These are the applications which are using Azure AD Graph permissions in your tenant.
Перейти к файлу
Jeevan Desarda 77ff9b0360
Updating the Title
2021-07-28 13:32:59 -07:00
CODE_OF_CONDUCT.md CODE_OF_CONDUCT.md committed 2021-07-26 09:39:18 -07:00
Create-AppConsentGrantReportAzureAD.ps1 Create report for apps using AAD Graph permissions 2021-07-26 09:41:48 -07:00
LICENSE LICENSE committed 2021-07-26 09:39:18 -07:00
README.md Updating the Title 2021-07-28 13:32:59 -07:00
SECURITY.md SECURITY.md committed 2021-07-26 09:39:19 -07:00
SUPPORT.md SUPPORT.md committed 2021-07-26 09:39:20 -07:00

README.md

🚧Azure AD Graph Deprecation Toolkit 🚧

This PowerShell script lists applications in your tenant that use permissions for Azure AD Graph, which will be retired on 30 June 2022.

If you have applications that use Azure AD Graph permissions and actively call Azure AD Graph, please follow our Migration Guide to migrate your applications using Azure AD Graph to Microsoft Graph.

Prerequisites

You need to be an administrator in your tenant with at least Global Reader permissions.

Usage

.\Create-AppConsentGrantReport.ps1 -AdminUPN globalreader@contoso.onmicrosoft.com -Path .\output.xlsx

Parameters:

AdminUPN: The user principal name of an administrator in your tenant with at least Global Reader permissions.

Path: The path to output results to (in Excel format).

FAQs

Q: How do I find out if I have Global Reader access?

A: Log in to the Azure Portal, and navigate the Azure AD Users blade. Select your user and go to the Assigned Roles blade. In order to have sufficient permissions to run this script, you should have either a Global Reader or a Global Administrator role assigned to you.

Q: Can I use Azure AD Graph permissions to call Microsoft Graph?

A: No, you should use the corresponding permissions on Microsoft Graph. For more information, please refer to this article

Q: Does this script automatically remove my Azure AD Graph permissions in favor of MS Graph permissions?

A: No, this script gives you a list of applications that have Azure AD Graph permissions. You should review these applications, grant them the corresponding Microsoft Graph permissions, migrate their Azure AD Graph API calls to Microsoft Graph, and then remove these Azure AD Graph permissions. Our Migration Guide will help you with this process.

Contributing

This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.

When you submit a pull request, a CLA bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.

Trademarks

This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow Microsoft's Trademark & Brand Guidelines. Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party's policies.