Skip to content

Commit 789e69a

Browse files
authored
Update README.md
1 parent d711827 commit 789e69a

1 file changed

Lines changed: 5 additions & 4 deletions

File tree

README.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@ GraphPython covers external reconnaissance, authentication/token manipulation, e
3232
- [Find-PrivilegedRoleUsers](#find-privilegedroleusers)
3333
- [Assign-PrivilegedRole](#assign-privilegedrole)
3434
- [Find-PrivilegedApplications](#find-privilegedapplications)
35+
- [Add-ApplicationPermission](#add-applicationpermission)
3536
- [Spoof-OWAEmailMessage](#spoof-owaemailmessage)
3637
- [Find-DynamicGroups](#find-dynamicgroups)
3738
- [Find-UpdatableGroups](#find-updatablegroups)
@@ -417,17 +418,17 @@ The `Find-PrivilegedApplications` command helps to identify high-value apps that
417418

418419
### Add-ApplicationPermission
419420

420-
Adds desired Graph API permission to target application ID. If the role is privileged it will prompt the user to confirm whether to attempt to grant admin consent (via `beta/directory/consentToApp`) using the current privileges:
421+
Adds desired Graph API permission to target application ID. If the role is privileged it will prompt the user to confirm whether to attempt to grant admin consent (via the `beta/directory/consentToApp` endpoint) using the current privileges:
421422

422423
![](./.github/addapplicationpermission.png)
423424

424425
> NOTE: if the admin consent grant attempt fails with 400 error the token likely doesn't have the necessary scope/permissions assigned
425426
426-
The permission update succeeded in this instance and the application API permission is assigned however the admin consent grant failed:
427+
The permission update succeeded in this instance and the application API permission is assigned however the admin consent grant obviously failed:
427428

428429
![](./.github/azureperms1.png)
429430

430-
Once you obtain the necessary permissions or compromise a privileged token then the `Grant-AppAdminConsent` command can be used to grant admin consent to the role you just added here:
431+
Once you obtain the necessary permissions or compromise a privileged token then the `Grant-AppAdminConsent` command can be used to grant admin consent to the role that was added for the target app ID:
431432

432433
![](./.github/grantappadminconsent.png)
433434

@@ -444,7 +445,7 @@ Or you can use the `Get-Application` command:
444445
requiredResourceAccess: [{'resourceAppId': '00000003-0000-0000-c000-000000000000', 'resourceAccess': [{'id': 'd07a8cc0-3d51-4b77-b3b0-32704d1f69fa', 'type': 'Role'}]}]
445446
================================================================================
446447
```
447-
The ID within `resourceAccess` corresponds to the `AccessReview.Read.All` that was assigned as confirmed with [Locate-PermissionID](https://github.com/mlcsec/Graphpython/tree/main?tab=readme-ov-file#locate-permissionid):
448+
The ID within `resourceAccess` corresponds to `AccessReview.Read.All` that was assigned as confirmed with [Locate-PermissionID](https://github.com/mlcsec/Graphpython/tree/main?tab=readme-ov-file#locate-permissionid):
448449

449450
![](./.github/locatepermissionid.png)
450451

0 commit comments

Comments
 (0)