[GH-ISSUE #1084] Missing application roles for "List Incidents" #577

Closed
opened 2026-03-02 12:43:25 +03:00 by kerem · 2 comments
Owner

Originally created by @Arne-RFA on GitHub (Aug 25, 2022).
Original GitHub issue: https://github.com/KelvinTegelaar/CIPP/issues/1084

Description

Clean deployment of 2.11.2
SECURITY & COMPLIANCE > List Incidents
"popup" error shown
Missing application roles. API required roles: SecurityIncident.Read.All,SecurityIncident.ReadWrite.All, application roles: Group.ReadWrite.All,Group.Read.All,Policy.ReadWrite

image

Run Permissions check shows
Your access token contains the MFA claim.
Your Secure Application Model has all required permissions

Checked API permissions and all are set apart from "Policy.ReadWrite", which does not exist as a Microsoft Graph API Permission

image

No existing issues found (open or closed) with "Policy.ReadWrite" as search text.

Environment data

Azure, Version Frontend 2.11.2, version backend 2.0.3
SAM installed via wizard, with Policy.ReadWrite.ApplicationConfiguration, SecurityIncident.Read.All, and 
SecurityIncident.ReadWrite.All permissions added manually as per https://github.com/KelvinTegelaar/CIPP/issues/1031

Running in "write mode", issue seen when following instructions "Visit each page you want to save the contents of, e.g. Standards, Intune Templates, Applications, Alerts, Visiting the page automatically migrates the data to Azure Tables." from https://github.com/KelvinTegelaar/CIPP/releases/tag/v2.1.11.0
Originally created by @Arne-RFA on GitHub (Aug 25, 2022). Original GitHub issue: https://github.com/KelvinTegelaar/CIPP/issues/1084 ### Description Clean deployment of 2.11.2 SECURITY & COMPLIANCE > List Incidents "popup" error shown Missing application roles. API required roles: SecurityIncident.Read.All,SecurityIncident.ReadWrite.All, application roles: Group.ReadWrite.All,Group.Read.All,Policy.ReadWrite ![image](https://user-images.githubusercontent.com/74773674/186651422-9756d266-0cd9-44a7-83d8-68007c2b9460.png) Run Permissions check shows Your access token contains the MFA claim. Your Secure Application Model has all required permissions Checked API permissions and all are set apart from "Policy.ReadWrite", which does not exist as a Microsoft Graph API Permission ![image](https://user-images.githubusercontent.com/74773674/186652442-d318da85-6054-4dc1-9649-d879b73e2d5c.png) No existing issues found (open or closed) with "Policy.ReadWrite" as search text. ### Environment data ```PowerShell Azure, Version Frontend 2.11.2, version backend 2.0.3 SAM installed via wizard, with Policy.ReadWrite.ApplicationConfiguration, SecurityIncident.Read.All, and SecurityIncident.ReadWrite.All permissions added manually as per https://github.com/KelvinTegelaar/CIPP/issues/1031 Running in "write mode", issue seen when following instructions "Visit each page you want to save the contents of, e.g. Standards, Intune Templates, Applications, Alerts, Visiting the page automatically migrates the data to Azure Tables." from https://github.com/KelvinTegelaar/CIPP/releases/tag/v2.1.11.0 ```
kerem 2026-03-02 12:43:25 +03:00
Author
Owner

@github-actions[bot] commented on GitHub (Aug 25, 2022):

Thank you for creating a bug. Please make sure your bug is indeed a unique case by checking current and past issues, and reading the complete documentation at https://kelvintegelaar.github.io/CIPP
If your bug is a known documentation issue, it will be closed without notice by a contributor. To confirm that this is not a bug found in the documentation, please copy and paste the following comment: "I confirm that I have checked the documentation thoroughly and believe this to be an actual bug.".

Without confirming, your report will be closed in 24 hours. If you'd like this bug to be assigned to you, please comment "I would like to work on this please!".

<!-- gh-comment-id:1227146501 --> @github-actions[bot] commented on GitHub (Aug 25, 2022): Thank you for creating a bug. Please make sure your bug is indeed a unique case by checking current and past issues, and reading the complete documentation at https://kelvintegelaar.github.io/CIPP If your bug is a known documentation issue, it will be closed without notice by a contributor. To confirm that this is not a bug found in the documentation, please copy and paste the following comment: "I confirm that I have checked the documentation thoroughly and believe this to be an actual bug.". Without confirming, your report will be closed in 24 hours. If you'd like this bug to be assigned to you, please comment "I would like to work on this please!".
Author
Owner

@Arne-RFA commented on GitHub (Aug 25, 2022):

I confirm that I have checked the documentation thoroughly and believe this to be an actual bug.

<!-- gh-comment-id:1227149360 --> @Arne-RFA commented on GitHub (Aug 25, 2022): I confirm that I have checked the documentation thoroughly and believe this to be an actual bug.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/CIPP#577
No description provided.