ESC
Type to search...

PrivilegedAccess.Read.AzureAD

Export JSON
Export CSV
Copy URL
Print
ApplicationDelegated Read User Scope

Allows the app to read time-based assignment and just-in-time elevation (including scheduled elevation) of Azure AD built-in and custom administrative roles in your organization, without a signed-in user.

Permission data: April 6, 2026 at 4:06 AM UTC
Delegated Access App-Only Access

Permission Details

Application Permission

Read privileged access to Azure AD roles

Allows the app to read time-based assignment and just-in-time elevation (including scheduled elevation) of Azure AD built-in and custom administrative roles in your organization, without a signed-in user.

Delegated Permission Admin consent required

Read privileged access to Azure AD

Allows the app to read time-based assignment and just-in-time elevation (including scheduled elevation) of Azure AD built-in and custom administrative roles, on behalf of the signed-in user.

Properties

Microsoft Graph beta exact-category-docs

Properties is shown from beta metadata because a stable v1.0 schema is not available for this resource mapping.

Property Type Description
id String The id of the provider managed by PIM.
displayName StringNullable The display name of the provider managed by PIM.
resources governanceResource collection A collection of resources for the provider.
roleAssignmentRequests governanceRoleAssignmentRequest collection A collection of role assignment requests for the provider.
roleAssignments governanceRoleAssignment collection A collection of role assignments for the provider.
roleDefinitions governanceRoleDefinition collection A collection of role definitions for the provider.
roleSettings governanceRoleSetting collection A collection of role settings for the provider.

JSON Representation

Microsoft Graph beta exact-category-docs

JSON representation is shown from beta metadata because a stable v1.0 schema is not available for this resource mapping.

JSON representation
{
  "id": "String (identifier)",
  "displayName": "String",
}

Relationships

Microsoft Graph beta exact-category-docs

Relationships is shown from beta metadata because a stable v1.0 schema is not available for this resource mapping.

Relationship Type Description
resources governanceResource collection A collection of resources for the provider.
roleAssignments governanceRoleAssignment collection A collection of role assignments for the provider.
roleDefinitions governanceRoleDefinition collection A collection of role definitions for the provider.
roleAssignmentRequests governanceRoleAssignmentRequest collection A collection of role assignment requests for the provider.
roleSettings governanceRoleSetting collection A collection of role settings for the provider.

Graph Methods

Delegated access App-only access
Exact Microsoft Learn match

Microsoft Graph v1.0 endpoints are mapped directly from refreshed Microsoft Learn permissions tables.

No API methods available for this version.

Exact Microsoft Learn match

Microsoft Graph beta endpoints are mapped directly from refreshed Microsoft Learn permissions tables.

Methods
GET /privilegedAccess/azureResources/resources/{resourceId}/roleAssignmentRequests
GET /privilegedAccess/azureResources/roleAssignmentRequests?$filter=resourceId+eq+'{resourceId}'
GET /privilegedAccess/azureResources/roleAssignmentRequests?$filter=status/subStatus+eq+'PendingAdminDecision'
GET /privilegedAccess/azureResources/roleAssignmentRequests?$filter=subjectId+eq+'{myId}'
GET /roleManagement/directory/roleScheduleInstances(directoryScopeId='@directoryScopeId',appScopeId='@appScopeId',principalId='@principalId',roleDefinitionId='@roleDefinitionId')
GET /roleManagement/directory/roleSchedules(directoryScopeId='@directoryScopeId',appScopeId='@appScopeId',principalId='@principalId',roleDefinitionId='@roleDefinitionId')
Exact Microsoft Learn PowerShell match

Microsoft Graph PowerShell v1.0 commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.

No deterministic PowerShell command map is available for this permission.

Browse PowerShell docs
Exact Microsoft Learn PowerShell match

Microsoft Graph PowerShell beta commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.

Commands
Invoke-MgBetaScheduleRoleManagementDirectory /roleManagement/directory/roleScheduleInstances(directoryScopeId='@directoryScopeId',appScopeId='@appScopeId',principalId='@principalId',roleDefinitionId='@roleDefinitionId')
rbacApplication: roleScheduleInstances
Invoke-MgBetaScheduleRoleManagementDirectoryRole /roleManagement/directory/roleSchedules(directoryScopeId='@directoryScopeId',appScopeId='@appScopeId',principalId='@principalId',roleDefinitionId='@roleDefinitionId')
rbacApplication: roleSchedules

Code Examples

C# / .NET SDK
rbacApplication: roleScheduleInstances
// Code snippets are only available for the latest version. Current version is 5.x

// To initialize your graphClient, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=csharp
var result = await graphClient.RoleManagement.Directory.RoleScheduleInstances().GetAsRoleScheduleInstancesGetResponseAsync();
JavaScript
rbacApplication: roleScheduleInstances
const options = {
	authProvider,
};

const client = Client.init(options);

let roleScheduleInstances = await client.api('/roleManagement/directory/roleScheduleInstances(directoryScopeId='parameterValue',appScopeId='parameterValue',principalId='parameterValue',roleDefinitionId='parameterValue')')
	.version('beta')
	.get();
PowerShell
rbacApplication: roleScheduleInstances
Import-Module Microsoft.Graph.Beta.Identity.Governance

Invoke-MgBetaScheduleRoleManagementDirectory -DirectoryScopeId $directoryScopeIdId -AppScopeId $appScopeIdId -PrincipalId $principalIdId -RoleDefinitionId $roleDefinitionIdId
Python
from azure.identity import InteractiveBrowserCredential
import requests

credential = InteractiveBrowserCredential(
    client_id="YOUR_CLIENT_ID",
    tenant_id="YOUR_TENANT_ID"
)

token = credential.get_token("PrivilegedAccess.Read.AzureAD")
response = requests.get(
    "https://graph.microsoft.com/v1.0/privilegedAccess/azureResources/resources/{id}/roleAssignmentRequests",
    headers={"Authorization": f"Bearer {token.token}"}
)

print(response.json())

App Registration

1

Navigate to Azure Portal

Go to App registrations in Microsoft Entra admin center

2

Add API Permission

Select your app → API permissions → Add a permission → Microsoft Graph

3

Select Permission Type

Choose Application permissions or delegated permissions and search for PrivilegedAccess.Read.AzureAD

4

Grant Admin Consent

Application permissions always require admin consent.