Skip to content

Commit 0de7154

Browse files
authored
Merge pull request #25617 from microsoftgraph/main
Merge to publish.
2 parents 0883f2c + 2643ea3 commit 0de7154

File tree

61 files changed

+421
-250
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

61 files changed

+421
-250
lines changed

api-reference/beta/api/adminconsentrequestpolicy-get.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,10 +22,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2222
<!-- { "blockType": "permissions", "name": "adminconsentrequestpolicy_get" } -->
2323
[!INCLUDE [permissions-table](../includes/permissions/adminconsentrequestpolicy-get-permissions.md)]
2424

25-
When calling on behalf of a user, the user needs to belong to at least one of the following [Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json):
26-
+ Global Reader
27-
+ Cloud Application Administrator
28-
+ Application Administrator
25+
[!INCLUDE [rbac-adminconsentrequestpolicy-apis-read](../includes/rbac-for-apis/rbac-adminconsentrequestpolicy-apis-read.md)]
2926

3027
## HTTP request
3128

api-reference/beta/api/adminconsentrequestpolicy-update.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2020
<!-- { "blockType": "permissions", "name": "adminconsentrequestpolicy_update" } -->
2121
[!INCLUDE [permissions-table](../includes/permissions/adminconsentrequestpolicy-update-permissions.md)]
2222

23-
For delegated scenarios, the calling user needs to belong to at least the *Application Administrator* or *Cloud Application Administrator* [Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json).
23+
[!INCLUDE [rbac-adminconsentrequestpolicy-apis-update](../includes/rbac-for-apis/rbac-adminconsentrequestpolicy-apis-update.md)]
2424

2525
## HTTP request
2626

api-reference/beta/api/directorysetting-delete.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -21,16 +21,14 @@ Delete a directory setting.
2121
## Permissions
2222
The following tables show the least privileged permission or permissions required to call this API on each supported resource type. Follow [best practices](/graph/permissions-overview#best-practices-for-using-microsoft-graph-permissions) to request least privileged permissions. For details about delegated and application permissions, see [Permission types](/graph/permissions-overview#permission-types). To learn more about these permissions, see the [permissions reference](/graph/permissions-reference).
2323

24-
### For all settings except the Consent Policy Settings object
24+
### For tenant-wide settings
2525

26-
<!-- { "blockType": "permissions", "name": "directorysetting_delete" } -->
26+
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
2727
[!INCLUDE [permissions-table](../includes/permissions/directorysetting-delete-permissions.md)]
2828

29-
### For the Consent Policy Settings object
29+
### For group-specific settings
3030

31-
The following permissions are required to update the "Consent Policy Settings" **directorySetting** object.
32-
33-
<!-- { "blockType": "permissions", "name": "directorysetting_delete_2" } -->
31+
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
3432
[!INCLUDE [permissions-table](../includes/permissions/directorysetting-delete-2-permissions.md)]
3533

3634
[!INCLUDE [rbac-group-directorysettings-all](../includes/rbac-for-apis/rbac-group-directorysettings-all.md)]

api-reference/beta/api/directorysetting-get.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,12 +24,12 @@ The following tables show the least privileged permission or permissions require
2424

2525
### List tenant-wide settings
2626

27-
<!-- { "blockType": "permissions", "name": "directorysetting_get" } -->
27+
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
2828
[!INCLUDE [permissions-table](../includes/permissions/directorysetting-get-permissions.md)]
2929

3030
### List group-specific settings
3131

32-
<!-- { "blockType": "permissions", "name": "directorysetting_get_2" } -->
32+
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
3333
[!INCLUDE [permissions-table](../includes/permissions/directorysetting-get-2-permissions.md)]
3434

3535
[!INCLUDE [rbac-group-directorysettings-all](../includes/rbac-for-apis/rbac-group-directorysettings-all.md)]

api-reference/beta/api/directorysetting-update.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,16 +22,16 @@ Update the properties of a specific directory setting object.
2222
## Permissions
2323
The following tables show the least privileged permission or permissions required to call this API on each supported resource type. Follow [best practices](/graph/permissions-overview#best-practices-for-using-microsoft-graph-permissions) to request least privileged permissions. For details about delegated and application permissions, see [Permission types](/graph/permissions-overview#permission-types). To learn more about these permissions, see the [permissions reference](/graph/permissions-reference).
2424

25-
### For all settings except the Consent Policy Settings object
25+
### For all settings *except* the Consent Policy Settings object
2626

27-
<!-- { "blockType": "permissions", "name": "directorysetting_update" } -->
27+
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
2828
[!INCLUDE [permissions-table](../includes/permissions/directorysetting-update-permissions.md)]
2929

3030
### For the Consent Policy Settings object
3131

3232
The following permissions are required to update the "Consent Policy Settings" **directorySetting** object.
3333

34-
<!-- { "blockType": "permissions", "name": "directorysetting_update_2" } -->
34+
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
3535
[!INCLUDE [permissions-table](../includes/permissions/directorysetting-update-2-permissions.md)]
3636

3737
[!INCLUDE [rbac-group-directorysettings-all](../includes/rbac-for-apis/rbac-group-directorysettings-all.md)]

api-reference/beta/api/group-list-settings.md

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -23,19 +23,13 @@ One of the following permissions is required to call this API. To learn more, in
2323

2424
### List tenant-wide settings
2525
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
26-
|Permission type | Permissions (from least to most privileged) |
27-
|:--------------------|:---------------------------------------------------------|
28-
|Delegated (work or school account) | Directory.Read.All, Directory.ReadWrite.All |
29-
|Delegated (personal Microsoft account) | Not supported. |
30-
|Application | Directory.Read.All, Directory.ReadWrite.All |
26+
27+
[!INCLUDE [permissions-table](../includes/permissions/group-list-settings-permissions.md)]
3128

3229
### List group-specific settings
3330
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
34-
|Permission type | Permissions (from least to most privileged) |
35-
|:--------------------|:---------------------------------------------------------|
36-
|Delegated (work or school account) | Group.Read.All, Group.ReadWrite.All |
37-
|Delegated (personal Microsoft account) | Not supported. |
38-
|Application | Group.Read.All, Group.ReadWrite.All |
31+
32+
[!INCLUDE [permissions-table](../includes/permissions/group-list-settings-2-permissions.md)]
3933

4034
[!INCLUDE [rbac-group-directorysettings-all](../includes/rbac-for-apis/rbac-group-directorysettings-all.md)]
4135

api-reference/beta/api/restorepoint-search.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,7 @@ If successful, this action returns a `200 OK` response code and a [restorePointS
6868
> [!NOTE]
6969
> - Calls return a maximum of five restore points.
7070
> - You can include a maximum of 20 protection units in a single request, and the response isn't paginated.
71+
> - When you provide an expression for the **artifactQuery** property, you must provide only one protection unit ID in the **protectionUnitIds** property.
7172
7273
For a list of possible error responses, see [Backup Storage API error responses](/graph/backup-storage-error-codes).
7374

api-reference/beta/api/signin-confirmcompromised.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Namespace: microsoft.graph
1212

1313
[!INCLUDE [beta-disclaimer](../../includes/beta-disclaimer.md)]
1414

15-
Allow admins to mark an event in the Microsoft Entra sign-in logs as risky. Events marked as risky by an admin are immediately flagged as high risk in Microsoft Entra ID Protection, overriding previous risk states. Admins can confirm that events flagged as risky by Microsoft Entra ID Protection are in fact risky.
15+
Allow admins to mark an event in the Microsoft Entra [sign-in](../resources/signin.md) logs as risky. Events marked as risky by an admin are immediately flagged as high risk in Microsoft Entra ID Protection, overriding previous risk states. Admins can confirm that events flagged as risky by Microsoft Entra ID Protection are in fact risky.
1616

1717
For details about investigating Identity Protection risks, see [How to investigate risk](/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk).
1818

@@ -24,6 +24,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2424
<!-- { "blockType": "permissions", "name": "signin_confirmcompromised" } -->
2525
[!INCLUDE [permissions-table](../includes/permissions/signin-confirmcompromised-permissions.md)]
2626

27+
[!INCLUDE [rbac-signin-apis-write](../includes/rbac-for-apis/rbac-signin-apis-write.md)]
28+
2729
## HTTP request
2830

2931
<!-- {

api-reference/beta/api/signin-confirmsafe.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Namespace: microsoft.graph
1212

1313
[!INCLUDE [beta-disclaimer](../../includes/beta-disclaimer.md)]
1414

15-
Allow admins to mark an event in Microsoft Entra sign-in logs as safe. Admins can either mark the events flagged as risky by Microsoft Entra ID Protection as safe, or they can mark unflagged events as safe. For details about investigating Identity Protection risks, see [How to investigate risk](/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk).
15+
Allow admins to mark an event in Microsoft Entra [sign-in](../resources/signin.md) logs as safe. Admins can either mark the events flagged as risky by Microsoft Entra ID Protection as safe, or they can mark unflagged events as safe. For details about investigating Identity Protection risks, see [How to investigate risk](/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk).
1616

1717
[!INCLUDE [national-cloud-support](../../includes/global-us.md)]
1818

@@ -22,6 +22,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2222
<!-- { "blockType": "permissions", "name": "signin_confirmsafe" } -->
2323
[!INCLUDE [permissions-table](../includes/permissions/signin-confirmsafe-permissions.md)]
2424

25+
[!INCLUDE [rbac-signin-apis-write](../includes/rbac-for-apis/rbac-signin-apis-write.md)]
26+
2527
## HTTP request
2628

2729
<!-- {

api-reference/beta/api/signin-get.md

Lines changed: 2 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Namespace: microsoft.graph
1313

1414
[!INCLUDE [beta-disclaimer](../../includes/beta-disclaimer.md)]
1515

16-
Get a [signIn](../resources/signin.md) object that contains a specific user sign-in event for your tenant that includes sign-ins where a user is asked to enter a username or password, and session tokens.
16+
Retrieve a specific Microsoft Entra user [sign-in](../resources/signin.md) event for your tenant. Sign-ins that are interactive in nature (where a username/password is passed as part of auth token) and successful federated sign-ins are currently included in the sign-in logs.
1717

1818
[!INCLUDE [GDPR-related-guidance](../../includes/gdpr-msgraph-export-note.md)]
1919

@@ -26,15 +26,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2626
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
2727
[!INCLUDE [permissions-table](../includes/permissions/signin-get-permissions.md)]
2828

29-
Apps must be [properly registered](/azure/active-directory/active-directory-reporting-api-prerequisites-azure-portal) to Microsoft Entra ID.
30-
31-
In addition to the delegated permissions, the signed-in user needs to belong to at least one of the following [Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) that allow them to read sign-in reports.
32-
33-
+ Global Reader
34-
+ Reports Reader
35-
+ Security Administrator
36-
+ Security Operator
37-
+ Security Reader
29+
[!INCLUDE [rbac-signin-apis-read](../includes/rbac-for-apis/rbac-signin-apis-read.md)]
3830

3931
[!INCLUDE [signins-roles-for-ca-data](../../includes/signins-roles-for-ca-data.md)]
4032

0 commit comments

Comments
 (0)