ESC
Type to search...

InformationProtectionPolicy.Read

Export JSON
Export CSV
Copy URL
Print
Delegated Read User Scope

Allows an app to read information protection sensitivity labels and label policy settings, on behalf of the signed-in user.

Permission data: April 6, 2026 at 4:06 AM UTC
Delegated Access App-Only Access

Permission Details

Delegated Permission User consent allowed

Read user sensitivity labels and label policies.

Allows an app to read information protection sensitivity labels and label policy settings, on behalf of the signed-in user.

Properties

Microsoft Graph beta exact-category

Properties is shown from beta metadata because a stable v1.0 schema is not available for this resource mapping.

Property Type Description
id string The unique identifier for an entity. Read-only.
labels informationProtectionLabel collection

JSON Representation

Microsoft Graph beta exact-category

JSON representation is shown from beta metadata because a stable v1.0 schema is not available for this resource mapping.

JSON representation
{
  "id": "String",
  "labels": [
    {
      "@type": "informationProtectionLabel",
      "id": "00000000-0000-0000-0000-000000000000"
    }
  ]
}

Relationships

Microsoft Graph beta schema-derived

Relationships is shown from beta metadata because a stable v1.0 schema is not available for this resource mapping.

Relationship Type Description
labels informationProtectionLabel collection Related labels data exposed by this resource.

Graph Methods

Delegated access App-only access
Exact Microsoft Learn match

Microsoft Graph v1.0 endpoints are mapped directly from refreshed Microsoft Learn permissions tables.

No API methods available for this version.

Exact Microsoft Learn match

Microsoft Graph beta endpoints are mapped directly from refreshed Microsoft Learn permissions tables.

Methods
GET /informationProtection/policy/labels
GET /informationProtection/policy/labels/{id}
GET /me/informationProtection/policy/labels
GET /me/informationProtection/policy/labels/{id}
GET /me/security/informationProtection/labelPolicySettings
GET /me/security/informationProtection/sensitivityLabels
GET /me/security/informationProtection/sensitivityLabels/{sensitivityLabelId}
GET /security/informationProtection/labelPolicySettings
GET /security/informationProtection/sensitivityLabels
GET /security/informationProtection/sensitivityLabels/{sensitivityLabelId}
GET /users/{id | user-principal-name}/informationProtection/policy/labels
GET /users/{id | user-principal-name}/informationProtection/policy/labels/{id}
GET /users/{usersId}/security/informationProtection/labelPolicySettings
GET /users/{usersId}/security/informationProtection/sensitivityLabels
GET /users/{usersId}/security/informationProtection/sensitivityLabels/{sensitivityLabelId}
POST /informationProtection/policy/labels/evaluateClassificationResults
POST /informationProtection/policy/labels/evaluateRemoval
POST /informationprotection/policy/labels/extractLabel
POST /me/informationProtection/policy/labels/evaluateApplication
POST /me/security/informationProtection/sensitivityLabels/evaluateApplication
POST /security/informationProtection/sensitivityLabels/evaluateApplication
POST /users/{id}/informationProtection/policy/labels/evaluateApplication
POST /users/{usersId}/security/informationProtection/sensitivityLabels/evaluateApplication
POST /users/{usersId}/security/informationProtection/sensitivityLabels/evaluateClassificationResults
POST /users/{usersId}/security/informationProtection/sensitivityLabels/evaluateRemoval
POST /users/{usersId}/security/informationProtection/sensitivityLabels/extractContentLabel
POST /users/me/security/informationProtection/sensitivityLabels/evaluateClassificationResults
POST /users/me/security/informationProtection/sensitivityLabels/evaluateRemoval
POST /users/me/security/informationProtection/sensitivityLabels/extractContentLabel
POST /users/security/informationProtection/sensitivityLabels/evaluateClassificationResults
POST /users/security/informationProtection/sensitivityLabels/evaluateRemoval
POST /users/security/informationProtection/sensitivityLabels/extractContentLabel
Exact Microsoft Learn PowerShell match

Microsoft Graph PowerShell v1.0 commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.

No deterministic PowerShell command map is available for this permission.

Browse PowerShell docs
Exact Microsoft Learn PowerShell match

Microsoft Graph PowerShell beta commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.

Commands
Get-MgBetaUserInformationProtectionPolicyLabel /me/informationProtection/policy/labels
informationProtectionLabel: listLabels (deprecated)
Get-MgBetaUserInformationProtectionPolicyLabel /me/informationProtection/policy/labels/{id}
Get informationProtectionLabel (deprecated)
Get-MgBetaUserSecurityInformationProtectionLabelPolicySetting /users/{usersId}/security/informationProtection/labelPolicySettings
Get informationProtectionPolicySetting
Get-MgBetaUserSecurityInformationProtectionSensitivityLabel /users/{usersId}/security/informationProtection/sensitivityLabels
List sensitivityLabels
Invoke-MgBetaExtractInformationProtectionPolicyLabel /informationprotection/policy/labels/extractLabel
informationProtectionLabel: extractLabel (deprecated)
Invoke-MgBetaExtractUserSecurityInformationProtectionSensitivityLabelContentLabel /users/{usersId}/security/informationProtection/sensitivityLabels/extractContentLabel
sensitivityLabel: extractContentLabel
Test-MgBetaInformationProtectionPolicyLabelApplication /me/informationProtection/policy/labels/evaluateApplication
informationProtectionLabel: evaluateApplication (deprecated)
Test-MgBetaInformationProtectionPolicyLabelClassificationResult /informationProtection/policy/labels/evaluateClassificationResults
informationProtectionLabel: evaluateClassificationResults (deprecated)
Test-MgBetaInformationProtectionPolicyLabelRemoval /informationProtection/policy/labels/evaluateRemoval
informationProtectionLabel: evaluateRemoval (deprecated)
Test-MgBetaUserSecurityInformationProtectionSensitivityLabelApplication /users/{usersId}/security/informationProtection/sensitivityLabels/evaluateApplication
sensitivityLabel: evaluateApplication
Test-MgBetaUserSecurityInformationProtectionSensitivityLabelClassificationResult /users/{usersId}/security/informationProtection/sensitivityLabels/evaluateClassificationResults
sensitivityLabel: evaluateClassificationResults
Test-MgBetaUserSecurityInformationProtectionSensitivityLabelRemoval /users/{usersId}/security/informationProtection/sensitivityLabels/evaluateRemoval
sensitivityLabel: evaluateRemoval

Code Examples

C# / .NET SDK
Get informationProtectionLabel (deprecated)
// Code snippets are only available for the latest version. Current version is 5.x

// To initialize your graphClient, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=csharp
var result = await graphClient.Me.InformationProtection.Policy.Labels["{informationProtectionLabel-id}"].GetAsync();
JavaScript
Get informationProtectionLabel (deprecated)
const options = {
	authProvider,
};

const client = Client.init(options);

let informationProtectionLabel = await client.api('/me/informationprotection/policy/labels/{id}')
	.version('beta')
	.get();
PowerShell
Get informationProtectionLabel (deprecated)
Import-Module Microsoft.Graph.Beta.Identity.SignIns
# A UPN can also be used as -UserId.
Get-MgBetaUserInformationProtectionPolicyLabel -UserId $userId -InformationProtectionLabelId $informationProtectionLabelId
Python
Get informationProtectionLabel (deprecated)
# Code snippets are only available for the latest version. Current version is 1.x
from msgraph_beta import GraphServiceClient
# To initialize your graph_client, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=python

result = await graph_client.me.information_protection.policy.labels.by_information_protection_label_id('informationProtectionLabel-id').get()

App Registration

1

Navigate to Azure Portal

Go to App registrations in Microsoft Entra admin center

2

Add API Permission

Select your app → API permissions → Add a permission → Microsoft Graph

3

Select Permission Type

Choose Delegated permissions and search for InformationProtectionPolicy.Read

4

Grant Admin Consent

Users can consent to this permission during sign-in.