ESC
Type to search...

AgentCardManifest.ReadWrite.ManagedBy

Export JSON
Export CSV
Copy URL
Print
Application Read/Write User Scope

Allows the app to read and write agent card manifests that name it as manager in your organization's Agent Registry without a signed-in user.

Delegated Access App-Only Access

Permission Details

Application Permission

Read and write managed-by agent card manifests in Agent Registry

Allows the app to read and write agent card manifests that name it as manager in your organization's Agent Registry without a signed-in user.

Properties

Property Type Description
id string The unique identifier for an entity. Read-only.
provider object Information about the organization providing the agent.
description string A human-readable description of the agent.
skills microsoft.graph.agentSkill collection Skills/capabilities that the agent can perform
originatingStore stringNullable Name of the store/system where agent originated. For example Copilot Studio.
displayName string A human-readable display name of the agent.
documentationUrl stringNullable URL to agent's documentation.
version string Version of the agent implementation
lastModifiedDateTime date-timeNullable When this agent card manifest was last modified.
createdDateTime date-timeNullable When this agent card manifest was created.
security microsoft.graph.securityRequirement collection Security requirements - array of security scheme references.
defaultOutputModes array Default set of supported output MIME types for all skills, which can be overridden on a per-skill basis.
protocolVersion string Protocol version supported by the agent.
iconUrl stringNullable URL to agent's icon image.
capabilities microsoft.graph.agentCapabilities

Showing 15 of 21 properties. View all on Microsoft Learn →

JSON Representation

JSON representation
{
  "id": "String",
  "provider": "{...}",
  "description": "String",
  "skills": "[...]",
  "originatingStore": "String",
  "displayName": "String",
  "documentationUrl": "String",
  "version": "String",
  "lastModifiedDateTime": "String",
  "createdDateTime": "String",
  "security": "[...]",
  "defaultOutputModes": "array",
  "protocolVersion": "String",
  "iconUrl": "String",
  "capabilities": "microsoft.graph.agentcapabilities",
  "supportsAuthenticatedExtendedCard": "Boolean",
  "securitySchemes": "{...}",
  "managedBy": "String",
  "ownerIds": "array",
  "createdBy": "String"
}

Graph Methods

Delegated access App-only access

No API methods available for this version.

Methods
GET /agentRegistry/agentCardManifests
GET /agentRegistry/agentCardManifests/{agentCardManifestId}
GET /agentRegistry/agentInstances/{agentInstanceId}/agentCardManifest
PATCH /agentRegistry/agentCardManifests/{agentCardManifestId}

No PowerShell cmdlets available for this version.

No PowerShell cmdlets available for this version.

Code Examples

C# / .NET SDK
// Install: dotnet add package Microsoft.Graph
// Install: dotnet add package Azure.Identity
using Microsoft.Graph;
using Azure.Identity;



// Application permissions - daemon/service app
var tenantId = "YOUR_TENANT_ID";
var clientId = "YOUR_CLIENT_ID";
var clientSecret = "YOUR_CLIENT_SECRET";

var credential = new ClientSecretCredential(tenantId, clientId, clientSecret);
var graphClient = new GraphServiceClient(credential);

// Example: GET /users/{user-id}
var users = await graphClient.Users.GetAsync();
foreach (var user in users?.Value ?? [])
{
    Console.WriteLine($"User: {user.DisplayName}");
}
JavaScript / TypeScript
// npm install @azure/msal-browser @microsoft/microsoft-graph-client
import { PublicClientApplication } from "@azure/msal-browser";
import { Client } from "@microsoft/microsoft-graph-client";
import { AuthCodeMSALBrowserAuthenticationProvider } from 
    "@microsoft/microsoft-graph-client/authProviders/authCodeMsalBrowser";

const msalConfig = {
    auth: {
        clientId: "YOUR_CLIENT_ID",
        authority: "https://login.microsoftonline.com/YOUR_TENANT_ID"
    }
};

const pca = new PublicClientApplication(msalConfig);
await pca.initialize();



// Application: Use client credentials (Node.js backend only)
// npm install @azure/identity @microsoft/microsoft-graph-client
import { ClientSecretCredential } from "@azure/identity";
import { TokenCredentialAuthenticationProvider } from 
    "@microsoft/microsoft-graph-client/authProviders/azureTokenCredentials";

const credential = new ClientSecretCredential(
    "YOUR_TENANT_ID",
    "YOUR_CLIENT_ID", 
    "YOUR_CLIENT_SECRET"
);

const authProvider = new TokenCredentialAuthenticationProvider(credential, {
    scopes: ["https://graph.microsoft.com/.default"]
});

const graphClient = Client.initWithMiddleware({ authProvider });
const result = await graphClient.api("/users").get();
console.log(result);
PowerShell
# Install Microsoft Graph PowerShell module
Install-Module Microsoft.Graph -Scope CurrentUser



# Application access with certificate
$params = @{
    ClientId = "YOUR_CLIENT_ID"
    TenantId = "YOUR_TENANT_ID"
    CertificateThumbprint = "YOUR_CERT_THUMBPRINT"
}
Connect-MgGraph @params

# Or with client secret (not recommended for production)
# Connect-MgGraph -ClientSecretCredential $credential

# Example: GET /users
$result = Invoke-MgGraphRequest -Method GET -Uri "https://graph.microsoft.com/v1.0/users"
$result | ConvertTo-Json -Depth 5

# Always disconnect when done
Disconnect-MgGraph
Python
# pip install msgraph-sdk azure-identity
from azure.identity import InteractiveBrowserCredential, ClientSecretCredential
from msgraph import GraphServiceClient
import asyncio



# Application permissions - client credentials
credential = ClientSecretCredential(
    tenant_id="YOUR_TENANT_ID",
    client_id="YOUR_CLIENT_ID",
    client_secret="YOUR_CLIENT_SECRET"
)
scopes = ["https://graph.microsoft.com/.default"]
client = GraphServiceClient(credential, scopes)

async def get_users():
    # Example: GET /users
    result = await client.users.get()
    for user in result.value:
        print(f"User: {user.display_name}")
    return result

asyncio.run(get_users())

App Registration

1

Navigate to Azure Portal

Go to App registrations in Microsoft Entra admin center

2

Add API Permission

Select your app → API permissions → Add a permission → Microsoft Graph

3

Select Permission Type

Choose Application permissions and search for AgentCardManifest.ReadWrite.ManagedBy

4

Grant Admin Consent

Application permissions always require admin consent. Click "Grant admin consent" in the Azure portal.