Skip to content

Commit ae9e94b

Browse files
authored
Merge pull request #25014 from microsoftgraph/globalAdminCleanUp
Entra docs - SFI Wave 2 remediation
2 parents 1f3e052 + d2185e0 commit ae9e94b

File tree

8 files changed

+13
-11
lines changed

8 files changed

+13
-11
lines changed

api-reference/beta/api/user-update.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ PATCH /users/{id | userPrincipalName}
5353
| Property | Type |Description|
5454
|:---------------|:--------|:----------|
5555
|aboutMe|String|A freeform text entry field for the user to describe themselves.|
56-
|accountEnabled|Boolean| `true` if the account is enabled; otherwise, `false`. This property is required when a user is created. Apart from a global administrator, a privileged authentication administrator assigned the _Directory.AccessAsUser.All_ delegated permission can update the **accountEnabled** status of all administrators in the tenant.|
56+
|accountEnabled|Boolean| `true` if the account is enabled; otherwise, `false`. This property is required when a user is created. A Privileged Authentication Administrator assigned the _Directory.AccessAsUser.All_ delegated permission is the least privileged role that's allowed to update the **accountEnabled** status of all administrators in the tenant.|
5757
| ageGroup | [ageGroup](../resources/user.md#agegroup-values) | Sets the age group of the user. Allowed values: `null`, `Minor`, `NotAdult` and `Adult`. Refer to the [legal age group property definitions](../resources/user.md#legal-age-group-property-definitions) for further information. |
5858
|assignedLicenses|[assignedLicense](../resources/assignedlicense.md) collection|The licenses that are assigned to the user. Not nullable. |
5959
|birthday|DateTimeOffset|The birthday of the user. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is `2014-01-01T00:00:00Z`|

api-reference/beta/resources/accessreviews-root.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Typical customer scenarios for access reviews of group memberships and applicati
2525

2626
- Customers can collect access review controls into programs that are relevant for your organization to track reviews for compliance or risk-sensitive applications.
2727

28-
There's also a related capability for customers to review and certify the role assignments of administrative users who are assigned to Microsoft Entra roles such as Global Administrator or Azure subscription roles. This capability is included in [Microsoft Entra Privileged Identity Management](privilegedidentitymanagement-root.md).
28+
There's also a related capability for customers to review and certify the role assignments of administrative users who are assigned to [Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) or [Azure subscription](/azure/role-based-access-control/built-in-roles) roles. This capability is included in [Microsoft Entra Privileged Identity Management](privilegedidentitymanagementv3-overview.md).
2929

3030
The tenant where an access review is being created or managed via the API must have sufficient purchased or trial licenses. For more information about the license requirements, see [Access reviews license requirements](/azure/active-directory/governance/access-reviews-overview#license-requirements).
3131

api-reference/beta/resources/businessflowtemplate.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,12 @@ Namespace: microsoft.graph
1717

1818
In the Microsoft Entra [access reviews](accessreviews-root.md) feature, the **businesFlowTemplate** represents a Microsoft Entra business flow template. The identifier of a template, such as to review guest members of a group, is supplied by the caller when creating an access review.
1919

20-
The business flow template objects are automatically generated when the global administrator onboards the tenant to use the access reviews feature. The business flow templates include access reviews of assignments to an application, memberships of a group, memberships of a Microsoft Entra role, guest user memberships of a group, and guest user assignments to an application. No additional business flow templates can be created.
21-
20+
The business flow template objects are predefined and automatically generated when an authorized administrator onboards the tenant to use the access reviews feature. They include the following access reviews workflows and scopes:
21+
- Assignments to an application
22+
- Memberships of a group
23+
- Memberships of a Microsoft Entra role
24+
- Memberships of guests to a group
25+
- Assignments of guests to an application.
2226

2327
## Methods
2428

api-reference/beta/resources/program.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,9 @@ Namespace: microsoft.graph
1515

1616
[!INCLUDE [accessreviews-disclaimer](../../includes/accessreviews-disclaimer.md)]
1717

18-
In the Microsoft Entra [access reviews](accessreviews-root.md) feature, a program is a container, holding program controls. A tenant can have one or more programs. Each control links an access review to a program, to make it easier to locate related access reviews.
18+
In the Microsoft Entra [access reviews](accessreviews-root.md) feature, a program is a container, holding program controls. A tenant can have one or more programs. Each control links an access review to a program, to make it easier to locate related access reviews.
1919

20-
Each tenant that has on-boarded Microsoft Entra access reviews has one program, `Default program`. A global administrator can create additional programs, for example to represent compliance initiatives.
20+
A tenant that has onboarded Microsoft Entra access reviews has one program, the `Default program`. An authorized administrator can create more programs, for example, to represent compliance initiatives.
2121

2222

2323
## Methods

api-reference/beta/resources/programcontroltype.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Namespace: microsoft.graph
1717

1818
In the Microsoft Entra [access reviews](accessreviews-root.md) feature, the program control type is used when associating a control to a program, to indicate the type of access review the control is for.
1919

20-
The program control type objects are automatically generated when the global administrator onboards the tenant to use the access reviews feature. No additional program control types can be created.
20+
The program control type objects are automatically generated when an authorized administrator onboards the tenant to use the access reviews feature. No additional program control types can be created.
2121

2222

2323
## Methods

api-reference/v1.0/api/user-update.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ PATCH /users/{id | userPrincipalName}
5151
| Property | Type |Description|
5252
|:---------------|:--------|:----------|
5353
|aboutMe|String|A freeform text entry field for the user to describe themselves.|
54-
|accountEnabled|Boolean| `true` if the account is enabled; otherwise, `false`. This property is required when a user is created. Apart from a global administrator, a privileged authentication administrator assigned the _Directory.AccessAsUser.All_ delegated permission can update the **accountEnabled** status of all administrators in the tenant.|
54+
|accountEnabled|Boolean| `true` if the account is enabled; otherwise, `false`. This property is required when a user is created. A Privileged Authentication Administrator assigned the _Directory.AccessAsUser.All_ delegated permission is the least privileged role that's allowed to update the **accountEnabled** status of all administrators in the tenant.|
5555
| ageGroup | [ageGroup](../resources/user.md#agegroup-values) | Sets the age group of the user. Allowed values: `null`, `Minor`, `NotAdult`, and `Adult`. Refer to the [legal age group property definitions](../resources/user.md#legal-age-group-property-definitions) for further information. |
5656
|birthday|DateTimeOffset|The birthday of the user. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is `2014-01-01T00:00:00Z`|
5757
|businessPhones| String collection | The telephone numbers for the user. NOTE: Although this is a string collection, only one number can be set for this property.|
Loading

concepts/microsoft-graph-activity-logs-overview.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,7 @@ This service is available in the following [national cloud deployments](/graph/d
2727
To access the Microsoft Graph activity logs, you need the following privileges.
2828

2929
- A Microsoft Entra ID P1 or P2 tenant license in your tenant.
30-
- An administrator with one of the following [Microsoft Entra administrator roles](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json) listed in the order of least to most privileged role.
31-
- Security Administrator – To configure diagnostic settings
32-
- Global Administrator – To configure diagnostic settings
30+
- An administrator with a supported [Microsoft Entra administrator role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json). *Security Administrator* is the only least privileged admin role supported for configuring diagnostic settings.
3331
- An Azure subscription with one of the following log destinations are configured, and permissions to access data in the corresponding log destinations.
3432
- An Azure Log Analytics workspace to send logs to Azure Monitor
3533
- An Azure Storage Account for which you have List Keys permissions

0 commit comments

Comments
 (0)