PrivilegedAccess.Read.AzureAD
Allows the app to read time-based assignment and just-in-time elevation (including scheduled elevation) of Azure AD built-in and custom administrative roles in your organization, without a signed-in user.
Permission Details
Read privileged access to Azure AD roles
Allows the app to read time-based assignment and just-in-time elevation (including scheduled elevation) of Azure AD built-in and custom administrative roles in your organization, without a signed-in user.
4cdc2547-9148-4295-8d11-be0db1391d6b
Read privileged access to Azure AD
Allows the app to read time-based assignment and just-in-time elevation (including scheduled elevation) of Azure AD built-in and custom administrative roles, on behalf of the signed-in user.
b3a539c9-59cb-4ad5-825a-041ddbdc2bdb
Properties
Properties is shown from beta metadata because a stable v1.0 schema is not available for this resource mapping.
| Property | Type | Description |
|---|---|---|
id |
String |
The id of the provider managed by PIM. |
displayName |
StringNullable |
The display name of the provider managed by PIM. |
resources |
governanceResource collection |
A collection of resources for the provider. |
roleAssignmentRequests |
governanceRoleAssignmentRequest collection |
A collection of role assignment requests for the provider. |
roleAssignments |
governanceRoleAssignment collection |
A collection of role assignments for the provider. |
roleDefinitions |
governanceRoleDefinition collection |
A collection of role definitions for the provider. |
roleSettings |
governanceRoleSetting collection |
A collection of role settings for the provider. |
JSON Representation
JSON representation is shown from beta metadata because a stable v1.0 schema is not available for this resource mapping.
{
"id": "String (identifier)",
"displayName": "String",
}
Relationships
Relationships is shown from beta metadata because a stable v1.0 schema is not available for this resource mapping.
| Relationship | Type | Description |
|---|---|---|
resources |
governanceResource collection |
A collection of resources for the provider. |
roleAssignments |
governanceRoleAssignment collection |
A collection of role assignments for the provider. |
roleDefinitions |
governanceRoleDefinition collection |
A collection of role definitions for the provider. |
roleAssignmentRequests |
governanceRoleAssignmentRequest collection |
A collection of role assignment requests for the provider. |
roleSettings |
governanceRoleSetting collection |
A collection of role settings for the provider. |
Graph Methods
Microsoft Graph v1.0 endpoints are mapped directly from refreshed Microsoft Learn permissions tables.
No API methods available for this version.
Microsoft Graph beta endpoints are mapped directly from refreshed Microsoft Learn permissions tables.
Microsoft Graph PowerShell v1.0 commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.
No deterministic PowerShell command map is available for this permission.
Browse PowerShell docsMicrosoft Graph PowerShell beta commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.
Code Examples
// Code snippets are only available for the latest version. Current version is 5.x
// To initialize your graphClient, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=csharp
var result = await graphClient.RoleManagement.Directory.RoleScheduleInstances().GetAsRoleScheduleInstancesGetResponseAsync();
const options = {
authProvider,
};
const client = Client.init(options);
let roleScheduleInstances = await client.api('/roleManagement/directory/roleScheduleInstances(directoryScopeId='parameterValue',appScopeId='parameterValue',principalId='parameterValue',roleDefinitionId='parameterValue')')
.version('beta')
.get();
Import-Module Microsoft.Graph.Beta.Identity.Governance
Invoke-MgBetaScheduleRoleManagementDirectory -DirectoryScopeId $directoryScopeIdId -AppScopeId $appScopeIdId -PrincipalId $principalIdId -RoleDefinitionId $roleDefinitionIdId
from azure.identity import InteractiveBrowserCredential
import requests
credential = InteractiveBrowserCredential(
client_id="YOUR_CLIENT_ID",
tenant_id="YOUR_TENANT_ID"
)
token = credential.get_token("PrivilegedAccess.Read.AzureAD")
response = requests.get(
"https://graph.microsoft.com/v1.0/privilegedAccess/azureResources/resources/{id}/roleAssignmentRequests",
headers={"Authorization": f"Bearer {token.token}"}
)
print(response.json())
App Registration
Navigate to Azure Portal
Go to App registrations in Microsoft Entra admin center
Add API Permission
Select your app → API permissions → Add a permission → Microsoft Graph
Select Permission Type
Choose Application permissions or delegated permissions and search for PrivilegedAccess.Read.AzureAD
Grant Admin Consent
Application permissions always require admin consent.