Skip to content

Commit 73b8146

Browse files
authored
Merge pull request #25512 from microsoftgraph/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/microsoftgraph/microsoft-graph-docs-contrib (branch main)
2 parents d4a4ac0 + 13511b7 commit 73b8146

File tree

3 files changed

+11
-7
lines changed

3 files changed

+11
-7
lines changed

api-reference/beta/api/applicationtemplate-instantiate.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,11 @@ Namespace: microsoft.graph
1515

1616
Add an instance of an application from the [Microsoft Entra application gallery](../resources/applicationtemplate.md) into your directory.
1717

18-
The application template with ID `8adf8e6e-67b2-4cf2-a259-e3dc5476c621` can be used to add a [non-gallery app](/azure/active-directory/manage-apps/add-non-gallery-app) that you can configure different single-sign on (SSO) modes like SAML SSO and password-based SSO.
18+
For [non-gallery apps](/entra/identity/enterprise-apps/add-application-portal), use an application template with one of the following IDs to configure different single sign-on (SSO) modes like SAML SSO and password-based SSO.
19+
20+
- Global service: `8adf8e6e-67b2-4cf2-a259-e3dc5476c621`
21+
- US government: `4602d0b4-76bb-404b-bca9-2652e1a39c6d`
22+
- China operated by 21Vianet: `5a532e38-1581-4918-9658-008dc27c1d68`
1923

2024
[!INCLUDE [national-cloud-support](../../includes/all-clouds.md)]
2125

@@ -34,8 +38,6 @@ Choose the permission or permissions marked as least privileged for this API. Us
3438
POST /applicationTemplates/{applicationTemplate-id}/instantiate
3539
```
3640

37-
To instantiate non-gallery apps, use the `8adf8e6e-67b2-4cf2-a259-e3dc5476c621` for the `{applicationTemplate-id}`.
38-
3941
## Request headers
4042

4143
| Name | Description |

api-reference/v1.0/api/applicationtemplate-instantiate.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,11 @@ Namespace: microsoft.graph
1313

1414
Add an instance of an application from the [Microsoft Entra application gallery](../resources/applicationtemplate.md) into your directory.
1515

16-
The application template with ID `8adf8e6e-67b2-4cf2-a259-e3dc5476c621` can be used to add a [non-gallery app](/azure/active-directory/manage-apps/add-non-gallery-app) that you can configure different single-sign on (SSO) modes like SAML SSO and password-based SSO.
16+
For [non-gallery apps](/entra/identity/enterprise-apps/add-application-portal), use an application template with one of the following IDs to configure different single sign-on (SSO) modes like SAML SSO and password-based SSO.
17+
18+
- Global service: `8adf8e6e-67b2-4cf2-a259-e3dc5476c621`
19+
- US government: `4602d0b4-76bb-404b-bca9-2652e1a39c6d`
20+
- China operated by 21Vianet: `5a532e38-1581-4918-9658-008dc27c1d68`
1721

1822
[!INCLUDE [national-cloud-support](../../includes/all-clouds.md)]
1923

@@ -32,8 +36,6 @@ Choose the permission or permissions marked as least privileged for this API. Us
3236
POST /applicationTemplates/{applicationTemplate-id}/instantiate
3337
```
3438

35-
To instantiate non-gallery apps, use the `8adf8e6e-67b2-4cf2-a259-e3dc5476c621` for the `{applicationTemplate-id}`.
36-
3739
## Request headers
3840

3941
| Name | Description |

api-reference/v1.0/resources/riskdetection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ For more information about risk detection, see [Microsoft Entra ID Protection](/
4141
|lastUpdatedDateTime|DateTimeOffset|Date and time that the risk detection was last updated. The DateTimeOffset type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is look like this: `2014-01-01T00:00:00Z`|
4242
|location|[signInLocation](../resources/signinlocation.md)|Location of the sign-in.|
4343
|requestId|String|Request ID of the sign-in associated with the risk detection. This property is `null` if the risk detection is not associated with a sign-in.|
44-
|riskDetail|riskDetail|Details of the detected risk. The possible values are: `none`, `adminGeneratedTemporaryPassword`, `userPerformedSecuredPasswordChange`, `userPerformedSecuredPasswordReset`, `adminConfirmedSigninSafe`, `aiConfirmedSigninSafe`, `userPassedMFADrivenByRiskBasedPolicy`, `adminDismissedAllRiskForUser`, `adminConfirmedSigninCompromised`, `hidden`, `adminConfirmedUserCompromised`, `unknownFutureValue`, `m365DAdminDismissedDetection`. Note that you must use the `Prefer: include - unknown -enum-members` request header to get the following value(s) in this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `m365DAdminDismissedDetection`.|
44+
|riskDetail|riskDetail|Details of the detected risk. The possible values are: `none`, `adminGeneratedTemporaryPassword`, `userChangedPasswordOnPremises`, `userPerformedSecuredPasswordChange`, `userPerformedSecuredPasswordReset`, `adminConfirmedSigninSafe`, `aiConfirmedSigninSafe`, `userPassedMFADrivenByRiskBasedPolicy`, `adminDismissedAllRiskForUser`, `adminConfirmedSigninCompromised`, `hidden`, `adminConfirmedUserCompromised`, `unknownFutureValue`, `m365DAdminDismissedDetection`. Note that you must use the `Prefer: include - unknown -enum-members` request header to get the following value(s) in this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `m365DAdminDismissedDetection`.|
4545
|riskEventType|String|The type of risk event detected. The possible values are `adminConfirmedUserCompromised`, `anomalousToken`, `anomalousUserActivity`, `anonymizedIPAddress`, `generic`, `impossibleTravel`, `investigationsThreatIntelligence`, `suspiciousSendingPatterns`, `leakedCredentials`, `maliciousIPAddress`,`malwareInfectedIPAddress`, `mcasSuspiciousInboxManipulationRules`, `newCountry`, `passwordSpray`,`riskyIPAddress`, `suspiciousAPITraffic`, `suspiciousBrowser`,`suspiciousInboxForwarding`, `suspiciousIPAddress`, `tokenIssuerAnomaly`, `unfamiliarFeatures`, `unlikelyTravel`. If the risk detection is a premium detection, will show `generic`. <br/>For more information about each value, see [Risk types and detection](/entra/id-protection/concept-identity-protection-risks#risk-types-and-detection).|
4646
|riskLevel|riskLevel|Level of the detected risk. Possible values are: `low`, `medium`, `high`, `hidden`, `none`, `unknownFutureValue`.|
4747
|riskState|riskState|The state of a detected risky user or sign-in. Possible values are: `none`, `confirmedSafe`, `remediated`, `dismissed`, `atRisk`, `confirmedCompromised`, `unknownFutureValue`.|

0 commit comments

Comments
 (0)