The Update-MgPolicyAuthorizationPolicy cmdlet lets you modify the settings of the authorization policy in Microsoft Entra ID (previously Azure AD). This policy controls core permissions and constraints for user and admin activities across your directory.
Install-Module Microsoft.Graph -Scope CurrentUser
Connect-MgGraph -Scopes "Policy.ReadWrite.Authorization"
Run the following Graph PowerShell command below to update a configuration in the authorization policy. Replace <policy-id> with the ID of the authorization policy and <object> with the updated property values:
Update-MgPolicyAuthorizationPolicy -AuthorizationPolicyId <policy-id> -DefaultUserRolePermissions <object>
This Graph PowerShell command restricts users from creating applications:
Update-MgPolicyAuthorizationPolicy -AuthorizationPolicyId "authorizationPolicy" -DefaultUserRolePermissions @{ AllowedToCreateApps=$false }
This Graph PowerShell command allows users to download applications in the directory:
Update-MgPolicyAuthorizationPolicy -AuthorizationPolicyId "authorizationPolicy" -DefaultUserRolePermissions @{ AllowedToDownloadApps=$true }
The following are some essential parameters that can be used along with the Update-MgPolicyAuthorizationPolicy command:
| Parameters | Description |
|---|---|
| -AuthorizationPolicyId | The ID of the authorization policy (usually "authorizationPolicy" ) |
| -DefaultUserRolePermissions | Updates the default user role permissions object |
| -AllowEmailVerifiedUsersToJoinOrganization | Allows email-verified users to join the organization |
| -IsAuthorizationPolicyEnabled | Enables or disables the authorization policy |
| -PassThru | Returns the updated object |
ADManager Plus, an identity governance and administration solution with comprehensive Microsoft Entra ID management and reporting capabilities, simplifies complex admin tasks from a single, user-friendly console: