Manage users and groups assignment to an application
This article shows you how to assign users and groups to an enterprise application in Microsoft Entra ID using PowerShell. When you assign a user to an application, the application appears in the user's My Apps portal for easy access. If the application exposes app roles, you can also assign a specific app role to the user.
When you assign a group to an application, only users in the group have access. The assignment doesn't cascade to nested groups.
Group-based assignment requires Microsoft Entra ID P1 or P2 edition. Group-based assignment is supported for Security groups, Microsoft 365 groups, and Distribution groups whose SecurityEnabled
setting is set to True
only. Nested group memberships aren't currently supported. For more licensing requirements for the features discussed in this article, see the Microsoft Entra pricing page.
For greater control, certain types of enterprise applications can be configured to require user assignment. For more information on requiring user assignment for an app, see Manage access to an application.
Note
Applications that requires users to be assigned to the application must have their permissions consented by an administrator, even if the user consent policies for your directory would otherwise allow a user to consent on behalf of themselves.
Prerequisites
To assign users to an enterprise application, you need:
- A Microsoft Entra account with an active subscription. If you don't already have one, you can Create an account for free.
- One of the following roles: Cloud Application Administrator, Application Administrator, or owner of the service principal.
- Microsoft Entra ID P1 or P2 for group-based assignment. For more licensing requirements for the features discussed in this article, see the Microsoft Entra pricing page.
Tip
Steps in this article might vary slightly based on the portal you start from.
Assign users and groups to an application using the Microsoft Entra admin center
To assign a user or group account to an enterprise application:
Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.
Browse to Identity > Applications > Enterprise applications > All applications.
Enter the name of the existing application in the search box, and then select the application from the search results.
Select Users and groups, and then select Add user/group.
On the Add Assignment pane, select None Selected under Users and groups.
Search for and select the user or group that you want to assign to the application. For example,
[email protected]
or[email protected]
.Select Select.
Under Select a role, select the role that you want to assign to the user or group. If you haven't defined any roles yet, the default role is Default Access.
On the Add Assignment pane, select Assign to assign the user or group to the application.
Unassign users, and groups, from an application
- Follow the steps on the Assign users, and groups, to an application section to navigate to the Users and groups pane.
- Search for and select the user or group that you want to unassign from the application.
- Select Remove to unassign the user or group from the application.
Assign users and groups to an application using Azure AD PowerShell
Open an elevated Windows PowerShell command prompt.
Run
Connect-AzureAD
and sign in as at least a Cloud Application Administrator.Use the following script to assign a user to an application:
# Assign the values to the variables $username = "<Your user's UPN>" $app_name = "<Your App's display name>" $app_role_name = "<App role display name>" # Get the user to assign, and the service principal for the app to assign to $user = Get-AzureADUser -ObjectId "$username" $sp = Get-AzureADServicePrincipal -Filter "displayName eq '$app_name'" $appRole = $sp.AppRoles | Where-Object { $_.DisplayName -eq $app_role_name } # Assign the user to the app role New-AzureADUserAppRoleAssignment -ObjectId $user.ObjectId -PrincipalId $user.ObjectId -ResourceId $sp.ObjectId -Id $appRole.Id
Example
This example assigns the user Britta Simon to the Microsoft Workplace Analytics application using PowerShell.
In PowerShell, assign the corresponding values to the variables
$username
,$app_name
and$app_role_name
.$username = "[email protected]" $app_name = "Workplace Analytics"
In this example, we don't know what is the exact name of the application role we want to assign to Britta Simon. Run the following commands to get the user (
$user
) and the service principal ($sp
) using the user UPN and the service principal display names.$user = Get-AzureADUser -ObjectId "$username" $sp = Get-AzureADServicePrincipal -Filter "displayName eq '$app_name'"
Run the following command to find the app roles exposed by the service principal
$appRoles = $sp.AppRoles # Display the app roles $appRoles | ForEach-Object { Write-Output "AppRole: $($_.DisplayName) - ID: $($_.Id)"
Note
The default AppRole ID is
00000000-0000-0000-0000-000000000000
. This role is assigned when no specific AppRole is defined for a service principal.Assign the AppRole name to the
$app_role_name
variable. In this example, we want to assign Britta Simon the Analyst (Limited access) Role.$app_role_name = "Analyst (Limited access)" $appRole = $sp.AppRoles | Where-Object { $_.DisplayName -eq $app_role_name }
Run the following command to assign the user to the app role.
New-AzureADUserAppRoleAssignment -ObjectId $user.ObjectId -PrincipalId $user.ObjectId -ResourceId $sp.ObjectId -Id $appRole.Id
To assign a group to an enterprise app, replace Get-AzureADUser
with Get-AzureADGroup
and replace New-AzureADUserAppRoleAssignment
with New-AzureADGroupAppRoleAssignment
.
For more information on how to assign a group to an application role, see the documentation for New-AzureADGroupAppRoleAssignment.
Unassign users and groups from an application using Azure AD PowerShell
Open an elevated Windows PowerShell command prompt.
Run
Connect-AzureAD
and sign in as at least a Cloud Application Administrator.Use the following script to remove a user and role from an application.
# Store the proper parameters $user = get-azureaduser -ObjectId <objectId> $spo = Get-AzureADServicePrincipal -ObjectId <objectId> #Get the ID of role assignment $assignments = Get-AzureADServiceAppRoleAssignment -ObjectId $spo.ObjectId | Where {$_.PrincipalDisplayName -eq $user.DisplayName} #if you run the following, it will show you what is assigned what $assignments | Select * #To remove the App role assignment run the following command. Remove-AzureADServiceAppRoleAssignment -ObjectId $spo.ObjectId -AppRoleAssignmentId $assignments[assignment number].ObjectId
Remove all users who are assigned to the application using Azure AD PowerShell
- Open an elevated Windows PowerShell command prompt.
Use the following script to remove all users and groups assigned to the application.
#Retrieve the service principal object ID.
$app_name = "<Your App's display name>"
$sp = Get-AzureADServicePrincipal -Filter "displayName eq '$app_name'"
$sp.ObjectId
# Get Service Principal using objectId
$sp = Get-AzureADServicePrincipal -ObjectId "<ServicePrincipal objectID>"
# Get Azure AD App role assignments using objectId of the Service Principal
$assignments = Get-AzureADServiceAppRoleAssignment -ObjectId $sp.ObjectId -All $true
# Remove all users and groups assigned to the application
$assignments | ForEach-Object {
if ($_.PrincipalType -eq "User") {
Remove-AzureADUserAppRoleAssignment -ObjectId $_.PrincipalId -AppRoleAssignmentId $_.ObjectId
} elseif ($_.PrincipalType -eq "Group") {
Remove-AzureADGroupAppRoleAssignment -ObjectId $_.PrincipalId -AppRoleAssignmentId $_.ObjectId
}
}
Assign users and groups to an application using Microsoft Graph PowerShell
Open an elevated Windows PowerShell command prompt.
Run
Connect-MgGraph -Scopes "Application.ReadWrite.All", "Directory.ReadWrite.All", "AppRoleAssignment.ReadWrite.All"
and sign in as at least a Cloud Application Administrator.Use the following script to assign a user to an application:
#Assign the values to the variables $userId = "<Your user's ID>" $app_name = "<Your App's display name>" $app_role_name = "<App role display name>" $sp = Get-MgServicePrincipal -Filter "displayName eq '$app_name'" #Get the user, the service principal and appRole. $params = @{ "PrincipalId" =$userId "ResourceId" =$sp.Id "AppRoleId" =($sp.AppRoles | Where-Object { $_.DisplayName -eq $app_role_name }).Id } #Assign the user to the AppRole New-MgUserAppRoleAssignment -UserId $userId -BodyParameter $params | Format-List Id, AppRoleId, CreationTime, PrincipalDisplayName, PrincipalId, PrincipalType, ResourceDisplayName, ResourceId
Example
This example assigns the user Britta Simon to the Microsoft Workplace Analytics application using Microsoft Graph PowerShell.
In PowerShell, assign the corresponding values to the variables
$userId
,$app_name
, and$app_role_name
.# Assign the values to the variables $userId = "<Britta Simon's user ID>" $app_name = "Workplace Analytics"
In this example, we don't know the exact name of the application role we want to assign to Britta Simon. Run the following command to get the service principal ($sp) using the service principal display name.
# Get the service principal for the app $sp = Get-MgServicePrincipal -Filter "displayName eq '$app_name'"
Run the following command to find the app roles exposed by the service principal.
# Get the app roles exposed by the service principal $appRoles = $sp.AppRoles # Display the app roles $appRoles | ForEach-Object { Write-Output "AppRole: $($_.DisplayName) - ID: $($_.Id)" }
Note
The default AppRole ID is
00000000-0000-0000-0000-000000000000
. This role is assigned when no specific AppRole is defined for a service principal.Assign the role name to the
$app_role_name
variable. In this example, we want to assign Britta Simon the Analyst (Limited access) Role.# Assign the values to the variables $app_role_name = "Analyst (Limited access)" $appRoleId = ($sp.AppRoles | Where-Object { $_.DisplayName -eq $app_role_name }).Id
Prepare the parameters and run the following command to assign the user to the app role.
# Prepare parameters for the role assignment $params = @{ "PrincipalId" = $userId "ResourceId" = $sp.Id "AppRoleId" = $appRoleId } # Assign the user to the app role New-MgUserAppRoleAssignment -UserId $userId -BodyParameter $params | Format-List Id, AppRoleId, CreationTime, PrincipalDisplayName, PrincipalId, PrincipalType, ResourceDisplayName, ResourceId
To assign a group to an enterprise app, replace Get-MgUser
with Get-MgGroup
and replace New-MgUserAppRoleAssignment
with New-MgGroupAppRoleAssignment
.
For more information on how to assign a group to an application role, see the documentation for New-MgGroupAppRoleAssignment.
Unassign users and groups from an application using Microsoft Graph PowerShell
Open an elevated Windows PowerShell command prompt.
Run
Connect-MgGraph -Scopes "Application.ReadWrite.All", "Directory.ReadWrite.All", "AppRoleAssignment.ReadWrite.All"
and sign in as at least a Cloud Application Administrator.Get the user and the service principal
$user = Get-MgUser -UserId <userid> $sp = Get-MgServicePrincipal -ServicePrincipalId <ServicePrincipalId>
Get the ID of the role assignment
$assignments = Get-MgServicePrincipalAppRoleAssignedTo -ServicePrincipalId $sp.Id | Where {$_.PrincipalDisplayName -eq $user.DisplayName}
Run the following command to show the list of users assigned to the application
$assignments | Select *
Run the following command to remove the AppRole assignment.
Remove-MgServicePrincipalAppRoleAssignedTo -AppRoleAssignmentId '<AppRoleAssignment-id>' -ServicePrincipalId $sp.Id
Remove all users and groups assigned to the application using Microsoft Graph PowerShell
Run the following command to remove all users and groups assigned to the application.
$assignments | ForEach-Object {
if ($_.PrincipalType -in ("user", "Group")) {
Remove-MgServicePrincipalAppRoleAssignedTo -ServicePrincipalId $sp.Id -AppRoleAssignmentId $_.Id }
}
Assign users and groups to an application using Microsoft Graph API
To assign users and groups to an application, sign in to Graph Exploreras at least a Cloud Application Administrator.
You need to consent to the following permissions:
Application.ReadWrite.All
,Directory.ReadWrite.All
, andAppRoleAssignment.ReadWrite.All
.To grant an app role assignment, you need three identifiers:
principalId
: The ID of the user or group to which you're assigning the app role.resourceId
: The ID of the resource servicePrincipal that defines the app role.appRoleId
: The ID of the appRole (defined on the resource service principal) to assign to a user or group.
Get the enterprise application. Filter by
DisplayName
.GET https://graph.microsoft.com/v1.0/servicePrincipals?$filter=displayName eq '{appDisplayName}'
Record the following values from the response body:
- Object ID of the enterprise application
- AppRole ID that you assign to the user. If the application doesn't expose any roles, the user is assigned the default access role.
Note
The default AppRole ID is
00000000-0000-0000-0000-000000000000
. This role is assigned when no specific AppRole is defined for a service principal.Get the user by filtering by the user's principal name. Record the object ID of the user.
GET https://graph.microsoft.com/v1.0/users/{userPrincipalName}
Assign the user to the application.
POST https://graph.microsoft.com/v1.0/servicePrincipals/{resource-servicePrincipal-id}/appRoleAssignedTo { "principalId": "aaaaaaaa-bbbb-cccc-1111-222222222222", "resourceId": "a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1", "appRoleId": "00000000-0000-0000-0000-000000000000" }
In the example, both the
resource-servicePrincipal-id
andresourceId
represent the enterprise application.
Unassign users and groups from an application using Microsoft Graph API
To unassign all users and groups from the application, run the following query.
Get the enterprise application. Filter by
displayName
.GET https://graph.microsoft.com/v1.0/servicePrincipals?$filter=displayName eq '{appDisplayName}'
Get the list of
appRoleAssignments
for the application.GET https://graph.microsoft.com/v1.0/servicePrincipals/{id}/appRoleAssignedTo
Remove the
appRoleAssignments
by specifying theappRoleAssignment
ID.DELETE https://graph.microsoft.com/v1.0/servicePrincipals/{resource-servicePrincipal-id}/appRoleAssignedTo/{appRoleAssignment-id}
Microsoft Graph Explorer doesn't support batch deletion of app role assignments directly. You need to delete each assignment individually. However, you can automate this process using Microsoft Graph PowerShell to iterate through and remove each assignment