← Support

Permissions Reference

Every Microsoft Graph API permission Veri-Tech requests, explained in detail. This page is designed for security teams reviewing our access requirements. Click any section to expand it.

Our Commitment to Trust & Transparency

Your security is not just a feature — it is the foundation of everything we build.

Veri-Tech is built for security teams, by security professionals. We believe you have the right to know exactly what access you are granting, what data we touch, and how we protect it. Every permission on this page is documented because we want you to verify our practices, not just trust our word.

What we never access

  • Mailbox contents, emails, or calendar events
  • Files in OneDrive or SharePoint document libraries
  • Teams chat messages or meeting recordings
  • User passwords or authentication credentials
  • Personal identifiable information (PII) beyond directory display names used in policy assignment tables

How to audit our access

  • Review the Veri-Tech enterprise application in your Entra admin center under Enterprise Applications
  • Check the "Permissions" tab to see all currently consented Graph API scopes
  • Review Entra audit logs for sign-in activity from the Veri-Tech service principal
  • Use the "Activity" tab to see recent API calls made by the application

How to revoke access

  • From Veri-Tech: Go to Settings → Tenant Permissions → Revoke All Permissions
  • From Entra admin center: Enterprise Applications → Veri-Tech → Properties → Delete
  • Revocation is immediate — Veri-Tech will lose all access to your tenant
  • Re-consent is required to restore access after revocation

Our security practices

  • Certificate-based authentication only — no client secrets stored anywhere
  • All data paths are scoped by tenant ID — no cross-tenant access is possible
  • Worker containers are ephemeral and destroyed after each job
  • Break-glass accounts are excluded from all deployed Conditional Access policies
  • Conditional Access policies deploy in report-only mode — enforcement requires manual action
  • JIT write access uses delegated OAuth2 tokens — cleared after each remediation job, no persistent app role assignments
  • Azure infrastructure access uses managed identity with no stored credentials
Read Permissions
All Plans

14 read-only scopes granted during onboarding. These permissions never modify any settings, policies, or data in your tenant.

RDevice.Read.All

Read device objects and properties for compliance reporting.

Data accessed: Device registration records, OS version, compliance state, last sync timestamps.

Not accessed: Device user activity, installed applications, browsing history.

RDeviceManagementApps.Read.All

Read app protection and app configuration policies to document and assess their settings.

Data accessed: App protection policy definitions, app configuration settings, managed app assignments.

Not accessed: Installed app inventory on user devices, app usage data.

RDeviceManagementConfiguration.Read.All

Read Intune configuration profiles, Settings Catalog policies, compliance policies, and security baselines.

Data accessed: Device configuration profiles, compliance rules, security baseline assignments.

Not accessed: User-specific compliance state, personal device data.

RDeviceManagementManagedDevices.Read.All

Read managed device properties and compliance state for inventory reporting.

Data accessed: Device hardware information, compliance status, enrollment timestamps.

Not accessed: Device location, user activity, personal files.

RDeviceManagementRBAC.Read.All

Read Intune role-based access control assignments for security posture reporting.

Data accessed: RBAC role definitions and role assignments within Intune.

Not accessed: User permissions outside of Intune, Azure AD role assignments.

RDeviceManagementScripts.Read.All

Read platform and remediation scripts configured in Intune for documentation.

Data accessed: Script names, descriptions, assignment targets. Script content for documentation purposes.

Not accessed: Script execution results on individual devices, user-specific output.

RDeviceManagementServiceConfig.Read.All

Read Intune service configuration including enrollment settings and Autopilot profiles.

Data accessed: Enrollment restrictions, Autopilot deployment profiles, update ring configurations.

Not accessed: Device serial numbers, user enrollment history.

RDirectory.Read.All

Read directory objects, users, and service principals for identity reporting.

Data accessed: User display names, directory role assignments, service principal metadata.

Not accessed: User passwords, authentication credentials, personal contact information.

RGroup.Read.All

Resolve group display names for policy assignment tables in SOPs and reports.

Data accessed: Group names, IDs, and membership types. Used only to label assignments.

Not accessed: Group membership lists, group email content, Teams conversations.

ROrganization.Read.All

Read organization and tenant configuration for compliance context.

Data accessed: Organization display name, verified domains, tenant ID, assigned licenses.

Not accessed: Billing details, subscription payment information.

RPolicy.Read.All

Read Conditional Access, authorization, authentication method, and cross-tenant access policies.

Data accessed: Policy configurations, rules, conditions, and grant controls.

Not accessed: User sign-in logs, authentication tokens, session data.

RReports.Read.All

Read usage and compliance reports for trend analysis.

Data accessed: Aggregated compliance and usage statistics.

Not accessed: Individual user activity reports, email contents.

RIdentityRiskEvent.Read.All

Read Identity Protection risk detections to evaluate risk-based Conditional Access controls (CISA-MS.AAD.2.3).

Data accessed: Risk detection events and their classifications (sign-in risk, user risk levels).

Not accessed: Individual sign-in logs, authentication tokens, session contents.

RSharePointTenantSettings.Read.All

Read SharePoint Online and OneDrive tenant-level settings to evaluate every SharePoint control (sharing capability, default link type, idle session sign-out, guest expiration, etc.). Without this, the entire SharePoint domain is silently skipped during assessment.

Data accessed: Tenant-level SharePoint configuration: sharing capability, default link type and permission, idle session sign-out, external user expiration, sharing domain restrictions, legacy auth flag.

Not accessed: Site contents, individual files, user permissions on specific sites, document libraries.

Write Permissions
Enterprise

13 write scopes requested when you initiate automated remediation. These are handled separately from read permissions.

Safety Controls

  • JIT (Just-In-Time): Write access uses a delegated token granted before remediation and cleared afterward — no persistent app role assignments
  • Report-only first: Conditional Access policies deploy in report-only mode — never enforced automatically
  • Break-glass required: Emergency access accounts must be configured before write access can be granted
  • No deletions: Veri-Tech never deletes existing policies — it only creates new ones or updates specific settings
WPolicy.ReadWrite.ConditionalAccess

Create and update Conditional Access policies to close compliance gaps. All new policies are deployed in report-only mode — they do not enforce restrictions until an administrator manually enables them.

Data accessed: Conditional Access policy definitions only.

Not accessed: User sign-in data, authentication tokens, session information.

WPolicy.ReadWrite.Authorization

Update tenant-wide authorization policy settings, such as guest invitation restrictions and default user permissions.

Data accessed: Authorization policy configuration.

WPolicy.ReadWrite.AuthenticationMethod

Configure authentication method settings, such as enabling FIDO2 security keys or disabling SMS-based authentication.

Data accessed: Authentication method policy definitions.

Not accessed: User MFA registrations, authentication tokens.

WPolicy.ReadWrite.CrossTenantAccess

Update cross-tenant access and collaboration trust settings to enforce external sharing policies.

Data accessed: Cross-tenant access policy configurations.

Not accessed: External user data, guest user activity.

WPolicy.ReadWrite.ConsentRequest

Update admin consent request policy to control how users request access to applications.

Data accessed: Consent request workflow settings.

Not accessed: Individual user consent requests, application usage data.

WPolicy.ReadWrite.ApplicationConfiguration

Create token lifetime policies (controlling access token validity periods) and activity-based timeout policies (enforcing idle session sign-out).

Data accessed: Token lifetime and session timeout policy definitions.

Not accessed: User sessions, authentication tokens, sign-in activity.

WDeviceManagementConfiguration.ReadWrite.All

Create and update Intune configuration profiles and compliance policies to enforce security baselines.

Data accessed: Device configuration profiles, compliance policy definitions.

Not accessed: Individual device data, user-specific compliance status.

WDeviceManagementApps.ReadWrite.All

Create and update app protection policies for iOS, Android, and Windows to enforce data loss prevention controls.

Data accessed: App protection policy definitions and assignments.

Not accessed: Installed applications on devices, app usage data.

WDeviceManagementServiceConfig.ReadWrite.All

Update enrollment configurations and update ring profiles for managed devices.

Data accessed: Enrollment restriction settings, Windows Update for Business configurations.

Not accessed: Individual device enrollment history, user device inventory.

WDeviceManagementManagedDevices.ReadWrite.All

Update managed device compliance state and configuration settings.

Data accessed: Device compliance state fields and management actions.

Not accessed: Device location, user files, personal data.

WSharePointTenantSettings.ReadWrite.All

Update SharePoint Online tenant-level settings to enforce sharing and access controls.

Data accessed: SharePoint tenant configuration (sharing policies, access controls).

Not accessed: SharePoint site contents, document libraries, user files.

WDirectory.ReadWrite.All

Create and update directory group settings required by certain compliance controls.

Data accessed: Group settings objects (e.g., guest access defaults, classification labels).

Not accessed: User accounts, passwords, group membership lists.

WUser.ReadWrite.All

Update user authentication method registration settings as required by certain identity controls.

Data accessed: User authentication method configuration.

Not accessed: User passwords, personal information, mailbox contents.

Workload Permissions
Enterprise

To extend compliance assessment coverage to Exchange Online, Defender for Office 365, and Microsoft Teams, your administrator grants the Global Reader directory role to the Veri-Tech service principal.

Global Reader

Provides read-only access to Exchange Online and Teams administrative configuration. Required for PowerShell-based checks that the Graph API does not support.

Data accessed: Administrative settings and configuration for Exchange Online, Defender for Office 365, and Microsoft Teams.

Not accessed: User mailbox contents, emails, calendar data, Teams chat messages, file contents, or any user-generated content.

Exchange.ManageAsApp

Enables the Veri-Tech service principal to authenticate to Exchange Online PowerShell for read-only configuration checks. This role is inert without the Global Reader directory role.

Data accessed: Exchange Online transport rules, anti-spam policies, anti-malware policies, preset security policies.

Not accessed: Mailbox contents, email messages, contact lists, calendar events.

Delegated OAuth Scopes

Write operations run as the signed-in administrator (delegated auth), not as the application. When you grant write access, you authorize Veri-Tech to perform changes on your behalf. Tokens are stored securely and scoped — Guard and Tune use separate consents with different scope sets.

DWrite scopes (delegated) — Veri-Guard remediation

When you grant write access for automated remediation, you authorize Veri-Tech to act on your behalf using your administrator credentials. The delegated token is stored securely and used only for the duration of the remediation job. The same write scopes listed above (Policy.ReadWrite.*, DeviceManagement*.ReadWrite.All, etc.) are requested as delegated permissions — meaning operations are performed as you, not as the application.

Data accessed: Same as the write permissions above — policy definitions, configuration settings.

Not accessed: No additional data access beyond the write permissions listed.

DWrite scopes (delegated) — Veri-Tune remediation

Veri-Tune uses a separate delegated consent for Intune-specific write operations: DeviceManagementConfiguration.ReadWrite.All, DeviceManagementServiceConfig.ReadWrite.All, and DeviceManagementApps.ReadWrite.All. This scoped consent means Veri-Tune cannot touch M365 policies (Conditional Access, etc.) — only Intune device management.

Data accessed: Intune configuration profiles, service configuration, app protection policies.

Not accessed: Identity policies, Exchange settings, SharePoint configuration.

DRoleManagement.ReadWrite.Directory (delegated)

Requested during the workload consent flow to assign or revoke the Global Reader directory role on the Veri-Tech service principal.

Data accessed: Directory role assignments for the Veri-Tech service principal only.

DApplication.Read.All (delegated)

Requested during workload enablement to look up the Exchange Online service principal in your tenant. Required to assign the Exchange.ManageAsApp role.

Data accessed: Service principal metadata (application IDs) — read-only, no modifications.

Questions about our permissions or security practices? Contact us · Manage your permissions