Microsoft.Graph.Applications

Microsoft Graph PowerShell Cmdlets

Microsoft.Graph.Applications

Add-MgApplicationKey

Add a key credential to an application. This method, along with removeKey can be used by an application to automate rolling its expiring keys. As part of the request validation for this method, a proof of possession of an existing key is verified before the action can be performed. Applications that don't have any existing valid certificates (no certificates have been added yet, or all certificates have expired), won't be able to use this service action. You can use the Update application operation to perform an update instead.

Add-MgApplicationPassword

Adds a strong password or secret to an application.

Add-MgServicePrincipalKey

Adds a key credential to a servicePrincipal. This method along with removeKey can be used by a servicePrincipal to automate rolling its expiring keys. As part of the request validation for this method, a proof of possession of an existing key is verified before the action can be performed. ServicePrincipals that don't have any existing valid certificates (i.e.: no certificates have been added yet, or all certificates have expired), won't be able to use this service action. Update servicePrincipal can be used to perform an update instead.

Add-MgServicePrincipalPassword

Add a strong password or secret to a servicePrincipal object.

Add-MgServicePrincipalTokenSigningCertificate

Create a self-signed signing certificate and return a selfSignedCertificate object, which is the public part of the generated certificate. The self-signed signing certificate is composed of the following objects, which are added to the servicePrincipal: \n+ The keyCredentials object with the following objects:\n + A private key object with usage set to Sign.\n + A public key object with usage set to Verify.\n+ The passwordCredentials object. All the objects have the same value of customKeyIdentifier. The passwordCredential is used to open the PFX file (private key). It and the associated private key object have the same value of keyId. When set during creation through the displayName property, the subject of the certificate cannot be updated. The startDateTime is set to the same time the certificate is created using the action. The endDateTime can be up to three years after the certificate is created.

Clear-MgApplicationVerifiedPublisher

Unset the verifiedPublisher previously set on an application, removing all verified publisher properties. For more information, see Publisher verification.

Confirm-MgApplicationMemberGroup

Check for membership in a specified list of group IDs, and return from that list those groups (identified by IDs) of which the specified user, group, service principal, organizational contact, device, or directory object is a member. This function is transitive. You can check up to a maximum of 20 groups per request. This function supports all groups provisioned in Azure AD. Because Microsoft 365 groups cannot contain other groups, membership in a Microsoft 365 group is always direct.

Confirm-MgApplicationMemberObject

Invoke action checkMemberObjects

Confirm-MgServicePrincipalMemberGroup

Check for membership in a specified list of group IDs, and return from that list those groups (identified by IDs) of which the specified user, group, service principal, organizational contact, device, or directory object is a member. This function is transitive. You can check up to a maximum of 20 groups per request. This function supports all groups provisioned in Azure AD. Because Microsoft 365 groups cannot contain other groups, membership in a Microsoft 365 group is always direct.

Confirm-MgServicePrincipalMemberObject

Invoke action checkMemberObjects

Get-MgApplication

Get the properties and relationships of an application object.

Get-MgApplicationById

Return the directory objects specified in a list of IDs. Some common uses for this function are to:

Get-MgApplicationCreatedOnBehalfOf

Supports $filter (/$count eq 0, /$count ne 0). Read-only.

Get-MgApplicationCreatedOnBehalfOfByRef

Invoke action getByIds

Get-MgApplicationDelta

Invoke function delta

Get-MgApplicationExtensionProperty

Read-only. Nullable. Supports $expand and $filter (/$count eq 0, /$count ne 0).

Get-MgApplicationFederatedIdentityCredential

Federated identities for applications. Supports $expand and $filter (startsWith, /$count eq 0, /$count ne 0).

Get-MgApplicationHomeRealmDiscoveryPolicy

Get homeRealmDiscoveryPolicies from applications

Get-MgApplicationLogo

The main logo for the application. Not nullable.

Get-MgApplicationMemberGroup

Return all the group IDs for the groups that the specified user, group, service principal, organizational contact, device, or directory object is a member of. This function is transitive.

Get-MgApplicationMemberObject

Return all IDs for the groups, administrative units, and directory roles that a user, group, service principal, organizational contact, device, or directory object is a member of. This function is transitive. Note: Only users and role-enabled groups can be members of directory roles.

Get-MgApplicationOwner

Directory objects that are owners of the application. Read-only. Nullable. Supports $expand and $filter (/$count eq 0, /$count ne 0, /$count eq 1, /$count ne 1).

Get-MgApplicationOwnerByRef

Directory objects that are owners of the application. Read-only. Nullable. Supports $expand and $filter (/$count eq 0, /$count ne 0, /$count eq 1, /$count ne 1).

Get-MgApplicationTemplate

Retrieve the properties of an applicationTemplate object.

Get-MgApplicationTokenIssuancePolicy

List the tokenIssuancePolicy objects that are assigned to an application.

Get-MgApplicationTokenIssuancePolicyByRef

List the tokenIssuancePolicy objects that are assigned to an application.

Get-MgApplicationTokenLifetimePolicy

List the tokenLifetimePolicy objects that are assigned to an application.

Get-MgApplicationTokenLifetimePolicyByRef

List the tokenLifetimePolicy objects that are assigned to an application.

Get-MgGroupAppRoleAssignment

Represents the app roles a group has been granted for an application. Supports $expand.

Get-MgServicePrincipal

Retrieve the properties and relationships of a servicePrincipal object.

Get-MgServicePrincipalAppRoleAssignedTo

App role assignments for this app or service, granted to users, groups, and other service principals. Supports $expand.

Get-MgServicePrincipalAppRoleAssignment

App role assignment for another app or service, granted to this service principal. Supports $expand.

Get-MgServicePrincipalById

Return the directory objects specified in a list of IDs. Some common uses for this function are to:

Get-MgServicePrincipalClaimMappingPolicy

List the claimsMappingPolicy objects that are assigned to a servicePrincipal.

Get-MgServicePrincipalClaimMappingPolicyByRef

List the claimsMappingPolicy objects that are assigned to a servicePrincipal.

Get-MgServicePrincipalCreatedObject

Directory objects created by this service principal. Read-only. Nullable.

Get-MgServicePrincipalDelegatedPermissionClassification

Get delegatedPermissionClassifications from servicePrincipals

Get-MgServicePrincipalDelta

Invoke function delta

Get-MgServicePrincipalEndpoint

Get endpoints from servicePrincipals

Get-MgServicePrincipalHomeRealmDiscoveryPolicy

List the homeRealmDiscoveryPolicy objects that are assigned to a servicePrincipal.

Get-MgServicePrincipalHomeRealmDiscoveryPolicyByRef

List the homeRealmDiscoveryPolicy objects that are assigned to a servicePrincipal.

Get-MgServicePrincipalMemberGroup

Return all the group IDs for the groups that the specified user, group, service principal, organizational contact, device, or directory object is a member of. This function is transitive.

Get-MgServicePrincipalMemberObject

Return all IDs for the groups, administrative units, and directory roles that a user, group, service principal, organizational contact, device, or directory object is a member of. This function is transitive. Note: Only users and role-enabled groups can be members of directory roles.

Get-MgServicePrincipalMemberOf

Roles that this service principal is a member of. HTTP Methods: GET Read-only. Nullable. Supports $expand.

Get-MgServicePrincipalMemberOfByRef

Invoke action getMemberObjects

Get-MgServicePrincipalOauth2PermissionGrant

Delegated permission grants authorizing this service principal to access an API on behalf of a signed-in user. Read-only. Nullable.

Get-MgServicePrincipalOwnedObject

Directory objects that are owned by this service principal. Read-only. Nullable. Supports $expand and $filter (/$count eq 0, /$count ne 0, /$count eq 1, /$count ne 1).

Get-MgServicePrincipalOwner

Directory objects that are owners of this servicePrincipal. The owners are a set of non-admin users or servicePrincipals who are allowed to modify this object. Read-only. Nullable. Supports $expand and $filter (/$count eq 0, /$count ne 0, /$count eq 1, /$count ne 1).

Get-MgServicePrincipalOwnerByRef

Directory objects that are owners of this servicePrincipal. The owners are a set of non-admin users or servicePrincipals who are allowed to modify this object. Read-only. Nullable. Supports $expand and $filter (/$count eq 0, /$count ne 0, /$count eq 1, /$count ne 1).

Get-MgServicePrincipalTokenIssuancePolicy

The tokenIssuancePolicies assigned to this service principal.

Get-MgServicePrincipalTokenLifetimePolicy

The tokenLifetimePolicies assigned to this service principal.

Get-MgServicePrincipalTransitiveMemberOf

Get transitiveMemberOf from servicePrincipals

Get-MgUserAppRoleAssignment

Represents the app roles a user has been granted for an application. Supports $expand.

Invoke-MgInstantiateApplicationTemplate

Add an instance of an application from the Azure AD application gallery into your directory. You can also use this API to instantiate non-gallery apps. Use the following ID for the applicationTemplate object: 8adf8e6e-67b2-4cf2-a259-e3dc5476c621.

New-MgApplication

Create a new application object.

New-MgApplicationExtensionProperty

Create a new directory extension definition, represented by an extensionProperty object.

New-MgApplicationFederatedIdentityCredential

Create a new federatedIdentityCredential object for an application. By configuring a trust relationship between your Azure AD application registration and the identity provider for your compute platform, you can use tokens issued by that platform to authenticate with Microsoft identity platform and call APIs in the Microsoft ecosystem. Maximum of 20 objects can be added to an application.

New-MgApplicationOwnerByRef

Create new navigation property ref to owners for applications

New-MgApplicationTokenIssuancePolicyByRef

Create new navigation property ref to tokenIssuancePolicies for applications

New-MgApplicationTokenLifetimePolicyByRef

Create new navigation property ref to tokenLifetimePolicies for applications

New-MgGroupAppRoleAssignment

Use this API to assign an app role to a security group. All direct members of the group will be considered assigned. Security groups with dynamic memberships are supported. To grant an app role assignment to a group, you need three identifiers: Additional licenses might be required to use a group to manage access to applications.

New-MgServicePrincipal

Create a new servicePrincipal object.

New-MgServicePrincipalAppRoleAssignedTo

Assign an app role for a resource service principal, to a user, group, or client service principal. App roles that are assigned to service principals are also known as application permissions. Application permissions can be granted directly with app role assignments, or through a consent experience. To grant an app role assignment, you need three identifiers:

New-MgServicePrincipalAppRoleAssignment

Assign an app role to a client service principal. App roles that are assigned to service principals are also known as application permissions. Application permissions can be granted directly with app role assignments, or through a consent experience. To grant an app role assignment to a client service principal, you need three identifiers:

New-MgServicePrincipalClaimMappingPolicyByRef

Create new navigation property ref to claimsMappingPolicies for servicePrincipals

New-MgServicePrincipalDelegatedPermissionClassification

Classify a delegated permission by adding a delegatedPermissionClassification to the servicePrincipal representing the API.

New-MgServicePrincipalEndpoint

Create new navigation property to endpoints for servicePrincipals

New-MgServicePrincipalHomeRealmDiscoveryPolicyByRef

Create new navigation property ref to homeRealmDiscoveryPolicies for servicePrincipals

New-MgServicePrincipalMemberOfByRef

The homeRealmDiscoveryPolicies assigned to this service principal. Supports $expand.

New-MgServicePrincipalOwnerByRef

Create new navigation property ref to owners for servicePrincipals

New-MgUserAppRoleAssignment

Use this API to assign an app role to a user. To grant an app role assignment to a user, you need three identifiers:

Remove-MgApplication

Delete an application object. When deleted, apps are moved to a temporary container and can be restored within 30 days. After that time, they are permanently deleted.

Remove-MgApplicationCreatedOnBehalfOfByRef

Delete entity from applications

Remove-MgApplicationExtensionProperty

Delete navigation property extensionProperties for applications

Remove-MgApplicationFederatedIdentityCredential

Delete navigation property federatedIdentityCredentials for applications

Remove-MgApplicationKey

Remove a key credential from an application. This method along with addKey can be used by an application to automate rolling its expiring keys. As part of the request validation for this method, a proof of possession of an existing key is verified before the action can be performed.

Remove-MgApplicationOwnerByRef

Delete ref of navigation property owners for applications

Remove-MgApplicationPassword

Remove a password from an application.

Remove-MgApplicationTokenIssuancePolicyByRef

Delete ref of navigation property tokenIssuancePolicies for applications

Remove-MgApplicationTokenLifetimePolicyByRef

Delete ref of navigation property tokenLifetimePolicies for applications

Remove-MgGroupAppRoleAssignment

Delete navigation property appRoleAssignments for groups

Remove-MgServicePrincipal

Delete a servicePrincipal object.

Remove-MgServicePrincipalAppRoleAssignedTo

Delete navigation property appRoleAssignedTo for servicePrincipals

Remove-MgServicePrincipalAppRoleAssignment

Delete navigation property appRoleAssignments for servicePrincipals

Remove-MgServicePrincipalClaimMappingPolicyByRef

Delete ref of navigation property claimsMappingPolicies for servicePrincipals

Remove-MgServicePrincipalDelegatedPermissionClassification

Delete navigation property delegatedPermissionClassifications for servicePrincipals

Remove-MgServicePrincipalEndpoint

Delete navigation property endpoints for servicePrincipals

Remove-MgServicePrincipalHomeRealmDiscoveryPolicyByRef

Delete ref of navigation property homeRealmDiscoveryPolicies for servicePrincipals

Remove-MgServicePrincipalKey

Remove a key credential from a servicePrincipal. This method along with addKey can be used by a servicePrincipal to automate rolling its expiring keys. As part of the request validation for this method, a proof of possession of an existing key is verified before the action can be performed.

Remove-MgServicePrincipalOwnerByRef

Delete ref of navigation property owners for servicePrincipals

Remove-MgServicePrincipalPassword

Remove a password from a servicePrincipal object.

Remove-MgUserAppRoleAssignment

Delete navigation property appRoleAssignments for users

Set-MgApplicationLogo

The main logo for the application. Not nullable.

Set-MgApplicationVerifiedPublisher

Set the verifiedPublisher on an application. For more information, including prerequisites to setting a verified publisher, see Publisher verification.

Test-MgApplicationProperty

Validate that a Microsoft 365 group's display name or mail nickname complies with naming policies. Clients can use this API to determine whether a display name or mail nickname is valid before trying to create a Microsoft 365 group. To validate the properties of an existing group, use the group: validateProperties function. The following policy validations are performed for the display name and mail nickname properties:\n1. Validate the prefix and suffix naming policy\n2. Validate the custom banned words policy\n3. Validate that the mail nickname is unique This API only returns the first validation failure that is encountered. If the properties fail multiple validations, only the first validation failure is returned. However, you can validate both the mail nickname and the display name and receive a collection of validation errors if you are only validating the prefix and suffix naming policy. To learn more about configuring naming policies, see Configure naming policy.

Test-MgServicePrincipalProperty

Validate that a Microsoft 365 group's display name or mail nickname complies with naming policies. Clients can use this API to determine whether a display name or mail nickname is valid before trying to create a Microsoft 365 group. To validate the properties of an existing group, use the group: validateProperties function. The following policy validations are performed for the display name and mail nickname properties:\n1. Validate the prefix and suffix naming policy\n2. Validate the custom banned words policy\n3. Validate that the mail nickname is unique This API only returns the first validation failure that is encountered. If the properties fail multiple validations, only the first validation failure is returned. However, you can validate both the mail nickname and the display name and receive a collection of validation errors if you are only validating the prefix and suffix naming policy. To learn more about configuring naming policies, see Configure naming policy.

Update-MgApplication

Update the properties of an application object.

Update-MgApplicationExtensionProperty

Update the navigation property extensionProperties in applications

Update-MgApplicationFederatedIdentityCredential

Update the navigation property federatedIdentityCredentials in applications

Update-MgGroupAppRoleAssignment

Update the navigation property appRoleAssignments in groups

Update-MgServicePrincipal

Update entity in servicePrincipals

Update-MgServicePrincipalAppRoleAssignedTo

Update the navigation property appRoleAssignedTo in servicePrincipals

Update-MgServicePrincipalAppRoleAssignment

Update the navigation property appRoleAssignments in servicePrincipals

Update-MgServicePrincipalDelegatedPermissionClassification

Update the navigation property delegatedPermissionClassifications in servicePrincipals

Update-MgServicePrincipalEndpoint

Update the navigation property endpoints in servicePrincipals

Update-MgUserAppRoleAssignment

Update the navigation property appRoleAssignments in users