Skip to content

Commit 5b9cfe2

Browse files
authored
Merge pull request MicrosoftDocs#4779 from Luspin/patch-1
Update New-ApplicationAccessPolicy.md
2 parents b532bfb + 6ee30b2 commit 5b9cfe2

File tree

1 file changed

+18
-8
lines changed

1 file changed

+18
-8
lines changed

exchange/exchange-ps/exchange/organization/New-ApplicationAccessPolicy.md

Lines changed: 18 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ monikerRange: "exchonline-ps"
1515
## SYNOPSIS
1616
This cmdlet is available only in the cloud-based service.
1717

18-
Use the New-ApplicationAccessPolicy cmdlet to restrict or deny access for an application that is using Outlook Rest APIs or Microsoft Graph APIs to a specific set of mailboxes. These policies are complimentary to the permission scopes that are declared by the application.
18+
Use the New-ApplicationAccessPolicy cmdlet to restrict or deny access for an application that is using Outlook REST APIs or Microsoft Graph APIs to a specific set of mailboxes. These policies are complimentary to the permission scopes that are declared by the application.
1919

2020
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-server/exchange-cmdlet-syntax).
2121

@@ -32,11 +32,11 @@ New-ApplicationAccessPolicy -AccessRight <ApplicationAccessPolicyRight> -AppId <
3232
## DESCRIPTION
3333
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://docs.microsoft.com/powershell/exchange/exchange-server/find-exchange-cmdlet-permissions).
3434

35-
Use the New-ApplicationAccessPolicy cmdlet to restrict or deny access for an application that is using Outlook Rest APIs or Microsoft Graph APIs to a specific set of mailboxes. These policies are complimentary to the permission scopes that are declared by the application.
35+
Use the New-ApplicationAccessPolicy cmdlet to restrict or deny access for an application that is using Outlook REST APIs or Microsoft Graph APIs to a specific set of mailboxes. These policies are complimentary to the permission scopes that are declared by the application.
3636

3737
While the scope-based resource access like Mail.Read or Calendar.Read is effective to ensure that the application can only read mails or events within a mailbox and not do anything else; Application Access Policy feature allows admins to enforce limits that are based on a list of mailboxes. For example, in a global organization apps developed for one country shouldn’t have access to data from other countries or a CRM integration application should only access calendar of the Sales organization and no other departments.
3838

39-
Every API request using the Outlook Rest APIs or Microsoft Graph APIs to a target mailbox done by an application is verified using the following rules (in the same order):
39+
Every API request using the Outlook REST APIs or Microsoft Graph APIs to a target mailbox done by an application is verified using the following rules (in the same order):
4040

4141
1. If there are multiple application access policies for the same Application and Target Mailbox pair, DenyAccess policy is prioritized over a RestrictAccess policy.
4242

@@ -52,7 +52,7 @@ Every API request using the Outlook Rest APIs or Microsoft Graph APIs to a targe
5252

5353
### Example 1
5454
```powershell
55-
New-ApplicationAccessPolicy -AccessRight DenyAccess -AppId 3dbc2ae1-7198-45ed-9f9f-d86ba3ec35b5,6ac794ca-2697-4137-8754-d2a78ae47d93 -PolicyScopeGroupId "Engineering Staff" -Description "Engineering Group Policy"
55+
New-ApplicationAccessPolicy -AccessRight DenyAccess -AppId "3dbc2ae1-7198-45ed-9f9f-d86ba3ec35b5", "6ac794ca-2697-4137-8754-d2a78ae47d93" -PolicyScopeGroupId "Engineering Staff" -Description "Engineering Group Policy"
5656
```
5757

5858
This example creates a new application access policy with the following settings:
@@ -67,7 +67,7 @@ This example creates a new application access policy with the following settings
6767

6868
### Example 2
6969
```powershell
70-
New-ApplicationAccessPolicy -AccessRight RestrictAccess -AppId e7e4dbfc-046f-4074-9b3b-2ae8f144f59b -PolicyScopeGroupId [email protected] -Description "Restrict this app to members of security group EvenUsers."
70+
New-ApplicationAccessPolicy -AccessRight RestrictAccess -AppId "e7e4dbfc-046f-4074-9b3b-2ae8f144f59b" -PolicyScopeGroupId [email protected] -Description "Restrict this app to members of security group EvenUsers."
7171
```
7272

7373
This example creates a new application access policy with the following settings:
@@ -80,11 +80,9 @@ This example creates a new application access policy with the following settings
8080

8181
- Description: Restrict this app to members of security group EvenUsers.
8282

83-
84-
8583
### Example 3
8684
```powershell
87-
New-ApplicationAccessPolicy -AccessRight DenyAccess -AppId e7e4dbfc-046f-4074-9b3b-2ae8f144f59b -PolicyScopeGroupId [email protected] -Description "Deny this app access to members of security group OddUsers."
85+
New-ApplicationAccessPolicy -AccessRight DenyAccess -AppId "e7e4dbfc-046f-4074-9b3b-2ae8f144f59b" -PolicyScopeGroupId [email protected] -Description "Deny this app access to members of security group OddUsers."
8886
```
8987

9088
This example creates a new application access policy with the following settings:
@@ -151,6 +149,18 @@ For example:
151149
152150
- GUID
153151
152+
This parameter only accepts recipients that are security principals (users or groups that can have permissions assigned to them). The following types of recipients are not security principals, so you can't use them with this parameter::
153+
154+
- Discovery mailboxes
155+
156+
- Dynamic distribution groups
157+
158+
- Distribution groups
159+
160+
- Shared mailboxes
161+
162+
To verify that a recipient is a security principal, use the syntax `Get-Recipient -Identity <RecipientIdentity> | Select-Object IsValidSecurityPrincipal`.
163+
154164
```yaml
155165
Type: RecipientIdParameter
156166
Parameter Sets: (All)

0 commit comments

Comments
 (0)