Skip to content

Commit

Permalink
Daily automation
Browse files Browse the repository at this point in the history
  • Loading branch information
merill committed Aug 24, 2024
1 parent 3063f76 commit 592e27e
Show file tree
Hide file tree
Showing 4 changed files with 78 additions and 0 deletions.
3 changes: 3 additions & 0 deletions _info/GraphAppRoles.csv
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@
"2f3e6f8c-093b-4c57-a58b-ba5ce494a169","Agreement.Read.All","Read all terms of use agreements","Allows the app to read terms of use agreements, without a signed in user."
"c9090d00-6101-42f0-a729-c41074260d47","Agreement.ReadWrite.All","Read and write all terms of use agreements","Allows the app to read and write terms of use agreements, without a signed in user."
"d8e4ec18-f6c0-4620-8122-c8b1f2bf400e","AgreementAcceptance.Read.All","Read all terms of use acceptance statuses","Allows the app to read terms of use acceptance statuses, without a signed in user."
"839c90ab-5771-41ee-aef8-a562e8487c1e","AiEnterpriseInteraction.Read.All","Read all AI enterprise interactions.","Allows the app to read all AI enterprise interactions."
"b86848a7-d5b1-41eb-a9b4-54a4e6306e97","APIConnectors.Read.All","Read API connectors for authentication flows","Allows the app to read the API connectors used in user authentication flows, without a signed-in user."
"1dfe531a-24a6-4f1b-80f4-7a0dc5a0a171","APIConnectors.ReadWrite.All","Read and write API connectors for authentication flows","Allows the app to read, create and manage the API connectors used in user authentication flows, without a signed-in user."
"e12dae10-5a57-4817-b79d-dfbec5348930","AppCatalog.Read.All","Read all app catalogs","Allows the app to read apps in the app catalogs without a signed-in user."
Expand All @@ -17,6 +18,8 @@
"1bfefb4e-e0b5-418b-a88f-73c46d2cc8e9","Application.ReadWrite.All","Read and write all applications","Allows the app to create, read, update and delete applications and service principals without a signed-in user. Does not allow management of consent grants."
"18a4783c-866b-4cc7-a460-3d5e5662c884","Application.ReadWrite.OwnedBy","Manage apps that this app creates or owns","Allows the app to create other applications, and fully manage those applications (read, update, update application secrets and delete), without a signed-in user.  It cannot update any apps that it is not an owner of."
"06b708a9-e830-4db3-a914-8e69da51d44f","AppRoleAssignment.ReadWrite.All","Manage app permission grants and app role assignments","Allows the app to manage permission grants for application permissions to any API (including Microsoft Graph) and application assignments for any app, without a signed-in user."
"9f265de7-8d5e-4e9a-a805-5e8bbc49656f","ApprovalSolution.Read.All","Read all approvals","Allows the app to read all approvals and approval item subscriptions, without a signed-in user."
"45583558-1113-4d06-8969-e79a28edc9ad","ApprovalSolution.ReadWrite.All","Read all approvals and manage approval subscriptions","Allows the app to read all approvals and create, update, or remove approval item subscriptions, without a signed-in user."
"93283d0a-6322-4fa8-966b-8c121624760d","AttackSimulation.Read.All","Read attack simulation data of an organization","Allows the app to read attack simulation and training data for an organization without a signed-in user."
"e125258e-8c8a-42a8-8f55-ab502afa52f3","AttackSimulation.ReadWrite.All","Read, create, and update all attack simulation data of an organization","Allows the app to read, create, and update attack simulation and training data for an organization without a signed-in user."
"b0afded3-3588-46d8-8b3d-9842eff778da","AuditLog.Read.All","Read all audit log data","Allows the app to read and query your audit log activities, without a signed-in user."
Expand Down
36 changes: 36 additions & 0 deletions _info/GraphAppRoles.json
Original file line number Diff line number Diff line change
Expand Up @@ -107,6 +107,18 @@
"Value": "AgreementAcceptance.Read.All",
"AdditionalProperties": {}
},
{
"AllowedMemberTypes": [
"Application"
],
"Description": "Allows the app to read all AI enterprise interactions.",
"DisplayName": "Read all AI enterprise interactions.",
"Id": "839c90ab-5771-41ee-aef8-a562e8487c1e",
"IsEnabled": true,
"Origin": "Application",
"Value": "AiEnterpriseInteraction.Read.All",
"AdditionalProperties": {}
},
{
"AllowedMemberTypes": [
"Application"
Expand Down Expand Up @@ -215,6 +227,30 @@
"Value": "AppRoleAssignment.ReadWrite.All",
"AdditionalProperties": {}
},
{
"AllowedMemberTypes": [
"Application"
],
"Description": "Allows the app to read all approvals and approval item subscriptions, without a signed-in user.",
"DisplayName": "Read all approvals",
"Id": "9f265de7-8d5e-4e9a-a805-5e8bbc49656f",
"IsEnabled": true,
"Origin": "Application",
"Value": "ApprovalSolution.Read.All",
"AdditionalProperties": {}
},
{
"AllowedMemberTypes": [
"Application"
],
"Description": "Allows the app to read all approvals and create, update, or remove approval item subscriptions, without a signed-in user.",
"DisplayName": "Read all approvals and manage approval subscriptions",
"Id": "45583558-1113-4d06-8969-e79a28edc9ad",
"IsEnabled": true,
"Origin": "Application",
"Value": "ApprovalSolution.ReadWrite.All",
"AdditionalProperties": {}
},
{
"AllowedMemberTypes": [
"Application"
Expand Down
3 changes: 3 additions & 0 deletions _info/GraphDelegateRoles.csv
Original file line number Diff line number Diff line change
Expand Up @@ -21,6 +21,9 @@
"c79f8feb-a9db-4090-85f9-90d820caa0eb","Application.Read.All","Read applications","Allows the app to read applications and service principals on behalf of the signed-in user."
"bdfbf15f-ee85-4955-8675-146e8e5296b5","Application.ReadWrite.All","Read and write all applications","Allows the app to create, read, update and delete applications and service principals on behalf of the signed-in user. Does not allow management of consent grants."
"84bccea3-f856-4a8a-967b-dbe0a3d53a64","AppRoleAssignment.ReadWrite.All","Manage app permission grants and app role assignments","Allows the app to manage permission grants for application permissions to any API (including Microsoft Graph) and application assignments for any app, on behalf of the signed-in user."
"b0df437d-d341-4df0-aa3e-89ca81a1207f","ApprovalSolution.Read","Read approvals","Allows the app to read approvals on behalf of the signed-in user."
"6768d3af-4562-48ff-82d2-c5e19eb21b9c","ApprovalSolution.ReadWrite","Read, create, and respond to approvals","Allows the app to provision, read, create, and respond to approvals on behalf of the signed-in user. "
"89d944f2-2011-44ad-830c-aa9bf5ef2319","ApprovalSolutionResponse.ReadWrite","Read and respond to approvals assigned to the current user","Allows the app to read and respond to approvals on behalf of the signed-in user."
"104a7a4b-ca76-4677-b7e7-2f4bc482f381","AttackSimulation.Read.All","Read attack simulation data of an organization","Allows the app to read attack simulation and training data for an organization for the signed-in user."
"27608d7c-2c66-4cad-a657-951d575f5a60","AttackSimulation.ReadWrite.All","Read, create, and update attack simulation data of an organization","Allows the app to read, create, and update attack simulation and training data for an organization for the signed-in user."
"e4c9e354-4dc5-45b8-9e7c-e1393b0b1a20","AuditLog.Read.All","Read audit log data","Allows the app to read and query your audit log activities, on behalf of the signed-in user."
Expand Down
36 changes: 36 additions & 0 deletions _info/GraphDelegateRoles.json
Original file line number Diff line number Diff line change
Expand Up @@ -263,6 +263,42 @@
"Value": "AppRoleAssignment.ReadWrite.All",
"AdditionalProperties": {}
},
{
"AdminConsentDescription": "Allows the app to read approvals on behalf of the signed-in user.",
"AdminConsentDisplayName": "Read approvals",
"Id": "b0df437d-d341-4df0-aa3e-89ca81a1207f",
"IsEnabled": true,
"Origin": null,
"Type": "Admin",
"UserConsentDescription": "Allows the app to read approvals on your behalf.",
"UserConsentDisplayName": "Read approvals",
"Value": "ApprovalSolution.Read",
"AdditionalProperties": {}
},
{
"AdminConsentDescription": "Allows the app to provision, read, create, and respond to approvals on behalf of the signed-in user. ",
"AdminConsentDisplayName": "Read, create, and respond to approvals",
"Id": "6768d3af-4562-48ff-82d2-c5e19eb21b9c",
"IsEnabled": true,
"Origin": null,
"Type": "Admin",
"UserConsentDescription": "Allows the app to provision, read, create, and respond to approvals on your behalf. ",
"UserConsentDisplayName": "Read, create, and respond to approvals",
"Value": "ApprovalSolution.ReadWrite",
"AdditionalProperties": {}
},
{
"AdminConsentDescription": "Allows the app to read and respond to approvals on behalf of the signed-in user.",
"AdminConsentDisplayName": "Read and respond to approvals assigned to the current user",
"Id": "89d944f2-2011-44ad-830c-aa9bf5ef2319",
"IsEnabled": true,
"Origin": null,
"Type": "Admin",
"UserConsentDescription": "Allows the app to read and respond to approvals on your behalf.",
"UserConsentDisplayName": "Read and respond to approvals assigned to the current user",
"Value": "ApprovalSolutionResponse.ReadWrite",
"AdditionalProperties": {}
},
{
"AdminConsentDescription": "Allows the app to read attack simulation and training data for an organization for the signed-in user.",
"AdminConsentDisplayName": "Read attack simulation data of an organization",
Expand Down

0 comments on commit 592e27e

Please sign in to comment.