I'll try to guide you based on the information you provided.
- Application Permissions in Azure AD:
- Azure AD applications have two types of permissions: Delegated permissions and Application permissions. The difference is that Delegated permissions are used by apps that run with a signed-in user present, whereas Application permissions are used by apps that run as a background service or daemon without a signed-in user.
- For certain tasks, applications do need specific permissions. For example, to manage objects in the directory, such as users or groups, the application might require directory permissions.
- However, it's correct that applications cannot be assigned roles like "Global Admin" or "Contributor". Roles like these are designed for users. Instead, you assign the necessary permissions directly to the application or to a security group that the application is a member of.
- For certain tasks, applications do need specific permissions. For example, to manage objects in the directory, such as users or groups, the application might require directory permissions.
- Azure AD applications have two types of permissions: Delegated permissions and Application permissions. The difference is that Delegated permissions are used by apps that run with a signed-in user present, whereas Application permissions are used by apps that run as a background service or daemon without a signed-in user.