Skip to content

Commit 35b6d4a

Browse files
authored
Merge pull request #26424 from microsoftgraph/main
Merge main into live
2 parents 07295ec + 42dc92c commit 35b6d4a

10 files changed

+207
-197
lines changed

api-reference/beta/api/entitlementmanagement-post-accesspackageresourcerequests.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -36,15 +36,14 @@ Choose the permission or permissions marked as least privileged for this API. Us
3636
>
3737
> Additionally you must also have the following permissions on the resource being added:
3838
> - To add a Microsoft Entra group as a resource to a catalog:
39-
> - If using delegated permissions, the user requesting to add a group should be an owner of the group or in a directory role that allows them to modify groups.
40-
> - If using application permissions, the application requesting to add the group should also be assigned the `Group.ReadWrite.All` permission.
41-
> - To add a Microsoft Entra application as a resource to a catalog:
42-
> - If using delegated permissions, the user requesting to add an application should be an owner of the application or in a directory role that allows them to modify application role assignments.
43-
> - If using application permissions, the application requesting to add the [servicePrincipal](../resources/serviceprincipal.md) should also be assigned the *Application.ReadWrite.All* permission.
44-
> - To add a SharePoint Online site as a resource to a catalog:
45-
> - If using delegated permissions, the user who wants to add the site should be in a role that allows them to modify the SharePoint site roles, such as the *SharePoint Administrator* role.
46-
> - If using application permissions, the application should also be assigned the `Sites.FullControl.All` permission.
47-
> For more information, see [Delegation and roles in entitlement management](/entra/id-governance/entitlement-management-delegate) and [how to delegate access governance to access package managers in entitlement management](/entra/id-governance/entitlement-management-delegate-managers).
39+
> - If using delegated permissions, the user requesting to add a group should be an owner of the group or in a directory role that allows them to modify groups.
40+
> - If using application permissions, the application requesting to add the group should also be assigned the `Group.ReadWrite.All` permission.
41+
> - To add a Microsoft Entra application as a resource to a catalog:
42+
> - If using delegated permissions, the user requesting to add an application should be an owner of the application or in a directory role that allows them to modify application role assignments.
43+
> - If using application permissions, the application requesting to add the [servicePrincipal](../resources/serviceprincipal.md) should also be assigned the *Application.ReadWrite.All* permission.
44+
> - To add a SharePoint Online site as a resource to a catalog:
45+
> - If using delegated permissions, the user who wants to add the site should be in a role that allows them to modify the SharePoint site roles, such as the *SharePoint Administrator* role.
46+
> - If using application permissions, the application should also be assigned the `Sites.FullControl.All` permission.
4847
4948
## HTTP request
5049

api-reference/beta/api/onlinemeeting-getalltranscripts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ The following known issues are associated with this API:
3737

3838
Choose the permission or permissions marked as least privileged for this API. Use a higher privileged permission or permissions [only if your app requires it](/graph/permissions-overview#best-practices-for-using-microsoft-graph-permissions). For details about delegated and application permissions, see [Permission types](/graph/permissions-overview#permission-types). To learn more about these permissions, see the [permissions reference](/graph/permissions-reference).
3939

40-
<!-- { "blockType": "permissions", "name": "onlinemeeting_getalltranscripts" } -->
40+
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
4141
[!INCLUDE [permissions-table](../includes/permissions/onlinemeeting-getalltranscripts-permissions.md)]
4242

4343
## HTTP request

api-reference/beta/includes/permissions/onlinemeeting-getalltranscripts-permissions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66

77
|Permission type|Least privileged permissions|Higher privileged permissions|
88
|:---|:---|:---|
9-
|Delegated (work or school account)|OnlineMeetings.Read|OnlineMeetings.ReadWrite|
9+
|Delegated (work or school account)|Not supported.|Not supported.|
1010
|Delegated (personal Microsoft account)|Not supported.|Not supported.|
11-
|Application|OnlineMeetings.Read.All|OnlineMeetings.ReadWrite.All|
11+
|Application|OnlineMeetings.Read.All|Not available.|
1212

api-reference/v1.0/api/entitlementmanagement-post-resourcerequests.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -39,14 +39,14 @@ Choose the permission or permissions marked as least privileged for this API. Us
3939
>
4040
> Additionally you must also have the following permissions on the resource being added:
4141
> - To add a Microsoft Entra group as a resource to a catalog:
42-
> - If using delegated permissions, the user requesting to add a group should be an owner of the group or in a directory role that allows them to modify groups.
43-
> - If using application permissions, the application requesting to add the group should also be assigned the `Group.ReadWrite.All` permission.
44-
> - To add a Microsoft Entra application as a resource to a catalog:
45-
> - If using delegated permissions, the user requesting to add an application should be an owner of the application or in a directory role that allows them to modify application role assignments.
46-
> - If using application permissions, the application requesting to add the [servicePrincipal](../resources/serviceprincipal.md) should also be assigned the *Application.ReadWrite.All* permission.
47-
> - To add a SharePoint Online site as a resource to a catalog:
48-
> - If using delegated permissions, the user who wants to add the site should be in a role that allows them to modify the SharePoint site roles, such as the *SharePoint Administrator* role.
49-
> - If using application permissions, the application should also be assigned the `Sites.FullControl.All` permission.
42+
> - If using delegated permissions, the user requesting to add a group should be an owner of the group or in a directory role that allows them to modify groups.
43+
> - If using application permissions, the application requesting to add the group should also be assigned the `Group.ReadWrite.All` permission.
44+
> - To add a Microsoft Entra application as a resource to a catalog:
45+
> - If using delegated permissions, the user requesting to add an application should be an owner of the application or in a directory role that allows them to modify application role assignments.
46+
> - If using application permissions, the application requesting to add the [servicePrincipal](../resources/serviceprincipal.md) should also be assigned the *Application.ReadWrite.All* permission.
47+
> - To add a SharePoint Online site as a resource to a catalog:
48+
> - If using delegated permissions, the user who wants to add the site should be in a role that allows them to modify the SharePoint site roles, such as the *SharePoint Administrator* role.
49+
> - If using application permissions, the application should also be assigned the `Sites.FullControl.All` permission.
5050
> For more information, see [Delegation and roles in entitlement management](/entra/id-governance/entitlement-management-delegate) and [how to delegate access governance to access package managers in entitlement management](/entra/id-governance/entitlement-management-delegate-managers).
5151
5252

api-reference/v1.0/api/onlinemeeting-getalltranscripts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ To learn more about using the Microsoft Teams export APIs to export content, see
2929

3030
Choose the permission or permissions marked as least privileged for this API. Use a higher privileged permission or permissions [only if your app requires it](/graph/permissions-overview#best-practices-for-using-microsoft-graph-permissions). For details about delegated and application permissions, see [Permission types](/graph/permissions-overview#permission-types). To learn more about these permissions, see the [permissions reference](/graph/permissions-reference).
3131

32-
<!-- { "blockType": "permissions", "name": "onlinemeeting_getalltranscripts" } -->
32+
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
3333
[!INCLUDE [permissions-table](../includes/permissions/onlinemeeting-getalltranscripts-permissions.md)]
3434

3535
## HTTP request

api-reference/v1.0/includes/permissions/onlinemeeting-getalltranscripts-permissions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66

77
|Permission type|Least privileged permissions|Higher privileged permissions|
88
|:---|:---|:---|
9-
|Delegated (work or school account)|OnlineMeetings.Read|OnlineMeetings.ReadWrite|
9+
|Delegated (work or school account)|Not supported.|Not supported.|
1010
|Delegated (personal Microsoft account)|Not supported.|Not supported.|
11-
|Application|OnlineMeetings.Read.All|OnlineMeetings.ReadWrite.All|
11+
|Application|OnlineMeetings.Read.All|Not available.|
1212

concepts/permissions-reference.md

Lines changed: 21 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.localizationpriority: high
77
ms.topic: reference
88
ms.subservice: entra-applications
99
ms.custom: graphiamtop20, scenarios:getting-started
10-
ms.date: 03/17/2025
10+
ms.date: 03/24/2025
1111
#Customer intent: As a developer, I want to learn more about the permissions available in Microsoft Graph, so that I understand the impact of granting specific permissions to my app.
1212
---
1313

@@ -1432,21 +1432,21 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
14321432

14331433
| Category | Application | Delegated |
14341434
|--|--|--|
1435-
| Identifier | - | c645bb69-adc4-4242-b620-02e635f03bf6 |
1436-
| DisplayText | - | Read all Configuration Monitoring entities |
1437-
| Description | - | Allows the app to read all Configuration Monitoring entities on behalf of the signed-in user. |
1438-
| AdminConsentRequired | - | Yes |
1435+
| Identifier | aca929ec-9830-44dc-bda1-85cf938aaa95 | c645bb69-adc4-4242-b620-02e635f03bf6 |
1436+
| DisplayText | Read all Configuration Monitoring entities | Read all Configuration Monitoring entities |
1437+
| Description | Allows the app to read all Configuration Monitoring entities, without a signed-in user. | Allows the app to read all Configuration Monitoring entities on behalf of the signed-in user. |
1438+
| AdminConsentRequired | Yes | Yes |
14391439

14401440
---
14411441

14421442
### ConfigurationMonitoring.ReadWrite.All
14431443

14441444
| Category | Application | Delegated |
14451445
|--|--|--|
1446-
| Identifier | - | 54505ce9-e719-41f7-a7cc-dbe114e1d811 |
1447-
| DisplayText | - | Read and write all Configuration Monitoring entities |
1448-
| Description | - | Allows the app to read and write all Configuration Monitoring entities on behalf of the signed-in user. |
1449-
| AdminConsentRequired | - | Yes |
1446+
| Identifier | cfa85bfb-2ee8-4e13-8e7f-489e57a015a1 | 54505ce9-e719-41f7-a7cc-dbe114e1d811 |
1447+
| DisplayText | Read and write all Configuration Monitoring entities | Read and write all Configuration Monitoring entities |
1448+
| Description | Allows the app to read and write all Configuration Monitoring entities, without a signed-in user. | Allows the app to read and write all Configuration Monitoring entities on behalf of the signed-in user. |
1449+
| AdminConsentRequired | Yes | Yes |
14501450

14511451
---
14521452

@@ -7907,6 +7907,17 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
79077907

79087908
---
79097909

7910+
### User.ReadWrite.CrossCloud
7911+
7912+
| Category | Application | Delegated |
7913+
|--|--|--|
7914+
| Identifier | 5652f862-b626-407b-a3e6-248aeb95763c | - |
7915+
| DisplayText | Read and write profiles of users that originate from an external cloud. | - |
7916+
| Description | Allows the app to read and update external cloud user profiles without a signed in user. | - |
7917+
| AdminConsentRequired | Yes | - |
7918+
7919+
---
7920+
79107921
### User.RevokeSessions.All
79117922

79127923
| Category | Application | Delegated |
@@ -8214,6 +8225,7 @@ Learn more about [RSC authorization framework and RSC permissions](/microsofttea
82148225
| ChannelMeetingRecording.Read.Group | 30a40618-9b50-4764-b62e-b04023a8f5f3 | Read the recordings of all channel meetings associated with this team | Allows the app to read recordings of all the channel meetings associated with this team, without a signed-in user. |
82158226
| ChannelMeetingTranscript.Read.Group | 37e59e88-1a46-482b-b623-0a4aa6abdf67 | Read the transcripts of all channel meetings associated with this team | Allows the app to read transcripts of all the channel meetings associated with this team, without a signed-in user. |
82168227
| ChannelMember.Read.Group | 7e3614f5-3467-419c-9c63-dd0bbd2a88f9 | Read the members of channels of a team | Read the members of channels of a team, without a signed-in user |
8228+
| ChannelMember.ReadWrite.Group | 1342a0fc-cd33-4c75-ad65-d5defcfc7232 | Read and write the members of channels of a team | Read and write the members of channels of a team, without a signed-in user |
82178229
| ChannelMessage.Read.Group | 19103a54-c397-4bcd-be5a-ef111e0406fa | Read this team's channel messages | Allows the app to read this team's channel's messages, without a signed-in user. |
82188230
| ChannelMessage.Send.Group | 3e38d437-815b-4368-9f19-e39dea9a6c7f | Send messages to this team's channels | Allows the app to send messages to this team's channels, without a signed-in user. |
82198231
| ChannelSettings.Read.Group | 0a7b3084-8d18-46f5-8aef-b5b829292c6f | Read the names, descriptions, and settings of this team's channels | Allows the app to read this team's channel names, channel descriptions, and channel settings, without a signed-in user. |

0 commit comments

Comments
 (0)