From 592e27e9925e548541b7dea5037c768656b72f01 Mon Sep 17 00:00:00 2001 From: Merill Fernando Date: Sat, 24 Aug 2024 05:38:54 +0000 Subject: [PATCH] Daily automation --- _info/GraphAppRoles.csv | 3 +++ _info/GraphAppRoles.json | 36 +++++++++++++++++++++++++++++++++++ _info/GraphDelegateRoles.csv | 3 +++ _info/GraphDelegateRoles.json | 36 +++++++++++++++++++++++++++++++++++ 4 files changed, 78 insertions(+) diff --git a/_info/GraphAppRoles.csv b/_info/GraphAppRoles.csv index 9ae0766..5aad1a2 100644 --- a/_info/GraphAppRoles.csv +++ b/_info/GraphAppRoles.csv @@ -8,6 +8,7 @@ "2f3e6f8c-093b-4c57-a58b-ba5ce494a169","Agreement.Read.All","Read all terms of use agreements","Allows the app to read terms of use agreements, without a signed in user." "c9090d00-6101-42f0-a729-c41074260d47","Agreement.ReadWrite.All","Read and write all terms of use agreements","Allows the app to read and write terms of use agreements, without a signed in user." "d8e4ec18-f6c0-4620-8122-c8b1f2bf400e","AgreementAcceptance.Read.All","Read all terms of use acceptance statuses","Allows the app to read terms of use acceptance statuses, without a signed in user." +"839c90ab-5771-41ee-aef8-a562e8487c1e","AiEnterpriseInteraction.Read.All","Read all AI enterprise interactions.","Allows the app to read all AI enterprise interactions." "b86848a7-d5b1-41eb-a9b4-54a4e6306e97","APIConnectors.Read.All","Read API connectors for authentication flows","Allows the app to read the API connectors used in user authentication flows, without a signed-in user." "1dfe531a-24a6-4f1b-80f4-7a0dc5a0a171","APIConnectors.ReadWrite.All","Read and write API connectors for authentication flows","Allows the app to read, create and manage the API connectors used in user authentication flows, without a signed-in user." "e12dae10-5a57-4817-b79d-dfbec5348930","AppCatalog.Read.All","Read all app catalogs","Allows the app to read apps in the app catalogs without a signed-in user." @@ -17,6 +18,8 @@ "1bfefb4e-e0b5-418b-a88f-73c46d2cc8e9","Application.ReadWrite.All","Read and write all applications","Allows the app to create, read, update and delete applications and service principals without a signed-in user. Does not allow management of consent grants." "18a4783c-866b-4cc7-a460-3d5e5662c884","Application.ReadWrite.OwnedBy","Manage apps that this app creates or owns","Allows the app to create other applications, and fully manage those applications (read, update, update application secrets and delete), without a signed-in user.  It cannot update any apps that it is not an owner of." "06b708a9-e830-4db3-a914-8e69da51d44f","AppRoleAssignment.ReadWrite.All","Manage app permission grants and app role assignments","Allows the app to manage permission grants for application permissions to any API (including Microsoft Graph) and application assignments for any app, without a signed-in user." +"9f265de7-8d5e-4e9a-a805-5e8bbc49656f","ApprovalSolution.Read.All","Read all approvals","Allows the app to read all approvals and approval item subscriptions, without a signed-in user." +"45583558-1113-4d06-8969-e79a28edc9ad","ApprovalSolution.ReadWrite.All","Read all approvals and manage approval subscriptions","Allows the app to read all approvals and create, update, or remove approval item subscriptions, without a signed-in user." "93283d0a-6322-4fa8-966b-8c121624760d","AttackSimulation.Read.All","Read attack simulation data of an organization","Allows the app to read attack simulation and training data for an organization without a signed-in user." "e125258e-8c8a-42a8-8f55-ab502afa52f3","AttackSimulation.ReadWrite.All","Read, create, and update all attack simulation data of an organization","Allows the app to read, create, and update attack simulation and training data for an organization without a signed-in user." "b0afded3-3588-46d8-8b3d-9842eff778da","AuditLog.Read.All","Read all audit log data","Allows the app to read and query your audit log activities, without a signed-in user." diff --git a/_info/GraphAppRoles.json b/_info/GraphAppRoles.json index b013a5c..55e8efa 100644 --- a/_info/GraphAppRoles.json +++ b/_info/GraphAppRoles.json @@ -107,6 +107,18 @@ "Value": "AgreementAcceptance.Read.All", "AdditionalProperties": {} }, + { + "AllowedMemberTypes": [ + "Application" + ], + "Description": "Allows the app to read all AI enterprise interactions.", + "DisplayName": "Read all AI enterprise interactions.", + "Id": "839c90ab-5771-41ee-aef8-a562e8487c1e", + "IsEnabled": true, + "Origin": "Application", + "Value": "AiEnterpriseInteraction.Read.All", + "AdditionalProperties": {} + }, { "AllowedMemberTypes": [ "Application" @@ -215,6 +227,30 @@ "Value": "AppRoleAssignment.ReadWrite.All", "AdditionalProperties": {} }, + { + "AllowedMemberTypes": [ + "Application" + ], + "Description": "Allows the app to read all approvals and approval item subscriptions, without a signed-in user.", + "DisplayName": "Read all approvals", + "Id": "9f265de7-8d5e-4e9a-a805-5e8bbc49656f", + "IsEnabled": true, + "Origin": "Application", + "Value": "ApprovalSolution.Read.All", + "AdditionalProperties": {} + }, + { + "AllowedMemberTypes": [ + "Application" + ], + "Description": "Allows the app to read all approvals and create, update, or remove approval item subscriptions, without a signed-in user.", + "DisplayName": "Read all approvals and manage approval subscriptions", + "Id": "45583558-1113-4d06-8969-e79a28edc9ad", + "IsEnabled": true, + "Origin": "Application", + "Value": "ApprovalSolution.ReadWrite.All", + "AdditionalProperties": {} + }, { "AllowedMemberTypes": [ "Application" diff --git a/_info/GraphDelegateRoles.csv b/_info/GraphDelegateRoles.csv index 900a897..e192c6e 100644 --- a/_info/GraphDelegateRoles.csv +++ b/_info/GraphDelegateRoles.csv @@ -21,6 +21,9 @@ "c79f8feb-a9db-4090-85f9-90d820caa0eb","Application.Read.All","Read applications","Allows the app to read applications and service principals on behalf of the signed-in user." "bdfbf15f-ee85-4955-8675-146e8e5296b5","Application.ReadWrite.All","Read and write all applications","Allows the app to create, read, update and delete applications and service principals on behalf of the signed-in user. Does not allow management of consent grants." "84bccea3-f856-4a8a-967b-dbe0a3d53a64","AppRoleAssignment.ReadWrite.All","Manage app permission grants and app role assignments","Allows the app to manage permission grants for application permissions to any API (including Microsoft Graph) and application assignments for any app, on behalf of the signed-in user." +"b0df437d-d341-4df0-aa3e-89ca81a1207f","ApprovalSolution.Read","Read approvals","Allows the app to read approvals on behalf of the signed-in user." +"6768d3af-4562-48ff-82d2-c5e19eb21b9c","ApprovalSolution.ReadWrite","Read, create, and respond to approvals","Allows the app to provision, read, create, and respond to approvals on behalf of the signed-in user. " +"89d944f2-2011-44ad-830c-aa9bf5ef2319","ApprovalSolutionResponse.ReadWrite","Read and respond to approvals assigned to the current user","Allows the app to read and respond to approvals on behalf of the signed-in user." "104a7a4b-ca76-4677-b7e7-2f4bc482f381","AttackSimulation.Read.All","Read attack simulation data of an organization","Allows the app to read attack simulation and training data for an organization for the signed-in user." "27608d7c-2c66-4cad-a657-951d575f5a60","AttackSimulation.ReadWrite.All","Read, create, and update attack simulation data of an organization","Allows the app to read, create, and update attack simulation and training data for an organization for the signed-in user." "e4c9e354-4dc5-45b8-9e7c-e1393b0b1a20","AuditLog.Read.All","Read audit log data","Allows the app to read and query your audit log activities, on behalf of the signed-in user." diff --git a/_info/GraphDelegateRoles.json b/_info/GraphDelegateRoles.json index 016be11..fe8c519 100644 --- a/_info/GraphDelegateRoles.json +++ b/_info/GraphDelegateRoles.json @@ -263,6 +263,42 @@ "Value": "AppRoleAssignment.ReadWrite.All", "AdditionalProperties": {} }, + { + "AdminConsentDescription": "Allows the app to read approvals on behalf of the signed-in user.", + "AdminConsentDisplayName": "Read approvals", + "Id": "b0df437d-d341-4df0-aa3e-89ca81a1207f", + "IsEnabled": true, + "Origin": null, + "Type": "Admin", + "UserConsentDescription": "Allows the app to read approvals on your behalf.", + "UserConsentDisplayName": "Read approvals", + "Value": "ApprovalSolution.Read", + "AdditionalProperties": {} + }, + { + "AdminConsentDescription": "Allows the app to provision, read, create, and respond to approvals on behalf of the signed-in user. ", + "AdminConsentDisplayName": "Read, create, and respond to approvals", + "Id": "6768d3af-4562-48ff-82d2-c5e19eb21b9c", + "IsEnabled": true, + "Origin": null, + "Type": "Admin", + "UserConsentDescription": "Allows the app to provision, read, create, and respond to approvals on your behalf. ", + "UserConsentDisplayName": "Read, create, and respond to approvals", + "Value": "ApprovalSolution.ReadWrite", + "AdditionalProperties": {} + }, + { + "AdminConsentDescription": "Allows the app to read and respond to approvals on behalf of the signed-in user.", + "AdminConsentDisplayName": "Read and respond to approvals assigned to the current user", + "Id": "89d944f2-2011-44ad-830c-aa9bf5ef2319", + "IsEnabled": true, + "Origin": null, + "Type": "Admin", + "UserConsentDescription": "Allows the app to read and respond to approvals on your behalf.", + "UserConsentDisplayName": "Read and respond to approvals assigned to the current user", + "Value": "ApprovalSolutionResponse.ReadWrite", + "AdditionalProperties": {} + }, { "AdminConsentDescription": "Allows the app to read attack simulation and training data for an organization for the signed-in user.", "AdminConsentDisplayName": "Read attack simulation data of an organization",