List of CoreView Enterprise applications

  • Last update on February 26th, 2025

CoreView adds Enterprise Applications to your Entra ID for proper functioning. 

Some are added during onboarding and are mandatory, while others are optional and can be added or removed directly from CoreView. To use these applications, permissions must be granted. Below is a list of the apps, their purpose, and links to complete and detailed lists of the permissions to be provided:


Onboarding

CoreView utilizes the following applications to onboard and import data from your Microsoft 365 tenant. Granting consent to these applications is mandatory.

CoreView Portal

These permissions are requested during the activation link and Microsoft 365 login step of the onboarding.

The application CoreView Portal is created as soon as the first user logs into the portal. It is required for the user to log into the CoreView web interface. 

Permissions list

The CoreView Portal app asks for the following permissions:

  • [Azure Active Directory Graph] Sign in and read user profile: allows users to sign into the app with their work or school accounts and allows the app to see basic user profile information. 
  • [Microsoft Graph] Sign in and read user profile: allows users to sign into the app with their work or school accounts and allows the app to see basic user profile information. 
 
 

Integration App

These permissions are requested during the consent-granting step of onboarding, which is necessary to complete the onboarding process and ensure the proper functioning of CoreView.

The CoreView Integration App uses the Graph API and the Office 365 Management API to collect reporting data from your tenant. By using this app, you provide consent to a set of permissions necessary for accessing these APIs.

  • See the Grant consent article in the onboarding documentation for instructions on granting permissions to the Integration App.

Permissions list

The Integration App asks for the following permissions:

Microsoft Graph:

  • Read all groups: allows the app to read group properties and memberships, and read the calendar and conversations for all groups, without a signed-in user.
  • Read all directory RBAC settings: allows the app to read the role-based access control (RBAC) settings for your company's directory, without a signed-in user. This includes reading directory role templates, directory roles, and memberships. 
  • Read organization information: allows the app to read the organization and related resources, without a signed-in user. Related resources include things like subscribed SKUs and tenant branding information.
  • Read all hidden memberships: allows the app to read the memberships of hidden groups and administrative units without a signed-in user.
  • Read Microsoft Intune device configuration and policies: allows the app to read properties of Microsoft Intune-managed device configuration and device compliance policies and their assignment to groups, without a signed-in user.
  • Read Microsoft Intune apps: allows the app to read the properties, group assignments, and status of apps, app configurations, and app protection policies managed by Microsoft Intune, without a signed-in user.
  • Read Microsoft Intune devices: allows the app to read the properties of devices managed by Microsoft Intune, without a signed-in user.
  • Read Microsoft Intune RBAC settings: allows the app to read the properties relating to the Microsoft Intune Role-Based Access Control (RBAC) settings, without a signed-in user.
  • Read Microsoft Intune configuration: allows the app to read Microsoft Intune service properties including device enrollment and third-party service connection configuration, without a signed-in user.
  • Read all administrative units: allows the app to read administrative units and administrative unit membership without a signed-in user.
  • Read your organization's security actions: allows the app to read security actions, without a signed-in user.
  • Read your organization’s security events: allows the app to read your organization’s security events without a signed-in user.
  • Read all identity risk event information: allows the app to read the identity risk event information for your organization without a signed in user.
  • Read all identity risky user information: allows the app to read the identity risky user information for your organization without a signed-in user.
  • Read all users' full profiles: allows the app to read user profiles without a signed-in user.
  • Read all audit log data: allows the app to read and query your audit log activities, without a signed-in user.
  • Read all access reviews: allows the app to read access reviews on behalf of the signed-in user.
  • Read all usage reports: allows an app to read all service usage reports without a signed-in user. Services that provide usage reports include Office 365 and Azure Active Directory.
  • Read all user mailbox settings: allows the app to read the user's mailbox settings without a signed-in user. Does not include permission to send mail.
  • Read directory data: allows the app to read data in your organization's directory, such as users, groups, and apps, without a signed-in user.
  • Read all identity user flows: allows the app to read your organization's user flows, without a signed-in user.
  • Read all users' teamwork activity feed: allows the app to read all users' teamwork activity feed, without a signed-in user.
  • Read all applications: allows the app to read applications and service principles on behalf of the signed-in user.
  • Read all group memberships: allows the app to read memberships and basic group properties for all groups without a signed-in user.
  • Read all call records: allows the app to read call records for all calls and online meetings without a signed-in user.
  • Read all users' authentication methods:
  • Get a list of all teams: get a list of all teams, without a signed-in user.
  • Read the names and descriptions of all channels: read all channel names and channel descriptions, without a signed-in user.
  • Read the members of all teams: read the members of all teams, without a signed-in user.
  • Read the members of all channels: read the members of all channels, without a signed-in user.
  • Read service health: allows the app to read your tenant's service health information, without a signed-in user. Health information may include service issues or service health overviews.
  • Read service messages: allows the app to read your tenant's service announcement messages, without a signed-in user. Messages may include information about new or changed features.
  • Sign in and read user profile: Allows you to sign in to the app with your organizational account and let the app read your profile. It also allows the app to read basic company information.

Office 365 Management APIs:

  • Read activity data for your organization: allows the app to read activity data for your organization.
  • Read DLP policy events including detected sensitive data: allows the app to read DLP policy events, including detected sensitive data, for your organization. 
 
 

CoreView Registration (Registration App)

These permissions are requested during the consent-granting step of the onboarding process

The CoreView Registration App is a temporary application used to create service accounts, which can be removed from tenants immediately after the signup process.

This app is necessary to complete the onboarding process and ensure the proper functioning of CoreView. By using this app, specific read-only, non-interactive accounts are created to connect to your tenant and collect reporting data.

Please note that service accounts cannot be removed; doing so will prevent the application from working properly. Alternatively, you can manually enter previously created service accounts in the Microsoft 365 Admin Center without granting CoreView any additional permissions.

  • For more information about what these accounts are, their purpose and characteristics, and how you can identify them in Entra ID, see the Grant consent article in the onboarding documentation.
  • Instructions on how to create service accounts automatically and manually are provided in the Grant consent article in the onboarding documentation.

Permissions list

The Registration App asks for the following permissions:

  • [Microsoft Graph] Read and write all directory RBAC settings: used to assign Global Reader role to our Service Accounts 
  • [Microsoft Graph] Read and write all users' full profiles: used to create Service Accounts on Azure AD 
  • [Microsoft Graph] Sign in and read user profile: used to perform SSO from Azure AD to CoreView platform
 
 

Access

CoreView SSO

This app provides access for all operators via SSO. The app is added to Entra ID upon the first login following onboarding. Each operator, upon their first access to CoreView, will need to grant permissions.

Permissions list

The CoreView SSO asks for the following permissions:

  • [Microsoft Graph] openid: sign users in 
  • [Microsoft Graph] profile: view users' basic profile 
  • [Microsoft Graph] User.Read: sign in and read user profile
  • [Microsoft Graph] email: view users' email address 
 
 

Partner Portal Web

The Partner Portal Web is a user-facing application that allows operators to authenticate and register through a web interface, providing direct access to the partner portal's features.

Partner Portal API

This app serves as a backend service that enables secure authentication and registration for external systems, allowing them to programmatically connect and integrate with the Partner Portal.

A note about Partner Portal Web and Partner Portal API

These two applications are complementary, meaning that together they create a cohesive system:

  • The Partner Portal Web app offers user-facing functionality, allowing users to interact with the system directly.
  • The Partner Portal API provides programmatic functionality, enabling other systems to integrate and communicate.
  • Both apps trust each other, ensuring secure communication and maintaining consistency in user authentication and registration across different platforms.

Extra consents

For CoreView to work properly with applications like Endpoint, BitLocker, and SharePoint, it's crucial to grant the required permissions to the CoreView application on the Microsoft side.

These apps are optional, but they must be activated to use all functionalities. You can grant or revoke permissions for this app at any time directly from CoreView. To do this, refer to the Consent management article in the CoreView product manual.

CoreView Management Integration

If Endpoint manager permissions are not granted to the CoreView app on the Microsoft side, CoreView cannot perform actions using the Endpoint manager module. This set of permissions is required because Endpoint manager actions do not use PowerShell cmdlets; instead, they utilize Graph APIs, which require a different set of permissions.

Permissions list

CoreView Management Integration requires the following Entra ID application permissions:

  • [Microsoft Graph] Device management managed devices privileged operations all: perform user-impacting remote actions on Microsoft Intune devices
  • [Microsoft Graph] Device management managed devices read write all: read and write Microsoft Intune devices
  • [Microsoft Graph] Device management service config read write all: read and write Microsoft Intune devices
 
 

CoreView SharePoint Integration

To enable SharePoint management actions through CoreView and activate the import process, it is essential to grant additional consent.

Permissions list

CoreView SharePoint Integration requires the following Entra ID application permissions:

  • [Azure Active Directory Graph] User read: enable sign-on and read users' profiles
  • [Microsoft Graph] Directory read all: read directory data
  • [Microsoft Graph] Group read write all: read and write all groups
  • [SharePoint] Sites full control all: have full control of all site collections
 
 

CoreView BitLocker API Integration

To ensure that data is displayed in the BitLocker keys report and to be able to view and manage BitLocker keys, it is essential to grant additional consent. This allows for the retrieval of data for the BitLocker keys report.

Permissions list

CoreView BitLocker API requires the following Entra ID application permissions:

  • [Microsoft Graph] BitLockerKey read all: read BitLocker keys
  • [Microsoft Graph] User read: sign in and read user profile
 
 

CoreView Teams API Integration

You need to provide additional consent to import Teams Voice data (calls, PSNT usage) into CoreView. Please refer to the documentation about Teams Voice.

CoreView Exchange Integration

Provide consent for the use of multiple Exchange applications to overcome Microsoft's Exchange Service throttling limit.

Permissions list

CoreView Exchange Integration requires the following Entra ID application permissions:

  • [PowerShell Exchange Online Module] Access mailboxes as the signed-in user via Exchange Web Services: Allows the app to have the same access to mailboxes as the signed-in user via Exchange Web Services.
  • [PowerShell Exchange Online Module] Manage Exchange configuration: allows the app to manage the organization's Exchange environment, such as mailboxes, groups, and other configuration objects. To enable management actions, an admin must assign the appropriate roles to the app user.
  • [PowerShell Exchange Online Module] Manage Exchange As Application: allows the app to manage the organization's Exchange environment without any user interaction. This includes mailboxes, groups, and other configuration objects. To enable management actions, an admin must assign the appropriate roles directly to the app.
  • [PowerShell Exchange Online Module] Sign in and read user profile: allows users to sign-in to the app, and allows the app to read the profile of signed-in users. It also allows the app to read basic company information of signed-in users.
 
 

Graph Management

This app is necessary for the proper functioning of:

that use the Graph PowerShell module or Graph API endpoints.

By using this app, you will authorize the use of the Microsoft Graph module.

This app is optional, but it is need to be activated to use the functionalities listed above.

You can grant and revoke permissions for this app at any time, directly from CoreView.

  • See the Graph management article for instructions on granting permissions and viewing permission lists.