Elevate your privileges with a registered application
If you’re a global admin, when you sign in to start your session, sapio365 will notify you that you can elevate your session and explain what that means. You’ll then be prompted to click the Elevate Privileges button in the left panel.

An elevated sapio365 session differs from a standard User session because the registered application it uses does not require a user to sign in. Additionally, while a regular User session relies on an application created by Ytria, an elevated session requires you to create and use a registered application in your own Entra tenant, configured with specific Microsoft Graph permission scopes and roles.
How to elevate your sapio365 session
Click Elevate Privileges and follow the prompts to automatically create a registered app from sapio365.
See step-by-step instructions below
Only global admins and users who have been assigned to the sapio365 access role Can elevate a session can elevate their User session.
Most actions made in Entra with an elevated sapio365 session are logged as the registered application.
What happens when you elevate your session
A dedicated registered application is created in Entra, and you’ll need to grant consent to its permissions.
Most actions made in Entra with an elevated sapio365 session are logged as the registered application.
A registered application is created when you:
Elevate a User session.
Create sapio365 RBAC credentials (see specific details in the sapio365 RBAC section).
In all cases, you must give admin consent to the application’s permissions.
Control and liability
Since there is no "user" signed in during a session with elevated privileges, there are real-life security implications that you should be aware of when setting up your application permissions.
Limit permissions of the “elevation application”
While sapio365 lets you automatically create and register the application yourself, you can modify the permission scopes for the application even after admin consent has been given. The permission scopes shown in this document represent the maximum access potential. You can decide for yourself any limits you'd like to place on your elevated session by removing permissions. You can create and register multiple applications, all with different permission profiles.
Application password/secret
Although the newly created password can be retrieved right after the creation of a registered application, it is not necessary to note it since you can reset it at any time from your sapio365 session or from Entra (registered applications).
Most actions in an elevated sapio365 session are executed by the registered application
To elevate a session, sapio365 will let you create an “elevation application” with “application type” permissions. Before sapio365 version 2.1.10, “delegated type” permissions from an elevated session were used to perform the majority of actions in sapio365. The “elevation application” was mainly used to handle users' mailbox and OneDrive content.
sapio365 2.1.10
With the release of 2.1.10, sapio365 now uses the “elevation application” to perform the majority of the actions. The “delegated type” permissions will only be used for some specific actions related to group management. This will ensure that elevating your session will effectively extend your capabilities.
sapio365 2.2.0
The 2.2.0 release takes into account deprecated Microsoft Graph API permissions. This resulted that some sensitive actions on certain users (ex. global admins) require the sapio365 registered application to have the 'Privileged Authentication Administrator' role assigned. During the app creation process you will have the option to assign the role to the app. This role assignment is necessary for the maximum functionality of sapio365 but it is not mandatory. See the full list of sensitive actions here.
(Optional) Manually create application at the v2 Entra (Azure Active Directory) Endpoint
You have the option to manually create a registered application in Entra to elevate a sapio365 session. You'll need a key pair for proper authentication: an app ID that will identify the application and the password provided (see Step 8) which will authenticate the application.













