Skip to content

Commit 1fc3166

Browse files
authored
Merge pull request #25749 from microsoftgraph/main
Merge to publish.
2 parents 9211cc7 + 54ef2f2 commit 1fc3166

File tree

70 files changed

+2890
-74
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

70 files changed

+2890
-74
lines changed

api-reference/beta/api/accesspackage-list-accesspackageresourcerolescopes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "List accessPackageResourceRoleScopes"
3-
description: "Retrieve a list of accesspackageresourcerolescope objects."
3+
description: "Retrieve an access package with a list of accessPackageResourceRoleScope objects."
44
ms.localizationpriority: medium
55
author: "markwahl-msft"
66
ms.subservice: "entra-id-governance"

api-reference/beta/api/accesspackagecatalog-list-accesspackageresourceroles.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "List accessPackageResourceRoles"
3-
description: "Retrieve a list of accessPackageResourceRole objects."
3+
description: "Retrieve a list of accessPackageResourceRole objects of an accessPackageResource in an accessPackageCatalog."
44
ms.localizationpriority: medium
55
author: "markwahl-msft"
66
ms.subservice: "entra-id-governance"
@@ -132,9 +132,9 @@ Content-type: application/json
132132
}
133133
```
134134

135-
### Example 2: Retrieve the roles of a resource for a SharePoint Online site
135+
### Example 2: Retrieve the roles of a resource for a SharePoint site
136136

137-
This is an example of retrieving the roles of a resource, to obtain the **originId** of each role. This would be used after a SharePoint Online site has been added as a resource to the catalog, as the **originId** of a SharePoint site role, the sequence number of the role in the site, is needed to add the role to an access package.
137+
The following example shows how to retrieve the roles of a resource, to obtain the **originId** of each role. This would be used after a SharePoint site has been added as a resource to the catalog, as the **originId** of a SharePoint site role, the sequence number of the role in the site, is needed to add the role to an access package.
138138

139139
#### Request
140140

@@ -188,7 +188,7 @@ GET https://graph.microsoft.com/beta/identityGovernance/entitlementManagement/ac
188188

189189
#### Response
190190

191-
The following example shows the response. The **displayName** is the same as shown in the SharePoint Online view of a site, and the **originId** is the underlying identifier established by SharePoint Online for the role.
191+
The following example shows the response. The **displayName** is the same as shown in the SharePoint view of a site, and the **originId** is the underlying identifier established by SharePoint for the role.
192192

193193
> **Note:** The response object shown here might be shortened for readability.
194194

api-reference/beta/api/accesspackagecatalog-list-accesspackageresources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "List accessPackageResources"
3-
description: "Retrieve a list of accesspackageresource objects."
3+
description: "Retrieve a list of accessPackageResource objects in an accessPackageCatalog."
44
ms.localizationpriority: medium
55
author: "markwahl-msft"
66
ms.subservice: "entra-id-governance"

api-reference/beta/api/authorizationpolicy-get.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2525
<!-- { "blockType": "permissions", "name": "authorizationpolicy_get" } -->
2626
[!INCLUDE [permissions-table](../includes/permissions/authorizationpolicy-get-permissions.md)]
2727

28+
[!INCLUDE [rbac-authorization-policy-apis-read](../includes/rbac-for-apis/rbac-authorization-policy-apis-read.md)]
29+
2830
## HTTP request
2931

3032
<!-- { "blockType": "ignored" } -->

api-reference/beta/api/authorizationpolicy-update.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2525
<!-- { "blockType": "permissions", "name": "authorizationpolicy_update" } -->
2626
[!INCLUDE [permissions-table](../includes/permissions/authorizationpolicy-update-permissions.md)]
2727

28-
For delegated scenarios, the user needs to have the *Privileged Role Administrator* [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json).
28+
[!INCLUDE [rbac-authorization-policy-apis-update](../includes/rbac-for-apis/rbac-authorization-policy-apis-update.md)]
2929

3030
## HTTP request
3131

api-reference/beta/api/deviceregistrationpolicy-get.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,12 +22,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2222
<!-- { "blockType": "permissions", "name": "deviceregistrationpolicy_get" } -->
2323
[!INCLUDE [permissions-table](../includes/permissions/deviceregistrationpolicy-get-permissions.md)]
2424

25-
When calling on behalf of a user, the user needs to belong to the following [Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json):
26-
+ Global Reader
27-
+ Cloud Device Administrator
28-
+ Intune Administrator
29-
+ Windows 365 Administrator
30-
+ Directory Reviewer
25+
[!INCLUDE [rbac-device-registration-policy-apis-read](../includes/rbac-for-apis/rbac-device-registration-policy-apis-read.md)]
3126

3227
## HTTP request
3328

api-reference/beta/api/deviceregistrationpolicy-update.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2121
<!-- { "blockType": "permissions", "name": "deviceregistrationpolicy_update" } -->
2222
[!INCLUDE [permissions-table](../includes/permissions/deviceregistrationpolicy-update-permissions.md)]
2323

24-
When calling on behalf of a user, the user needs the *Cloud Device Administrator* [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json).
24+
[!INCLUDE [rbac-device-registration-policy-apis-update](../includes/rbac-for-apis/rbac-device-registration-policy-apis-update.md)]
2525

2626
## HTTP request
2727

api-reference/beta/api/entitlementmanagement-list-accesspackageassignmentpolicies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "List accessPackageAssignmentPolicies"
3-
description: "Retrieve a list of accessPackageAssignmentPolicy objects."
3+
description: "Retrieve a list of accessPackageAssignmentPolicy objects in Microsoft Entra entitlement management."
44
ms.localizationpriority: medium
55
author: "markwahl-msft"
66
ms.subservice: "entra-id-governance"
@@ -13,7 +13,7 @@ Namespace: microsoft.graph
1313

1414
[!INCLUDE [beta-disclaimer](../../includes/beta-disclaimer.md)]
1515

16-
In [Microsoft Entra entitlement management](../resources/entitlementmanagement-overview.md), retrieve a list of [accessPackageAssignmentPolicy](../resources/accesspackageassignmentpolicy.md) objects. If the delegated user is in a directory role, the resulting list includes all the assignment policies that the caller has access to read, across all catalogs and access packages. If the delegated user is an access package manager or catalog owner, they should instead retrieve the policies for the access packages they can read with [list accessPackages](entitlementmanagement-list-accesspackages.md) by including `$expand=accessPackageAssignmentPolicies` in the query.
16+
Retrieve a list of [accessPackageAssignmentPolicy](../resources/accesspackageassignmentpolicy.md) objects in [Microsoft Entra entitlement management](../resources/entitlementmanagement-overview.md). If the delegated user is in a directory role, the resulting list includes all the assignment policies that the caller has access to read, across all catalogs and access packages. If the delegated user is an access package manager or catalog owner, they should instead retrieve the policies for the access packages they can read with [list accessPackages](entitlementmanagement-list-accesspackages.md) by including `$expand=accessPackageAssignmentPolicies` in the query.
1717

1818
[!INCLUDE [national-cloud-support](../../includes/global-us.md)]
1919

api-reference/beta/api/entitlementmanagement-list-accesspackageassignments.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "List accessPackageAssignments"
3-
description: "Retrieve a list of accesspackageassignment objects."
3+
description: "Retrieve a list of accessPackageAssignment objects in Microsoft Entra entitlement management."
44
ms.localizationpriority: medium
55
author: "markwahl-msft"
66
ms.subservice: "entra-id-governance"
@@ -13,7 +13,7 @@ Namespace: microsoft.graph
1313

1414
[!INCLUDE [beta-disclaimer](../../includes/beta-disclaimer.md)]
1515

16-
In [Microsoft Entra entitlement management](../resources/entitlementmanagement-overview.md), retrieve a list of [accessPackageAssignment](../resources/accesspackageassignment.md) objects. For directory-wide administrators, the resulting list includes all the assignments, current and well as expired, that the caller has access to read, across all catalogs and access packages. If the caller is on behalf of a delegated user who is assigned only to catalog-specific delegated administrative roles, the request must supply a filter to indicate a specific access package, such as: `$filter=accessPackage/id eq 'a914b616-e04e-476b-aa37-91038f0b165b'`.
16+
Retrieve a list of [accessPackageAssignment](../resources/accesspackageassignment.md) objects in [Microsoft Entra entitlement management](../resources/entitlementmanagement-overview.md). For directory-wide administrators, the resulting list includes all the assignments, current and well as expired, that the caller has access to read, across all catalogs and access packages. If the caller is on behalf of a delegated user who is assigned only to catalog-specific delegated administrative roles, the request must supply a filter to indicate a specific access package, such as: `$filter=accessPackage/id eq 'a914b616-e04e-476b-aa37-91038f0b165b'`.
1717

1818

1919
[!INCLUDE [national-cloud-support](../../includes/global-us.md)]

api-reference/beta/api/entitlementmanagement-post-accesspackageassignmentpolicies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "Create accessPackageAssignmentPolicy"
3-
description: "Use this API to create a new accessPackageAssignmentPolicy."
3+
description: "Create a new accessPackageAssignmentPolicy object in Microsoft Entra entitlement management."
44
ms.localizationpriority: medium
55
author: "markwahl-msft"
66
ms.subservice: "entra-id-governance"
@@ -13,7 +13,7 @@ Namespace: microsoft.graph
1313

1414
[!INCLUDE [beta-disclaimer](../../includes/beta-disclaimer.md)]
1515

16-
In [Microsoft Entra entitlement management](../resources/entitlementmanagement-overview.md), create a new [accessPackageAssignmentPolicy](../resources/accesspackageassignmentpolicy.md) object.
16+
Create a new [accessPackageAssignmentPolicy](../resources/accesspackageassignmentpolicy.md) object in [Microsoft Entra entitlement management](../resources/entitlementmanagement-overview.md).
1717

1818
[!INCLUDE [national-cloud-support](../../includes/global-us.md)]
1919

0 commit comments

Comments
 (0)