Skip to content

Conversation

@JovitaPaul
Copy link

@JovitaPaul JovitaPaul commented Oct 26, 2025

##Added minimal permissions for 'entra app role' commands
fixes: #6925

Permissions Verification

Added Permissions section to:

  • m365 entra app role list
  • m365 entra app role add
  • m365 entra app role remove

Verification Process:

  1. Ran commands through Dev Proxy to identify API endpoints
  2. Verified permissions against official Microsoft Graph documentation:

API Calls Identified:

  • GET /v1.0/applications?$filter=... - requires Application.Read.All
  • GET /v1.0/applications/{id}/appRoles - requires Application.Read.All
  • PATCH /v1.0/applications/{id} - requires Application.ReadWrite.All (delegated) or Application.ReadWrite.OwnedBy (application)

Note: Dev Proxy showed warnings for /myorganization/applications alias paths, but these map to standard /applications endpoints per Microsoft Graph documentation.

@milanholemans
Copy link
Contributor

@JovitaPaul, why did you perform all these changes for the entra app remove command? It's not part of the issue and the changes you've made definitely don't address the issue.
If you are using AI, please double-check if the changes made by the AI are correct before submitting a PR.

@milanholemans milanholemans marked this pull request as draft October 26, 2025 15:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Minimal permissions for 'entra app role' commands

2 participants