Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
68 changes: 34 additions & 34 deletions permissions/new/permissions.json
Original file line number Diff line number Diff line change
Expand Up @@ -41264,13 +41264,13 @@
"paths": {
"/identityGovernance/privilegedAccess/group/assignmentScheduleInstances": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/assignmentScheduleInstances/{id}": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/assignmentScheduleInstances/filterbycurrentuser(on={value})": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/assignmentScheduleInstances/filterByCurrentUser(on={value})": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/assignmentScheduleRequests": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/assignmentScheduleRequests/{id}": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/assignmentScheduleRequests/filterbycurrentuser(on={value})": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/assignmentScheduleRequests/filterByCurrentUser(on={value})": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/assignmentSchedules": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/assignmentSchedules/{id}": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/assignmentSchedules/filterbycurrentuser(on={value})": "least=DelegatedWork,Application"
"/identityGovernance/privilegedAccess/group/assignmentSchedules/filterByCurrentUser(on={value})": "least=DelegatedWork,Application"
}
}
],
Expand Down Expand Up @@ -41306,14 +41306,14 @@
"GET"
],
"paths": {
"/identityGovernance/privilegedAccess/group/assignmentscheduleinstances": "",
"/identityGovernance/privilegedAccess/group/assignmentscheduleinstances/{id}": "",
"/identityGovernance/privilegedAccess/group/assignmentscheduleinstances/filterbycurrentuser(on={value})": "",
"/identityGovernance/privilegedAccess/group/assignmentschedulerequests/{id}": "",
"/identityGovernance/privilegedAccess/group/assignmentschedulerequests/filterbycurrentuser(on={value})": "",
"/identityGovernance/privilegedAccess/group/assignmentschedules": "",
"/identityGovernance/privilegedAccess/group/assignmentschedules/{id}": "",
"/identityGovernance/privilegedAccess/group/assignmentschedules/filterbycurrentuser(on={value})": ""
"/identityGovernance/privilegedAccess/group/assignmentscheduleInstances": "",
"/identityGovernance/privilegedAccess/group/assignmentscheduleInstances/{id}": "",
"/identityGovernance/privilegedAccess/group/assignmentscheduleInstances/filterByCurrentUser(on={value})": "",
Comment on lines +41309 to +41311
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In this pathSet the assignmentScheduleInstances segment is still spelled as assignmentscheduleInstances (lowercase s), while the read-only permission just above uses /assignmentScheduleInstances. This inconsistency is likely to break path matching; update these three paths to use the same casing as the canonical endpoint.

Copilot uses AI. Check for mistakes.
"/identityGovernance/privilegedAccess/group/assignmentScheduleRequests/{id}": "",
"/identityGovernance/privilegedAccess/group/assignmentScheduleRequests/filterByCurrentUser(on={value})": "",
"/identityGovernance/privilegedAccess/group/assignmentSchedules": "",
"/identityGovernance/privilegedAccess/group/assignmentSchedules/{id}": "",
"/identityGovernance/privilegedAccess/group/assignmentSchedules/filterByCurrentUser(on={value})": ""
}
},
{
Expand All @@ -41326,7 +41326,7 @@
"POST"
],
"paths": {
"/identityGovernance/privilegedAccess/group/assignmentschedulerequests": "least=DelegatedWork,Application"
"/identityGovernance/privilegedAccess/group/assignmentScheduleRequests": "least=DelegatedWork,Application"
}
},
{
Expand All @@ -41338,7 +41338,7 @@
"POST"
],
"paths": {
"/identityGovernance/privilegedAccess/group/assignmentschedulerequests/{id}/cancel": "least=DelegatedWork,Application"
"/identityGovernance/privilegedAccess/group/assignmentScheduleRequests/{id}/cancel": "least=DelegatedWork,Application"
}
}
],
Expand Down Expand Up @@ -41374,7 +41374,7 @@
"POST"
],
"paths": {
"/identityGovernance/privilegedAccess/group/assignmentschedulerequests": ""
"/identityGovernance/privilegedAccess/group/assignmentScheduleRequests": ""
}
}
],
Expand Down Expand Up @@ -41410,15 +41410,15 @@
"GET"
],
"paths": {
"/identityGovernance/privilegedAccess/group/eligibilityscheduleinstances": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityscheduleinstances/{id}": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityscheduleinstances/filterbycurrentuser(on={value})": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityschedulerequests": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityschedulerequests/{id}": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityschedulerequests/filterbycurrentuser(on={value})": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityschedules": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityschedules/{id}": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityschedules/filterbycurrentuser(on={value})": "least=DelegatedWork,Application"
"/identityGovernance/privilegedAccess/group/eligibilityScheduleInstances": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityScheduleInstances/{id}": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityScheduleInstances/filterByCurrentUser(on={value})": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityScheduleRequests": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityScheduleRequests/{id}": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilityScheduleRequests/filterByCurrentUser(on={value})": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilitySchedules": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilitySchedules/{id}": "least=DelegatedWork,Application",
"/identityGovernance/privilegedAccess/group/eligibilitySchedules/filterByCurrentUser(on={value})": "least=DelegatedWork,Application"
}
}
],
Expand Down Expand Up @@ -41454,14 +41454,14 @@
"GET"
],
"paths": {
"/identityGovernance/privilegedAccess/group/eligibilityscheduleinstances": "",
"/identityGovernance/privilegedAccess/group/eligibilityscheduleinstances/{id}": "",
"/identityGovernance/privilegedAccess/group/eligibilityscheduleinstances/filterbycurrentuser(on={value})": "",
"/identityGovernance/privilegedAccess/group/eligibilityschedulerequests/{id}": "",
"/identityGovernance/privilegedAccess/group/eligibilityschedulerequests/filterbycurrentuser(on={value})": "",
"/identityGovernance/privilegedAccess/group/eligibilityschedules": "",
"/identityGovernance/privilegedAccess/group/eligibilityschedules/{id}": "",
"/identityGovernance/privilegedAccess/group/eligibilityschedules/filterbycurrentuser(on={value})": ""
"/identityGovernance/privilegedAccess/group/eligibilityScheduleInstances": "",
"/identityGovernance/privilegedAccess/group/eligibilityScheduleInstances/{id}": "",
"/identityGovernance/privilegedAccess/group/eligibilityScheduleInstances/filterByCurrentUser(on={value})": "",
"/identityGovernance/privilegedAccess/group/eligibilityScheduleRequests/{id}": "",
"/identityGovernance/privilegedAccess/group/eligibilityScheduleRequests/filterByCurrentUser(on={value})": "",
"/identityGovernance/privilegedAccess/group/eligibilitySchedules": "",
"/identityGovernance/privilegedAccess/group/eligibilitySchedules/{id}": "",
"/identityGovernance/privilegedAccess/group/eligibilitySchedules/filterByCurrentUser(on={value})": ""
}
},
{
Expand All @@ -41474,7 +41474,7 @@
"POST"
],
"paths": {
"/identityGovernance/privilegedAccess/group/eligibilityschedulerequests": "least=DelegatedWork,Application"
"/identityGovernance/privilegedAccess/group/eligibilityScheduleRequests": "least=DelegatedWork,Application"
}
},
{
Expand All @@ -41486,7 +41486,7 @@
"POST"
],
"paths": {
"/identityGovernance/privilegedAccess/group/eligibilityschedulerequests/{id}/cancel": "least=DelegatedWork,Application"
"/identityGovernance/privilegedAccess/group/eligibilityScheduleRequests/{id}/cancel": "least=DelegatedWork,Application"
}
}
],
Expand Down Expand Up @@ -41522,7 +41522,7 @@
"POST"
],
"paths": {
"/identityGovernance/privilegedAccess/group/eligibilityschedulerequests": ""
"/identityGovernance/privilegedAccess/group/eligibilityScheduleRequests": ""
}
}
],
Expand Down
96 changes: 96 additions & 0 deletions permissions/new/provisioningInfo.json
Original file line number Diff line number Diff line change
Expand Up @@ -11665,6 +11665,22 @@
"resourceAppId": ""
}
],
"PrivilegedAssignmentSchedule.Read.EntraAppRole": [
{
"scheme": "DelegatedWork",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
Comment on lines +11669 to +11674
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These new provisioning entries omit the id field entirely. Elsewhere in this file each scheme entry includes an id key (sometimes as an empty string for hidden entries); omitting it may break consumers that expect a consistent schema. Add an id field (or explicitly set it to an empty string) for both scheme objects here and keep the usual key ordering.

Copilot uses AI. Check for mistakes.
},
{
"scheme": "Application",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
}
],
"PrivilegedAssignmentSchedule.ReadWrite.AzureADGroup": [
{
"id": "06dbc45d-6708-4ef0-a797-f797ee68bf4b",
Expand All @@ -11683,6 +11699,22 @@
"resourceAppId": ""
}
],
"PrivilegedAssignmentSchedule.ReadWrite.EntraAppRole": [
{
"scheme": "DelegatedWork",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
Comment on lines +11703 to +11708
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These new provisioning entries omit the id field entirely. Elsewhere in this file each scheme entry includes an id key (sometimes as an empty string for hidden entries); omitting it may break consumers that expect a consistent schema. Add an id field (or explicitly set it to an empty string) for both scheme objects here and keep the usual key ordering.

Copilot uses AI. Check for mistakes.
},
{
"scheme": "Application",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
}
],
"PrivilegedAssignmentSchedule.Remove.AzureADGroup": [
{
"id": "ca5fe595-68ff-4dfd-907d-4509501a0e49",
Expand Down Expand Up @@ -11719,6 +11751,22 @@
"resourceAppId": ""
}
],
"PrivilegedEligibilitySchedule.Read.EntraAppRole": [
{
"scheme": "DelegatedWork",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
Comment on lines +11755 to +11760
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These new provisioning entries omit the id field entirely. Elsewhere in this file each scheme entry includes an id key (sometimes as an empty string for hidden entries); omitting it may break consumers that expect a consistent schema. Add an id field (or explicitly set it to an empty string) for both scheme objects here and keep the usual key ordering.

Copilot uses AI. Check for mistakes.
},
{
"scheme": "Application",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
}
],
"PrivilegedEligibilitySchedule.ReadWrite.AzureADGroup": [
{
"id": "ba974594-d163-484e-ba39-c330d5897667",
Expand All @@ -11737,6 +11785,22 @@
"resourceAppId": ""
}
],
"PrivilegedEligibilitySchedule.ReadWrite.EntraAppRole": [
{
"scheme": "DelegatedWork",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
Comment on lines +11789 to +11794
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These new provisioning entries omit the id field entirely. Elsewhere in this file each scheme entry includes an id key (sometimes as an empty string for hidden entries); omitting it may break consumers that expect a consistent schema. Add an id field (or explicitly set it to an empty string) for both scheme objects here and keep the usual key ordering.

Copilot uses AI. Check for mistakes.
},
{
"scheme": "Application",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
}
],
"PrivilegedEligibilitySchedule.Remove.AzureADGroup": [
{
"id": "c5ea9ab4-9b41-4c09-a400-53e652fb5096",
Expand Down Expand Up @@ -12751,6 +12815,22 @@
"resourceAppId": ""
}
],
"RoleManagementPolicy.Read.EntraAppRole": [
{
"scheme": "DelegatedWork",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
Comment on lines +12819 to +12824
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These new provisioning entries omit the id field entirely. Elsewhere in this file each scheme entry includes an id key (sometimes as an empty string for hidden entries); omitting it may break consumers that expect a consistent schema. Add an id field (or explicitly set it to an empty string) for both scheme objects here and keep the usual key ordering.

Copilot uses AI. Check for mistakes.
},
{
"scheme": "Application",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
}
],
"RoleManagementPolicy.Read.Group": [
{
"id": "29903fb3-460a-4f5b-b2a1-c4e24fefb882",
Expand Down Expand Up @@ -12805,6 +12885,22 @@
"resourceAppId": ""
}
],
"RoleManagementPolicy.ReadWrite.EntraAppRole": [
{
"scheme": "DelegatedWork",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
Comment on lines +12889 to +12894
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These new provisioning entries omit the id field entirely. Elsewhere in this file each scheme entry includes an id key (sometimes as an empty string for hidden entries); omitting it may break consumers that expect a consistent schema. Add an id field (or explicitly set it to an empty string) for both scheme objects here and keep the usual key ordering.

Copilot uses AI. Check for mistakes.
},
{
"scheme": "Application",
"environment": "",
"isHidden": true,
"isEnabled": true,
"resourceAppId": "01fc33a7-78ba-4d2f-a4b7-768e336e890e"
}
],
"RoleManagementPolicy.ReadWrite.Group": [
{
"id": "097af673-cde2-4faf-83e8-f1d9876e1e3c",
Expand Down