Replies: 2 comments 3 replies
-
I couldn't understand the issue. Can you share a minimum reproducible sample for what works and what doesn't work for you? Here is a sample script for getting side permissions: https://pnp.github.io/script-samples/spo-get-permission-audit/README.html?tabs=pnpps |
Beta Was this translation helpful? Give feedback.
3 replies
-
I wouldn't recommend going this route, because uniqperm.aspx only shows the first few unique permissions. You'd be better off with e.g. M365Permissions to create a full overview of these types of exceptions. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hello,
I'm trying to write a script to run unattended that checks /_layouts/15/uniqperm.aspx as an inexpensive method for identifying uniquely permissioned SharePoint Online lists or lists containing uniquely permissioned list items.
I can only get it to work when I've connected using -UseWebLogin, then using Invoke-PnPSPRestMethod -Raw. This approach is not unattended and I see that -UseWebLogin is disappearing anyway.
When I connect using a certificate for my registered PnP PowerShell Application, to which I have granted application permissions with Full Access rights to all sites, I get a 401 error for this cmdlet for this page (while /_layouts/15/user.aspx, for example, is retrieved just fine!)
How can I get this to work for uniqperm.aspx like -UseWebLogin did please?
Thanks,
James
Beta Was this translation helpful? Give feedback.
All reactions