Skip to content

Commit d84ccc8

Browse files
authored
Merge pull request #25614 from microsoftgraph/rbac-reports
Entra admin roles - sign ins
2 parents 770b6b8 + d864d06 commit d84ccc8

File tree

10 files changed

+51
-41
lines changed

10 files changed

+51
-41
lines changed

api-reference/beta/api/signin-confirmcompromised.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Namespace: microsoft.graph
1212

1313
[!INCLUDE [beta-disclaimer](../../includes/beta-disclaimer.md)]
1414

15-
Allow admins to mark an event in the Microsoft Entra sign-in logs as risky. Events marked as risky by an admin are immediately flagged as high risk in Microsoft Entra ID Protection, overriding previous risk states. Admins can confirm that events flagged as risky by Microsoft Entra ID Protection are in fact risky.
15+
Allow admins to mark an event in the Microsoft Entra [sign-in](../resources/signin.md) logs as risky. Events marked as risky by an admin are immediately flagged as high risk in Microsoft Entra ID Protection, overriding previous risk states. Admins can confirm that events flagged as risky by Microsoft Entra ID Protection are in fact risky.
1616

1717
For details about investigating Identity Protection risks, see [How to investigate risk](/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk).
1818

@@ -24,6 +24,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2424
<!-- { "blockType": "permissions", "name": "signin_confirmcompromised" } -->
2525
[!INCLUDE [permissions-table](../includes/permissions/signin-confirmcompromised-permissions.md)]
2626

27+
[!INCLUDE [rbac-signin-apis-write](../includes/rbac-for-apis/rbac-signin-apis-write.md)]
28+
2729
## HTTP request
2830

2931
<!-- {

api-reference/beta/api/signin-confirmsafe.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Namespace: microsoft.graph
1212

1313
[!INCLUDE [beta-disclaimer](../../includes/beta-disclaimer.md)]
1414

15-
Allow admins to mark an event in Microsoft Entra sign-in logs as safe. Admins can either mark the events flagged as risky by Microsoft Entra ID Protection as safe, or they can mark unflagged events as safe. For details about investigating Identity Protection risks, see [How to investigate risk](/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk).
15+
Allow admins to mark an event in Microsoft Entra [sign-in](../resources/signin.md) logs as safe. Admins can either mark the events flagged as risky by Microsoft Entra ID Protection as safe, or they can mark unflagged events as safe. For details about investigating Identity Protection risks, see [How to investigate risk](/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk).
1616

1717
[!INCLUDE [national-cloud-support](../../includes/global-us.md)]
1818

@@ -22,6 +22,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2222
<!-- { "blockType": "permissions", "name": "signin_confirmsafe" } -->
2323
[!INCLUDE [permissions-table](../includes/permissions/signin-confirmsafe-permissions.md)]
2424

25+
[!INCLUDE [rbac-signin-apis-write](../includes/rbac-for-apis/rbac-signin-apis-write.md)]
26+
2527
## HTTP request
2628

2729
<!-- {

api-reference/beta/api/signin-get.md

Lines changed: 2 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Namespace: microsoft.graph
1313

1414
[!INCLUDE [beta-disclaimer](../../includes/beta-disclaimer.md)]
1515

16-
Get a [signIn](../resources/signin.md) object that contains a specific user sign-in event for your tenant that includes sign-ins where a user is asked to enter a username or password, and session tokens.
16+
Retrieve a specific Microsoft Entra user [sign-in](../resources/signin.md) event for your tenant. Sign-ins that are interactive in nature (where a username/password is passed as part of auth token) and successful federated sign-ins are currently included in the sign-in logs.
1717

1818
[!INCLUDE [GDPR-related-guidance](../../includes/gdpr-msgraph-export-note.md)]
1919

@@ -26,15 +26,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2626
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
2727
[!INCLUDE [permissions-table](../includes/permissions/signin-get-permissions.md)]
2828

29-
Apps must be [properly registered](/azure/active-directory/active-directory-reporting-api-prerequisites-azure-portal) to Microsoft Entra ID.
30-
31-
In addition to the delegated permissions, the signed-in user needs to belong to at least one of the following [Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) that allow them to read sign-in reports.
32-
33-
+ Global Reader
34-
+ Reports Reader
35-
+ Security Administrator
36-
+ Security Operator
37-
+ Security Reader
29+
[!INCLUDE [rbac-signin-apis-read](../includes/rbac-for-apis/rbac-signin-apis-read.md)]
3830

3931
[!INCLUDE [signins-roles-for-ca-data](../../includes/signins-roles-for-ca-data.md)]
4032

api-reference/beta/api/signin-list.md

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -29,15 +29,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2929
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
3030
[!INCLUDE [permissions-table](../includes/permissions/signin-list-permissions.md)]
3131

32-
Apps must be [properly registered](/azure/active-directory/active-directory-reporting-api-prerequisites-azure-portal) to Microsoft Entra ID.
33-
34-
In addition to the delegated permissions, the signed-in user needs to belong to at least one of the following [Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) that allow them to read sign-in reports.
35-
36-
+ Global Reader
37-
+ Reports Reader
38-
+ Security Administrator
39-
+ Security Operator
40-
+ Security Reader
32+
[!INCLUDE [rbac-signin-apis-read](../includes/rbac-for-apis/rbac-signin-apis-read.md)]
4133

4234
### Viewing applied conditional access (CA) policies in sign-ins
4335

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
---
2+
author: egreenberg14
3+
ms.topic: include
4+
---
5+
6+
> [!IMPORTANT]
7+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation:
8+
> - Global Reader
9+
> - Reports Reader
10+
> - Security Administrator
11+
> - Security Operator
12+
> - Security Reader
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
---
2+
author: egreenberg14
3+
ms.topic: include
4+
---
5+
6+
> [!IMPORTANT]
7+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. *Security Administrator* is the least privileged role supported for this operation.

api-reference/v1.0/api/signin-get.md

Lines changed: 2 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ doc_type: apiPageType
1111

1212
Namespace: microsoft.graph
1313

14-
Retrieve a specific Microsoft Entra user sign-in event for your tenant. Sign-ins that are interactive in nature (where a username/password is passed as part of auth token) and successful federated sign-ins are currently included in the sign-in logs.
14+
Retrieve a specific Microsoft Entra user [sign-in](../resources/signin.md) event for your tenant. Sign-ins that are interactive in nature (where a username/password is passed as part of auth token) and successful federated sign-ins are currently included in the sign-in logs.
1515

1616
[!INCLUDE [GDPR-related-guidance](../../includes/gdpr-msgraph-export-note.md)]
1717

@@ -25,15 +25,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2525
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
2626
[!INCLUDE [permissions-table](../includes/permissions/signin-get-permissions.md)]
2727

28-
Apps must be [properly registered](/azure/active-directory/active-directory-reporting-api-prerequisites-azure-portal) to Microsoft Entra ID.
29-
30-
In addition to the delegated permissions, the signed-in user needs to belong to at least one of the following [Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference):
31-
32-
+ Global Reader
33-
+ Reports Reader
34-
+ Security Administrator
35-
+ Security Operator
36-
+ Security Reader
28+
[!INCLUDE [rbac-signin-apis-read](../includes/rbac-for-apis/rbac-signin-apis-read.md)]
3729

3830
[!INCLUDE [signins-roles-for-ca-data](../../includes/signins-roles-for-ca-data.md)]
3931

api-reference/v1.0/api/signin-list.md

Lines changed: 2 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ doc_type: apiPageType
1111

1212
Namespace: microsoft.graph
1313

14-
Retrieve the Microsoft Entra user sign-ins for your tenant. Sign-ins that are interactive in nature (where a username/password is passed as part of auth token) and successful federated sign-ins are currently included in the sign-in logs.
14+
Retrieve the Microsoft Entra user [sign-ins](../resources/signin.md) for your tenant. Sign-ins that are interactive in nature (where a username/password is passed as part of auth token) and successful federated sign-ins are currently included in the sign-in logs.
1515

1616
The maximum and default page size is 1,000 objects and by default, the most recent sign-ins are returned first. Only sign-in events that occurred within the Microsoft Entra ID [default retention period](/azure/active-directory/reports-monitoring/reference-reports-data-retention#how-long-does-azure-ad-store-the-data) are available.
1717

@@ -27,15 +27,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2727
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
2828
[!INCLUDE [permissions-table](../includes/permissions/signin-list-permissions.md)]
2929

30-
Apps must be [properly registered](/azure/active-directory/active-directory-reporting-api-prerequisites-azure-portal) to Microsoft Entra ID.
31-
32-
In addition to the delegated permissions, the signed-in user needs to belong to at least one of the following [Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json):
33-
34-
+ Global Reader
35-
+ Reports Reader
36-
+ Security Administrator
37-
+ Security Operator
38-
+ Security Reader
30+
[!INCLUDE [rbac-signin-apis-read](../includes/rbac-for-apis/rbac-signin-apis-read.md)]
3931

4032
### Viewing applied conditional access (CA) policies in sign-ins
4133

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
---
2+
author: egreenberg14
3+
ms.topic: include
4+
---
5+
6+
> [!IMPORTANT]
7+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation:
8+
> - Global Reader
9+
> - Reports Reader
10+
> - Security Administrator
11+
> - Security Operator
12+
> - Security Reader
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
---
2+
author: egreenberg14
3+
ms.topic: include
4+
---
5+
6+
> [!IMPORTANT]
7+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. *Security Administrator* is the least privileged role supported for this operation.

0 commit comments

Comments
 (0)