Manage users and groups assignment to an application

This article shows you how to assign users and groups to an enterprise application in Microsoft Entra ID using PowerShell. When you assign a user to an application, the application appears in the user's My Apps portal for easy access. If the application exposes app roles, you can also assign a specific app role to the user.

When you assign a group to an application, only users in the group have access. The assignment doesn't cascade to nested groups.

Group-based assignment requires Microsoft Entra ID P1 or P2 edition. Group-based assignment is supported for Security groups, Microsoft 365 groups, and Distribution groups whose SecurityEnabled setting is set to True only. Nested group memberships aren't currently supported. For more licensing requirements for the features discussed in this article, see the Microsoft Entra pricing page.

For greater control, certain types of enterprise applications can be configured to require user assignment. For more information on requiring user assignment for an app, see Manage access to an application.

Note

Applications that requires users to be assigned to the application must have their permissions consented by an administrator, even if the user consent policies for your directory would otherwise allow a user to consent on behalf of themselves.

Prerequisites

To assign users to an enterprise application, you need:

  • A Microsoft Entra account with an active subscription. If you don't already have one, you can Create an account for free.
  • One of the following roles: Cloud Application Administrator, Application Administrator, or owner of the service principal.
  • Microsoft Entra ID P1 or P2 for group-based assignment. For more licensing requirements for the features discussed in this article, see the Microsoft Entra pricing page.

Tip

Steps in this article might vary slightly based on the portal you start from.

Assign users and groups to an application using the Microsoft Entra admin center

To assign a user or group account to an enterprise application:

  1. Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.

  2. Browse to Identity > Applications > Enterprise applications > All applications.

  3. Enter the name of the existing application in the search box, and then select the application from the search results.

  4. Select Users and groups, and then select Add user/group.

    Assign user account to an application in your Microsoft Entra tenant.

  5. On the Add Assignment pane, select None Selected under Users and groups.

  6. Search for and select the user or group that you want to assign to the application. For example, [email protected] or [email protected].

  7. Select Select.

  8. Under Select a role, select the role that you want to assign to the user or group. If you haven't defined any roles yet, the default role is Default Access.

  9. On the Add Assignment pane, select Assign to assign the user or group to the application.

Unassign users, and groups, from an application

  1. Follow the steps on the Assign users, and groups, to an application section to navigate to the Users and groups pane.
  2. Search for and select the user or group that you want to unassign from the application.
  3. Select Remove to unassign the user or group from the application.

Assign users and groups to an application using Azure AD PowerShell

  1. Open an elevated Windows PowerShell command prompt.

  2. Run Connect-AzureAD and sign in as at least a Cloud Application Administrator.

  3. Use the following script to assign a user to an application:

    # Assign the values to the variables
    $username = "<Your user's UPN>"
    $app_name = "<Your App's display name>"
    $app_role_name = "<App role display name>"
    
    # Get the user to assign, and the service principal for the app to assign to
    $user = Get-AzureADUser -ObjectId "$username"
    $sp = Get-AzureADServicePrincipal -Filter "displayName eq '$app_name'"
    $appRole = $sp.AppRoles | Where-Object { $_.DisplayName -eq $app_role_name }
    
    # Assign the user to the app role
    New-AzureADUserAppRoleAssignment -ObjectId $user.ObjectId -PrincipalId $user.ObjectId -ResourceId $sp.ObjectId -Id $appRole.Id
    

Example

This example assigns the user Britta Simon to the Microsoft Workplace Analytics application using PowerShell.

  1. In PowerShell, assign the corresponding values to the variables $username, $app_name and $app_role_name.

    $username = "[email protected]"
    $app_name = "Workplace Analytics"
    
  2. In this example, we don't know what is the exact name of the application role we want to assign to Britta Simon. Run the following commands to get the user ($user) and the service principal ($sp) using the user UPN and the service principal display names.

    $user = Get-AzureADUser -ObjectId "$username"
    $sp = Get-AzureADServicePrincipal -Filter "displayName eq '$app_name'"
    
  3. Run the following command to find the app roles exposed by the service principal

    $appRoles = $sp.AppRoles
    # Display the app roles
    $appRoles | ForEach-Object {
        Write-Output "AppRole: $($_.DisplayName) - ID: $($_.Id)"
    

    Note

    The default AppRole ID is 00000000-0000-0000-0000-000000000000. This role is assigned when no specific AppRole is defined for a service principal.

  4. Assign the AppRole name to the $app_role_name variable. In this example, we want to assign Britta Simon the Analyst (Limited access) Role.

    $app_role_name = "Analyst (Limited access)"
    $appRole = $sp.AppRoles | Where-Object { $_.DisplayName -eq $app_role_name }
    
  5. Run the following command to assign the user to the app role.

    New-AzureADUserAppRoleAssignment -ObjectId $user.ObjectId -PrincipalId $user.ObjectId -ResourceId $sp.ObjectId -Id $appRole.Id
    

To assign a group to an enterprise app, replace Get-AzureADUser with Get-AzureADGroup and replace New-AzureADUserAppRoleAssignment with New-AzureADGroupAppRoleAssignment.

For more information on how to assign a group to an application role, see the documentation for New-AzureADGroupAppRoleAssignment.

Unassign users and groups from an application using Azure AD PowerShell

  1. Open an elevated Windows PowerShell command prompt.

  2. Run Connect-AzureAD and sign in as at least a Cloud Application Administrator.

  3. Use the following script to remove a user and role from an application.

    # Store the proper parameters
    $user = get-azureaduser -ObjectId <objectId>
    $spo = Get-AzureADServicePrincipal -ObjectId <objectId>
    
    #Get the ID of role assignment 
    $assignments = Get-AzureADServiceAppRoleAssignment -ObjectId $spo.ObjectId | Where {$_.PrincipalDisplayName -eq $user.DisplayName}
    
    #if you run the following, it will show you what is assigned what
    $assignments | Select *
    
    #To remove the App role assignment run the following command.
    Remove-AzureADServiceAppRoleAssignment -ObjectId $spo.ObjectId -AppRoleAssignmentId $assignments[assignment number].ObjectId
    

Remove all users who are assigned to the application using Azure AD PowerShell

  1. Open an elevated Windows PowerShell command prompt.

Use the following script to remove all users and groups assigned to the application.

#Retrieve the service principal object ID.
$app_name = "<Your App's display name>"
$sp = Get-AzureADServicePrincipal -Filter "displayName eq '$app_name'"
$sp.ObjectId

# Get Service Principal using objectId
$sp = Get-AzureADServicePrincipal -ObjectId "<ServicePrincipal objectID>"

# Get Azure AD App role assignments using objectId of the Service Principal
$assignments = Get-AzureADServiceAppRoleAssignment -ObjectId $sp.ObjectId -All $true

# Remove all users and groups assigned to the application
$assignments | ForEach-Object {
    if ($_.PrincipalType -eq "User") {
        Remove-AzureADUserAppRoleAssignment -ObjectId $_.PrincipalId -AppRoleAssignmentId $_.ObjectId
    } elseif ($_.PrincipalType -eq "Group") {
        Remove-AzureADGroupAppRoleAssignment -ObjectId $_.PrincipalId -AppRoleAssignmentId $_.ObjectId
    }
}

Assign users and groups to an application using Microsoft Graph PowerShell

  1. Open an elevated Windows PowerShell command prompt.

  2. Run Connect-MgGraph -Scopes "Application.ReadWrite.All", "Directory.ReadWrite.All", "AppRoleAssignment.ReadWrite.All" and sign in as at least a Cloud Application Administrator.

  3. Use the following script to assign a user to an application:

    #Assign the values to the variables
    $userId = "<Your user's ID>"
    $app_name = "<Your App's display name>"
    $app_role_name = "<App role display name>"
    $sp = Get-MgServicePrincipal -Filter "displayName eq '$app_name'"
    
    #Get the user, the service principal and appRole.
    $params = @{
    "PrincipalId" =$userId
    "ResourceId" =$sp.Id
    "AppRoleId" =($sp.AppRoles | Where-Object { $_.DisplayName -eq $app_role_name }).Id
    }
    #Assign the user to the AppRole
    New-MgUserAppRoleAssignment -UserId $userId -BodyParameter $params |
        Format-List Id, AppRoleId, CreationTime, PrincipalDisplayName,
        PrincipalId, PrincipalType, ResourceDisplayName, ResourceId
    

Example

This example assigns the user Britta Simon to the Microsoft Workplace Analytics application using Microsoft Graph PowerShell.

  1. In PowerShell, assign the corresponding values to the variables $userId, $app_name, and $app_role_name.

    # Assign the values to the variables  
    $userId = "<Britta Simon's user ID>"  
    $app_name = "Workplace Analytics"  
    
  2. In this example, we don't know the exact name of the application role we want to assign to Britta Simon. Run the following command to get the service principal ($sp) using the service principal display name.

    # Get the service principal for the app  
    $sp = Get-MgServicePrincipal -Filter "displayName eq '$app_name'"  
    
  3. Run the following command to find the app roles exposed by the service principal.

    # Get the app roles exposed by the service principal  
    $appRoles = $sp.AppRoles  
    # Display the app roles  
    $appRoles | ForEach-Object {  
        Write-Output "AppRole: $($_.DisplayName) - ID: $($_.Id)"  
    }  
    

    Note

    The default AppRole ID is 00000000-0000-0000-0000-000000000000. This role is assigned when no specific AppRole is defined for a service principal.

  4. Assign the role name to the $app_role_name variable. In this example, we want to assign Britta Simon the Analyst (Limited access) Role.

    # Assign the values to the variables  
    $app_role_name = "Analyst (Limited access)"  
    $appRoleId = ($sp.AppRoles | Where-Object { $_.DisplayName -eq $app_role_name }).Id  
    
  5. Prepare the parameters and run the following command to assign the user to the app role.

    # Prepare parameters for the role assignment  
    $params = @{  
        "PrincipalId" = $userId  
        "ResourceId" = $sp.Id  
        "AppRoleId" = $appRoleId  
    }  
    
    # Assign the user to the app role  
    New-MgUserAppRoleAssignment -UserId $userId -BodyParameter $params |   
        Format-List Id, AppRoleId, CreationTime, PrincipalDisplayName,   
        PrincipalId, PrincipalType, ResourceDisplayName, ResourceId  
    

To assign a group to an enterprise app, replace Get-MgUser with Get-MgGroup and replace New-MgUserAppRoleAssignment with New-MgGroupAppRoleAssignment.

For more information on how to assign a group to an application role, see the documentation for New-MgGroupAppRoleAssignment.

Unassign users and groups from an application using Microsoft Graph PowerShell

  1. Open an elevated Windows PowerShell command prompt.

  2. Run Connect-MgGraph -Scopes "Application.ReadWrite.All", "Directory.ReadWrite.All", "AppRoleAssignment.ReadWrite.All" and sign in as at least a Cloud Application Administrator.

  3. Get the user and the service principal

    $user = Get-MgUser -UserId <userid>
    $sp = Get-MgServicePrincipal -ServicePrincipalId <ServicePrincipalId>
    
  4. Get the ID of the role assignment

    $assignments = Get-MgServicePrincipalAppRoleAssignedTo -ServicePrincipalId $sp.Id | Where {$_.PrincipalDisplayName -eq $user.DisplayName}
    
  5. Run the following command to show the list of users assigned to the application

    $assignments | Select *
    
  6. Run the following command to remove the AppRole assignment.

    Remove-MgServicePrincipalAppRoleAssignedTo -AppRoleAssignmentId  '<AppRoleAssignment-id>' -ServicePrincipalId $sp.Id
    

Remove all users and groups assigned to the application using Microsoft Graph PowerShell

Run the following command to remove all users and groups assigned to the application.

$assignments | ForEach-Object {
    if ($_.PrincipalType -in ("user", "Group")) {
        Remove-MgServicePrincipalAppRoleAssignedTo -ServicePrincipalId $sp.Id -AppRoleAssignmentId $_.Id  }
}

Assign users and groups to an application using Microsoft Graph API

  1. To assign users and groups to an application, sign in to Graph Exploreras at least a Cloud Application Administrator.

    You need to consent to the following permissions:

    Application.ReadWrite.All, Directory.ReadWrite.All, and AppRoleAssignment.ReadWrite.All.

    To grant an app role assignment, you need three identifiers:

    • principalId: The ID of the user or group to which you're assigning the app role.
    • resourceId: The ID of the resource servicePrincipal that defines the app role.
    • appRoleId: The ID of the appRole (defined on the resource service principal) to assign to a user or group.
  2. Get the enterprise application. Filter by DisplayName.

    GET https://graph.microsoft.com/v1.0/servicePrincipals?$filter=displayName eq '{appDisplayName}'
    

    Record the following values from the response body:

    • Object ID of the enterprise application
    • AppRole ID that you assign to the user. If the application doesn't expose any roles, the user is assigned the default access role.

    Note

    The default AppRole ID is 00000000-0000-0000-0000-000000000000. This role is assigned when no specific AppRole is defined for a service principal.

  3. Get the user by filtering by the user's principal name. Record the object ID of the user.

    GET https://graph.microsoft.com/v1.0/users/{userPrincipalName}
    
  4. Assign the user to the application.

    POST https://graph.microsoft.com/v1.0/servicePrincipals/{resource-servicePrincipal-id}/appRoleAssignedTo
    
    {
    "principalId": "aaaaaaaa-bbbb-cccc-1111-222222222222",
    "resourceId": "a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1",
    "appRoleId": "00000000-0000-0000-0000-000000000000"
    }
    

    In the example, both the resource-servicePrincipal-id and resourceId represent the enterprise application.

Unassign users and groups from an application using Microsoft Graph API

To unassign all users and groups from the application, run the following query.

  1. Get the enterprise application. Filter by displayName.

    GET https://graph.microsoft.com/v1.0/servicePrincipals?$filter=displayName eq '{appDisplayName}'
    
  2. Get the list of appRoleAssignments for the application.

    GET https://graph.microsoft.com/v1.0/servicePrincipals/{id}/appRoleAssignedTo
    
  3. Remove the appRoleAssignments by specifying the appRoleAssignment ID.

    DELETE https://graph.microsoft.com/v1.0/servicePrincipals/{resource-servicePrincipal-id}/appRoleAssignedTo/{appRoleAssignment-id}
    

Microsoft Graph Explorer doesn't support batch deletion of app role assignments directly. You need to delete each assignment individually. However, you can automate this process using Microsoft Graph PowerShell to iterate through and remove each assignment

Next steps