ESC
Type to search...

RoleManagementAlert.ReadWrite.Directory

Export JSON
Export CSV
Copy URL
Print
ApplicationDelegated Read/Write User Scope

Allows the app to read and manage all role-based access control (RBAC) alerts for your company's directory, without a signed-in user. This includes managing alert settings, initiating alert scans, dismissing alerts, remediating alert incidents, and reading alert statuses, alert definitions, alert configurations and incidents that lead to an alert.

Permission data: April 6, 2026 at 4:06 AM UTC
Delegated Access App-Only Access

Permission Details

Application Permission

Read all alert data, configure alerts, and take actions on all alerts for your company's directory

Allows the app to read and manage all role-based access control (RBAC) alerts for your company's directory, without a signed-in user. This includes managing alert settings, initiating alert scans, dismissing alerts, remediating alert incidents, and reading alert statuses, alert definitions, alert configurations and incidents that lead to an alert.

Delegated Permission Admin consent required

Read all alert data, configure alerts, and take actions on all alerts for your company's directory

Allows the app to read and manage the role-based access control (RBAC) alerts for your company's directory, on behalf of the signed-in user. This includes managing alert settings, initiating alert scans, dismissing alerts, remediating alert incidents, and reading alert statuses, alert definitions, alert configurations and incidents that lead to an alert.

Properties

Microsoft Graph beta exact-category-docs

Properties is shown from beta metadata because a stable v1.0 schema is not available for this resource mapping.

Property Type Description
id String Unique identifier of an alert. Inherited from entity.
alertConfigurations unifiedRoleManagementAlertConfiguration collection The various configurations of an alert for Microsoft Entra roles. The configurations are predefined and can't be created or deleted, but some of the configurations can be modified.
alertDefinitions unifiedRoleManagementAlertDefinition collection Defines an alert, its impact, and measures to mitigate or prevent it.
alerts unifiedRoleManagementAlert collection Represents the alert entity.
operations longRunningOperation collection Represents operations on resources that take a long time to complete and can run in the background until completion.

JSON Representation

Microsoft Graph beta exact-category-docs

JSON representation is shown from beta metadata because a stable v1.0 schema is not available for this resource mapping.

JSON representation
{
  "@odata.type": "#microsoft.graph.roleManagementAlert",
  "id": "String (identifier)"
}

Relationships

Microsoft Graph beta exact-category-docs

Relationships is shown from beta metadata because a stable v1.0 schema is not available for this resource mapping.

Relationship Type Description
alertConfigurations unifiedRoleManagementAlertConfiguration collection The various configurations of an alert for Microsoft Entra roles. The configurations are predefined and can't be created or deleted, but some of the configurations can be modified.
alertDefinitions unifiedRoleManagementAlertDefinition collection Defines an alert, its impact, and measures to mitigate or prevent it.
alerts unifiedRoleManagementAlert collection Represents the alert entity.
operations longRunningOperation collection Represents operations on resources that take a long time to complete and can run in the background until completion.

Graph Methods

Delegated access App-only access
Exact Microsoft Learn match

Microsoft Graph v1.0 endpoints are mapped directly from refreshed Microsoft Learn permissions tables.

No API methods available for this version.

Exact Microsoft Learn match

Microsoft Graph beta endpoints are mapped directly from refreshed Microsoft Learn permissions tables.

Methods
GET /identityGovernance/roleManagementAlerts/alertConfigurations?$filter=scopeId eq 'scopeId' and scopeType eq 'scopeType'
GET /identityGovernance/roleManagementAlerts/alertConfigurations/{unifiedRoleManagementAlertConfigurationId}
GET /identityGovernance/roleManagementAlerts/alertDefinitions?$filter=scopeId eq 'scopeId' and scopeType eq 'scopeType'
GET /identityGovernance/roleManagementAlerts/alertDefinitions/{unifiedRoleManagementAlertDefinitionId}
GET /identityGovernance/roleManagementAlerts/alerts?$filter=scopeId eq 'scopeId' and scopeType eq 'scopeType'
GET /identityGovernance/roleManagementAlerts/alerts/{unifiedRoleManagementAlertId}
GET /identityGovernance/roleManagementAlerts/alerts/{unifiedRoleManagementAlertId}/alertIncidents
GET /identityGovernance/roleManagementAlerts/alerts/{unifiedRoleManagementAlertId}/alertIncidents/{unifiedRoleManagementAlertIncidentId}
GET /identityGovernance/roleManagementAlerts/operations/{longRunningOperationId}
GET /users/{id | userPrincipalName}/authentication/operations/{id}
POST /identityGovernance/roleManagementAlerts/alerts/{alertId}/refresh
POST /identityGovernance/roleManagementAlerts/alerts/{unifiedRoleManagementAlertId}/alertIncidents/{unifiedRoleManagementAlertIncidentId}/remediate
POST /identityGovernance/roleManagementAlerts/alerts/refresh
PATCH /identityGovernance/roleManagementAlerts/alertConfigurations/{unifiedRoleManagementAlertConfigurationId}
PATCH /identityGovernance/roleManagementAlerts/alerts/{unifiedRoleManagementAlertId}
Exact Microsoft Learn PowerShell match

Microsoft Graph PowerShell v1.0 commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.

No deterministic PowerShell command map is available for this permission.

Browse PowerShell docs
Exact Microsoft Learn PowerShell match

Microsoft Graph PowerShell beta commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.

Commands
Get-MgBetaExternalIndustryDataOperation /identityGovernance/roleManagementAlerts/operations/{longRunningOperationId}
Get longRunningOperation
Get-MgBetaIdentityGovernanceRoleManagementAlert /identityGovernance/roleManagementAlerts/alerts?$filter=scopeId eq 'scopeId' and scopeType eq 'scopeType'
List alerts
Get-MgBetaIdentityGovernanceRoleManagementAlert /identityGovernance/roleManagementAlerts/alerts/{unifiedRoleManagementAlertId}
Get unifiedRoleManagementAlert
Get-MgBetaIdentityGovernanceRoleManagementAlertConfiguration /identityGovernance/roleManagementAlerts/alertConfigurations?$filter=scopeId eq 'scopeId' and scopeType eq 'scopeType'
List alertConfigurations
Get-MgBetaIdentityGovernanceRoleManagementAlertConfiguration /identityGovernance/roleManagementAlerts/alertConfigurations/{unifiedRoleManagementAlertConfigurationId}
Get unifiedRoleManagementAlertConfiguration
Get-MgBetaIdentityGovernanceRoleManagementAlertDefinition /identityGovernance/roleManagementAlerts/alertDefinitions?$filter=scopeId eq 'scopeId' and scopeType eq 'scopeType'
List alertDefinitions
Get-MgBetaIdentityGovernanceRoleManagementAlertDefinition /identityGovernance/roleManagementAlerts/alertDefinitions/{unifiedRoleManagementAlertDefinitionId}
Get unifiedRoleManagementAlertDefinition
Get-MgBetaIdentityGovernanceRoleManagementAlertIncident /identityGovernance/roleManagementAlerts/alerts/{unifiedRoleManagementAlertId}/alertIncidents
List alertIncidents
Get-MgBetaIdentityGovernanceRoleManagementAlertIncident /identityGovernance/roleManagementAlerts/alerts/{unifiedRoleManagementAlertId}/alertIncidents/{unifiedRoleManagementAlertIncidentId}
Get unifiedRoleManagementAlertIncident
Get-MgBetaIdentityGovernanceRoleManagementAlertOperation /identityGovernance/roleManagementAlerts/operations/{longRunningOperationId}
Get longRunningOperation
Get-MgBetaUserAuthenticationOperation /identityGovernance/roleManagementAlerts/operations/{longRunningOperationId}
Get longRunningOperation
Update-MgBetaIdentityGovernanceRoleManagementAlert /identityGovernance/roleManagementAlerts/alerts/refresh
unifiedRoleManagementAlert: refresh
Update-MgBetaIdentityGovernanceRoleManagementAlertConfiguration /identityGovernance/roleManagementAlerts/alertConfigurations/{unifiedRoleManagementAlertConfigurationId}
Update unifiedRoleManagementAlertConfiguration

Code Examples

C# / .NET SDK
unifiedRoleManagementAlert: refresh
// Code snippets are only available for the latest version. Current version is 5.x

// Dependencies
using Microsoft.Graph.Beta.IdentityGovernance.RoleManagementAlerts.Alerts.Refresh;

var requestBody = new RefreshPostRequestBody
{
	ScopeId = "/",
	ScopeType = "DirectoryRole",
};

// To initialize your graphClient, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=csharp
await graphClient.IdentityGovernance.RoleManagementAlerts.Alerts.Refresh.PostAsync(requestBody);
JavaScript
unifiedRoleManagementAlert: refresh
const options = {
	authProvider,
};

const client = Client.init(options);

const refresh = {
    scopeId: '/',
    scopeType: 'DirectoryRole'
};

await client.api('/identityGovernance/roleManagementAlerts/alerts/refresh')
	.version('beta')
	.post(refresh);
PowerShell
unifiedRoleManagementAlert: refresh
Import-Module Microsoft.Graph.Beta.Identity.Governance

Update-MgBetaIdentityGovernanceRoleManagementAlert -UnifiedRoleManagementAlertId $unifiedRoleManagementAlertId
Python
unifiedRoleManagementAlert: refresh
# Code snippets are only available for the latest version. Current version is 1.x
from msgraph_beta import GraphServiceClient
from msgraph_beta.generated.identitygovernance.rolemanagementalerts.alerts.refresh.refresh_post_request_body import RefreshPostRequestBody
# To initialize your graph_client, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=python
request_body = RefreshPostRequestBody(
	scope_id = "/",
	scope_type = "DirectoryRole",
)

await graph_client.identity_governance.role_management_alerts.alerts.refresh.post(request_body)

App Registration

1

Navigate to Azure Portal

Go to App registrations in Microsoft Entra admin center

2

Add API Permission

Select your app → API permissions → Add a permission → Microsoft Graph

3

Select Permission Type

Choose Application permissions or delegated permissions and search for RoleManagementAlert.ReadWrite.Directory

4

Grant Admin Consent

Application permissions always require admin consent.