Your Employees permissions

These are the access permissions needed by the Ironstone managed service, Your Employees, inside the customers tenant and why we need them.

The App Name is "Ironstone - IT for Your Employees"

  • Without access to your data we won't be able to deploy our services.
  • It is not possible to partially accept the permissions.

API / Permissions name

Type

Permission description

Admin consent required

Why do we need this permission?

Directory.ReadWrite.All

Application

Allows the app to read and write data in your organization's directory, such as users, and groups, without a signed-in user. Does not allow user or group deletion.    

Yes

Per missions is used to make changes to objects in Microsoft Entra ID,

Group.ReadWrite.All

Application

Allows the app to create groups, read all group properties and memberships, update group properties and memberships, and delete groups. Also allows the app to read and write conversations. All of these operations can be performed by the app without a signed-in user.

Yes

Used to create Microsoft Entra ID security groups for Conditional Access exceptions and groups for threat protection rule membership

User.ReadWrite.All

Application

Allows the app to read and update user profiles without a signed in user.

Yes

Used to update groupmembership of objects in Microsoft Entra ID.

Organization.Read.All

 Application

Allows the app to read the organization and related resources, without a signed-in user. Related resources include things like subscribed skus and tenant branding information

Yes

Used to update organization settings.

AppRoleAssignment.ReadWrite.All

Application

 

Allows the app to manage permission grants for application permissions to any API (including Microsoft Graph) and application assignments for any app, without a signed-in user.

Yes

Used to assign Federated Workload Identity permissions to deploy, create and manage Microsoft Entra ID security groups to provide permissions within the Azure environment.

Application.ReadWrite.All

Application

Allows the calling app to create, and manage (read, update, update application secrets and delete) applications and service principals without a signed-in user. Does not allow management of consent grants or application assignments to users or groups.

Yes

Used in order to create and modify the Enterprise Applications needed to manage and govern the Azure environment.

RoleManagement.ReadWrite.Directory

Application

Allows the app to read and manage the role-based access control (RBAC) settings for your company's directory, on behalf of the signed-in user. This includes instantiating directory roles and managing directory role membership, and reading directory role templates, directory roles and memberships.

Yes

Used to set -IsAssignableToRole:$true on the Microsoft Entra ID Security groups that will be associated with management groups.

DeviceManagementApps.ReadWrite.All

Application

Allows the app to read and write the properties, group assignments and status of apps, app configurations and app protection policies managed by Microsoft Intune, without a signed-in user.

Yes

Used to create and update applications in Intune.

DeviceManagementConfiguration.ReadWrite.All

Application

Allows the app to read and write properties of Microsoft Intune-managed device configuration and device compliance policies and their assignment to groups, without a signed-in user.

Yes

Used to create and update Intune device configuration.

DeviceManagementServiceConfig.ReadWrite.All

Application

Allows the app to read and write Microsoft Intune service properties including device enrollment and third party service connection configuration, without a signed-in user.

Yes

Used to manage Intune settings and device enrollment.

DeviceManagementManagedDevices.ReadWrite.All

Application

Allows the app to read and write the properties of devices managed by Microsoft Intune, without a signed-in user. Does not allow high impact operations such as remote wipe and password reset on the device's owner

Yes

Used to manage devices in Intune.

Policy.Read.All

Application

Allows the app to read all your organization's policies without a signed in user.

Yes

Used to read all policies.

Policy.ReadWrite.ConditionalAccess

Application

Allows the app to read and write your organization's conditional access policies, without a signed-in user.

Yes

Used to create and update Conditional Access policies.

Policy.ReadWrite.Authorization

Application

Allows the app to read and write your organization's authorization policy without a signed in user. For example, authorization policies can control some of the permissions that the out-of-the-box user role has by default.

Yes

Used to update the authorization policies.

Policy.ReadWrite.CrossTenantAccess

Application

Allows the app to read and write your organization's cross tenant access policies without a signed-in user.

Yes

Used to set cross tenant access settings.

Policy.ReadWrite.AuthenticationMethod

Application

Allows the app to read and write all authentication method policies for the tenant, without a signed-in user.      Yes

Used to update the allowed authentication methods.

Exchange.ManageAsApp

Application

Allows the app to manage the organization's Exchange environment without any user interaction. This includes mailboxes, groups, and other configuration objects. To enable management actions, an admin must assign the appropriate roles directly to the app.

Yes  

This is used to be able to reach Exchange remotely from the backend to our customers to:

  • Set baseline when enabling the service

  • Update baseline when we have new security settings or other configuration that needs to be set

To actually get these rights the application needs to be assigned to the Exchange Administrator Azure AD role which is only something that is done temporary when using the functionality.

Exchange Administrator

Built in role

Users with this role have global permissions within Microsoft Exchange Online, when the service is present. Also has the ability to create and manage all Microsoft 365 groups, manage support tickets, and monitor service health. For more information, see About admin roles in the Microsoft 365 admin center.

Has to manually be added to the EnterpriseApplication

Used to manage settings in Exchange online.

Security Administrator

 Built in role

This is a privileged role. Users with this role have permissions to manage security-related features in the Microsoft 365 Defender portal, Microsoft Entra ID Protection, Microsoft Entra Authentication, Azure Information Protection, and Microsoft Purview compliance portal. For more information about Office 365 permissions, see Roles and role groups in Microsoft Defender for Office 365 and Microsoft Purview compliance.

 Has to manually be added to the EnterpriseApplication

Used to create and update Advanced threat protection policies.

Teams Administrator

  Built in role

Users in this role can manage all aspects of the Microsoft Teams workload via the Microsoft Teams & Skype for Business admin center and the respective PowerShell modules. This includes, among other areas, all management tools related to telephony, messaging, meetings, and the teams themselves. This role additionally grants the ability to create and manage all Microsoft 365 groups, manage support tickets, and monitor service health.

 Has to manually be added to the EnterpriseApplication

Used to be able to configure Teams policies and settings.