- Article
- 6 minutes to read
In this article, you'll learn how to grant tenant-wide admin consent to an application in Azure Active Directory (Azure AD). To understand how individual users consent, see Configure how end-users consent to applications.
When you grant tenant-wide admin consent to an application, you give the application access on behalf of the whole organization to the permissions requested. Granting admin consent on behalf of an organization is a sensitive operation, potentially allowing the application's publisher access to significant portions of your organization's data, or the permission to do highly privileged operations. Examples of such operations might be role management, full access to all mailboxes or all sites, and full user impersonation. Carefully review the permissions that the application is requesting before you grant consent.
By default, granting tenant-wide admin consent to an application will allow all users to access the application unless otherwise restricted. To restrict which users can sign-in to an application, configure the app to require user assignment and then assign users or groups to the application.
Granting tenant-wide admin consent may revoke any permissions that had previously been granted tenant-wide for that application. Permissions that have previously been granted by users on their own behalf won't be affected.
Prerequisites
Granting tenant-wide admin consent requires you to sign in as a user that is authorized to consent on behalf of the organization.
To grant tenant-wide admin consent, you need:
- An Azure AD user account with one of the following roles:
- Global Administrator or Privileged Role Administrator, for granting consent for apps requesting any permission, for any API.
- Cloud Application Administrator or Application Administrator, for granting consent for apps requesting any permission for any API, except Azure AD Graph or Microsoft Graph app roles (application permissions).
- A custom directory role that includes the permission to grant permissions to applications, for the permissions required by the application.
Grant tenant-wide admin consent in Enterprise apps
You can grant tenant-wide admin consent through Enterprise applications if the application has already been provisioned in your tenant. For example, an app could be provisioned in your tenant if at least one user has already consented to the application. For more information, see How and why applications are added to Azure Active Directory.
To grant tenant-wide admin consent to an app listed in Enterprise applications:
Sign in to the Azure portal with one of the roles listed in the prerequisites section.
Select Azure Active Directory, and then select Enterprise applications.
Select the application to which you want to grant tenant-wide admin consent, and then select Permissions.
Carefully review the permissions that the application requires. If you agree with the permissions the application requires, select Grant admin consent.
Grant admin consent in App registrations
For applications your organization has developed, or which are registered directly in your Azure AD tenant, you can also grant tenant-wide admin consent from App registrations in the Azure portal.
To grant tenant-wide admin consent from App registrations:
- Sign in to the Azure portal with one of the roles listed in the prerequisites section.
- Select Azure Active Directory, and then select App registrations.
- Select the application to which you want to grant tenant-wide admin consent.
- Select API permissions.
- Carefully review the permissions that the application requires. If you agree, select Grant admin consent.
Construct the URL for granting tenant-wide admin consent
When granting tenant-wide admin consent using either method described above, a window opens from the Azure portal to prompt for tenant-wide admin consent. If you know the client ID (also known as the application ID) of the application, you can build the same URL to grant tenant-wide admin consent.
The tenant-wide admin consent URL follows the following format:
https://login.microsoftonline.com/{tenant-id}/adminconsent?client_id={client-id}
where:
{client-id}
is the application's client ID (also known as app ID).{tenant-id}
is your organization's tenant ID or any verified domain name.
As always, carefully review the permissions an application requests before granting consent.
In the following example, you'll grant delegated permissions defined by a resource enterprise application to a client enterprise application on behalf of all users.
In the example, the resource enterprise application is Microsoft Graph of object ID 7ea9e944-71ce-443d-811c-71e8047b557a
. The Microsoft Graph defines the delegated permissions, User.Read.All
and Group.Read.All
. The consentType is AllPrincipals
, indicating that you're consenting on behalf of all users in the tenant. The object ID of the client enterprise application is b0d9b9e3-0ecf-4bfd-8dab-9273dd055a941
.
Caution
Be careful! Permissions granted programmatically are not subject to review or confirmation. They take effect immediately.
Grant admin consent for delegated permissions
Connect to Microsoft Graph PowerShell:
Connect-MgGraph -Scopes "Application.ReadWrite.All", "DelegatedPermissionGrant.ReadWrite.All"
Retrieve all the delegated permissions defined by Microsoft graph (the resource application) in your tenant application. Identify the delegated permissions that you'll grant the client application. In this example, the delegation permissions are
User.Read.All
andGroup.Read.All
Get-MgServicePrincipal -Filter "displayName eq 'Microsoft Graph'" -Property Oauth2PermissionScopes | Select -ExpandProperty Oauth2PermissionScopes | fl
Grant the delegated permissions to the client enterprise application by running the following request.
(Video) Microsoft Entra - Permission Management
$params = @{ "ClientId" = "b0d9b9e3-0ecf-4bfd-8dab-9273dd055a94" "ConsentType" = "AllPrincipals" "ResourceId" = "7ea9e944-71ce-443d-811c-71e8047b557a" "Scope" = "User.Read.All Group.Read.All"}New-MgOauth2PermissionGrant -BodyParameter $params | Format-List Id, ClientId, ConsentType, ResourceId, Scope
- Confirm that you've granted tenant wide admin consent by running the following request.
Get-MgOauth2PermissionGrant-Filter "clientId eq 'b0d9b9e3-0ecf-4bfd-8dab-9273dd055a94' consentType eq 'AllPrincipals'"
Grant admin consent for application permissions
In the following example, you grant the Microsoft Graph enterprise application (the principal of ID b0d9b9e3-0ecf-4bfd-8dab-9273dd055a94
) an app role (application permission) of ID df021288-bdef-4463-88db-98f22de89214
that's exposed by a resource enterprise application of ID 7ea9e944-71ce-443d-811c-71e8047b557a
.
Connect to Microsoft Graph PowerShell:
Connect-MgGraph -Scopes "Application.ReadWrite.All", "AppRoleAssignment.ReadWrite.All"
Retrieve the app roles defined by Microsoft graph in your tenant. Identify the app role that you'll grant the client enterprise application. In this example, the app role ID is
df021288-bdef-4463-88db-98f22de89214
.Get-MgServicePrincipal -Filter "displayName eq 'Microsoft Graph'" -Property AppRoles | Select -ExpandProperty appRoles |fl
Grant the application permission (app role) to the client enterprise application by running the following request.
$params = @{ "PrincipalId" ="b0d9b9e3-0ecf-4bfd-8dab-9273dd055a94" "ResourceId" = "2cab1707-656d-40cc-8522-3178a184e03d" "AppRoleId" = "df021288-bdef-4463-88db-98f22de89214"}New-MgServicePrincipalAppRoleAssignment -ServicePrincipalId '2cab1707-656d-40cc-8522-3178a184e03d' -BodyParameter $params | Format-List Id, AppRoleId, CreatedDateTime, PrincipalDisplayName, PrincipalId, PrincipalType, ResourceDisplayName
Use Graph Explorer to grant both delegated and application permissions.
Grant admin consent for delegated permissions
In the following example, you'll grant delegated permissions defined by a resource enterprise application to a client enterprise application on behalf of all users.
In the example, the resource enterprise application is Microsoft Graph of object ID 7ea9e944-71ce-443d-811c-71e8047b557a
. The Microsoft Graph defines the delegated permissions, User.Read.All
and Group.Read.All
. The consentType is AllPrincipals
, indicating that you're consenting on behalf of all users in the tenant. The object ID of the client enterprise application is b0d9b9e3-0ecf-4bfd-8dab-9273dd055a941
.
Caution
Be careful! Permissions granted programmatically are not subject to review or confirmation. They take effect immediately.
Retrieve all the delegated permissions defined by Microsoft graph (the resource application) in your tenant application. Identify the delegated permissions that you'll grant the client application. In this example, the delegation permissions are
User.Read.All
andGroup.Read.All
GET https://graph.microsoft.com/v1.0/servicePrincipals?$filter=displayName eq 'Microsoft Graph'&$select=id,displayName,appId,oauth2PermissionScopes
Grant the delegated permissions to the client enterprise application by running the following request.
POST https://graph.microsoft.com/v1.0/oauth2PermissionGrantsRequest body{ "clientId": "b0d9b9e3-0ecf-4bfd-8dab-9273dd055a94", "consentType": "AllPrincipals", "resourceId": "7ea9e944-71ce-443d-811c-71e8047b557a", "scope": "User.Read.All Group.Read.All"}
Confirm that you've granted tenant wide admin consent by running the following request.
GET https://graph.microsoft.com/v1.0/oauth2PermissionGrants?$filter=clientId eq 'b0d9b9e3-0ecf-4bfd-8dab-9273dd055a94' and consentType eq 'AllPrincipals'
Grant admin consent for application permissions
In the following example, you grant the Microsoft Graph enterprise application (the principal of ID b0d9b9e3-0ecf-4bfd-8dab-9273dd055a94
) an app role (application permission) of ID df021288-bdef-4463-88db-98f22de89214
that's exposed by a resource enterprise application of ID 7ea9e944-71ce-443d-811c-71e8047b557a
.
Retrieve the app roles defined by Microsoft graph in your tenant. Identify the app role that you'll grant the client enterprise application. In this example, the app role ID is
df021288-bdef-4463-88db-98f22de89214
GET https://graph.microsoft.com/v1.0/servicePrincipals?$filter=displayName eq 'Microsoft Graph'&$select=id,displayName,appId,appRoles
Grant the application permission (app role) to the client enterprise application by running the following request.
POST https://graph.microsoft.com/v1.0/servicePrincipals/7ea9e944-71ce-443d-811c-71e8047b557a/appRoleAssignedToRequest body{ "principalId": "b0d9b9e3-0ecf-4bfd-8dab-9273dd055a94", "resourceId": "7ea9e944-71ce-443d-811c-71e8047b557a", "appRoleId": "df021288-bdef-4463-88db-98f22de89214"}
Next steps
Configure how end-users consent to applications
Configure the admin consent workflow
FAQs
How do I grant admin consent in Azure app? ›
Grant admin consent in App registrations
Select Azure Active Directory, and then select App registrations. Select the application to which you want to grant tenant-wide admin consent. Select API permissions. Carefully review the permissions that the application requires.
Enable the admin consent workflow
Select Enterprise applications. Under Security, select Consent and permissions. Under Manage, select Admin consent settings. Under Admin consent requests, select Yes for Users can request admin consent to apps they are unable to consent to .
User consent flow is when an application developer directs users to the authorization endpoint with the intent to record consent for only the current user. Admin consent flow is when an application developer directs users to the admin consent endpoint with the intent to record consent for the entire tenant.
How do I add permissions to Azure Enterprise Application? ›- Sign in to the Azure portal using one of the roles listed in the prerequisites section.
- Select Azure Active Directory, and then select Enterprise applications.
- Select the application that you want to restrict access to.
- Select Permissions.
- Click on Start and select All apps, locate the app, right click on it and select Open file location.
- Right click on the setup file of the app and select "Properties".
- Select "Compatibility" Tab.
- Check the option 'Run this program as an administrator'.
- Click on Apply and OK to save the changes.
Right-click an application in the right pane, and choose Properties. Select the Access Permissions tab. To add user groups, click Add. In the Add/Edit User Group dialog box, navigate to the user group.
What is admin consent required? ›Admin consent is required when an app needs access to certain high-privilege permissions. It ensures that administrators have some additional controls before authorizing apps or users to access highly privileged data from the organization.
How do I grant permission to an app in Office 365? ›In the Microsoft 365 admin center, go to the Settings > Org settings > Services page, and then select User consent to apps. On the User consent to apps page, select the option to turn user consent on or off.
Why does it say your administrator permission? ›The error message is usually displayed when any of the following scenario is true: a) You don't have permission to access the file, b) The file you are trying to access is corrupt, c) If you are using any third party security software, it may be blocking the file.
What are application consent permissions? ›So what is Application Consent, Application consent is a way to grant permissions to Applications to access your data that they need to perform their specific Task.
What is the difference between delegated permissions and application permissions? ›
Delegated permissions, also called scopes, allow the application to act on behalf of the signed-in user. Application permissions, also called app roles, allow the app to access data on its own, without a signed-in user.
What is the difference between consent and permission? ›Consent is actively and explicitly given or not given to you by your contacts. Permission is calculated based on actions taken by your contacts and then applying the applicable regulations and your company's privacy policies.
How do I authorize my application in Azure? ›In the Azure portal menu, select Resource groups, or search for and select Resource groups from any page. In Resource groups, find and select your resource group. In Overview, select your app's management page. On your app's left menu, select Authentication, and then click Add identity provider.
How do I grant admin rights to Azure AD? ›Sign in to the Azure portal as a Global Administrator. Browse to Azure Active Directory > Devices > Device settings. Select Manage Additional local administrators on all Azure AD joined devices. Select Add assignments then choose the other administrators you want to add and select Add.
What is the users can consent to apps accessing company data on their behalf setting? ›Enabling “Users can consent to apps accessing company data on their behalf” will allow regular users assigned to the app to sign into existing service principals. It does not grant users the right to create new service principals (i.e. other applications you haven't approved).
How can I enable administrator account without admin rights? ›Using a command prompt
Open “Run” with [Windows] + [R]. Type “cmd” and press [Ctrl] + [Shift] + [Enter]. Type “net user administrator /active:yes”. The administrator account is now activated.
- When you've located the file, right-click it to open its context menu. ...
- Navigate to the "Compatibility" tab. ...
- Check the option next to "Run this Program as Administrator."
- To apply this new choice, click "Apply" and then "OK" to exit the window.
In Windows 11, use the Privacy page to choose which apps can use a particular feature. Select Start > Settings > Privacy & security. Select an App permission (for example, Location) then choose which apps can access it. The Privacy page won't list apps with permission to use all system resources.
How do you create user grant and permission? ›The GRANT statement allows you to set MySQL access permissions using the following syntax: mysql> GRANT privilege ON privilege_level TO account_name; Type the following to grant `SELECT` and `INSERT` privileges to a local user on the `strongdm` database: mysql> GRANT SELECT, INSERT ON strongdm.
How do I give permission to an app from unknown sources on my computer? ›- From a Home screen, swipe up or down from the center of the display to access the apps screen.
- Navigate: Settings. Apps. .
- Tap. Menu icon. (upper-right).
- Tap. Special access. .
- Tap. Install unknown apps. .
- Select the unknown app then tap the. Allow from this source switch. to turn on or off .
What does it mean to grant Access? ›
idiom. : to give/refuse permission to see. He was granted/denied access to the report.
What is admin consent delegated permissions? ›Delegated permissions allow the application to act on behalf of a user who was signed into the application at some point. Understand the permissions that are being requested. The permissions requested by the application are listed in the consent prompt.
How do I give admin rights to a user in Office 365? ›- In the admin center, go to Role assignments. ...
- Select the admin role that you want to assign the user to.
- Select Assigned admins > Add.
- Type the user's display name or username, and then select the user from the list of suggestions.
- Add multiple users until you're done.
- Navigate to Apps. Navigate to Settings, and then tap Apps.
- Navigate to Special access. Tap More options (the three vertical dots), and then tap Special access.
- Tap Apps that can appear on top or Draw over other apps.
Also make sure that the Administrator account rights are Enabled: -Click Start and type command in the Taskbar search field. -Click Run as Administrator, type net user administrator /active:yes, and press enter. Wait for confirmation and restart.
What are the 3 types of permissions? ›Permission Types
Files and directories can have three types of permissions: read, write, and execute: Someone with read permission may read the contents of a file, or list the contents of a directory.
Access permissions include read, write, and none.
What are two key types of access permissions? ›Rule-based and role-based are two types of access control models. The two systems differ in how access is assigned to specific people in your building. Note: Both rule-based and role-based access control are represented with the acronym “RBAC.” For simplicity, we will only discuss RBAC systems using their full names.
What permissions should I allow? ›Only give your Android apps permission to access what they need to access on your device to provide the functionality you require from them. For example, it's natural that your weather app or navigation app will need access to your location to function properly.
What is the difference between permissions rights and privileges? ›Simply put, privileges are assigned permissions. When you assign a permission to a user, you are granting them a privilege. If you assign a user the permission to read a document, you are granting them the privilege to read that document.
Which permissions are automatically granted by system? ›
By default, an Android app starts with zero permissions granted to it. When the app needs to use any of the protected features of the device (sending network requests, accessing the camera, sending an SMS, etc) it must obtain the appropriate permission from the user to do so.
What are the 4 types of consent? ›Types of consent include implied consent, express consent, informed consent and unanimous consent.
How do you prove consent? ›You know you have consent when the other person has clearly said yes — without being pressured — and has given you permission to do something. Here are examples of what consent looks like: Each person is engaging in sexual activity enthusiastically, after agreeing to have sex.
How do you write consent permission? ›State your purpose.
Begin with a direct statement clearly stating the letter's purpose. Include the full names of yourself, your child, and the person you are granting permission to. If the child has another custodian or parent, write the letter together if possible.
Manage consent requests to apps through admin consent workflow in Azure Active Directory - Training. Configure the admin consent workflow to enable users to request admin consent right from the screen. Designated reviewers view and respond to the requests through the Azure portal. Documentation.
What is the difference between authentication and authorization in Azure? ›Authentication is the process of proving you are who you say you are. Authentication is sometimes shortened to AuthN. Microsoft identity platform implements the OpenID Connect protocol for handling authentication. Authorization is the act of granting an authenticated party permission to do something.
How to handle user authentication in web application using Azure AD? ›- Users go to the web app and select Sign-in.
- The app initiates an authentication request and redirects users to Azure AD B2C.
- Users sign up or sign in and reset the password. ...
- After users sign in successfully, Azure AD B2C returns an ID token to the app.
Enable the admin consent workflow
Search for and select Azure Active Directory. Select Enterprise applications. Under Security, select Consent and permissions. Under Manage, select Admin consent settings.
User consent flow is when an application developer directs users to the authorization endpoint with the intent to record consent for only the current user. Admin consent flow is when an application developer directs users to the admin consent endpoint with the intent to record consent for the entire tenant.
Do apps require permission to access data from apps? ›On both Android and iPhone, apps require permissions to access sensitive data on your phone. If a developer makes an app that relies on having your contacts, for example, they must add a permission request for that access into the app's code.
Can apps access data without permission? ›
An app accesses the data only on your device and it is not sent off your device. For example, if you provide an app permission to access your location, but it only uses that data to provide app functionality on your device and does not send it to its server, it does not need to disclose that data as collected.
Why do apps ask for access to personal information? ›When you download apps, they often ask for permission to access personal information like contacts, your location, or even your camera. They may need this information to make the app work, but they also may share this information with other companies.
How do I approve administrator permissions in Windows 10? ›- your User profile.
- Right click on your User profile and select Properties.
- Click the Security tab, under Group or user names menu, select your user name and click on Edit.
- Click on Full control check box under Permissions for authenticated users and click on Apply and OK.
Go to Security Settings > Local Policies > Security Options and disable the User Account Control: Run all administrators in the Admin Approval Mode policy.
How do I check administrator permissions? ›Select Start, and select Control Panel. In the Control Panel window, select User Accounts and Family Safety > User Accounts > Manage User Accounts. In the User Accounts window, select Properties and the Group Membership tab. Make sure Administrator is selected.
How do I approve a request on Microsoft app? ›- If you haven't done so, follow the preceding steps to view pending requests.
- Select APPROVE on the request that you want to approve.
- (Optional) select Add comment (optional). Enter a comment on the Add comment screen.
- Select CONFIRM in the upper-right corner.
- Access the Properties dialog box.
- Select the Security tab. ...
- Click Edit.
- In the Group or user name section, select the user(s) you wish to set permissions for.
- In the Permissions section, use the checkboxes to select the appropriate permission level.
- Click Apply.
- Click Okay.
Check file/folder permissions
Right-click the file/folder and select Properties from the context menu. Go to the Security tab. Select the administrator account from and check if it has permission in the Permissions section. If the account does not have permission, click Edit and grant it all permissions.
Right-click the file or folder, and then click Properties. Click the Security tab. Under Group or user names, click your name to see the permissions that you have. Click Edit, click your name, select the check boxes for the permissions that you must have, and then click OK.
How do I fix administrator permissions? ›Also make sure that the Administrator account rights are Enabled: -Click Start and type command in the Taskbar search field. -Click Run as Administrator, type net user administrator /active:yes, and press enter. Wait for confirmation and restart.
How do I enable admin approval mode? ›
To enable Admin Approval Mode, you must also configure the local security policy setting: User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode to Prompt for consent on the secure desktop and then click OK.
How to run all administrators in admin approval mode is enabled? ›Solution. Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> 'User Account Control- Run all administrators in Admin Approval Mode' to 'Enabled'.
How do I get Microsoft admin access? ›To get to the Microsoft 365 admin center, go to admin.microsoft.com or, if you're already signed in, select the app launcher, and choose Admin. On the home page, you can create cards for tasks that you perform frequently.
Do you have administrator privileges? ›Select Control Panel. In the Control Panel window, double click on the User Accounts icon. In the lower half of the User Accounts window, under the or pick an account to change heading, find your user account. If the words “Computer administrator” are in your account's description, then you are an administrator.
How do I get around Microsoft app verification? ›In Windows, Tap “Start”, then “Settings”, then select “Apps” On the Apps & Features settings panel, find “Choose where to get apps” and change the setting to something other than “The Microsoft Store only”, since this option is the most restrictive. Rating: 4.0/5. From 1 vote.
Can you send a Microsoft form for approval? ›When a response is submitted to Microsoft Forms, start an approval process and send email for successful approval or rejection of request. Connect your favorite apps to automate repetitive tasks.