Skip to content

Commit 82f4db5

Browse files
committed
Doesn't support custom roles
1 parent ccc9b29 commit 82f4db5

File tree

1 file changed

+1
-2
lines changed

1 file changed

+1
-2
lines changed

api-reference/beta/api/user-invalidateallrefreshtokens.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,6 @@ Invalidates all of the user's refresh tokens issued to applications and session
1818

1919
For developers, if the application attempts to redeem a delegated access token for this user by using an invalidated refresh token, the application receives an error. If this happens, the application needs to acquire a new refresh token by making a request to the OAuth 2.0 `/authorize` endpoint, which forces the user to sign in.
2020

21-
2221
[!INCLUDE [national-cloud-support](../../includes/all-clouds.md)]
2322

2423
## Permissions
@@ -29,7 +28,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2928

3029
> [!IMPORTANT]
3130
>
32-
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with the `microsoft.directory/users/invalidateAllRefreshTokens` role permission. The following least privileged roles are supported for this operation:
31+
> In delegated scenarios with work or school accounts, the signed-in user must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or a custom role with a supported role permission. The following least privileged roles are supported for this operation:
3332
> - Directory Writers
3433
> - Helpdesk Administrator
3534
> - Authentication Administrator

0 commit comments

Comments
 (0)