-
Notifications
You must be signed in to change notification settings - Fork 44
Weekly Permissions sync 2025-11-20 #1354
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
This PR represents the weekly permissions sync for 2025-11-20, updating API endpoint permissions configurations in the Microsoft Graph permissions file.
Key Changes:
- Refined permissions for
/places/{id}/checkInsendpoints by separating them into dedicated DelegatedWork-only permission blocks - Added new claim providers API endpoints under
Policy.Read.AllandPolicy.ReadWrite.ConditionalAccesspermissions
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
| { | ||
| "schemeKeys": [ | ||
| "DelegatedWork" | ||
| ], | ||
| "methods": [ | ||
| "POST" | ||
| ], | ||
| "paths": { | ||
| "/identity/conditionalaccess/claimProviders": "", | ||
| "/identity/conditionalaccess/claimProviders/validate": "" | ||
| } | ||
| }, | ||
| { | ||
| "schemeKeys": [ | ||
| "DelegatedWork" | ||
| ], | ||
| "methods": [ | ||
| "DELETE", | ||
| "PATCH" | ||
| ], | ||
| "paths": { | ||
| "/identity/conditionalaccess/claimProviders/{name}": "" | ||
| } |
Copilot
AI
Nov 20, 2025
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The claim providers endpoints are added for POST (lines 35600-35610), DELETE, and PATCH (lines 35612-35622) methods in the Policy.ReadWrite.ConditionalAccess permission, but there's no corresponding GET method block for these endpoints. This is inconsistent with the pattern in Policy.Read.All (lines 34387-34397) which includes GET method support for /identity/conditionalaccess/claimProviders and /identity/conditionalaccess/claimProviders/getControls.
If Policy.ReadWrite.ConditionalAccess is meant to provide both read and write access to claim providers, a GET method block should be added similar to:
{
"schemeKeys": [
"DelegatedWork"
],
"methods": [
"GET"
],
"paths": {
"/identity/conditionalaccess/claimProviders": "",
"/identity/conditionalaccess/claimProviders/getControls": "",
"/identity/conditionalaccess/claimProviders/{name}": ""
}
}
Weekly Permissions sync 2025-11-20