Skip to content

Commit 0539389

Browse files
authored
Merge pull request #26035 from microsoftgraph/jan7docsupdate
Add two new attributes into sign-in logs API docs
2 parents 3a41056 + 5ceb96f commit 0539389

File tree

2 files changed

+28
-0
lines changed

2 files changed

+28
-0
lines changed

api-reference/beta/resources/signin.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,7 @@ The [Microsoft Entra data retention policies](/azure/active-directory/reports-mo
3434
|appDisplayName|String|The application name displayed in the Microsoft Entra admin center. <br/><br/> Supports `$filter` (`eq`, `startsWith`).|
3535
|appId|String|The application identifier in Microsoft Entra ID. <br/><br/> Supports `$filter` (`eq`).|
3636
|appliedConditionalAccessPolicies|[appliedConditionalAccessPolicy](appliedconditionalaccesspolicy.md) collection|A list of conditional access policies that the corresponding sign-in activity triggers. Apps need more Conditional Access-related privileges to read the details of this property. For more information, see [Permissions for viewing applied conditional access (CA) policies in sign-ins](../api/signin-list.md#permissions).|
37+
|appOwnerTenantId|String|The identifier of the tenant that owns the client application. <br/><br/> Supports `$filter` (`eq`).|
3738
|appliedEventListeners|[appliedAuthenticationEventListener](../resources/appliedauthenticationeventlistener.md) collection|Detailed information about the listeners, such as Azure Logic Apps and Azure Functions, which the corresponding events in the sign-in event triggered.|
3839
|appTokenProtectionStatus|tokenProtectionStatus|Token protection creates a cryptographically secure tie between the token and the device it's issued to. This field indicates whether the app token was bound to the device.|
3940
|authenticationAppDeviceDetails|[authenticationAppDeviceDetails](../resources/authenticationappdevicedetails.md)|Provides details about the app and device used during a Microsoft Entra authentication step.|
@@ -76,6 +77,7 @@ The [Microsoft Entra data retention policies](/azure/active-directory/reports-mo
7677
|processingTimeInMilliseconds|Int|The request processing time in milliseconds in AD STS.|
7778
|resourceDisplayName|String|The name of the resource that the user signed in to. <br/><br/> Supports `$filter` (`eq`).|
7879
|resourceId|String|The identifier of the resource that the user signed in to. <br/><br/> Supports `$filter` (`eq`).|
80+
|resourceOwnerTenantId|String|The identifier of the owner of the resource. <br/><br/> Supports `$filter` (`eq`).|
7981
|resourceServicePrincipalId|String|The identifier of the service principal representing the target resource in the sign-in event.|
8082
|resourceTenantId|String|The tenant identifier of the resource referenced in the sign in.|
8183
|riskDetail|riskDetail|The reason behind a specific state of a risky user, sign-in, or a risk event. The possible values are `none`, `adminGeneratedTemporaryPassword`, `userPerformedSecuredPasswordChange`, `userPerformedSecuredPasswordReset`, `adminConfirmedSigninSafe`, `aiConfirmedSigninSafe`, `userPassedMFADrivenByRiskBasedPolicy`, `adminDismissedAllRiskForUser`, `adminConfirmedSigninCompromised`, `hidden`, `adminConfirmedUserCompromised`, `unknownFutureValue`, `adminConfirmedServicePrincipalCompromised`, `adminDismissedAllRiskForServicePrincipal`, `m365DAdminDismissedDetection`, `userChangedPasswordOnPremises`, `adminDismissedRiskForSignIn`, `adminConfirmedAccountSafe`. Use the `Prefer: include-unknown-enum-members` request header to get the following value or values in this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `adminConfirmedServicePrincipalCompromised`, `adminDismissedAllRiskForServicePrincipal`, `m365DAdminDismissedDetection`, `userChangedPasswordOnPremises`, `adminDismissedRiskForSignIn`, `adminConfirmedAccountSafe`.The value `none` means that Microsoft Entra risk detection hasn't flagged the user or the sign-in as a risky event so far. <br/><br/> Supports `$filter` (`eq`).<br> **Note:** Details for this property are only available for Microsoft Entra ID P2 customers. All other customers are returned `hidden`.|

changelog/Microsoft.AAD.Reporting.json

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,32 @@
7070
"CreatedDateTime": "2024-11-13T17:39:15.5745429Z",
7171
"WorkloadArea": "Reports",
7272
"SubArea": "Identity and access reports"
73+
},
74+
{
75+
"ChangeList": [
76+
{
77+
"Id": "da78f1c6-0bfa-4e22-b2c4-b7bb1af5366d",
78+
"ApiChange": "Property",
79+
"ChangedApiName": "appOwnerTenantId",
80+
"ChangeType": "Addition",
81+
"Description": "Added the **appOwnerTenantId** property to the [signIn](https://learn.microsoft.com/en-us/graph/api/resources/signIn?view=graph-rest-beta) resource.",
82+
"Target": "signIn"
83+
},
84+
{
85+
"Id": "da78f1c6-0bfa-4e22-b2c4-b7bb1af5366d",
86+
"ApiChange": "Property",
87+
"ChangedApiName": "resourceOwnerTenantId",
88+
"ChangeType": "Addition",
89+
"Description": "Added the **resourceOwnerTenantId** property to the [signIn](https://learn.microsoft.com/en-us/graph/api/resources/signIn?view=graph-rest-beta) resource.",
90+
"Target": "signIn"
91+
}
92+
],
93+
"Id": "da78f1c6-0bfa-4e22-b2c4-b7bb1af5366d",
94+
"Cloud": "Prod",
95+
"Version": "beta",
96+
"CreatedDateTime": "2025-01-28T00:39:45.8184996Z",
97+
"WorkloadArea": "Reports",
98+
"SubArea": "Identity and access reports"
7399
},
74100
{
75101
"ChangeList": [

0 commit comments

Comments
 (0)