List governanceRoleAssignmentRequests
Namespace: microsoft.graph
Important
APIs under the /beta
version in Microsoft Graph are subject to change. Use of these APIs in production applications is not supported. To determine whether an API is available in v1.0, use the Version selector.
Caution
This version of the Privileged Identity Management (PIM) API for Azure resources will be deprecated soon. Please use the new Azure REST PIM API for Azure resource roles.
Retrieve a collection of governanceRoleAssignmentRequests.
This API is available in the following national cloud deployments.
Global service | US Government L4 | US Government L5 (DOD) | China operated by 21Vianet |
---|---|---|---|
✅ | ✅ | ✅ | ❌ |
Permissions
The following tables show the least privileged permission or permissions required to call this API on each supported resource type. Follow best practices to request least privileged permissions. For details about delegated and application permissions, see Permission types. To learn more about these permissions, see the permissions reference.
Azure resources
Permission type | Least privileged permissions | Higher privileged permissions |
---|---|---|
Delegated (work or school account) | PrivilegedAccess.ReadWrite.AzureAD | PrivilegedAccess.ReadWrite.AzureADGroup, PrivilegedAccess.ReadWrite.AzureResources |
Delegated (personal Microsoft account) | Not supported. | Not supported. |
Application | PrivilegedAccess.Read.AzureAD | PrivilegedAccess.Read.AzureADGroup, PrivilegedAccess.Read.AzureResources |
Microsoft Entra ID
Permission type | Least privileged permissions | Higher privileged permissions |
---|---|---|
Delegated (work or school account) | PrivilegedAccess.ReadWrite.AzureAD | PrivilegedAccess.ReadWrite.AzureADGroup, PrivilegedAccess.ReadWrite.AzureResources |
Delegated (personal Microsoft account) | Not supported. | Not supported. |
Application | PrivilegedAccess.Read.AzureAD | PrivilegedAccess.Read.AzureADGroup, PrivilegedAccess.Read.AzureResources |
Groups
Permission type | Least privileged permissions | Higher privileged permissions |
---|---|---|
Delegated (work or school account) | PrivilegedAccess.ReadWrite.AzureAD | PrivilegedAccess.ReadWrite.AzureADGroup, PrivilegedAccess.ReadWrite.AzureResources |
Delegated (personal Microsoft account) | Not supported. | Not supported. |
Application | PrivilegedAccess.Read.AzureAD | PrivilegedAccess.Read.AzureADGroup, PrivilegedAccess.Read.AzureResources |
HTTP request
List a collection of governanceRoleAssignmentRequests on a resource.
Note: Besides the permission scope, the request requires the requestor to have at least one role assignment on the resource.
GET /privilegedAccess/azureResources/resources/{resourceId}/roleAssignmentRequests
GET /privilegedAccess/azureResources/roleAssignmentRequests?$filter=resourceId+eq+'{resourceId}'
List a collection of governanceRoleAssignmentRequests of mine.
GET /privilegedAccess/azureResources/roleAssignmentRequests?$filter=subjectId+eq+'{myId}'
List a collection of governanceRoleAssignmentRequests that are pending administrator decisions.
Note: Besides the permission scope, this request requires the requestor to have at least one
Active
administrator role assignment (owner
oruser access administrator
) on the resource.
GET /privilegedAccess/azureResources/roleAssignmentRequests?$filter=status/subStatus+eq+'PendingAdminDecision'
Optional query parameters
This method supports the OData query parameters to help customize the response.
Request headers
Name | Description |
---|---|
Authorization | Bearer {token}. Required. Learn more about authentication and authorization. |
Request body
Don't supply a request body for this method.
Response
If successful, this method returns a 200 OK
response code and a collection of governanceRoleAssignmentRequest objects in the response body.
Example
Administrators query pending role assignment requests for subscription Wingtip Toys - Prod.
Request
GET https://graph.microsoft.com/beta/privilegedAccess/azureResources/roleAssignmentRequests?$filter=resourceId+eq+'e5e7d29d-5465-45ac-885f-4716a5ee74b5'
Response
The following example shows the response.
Note: The response object shown here might be shortened for readability.
HTTP/1.1 200 OK
Content-type: application/json
{
"@odata.context": "https://graph.microsoft.com/beta/$metadata#governanceRoleAssignmentRequests",
"value": [
{
"id": "d75c65d8-9e66-44ff-b1cd-1ab0947fde1d",
"resourceId": "e5e7d29d-5465-45ac-885f-4716a5ee74b5",
"roleDefinitionId": "8b4d1d51-08e9-4254-b0a6-b16177aae376",
"subjectId": "918e54be-12c4-4f4c-a6d3-2ee0e3661c51",
"linkedEligibleRoleAssignmentId": "",
"type": "UserRemove",
"assignmentState": "Active",
"requestedDateTime": "2018-01-09T23:41:34.367Z",
"reason": "Deactivation request",
"schedule": null,
"status": {
"status": "Closed",
"subStatus": "Revoked",
"statusDetails": []
}
},
{
"id": "38f42071-3e81-4191-8c0b-11450fb6b547",
"resourceId": "e5e7d29d-5465-45ac-885f-4716a5ee74b5",
"roleDefinitionId": "8b4d1d51-08e9-4254-b0a6-b16177aae376",
"subjectId": "918e54be-12c4-4f4c-a6d3-2ee0e3661c51",
"linkedEligibleRoleAssignmentId": "",
"type": "UserAdd",
"assignmentState": "Active",
"requestedDateTime": "2018-01-10T20:58:09.163Z",
"reason": "test activations",
"status": {
"status": "Closed",
"subStatus": "Provisioned",
"statusDetails": [
{
"key": "EligibilityRule",
"value": "Grant"
},
{
"key": "ExpirationRule",
"value": "Grant"
},
{
"key": "MfaRule",
"value": "Grant"
},
{
"key": "JustificationRule",
"value": "Grant"
},
{
"key": "ActivationDayRule",
"value": "Grant"
},
{
"key": "ApprovalRule",
"value": "Grant"
}
]
},
"schedule": {
"type": "Once",
"startDateTime": "2018-01-10T20:58:11.363914Z",
"endDateTime": "0001-01-01T00:00:00Z",
"duration": "PT5H"
}
},
...
]
}