Update-MgPolicyAuthorizationPolicy
Update the properties of an authorizationPolicy object.
Note
To view the beta release of this cmdlet, view Update-MgBetaPolicyAuthorizationPolicy
Update-MgPolicyAuthorizationPolicy
[-ResponseHeadersVariable <String>]
[-AdditionalProperties <Hashtable>]
[-AllowEmailVerifiedUsersToJoinOrganization]
[-AllowInvitesFrom <String>]
[-AllowUserConsentForRiskyApps]
[-AllowedToSignUpEmailBasedSubscriptions]
[-AllowedToUseSspr]
[-BlockMsolPowerShell]
[-DefaultUserRolePermissions <IMicrosoftGraphDefaultUserRolePermissions>]
[-DeletedDateTime <DateTime>]
[-Description <String>]
[-DisplayName <String>]
[-GuestUserRoleId <String>]
[-Id <String>]
[-Headers <IDictionary>]
[-ProgressAction <ActionPreference>]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Update-MgPolicyAuthorizationPolicy
-BodyParameter <IMicrosoftGraphAuthorizationPolicy>
[-ResponseHeadersVariable <String>]
[-Headers <IDictionary>]
[-ProgressAction <ActionPreference>]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Update the properties of an authorizationPolicy object.
Import-Module Microsoft.Graph.Identity.SignIns
$params = @{
allowEmailVerifiedUsersToJoinOrganization = $false
}
Update-MgPolicyAuthorizationPolicy -BodyParameter $params
This example will update or set guest user access level for the tenant
Import-Module Microsoft.Graph.Identity.SignIns
$params = @{
blockMsolPowerShell = $true
}
Update-MgPolicyAuthorizationPolicy -BodyParameter $params
This example will block msol powershell in tenant
Import-Module Microsoft.Graph.Identity.SignIns
$params = @{
defaultUserRolePermissions = @{
allowedToCreateApps = $false
}
}
Update-MgPolicyAuthorizationPolicy -BodyParameter $params
This example will disable default user role's permission to create applications
Import-Module Microsoft.Graph.Identity.SignIns
$params = @{
allowedToUseSSPR = $true
}
Update-MgPolicyAuthorizationPolicy -BodyParameter $params
This example will enable default user role to use self-serve password reset feature
Import-Module Microsoft.Graph.Identity.SignIns
$params = @{
defaultUserRolePermissions = @{
permissionGrantPoliciesAssigned = @(
)
}
}
Update-MgPolicyAuthorizationPolicy -BodyParameter $params
This example will disable user consent to apps for default user role
Import-Module Microsoft.Graph.Identity.SignIns
$params = @{
defaultUserRolePermissions = @{
permissionGrantPoliciesAssigned = @(
"managePermissionGrantsForSelf.microsoft-user-default-low"
)
}
}
Update-MgPolicyAuthorizationPolicy -BodyParameter $params
This example will enable user consent to apps, subject to app consent policy
Additional Parameters
Type: | Hashtable |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Indicates whether users can sign up for email based subscriptions.
Type: | SwitchParameter |
Position: | Named |
Default value: | False |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Indicates whether administrators of the tenant can use the Self-Service Password Reset (SSPR). For more information, see Self-service password reset for administrators.
Type: | SwitchParameter |
Position: | Named |
Default value: | False |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Indicates whether a user can join the tenant by email validation.
Type: | SwitchParameter |
Position: | Named |
Default value: | False |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
allowInvitesFrom
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Indicates whether user consent for risky apps is allowed. We recommend keeping allowUserConsentForRiskyApps as false. Default value is false.
Type: | SwitchParameter |
Position: | Named |
Default value: | False |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
To disable the use of MSOL PowerShell, set this property to true. This also disables user-based access to the legacy service endpoint used by MSOL PowerShell. This doesn't affect Microsoft Entra Connect or Microsoft Graph.
Type: | SwitchParameter |
Position: | Named |
Default value: | False |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
authorizationPolicy To construct, see NOTES section for BODYPARAMETER properties and create a hash table.
Type: | IMicrosoftGraphAuthorizationPolicy |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | True |
Accept wildcard characters: | False |
Prompts you for confirmation before running the cmdlet.
Type: | SwitchParameter |
Aliases: | cf |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
defaultUserRolePermissions To construct, see NOTES section for DEFAULTUSERROLEPERMISSIONS properties and create a hash table.
Type: | IMicrosoftGraphDefaultUserRolePermissions |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Date and time when this object was deleted. Always null when the object hasn't been deleted.
Type: | DateTime |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Description for this policy. Required.
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Display name for this policy. Required.
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Represents role templateId for the role that should be granted to guests. Currently following roles are supported: User (a0b1b346-4d3e-4e8b-98f8-753987be4970), Guest User (10dae51f-b6af-4016-8d66-8c2a99b929b3), and Restricted Guest User (2af84b1e-32c8-42b7-82bc-daa82404023b).
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Optional headers that will be added to the request.
Type: | IDictionary |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | True |
Accept wildcard characters: | False |
The unique identifier for an entity. Read-only.
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
{{ Fill ProgressAction Description }}
Type: | ActionPreference |
Aliases: | proga |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Optional Response Headers Variable.
Type: | String |
Aliases: | RHV |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Shows what would happen if the cmdlet runs. The cmdlet is not run.
Type: | SwitchParameter |
Aliases: | wi |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Microsoft.Graph.PowerShell.Models.IMicrosoftGraphAuthorizationPolicy
System.Collections.IDictionary
Microsoft.Graph.PowerShell.Models.IMicrosoftGraphAuthorizationPolicy
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
BODYPARAMETER <IMicrosoftGraphAuthorizationPolicy>
: authorizationPolicy
[(Any) <Object>]
: This indicates any property can be added to this object.[Description <String>]
: Description for this policy. Required.[DisplayName <String>]
: Display name for this policy. Required.[DeletedDateTime <DateTime?>]
: Date and time when this object was deleted. Always null when the object hasn't been deleted.[Id <String>]
: The unique identifier for an entity. Read-only.[AllowEmailVerifiedUsersToJoinOrganization <Boolean?>]
: Indicates whether a user can join the tenant by email validation.[AllowInvitesFrom <String>]
: allowInvitesFrom[AllowUserConsentForRiskyApps <Boolean?>]
: Indicates whether user consent for risky apps is allowed. We recommend keeping allowUserConsentForRiskyApps as false. Default value is false.[AllowedToSignUpEmailBasedSubscriptions <Boolean?>]
: Indicates whether users can sign up for email based subscriptions.[AllowedToUseSspr <Boolean?>]
: Indicates whether administrators of the tenant can use the Self-Service Password Reset (SSPR). For more information, see Self-service password reset for administrators.[BlockMsolPowerShell <Boolean?>]
: To disable the use of MSOL PowerShell, set this property to true. This also disables user-based access to the legacy service endpoint used by MSOL PowerShell. This doesn't affect Microsoft Entra Connect or Microsoft Graph.[DefaultUserRolePermissions <IMicrosoftGraphDefaultUserRolePermissions>]
: defaultUserRolePermissions[(Any) <Object>]
: This indicates any property can be added to this object.[AllowedToCreateApps <Boolean?>]
: Indicates whether the default user role can create applications. This setting corresponds to the Users can register applications setting in the User settings menu in the Microsoft Entra admin center.[AllowedToCreateSecurityGroups <Boolean?>]
: Indicates whether the default user role can create security groups. This setting corresponds to the following menus in the Microsoft Entra admin center: The Users can create security groups in Microsoft Entra admin centers, API or PowerShell setting in the Group settings menu. Users can create security groups setting in the User settings menu.[AllowedToCreateTenants <Boolean?>]
: Indicates whether the default user role can create tenants. This setting corresponds to the Restrict non-admin users from creating tenants setting in the User settings menu in the Microsoft Entra admin center. When this setting is false, users assigned the Tenant Creator role can still create tenants.[AllowedToReadBitlockerKeysForOwnedDevice <Boolean?>]
: Indicates whether the registered owners of a device can read their own BitLocker recovery keys with default user role.[AllowedToReadOtherUsers <Boolean?>]
: Indicates whether the default user role can read other users. DO NOT SET THIS VALUE TO false.[PermissionGrantPoliciesAssigned <String-
[]>]
: Indicates if user consent to apps is allowed, and if it is, which permission to grant consent and which app consent policy (permissionGrantPolicy) govern the permission for users to grant consent. Value should be in the format managePermissionGrantsForSelf.{id}, where {id} is the id of a built-in or custom app consent policy. An empty list indicates user consent to apps is disabled.
[GuestUserRoleId <String>]
: Represents role templateId for the role that should be granted to guests. Currently following roles are supported: User (a0b1b346-4d3e-4e8b-98f8-753987be4970), Guest User (10dae51f-b6af-4016-8d66-8c2a99b929b3), and Restricted Guest User (2af84b1e-32c8-42b7-82bc-daa82404023b).
DEFAULTUSERROLEPERMISSIONS <IMicrosoftGraphDefaultUserRolePermissions>
: defaultUserRolePermissions
[(Any) <Object>]
: This indicates any property can be added to this object.[AllowedToCreateApps <Boolean?>]
: Indicates whether the default user role can create applications. This setting corresponds to the Users can register applications setting in the User settings menu in the Microsoft Entra admin center.[AllowedToCreateSecurityGroups <Boolean?>]
: Indicates whether the default user role can create security groups. This setting corresponds to the following menus in the Microsoft Entra admin center: The Users can create security groups in Microsoft Entra admin centers, API or PowerShell setting in the Group settings menu. Users can create security groups setting in the User settings menu.[AllowedToCreateTenants <Boolean?>]
: Indicates whether the default user role can create tenants. This setting corresponds to the Restrict non-admin users from creating tenants setting in the User settings menu in the Microsoft Entra admin center. When this setting is false, users assigned the Tenant Creator role can still create tenants.[AllowedToReadBitlockerKeysForOwnedDevice <Boolean?>]
: Indicates whether the registered owners of a device can read their own BitLocker recovery keys with default user role.[AllowedToReadOtherUsers <Boolean?>]
: Indicates whether the default user role can read other users. DO NOT SET THIS VALUE TO false.[PermissionGrantPoliciesAssigned <String-
[]>]
: Indicates if user consent to apps is allowed, and if it is, which permission to grant consent and which app consent policy (permissionGrantPolicy) govern the permission for users to grant consent. Value should be in the format managePermissionGrantsForSelf.{id}, where {id} is the id of a built-in or custom app consent policy. An empty list indicates user consent to apps is disabled.