Skip to content
Closed
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
68 changes: 34 additions & 34 deletions permissions/new/permissions.json
Original file line number Diff line number Diff line change
Expand Up @@ -41264,13 +41264,13 @@
"paths": {
"/identityGovernance/privilegedAccess/group/assignmentScheduleInstances": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/assignmentScheduleInstances/{id}": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/assignmentScheduleInstances/filterbycurrentuser(on={value})": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/assignmentScheduleInstances/filterByCurrentUser(on={value})": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/assignmentScheduleRequests": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/assignmentScheduleRequests/{id}": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/assignmentScheduleRequests/filterbycurrentuser(on={value})": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/assignmentScheduleRequests/filterByCurrentUser(on={value})": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/assignmentSchedules": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/assignmentSchedules/{id}": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/assignmentSchedules/filterbycurrentuser(on={value})": "least=DelegatedWork,Application"
"/identityGovernance/privilegedAccess/group/assignmentSchedules/filterByCurrentUser(on={value})": "least=DelegatedWork,Application"
}
}
],
Expand Down Expand Up @@ -41306,14 +41306,14 @@
"GET"
],
"paths": {
"/identityGovernance/privilegedAccess/group/assignmentscheduleinstances": "",
"/identityGovernance/privilegedAccess/group/assignmentscheduleinstances/{id}": "",
"/identityGovernance/privilegedAccess/group/assignmentscheduleinstances/filterbycurrentuser(on={value})": "",
"/identityGovernance/privilegedAccess/group/assignmentschedulerequests/{id}": "",
"/identityGovernance/privilegedAccess/group/assignmentschedulerequests/filterbycurrentuser(on={value})": "",
"/identityGovernance/privilegedAccess/group/assignmentschedules": "",
"/identityGovernance/privilegedAccess/group/assignmentschedules/{id}": "",
"/identityGovernance/privilegedAccess/group/assignmentschedules/filterbycurrentuser(on={value})": ""
"/identityGovernance/privilegedAccess/group/assignmentscheduleInstances": "",
"/identityGovernance/privilegedAccess/group/assignmentscheduleInstances/{id}": "",
"/identityGovernance/privilegedAccess/group/assignmentscheduleInstances/filterByCurrentUser(on={value})": "",
Comment on lines +41353 to +41355
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In this pathSet the assignmentScheduleInstances segment is still spelled as assignmentscheduleInstances (lowercase s), while the read-only permission just above uses /assignmentScheduleInstances. This inconsistency is likely to break path matching; update these three paths to use the same casing as the canonical endpoint.

Copilot uses AI. Check for mistakes.
"/identityGovernance/privilegedAccess/group/assignmentScheduleRequests/{id}": "",
"/identityGovernance/privilegedAccess/group/assignmentScheduleRequests/filterByCurrentUser(on={value})": "",
"/identityGovernance/privilegedAccess/group/assignmentSchedules": "",
"/identityGovernance/privilegedAccess/group/assignmentSchedules/{id}": "",
"/identityGovernance/privilegedAccess/group/assignmentSchedules/filterByCurrentUser(on={value})": ""
}
},
{
Expand All @@ -41326,7 +41326,7 @@
"POST"
],
"paths": {
"/identityGovernance/privilegedAccess/group/assignmentschedulerequests": "least=DelegatedWork,Application"
"/identityGovernance/privilegedAccess/group/assignmentScheduleRequests": "least=DelegatedWork,Application"
}
},
{
Expand All @@ -41338,7 +41338,7 @@
"POST"
],
"paths": {
"/identityGovernance/privilegedAccess/group/assignmentschedulerequests/{id}/cancel": "least=DelegatedWork,Application"
"/identityGovernance/privilegedAccess/group/assignmentScheduleRequests/{id}/cancel": "least=DelegatedWork,Application"
}
}
],
Expand Down Expand Up @@ -41374,7 +41374,7 @@
"POST"
],
"paths": {
"/identityGovernance/privilegedAccess/group/assignmentschedulerequests": ""
"/identityGovernance/privilegedAccess/group/assignmentScheduleRequests": ""
}
}
],
Expand Down Expand Up @@ -41410,15 +41410,15 @@
"GET"
],
"paths": {
"/identityGovernance/privilegedAccess/group/eligibilityscheduleinstances": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityscheduleinstances/{id}": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityscheduleinstances/filterbycurrentuser(on={value})": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityschedulerequests": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityschedulerequests/{id}": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityschedulerequests/filterbycurrentuser(on={value})": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityschedules": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityschedules/{id}": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityschedules/filterbycurrentuser(on={value})": "least=DelegatedWork,Application"
"/identityGovernance/privilegedAccess/group/eligibilityScheduleInstances": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityScheduleInstances/{id}": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityScheduleInstances/filterByCurrentUser(on={value})": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityScheduleRequests": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityScheduleRequests/{id}": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityScheduleRequests/filterByCurrentUser(on={value})": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilitySchedules": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilitySchedules/{id}": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilitySchedules/filterByCurrentUser(on={value})": "least=DelegatedWork,Application"
}
}
],
Expand Down Expand Up @@ -41454,14 +41454,14 @@
"GET"
],
"paths": {
"/identityGovernance/privilegedAccess/group/eligibilityscheduleinstances": "",
"/identityGovernance/privilegedAccess/group/eligibilityscheduleinstances/{id}": "",
"/identityGovernance/privilegedAccess/group/eligibilityscheduleinstances/filterbycurrentuser(on={value})": "",
"/identityGovernance/privilegedAccess/group/eligibilityschedulerequests/{id}": "",
"/identityGovernance/privilegedAccess/group/eligibilityschedulerequests/filterbycurrentuser(on={value})": "",
"/identityGovernance/privilegedAccess/group/eligibilityschedules": "",
"/identityGovernance/privilegedAccess/group/eligibilityschedules/{id}": "",
"/identityGovernance/privilegedAccess/group/eligibilityschedules/filterbycurrentuser(on={value})": ""
"/identityGovernance/privilegedAccess/group/eligibilityScheduleInstances": "",
"/identityGovernance/privilegedAccess/group/eligibilityScheduleInstances/{id}": "",
"/identityGovernance/privilegedAccess/group/eligibilityScheduleInstances/filterByCurrentUser(on={value})": "",
"/identityGovernance/privilegedAccess/group/eligibilityScheduleRequests/{id}": "",
"/identityGovernance/privilegedAccess/group/eligibilityScheduleRequests/filterByCurrentUser(on={value})": "",
"/identityGovernance/privilegedAccess/group/eligibilitySchedules": "",
"/identityGovernance/privilegedAccess/group/eligibilitySchedules/{id}": "",
"/identityGovernance/privilegedAccess/group/eligibilitySchedules/filterByCurrentUser(on={value})": ""
}
},
{
Expand All @@ -41474,7 +41474,7 @@
"POST"
],
"paths": {
"/identityGovernance/privilegedAccess/group/eligibilityschedulerequests": "least=DelegatedWork,Application"
"/identityGovernance/privilegedAccess/group/eligibilityScheduleRequests": "least=DelegatedWork,Application"
}
},
{
Expand All @@ -41486,7 +41486,7 @@
"POST"
],
"paths": {
"/identityGovernance/privilegedAccess/group/eligibilityschedulerequests/{id}/cancel": "least=DelegatedWork,Application"
"/identityGovernance/privilegedAccess/group/eligibilityScheduleRequests/{id}/cancel": "least=DelegatedWork,Application"
}
}
],
Expand Down Expand Up @@ -41522,7 +41522,7 @@
"POST"
],
"paths": {
"/identityGovernance/privilegedAccess/group/eligibilityschedulerequests": ""
"/identityGovernance/privilegedAccess/group/eligibilityScheduleRequests": ""
}
}
],
Expand Down
96 changes: 96 additions & 0 deletions permissions/new/provisioningInfo.json
Original file line number Diff line number Diff line change
Expand Up @@ -11665,6 +11665,22 @@
"resourceAppId": ""
}
],
"PrivilegedAssignmentSchedule.Read.EntraAppRole": [
{
"scheme": "DelegatedWork",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
Comment on lines +11879 to +11884
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These new provisioning entries omit the id field entirely. Elsewhere in this file each scheme entry includes an id key (sometimes as an empty string for hidden entries); omitting it may break consumers that expect a consistent schema. Add an id field (or explicitly set it to an empty string) for both scheme objects here and keep the usual key ordering.

Copilot uses AI. Check for mistakes.
},
{
"scheme": "Application",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
}
],
"PrivilegedAssignmentSchedule.ReadWrite.AzureADGroup": [
{
"id": "06dbc45d-6708-4ef0-a797-f797ee68bf4b",
Expand All @@ -11683,6 +11699,22 @@
"resourceAppId": ""
}
],
"PrivilegedAssignmentSchedule.ReadWrite.EntraAppRole": [
{
"scheme": "DelegatedWork",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
Comment on lines +11913 to +11918
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These new provisioning entries omit the id field entirely. Elsewhere in this file each scheme entry includes an id key (sometimes as an empty string for hidden entries); omitting it may break consumers that expect a consistent schema. Add an id field (or explicitly set it to an empty string) for both scheme objects here and keep the usual key ordering.

Copilot uses AI. Check for mistakes.
},
{
"scheme": "Application",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
}
],
"PrivilegedAssignmentSchedule.Remove.AzureADGroup": [
{
"id": "ca5fe595-68ff-4dfd-907d-4509501a0e49",
Expand Down Expand Up @@ -11719,6 +11751,22 @@
"resourceAppId": ""
}
],
"PrivilegedEligibilitySchedule.Read.EntraAppRole": [
{
"scheme": "DelegatedWork",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
Comment on lines +11965 to +11970
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These new provisioning entries omit the id field entirely. Elsewhere in this file each scheme entry includes an id key (sometimes as an empty string for hidden entries); omitting it may break consumers that expect a consistent schema. Add an id field (or explicitly set it to an empty string) for both scheme objects here and keep the usual key ordering.

Copilot uses AI. Check for mistakes.
},
{
"scheme": "Application",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
}
],
"PrivilegedEligibilitySchedule.ReadWrite.AzureADGroup": [
{
"id": "ba974594-d163-484e-ba39-c330d5897667",
Expand All @@ -11737,6 +11785,22 @@
"resourceAppId": ""
}
],
"PrivilegedEligibilitySchedule.ReadWrite.EntraAppRole": [
{
"scheme": "DelegatedWork",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
Comment on lines +11999 to +12004
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These new provisioning entries omit the id field entirely. Elsewhere in this file each scheme entry includes an id key (sometimes as an empty string for hidden entries); omitting it may break consumers that expect a consistent schema. Add an id field (or explicitly set it to an empty string) for both scheme objects here and keep the usual key ordering.

Copilot uses AI. Check for mistakes.
},
{
"scheme": "Application",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
}
],
"PrivilegedEligibilitySchedule.Remove.AzureADGroup": [
{
"id": "c5ea9ab4-9b41-4c09-a400-53e652fb5096",
Expand Down Expand Up @@ -12751,6 +12815,22 @@
"resourceAppId": ""
}
],
"RoleManagementPolicy.Read.EntraAppRole": [
{
"scheme": "DelegatedWork",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
Comment on lines +13029 to +13034
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These new provisioning entries omit the id field entirely. Elsewhere in this file each scheme entry includes an id key (sometimes as an empty string for hidden entries); omitting it may break consumers that expect a consistent schema. Add an id field (or explicitly set it to an empty string) for both scheme objects here and keep the usual key ordering.

Copilot uses AI. Check for mistakes.
},
{
"scheme": "Application",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
}
],
"RoleManagementPolicy.Read.Group": [
{
"id": "29903fb3-460a-4f5b-b2a1-c4e24fefb882",
Expand Down Expand Up @@ -12805,6 +12885,22 @@
"resourceAppId": ""
}
],
"RoleManagementPolicy.ReadWrite.EntraAppRole": [
{
"scheme": "DelegatedWork",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
Comment on lines +13099 to +13104
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These new provisioning entries omit the id field entirely. Elsewhere in this file each scheme entry includes an id key (sometimes as an empty string for hidden entries); omitting it may break consumers that expect a consistent schema. Add an id field (or explicitly set it to an empty string) for both scheme objects here and keep the usual key ordering.

Copilot uses AI. Check for mistakes.
},
{
"scheme": "Application",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
}
],
"RoleManagementPolicy.ReadWrite.Group": [
{
"id": "097af673-cde2-4faf-83e8-f1d9876e1e3c",
Expand Down