Home > Required Permissions > App Profile Authentication

Export to PDF

App Profile Authentication

If you want to manage Microsoft 365 objects using an app profile, refer to the table below to identify the right app and find its required permissions.

NOTE

To use rules related to Exchange mailbox and Security and distribution group object types, you must assign the Exchange Administrator role to the app in the Microsoft Entra admin center. To find rules where the Exchange Administrator role is required, refer to Supported Rules for Service Level Policies and Supported Rules for Tenant Level Policies. For the detailed instructions on how to assign the Exchange Administrator role to the app, refer to Assign Exchange Administrator Role to Azure App.

NOTE

To use the Teams Tagging Settings rule, you must assign the Teams Administrator role to the app in the Microsoft Entra admin center. For the detailed instructions on how to assign the Teams Administrator role to the app, refer to Assign Teams Administrator Role to Azure App.

Make sure the account used to consent to or re-authorize the app profile has the Microsoft 365 Global Administrator or Privileged Role Administrator role.

Setup Methods and App Types

The table below lists the supported setup methods and app types. For details on creating app profiles in AvePoint Online Services, refer to App Management.

Setup MethodApp TypeNote
Modern Mode
(Recommended)
Policies for Microsoft 365Once you create this app profile, the AvePoint Policies for Microsoft365 app will be automatically created in your Microsoft Entra ID. To see the API permissions you need to accept when you authorize the app, refer to Policies for Microsoft 365.
Modern Mode
(Recommended)
Reporting for Microsoft 365Once you create this app profile, the AvePoint Reporting for Microsoft365 app will be automatically created in your Microsoft Entra ID. To see the API permissions you need to accept when you authorize the app, refer to Reporting for Microsoft 365.
Classic ModeMicrosoft 365 (All permissions)Once you create this app profile, the AvePoint Online Services Administration for Microsoft365 app will be automatically created in your Microsoft Entra ID. To see the API permissions you need to accept when you authorize the app, refer to Microsoft 365 (All Permissions).
Classic ModeMicrosoft Entra IDOnce you create this app profile, the AvePoint Online Services Administration for Microsoft Entra ID app will be automatically created in your Microsoft Entra ID. To see the API permissions you need to accept when you authorize the app, refer to Microsoft Entra ID.
Custom ModeCustom Azure AppYou need to create an app in your Microsoft Entra ID and create an app profile for the app in AvePoint Online Services. To see the API permissions required by Policies for Microsoft 365, refer to Permissions for Custom Azure App.

Note the following:

Permissions for Custom Azure App

If you want to create a custom Azure app to connect AvePoint Online Services to your Microsoft 365 tenant and Microsoft Entra ID, refer to the API permissions listed in the following table to add the API permissions required by Policies for Microsoft 365 to your custom Azure app.

APITypePermissionPurposeWhich Rules Need This
SharePointApplicationSites.FullControl.All
(Have full control of all site collections)
Retrieve and update the information on site collections and groups/teams’ sites.Rule Table 1
SharePointApplicationUser.Read.All
(Read user profiles)
Retrieve user profiles for OneDrive that are scanned by AvePoint Online Services.This permission is not required by rules in Policies for Microsoft 365. It is required for auto discovery scan profiles in AvePoint Online Services.
Microsoft GraphApplicationAuditLog.Read.All
(Read all audit log data)
Read all audit logsRule Table 2
Microsoft GraphApplicationChannelMember.ReadWrite.All
(Add and remove members from all channels)
Add and remove members from all channelsRule Table 3
Microsoft GraphApplicationUser.Read.All
(Read all users' full profiles)
Read all users’ settings used by rules; Retrieve user information for people pickers, Defined Groups, and filters.Rule Table 4
Microsoft GraphApplicationUser.ReadWrite.All
(Read and write all users’ full profiles)
Read and write users’ settingsRule Table 5
Microsoft GraphApplicationGroup.Read.All
(Read all groups)
Read groups’ members and settings used by rules; Retrieve group information for people pickers, Defined Groups, and filters.Rule Table 6
Microsoft GraphApplicationGroup.ReadWrite.All
(Read and write all groups)
Update groups’ members and settingsRule Table 7
Microsoft GraphApplicationChannel.ReadBasic.All
(Read the names and descriptions of all channels)
Retrieve the number of private channel owners.Rule Table 8
Microsoft GraphApplicationDirectory.ReadWrite.All
(Read and write data in organization’s directory)
Read and write users and groups data in the organization’s directory.Rule Table 9
Microsoft GraphApplicationTeamSettings.ReadWrite.All
(Read and change all teams' settings)
Update Teams' settings.Rule Table 10
Microsoft GraphApplicationChannel.Delete.All
(Delete channels)
Delete channels.Rule Table 11
Microsoft GraphApplicationFiles.Read.All
(Read files in all site collection)
Read files in site collections.Rule Table 12
Microsoft Information Protection Sync ServiceApplicationUnifiedPolicy.Tenant.Read
(Read all unified policies of the tenant)
Retrieve information of published sensitivity labels from Microsoft 365.Rule Table 13
Office 365 Exchange OnlineApplicationExchange.ManageAsApp
(Manage Exchange As Application)
Retrieve and manage Exchange Online mailboxes.Rule Table 14
Azure Rights Management Services
Make sure your organization has a subscription (or service principal) for the Azure Rights Management Services API.
For 21Vianet tenants, the API name is Microsoft Rights Management Services.
ApplicationContent.SuperUser
(Read all protected content for this tenant)
Retrieve sensitivity labels in your organization and apply sensitivity labels to files.Rule Table 15
Azure Rights Management Services
Make sure your organization has a subscription (or service principal) for the Azure Rights Management Services API.
For 21Vianet tenants, the API name is Microsoft Rights Management Services.
ApplicationContent.Writer
(Create protected content)
Retrieve sensitivity labels in your organization and apply sensitivity labels to files.Rule Table 16

Permissions Overview by Rules

The following tables list the rules that need the required permissions.

Rule Table 1

Rule NameRule Description
Access Request SettingsControl access request settings within a site to manage who can request and approve access to a site.
Content Creation and Upload RestrictionControl content creation and upload including items, attachments, and documents based on user, size, file extension, content type, and sensitivity label.
Classification EnforcementEnforce that all Groups or Teams have a classification assigned to them and assign a default classification if there is none.
Control Access from Unmanaged DevicesBlock or limit access to SharePoint and OneDrive content from unmanaged devices.
Content Sensitivity Label EnforcementEnforce sensitivity labels for documents based on their risk level, sensitivity level, and exposure level.
Deletion RestrictionControl users who have the ability to delete objects in sites.
Guest User Access EnforcementControl users who have the ability to add guest users to Groups or Teams.
Guest User Full Control Permission RestrictionReport guest users who have the site-level Full Control permission and remove this permission from them.
Ghost Guest User DetectionDetect guests who do not have any membership in SharePoint Online sites, Groups, and Teams.
Library Default Sensitivity Label EnforcementEnforce a default sensitivity label for document libraries so that the sensitivity label will be applied to all newly created or edited Office files.
Library Versioning Settings EnforcementEnforce the versioning settings for all libraries in sites.
List/Library Creation RestrictionControl users who have the ability to create lists and libraries.
List/Library Object Number RestrictionControl the number of items, documents, and folders in a list/library.
Permission Inheritance ProtectionProtect permission inheritance from being broken at specific object levels.
Permission Level Enforcement for Built-in SharePoint GroupsEnforce permission levels for built-in SharePoint groups, including site owners, site members, and site visitors.
Pre-defined Group Members (Cloud Governance)Enforce that users you have defined via site collection properties can be added to specified SharePoint Online groups.
Remove Shadow UsersRemove users who have access to the SharePoint Online site but are not part of the Group/Team membership.
Restrict Sharing LinksRestrict sharing links that are created by or shared with specific users and groups.
Restrict Sharing Links with Edit PermissionRestrict sharing links with Edit permission that are created by or shared with specific users and groups.
Scan External UsersScan external users in sites where external sharing is disabled.
Scan Orphaned UsersScan users or groups that have been deleted or blocked in your Microsoft Entra ID.
Search and Offline Availability EnforcementControl whether site content can be searched or downloaded to offline clients
Shared Channel Creation RestrictionControl users who have the ability to create shared channels inside Teams.
SharePoint Group Membership EnforcementEnforce specific users to be in the owners, members, or visitors group of a site.
Sharing Link Expiration EnforcementEnforce the duration of how long sharing links remain active after being created in sites.
SharePoint Permission EnforcementControl permission levels for the specified users and groups on SharePoint sites.
Site Collection Administrator EnforcementEnforce specific users and groups to be in the Site Collection Administrators group of a site.
Site Collection Administrator Number RestrictionControl the number of site collection administrators in a site.
Site Owner Number RestrictionControl the number of site owners in a site.
Site Owner RestrictionControl users who can be added to the owner group of a site.
Site Sensitivity Label EnforcementEnforce a defined sensitivity label on sites and remove any existing ones.
Site Storage EnforcementEnforce storage limit for sites.
Teams Settings EnforcementEnforce certain Teams settings.
User/Group RestrictionControl users and groups that can be added to sites.
User Permission ReplacementReport or remove permissions from a specific user and assign the permissions to other designated users.

Rule Table 2

Rule NameRule Description
Remove Inactive Guest UsersRemove guest users who do not have any activities in SharePoint Online sites, Groups, and Teams for certain days.

Rule Table 3

Rule NameRule Description
Private Channel Owner Number RestrictionControl the number of owners in Teams private channels.
Private Channel Ownership EnforcementEnforce specific users to be owners of Teams private channels.
Shared Channel Ownership EnforcementEnforce specific users to be owners of Teams shared channels.

Rule Table 4

Rule NameRule Description
Classification EnforcementEnforce that all Groups or Teams have a classification assigned to them and assign a default classification if there is none.
Groups/Teams Creation RestrictionControl users who have the ability to create Groups or Teams.
Groups/Teams Deletion RestrictionControl users who have the ability to delete Groups or Teams.
Guest User Access EnforcementControl users who have the ability to add guest users to Groups or Teams.
Membership RestrictionControl users who can be added to Microsoft 365 Groups, Teams, security groups, or distribution lists as members.
Member Number RestrictionControl the number of members in Microsoft 365 Groups, Teams, security groups, or distribution lists.
Ownership EnforcementEnforce specific users to be in the owner group of a site.
Ownership RestrictionControl users who can be added to Groups or Teams as owners.
Scan External UsersScan external users in sites where external sharing is disabled.
Teams Settings EnforcementEnforce certain Teams settings.

This permission is also required by common features, including people pickers, Defined Groups, and filters.

Rule Table 5

Rule NameRule Description
Ghost Guest User DetectionDetect guests who do not have any membership in SharePoint Online sites, Groups, and Teams.
Remove Inactive Guest UsersRemove guest users who do not have any activities in SharePoint Online sites, Groups, and Teams for certain days.
Remove Licenses from Inactive UsersRemove licenses from users who do not have activities in Microsoft 365 services for a certain period.
Remove Licenses from Blocked UsersRemove licenses from users who have been blocked from signing in.

This permission will be required if you want to use the Auto Fix Violations feature in rules to automatically fix out-of-policy settings when violations are identified. Without granting this permission to make the Auto Fix Violations feature available, you can manually fix the out-of-policy settings.

Rule 6

Rule NameRule Description
Owner Number RestrictionControl the number of owners in Microsoft 365 Groups, Teams, security groups, and distribution lists.
Ghost Guest User DetectionDetect guests who do not have any membership in SharePoint Online sites, Groups, and Teams.

This permission is also required by common features, including people pickers, Defined Groups, and filters.

Rule Table 7

Rule NameRule Description
Classification Change RestrictionPrevent changes to the classification of Groups or Teams.
Classification EnforcementEnforce that all Groups or Teams have a classification assigned to them and assign a default classification if there is none.
Control Group Visibility in Global Address ListControl the visibility of mail-enabled security groups and distribution lists in the global address list.
Groups/Teams Creation RestrictionControl users who have the ability to create Groups or Teams.
Groups/Teams Deletion RestrictionControl users who have the ability to delete Groups or Teams.
Groups/Teams Name EnforcementPrevent owners of Groups or Teams from changing their Group or Team name.
Guest User Access EnforcementControl users who have the ability to add guest users to Groups or Teams.
Membership RestrictionControl users who can be added to Microsoft 365 Groups, Teams, security groups, or distribution lists as members.
Member Number RestrictionControl the number of members in Microsoft 365 Groups, Teams, security groups, or distribution lists.
Microsoft 365 Group Visibility in Outlook ClientControl if a Microsoft 365 Group is visible in the Outlook client.
Ownership RestrictionControl users who can be added to Groups or Teams as owners.
Privacy RestrictionControl the privacy settings of Groups or Teams.
Restrict Member InvitationsControl users who have the ability to add users to Groups or Team.
Restrict Member RemovalControl users who have the ability to remove members from Microsoft 365 Groups or Teams.
Teams Settings EnforcementEnforce certain Teams settings.
User RestrictionEnforce that specific users can only be assigned membership of the specified Groups/Teams.

Besides, this permission will be required if you want to use the Auto Fix Violations feature in rules to automatically fix out-of-policy settings when violations are identified. Without granting this permission to make the Auto Fix Violations feature available, you can manually fix the out-of-policy settings.

Rule Table 8

Rule NameRule Description
Private Channel Ownership EnforcementEnforce specific users to be owners of Teams private channels.
Private Channel Owner Number RestrictionControl the number of owners in Teams private channels.
Shared Channel Creation RestrictionControl users who have the ability to create shared channels inside Teams.
Shared Channel Ownership EnforcementEnforce specific users to be owners of Teams shared channels.

Rule Table 9

Rule NameRule Description
Groups Guest Access RestrictionControl whether people outside your organization can be invited as guests and access group content.
Teams Tagging SettingsControl how tags are used across your organization.

Rule Table 10

Rule NameRule Description
Shared Channel Creation RestrictionControl users who have the ability to create shared channels inside Teams.
Teams Settings EnforcementEnforce certain Teams settings.

Rule Table 11

Rule NameRule Description
Shared Channel Creation RestrictionControl users who have the ability to create shared channels inside Teams.

Rule Table 12

Rule NameRule Description
Shared Channel Creation RestrictionControl users who have the ability to create shared channels inside Teams.

Rule Table 13

Rule NameRule Description
Content Creation and Upload RestrictionControl content creation and upload including items, attachments, and documents based on user, size, file extension, content type, and sensitivity label.
Content Sensitivity Label EnforcementEnforce sensitivity labels for documents based on their risk level, sensitivity level, and exposure level.
Library Default Sensitivity Label EnforcementEnforce a default sensitivity label for document libraries so that the sensitivity label will be applied to all newly created or edited Office files.
Site Sensitivity Label EnforcementEnforce a defined sensitivity label on sites and remove any existing ones.

Rule Table 14

Rule NameRule Description
Automatic Forwarding RestrictionRestrict users from auto-forwarding emails.
Bypass Spam Filtering Rule RestrictionRestrict users from creating the mail flow rule to skip spam filtering when receiving emails from specific domains.
Control Anonymous Calendar SharingControl whether users are allowed to share their calendars with anonymous users outside the organization.
Control Exchange Online PowerShell Access for Non-administratorsControl Exchange Online PowerShell access for non-administrators.
Control Focused InboxControl whether to enable the focused inbox view for users.
Control Group Visibility in Global Address ListControl the visibility of mail-enabled security groups and distribution lists in the global address list.
Control Mailbox Auditing for All UsersControl whether to enable mailbox auditing for all users.
Control Plus AddressingControl whether users can use plus addressing to quickly create custom email addresses based on their standard email addresses.
Control Sending Emails from AliasesControl whether users are allowed to send emails from aliases.
Deleted Item Retention Period EnforcementSet the retention period that permanently deleted mailbox items are kept in the Recoverable Items folder.
DKIM Signature EnforcementSign emails with DKIM (Domain Keys Identified Mail) signatures for your domains to help recipients ensure the identities of senders.
International Spam PreventionPrevent email messages that are written in specific languages or sent from specific countries or regions.
Legacy Email Protocols RestrictionRestrict the use of legacy email protocols, including POP, SMTP, and IMAP protocols, to prevent password spray attacks that may breach mailboxes in your tenants.
Malware PreventionProtect your organization from malware by quarantining email messages where malware is detected.
Message Size RestrictionRestrict the maximum size for messages sent and received by mailboxes.
Outlook External Email Tag EnforcementChoose whether to add tags to external emails in Outlook to help users identify emails from external senders.
Owner Number RestrictionControl the number of owners in Microsoft 365 Groups, Teams, security groups, and distribution lists.
Outbound Spam PreventionProtect your organization from outbound spam.
Rich-Text Format RestrictionRestrict the rich-text format in emails to prevent malformed emails sending to other users.
Shared Mailbox Sign-In RestrictionControl whether to allow users to sign in to the shared mailboxes by their associated user accounts.

Rule Table 15

Rule NameRule Description
Content Sensitivity Label EnforcementEnforce sensitivity labels for documents based on their risk level, sensitivity level, and exposure level.

Rule Table 16

Rule NameRule Description
Content Sensitivity Label EnforcementEnforce sensitivity labels for documents based on their risk level, sensitivity level, and exposure level.

Specific Operations for Microsoft 365 U.S. Government

If you are using a Microsoft 365 U.S. Government environment and you want to use a custom Azure app for Microsoft 365 management, you must add SharePoint API permissions to the custom app through Manifest. Microsoft Azure Government does not allow you to select SharePoint API permissions on the Azure Governance Portal interface.

Add SharePoint API permissions to the custom app through Manifest.

APIPermissionresourceAppIdidtype
SharePointSites.FullControl.All
(Have full control of all site collections)
00000003-0000-0ff1-ce00-000000000000678536fe-1083-478a-9c59-b99265e6b0d3Role

Microsoft Graph API Beta Version in Use

Policies for Microsoft 365 leverages Microsoft Graph beta APIs (the APIs in preview) for some operations that are currently unsupported by version v1.0. The features using the following beta APIs may be affected if Microsoft introduces changes to their beta APIs.

Refer to the table below for the beta version API methods that Policies for Microsoft 365 uses.

APITypeAPI URLPermissionPurpose
Microsoft GraphApplicationhttps://graph.microsoft.com/beta/usersUser.Read.All
(Read all users' full profiles)
Comment 1
Microsoft GraphApplicationhttps://graph.microsoft.com/beta/security/informationProtection/sensitivityLabelsInformationProtectionPolicy.Read.All
(Read all published labels and label policies for an organization)
Comment 2

Comment 1:

  • Defined Group: Custom property

Comment 2:

  • Filter: Sensitivity label

  • Rule: Content Creation and Upload Restriction

  • Rule: Content Sensitivity Label Enforcement

  • Rule: Library Default Sensitivity Label Enforcement

  • Rule: Site Sensitivity Label Enforcement