ResourceSpecificPermissionGrant.ReadForUser.All
Allows the app to read all resource specific permissions granted on user accounts, without a signed-in user.
Permission Details
Read all resource specific permissions granted on user accounts
Allows the app to read all resource specific permissions granted on user accounts, without a signed-in user.
acfca4d5-f49f-40ed-9648-84068b474c73
Properties
Properties is shown from stable Microsoft Graph v1.0 metadata.
| Property | Type | Description |
|---|---|---|
clientId |
stringNullable |
ID of the Microsoft Entra app that has been granted access. Read-only. |
clientAppId |
stringNullable |
ID of the service principal of the Microsoft Entra app that has been granted access. Read-only. |
deletedDateTime |
dateTimeOffsetNullable |
Not used. |
id |
string |
The unique identifier of the resource-specific permission grant. Read-only. |
resourceAppId |
stringNullable |
ID of the Microsoft Entra app that is hosting the resource. Read-only. |
permissionType |
stringNullable |
The type of permission. The possible values are: Application, Delegated. Read-only. |
permission |
stringNullable |
The name of the resource-specific permission. Read-only. |
JSON Representation
JSON representation is shown from stable Microsoft Graph v1.0 metadata.
{
"id": "string (identifier)",
"deletedDateTime": "dateTimeOffset",
"clientId": "string",
"clientAppId": "string",
"resourceAppId": "string",
"permissionType": "string",
"permission": "string"
}
Relationships
Relationships metadata is not available for this permission mapping.
View resource documentationGraph Methods
Microsoft Graph v1.0 endpoints are mapped directly from refreshed Microsoft Learn permissions tables.
| Methods |
|---|
GET
/users/{user-id}/permissionGrants
|
Microsoft Graph beta endpoints are mapped directly from refreshed Microsoft Learn permissions tables.
| Methods |
|---|
GET
/users/{user-id}/permissionGrants
|
Microsoft Graph PowerShell v1.0 commands are not available from refreshed Microsoft Learn PowerShell snippets for this permission.
No deterministic PowerShell command map is available for this permission.
Browse PowerShell docsMicrosoft Graph PowerShell beta commands are not available from refreshed Microsoft Learn PowerShell snippets for this permission.
No deterministic PowerShell command map is available for this permission.
Browse PowerShell docsCode Examples
// Code snippets are only available for the latest version. Current version is 5.x
// To initialize your graphClient, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=csharp
var result = await graphClient.Users["{user-id}"].PermissionGrants.GetAsync();
const options = {
authProvider,
};
const client = Client.init(options);
let permissionGrants = await client.api('/users/2f39ffba-51ca-4d2d-a66f-a020a83ce208/permissionGrants')
.get();
Connect-MgGraph -Scopes "ResourceSpecificPermissionGrant.ReadForUser.All"
Invoke-MgGraphRequest -Method GET -Uri "https://graph.microsoft.com/v1.0/users/{id}/permissionGrants"
# Code snippets are only available for the latest version. Current version is 1.x
from msgraph import GraphServiceClient
# To initialize your graph_client, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=python
result = await graph_client.users.by_user_id('user-id').permission_grants.get()
App Registration
Navigate to Azure Portal
Go to App registrations in Microsoft Entra admin center
Add API Permission
Select your app → API permissions → Add a permission → Microsoft Graph
Select Permission Type
Choose Application permissions and search for ResourceSpecificPermissionGrant.ReadForUser.All
Grant Admin Consent
Application permissions always require admin consent.