Skip to content

Commit e332dd9

Browse files
committed
Merge branch 'user/satpatel/docChangesRS' of https://github.com/microsoftgraph/microsoft-graph-docs into user/satpatel/docChangesRS
2 parents db191e8 + 9658b52 commit e332dd9

File tree

327 files changed

+7814
-774
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

327 files changed

+7814
-774
lines changed

api-reference/beta/api/accesspackage-list-accesspackageresourcerolescopes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "List accessPackageResourceRoleScopes"
3-
description: "Retrieve a list of accesspackageresourcerolescope objects."
3+
description: "Retrieve an access package with a list of accessPackageResourceRoleScope objects."
44
ms.localizationpriority: medium
55
author: "markwahl-msft"
66
ms.subservice: "entra-id-governance"

api-reference/beta/api/accesspackagecatalog-list-accesspackageresourceroles.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "List accessPackageResourceRoles"
3-
description: "Retrieve a list of accessPackageResourceRole objects."
3+
description: "Retrieve a list of accessPackageResourceRole objects of an accessPackageResource in an accessPackageCatalog."
44
ms.localizationpriority: medium
55
author: "markwahl-msft"
66
ms.subservice: "entra-id-governance"
@@ -132,9 +132,9 @@ Content-type: application/json
132132
}
133133
```
134134

135-
### Example 2: Retrieve the roles of a resource for a SharePoint Online site
135+
### Example 2: Retrieve the roles of a resource for a SharePoint site
136136

137-
This is an example of retrieving the roles of a resource, to obtain the **originId** of each role. This would be used after a SharePoint Online site has been added as a resource to the catalog, as the **originId** of a SharePoint site role, the sequence number of the role in the site, is needed to add the role to an access package.
137+
The following example shows how to retrieve the roles of a resource, to obtain the **originId** of each role. This would be used after a SharePoint site has been added as a resource to the catalog, as the **originId** of a SharePoint site role, the sequence number of the role in the site, is needed to add the role to an access package.
138138

139139
#### Request
140140

@@ -188,7 +188,7 @@ GET https://graph.microsoft.com/beta/identityGovernance/entitlementManagement/ac
188188

189189
#### Response
190190

191-
The following example shows the response. The **displayName** is the same as shown in the SharePoint Online view of a site, and the **originId** is the underlying identifier established by SharePoint Online for the role.
191+
The following example shows the response. The **displayName** is the same as shown in the SharePoint view of a site, and the **originId** is the underlying identifier established by SharePoint for the role.
192192

193193
> **Note:** The response object shown here might be shortened for readability.
194194

api-reference/beta/api/accesspackagecatalog-list-accesspackageresources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "List accessPackageResources"
3-
description: "Retrieve a list of accesspackageresource objects."
3+
description: "Retrieve a list of accessPackageResource objects in an accessPackageCatalog."
44
ms.localizationpriority: medium
55
author: "markwahl-msft"
66
ms.subservice: "entra-id-governance"

api-reference/beta/api/appmanagementpolicy-post.md

Lines changed: 40 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,7 @@ POST /policies/appManagementPolicies
4343

4444
> [!IMPORTANT]
4545
> Service principals with a createdDateTime `null` are treated as having being created on 01/01/2019.
46+
4647
## Request body
4748

4849
In the request body, supply a JSON representation of the [appManagementPolicy](../resources/appmanagementpolicy.md) object.
@@ -53,7 +54,7 @@ You can specify the following properties when creating an **appManagementPolicy*
5354
| :----------- | :---------------------------------------------------------- | :--------------------------------------------------------------------- |
5455
| displayName | String | The display name of the policy. Required. |
5556
| description | String | The description of the policy. Required. |
56-
| isEnabled | Boolean | Denotes whether the policy is enabled. Optional. |
57+
| isEnabled | Boolean | Denotes whether the policy is enabled. Optional. |
5758
| restrictions | [appManagementConfiguration](../resources/appManagementConfiguration.md) | Restrictions that apply to an application or service principal object. Optional. |
5859

5960
## Response
@@ -67,9 +68,10 @@ If successful, this method returns a `201 Created` response code with the new [a
6768
The following example shows a request. This request created an app management policy with the following settings:
6869

6970
- Enables the policy.
70-
- Blocks creating of new passwords for applications and service principals created on or after 2019-10-19 at 10:37 AM UTC time.
71-
- Enforces lifetime on password secrets and key credentials for applications created on or after 2014-10-19 at 10:37 AM UTC time.
72-
- Limits password secrets for apps and service principals created after 2019-10-19 at 10:37 AM UTC time to less than 4 days, 12 hours, 30 minutes and 5 seconds.
71+
- Blocks creating of new passwords for applications and service principals created on or after October 19th 2019 at 10:37 AM UTC time.
72+
- Limits password secrets for apps and service principals created after October 19th 2014 at 10:37 AM UTC time to less than 90 days.
73+
- Disables the nonDefaultUriAddition restriction. This means that apps with this policy applied to them can add new nondefault identifier URIs to their apps, even if the tenant default policy typically blocks it.
74+
- Doesn't specify any other restrictions. This means that the behavior for those restrictions on apps/service principals with this policy applied falls back to however the tenant default policy is configured.
7375

7476

7577
# [HTTP](#tab/http)
@@ -89,45 +91,35 @@ POST https://graph.microsoft.com/beta/policies/appManagementPolicies
8991
"passwordCredentials": [
9092
{
9193
"restrictionType": "passwordAddition",
94+
"state": "enabled",
9295
"maxLifetime": null,
9396
"restrictForAppsCreatedAfterDateTime": "2019-10-19T10:37:00Z"
9497
},
9598
{
9699
"restrictionType": "passwordLifetime",
100+
"state": "enabled",
97101
"maxLifetime": "P90D",
98102
"restrictForAppsCreatedAfterDateTime": "2014-10-19T10:37:00Z"
99103
},
100104
{
101105
"restrictionType": "symmetricKeyAddition",
106+
"state": "enabled",
102107
"maxLifetime": null,
103108
"restrictForAppsCreatedAfterDateTime": "2019-10-19T10:37:00Z"
104109
},
105110
{
106111
"restrictionType": "symmetricKeyLifetime",
107-
"maxLifetime": "P30D",
108-
"restrictForAppsCreatedAfterDateTime": "2014-10-19T10:37:00Z"
109-
}
110-
],
111-
"keyCredentials": [
112-
{
113-
"restrictionType": "asymmetricKeyLifetime",
112+
"state": "enabled",
114113
"maxLifetime": "P90D",
115114
"restrictForAppsCreatedAfterDateTime": "2014-10-19T10:37:00Z"
116-
},
117-
{
118-
"restrictionType": "trustedCertificateAuthority",
119-
"restrictForAppsCreatedAfterDateTime": "2019-10-19T10:37:00Z",
120-
"certificateBasedApplicationConfigurationIds": [
121-
"eec5ba11-2fc0-4113-83a2-ed986ed13743",
122-
"bb8e164b-f9ed-4b98-bc45-65eddc14f4c1"
123-
],
124-
"maxLifetime": null
125115
}
126116
],
117+
"keyCredentials": [],
127118
"applicationRestrictions": {
128119
"identifierUris": {
129120
"nonDefaultUriAddition": {
130-
"restrictForAppsCreatedAfterDateTime": "2024-01-01T10:37:00Z",
121+
"state": "disabled",
122+
"restrictForAppsCreatedAfterDateTime": null,
131123
"excludeAppsReceivingV2Tokens": true,
132124
"excludeSaml": true
133125
}
@@ -186,6 +178,7 @@ The following example shows the response.
186178
HTTP/1.1 200 OK
187179
Content-type: application/json
188180
181+
189182
{
190183
"@odata.context": "https://graph.microsoft.com/beta/$metadata#policies/appManagementPolicies/$entity",
191184
"id": "a4ab1ed9-46bb-4bef-88d4-86fd6398dd5d",
@@ -196,15 +189,40 @@ Content-type: application/json
196189
"passwordCredentials": [
197190
{
198191
"restrictionType": "passwordAddition",
192+
"state": "enabled",
199193
"maxLifetime": null,
200194
"restrictForAppsCreatedAfterDateTime": "2019-10-19T10:37:00Z"
201195
},
202196
{
203197
"restrictionType": "passwordLifetime",
198+
"state": "enabled",
204199
"maxLifetime": "P90D",
205200
"restrictForAppsCreatedAfterDateTime": "2018-10-19T10:37:00Z"
201+
},
202+
{
203+
"restrictionType": "symmetricKeyAddition",
204+
"state": "enabled",
205+
"maxLifetime": null,
206+
"restrictForAppsCreatedAfterDateTime": "2019-10-19T10:37:00Z"
207+
},
208+
{
209+
"restrictionType": "symmetricKeyLifetime",
210+
"state": "enabled",
211+
"maxLifetime": "P90D",
212+
"restrictForAppsCreatedAfterDateTime": "2014-10-19T10:37:00Z"
206213
}
207-
]
214+
],
215+
"keyCredentials": [],
216+
"applicationRestrictions": {
217+
"identifierUris": {
218+
"nonDefaultUriAddition": {
219+
"state": "disabled",
220+
"restrictForAppsCreatedAfterDateTime": null,
221+
"excludeAppsReceivingV2Tokens": true,
222+
"excludeSaml": true
223+
}
224+
}
225+
}
208226
}
209227
}
210228
```

api-reference/beta/api/authorizationpolicy-get.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,8 @@ Choose the permission or permissions marked as least privileged for this API. Us
2525
<!-- { "blockType": "permissions", "name": "authorizationpolicy_get" } -->
2626
[!INCLUDE [permissions-table](../includes/permissions/authorizationpolicy-get-permissions.md)]
2727

28+
[!INCLUDE [rbac-authorization-policy-apis-read](../includes/rbac-for-apis/rbac-authorization-policy-apis-read.md)]
29+
2830
## HTTP request
2931

3032
<!-- { "blockType": "ignored" } -->

api-reference/beta/api/authorizationpolicy-update.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2525
<!-- { "blockType": "permissions", "name": "authorizationpolicy_update" } -->
2626
[!INCLUDE [permissions-table](../includes/permissions/authorizationpolicy-update-permissions.md)]
2727

28-
For delegated scenarios, the user needs to have the *Privileged Role Administrator* [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json).
28+
[!INCLUDE [rbac-authorization-policy-apis-update](../includes/rbac-for-apis/rbac-authorization-policy-apis-update.md)]
2929

3030
## HTTP request
3131

api-reference/beta/api/azureadauthentication-get.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,12 +22,7 @@ Choose the permission or permissions marked as least privileged for this API. Us
2222
<!-- { "blockType": "permissions", "name": "azureadauthentication_get" } -->
2323
[!INCLUDE [permissions-table](../includes/permissions/azureadauthentication-get-permissions.md)]
2424

25-
For delegated scenarios, the calling user needs to belong to at least one of the following [Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json):
26-
+ Global Reader
27-
+ Reports Reader
28-
+ Security Administrator
29-
+ Security Operator
30-
+ Security Reader
25+
[!INCLUDE [rbac-entra-health-service-activity-apis](../includes/rbac-for-apis/rbac-entra-health-service-activity-apis.md)]
3126

3227
## HTTP request
3328

Lines changed: 103 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,103 @@
1+
---
2+
title: "Get certificateAuthorityDetail"
3+
description: "Read the properties and relationships of a certificateAuthorityDetail object."
4+
author: "suawat"
5+
ms.localizationpriority: medium
6+
ms.subservice: "entra-sign-in"
7+
doc_type: apiPageType
8+
---
9+
10+
# Get certificateAuthorityDetail
11+
12+
Namespace: microsoft.graph
13+
14+
[!INCLUDE [beta-disclaimer](../../includes/beta-disclaimer.md)]
15+
16+
Read the properties and relationships of a [certificateAuthorityDetail](../resources/certificateauthoritydetail.md) object.
17+
18+
## Permissions
19+
20+
Choose the permission or permissions marked as least privileged for this API. Use a higher privileged permission or permissions [only if your app requires it](/graph/permissions-overview#best-practices-for-using-microsoft-graph-permissions). For details about delegated and application permissions, see [Permission types](/graph/permissions-overview#permission-types). To learn more about these permissions, see the [permissions reference](/graph/permissions-reference).
21+
22+
<!-- { "blockType": "permissions", "name": "certificateauthoritydetail_get" } -->
23+
[!INCLUDE [permissions-table](../includes/permissions/certificateauthoritydetail-get-permissions.md)]
24+
25+
[!INCLUDE [rbac-cert-based-authpkis-apis](../includes/rbac-for-apis/rbac-cert-based-authpkis-apis.md)]
26+
27+
## HTTP request
28+
29+
<!-- {
30+
"blockType": "ignored"
31+
}
32+
-->
33+
34+
``` http
35+
GET /directory/publicKeyInfrastructure/certificateBasedAuthConfigurations/{certificateBasedAuthPkiId}/certificateAuthorities/{certificateAuthorityDetailId}
36+
```
37+
38+
## Optional query parameters
39+
40+
This method supports the `$select` OData query parameter to help customize the response. For general information, see [OData query parameters](/graph/query-parameters).
41+
42+
## Request headers
43+
44+
|Name|Description|
45+
|:---|:---|
46+
|Authorization|Bearer {token}. Required. Learn more about [authentication and authorization](/graph/auth/auth-concepts).|
47+
48+
## Request body
49+
50+
Don't supply a request body for this method.
51+
52+
## Response
53+
54+
If successful, this method returns a `200 OK` response code and a [certificateAuthorityDetail](../resources/certificateauthoritydetail.md) object in the response body.
55+
56+
## Examples
57+
58+
### Request
59+
60+
The following example shows a request.
61+
<!-- {
62+
"blockType": "request",
63+
"name": "get_certificateauthoritydetail"
64+
}
65+
-->
66+
``` http
67+
GET https://graph.microsoft.com/beta/directory/publicKeyInfrastructure/certificateBasedAuthConfigurations/{certificateBasedAuthPkiId}/certificateAuthorities/{certificateAuthorityDetailId}
68+
```
69+
70+
71+
### Response
72+
73+
The following example shows the response.
74+
>**Note:** The response object shown here might be shortened for readability.
75+
<!-- {
76+
"blockType": "response",
77+
"truncated": true,
78+
"@odata.type": "microsoft.graph.certificateAuthorityDetail"
79+
}
80+
-->
81+
``` http
82+
HTTP/1.1 200 OK
83+
Content-Type: application/json
84+
85+
{
86+
"value": {
87+
"@odata.type": "#microsoft.graph.certificateAuthorityDetail",
88+
"id": "90777c92-2eb3-4a68-931d-4a3e1e1c741f",
89+
"deletedDateTime": null,
90+
"certificateAuthorityType": "root",
91+
"certificate": "Binary",
92+
"displayName": "Contoso2 CA1",
93+
"issuer": "Contoso2",
94+
"issuerSubjectKeyIdentifier": "C0E9....711A",
95+
"createdDateTime": "2024-10-25T18:05:28Z",
96+
"expirationDateTime": "2027-08-29T02:05:57Z",
97+
"thumbprint": "C6FA....4E9CF2",
98+
"certificateRevocationListUrl": null,
99+
"deltacertificateRevocationListUrl": null,
100+
"isIssuerHintEnabled": true
101+
}
102+
}
103+
```

0 commit comments

Comments
 (0)