Skip to content

Commit 1dd7a81

Browse files
committed
Merge branch 'main' into release-msid-gtd-tutorial-web-app
2 parents 5618c83 + c0d61cc commit 1dd7a81

File tree

145 files changed

+2068
-5987
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

145 files changed

+2068
-5987
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -961,6 +961,12 @@
961961
"url": "https://github.com/Azure-Samples/azure-cache-redis-samples",
962962
"branch": "main",
963963
"branch_mapping": {}
964+
},
965+
{
966+
"path_to_root": "microsoft-graph",
967+
"url": "https://github.com/MicrosoftGraph/microsoft-graph-docs",
968+
"branch": "main",
969+
"branch_mapping": {}
964970
}
965971
],
966972
"branch_target_mapping": {

articles/active-directory/develop/registration-config-change-token-lifetime-how-to.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ This article shows how to use Azure AD PowerShell to set an access token lifetim
2626
To set an access token lifetime policy, download the [Azure AD PowerShell Module](https://www.powershellgallery.com/packages/AzureADPreview).
2727
Run the **Connect-AzureAD -Confirm** command.
2828

29-
Here’s an example policy that requires users to authenticate more frequently in your web app. This policy sets the lifetime of the access to the service principal of your web app. Create the policy and assign it to your service principal. You also need to get the ObjectId of your service principal.
29+
Here’s an example policy that requires users to authenticate less frequently in your web app. This policy sets the lifetime of the access to the service principal of your web app. Create the policy and assign it to your service principal. You also need to get the ObjectId of your service principal.
3030

3131
```powershell
3232
$policy = New-AzureADPolicy -Definition @('{"TokenLifetimePolicy":{"Version":1,"AccessTokenLifetime":"02:00:00"}}') -DisplayName "WebPolicyScenario" -IsOrganizationDefault $false -Type "TokenLifetimePolicy"

articles/active-directory/governance/customize-workflow-email.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -94,6 +94,9 @@ Emails sent out using Lifecycle workflows can be customized to have your own com
9494
- A verified domain. To add a custom domain, see: [Managing custom domain names in your Azure Active Directory](../enterprise-users/domains-manage.md)
9595
- Custom Branding set within Azure AD if you want to have your custom branding used in emails. To set organizational branding within your Azure tenant, see: [Configure your company branding (preview)](../fundamentals/how-to-customize-branding.md).
9696

97+
> [!NOTE]
98+
> The recommendation is to use a domain that has the appropriate DNS records to facilitate email validation, like SPF, DKIM, DMARC, and MX as this then complies with the [RFC compliance](https://www.ietf.org/rfc/rfc2142.txt) for sending and receiving email. Please see [Learn more about Exchange Online Email Routing](/exchange/mail-flow-best-practices/mail-flow-best-practices) for more information.
99+
97100
After these prerequisites are satisfied, you'd follow these steps:
98101

99102
1. On the Lifecycle workflows page, select **Workflow settings (Preview)**.

articles/active-directory/manage-apps/assign-user-or-group-access-portal.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -243,7 +243,7 @@ $assignments | ForEach-Object {
243243
1. Get the enterprise application. Filter by DisplayName.
244244

245245
```http
246-
GET servicePrincipal?$filter=DisplayName eq '{appDisplayName}'
246+
GET https://graph.microsoft.com/v1.0/servicePrincipals?$filter=displayName eq '{appDisplayName}'
247247
```
248248
Record the following values from the response body:
249249
@@ -253,11 +253,11 @@ $assignments | ForEach-Object {
253253
1. Get the user by filtering by the user's principal name. Record the object ID of the user.
254254
255255
```http
256-
GET /users/{userPrincipalName}
256+
GET https://graph.microsoft.com/v1.0/users/{userPrincipalName}
257257
```
258258
1. Assign the user to the application.
259259
```http
260-
POST /servicePrincipals/resource-servicePrincipal-id/appRoleAssignedTo
260+
POST https://graph.microsoft.com/v1.0/servicePrincipals/{resource-servicePrincipal-id}/appRoleAssignedTo
261261
262262
{
263263
"principalId": "33ad69f9-da99-4bed-acd0-3f24235cb296",
@@ -270,20 +270,20 @@ $assignments | ForEach-Object {
270270
## Unassign users, and groups, from an application
271271
To unassign user and groups from the application, run the following query.
272272
273-
1. Get the enterprise application. Filter by DisplayName.
273+
1. Get the enterprise application. Filter by displayName.
274274
275275
```http
276-
GET servicePrincipal?$filter=DisplayName eq '{appDisplayName}'
276+
GET https://graph.microsoft.com/v1.0/servicePrincipals?$filter=displayName eq '{appDisplayName}'
277277
```
278278
1. Get the list of appRoleAssignments for the application.
279279
280-
```http
281-
GET /servicePrincipals/{id}/appRoleAssignedTo
282-
```
280+
```http
281+
GET https://graph.microsoft.com/v1.0/servicePrincipals/{id}/appRoleAssignedTo
282+
```
283283
1. Remove the appRoleAssignments by specifying the appRoleAssignment ID.
284284
285285
```http
286-
DELETE /servicePrincipals/{resource-servicePrincipal-id}/appRoleAssignedTo/{appRoleAssignment-id}
286+
DELETE https://graph.microsoft.com/v1.0/servicePrincipals/{resource-servicePrincipal-id}/appRoleAssignedTo/{appRoleAssignment-id}
287287
```
288288
:::zone-end
289289

articles/active-directory/manage-apps/delete-application-portal.md

Lines changed: 42 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -102,22 +102,61 @@ To delete an enterprise application, you need:
102102
Delete an enterprise application using [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
103103
1. To get the list of service principals in your tenant, run the following query.
104104

105-
105+
# [HTTP](#tab/http)
106106
```http
107107
GET https://graph.microsoft.com/v1.0/servicePrincipals
108108
```
109109

110+
# [C#](#tab/csharp)
111+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/csharp/list-serviceprincipal-csharp-snippets.md)]
112+
113+
# [JavaScript](#tab/javascript)
114+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/javascript/list-serviceprincipal-javascript-snippets.md)]
115+
116+
# [Java](#tab/java)
117+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/java/list-serviceprincipal-java-snippets.md)]
118+
119+
# [Go](#tab/go)
120+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/go/list-serviceprincipal-go-snippets.md)]
121+
122+
# [PowerShell](#tab/powershell)
123+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/powershell/list-serviceprincipal-powershell-snippets.md)]
124+
125+
# [PHP](#tab/php)
126+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/php/list-serviceprincipal-php-snippets.md)]
127+
128+
---
129+
110130
1. Record the ID of the enterprise app you want to delete.
111131
1. Delete the enterprise application.
112-
132+
133+
# [HTTP](#tab/http)
113134
```http
114135
DELETE https://graph.microsoft.com/v1.0/servicePrincipals/{servicePrincipal-id}
115136
```
116137

138+
# [C#](#tab/csharp)
139+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/csharp/delete-serviceprincipal-csharp-snippets.md)]
140+
141+
# [JavaScript](#tab/javascript)
142+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/javascript/delete-serviceprincipal-javascript-snippets.md)]
143+
144+
# [Java](#tab/java)
145+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/java/delete-serviceprincipal-java-snippets.md)]
146+
147+
# [Go](#tab/go)
148+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/go/delete-serviceprincipal-go-snippets.md)]
149+
150+
# [PowerShell](#tab/powershell)
151+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/powershell/delete-serviceprincipal-powershell-snippets.md)]
152+
153+
# [PHP](#tab/php)
154+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/php/delete-serviceprincipal-php-snippets.md)]
155+
156+
---
117157

118158
:::zone-end
119159

120160
## Next steps
121161

122162
- [Restore a deleted enterprise application](restore-application.md)
123-

articles/active-directory/manage-apps/manage-application-permissions.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -168,27 +168,27 @@ You need to consent to the following permissions:
168168

169169
Run the following queries to review delegated permissions granted to an application.
170170

171-
1. Get Service Principal using objectID
171+
1. Get service principal using the object ID.
172172

173173
```http
174-
GET /servicePrincipals/{id}
174+
GET https://graph.microsoft.com/v1.0/servicePrincipals/{id}
175175
```
176176
177177
Example:
178178
179179
```http
180-
GET /servicePrincipals/57443554-98f5-4435-9002-852986eea510
180+
GET https://graph.microsoft.com/v1.0/servicePrincipals/00063ffc-54e9-405d-b8f3-56124728e051
181181
```
182182
183183
1. Get all delegated permissions for the service principal
184184
185185
```http
186-
GET /servicePrincipals/{id}/oauth2PermissionGrants
186+
GET https://graph.microsoft.com/v1.0/servicePrincipals/{id}/oauth2PermissionGrants
187187
```
188188
1. Remove delegated permissions using oAuth2PermissionGrants ID.
189189
190190
```http
191-
DELETE /oAuth2PermissionGrants/{id}
191+
DELETE https://graph.microsoft.com/v1.0/oAuth2PermissionGrants/{id}
192192
```
193193
194194
### Application permissions
@@ -198,12 +198,12 @@ Run the following queries to review application permissions granted to an applic
198198
1. Get all application permissions for the service principal
199199
200200
```http
201-
GET /servicePrincipals/{servicePrincipal-id}/appRoleAssignments
201+
GET https://graph.microsoft.com/v1.0/servicePrincipals/{servicePrincipal-id}/appRoleAssignments
202202
```
203203
1. Remove application permissions using appRoleAssignment ID
204204
205205
```http
206-
DELETE /servicePrincipals/{resource-servicePrincipal-id}/appRoleAssignedTo/{appRoleAssignment-id}
206+
DELETE https://graph.microsoft.com/v1.0/servicePrincipals/{resource-servicePrincipal-id}/appRoleAssignedTo/{appRoleAssignment-id}
207207
```
208208
209209
## Invalidate the refresh tokens
@@ -213,22 +213,22 @@ Run the following queries to remove appRoleAssignments of users or groups to the
213213
1. Get Service Principal using objectID.
214214
215215
```http
216-
GET /servicePrincipals/{id}
216+
GET https://graph.microsoft.com/v1.0/servicePrincipals/{id}
217217
```
218218
Example:
219219
220220
```http
221-
GET /servicePrincipals/57443554-98f5-4435-9002-852986eea510
221+
GET https://graph.microsoft.com/v1.0/servicePrincipals/57443554-98f5-4435-9002-852986eea510
222222
```
223223
1. Get Azure AD App role assignments using objectID of the Service Principal.
224224
225225
```http
226-
GET /servicePrincipals/{servicePrincipal-id}/appRoleAssignedTo
226+
GET https://graph.microsoft.com/v1.0/servicePrincipals/{servicePrincipal-id}/appRoleAssignedTo
227227
```
228228
1. Revoke refresh token for users and groups assigned to the application using appRoleAssignment ID.
229229
230230
```http
231-
DELETE /servicePrincipals/{servicePrincipal-id}/appRoleAssignedTo/{appRoleAssignment-id}
231+
DELETE https://graph.microsoft.com/v1.0/servicePrincipals/{servicePrincipal-id}/appRoleAssignedTo/{appRoleAssignment-id}
232232
```
233233
:::zone-end
234234

articles/active-directory/manage-apps/restore-application.md

Lines changed: 48 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ To recover your enterprise application with its previous configurations, first d
5656
Get-AzureADMSDeletedDirectoryObject -Id <id>
5757
```
5858

59-
Replace id with the object ID of the service principal that you want to restore.
59+
Replace ID with the object ID of the service principal that you want to restore.
6060

6161
:::zone-end
6262

@@ -69,7 +69,7 @@ Replace id with the object ID of the service principal that you want to restore.
6969
```powershell
7070
Get-MgDirectoryDeletedItem -DirectoryObjectId <id>
7171
```
72-
Replace id with the object ID of the service principal that you want to restore.
72+
Replace ID with the object ID of the service principal that you want to restore.
7373

7474
:::zone-end
7575

@@ -101,7 +101,7 @@ Alternatively, if you want to get the specific enterprise application that was d
101101
Restore-AzureADMSDeletedDirectoryObject -Id <id>
102102
```
103103

104-
Replace id with the object ID of the service principal that you want to restore.
104+
Replace ID with the object ID of the service principal that you want to restore.
105105

106106
:::zone-end
107107

@@ -113,19 +113,40 @@ Replace id with the object ID of the service principal that you want to restore.
113113
Restore-MgDirectoryObject -DirectoryObjectId <id>
114114
```
115115

116-
Replace id with the object ID of the service principal that you want to restore.
116+
Replace ID with the object ID of the service principal that you want to restore.
117117

118118
:::zone-end
119119

120120
:::zone pivot="ms-graph"
121121

122122
1. To restore the enterprise application, run the following query:
123123

124+
# [HTTP](#tab/http)
124125
```http
125126
POST https://graph.microsoft.com/v1.0/directory/deletedItems/{id}/restore
126127
```
127128

128-
Replace id with the object ID of the service principal that you want to restore.
129+
# [C#](#tab/csharp)
130+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/csharp/restore-directory-deleteditem-csharp-snippets.md)]
131+
132+
# [JavaScript](#tab/javascript)
133+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/javascript/restore-directory-deleteditem-javascript-snippets.md)]
134+
135+
# [Java](#tab/java)
136+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/java/restore-directory-deleteditem-java-snippets.md)]
137+
138+
# [Go](#tab/go)
139+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/go/restore-directory-deleteditem-go-snippets.md)]
140+
141+
# [PowerShell](#tab/powershell)
142+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/powershell/restore-directory-deleteditem-powershell-snippets.md)]
143+
144+
# [PHP](#tab/php)
145+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/php/restore-directory-deleteditem-php-snippets.md)]
146+
147+
---
148+
149+
Replace ID with the object ID of the service principal that you want to restore.
129150

130151
:::zone-end
131152

@@ -157,10 +178,32 @@ Remove-AzureADMSDeletedDirectoryObject -Id <id>
157178

158179
To permanently delete a soft deleted enterprise application, run the following query in Microsoft Graph explorer
159180

181+
# [HTTP](#tab/http)
160182
```http
161183
DELETE https://graph.microsoft.com/v1.0/directory/deletedItems/{object-id}
162184
```
163185

186+
# [C#](#tab/csharp)
187+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/csharp/delete-directory-deleteditem-csharp-snippets.md)]
188+
189+
# [JavaScript](#tab/javascript)
190+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/javascript/delete-directory-deleteditem-javascript-snippets.md)]
191+
192+
# [Java](#tab/java)
193+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/java/delete-directory-deleteditem-java-snippets.md)]
194+
195+
# [Go](#tab/go)
196+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/go/delete-directory-deleteditem-go-snippets.md)]
197+
198+
# [PowerShell](#tab/powershell)
199+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/powershell/delete-directory-deleteditem-powershell-snippets.md)]
200+
201+
# [PHP](#tab/php)
202+
[!INCLUDE [sample-code](~/microsoft-graph/api-reference/v1.0/includes/snippets/php/delete-directory-deleteditem-php-snippets.md)]
203+
204+
---
205+
206+
164207
:::zone-end
165208

166209
## Next steps

0 commit comments

Comments
 (0)