Get tenantAppManagementPolicy

Namespace: microsoft.graph

Read the properties of a tenantAppManagementPolicy object.

This API is supported in the following national cloud deployments.

Global service US Government L4 US Government L5 (DOD) China operated by 21Vianet

Permissions

One of the following permissions is required to call this API. To learn more, including how to choose permissions, see Permissions.

Permission type Permissions (from least to most privileged)
Delegated (work or school account) Policy.Read.All, Policy.ReadWrite.ApplicationConfiguration
Delegated (personal Microsoft account) Not supported.
Application Policy.Read.All, Policy.ReadWrite.ApplicationConfiguration

To configure application authentication method policies, the calling user must also be assigned at least the Application Administrator or Cloud Application Administrator directory role.

HTTP request

GET /policies/defaultAppManagementPolicy

Request headers

Name Description
Authorization Bearer {token}. Required.

Request body

Do not supply a request body for this method.

Response

If successful, this method returns a 200 OK response code and the requested defaultAppManagementPolicy object in the response body.

Examples

Request

The following is an example of the request.

GET https://graph.microsoft.com/v1.0/policies/defaultAppManagementPolicy

Response

The following is an example of the response that shows the default tenant app management policy.

HTTP/1.1 200 OK
Content-type: application/json

{
    "@odata.context": "https://graph.microsoft.com/v1.0/$metadata#policies/defaultAppManagementPolicy/$entity",
    "@odata.id": "https://graph.microsoft.com/v2/927c6607-8060-4f4a-a5f8-34964ac78d70/defaultAppManagementPolicy/00000000-0000-0000-0000-000000000000",
    "id": "00000000-0000-0000-0000-000000000000",
    "displayName": "Default app management tenant policy",
    "description": "Default tenant policy that enforces app management restrictions on applications and service principals. To apply policy to targeted resources, create a new policy under appManagementPolicies collection.",
    "isEnabled": false,
    "applicationRestrictions": {
        "passwordCredentials": [],
        "keyCredentials":[]
    },
    "servicePrincipalRestrictions": {
        "passwordCredentials": [],
        "keyCredentials":[]
    }
}