Skip to content

Weekly Permissions sync 2026-04-01#1488

Closed
marabooy wants to merge 2 commits intomasterfrom
permissions-update/2026-04-01
Closed

Weekly Permissions sync 2026-04-01#1488
marabooy wants to merge 2 commits intomasterfrom
permissions-update/2026-04-01

Conversation

@marabooy
Copy link
Copy Markdown
Contributor

@marabooy marabooy commented Apr 1, 2026

Weekly Permissions sync 2026-04-01

@marabooy marabooy requested a review from a team as a code owner April 1, 2026 00:34
Copilot AI review requested due to automatic review settings April 1, 2026 00:34
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Weekly permissions sync updating the permissions catalog and provisioning metadata, primarily to expose previously-hidden permissions and to align path/permission mappings with updated Graph endpoints.

Changes:

  • Unhides and/or adds metadata for several permissions (e.g., AppCertTrustConfiguration., EntraBackup.) in provisioningInfo.json.
  • Updates permission definitions and endpoint path mappings in permissions.json (certificate authority configuration endpoints, correlations reporting endpoints, backup/restore protection unit endpoints, and new EntraBackup permissions).

Reviewed changes

Copilot reviewed 2 out of 2 changed files in this pull request and generated 4 comments.

File Description
permissions/new/provisioningInfo.json Updates permission visibility flags, renames AppGalleryIntegrationRequest permissions + resourceAppId, and adds IdentityNotifications permissions.
permissions/new/permissions.json Updates permission descriptions and pathSets (certificate authority config, correlations endpoints), adds EntraBackup permissions, and adjusts backup/restore + content processing endpoints.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment on lines +7561 to +7575
"IdentityNotifications.Read.All": [
{
"scheme": "DelegatedWork",
"environment": "PPE;public",
"isHidden": true,
"isEnabled": false,
"resourceAppId": "00000002-0000-0000-c000-000000000000"
},
{
"scheme": "Application",
"environment": "PPE;public",
"isHidden": true,
"isEnabled": false,
"resourceAppId": "00000002-0000-0000-c000-000000000000"
}
Copy link

Copilot AI Apr 1, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The newly added IdentityNotifications.* entries are missing the required "id" field (other permission entries include an "id" key even when the value is empty). This will likely break consumers expecting a consistent schema; add an "id" property for each scheme entry (use the correct GUIDs if known, or an empty string placeholder if not yet assigned).

Copilot uses AI. Check for mistakes.
Comment on lines 5051 to +5055
"/reports/conditionalaccess/unprotectedapps": "least=DelegatedWork,Application",
"/reports/correlations": "",
"/reports/correlations/{id}": "",
"/reports/correlations/{id}/identities": "",
"/reports/correlations/{id}/identities/{id}": "",
Copy link

Copilot AI Apr 1, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The /reports/correlations* endpoints were introduced as replacements for /reports/identityCorrelation* but their path values are now empty strings. Previously these endpoints carried an explicit "least=DelegatedWork,Application" mapping; consider preserving that mapping here as well to avoid changing downstream permission-resolution behavior or documentation.

Copilot uses AI. Check for mistakes.
Comment on lines 12424 to 12432
"POST"
],
"paths": {
"/me/dataSecurityAndGovernance/contentUploadSession": "",
"/me/dataSecurityAndGovernance/processContent": "",
"/security/dataSecurityAndGovernance/processContentAsync": "least=Application,DelegatedWork",
"/users/{userId}/dataSecurityAndGovernance/contentUploadSession": "",
"/users/{userId}/dataSecurityAndGovernance/processContent": ""
}
Copy link

Copilot AI Apr 1, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In Content.Process.All and Content.Process.User, the new "/me/dataSecurityAndGovernance/contentUploadSession" path is in a pathSet whose schemeKeys include "Application" and the path value is empty (i.e., not restricted). Since /me endpoints are delegated-only in practice, restrict these /me paths to DelegatedWork (e.g., by setting least=DelegatedWork or moving them into a DelegatedWork-only pathSet) to avoid implying app-only support.

Copilot uses AI. Check for mistakes.
Comment on lines +23066 to +23072
"Application": {
"adminDisplayName": "Read Preview jobs and snapshots",
"adminDescription": "Allows the app to list the all the snapshots, jobs and enumerate the changes of a specific preview job, on behalf of the signed-in user.",
"userDisplayName": "Read Preview jobs and snapshots",
"userDescription": "Allows the app to list the all the snapshots, jobs and enumerate the changes of a specific preview job, on your behalf.",
"requiresAdminConsent": true,
"privilegeLevel": 4
Copy link

Copilot AI Apr 1, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The Application-scheme descriptions for EntraBackup.Read.All reference a signed-in user ("on behalf of the signed-in user" / "on your behalf"), which is inconsistent with other Application permissions and misleading for app-only flows. Update the Application admin/user description fields to reflect app-only behavior (e.g., "without a signed-in user") or remove user-facing fields if not applicable.

Copilot uses AI. Check for mistakes.
@jasonjoh jasonjoh closed this Apr 2, 2026
@jasonjoh jasonjoh deleted the permissions-update/2026-04-01 branch April 2, 2026 14:22
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants