Skip to content

Commit ddef90e

Browse files
authored
Merge pull request #24882 from microsoftgraph/refreshtoken
Add refreshToken to incomingTokenType
2 parents 00678d0 + 4ecf67a commit ddef90e

File tree

3 files changed

+20
-1
lines changed

3 files changed

+20
-1
lines changed

api-reference/beta/resources/enums.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -647,6 +647,7 @@ Namespace: microsoft.graph
647647
| saml20 |
648648
| unknownFutureValue |
649649
| remoteDesktopToken |
650+
| refreshToken |
650651

651652
### protocolType values
652653

api-reference/beta/resources/signin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ The [Microsoft Entra data retention policies](/azure/active-directory/reports-mo
6363
|homeTenantId|String|The tenant identifier of the user initiating the sign-in. Not applicable in Managed Identity or service principal sign ins.|
6464
|homeTenantName|String|For user sign ins, the identifier of the tenant that the user is a member of. Only populated in cases where the home tenant provides affirmative consent to Microsoft Entra ID to show the tenant content.|
6565
|id|String|The identifier representing the sign-in activity. Inherited from [entity](entity.md). <br/><br/> Supports `$filter` (`eq`).|
66-
|incomingTokenType|incomingTokenType|Indicates the token types that were presented to Microsoft Entra ID to authenticate the actor in the sign in. The possible values are: `none`, `primaryRefreshToken`, `saml11`, `saml20`, `unknownFutureValue`, `remoteDesktopToken`. <br><br> **NOTE** Microsoft Entra ID might have also used token types not listed in this enum type to authenticate the actor. Don't infer the lack of a token if it isn't one of the types listed. Also, you must use the `Prefer: include-unknown-enum-members` request header to get the following value or values in this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `remoteDesktopToken`.|
66+
|incomingTokenType|incomingTokenType|Indicates the token types that were presented to Microsoft Entra ID to authenticate the actor in the sign in. The possible values are: `none`, `primaryRefreshToken`, `saml11`, `saml20`, `unknownFutureValue`, `remoteDesktopToken`, `refreshToken`. <br><br> **NOTE** Microsoft Entra ID might have also used token types not listed in this enum type to authenticate the actor. Don't infer the lack of a token if it isn't one of the types listed. Also, you must use the `Prefer: include-unknown-enum-members` request header to get the following value or values in this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `remoteDesktopToken`, `refreshToken`.|
6767
|ipAddress|String|The IP address of the client from where the sign-in occurred. <br/><br/> Supports `$filter` (`eq`, `startsWith`).|
6868
|ipAddressFromResourceProvider|String|The IP address a user used to reach a resource provider, used to determine Conditional Access compliance for some policies. For example, when a user interacts with Exchange Online, the IP address that Microsoft Exchange receives from the user can be recorded here. This value is often `null`.|
6969
|isInteractive|Boolean|Indicates whether a user sign in is interactive. In interactive sign in, the user provides an authentication factor to Microsoft Entra ID. These factors include passwords, responses to MFA challenges, biometric factors, or QR codes that a user provides to Microsoft Entra ID or an associated app. In non-interactive sign in, the user doesn't provide an authentication factor. Instead, the client app uses a token or code to authenticate or access a resource on behalf of a user. Non-interactive sign ins are commonly used for a client to sign in on a user's behalf in a process transparent to the user.|

changelog/Microsoft.AAD.Reporting.json

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,24 @@
3333
"CreatedDateTime": "2024-04-01T00:00:00.5014179Z",
3434
"WorkloadArea": "Reports",
3535
"SubArea": "Identity and access reports"
36+
},
37+
{
38+
"ChangeList": [
39+
{
40+
"Id": "5869ee0c-c48f-4031-9381-29d2f6792789",
41+
"ApiChange": "Member",
42+
"ChangedApiName": "refreshToken",
43+
"ChangeType": "Addition",
44+
"Description": "Added the `refreshToken` member to the **incomingTokenType** enumeration.",
45+
"Target": "incomingTokenType"
46+
}
47+
],
48+
"Id": "5869ee0c-c48f-4031-9381-29d2f6792789",
49+
"Cloud": "Prod",
50+
"Version": "beta",
51+
"CreatedDateTime": "2024-08-29T21:29:24.8427621Z",
52+
"WorkloadArea": "Reports",
53+
"SubArea": "Identity and access reports"
3654
},
3755
{
3856
"ChangeList": [

0 commit comments

Comments
 (0)