PrivilegedAccess.ReadWrite.AzureAD
Allows the app to request and manage time-based assignment and just-in-time elevation (including scheduled elevation) of Azure AD built-in and custom administrative roles in your organization, without a signed-in user.
Permission Details
Read and write privileged access to Azure AD roles
Allows the app to request and manage time-based assignment and just-in-time elevation (including scheduled elevation) of Azure AD built-in and custom administrative roles in your organization, without a signed-in user.
854d9ab1-6657-4ec8-be45-823027bcd009
Read and write privileged access to Azure AD
Allows the app to request and manage just in time elevation (including scheduled elevation) of users to Azure AD built-in administrative roles, on behalf of signed-in users.
3c3c74f5-cdaa-4a97-b7e0-4e788bfcfb37
Properties
Properties is shown from beta metadata because a stable v1.0 schema is not available for this resource mapping.
| Property | Type | Description |
|---|---|---|
id |
String |
The id of the provider managed by PIM. |
displayName |
StringNullable |
The display name of the provider managed by PIM. |
resources |
governanceResource collection |
A collection of resources for the provider. |
roleAssignmentRequests |
governanceRoleAssignmentRequest collection |
A collection of role assignment requests for the provider. |
roleAssignments |
governanceRoleAssignment collection |
A collection of role assignments for the provider. |
roleDefinitions |
governanceRoleDefinition collection |
A collection of role definitions for the provider. |
roleSettings |
governanceRoleSetting collection |
A collection of role settings for the provider. |
JSON Representation
JSON representation is shown from beta metadata because a stable v1.0 schema is not available for this resource mapping.
{
"id": "String (identifier)",
"displayName": "String",
}
Relationships
Relationships is shown from beta metadata because a stable v1.0 schema is not available for this resource mapping.
| Relationship | Type | Description |
|---|---|---|
resources |
governanceResource collection |
A collection of resources for the provider. |
roleAssignments |
governanceRoleAssignment collection |
A collection of role assignments for the provider. |
roleDefinitions |
governanceRoleDefinition collection |
A collection of role definitions for the provider. |
roleAssignmentRequests |
governanceRoleAssignmentRequest collection |
A collection of role assignment requests for the provider. |
roleSettings |
governanceRoleSetting collection |
A collection of role settings for the provider. |
Graph Methods
Microsoft Graph v1.0 endpoints are mapped directly from refreshed Microsoft Learn permissions tables.
No API methods available for this version.
Microsoft Graph beta endpoints are mapped directly from refreshed Microsoft Learn permissions tables.
Microsoft Graph PowerShell v1.0 commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.
No deterministic PowerShell command map is available for this permission.
Browse PowerShell docsMicrosoft Graph PowerShell beta commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.
Code Examples
// Code snippets are only available for the latest version. Current version is 5.x
// To initialize your graphClient, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=csharp
await graphClient.PrivilegedAccess["{privilegedAccess-id}"].RoleAssignmentRequests["{governanceRoleAssignmentRequest-id}"].Cancel.PostAsync();
const options = {
authProvider,
};
const client = Client.init(options);
await client.api('/privilegedAccess/azureResources/roleAssignmentRequests/7c53453e-d5a4-41e0-8eb1-32d5ec8bfdee/cancel')
.version('beta')
.post();
Import-Module Microsoft.Graph.Beta.Identity.Governance
Stop-MgBetaPrivilegedAccessRoleAssignmentRequest -PrivilegedAccessId $privilegedAccessId -GovernanceRoleAssignmentRequestId $governanceRoleAssignmentRequestId
# Code snippets are only available for the latest version. Current version is 1.x
from msgraph_beta import GraphServiceClient
# To initialize your graph_client, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=python
await graph_client.privileged_access.by_privileged_access_id('privilegedAccess-id').role_assignment_requests.by_governance_role_assignment_request_id('governanceRoleAssignmentRequest-id').cancel.post()
App Registration
Navigate to Azure Portal
Go to App registrations in Microsoft Entra admin center
Add API Permission
Select your app → API permissions → Add a permission → Microsoft Graph
Select Permission Type
Choose Application permissions or delegated permissions and search for PrivilegedAccess.ReadWrite.AzureAD
Grant Admin Consent
Application permissions always require admin consent.