Skip to content

Required (to) high permissions makes using Graph provider infeasible for application teams #242

@henrybeen

Description

@henrybeen

Scenario: I'm currently working a lot in what I call application teams. Teams that work on a few workloads within the organization, often C#.NET applications - hosted in Azure. App Services, Functions, a SQL DB, some Service Bus, and the like. They write their code in C#, their infrastructure in Bicep and their pipelines in YAML. Life was pretty good, except for having to manually request/provision resources in Entra ID, required by the application.

We were excited about support for MS Graph / Entra ID in Bicep as this would help us overcome this pain by allowing us to manage the following Entra ID resources we frequently require:

  • Creating (and updating owned) app registrations, with app roles / api scopes
  • Creating (and updating owned) groups, with members and owners
  • Assigning App Roles to users, groups and/or enterprise applications

(I'd love to manage access packages to, but those are less urgent.)

All of these are now supported, both using a developer account from the local machine (great for dev) and the pipeline (Service Connection / Service Principal / App Registration.) The issue with the latter seems to be not really workable in larger organizations as it currently stands. No way that application teams will get their service principals scopes assigned like Group.ReadWrite.All and AppRoleAssignment.ReadWrite.All.

Am I overlooking something? Or is there any chance we will see permissions like Group.ReadWrite.OwnedBy, AppRoleAssignment.ReadWrite.OwnedBy, etc. (so similar to Application.ReadWrite.OwnedBy) in the (near) future?

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions