Apple Internet accounts Azure Enterprise application

Lokesh K 30 Reputation points
2025-04-09T11:54:02.82+00:00

Hi All, I would like to gather the inputs about "Apple Internet Accounts" on what it does as an Enterprise application. The below are the Permissions delegated

ResourceName Scope
ResourceName Scope
Microsoft Graph Calendars.Read
Microsoft Graph EAS.AccessAsUser.All
Microsoft Graph EWS.AccessAsUser.All
Microsoft Graph offline_access
Microsoft Graph openid
Microsoft Graph People.Read
Microsoft Graph User.Read
Office 365 Exchange Online EAS.AccessAsUser.All
Office 365 Exchange Online EWS.AccessAsUser.All
Office 365 Exchange Online full_access_as_user
Windows Azure Active Directory User.Read

-> What will happen if we block this application in Enterprise app? Will the apple users still be able to access M365 services?

Microsoft Security | Microsoft Entra | Microsoft Entra ID
{count} votes

1 answer

Sort by: Most helpful
  1. Venkata Jagadeep 1,400 Reputation points Microsoft External Staff Moderator
    2025-04-10T13:21:52.21+00:00

    Hello Lokesh K,

    As per the description, we understand that you want to know the capabilities of the application "Apple Internet Accounts" when you provide delegated permissions. And what will happen to apple users accessing M365 when you disable this application.

    Delegated permissions are used in scenarios where an application acts on behalf of a signed-in user. These permissions allow the application to access resources that the user has access to.

    So, even when application is disabled, user permissions will not change in M365.

    The applications which are using Apple Internet Accounts will not be able to access these resources when you disable the application in Enterprise Applications in Entra ID.

    For example, in your scenario, you have given calendars.read permision. This Allows the app to read events of all calendars with a signed-in user through MS Graph or Office 365 Exchange online or Windows Azure Active Directory.

    EAS.AccessAsUser.All

    Allows the app to have the same access to mailboxes as the signed-in user via Exchange ActiveSync.

    EWS.AccessAsUser.All

    Allows the app to have the same access to mailboxes as the signed-in user via Exchange Web Services.

    offline_access

    Allows the app to see and update the data you gave it access to, even when users are not currently using the app. This does not give the app any additional permissions.

    openid

    offline_access is an OpenID Connect (OIDC) scope.

    You can use the OIDC scopes to specify artifacts that you want returned in Microsoft identity platform authorization and token requests. The Microsoft identity platform v1.0 and v2.0 endpoints support OIDC scopes differently.

    People.Read

    Allows the app to read a ranked list of relevant people of the signed-in user. The list includes local contacts, contacts from social networking, your organization's directory, and people from recent communications (such as email and Skype).

    User.Read

    Allows users to sign-in to the app and allows the app to read the profile of signed-in users. It also allows the app to read basic company information of signed-in users.

    I suggest you refer the below document

    https://learn.microsoft.com/en-us/graph/permissions-reference

    Please let me now if you have any further questions.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.