| Category | Application | Delegated |
2617+
|--|--|--|
2618+
| Identifier | 65891b00-2fd9-4e33-be27-04a53132e3df | - |
2619+
| DisplayText | Ingest SharePoint and OneDrive content to make it available in the search index | - |
2620+
| Description | Allows the app to ingest SharePoint and OneDrive content to make it available in the search index, without a signed-in user. | - |
2621+
| AdminConsentRequired | Yes | - |
2622+
2623+
---
2624+
2625+
### FileIngestionHybridOnboarding.Manage
2626+
2627+
| Category | Application | Delegated |
2628+
|--|--|--|
2629+
| Identifier | 766c601b-c009-4438-8290-c8b05fa00c4b | - |
2630+
| DisplayText | Manage onboarding for a Hybrid Cloud tenant | - |
2631+
| Description | Allows the app to manage onboarding for a Hybrid Cloud tenant, without a signed-in user. | - |
2632+
| AdminConsentRequired | Yes | - |
2633+
2634+
---
2635+
25592636
### Files.Read
25602637

25612638
| Category | Application | Delegated |
@@ -2662,6 +2739,17 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
26622739

26632740
---
26642741

2742+
### FileStorageContainer.Manage.All
2743+
2744+
| Category | Application | Delegated |
2745+
|--|--|--|
2746+
| Identifier | - | 527b6d64-cdf5-4b8b-b336-4aa0b8ca2ce5 |
2747+
| DisplayText | - | Manage all file storage containers |
2748+
| Description | - | Allows the application to utilize the file storage container administration capabilities on behalf of an administrator user. |
2749+
| AdminConsentRequired | - | Yes |
2750+
2751+
---
2752+
26652753
### FileStorageContainer.Selected
26662754

26672755
| Category | Application | Delegated |
@@ -5311,6 +5399,17 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
53115399

53125400
---
53135401

5402+
### RoleManagement.Read.Defender
5403+
5404+
| Category | Application | Delegated |
5405+
|--|--|--|
5406+
| Identifier | 4d6e30d1-e64e-4ae7-bf9d-c706cc928cef | dd689728-6eb8-4deb-bd38-2924a935f3de |
5407+
| DisplayText | Read M365 Defender RBAC configuration | Read M365 Defender RBAC configuration |
5408+
| Description | Allows the app to read the role-based access control (RBAC) settings for your company's directory, without a signed-in user. | Allows the app to read the role-based access control (RBAC) settings for your company's directory, on behalf of the signed-in user. This includes reading M365 Defender role definitions and role assignments. |
5409+
| AdminConsentRequired | Yes | Yes |
5410+
5411+
---
5412+
53145413
### RoleManagement.Read.Directory
53155414

53165415
| Category | Application | Delegated |
@@ -5344,6 +5443,17 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
53445443

53455444
---
53465445

5446+
### RoleManagement.ReadWrite.Defender
5447+
5448+
| Category | Application | Delegated |
5449+
|--|--|--|
5450+
| Identifier | 8b7e8c0a-7e9d-4049-97ec-04b5e1bcaf05 | d8914f8f-9f64-4bd1-b4d3-f5a701ed8457 |
5451+
| DisplayText | Read M365 Defender RBAC configuration | Read M365 Defender RBAC configuration |
5452+
| Description | Allows the app to read the role-based access control (RBAC) settings for your company's directory, without a signed-in user. | Allows the app to read the role-based access control (RBAC) settings for your company's directory, on behalf of the signed-in user. This includes reading M365 Defender role definitions and role assignments. |
5453+
| AdminConsentRequired | Yes | Yes |
5454+
5455+
---
5456+
53475457
### RoleManagement.ReadWrite.Directory
53485458

53495459
| Category | Application | Delegated |
@@ -7304,6 +7414,28 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
73047414

73057415
---
73067416

7417+
### UserAuthMethod-Passkey.Read.All
7418+
7419+
| Category | Application | Delegated |
7420+
|--|--|--|
7421+
| Identifier | 72e00c1d-3e3d-43bb-a0b9-c435611bb1d2 | 14195339-1fe4-48a7-a0d3-a39eb9fd8958 |
7422+
| DisplayText | Read all users' passkey authentication methods | Read all users' passkey authentication methods |
7423+
| Description | Allows the app to read passkey authentication methods of all users in your organization, without a signed-in user. This does not allow the app to see secret information like passwords, or to sign-in or otherwise use the authentication methods. | Allows the app to read passkey authentication methods of all users in your organization that the signed-in user has access to. This does not allow the app to see secret information like passwords, or to sign-in or otherwise use the authentication methods. |
7424+
| AdminConsentRequired | Yes | Yes |
7425+
7426+
---
7427+
7428+
### UserAuthMethod-Passkey.ReadWrite.All
7429+
7430+
| Category | Application | Delegated |
7431+
|--|--|--|
7432+
| Identifier | 0400e371-7db1-4338-a269-96069eb65227 | 64930478-d0ea-4671-ad72-fe0d9821df09 |
7433+
| DisplayText | Read and write all users' passkey authentication methods | Read and write all users' passkey methods. |
7434+
| Description | Allows the application to read and write passkey authentication methods of all users in your organization, without a signed-in user. This does not allow the app to see secret information like passwords, or to sign-in or otherwise use the authentication methods | Allows the app to read and write passkey authentication methods of all users in your organization that the signed-in user has access to. This does not allow the app to see secret information like passwords, or to sign-in or otherwise use the authentication methods. |
7435+
| AdminConsentRequired | Yes | Yes |
7436+
7437+
---
7438+
73077439
### UserNotification.ReadWrite.CreatedByApp
73087440

73097441
| Category | Application | Delegated |
@@ -7510,6 +7642,7 @@ Learn more about [RSC authorization framework and RSC permissions](/microsofttea
75107642

75117643
| Name | ID | Display text | Description |
75127644
|--|--|--|--|
7645+
| AiEnterpriseInteraction.Read.User | 10d712aa-b4cd-4472-b0ba-6196e04c344f | Read user AI enterprise interactions. | Allows the app to read user AI enterprise interactions, without a signed-in user. |
75137646
| Calls.AccessMedia.Chat | e716890c-c30a-4ac3-a0e3-551e7d9e8deb | Access media streams in calls associated with this chat or meeting | Allows the app to access media streams in calls associated with this chat or meeting, without a signed-in user. |
75147647
| Calls.JoinGroupCalls.Chat | a01e73f1-94da-4f6d-9b73-02e4ea65560b | Join calls associated with this chat or meeting | Allows the app to join calls associated with this chat or meeting, without a signed-in user. |
75157648
| Channel.Create.Group | 65af85d7-62bb-4339-a206-7160fd427454 | Create channels in this team | Allows the app to create channels in this team, without a signed-in user. |

0 commit comments

Comments
 (0)