Skip to content

Commit ef92e00

Browse files
authored
Merge pull request #25640 from microsoftgraph/rbac-directoryAudits
Entra admin roles - directory audit/audit logs
2 parents f9e90c3 + bcdeb86 commit ef92e00

File tree

6 files changed

+26
-2
lines changed

6 files changed

+26
-2
lines changed

api-reference/beta/api/directoryaudit-get.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2424
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
2525
[!INCLUDE [permissions-table](../includes/permissions/directoryaudit-get-permissions.md)]
2626

27-
In addition, apps must be [properly registered](/azure/active-directory/active-directory-reporting-api-prerequisites-azure-portal) to Microsoft Entra ID.
27+
[!INCLUDE [rbac-directoryaudit-apis](../includes/rbac-for-apis/rbac-directoryaudit-apis.md)]
2828

2929
## HTTP request
3030

api-reference/beta/api/directoryaudit-list.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2424
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
2525
[!INCLUDE [permissions-table](../includes/permissions/directoryaudit-list-permissions.md)]
2626

27-
In addition, apps must be [properly registered](/azure/active-directory/active-directory-reporting-api-prerequisites-azure-portal) to Microsoft Entra ID.
27+
[!INCLUDE [rbac-directoryaudit-apis](../includes/rbac-for-apis/rbac-directoryaudit-apis.md)]
2828

2929
## HTTP request
3030

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
---
2+
author: egreenberg14
3+
ms.topic: include
4+
---
5+
6+
> [!IMPORTANT]
7+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation:
8+
> - Reports Reader
9+
> - Security Administrator
10+
> - Security Reader

api-reference/v1.0/api/directoryaudit-get.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2222
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
2323
[!INCLUDE [permissions-table](../includes/permissions/directoryaudit-get-permissions.md)]
2424

25+
[!INCLUDE [rbac-directoryaudit-apis](../includes/rbac-for-apis/rbac-directoryaudit-apis.md)]
26+
2527
## HTTP request
2628

2729
<!-- { "blockType": "ignored" } -->

api-reference/v1.0/api/directoryaudit-list.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2222
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
2323
[!INCLUDE [permissions-table](../includes/permissions/directoryaudit-list-permissions.md)]
2424

25+
[!INCLUDE [rbac-directoryaudit-apis](../includes/rbac-for-apis/rbac-directoryaudit-apis.md)]
26+
2527
## HTTP request
2628

2729
<!-- { "blockType": "ignored" } -->
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
---
2+
author: egreenberg14
3+
ms.topic: include
4+
---
5+
6+
> [!IMPORTANT]
7+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation:
8+
> - Reports Reader
9+
> - Security Administrator
10+
> - Security Reader

0 commit comments

Comments
 (0)