|
3491 | 3491 | "privilegeLevel": 3 |
3492 | 3492 | }, |
3493 | 3493 | "Application": { |
3494 | | - "adminDisplayName": "", |
3495 | | - "adminDescription": "", |
| 3494 | + "adminDisplayName": "Read the trusted certificate authority configuration for applications", |
| 3495 | + "adminDescription": "Allows the app to read the trusted certificate authority configuration which can be used to restrict application certificates based on their issuing authority, without a signed-in user.", |
3496 | 3496 | "requiresAdminConsent": true, |
3497 | 3497 | "privilegeLevel": 4 |
3498 | 3498 | } |
|
3504 | 3504 | "Application" |
3505 | 3505 | ], |
3506 | 3506 | "methods": [ |
3507 | | - "PATCH" |
3508 | | - ], |
3509 | | - "paths": { |
3510 | | - "/certificateauthoritypath/certificatebasedapplicationconfigurations/{id}": "least=DelegatedWork,Application" |
3511 | | - } |
3512 | | - }, |
3513 | | - { |
3514 | | - "schemeKeys": [ |
3515 | | - "DelegatedWork", |
3516 | | - "Application" |
3517 | | - ], |
3518 | | - "methods": [ |
3519 | | - "GET", |
3520 | | - "POST" |
3521 | | - ], |
3522 | | - "paths": { |
3523 | | - "/directory/certificateauthorities/certificatebasedapplicationconfigurations": "least=DelegatedWork,Application", |
3524 | | - "/directory/certificateauthorities/certificatebasedapplicationconfigurations/{id}/trustedcertificateauthorities": "least=DelegatedWork,Application" |
3525 | | - } |
3526 | | - }, |
3527 | | - { |
3528 | | - "schemeKeys": [ |
3529 | | - "DelegatedWork", |
3530 | | - "Application" |
3531 | | - ], |
3532 | | - "methods": [ |
3533 | | - "DELETE", |
3534 | 3507 | "GET" |
3535 | 3508 | ], |
3536 | 3509 | "paths": { |
3537 | | - "/directory/certificateauthorities/certificatebasedapplicationconfigurations/{id}": "least=DelegatedWork,Application" |
3538 | | - } |
3539 | | - }, |
3540 | | - { |
3541 | | - "schemeKeys": [ |
3542 | | - "DelegatedWork", |
3543 | | - "Application" |
3544 | | - ], |
3545 | | - "methods": [ |
3546 | | - "DELETE", |
3547 | | - "GET", |
3548 | | - "PATCH" |
3549 | | - ], |
3550 | | - "paths": { |
| 3510 | + "/directory/certificateauthorities/certificatebasedapplicationconfigurations": "least=DelegatedWork,Application", |
| 3511 | + "/directory/certificateauthorities/certificatebasedapplicationconfigurations/{id}": "least=DelegatedWork,Application", |
| 3512 | + "/directory/certificateauthorities/certificatebasedapplicationconfigurations/{id}/trustedcertificateauthorities": "least=DelegatedWork,Application", |
3551 | 3513 | "/directory/certificateauthorities/certificatebasedapplicationconfigurations/{id}/trustedcertificateauthorities/{id}": "least=DelegatedWork,Application" |
3552 | 3514 | } |
3553 | 3515 | } |
|
3568 | 3530 | "privilegeLevel": 3 |
3569 | 3531 | }, |
3570 | 3532 | "Application": { |
3571 | | - "adminDisplayName": "", |
3572 | | - "adminDescription": "", |
| 3533 | + "adminDisplayName": "Read and write the trusted certificate authority configuration for applications", |
| 3534 | + "adminDescription": "Allows the app to create, read, update and delete the trusted certificate authority configuration which can be used to restrict application certificates based on their issuing authority, without a signed-in user.", |
3573 | 3535 | "requiresAdminConsent": true, |
3574 | 3536 | "privilegeLevel": 4 |
3575 | 3537 | } |
|
3581 | 3543 | "Application" |
3582 | 3544 | ], |
3583 | 3545 | "methods": [ |
3584 | | - "PATCH" |
3585 | | - ], |
3586 | | - "paths": { |
3587 | | - "/certificateauthoritypath/certificatebasedapplicationconfigurations/{id}": "" |
3588 | | - } |
3589 | | - }, |
3590 | | - { |
3591 | | - "schemeKeys": [ |
3592 | | - "DelegatedWork", |
3593 | | - "Application" |
3594 | | - ], |
3595 | | - "methods": [ |
3596 | | - "GET", |
3597 | | - "POST" |
| 3546 | + "GET" |
3598 | 3547 | ], |
3599 | 3548 | "paths": { |
3600 | 3549 | "/directory/certificateauthorities/certificatebasedapplicationconfigurations": "", |
3601 | | - "/directory/certificateauthorities/certificatebasedapplicationconfigurations/{id}/trustedcertificateauthorities": "" |
| 3550 | + "/directory/certificateauthorities/certificatebasedapplicationconfigurations/{id}": "", |
| 3551 | + "/directory/certificateauthorities/certificatebasedapplicationconfigurations/{id}/trustedcertificateauthorities": "", |
| 3552 | + "/directory/certificateauthorities/certificatebasedapplicationconfigurations/{id}/trustedcertificateauthorities/{id}": "" |
3602 | 3553 | } |
3603 | 3554 | }, |
3604 | 3555 | { |
|
3607 | 3558 | "Application" |
3608 | 3559 | ], |
3609 | 3560 | "methods": [ |
3610 | | - "DELETE", |
3611 | | - "GET" |
| 3561 | + "POST" |
3612 | 3562 | ], |
3613 | 3563 | "paths": { |
3614 | | - "/directory/certificateauthorities/certificatebasedapplicationconfigurations/{id}": "" |
| 3564 | + "/directory/certificateauthorities/certificatebasedapplicationconfigurations": "least=DelegatedWork,Application", |
| 3565 | + "/directory/certificateauthorities/certificatebasedapplicationconfigurations/{id}/trustedcertificateauthorities": "least=DelegatedWork,Application" |
3615 | 3566 | } |
3616 | 3567 | }, |
3617 | 3568 | { |
|
3621 | 3572 | ], |
3622 | 3573 | "methods": [ |
3623 | 3574 | "DELETE", |
3624 | | - "GET", |
3625 | 3575 | "PATCH" |
3626 | 3576 | ], |
3627 | 3577 | "paths": { |
3628 | | - "/directory/certificateauthorities/certificatebasedapplicationconfigurations/{id}/trustedcertificateauthorities/{id}": "" |
| 3578 | + "/directory/certificateauthorities/certificatebasedapplicationconfigurations/{id}": "least=DelegatedWork,Application", |
| 3579 | + "/directory/certificateauthorities/certificatebasedapplicationconfigurations/{id}/trustedcertificateauthorities/{id}": "least=DelegatedWork,Application" |
3629 | 3580 | } |
3630 | 3581 | } |
3631 | 3582 | ], |
|
5098 | 5049 | "/reports/conditionalaccess/protectedapps": "least=DelegatedWork,Application", |
5099 | 5050 | "/reports/conditionalaccess/securityalerts": "least=DelegatedWork,Application", |
5100 | 5051 | "/reports/conditionalaccess/unprotectedapps": "least=DelegatedWork,Application", |
| 5052 | + "/reports/correlations": "", |
| 5053 | + "/reports/correlations/{id}": "", |
| 5054 | + "/reports/correlations/{id}/identities": "", |
| 5055 | + "/reports/correlations/{id}/identities/{id}": "", |
5101 | 5056 | "/reports/getAppManagementAuditSummary": "least=DelegatedWork,Application", |
5102 | | - "/reports/identityCorrelation": "least=DelegatedWork,Application", |
5103 | | - "/reports/identityCorrelation/{id}": "least=DelegatedWork,Application", |
5104 | | - "/reports/identityCorrelation/{id}/identities": "least=DelegatedWork,Application", |
5105 | | - "/reports/identityCorrelation/{id}/identities/{id}": "least=DelegatedWork,Application", |
5106 | 5057 | "/reports/reconciliations/provisioning": "least=DelegatedWork,Application", |
5107 | 5058 | "/reports/reconciliations/provisioning/{id}": "least=DelegatedWork,Application", |
5108 | 5059 | "/reports/reconciliations/provisioning/{id}/identities": "least=DelegatedWork,Application", |
|
5942 | 5893 | "PATCH" |
5943 | 5894 | ], |
5944 | 5895 | "paths": { |
5945 | | - "/backupRestore/protectionUnits/{protectionUnitId}": "least=DelegatedWork" |
| 5896 | + "/backupRestore/driveProtectionUnits/{driveProtectionUnitId}": "least=DelegatedWork", |
| 5897 | + "/backupRestore/mailboxProtectionUnits/{mailboxProtectionUnitId}": "least=DelegatedWork", |
| 5898 | + "/backupRestore/siteProtectionUnits/{siteProtectionUnitId}": "least=DelegatedWork" |
5946 | 5899 | } |
5947 | 5900 | }, |
5948 | 5901 | { |
|
12471 | 12424 | "POST" |
12472 | 12425 | ], |
12473 | 12426 | "paths": { |
| 12427 | + "/me/dataSecurityAndGovernance/contentUploadSession": "", |
12474 | 12428 | "/me/dataSecurityAndGovernance/processContent": "", |
12475 | 12429 | "/security/dataSecurityAndGovernance/processContentAsync": "least=Application,DelegatedWork", |
| 12430 | + "/users/{userId}/dataSecurityAndGovernance/contentUploadSession": "", |
12476 | 12431 | "/users/{userId}/dataSecurityAndGovernance/processContent": "" |
12477 | 12432 | } |
12478 | 12433 | } |
|
12509 | 12464 | "POST" |
12510 | 12465 | ], |
12511 | 12466 | "paths": { |
| 12467 | + "/me/dataSecurityAndGovernance/contentUploadSession": "", |
12512 | 12468 | "/me/dataSecurityAndGovernance/processContent": "least=Application,DelegatedWork", |
| 12469 | + "/users/{userId}/dataSecurityAndGovernance/contentUploadSession": "", |
12513 | 12470 | "/users/{userId}/dataSecurityAndGovernance/processContent": "least=Application,DelegatedWork" |
12514 | 12471 | } |
12515 | 12472 | } |
@@ -23095,6 +23052,105 @@ |
23095 | 23052 | "ownerSecurityGroup": "igaelmlivesite" |
23096 | 23053 | } |
23097 | 23054 | }, |
| 23055 | + "EntraBackup.Read.All": { |
| 23056 | + "authorizationType": "oAuth2", |
| 23057 | + "schemes": { |
| 23058 | + "DelegatedWork": { |
| 23059 | + "adminDisplayName": "Read Preview jobs and snapshots", |
| 23060 | + "adminDescription": "Allows the app to list the all the snapshots, jobs and enumerate the changes of a specific preview job, on behalf of the signed-in user.", |
| 23061 | + "userDisplayName": "Read Preview jobs and snapshots", |
| 23062 | + "userDescription": "Allows the app to list the all the snapshots, jobs and enumerate the changes of a specific preview job, on your behalf.", |
| 23063 | + "requiresAdminConsent": true, |
| 23064 | + "privilegeLevel": 4 |
| 23065 | + }, |
| 23066 | + "Application": { |
| 23067 | + "adminDisplayName": "Read Preview jobs and snapshots", |
| 23068 | + "adminDescription": "Allows the app to list the all the snapshots, jobs and enumerate the changes of a specific preview job, on behalf of the signed-in user.", |
| 23069 | + "userDisplayName": "Read Preview jobs and snapshots", |
| 23070 | + "userDescription": "Allows the app to list the all the snapshots, jobs and enumerate the changes of a specific preview job, on your behalf.", |
| 23071 | + "requiresAdminConsent": true, |
| 23072 | + "privilegeLevel": 4 |
| 23073 | + } |
| 23074 | + }, |
| 23075 | + "pathSets": [ |
| 23076 | + { |
| 23077 | + "schemeKeys": [ |
| 23078 | + "DelegatedWork", |
| 23079 | + "Application" |
| 23080 | + ], |
| 23081 | + "methods": [ |
| 23082 | + "GET" |
| 23083 | + ], |
| 23084 | + "paths": { |
| 23085 | + "/directory/recovery/snapshots": "least=Application,DelegatedWork", |
| 23086 | + "/directory/recovery/snapshots/{id}": "least=Application,DelegatedWork", |
| 23087 | + "/directory/recovery/snapshots/{id}/recoveryJobs/{id}/getFailedChanges": "least=Application,DelegatedWork", |
| 23088 | + "/directory/recovery/snapshots/{id}/recoveryPreviewJobs/{id}/getChanges": "least=Application,DelegatedWork" |
| 23089 | + } |
| 23090 | + } |
| 23091 | + ], |
| 23092 | + "ownerInfo": { |
| 23093 | + "ownerSecurityGroup": "xtenantex" |
| 23094 | + } |
| 23095 | + }, |
| 23096 | + "EntraBackup.ReadWrite.Preview": { |
| 23097 | + "authorizationType": "oAuth2", |
| 23098 | + "schemes": { |
| 23099 | + "DelegatedWork": { |
| 23100 | + "adminDisplayName": "Create a preview job, read preview job and snapshots", |
| 23101 | + "adminDescription": "Allows the app to list the all the snapshots, create a preview job and enumerate the changes of a specific preview job, on behalf of the signed-in user.", |
| 23102 | + "userDisplayName": "Create a preview job, read preview job and snapshots", |
| 23103 | + "userDescription": "Allows the app to list the all the snapshots, create a preview job and enumerate the changes of a specific preview job, on your behalf.", |
| 23104 | + "requiresAdminConsent": true, |
| 23105 | + "privilegeLevel": 4 |
| 23106 | + } |
| 23107 | + }, |
| 23108 | + "pathSets": [ |
| 23109 | + { |
| 23110 | + "schemeKeys": [ |
| 23111 | + "DelegatedWork" |
| 23112 | + ], |
| 23113 | + "methods": [ |
| 23114 | + "POST" |
| 23115 | + ], |
| 23116 | + "paths": { |
| 23117 | + "/directory/recovery/snapshots/{id}/recoveryPreviewJobs": "least=DelegatedWork" |
| 23118 | + } |
| 23119 | + } |
| 23120 | + ], |
| 23121 | + "ownerInfo": { |
| 23122 | + "ownerSecurityGroup": "xtenantex" |
| 23123 | + } |
| 23124 | + }, |
| 23125 | + "EntraBackup.ReadWrite.Recovery": { |
| 23126 | + "authorizationType": "oAuth2", |
| 23127 | + "schemes": { |
| 23128 | + "DelegatedWork": { |
| 23129 | + "adminDisplayName": "Create preview and recovery job, read recovery job and snapshots", |
| 23130 | + "adminDescription": "Allows the app to list the all the snapshots, create a recovery job and enumerate the changes of a specific recovery job, on behalf of the signed-in user.", |
| 23131 | + "userDisplayName": "Create preview and recovery job, read recovery job and snapshots", |
| 23132 | + "userDescription": "Allows the app to list the all the snapshots, create a recovery job and enumerate the changes of a specific recovery job, on your behalf.", |
| 23133 | + "requiresAdminConsent": true, |
| 23134 | + "privilegeLevel": 4 |
| 23135 | + } |
| 23136 | + }, |
| 23137 | + "pathSets": [ |
| 23138 | + { |
| 23139 | + "schemeKeys": [ |
| 23140 | + "DelegatedWork" |
| 23141 | + ], |
| 23142 | + "methods": [ |
| 23143 | + "POST" |
| 23144 | + ], |
| 23145 | + "paths": { |
| 23146 | + "/directory/recovery/snapshots/{id}/recoveryJobs": "least=DelegatedWork" |
| 23147 | + } |
| 23148 | + } |
| 23149 | + ], |
| 23150 | + "ownerInfo": { |
| 23151 | + "ownerSecurityGroup": "xtenantex" |
| 23152 | + } |
| 23153 | + }, |
23098 | 23154 | "EventListener.Read.All": { |
23099 | 23155 | "authorizationType": "oAuth2", |
23100 | 23156 | "schemes": { |
|
33753 | 33809 | "/networkAccess/contentTypePolicies/{id}/policyRules/{id}": "least=DelegatedWork,Application", |
33754 | 33810 | "/networkAccess/deployments": "least=DelegatedWork,Application", |
33755 | 33811 | "/networkAccess/deployments/{id}": "least=DelegatedWork,Application", |
33756 | | - "/networkAccess/efpConfig": "least=DelegatedWork,Application", |
| 33812 | + "/networkAccess/explicitForwardProxyConfig": "least=DelegatedWork,Application", |
33757 | 33813 | "/networkAccess/fileDlpPolicies": "least=DelegatedWork,Application", |
33758 | 33814 | "/networkAccess/filteringPolicies": "least=DelegatedWork,Application", |
33759 | 33815 | "/networkAccess/filteringPolicies/{id}/policyRules": "least=DelegatedWork,Application", |
|
33856 | 33912 | "/networkAccess/contentPolicies/{id}/policyRules": "", |
33857 | 33913 | "/networkAccess/contentPolicies/{id}/policyRules/{id}": "", |
33858 | 33914 | "/networkaccess/discovery/discoveredApplicationSegments": "", |
33859 | | - "/networkAccess/efpConfig": "", |
| 33915 | + "/networkAccess/explicitForwardProxyConfig": "", |
33860 | 33916 | "/networkAccess/fileDlpPolicies": "", |
33861 | 33917 | "/networkAccess/filteringPolicies": "", |
33862 | 33918 | "/networkAccess/filteringPolicies/{id}/policyRules": "", |
|
33974 | 34030 | "/networkAccess/connectivity/branches/{id}/deviceLinks/{id}": "least=DelegatedWork,Application", |
33975 | 34031 | "/networkAccess/connectivity/branches/{id}/forwardingProfiles": "least=DelegatedWork,Application", |
33976 | 34032 | "/networkAccess/contentPolicies/{id}/policyRules/{id}": "least=DelegatedWork,Application", |
33977 | | - "/networkAccess/efpConfig": "least=DelegatedWork,Application", |
| 34033 | + "/networkAccess/explicitForwardProxyConfig": "least=DelegatedWork,Application", |
33978 | 34034 | "/networkAccess/fileDlpPolicies/{id}": "least=DelegatedWork,Application", |
33979 | 34035 | "/networkAccess/filteringPolicies/{id}/policyRules/{id}": "least=DelegatedWork,Application", |
33980 | 34036 | "/networkAccess/filteringProfiles/{id}": "least=DelegatedWork,Application", |
|
42070 | 42126 | "GET" |
42071 | 42127 | ], |
42072 | 42128 | "paths": { |
42073 | | - "/auditlogs/provisioning": "least=DelegatedWork" |
| 42129 | + "/auditlogs/provisioning": "least=DelegatedWork", |
| 42130 | + "/reports/correlations": "least=DelegatedWork", |
| 42131 | + "/reports/correlations/{id}": "least=DelegatedWork", |
| 42132 | + "/reports/correlations/{id}/identities": "least=DelegatedWork", |
| 42133 | + "/reports/correlations/{id}/identities/{id}": "least=DelegatedWork" |
42074 | 42134 | } |
42075 | 42135 | } |
42076 | 42136 | ], |
|
0 commit comments