Azure AD App Registration - Permision request to Read and Write to “All” Site Collections too broad

%3CLINGO-SUB%20id%3D%22lingo-sub-40174%22%20slang%3D%22en-US%22%3EAzure%20AD%20App%20Registration%20-%20Permision%20request%20to%20Read%20and%20Write%20to%20%E2%80%9CAll%E2%80%9D%20Site%20Collections%20too%20broad%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-40174%22%20slang%3D%22en-US%22%3E%3CP%3EWhen%20setting%20up%20an%20Azure%20App%20Registration%20for%20the%20Microsoft%20Graph%20or%20the%20SharePoint%20Online%20APIs%2C%20the%20only%20option%20is%20to%20grant%20read%20and%20write%20to%20%22ALL%22%20site%20collections%20either%20as%20delegated%20or%20app%20permissions.%3CBR%20%2F%3E%3CBR%20%2F%3EAs%20an%20ISV%20creating%20an%20multi-tenant%20application%2C%20it%20raises%20a%20red%20flag%20for%20our%20customer's%20tenant%20administrator%20granting%20this%20kind%20of%20access%20when%20we%20really%20only%20need%20access%20to%20a%20specific%20site%20collection.%20Obviously%20with%20the%20SharePoint%20Add-in%20(Azure%20ACS)%20model%20the%20app%20manifest%20allowed%20granting%20permission%20at%20the%20site%20level%2C%20but%20in%20our%20case%20we%20want%20to%20take%20advantage%20of%20the%20Graph%20API%2C%20Power%20BI%2C%20and%20others%20backed%20by%20Azure%20App%20Registration.%3CBR%20%2F%3E%3CBR%20%2F%3EI%20can%20certainly%20log%20granular%20site%20collection%20permissions%20as%20a%20request%20on%20UserVoice%2C%20but%20I%20thought%20I%20would%20check%20here%20in%20case%20there%20is%20some%20manifest%20or%20querystring%20magic%20that%20can%20be%20done%20to%20achieve%20this%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-40174%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAPIs%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EDeveloper%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-242980%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20AD%20App%20Registration%20-%20Permision%20request%20to%20Read%20and%20Write%20to%20%E2%80%9CAll%E2%80%9D%20Site%20Collections%20too%20br%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-242980%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F19844%22%20target%3D%22_blank%22%3E%40Aaron%20Cutlip%3C%2FA%3E%26nbsp%3Bjust%20curious%20how%20you%20handled%20this.%26nbsp%3B%3C%2FP%3E%3CP%3EDid%20you%20use%20Graph%20api%20%2F%20SharePoint%20Online%20api%3F%20Or%20did%20you%20end%20up%20using%20Add-in%20model%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EGraph%20API%20is%20the%20new%20way%20to%20go%20but%20like%20you%20said%20it%20raises%20a%20lot%20of%20red%20flags%20when%20you%20have%20to%20grant%20Read%20Write%20to%20all%20site%20collections%20even%20for%20internal%20apps%20built%20by%26nbsp%3B%20in%20house%20developers.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIt%20has%20been%20more%20than%20an%20year%20since%20you%20posted%20and%20I%20don't%20see%20any%20responses%20which%20kinda%20makes%20me%20think%20that%20granular%20permissions%20is%20not%20coming%20anytime%20soon.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-92537%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20AD%20App%20Registration%20-%20Permision%20request%20to%20Read%20and%20Write%20to%20%E2%80%9CAll%E2%80%9D%20Site%20Collections%20too%20br%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-92537%22%20slang%3D%22en-US%22%3EJust%20checking%20my%20post%20here...%20still%20no%20answer%3F%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-693279%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20AD%20App%20Registration%20-%20Permision%20request%20to%20Read%20and%20Write%20to%20%E2%80%9CAll%E2%80%9D%20Site%20Collections%20too%20br%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-693279%22%20slang%3D%22en-US%22%3EAny%20new%20information%20on%20this%3F%20I'm%20now%20struggling%20with%20the%20same%20thing%20in%20my%20Enterprise.%20Does%20Microsoft%20plan%20on%20increasing%20granularity%20at%20all%3F%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-707904%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20AD%20App%20Registration%20-%20Permision%20request%20to%20Read%20and%20Write%20to%20%E2%80%9CAll%E2%80%9D%20Site%20Collections%20too%20br%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-707904%22%20slang%3D%22en-US%22%3E%3CP%3EYeah%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F19844%22%20target%3D%22_blank%22%3E%40Aaron%20Cutlip%3C%2FA%3E%26nbsp%3Bhave%20you%20been%20able%20to%20find%20a%20work%20around%3F%20We%20are%20struggling%20with%20the%20same%20issue.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-708261%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20AD%20App%20Registration%20-%20Permision%20request%20to%20Read%20and%20Write%20to%20%E2%80%9CAll%E2%80%9D%20Site%20Collections%20too%20br%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-708261%22%20slang%3D%22en-US%22%3E%3CP%3EIf%20you%20use%20Delegated%20Permissions%2C%20the%20requests%20to%20SharePoint%20only%20has%20permission%20to%20access%20resources%20that%20the%20current%20user%20has%20access%20to...%20thus%20not%20actually%20giving%20them%20full%20control%20over%20all%20of%20the%20site%20collections.%3CBR%20%2F%3E%3CBR%20%2F%3Ee.g%2C%20You%20have%20two%20site%20collections.%20User%20A%20only%20has%20access%20to%20Site%20Collection%201.%20User%20B%20has%20access%20to%20both.%3CBR%20%2F%3E%3CBR%20%2F%3EWith%20delegated%20permissions%2C%20User%20A%20will%20only%20be%20able%20to%20interact%20with%20Site%20Collection%201.%20User%20B%20will%20be%20able%20to%20interact%20with%20Site%20Collection%20B%20(depending%20on%20types%20of%20permissions%20on%20that%20Site%20Collection%20of%20course)%3CBR%20%2F%3E%3CBR%20%2F%3E%3CSTRONG%3EApplication%20permissions%20should%20only%20be%20used%20for%20applications%20that%20do%20not%20require%20signed-in%20users%20like%20background%20processes.%3C%2FSTRONG%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-708370%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20AD%20App%20Registration%20-%20Permision%20request%20to%20Read%20and%20Write%20to%20%E2%80%9CAll%E2%80%9D%20Site%20Collections%20too%20br%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-708370%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F39836%22%20target%3D%22_blank%22%3E%40Beau%20Cameron%3C%2FA%3EWe%20do%20need%20application%20level%20permissions%20as%20these%20programs%20need%20to%20run%20in%20the%20background.%20The%20issue%20is%20that%20when%20we%20provide%20the%20developer%20with%20the%20app%20secret%20it%20gives%20them%20access%20to%20way%20more%20than%20they%20need.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20use%20a%20policy%20of%20least%20privileges%20for%20security%20reasons%20so%20this%20really%20doesn't%20work%20for%20us.%20I%20need%20to%20allow%20my%20developers%20to%20access%20an%20individual%20account%2C%20not%20the%20whole%20company%20(CEO%20included)%20through%20a%20background%20process.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-708465%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20AD%20App%20Registration%20-%20Permision%20request%20to%20Read%20and%20Write%20to%20%E2%80%9CAll%E2%80%9D%20Site%20Collections%20too%20br%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-708465%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F360642%22%20target%3D%22_blank%22%3E%40Jcarpenter%3C%2FA%3E%26nbsp%3BYea%20unfortunately%2C%20that's%20a%20risk%20of%20Application%20Permissions.%20That's%20why%20they%20require%20Admin%20approval.%26nbsp%3B%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3EQuestion%2C%20If%20you've%20built%20the%20application%20that%20runs%20in%20the%20background%20for%20something.%26nbsp%3B%20Why%20are%20you%20sharing%20secrets%20with%20other%20devs%3F%20(Wondering%20what%20type%20of%20application%20this%20is)%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-708497%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20AD%20App%20Registration%20-%20Permision%20request%20to%20Read%20and%20Write%20to%20%E2%80%9CAll%E2%80%9D%20Site%20Collections%20too%20br%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-708497%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F39836%22%20target%3D%22_blank%22%3E%40Beau%20Cameron%3C%2FA%3E%26nbsp%3B%20here%20is%20our%20scenario%3A%3C%2FP%3E%3CP%3EA%20dev%20comes%20to%20us%20and%20needs%20access%20to%20a%20resource%20through%20the%20Graph%20API%2C%20like%20checking%20a%20mailbox%20or%20uploading%20files%20to%20a%20SharePoint%20site%20automatically.%20I%20grant%20their%20request%20for%20application%20permissions%2C%20but%20now%20they%20have%20access%20to%20%3CSTRONG%3Eevery%3C%2FSTRONG%3E%20mailbox%20or%20SharePoint%20site.%20It's%20not%20that%20we%20don't%20trust%20our%20devs%2C%20it's%20an%20issue%20of%20security.%20If%20that%20app%20secrete%20gets%20compromised%20it%20can%20now%20do%20way%20more%20damage.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-708604%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20AD%20App%20Registration%20-%20Permision%20request%20to%20Read%20and%20Write%20to%20%E2%80%9CAll%E2%80%9D%20Site%20Collections%20too%20br%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-708604%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F39836%22%20target%3D%22_blank%22%3E%40Beau%20Cameron%3C%2FA%3E%26nbsp%3BHmm...%20My%20several%20year%20old%20thread%20woke%20up.%20%3A)%3C%2Fimg%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20original%20scenario%20I%20was%20trying%20to%20describe%20is%20from%20a%20Partner%20perspective%2C%20where%20we%20are%20the%20partner%20and%20our%20customers%20have%20their%20own%20Office%20365%2FSharePoint%20tenancy.%26nbsp%3B%20%26nbsp%3BOur%20application%20has%20background%20processes%20that%20interact%20with%20a%20given%20(single)%20Site%20Collection%20and%20thus%20the%20need%20for%20Application%20Permissions.%26nbsp%3B%20We%20have%20been%20using%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fsharepoint%2Fdev%2Fsolution-guidance%2Fsecurity-apponly-azureacs%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOffice%20Add-in%2FSharePoint%20App-Only%20Azure%20Access%20Control%3C%2FA%3E%26nbsp%3Bwhich%20lets%20us%20get%20tokens%20only%20for%20the%20single%20Site%20Collection%20where%20it%20has%20been%20granted%2C%20but%20it%20certainly%20does%20not%20feel%20%22Modern%22%20we%20would%20love%20to%20ditch%20that.%26nbsp%3B%20%26nbsp%3BFrom%20my%20perspective%2C%20even%20if%20I%20were%20developing%20internal%20applications%20for%20an%20%22Enterprise%22%20sized%20company%20it%20seams%20like%20to%20risky%20of%20a%20proposition%20(aka%20crazy)%20not%20have%20a%20way%20to%20limit%20the%20scope%20that%20the%20App%20Permission%20has%20access%20to.%26nbsp%3B%20%26nbsp%3BA%20colleague%20of%20mine%20mentioned%20maybe%20it%20would%20be%20possible%20to%20apply%20some%20kind%20of%20conditional%20access%20restrictions%20to%20the%20App%20Registration%20after%20it%20had%20been%20granted%20but%20this%20would%20require%20Azure%20AD%20premium.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EFrom%20my%20perspective%2C%20the%20first%20class%20solution%20would%20be%20to%20allow%20the%20original%20App%20Permission%20grant%20to%20have%20a%20way%20to%20specify%20restrictions%20on%20which%20Site%20Collection(s)%20the%20grant%20applies.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-788649%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20AD%20App%20Registration%20-%20Permision%20request%20to%20Read%20and%20Write%20to%20%E2%80%9CAll%E2%80%9D%20Site%20Collections%20too%20br%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-788649%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F19844%22%20target%3D%22_blank%22%3E%40Aaron%20Cutlip%3C%2FA%3E%26nbsp%3B...%20Thanks%20for%20you%20replying%20to%20this%20thread%20and%20updating%20us.%20This%20is%20security%20issue%20and%20not%20as%20much%20as%20trusting%20the%20developer.%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3EHave%20you%20come%20across%20a%20uservoice%20for%20this%20to%20lock%20down%20access%20to%20specific%20sites%20using%20the%20application%20permissions%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-791065%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20AD%20App%20Registration%20-%20Permision%20request%20to%20Read%20and%20Write%20to%20%E2%80%9CAll%E2%80%9D%20Site%20Collections%20too%20br%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-791065%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F19844%22%20target%3D%22_blank%22%3E%40Aaron%20Cutlip%3C%2FA%3E%26nbsp%3Bwe%20are%20playing%20catch%20up%20in%20the%20Microsoft%20Graph%20team%20on%20some%20questions%20across%20communities%20here.%20Just%20FYI%20that%20StackOverflow%20is%20where%20we're%20focusing%20our%20attention%20and%20don't%20have%20resources%20monitoring%20these%20forums.%3C%2FP%3E%0A%3CP%3EThere%20is%20a%20uservoice%20for%20this%20which%20i'd%20encourage%20you%20to%20add%20your%20scenarios%20to%20and%20vote%20up.%20I'm%20also%20happy%20to%20chat%20to%20you%20directly%20on%20Teams%20if%20you%20wish%3F%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fmicrosoftgraph.uservoice.com%2Fforums%2F920506-microsoft-graph-feature-requests%2Fsuggestions%2F34678792-manage-permissions-at-ressource-level-for-sharepoi%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fmicrosoftgraph.uservoice.com%2Fforums%2F920506-microsoft-graph-feature-requests%2Fsuggestions%2F34678792-manage-permissions-at-ressource-level-for-sharepoi%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-793137%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20AD%20App%20Registration%20-%20Permision%20request%20to%20Read%20and%20Write%20to%20%E2%80%9CAll%E2%80%9D%20Site%20Collections%20too%20br%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-793137%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F152388%22%20target%3D%22_blank%22%3E%40Jeremy%20Thake%3C%2FA%3E%26nbsp%3BI%20voted%20up%20that%20user%20voice%20link.%20%26nbsp%3BThanks%20for%20providing%20that%2C%20however%20I%20am%20not%20sure%20that%20is%20clear%20enough%20to%20cover%20the%20scenario%20I%20am%20mentioning%20here.%20%26nbsp%3BIf%20you%20do%20have%20time%20for%20a%20quick%20conversation%20it%20might%20help%20me%20explain%20what%20we%20are%20doing%20and%20why%20we%20chose%20to%20do%20it%20that%20way%2C%20which%20in%20turn%20helps%20understand%20why%20more%20granular%20permissions%20matter.%20%26nbsp%3BShoot%20me%20an%20email.%20%26nbsp%3BThanks%2C%20-Aaron%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-796286%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20AD%20App%20Registration%20-%20Permision%20request%20to%20Read%20and%20Write%20to%20%E2%80%9CAll%E2%80%9D%20Site%20Collections%20too%20br%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-796286%22%20slang%3D%22en-US%22%3E%3CP%3EIn%20addition%20to%20the%20user%20voice%20link%20that%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F152388%22%20target%3D%22_blank%22%3E%40Jeremy%20Thake%3C%2FA%3E%26nbsp%3Bpointed%20to%2C%20I%20would%20also%20recommend%20people%20take%20a%20look%20at%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fmicrosoftgraph.uservoice.com%2Fforums%2F920506-microsoft-graph-feature-requests%2Fsuggestions%2F37796059-restrict-permissions-to-app-only-azure-ad-applicat%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fmicrosoftgraph.uservoice.com%2Fforums%2F920506-microsoft-graph-feature-requests%2Fsuggestions%2F37796059-restrict-permissions-to-app-only-azure-ad-applicat%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Highlighted
Occasional Contributor

When setting up an Azure App Registration for the Microsoft Graph or the SharePoint Online APIs, the only option is to grant read and write to "ALL" site collections either as delegated or app permissions.

As an ISV creating an multi-tenant application, it raises a red flag for our customer's tenant administrator granting this kind of access when we really only need access to a specific site collection. Obviously with the SharePoint Add-in (Azure ACS) model the app manifest allowed granting permission at the site level, but in our case we want to take advantage of the Graph API, Power BI, and others backed by Azure App Registration.

I can certainly log granular site collection permissions as a request on UserVoice, but I thought I would check here in case there is some manifest or querystring magic that can be done to achieve this?

13 Replies
Highlighted
Highlighted

@Aaron Cutlip just curious how you handled this. 

Did you use Graph api / SharePoint Online api? Or did you end up using Add-in model?

 

Graph API is the new way to go but like you said it raises a lot of red flags when you have to grant Read Write to all site collections even for internal apps built by  in house developers.

 

It has been more than an year since you posted and I don't see any responses which kinda makes me think that granular permissions is not coming anytime soon.  

Highlighted
Any new information on this? I'm now struggling with the same thing in my Enterprise. Does Microsoft plan on increasing granularity at all?
Highlighted

Yeah @Aaron Cutlip have you been able to find a work around? We are struggling with the same issue. 

Highlighted

If you use Delegated Permissions, the requests to SharePoint only has permission to access resources that the current user has access to... thus not actually giving them full control over all of the site collections.

e.g, You have two site collections. User A only has access to Site Collection 1. User B has access to both.

With delegated permissions, User A will only be able to interact with Site Collection 1. User B will be able to interact with Site Collection B (depending on types of permissions on that Site Collection of course)

Application permissions should only be used for applications that do not require signed-in users like background processes.

Highlighted

@Beau CameronWe do need application level permissions as these programs need to run in the background. The issue is that when we provide the developer with the app secret it gives them access to way more than they need.

 

We use a policy of least privileges for security reasons so this really doesn't work for us. I need to allow my developers to access an individual account, not the whole company (CEO included) through a background process.

Highlighted

@Jcarpenter Yea unfortunately, that's a risk of Application Permissions. That's why they require Admin approval.  

Question, If you've built the application that runs in the background for something.  Why are you sharing secrets with other devs? (Wondering what type of application this is)

Highlighted

@Beau Cameron  here is our scenario:

A dev comes to us and needs access to a resource through the Graph API, like checking a mailbox or uploading files to a SharePoint site automatically. I grant their request for application permissions, but now they have access to every mailbox or SharePoint site. It's not that we don't trust our devs, it's an issue of security. If that app secrete gets compromised it can now do way more damage.

Highlighted

@Beau Cameron Hmm... My several year old thread woke up. :)

 

The original scenario I was trying to describe is from a Partner perspective, where we are the partner and our customers have their own Office 365/SharePoint tenancy.   Our application has background processes that interact with a given (single) Site Collection and thus the need for Application Permissions.  We have been using Office Add-in/SharePoint App-Only Azure Access Control which lets us get tokens only for the single Site Collection where it has been granted, but it certainly does not feel "Modern" we would love to ditch that.   From my perspective, even if I were developing internal applications for an "Enterprise" sized company it seams like to risky of a proposition (aka crazy) not have a way to limit the scope that the App Permission has access to.   A colleague of mine mentioned maybe it would be possible to apply some kind of conditional access restrictions to the App Registration after it had been granted but this would require Azure AD premium.

 

From my perspective, the first class solution would be to allow the original App Permission grant to have a way to specify restrictions on which Site Collection(s) the grant applies. 

Highlighted

@Aaron Cutlip ... Thanks for you replying to this thread and updating us. This is security issue and not as much as trusting the developer. 

Have you come across a uservoice for this to lock down access to specific sites using the application permissions?

Highlighted

@Aaron Cutlip we are playing catch up in the Microsoft Graph team on some questions across communities here. Just FYI that StackOverflow is where we're focusing our attention and don't have resources monitoring these forums.

There is a uservoice for this which i'd encourage you to add your scenarios to and vote up. I'm also happy to chat to you directly on Teams if you wish? https://microsoftgraph.uservoice.com/forums/920506-microsoft-graph-feature-requests/suggestions/3467...

Highlighted

@Jeremy Thake I voted up that user voice link.  Thanks for providing that, however I am not sure that is clear enough to cover the scenario I am mentioning here.  If you do have time for a quick conversation it might help me explain what we are doing and why we chose to do it that way, which in turn helps understand why more granular permissions matter.  Shoot me an email.  Thanks, -Aaron

Highlighted