Tenant-wide consent grants
Detects OAuth2 grants with AllPrincipals consent type
Why this matters
What this means
An application in your tenant has been granted tenant-wide (AllPrincipals) consent. This means an administrator has clicked "Consent for the entire organisation" — the application can act on behalf of any user without individual consent.
Why is it a security risk?
- If the application is compromised or malicious, it already has the permissions needed to access sensitive data — the "door is already open".
- Broad scopes like
user_impersonationallow the application to read and write data as if it were the logged-in user. - Tenant-wide consent is permanent until explicitly revoked — it is easy to forget these grants exist.
Recommended next steps
- Go to Microsoft Entra admin center → Enterprise applications → [App name] → Permissions and review the granted scopes.
- Determine if the application still needs this level of access. If not, click Revoke permissions.
- Consider using admin consent workflows to require approval before future tenant-wide grants.
- Regularly audit consent grants using the app consent policies feature.
How to fix it
Review tenant-wide consent grants and remove unnecessary ones.
Required Microsoft Graph permissions
EntraAnalyzer needs the following read-only Graph permissions to evaluate this rule:
Directory.Read.All
Further reading
Run this check on your tenant
EntraAnalyzer evaluates this rule automatically on every scan and emails you the results.
Get started — free first scan →