spo serviceprincipal permissionrequest approve
Approves the specified permission request
Usage
m365 spo serviceprincipal permissionrequest approve [options]
Alias
m365 spo sp permissionrequest approve
Options
-i, --id <id>
ID of the permission request to approve.
--all
approve all pending permission requests.
--resource [resource]
The resource of the permissions requests to approve.
-h, --help [help]
Output usage information. Optionally, specify which section of command's help you want to see. Allowed values are
options
,examples
,remarks
,response
,full
. Default isoptions
.--query [query]
JMESPath query string. See http://jmespath.org/ for more information and examples.
-o, --output [output]
Output type.
json
,text
,csv
,md
,none
. Defaultjson
.--verbose
Runs command with verbose logging.
--debug
Runs command with debug logging.
Remarks
The admin role that's required to approve permissions depends on the API. To approve permissions to any of the third-party APIs registered in the tenant, the application administrator role is sufficient. To approve permissions for Microsoft Graph or any other Microsoft API, the Global Administrator role is required.
The permission request you want to approve is denoted using its ID
. You can retrieve it using the spo serviceprincipal permissionrequest list command.
Examples
Approve permission request
m365 spo serviceprincipal permissionrequest approve --id 4dc4c043-25ee-40f2-81d3-b3bf63da7538
Response
- JSON
- Text
- CSV
- Markdown
{
"ClientId": "6004a642-185c-479a-992a-15d1c23e2229",
"ConsentType": "AllPrincipals",
"IsDomainIsolated": false,
"ObjectId": "QqYEYFwYmkeZKhXRwj4iKRcAa6TiIbFNvGnKY1dqONY",
"PackageName": null,
"Resource": "Microsoft Graph",
"ResourceId": "a46b0017-21e2-4db1-bc69-ca63576a38d6",
"Scope": "Reports.Read.All"
}
ClientId : 6004a642-185c-479a-992a-15d1c23e2229
ConsentType : AllPrincipals
IsDomainIsolated: false
ObjectId : QqYEYFwYmkeZKhXRwj4iKRcAa6TiIbFNvGnKY1dqONY
PackageName : null
Resource : Microsoft Graph
ResourceId : a46b0017-21e2-4db1-bc69-ca63576a38d6
Scope : Directory.ReadWrite.All
ClientId,ConsentType,IsDomainIsolated,ObjectId,PackageName,Resource,ResourceId,Scope
6004a642-185c-479a-992a-15d1c23e2229,AllPrincipals,false,QqYEYFwYmkeZKhXRwj4iKRcAa6TiIbFNvGnKY1dqONY,null,Microsoft Graph,a46b0017-21e2-4db1-bc69-ca63576a38d6,Directory.ReadWrite.All
# spo serviceprincipal permissionrequest approve --id "ecc2f667-e219-4c65-908e-957d68244d0c"
Date: 5/7/2023
## 4WtBzD8u5kW-sYuikIWL_8ZYTP5mJB1LnC6OT4Ibr94
Property | Value
---------|-------
ClientId | cc416be1-2e3f-45e6-beb1-8ba290858bff
ConsentType | AllPrincipals
IsDomainIsolated | false
ObjectId | 4WtBzD8u5kW-sYuikIWL\_8ZYTP5mJB1LnC6OT4Ibr94
Resource | Microsoft Graph
ResourceId | fe4c58c6-2466-4b1d-9c2e-8e4f821bafde
Scope | Calendars.Read