You shouldn't need to remove the app, just re-trigger the consent process and have an admin from the other tenant complete it. This will result in adding the required permissions. Otherwise, you can either remove the app entry under Azure AD blade > Enterprise apps (you cannot do the same task via the myApps portal), or use PowerShell to remove individual permission entries. You can get a list of the relevant cmdlets by selecting the app under Enterprise apps > Permissions > Review permissions > select This application has more permissions than I want. Here's a sample set of cmdlets to use:
Connect-AzureAD
# Get Service Principal using objectId
$sp = Get-AzureADServicePrincipal -ObjectId "db23f88f-d49d-42b0-b30c-bc3cad9bf224"
# Get all delegated permissions for the service principal
$spOAuth2PermissionsGrants = Get-AzureADOAuth2PermissionGrant -All $true| Where-Object { $_.clientId -eq $sp.ObjectId }
# Remove all delegated permissions
$spOAuth2PermissionsGrants | ForEach-Object {
Remove-AzureADOAuth2PermissionGrant -ObjectId $_.ObjectId
}
# Get all application permissions for the service principal
$spApplicationPermissions = Get-AzureADServiceAppRoleAssignedTo -ObjectId $sp.ObjectId -All $true | Where-Object { $_.PrincipalType -eq "ServicePrincipal" }
# Remove all delegated permissions
$spApplicationPermissions | ForEach-Object {
Remove-AzureADServiceAppRoleAssignment -ObjectId $_.PrincipalId -AppRoleAssignmentId $_.objectId
}