last sync: 2025-Apr-29 17:09:03 Etc/UTC

Directory Readers - 88d8e3e3-8f55-4a1e-953a-9b9898b8876b
Entra Id Role definition

Display name Directory Readers
Id 88d8e3e3-8f55-4a1e-953a-9b9898b8876b
Description Can read basic directory information. Commonly used to grant directory read access to applications and guests.
Detailed description Users in this role can read basic directory information. This role should be used for:
1. Granting a specific set of guest users read access instead of granting it to all guest users.
1. Granting a specific set of non-admin users access to the administration portal when "Restrict access to Microsoft Entra ID administration portal" is set to "Yes".
1. Granting service principals access to directory where Directory.Read.All is not an option.
Categories readOnly
isPrivileged False
EntraOps Tier Level ManagementPlane
#Resource Actions unique 54
#Resource Actions Operations unique 54
#Resource Actions privileged 0
#Resource Actions direct 54
Resource Actions inherited False
#Resource Actions inherited 0
Resource Actions inherited from n/a
#Resource Actions overlap direct&inherited 0
Resource Actions overlap direct&inherited
#Resource Actions inherited to 103 other Entra Id Roles
Resource Actions inherited to AI Administrator (d2562ede-74db-457e-a7b6-544e236ebb61)
Application Administrator (9b895d92-2cd3-44c7-9d02-a6ac2d5ea5c3)
Application Developer (cf1c38e5-3621-4004-a7cb-879624dced7c)
Attack Payload Author (9c6df0f2-1e7c-4dc3-b195-66dfbd24aa8f)
Attack Simulation Administrator (c430b396-e693-46cc-96f3-db01bf8bb62a)
Attribute Assignment Administrator (58a13ea3-c632-46ae-9ee0-9c0d43cd7f3d)
Attribute Assignment Reader (ffd52fa5-98dc-465c-991d-fc073eb59f8f)
Attribute Definition Administrator (8424c6f0-a189-499e-bbd0-26c1753c96d4)
Attribute Definition Reader (1d336d2c-4ae8-42ef-9711-b3604ce3fc2c)
Attribute Log Administrator (5b784334-f94b-471a-a387-e7219fc49ca2)
Attribute Log Reader (9c99539d-8186-4804-835f-fd51ef9e2dcd)
Attribute Provisioning Administrator (ecb2c6bf-0ab6-418e-bd87-7986f8d63bbe)
Attribute Provisioning Reader (422218e4-db15-4ef9-bbe0-8afb41546d79)
Authentication Administrator (c4e39bd9-1100-46d3-8c65-fb160da0071f)
Authentication Extensibility Administrator (25a516ed-2fa0-40ea-a2d0-12923a21473a)
Authentication Policy Administrator (0526716b-113d-4c15-b2c8-68e3c22b9f80)
Azure AD Joined Device Local Administrator (9f06204d-73c1-4d4c-880a-6edb90606fd8)
Azure DevOps Administrator (e3973bdf-4987-49ae-837a-ba8e231c7286)
Azure Information Protection Administrator (7495fdc4-34c4-4d15-a289-98788ce399fd)
B2C IEF Keyset Administrator (aaf43236-0c0d-4d5f-883a-6955382ac081)
B2C IEF Policy Administrator (3edaf663-341e-4475-9f94-5c398ef6c070)
Billing Administrator (b0f54661-2d74-4c50-afa3-1ec803f12efe)
Cloud App Security Administrator (892c5842-a9a6-463a-8041-72aa08ca3cf6)
Cloud Application Administrator (158c047a-c907-4556-b7ef-446551a6b5f7)
Cloud Device Administrator (7698a772-787b-4ac8-901f-60d6b08affd2)
Compliance Administrator (17315797-102d-40b4-93e0-432062caca18)
Compliance Data Administrator (e6d1a23a-da11-4be4-9570-befc86d067a7)
Conditional Access Administrator (b1be1c3e-b65d-4f19-8427-f6fa0d97feb9)
Customer LockBox Access Approver (5c4f9dcd-47dc-4cf7-8c9a-9e4207cbfc91)
Desktop Analytics Administrator (38a96431-2bdf-4b4c-8b6e-5d3d8abac1a4)
Directory Writers (9360feb5-f418-4baa-8175-e2a00bac4301)
Domain Name Administrator (8329153b-31d0-4727-b945-745eb3bc5f31)
Dynamics 365 Administrator (44367163-eba1-44c3-98af-f5787879f96a)
Edge Administrator (3f1acade-1e04-4fbc-9b69-f0302cd84aef)
Exchange Administrator (29232cdf-9323-42fd-ade2-1d097af3e4de)
Exchange Recipient Administrator (31392ffb-586c-42d1-9346-e59415a2cc4e)
Extended Directory User Administrator (dd13091a-6207-4fc0-82ba-3641e056ab95)
External ID User Flow Administrator (6e591065-9bad-43ed-90f3-e9424366d2f0)
External ID User Flow Attribute Administrator (0f971eea-41eb-4569-a71e-57bb8a3eff1e)
External Identity Provider Administrator (be2f45a1-457d-42af-a067-6ec1fa63bc45)
Fabric Administrator (a9ea8996-122f-4c74-9520-8edcd192826c)
Global Administrator (62e90394-69f5-4237-9190-012177145e10)
Global Reader (f2ef992c-3afb-46b9-b7cf-a126ee74c451)
Global Secure Access Administrator (ac434307-12b9-4fa1-a708-88bf58caabc1)
Global Secure Access Log Reader (843318fb-79a6-4168-9e6f-aa9a07481cc4)
Groups Administrator (fdd7a751-b60b-444a-984c-02652fe8fa1c)
Helpdesk Administrator (729827e3-9c14-49f7-bb1b-9608f156bbb8)
Hybrid Identity Administrator (8ac3fc64-6eca-42ea-9e69-59f4c7b60eb2)
Identity Governance Administrator (45d8d3c5-c802-45c6-b32a-1d70b5e1e86e)
Insights Administrator (eb1f4a8d-243a-41f0-9fbd-c7cdf6c5ef7c)
Insights Analyst (25df335f-86eb-4119-b717-0ff02de207e9)
Insights Business Leader (31e939ad-9672-4796-9c2e-873181342d2d)
Intune Administrator (3a2c62db-5318-420d-8d74-23affee5d9d5)
IoT Device Administrator (2ea5ce4c-b2d8-4668-bd81-3680bd2d227a)
Kaizala Administrator (74ef975b-6605-40af-a5d2-b9539d836353)
Knowledge Administrator (b5a8dcf3-09d5-43a9-a639-8e29ef291470)
Knowledge Manager (744ec460-397e-42ad-a462-8b3f9747a02c)
License Administrator (4d6ac14f-3453-41d0-bef9-a3e0c569773a)
Lifecycle Workflows Administrator (59d46f88-662b-457b-bceb-5c3809e5908f)
Message Center Privacy Reader (ac16e43d-7b2d-40e0-ac05-243ff356ab5b)
Message Center Reader (790c1fb9-7f7d-4f88-86a1-ef1f95c05c1b)
Microsoft 365 Backup Administrator (1707125e-0aa2-4d4d-8655-a7c786c76a25)
Microsoft Hardware Warranty Administrator (1501b917-7653-4ff9-a4b5-203eaf33784f)
Microsoft Hardware Warranty Specialist (281fe777-fb20-4fbb-b7a3-ccebce5b0d96)
Network Administrator (d37c8bed-0711-4417-ba38-b4abe66ce4c2)
Office Apps Administrator (2b745bdf-0803-4d80-aa65-822c4493daac)
Organizational Branding Administrator (92ed04bf-c94a-4b82-9729-b799a7a4c178)
Organizational Messages Approver (e48398e2-f4bb-4074-8f31-4586725e205b)
Partner Tier1 Support (4ba39ca4-527c-499a-b93d-d9b492c50246)
Partner Tier2 Support (e00e864a-17c5-4a4b-9c06-f5b95a8d5bd8)
Password Administrator (966707d0-3269-4727-9be2-8c3a10f19b9d)
People Administrator (024906de-61e5-49c8-8572-40335f1e0e10)
Permissions Management Administrator (af78dc32-cf4d-46f9-ba4e-4428526346b5)
Power Platform Administrator (11648597-926c-4cf3-9c36-bcebb0ba8dcc)
Printer Administrator (644ef478-e28f-4e28-b9dc-3fdde9aa0b1f)
Printer Technician (e8cef6f1-e4bd-4ea8-bc07-4b8d950f4477)
Privileged Authentication Administrator (7be44c8a-adaf-4e2a-84d6-ab2649e08a13)
Privileged Role Administrator (e8611ab8-c189-46e8-94e1-60213ab1f814)
Reports Reader (4a5d8f65-41da-4de4-8968-e035b65339cf)
Search Administrator (0964bb5e-9bdb-4d7b-ac29-58e794862a40)
Search Editor (8835291a-918c-4fd7-a9ce-faa49f0cf7d9)
Security Administrator (194ae4cb-b126-40b2-bd5b-6091b380977d)
Security Operator (5f2222b1-57c3-48ba-8ad5-d4759f1fde6f)
Security Reader (5d6b6bb7-de71-4623-b4af-96380a352509)
Service Support Administrator (f023fd81-a637-4b56-95fd-791ac0226033)
SharePoint Administrator (f28a1f50-f6e7-4571-818b-6a12f2af6b6c)
SharePoint Embedded Administrator (1a7d78b6-429f-476b-b8eb-35fb715fffd4)
Skype for Business Administrator (75941009-915a-4869-abe7-691bff18279e)
Teams Administrator (69091246-20e8-4a56-aa4d-066075b2a7a8)
Teams Communications Administrator (baf37b3a-610e-45da-9e62-d9d1e5e8914b)
Teams Communications Support Engineer (f70938a0-fc10-4177-9e90-2178f8765737)
Teams Communications Support Specialist (fcf91098-03e3-41a9-b5ba-6f0ec8188a12)
Teams Devices Administrator (3d762c5a-1b6c-493f-843e-55a3b42923d4)
Teams Telephony Administrator (aa38014f-0993-46e9-9b45-30501a20909d)
Tenant Creator (112ca1a2-15ad-4102-995e-45b0bc479a6a)
User Administrator (fe930be7-5e62-47db-91af-98c3a49a38b1)
Virtual Visits Administrator (e300d9e7-4a2b-4295-9eff-f1c78b36cc98)
Viva Glint Tenant Administrator (0ec3f692-38d6-4d14-9e69-0377ca7797ad)
Viva Goals Administrator (92b086b3-e367-4ef2-b869-1de128fb986e)
Viva Pulse Administrator (87761b17-1ed2-4af3-9acd-92a150038160)
Windows 365 Administrator (11451d60-acb2-45eb-a7d6-43d0f0125c13)
Windows Update Deployment Administrator (32696413-001a-46ae-978c-ce0f6b3620d2)
Yammer Administrator (810a2642-a034-447f-a5e8-41beaa378541)
#Resource Actions conditioned 0
#Resource Actions unconditioned 54
#NameSpaces 1
NameSpaces microsoft.directory: 54
Actions read: 54
Operations actionVerbs GET: 54
Resource Actions where Consent Policy applies 0
Resource Actions / Consent Policy n/a
JSON enriched
JSON raw (v1.0 endpoint)
GET /roleManagement/directory/roleDefinitions/{id}
JSON raw (beta endpoint)
GET /roleManagement/directory/roleDefinitions/{id}