Skip to content

Commit 3da6ac9

Browse files
authored
Merge branch 'main' into tonchan-spedoc0125
2 parents 7d0d00b + 3ed7955 commit 3da6ac9

9 files changed

+65
-3
lines changed

api-reference/beta/api/authenticationflowspolicy-get.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2424
<!-- { "blockType": "permissions", "name": "authenticationflowspolicy_get" } -->
2525
[!INCLUDE [permissions-table](../includes/permissions/authenticationflowspolicy-get-permissions.md)]
2626

27+
[!INCLUDE [rbac-authentication-flow-policy-read](../includes/rbac-for-apis/rbac-authentication-flow-policy-read.md)]
28+
2729
## HTTP request
2830

2931
<!-- {

api-reference/beta/api/authenticationflowspolicy-update.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2424
<!-- { "blockType": "permissions", "name": "authenticationflowspolicy_update" } -->
2525
[!INCLUDE [permissions-table](../includes/permissions/authenticationflowspolicy-update-permissions.md)]
2626

27+
[!INCLUDE [rbac-authentication-flow-policy-update](../includes/rbac-for-apis/rbac-authentication-flow-policy-update.md)]
28+
2729
## HTTP request
2830

2931
<!-- {
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
author: msewaweru
3+
ms.topic: include
4+
---
5+
6+
> [!IMPORTANT]
7+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
8+
> - External ID User Flow Administrator
9+
> - External Identity Provider Administrator
10+
> - Application Administrator
11+
> - Security Administrator
12+
> - Security Reader
13+
> - Global Reader
14+
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
---
2+
author: msewaweru
3+
ms.topic: include
4+
---
5+
6+
> [!IMPORTANT]
7+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
8+
> - External ID User Flow Administrator

api-reference/v1.0/api/authenticationflowspolicy-get.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2323
<!-- { "blockType": "permissions", "name": "authenticationflowspolicy_get" } -->
2424
[!INCLUDE [permissions-table](../includes/permissions/authenticationflowspolicy-get-permissions.md)]
2525

26+
[!INCLUDE [rbac-authentication-flow-policy-read](../includes/rbac-for-apis/rbac-authentication-flow-policy-read.md)]
27+
2628
## HTTP request
2729

2830
<!-- {

api-reference/v1.0/api/authenticationflowspolicy-update.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2323
<!-- { "blockType": "permissions", "name": "authenticationflowspolicy_update" } -->
2424
[!INCLUDE [permissions-table](../includes/permissions/authenticationflowspolicy-update-permissions.md)]
2525

26+
[!INCLUDE [rbac-authentication-flow-policy-update](../includes/rbac-for-apis/rbac-authentication-flow-policy-update.md)]
27+
2628
## HTTP request
2729

2830
<!-- {
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
author: msewaweru
3+
ms.topic: include
4+
---
5+
6+
> [!IMPORTANT]
7+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
8+
> - External ID User Flow Administrator
9+
> - External Identity Provider Administrator
10+
> - Application Administrator
11+
> - Security Administrator
12+
> - Security Reader
13+
> - Global Reader
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
---
2+
author: msewaweru
3+
ms.topic: include
4+
---
5+
6+
> [!IMPORTANT]
7+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation.
8+
> - External ID User Flow Administrator

concepts/permissions-reference.md

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.localizationpriority: high
77
ms.topic: reference
88
ms.subservice: entra-applications
99
ms.custom: graphiamtop20, scenarios:getting-started
10-
ms.date: 01/13/2025
10+
ms.date: 01/20/2025
1111
#Customer intent: As a developer, I want to learn more about the permissions available in Microsoft Graph, so that I understand the impact of granting specific permissions to my app.
1212
---
1313

@@ -1391,7 +1391,7 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
13911391
| Identifier | - | c645bb69-adc4-4242-b620-02e635f03bf6 |
13921392
| DisplayText | - | Read all Configuration Monitoring entities |
13931393
| Description | - | Allows the app to read all Configuration Monitoring entities on behalf of the signed-in user. |
1394-
| AdminConsentRequired | - | No |
1394+
| AdminConsentRequired | - | Yes |
13951395

13961396
---
13971397

@@ -1402,7 +1402,7 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
14021402
| Identifier | - | 54505ce9-e719-41f7-a7cc-dbe114e1d811 |
14031403
| DisplayText | - | Read and write all Configuration Monitoring entities |
14041404
| Description | - | Allows the app to read and write all Configuration Monitoring entities on behalf of the signed-in user. |
1405-
| AdminConsentRequired | - | No |
1405+
| AdminConsentRequired | - | Yes |
14061406

14071407
---
14081408

@@ -6930,6 +6930,17 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
69306930

69316931
---
69326932

6933+
### TeamsResourceAccount.Read.All
6934+
6935+
| Category | Application | Delegated |
6936+
|--|--|--|
6937+
| Identifier | b55aa226-33a1-4396-bcf4-edce5e7a31c1 | ea2cbd09-253c-4f69-a0e6-07383c5f07cc |
6938+
| DisplayText | Read Teams resource accounts | Read Teams resource accounts |
6939+
| Description | Allows the app to read your tenant's resource accounts without a signed-in user. | Allows the app to read your tenant's resource accounts on behalf of the signed-in admin user. |
6940+
| AdminConsentRequired | Yes | Yes |
6941+
6942+
---
6943+
69336944
### TeamsTab.Create
69346945

69356946
| Category | Application | Delegated |

0 commit comments

Comments
 (0)