Skip to content

Commit 5f8e88e

Browse files
committed
Resolved conflicts
2 parents 6282f71 + 6aca8e3 commit 5f8e88e

File tree

1,515 files changed

+19978
-6435
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,515 files changed

+19978
-6435
lines changed

api-reference/beta/api/administrativeunit-delta.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Namespace: microsoft.graph
1313

1414
[!INCLUDE [beta-disclaimer](../../includes/beta-disclaimer.md)]
1515

16-
Get newly created, updated, or deleted **administrativeUnits** without having to perform a full read of the entire resource collection. For details, see [Using delta query](/graph/delta-query-overview).
16+
Get newly created, updated, or deleted **administrativeUnits** without having to perform a full read of the entire resource collection. For more information, see [Use delta query to track changes in Microsoft Graph data](/graph/delta-query-overview) for details.
1717

1818
[!INCLUDE [national-cloud-support](../../includes/all-clouds.md)]
1919

@@ -25,6 +25,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2525
<!-- { "blockType": "permissions", "name": "administrativeunit_delta" } -->
2626
[!INCLUDE [permissions-table](../includes/permissions/administrativeunit-delta-permissions.md)]
2727

28+
[!INCLUDE [rbac-admin-units-apis-read](../includes/rbac-for-apis/rbac-admin-units-apis-read.md)]
29+
2830
## HTTP request
2931

3032
To begin tracking changes, you make a request that includes the delta function on the **administrativeUnit** resource.
@@ -44,7 +46,7 @@ You only need to specify any query parameters once up front.
4446
In subsequent requests, copy and apply the `@odata.nextLink` or `@odata.deltaLink` URL from the previous response. That URL already
4547
includes the encoded parameters.
4648

47-
| Query parameter | Type |Description|
49+
| Query parameter | Type |Description|
4850
|:---------------|:--------|:----------|
4951
| $deltatoken | string | A [state token](/graph/delta-query-overview) returned in the `@odata.deltaLink` URL of the previous **delta** function call for the same resource collection, indicating the completion of that round of change tracking. Save and apply the entire `@odata.deltaLink` URL including this token in the first request of the next round of change tracking for that collection.|
5052
| $skiptoken | string | A [state token](/graph/delta-query-overview) returned in the `@odata.nextLink` URL of the previous **delta** function call, indicating there are further changes to be tracked in the same resource collection. |

api-reference/beta/api/administrativeunit-get-members.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2424
<!-- { "blockType": "permissions", "name": "administrativeunit_get_members" } -->
2525
[!INCLUDE [permissions-table](../includes/permissions/administrativeunit-get-members-permissions.md)]
2626

27+
[!INCLUDE [rbac-admin-units-apis-read](../includes/rbac-for-apis/rbac-admin-units-apis-read.md)]
28+
2729
## HTTP request
2830

2931
```http

api-reference/beta/api/administrativeunit-get-scopedrolemembers.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2424
<!-- { "blockType": "permissions", "name": "administrativeunit_get_scopedrolemembers" } -->
2525
[!INCLUDE [permissions-table](../includes/permissions/administrativeunit-get-scopedrolemembers-permissions.md)]
2626

27+
[!INCLUDE [rbac-admin-units-apis-read](../includes/rbac-for-apis/rbac-admin-units-apis-read.md)]
28+
2729
## HTTP request
2830
<!-- { "blockType": "ignored" } -->
2931
```http

api-reference/beta/api/administrativeunit-list-scopedrolemembers.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2424
<!-- { "blockType": "permissions", "name": "administrativeunit_list_scopedrolemembers" } -->
2525
[!INCLUDE [permissions-table](../includes/permissions/administrativeunit-list-scopedrolemembers-permissions.md)]
2626

27+
[!INCLUDE [rbac-admin-units-apis-read](../includes/rbac-for-apis/rbac-admin-units-apis-read.md)]
28+
2729
## HTTP request
2830
<!-- { "blockType": "ignored" } -->
2931
```http

api-reference/beta/api/administrativeunit-post-members.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ One of the following permissions is required to call this API. To learn more, in
3030
|Delegated (personal Microsoft account) | Not supported. |
3131
|Application | AdministrativeUnit.ReadWrite.All |
3232

33-
To add a user, group, or device to an administrative unit, the calling user must be assigned the *Privileged Role Administrator* [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json).
33+
[!INCLUDE [rbac-admin-units-apis-write](../includes/rbac-for-apis/rbac-admin-units-apis-write.md)]
3434

3535
### Permissions to create a new group
3636
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
@@ -40,12 +40,12 @@ To add a user, group, or device to an administrative unit, the calling user must
4040
|Delegated (personal Microsoft account) | Not supported. |
4141
|Application | Group.Create and AdministrativeUnit.Read.All, Group.ReadWrite.All and AdministrativeUnit.Read.All, Directory.ReadWrite.All |
4242

43-
To create a new group in an administrative unit, the calling principal must be assigned at least one of the following [Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) at the scope of the administrative unit:
44-
45-
* Groups Administrator
46-
* User Administrator
47-
48-
When these roles are assigned to a service principal, additional permissions are required to read the directory, such as assignment to the Directory Readers role, or having Microsoft Graph application permissions, such as Directory.Read.All.
43+
> [!IMPORTANT]
44+
> To create a new group in an administrative unit, the calling principal must be assigned at least one of the following [Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) at the scope of the administrative unit:
45+
> - Groups Administrator
46+
> - User Administrator
47+
>
48+
> For app-only scenarios - apart from these roles, the service principal requires additional permissions to read the directory. These permissions can be granted via assignment of supported Microsoft Entra roles, such the Directory Readers role; or they can be granted via Microsoft Graph application permissions that allow reading the directory, such as *Directory.Read.All*.
4949
5050
## HTTP request
5151

api-reference/beta/api/administrativeunit-update.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2424
<!-- { "blockType": "permissions", "name": "administrativeunit_update" } -->
2525
[!INCLUDE [permissions-table](../includes/permissions/administrativeunit-update-permissions.md)]
2626

27-
In delegated scenarios, the signed-in user must also be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with the `microsoft.directory/administrativeUnits/allProperties/allTasks` role permission. *Privileged Role Administrator* is the least privileged role for this operation.
27+
[!INCLUDE [rbac-admin-units-apis-write](../includes/rbac-for-apis/rbac-admin-units-apis-write.md)]
2828

2929
## HTTP request
3030
<!-- { "blockType": "ignored" } -->

api-reference/beta/api/allowedvalue-get.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -24,12 +24,12 @@ Choose the permission or permissions marked as least privileged for this API. Us
2424
<!-- { "blockType": "permissions", "name": "allowedvalue_get" } -->
2525
[!INCLUDE [permissions-table](../includes/permissions/allowedvalue-get-permissions.md)]
2626

27-
The signed-in user must also be assigned one of the following [directory roles](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json):
28-
29-
+ Attribute Definition Reader
30-
+ Attribute Definition Administrator
31-
32-
By default, Global Administrator and other administrator roles do not have permissions to read, define, or assign custom security attributes.
27+
> [!IMPORTANT]
28+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following privileged roles are supported for this operation.
29+
> - Attribute Definition Reader
30+
> - Attribute Definition Administrator
31+
>
32+
> - By default, Global Administrator and other administrator roles do not have permissions to read, define, or assign custom security attributes.
3333
3434
## HTTP request
3535

api-reference/beta/api/application-delta.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Namespace: microsoft.graph
1313

1414
[!INCLUDE [beta-disclaimer](../../includes/beta-disclaimer.md)]
1515

16-
Get newly created, updated, or deleted applications without having to perform a full read of the entire resource collection. See [Using Delta Query](/graph/delta-query-overview) for details.
16+
Get newly created, updated, or deleted applications without having to perform a full read of the entire resource collection. For more information, see [Use delta query to track changes in Microsoft Graph data](/graph/delta-query-overview) for details.
1717

1818
[!INCLUDE [national-cloud-support](../../includes/all-clouds.md)]
1919

api-reference/beta/api/applicationtemplate-instantiate.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,11 @@ Namespace: microsoft.graph
1515

1616
Add an instance of an application from the [Microsoft Entra application gallery](../resources/applicationtemplate.md) into your directory.
1717

18-
The application template with ID `8adf8e6e-67b2-4cf2-a259-e3dc5476c621` can be used to add a [non-gallery app](/azure/active-directory/manage-apps/add-non-gallery-app) that you can configure different single-sign on (SSO) modes like SAML SSO and password-based SSO.
18+
For [non-gallery apps](/entra/identity/enterprise-apps/add-application-portal), use an application template with one of the following IDs to configure different single sign-on (SSO) modes like SAML SSO and password-based SSO.
19+
20+
- Global service: `8adf8e6e-67b2-4cf2-a259-e3dc5476c621`
21+
- US government: `4602d0b4-76bb-404b-bca9-2652e1a39c6d`
22+
- China operated by 21Vianet: `5a532e38-1581-4918-9658-008dc27c1d68`
1923

2024
[!INCLUDE [national-cloud-support](../../includes/all-clouds.md)]
2125

@@ -34,8 +38,6 @@ Choose the permission or permissions marked as least privileged for this API. Us
3438
POST /applicationTemplates/{applicationTemplate-id}/instantiate
3539
```
3640

37-
To instantiate non-gallery apps, use the `8adf8e6e-67b2-4cf2-a259-e3dc5476c621` for the `{applicationTemplate-id}`.
38-
3941
## Request headers
4042

4143
| Name | Description |

api-reference/beta/api/approleassignment-get.md

Lines changed: 12 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -18,45 +18,6 @@ Read the properties and relationships of an [appRoleAssignment](../resources/app
1818

1919
## Permissions
2020

21-
<!--
22-
### For client service principals
23-
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
24-
<!--
25-
|Permission type | Permissions (from least to most privileged) |
26-
|:--------------------|:---------------------------------------------------------|
27-
|Delegated (work or school account) | Application.Read.All, Directory.Read.All, Application.ReadWrite.All, Directory.ReadWrite.All |
28-
|Delegated (personal Microsoft account) | Not supported. |
29-
|Application | Application.Read.All, Directory.Read.All, Application.ReadWrite.OwnedBy, Application.ReadWrite.All, Directory.ReadWrite.All |
30-
31-
### For resource service principals
32-
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
33-
<!--
34-
|Permission type | Permissions (from least to most privileged) |
35-
|:--------------------|:---------------------------------------------------------|
36-
|Delegated (work or school account) | Application.Read.All, Directory.Read.All, Application.ReadWrite.All, Directory.ReadWrite.All |
37-
|Delegated (personal Microsoft account) | Not supported. |
38-
|Application | Application.Read.All, Directory.Read.All, Application.ReadWrite.OwnedBy, Application.ReadWrite.All, Directory.ReadWrite.All |
39-
40-
### For groups
41-
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
42-
<!--
43-
|Permission type | Permissions (from least to most privileged) |
44-
|:--------------------|:---------------------------------------------------------|
45-
|Delegated (work or school account) | Group.Read.All, Directory.Read.All, AppRoleAssignment.ReadWrite.All, Directory.ReadWrite.All |
46-
|Delegated (personal Microsoft account) | Not supported. |
47-
|Application | Group.Read.All, Directory.Read.All, AppRoleAssignment.ReadWrite.All, Directory.ReadWrite.All |
48-
49-
### For users
50-
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
51-
<!--
52-
|Permission type | Permissions (from least to most privileged) |
53-
|:--------------------|:---------------------------------------------------------|
54-
|Delegated (work or school account) | User.Read, User.ReadBasic.All, Directory.Read.All, AppRoleAssignment.ReadWrite.All |
55-
|Delegated (personal Microsoft account) | Not supported. |
56-
|Application | Directory.Read.All, AppRoleAssignment.ReadWrite.All |
57-
58-
-->
59-
6021
The following table shows the least privileged permission or permissions required to call this API on each supported resource type. Follow [best practices](/graph/permissions-overview#best-practices-for-using-microsoft-graph-permissions) to request least privileged permissions. For details about delegated and application permissions, see [Permission types](/graph/permissions-overview#permission-types). To learn more about these permissions, see the [permissions reference](/graph/permissions-reference).
6122

6223
<!-- { "blockType": "ignored" } // Note: Removing this line will result in the permissions autogeneration tool overwriting the table. -->
@@ -69,6 +30,18 @@ The following table shows the least privileged permission or permissions require
6930

7031
[!INCLUDE [rbac-approleassignments-apis-read](../includes/rbac-for-apis/rbac-approleassignments-apis-read.md)]
7132

33+
### Other supported permissions
34+
35+
The following higher privileged permissions are supported by each resource:
36+
- Groups:
37+
- Delegated and application permissions: Directory.Read.All, AppRoleAssignment.ReadWrite.All, Directory.ReadWrite.All
38+
- Users:
39+
- Delegated permissions: User.ReadBasic.All, Directory.Read.All, AppRoleAssignment.ReadWrite.All
40+
- Application permissions: Directory.Read.All, AppRoleAssignment.ReadWrite.All
41+
- Service principals:
42+
- Delegated permissions: Directory.Read.All, Application.ReadWrite.All, Directory.ReadWrite.All
43+
- Application permissions: Application.ReadWrite.OwnedBy, Application.ReadWrite.All, Directory.ReadWrite.All
44+
7245
## HTTP request
7346

7447
To get details of an appRole granted to a service principal:

0 commit comments

Comments
 (0)