Skip to content

Commit 2a6b660

Browse files
authored
Merge pull request #199127 from FaithOmbongi/20220524-minorFixes
Minor fixes to Microsoft Graph refs in PIM docs
2 parents 0d986a1 + 6c36d36 commit 2a6b660

File tree

3 files changed

+22
-24
lines changed

3 files changed

+22
-24
lines changed

articles/active-directory/roles/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@
5858
href: groups-pim-eligible.md
5959
- name: Assign roles with scope using PowerShell
6060
href: custom-assign-powershell.md
61-
- name: Assign roles using Graph API
61+
- name: Assign roles using Microsoft Graph
6262
href: custom-assign-graph.md
6363
- name: Remove role assignments
6464
items:

articles/active-directory/roles/groups-create-eligible.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ Add-AzureADGroupMember -ObjectId $roleAssignablegroup.Id -RefObjectId $member.Ob
102102
### Create a role-assignable group in Azure AD
103103

104104
```http
105-
POST https://graph.microsoft.com/beta/groups
105+
POST https://graph.microsoft.com/v1.0/groups
106106
{
107107
"description": "This group is assigned to Helpdesk Administrator built-in role of Azure AD.",
108108
"displayName": "Contoso_Helpdesk_Administrators",

articles/active-directory/roles/manage-roles-portal.md

Lines changed: 20 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -156,18 +156,13 @@ If PIM is enabled, you have additional capabilities, such as making a user eligi
156156
$roleAssignmentEligible = Open-AzureADMSPrivilegedRoleAssignmentRequest -ProviderId 'aadRoles' -ResourceId $aadTenant.Id -RoleDefinitionId $roleDefinition.Id -SubjectId $user.objectId -Type 'AdminAdd' -AssignmentState 'Eligible' -schedule $schedule -reason "Review billing info"
157157
```
158158
159-
## Microsoft Graph API
159+
## Microsoft Graph PIM API
160160
161-
Follow these instructions to assign a role using the Microsoft Graph API in [Graph Explorer](https://aka.ms/ge).
161+
Follow these instructions to assign a role using the Microsoft Graph PIM API.
162162
163163
### Assign a role
164164
165-
In this example, a security principal with objectID `f8ca5a85-489a-49a0-b555-0a6d81e56f0d` is assigned the Billing Administrator role (role definition ID `b0f54661-2d74-4c50-afa3-1ec803f12efe`) at tenant scope. If you want to see the list of immutable role template IDs of all built-in roles, see [Azure AD built-in roles](permissions-reference.md).
166-
167-
1. Sign in to the [Graph Explorer](https://aka.ms/ge).
168-
2. Select **POST** as the HTTP method from the dropdown.
169-
3. Select the API version to **v1.0**.
170-
4. Use the [Create unifiedRoleAssignment](/graph/api/rbacapplication-post-roleassignments) API to assign roles. Add following details to the URL and Request Body and select **Run query**.
165+
In this example, a security principal with objectID `f8ca5a85-489a-49a0-b555-0a6d81e56f0d` is assigned the Billing Administrator role (role definition ID `b0f54661-2d74-4c50-afa3-1ec803f12efe`) at tenant scope. To see the list of immutable role template IDs of all built-in roles, see [Azure AD built-in roles](permissions-reference.md).
171166
172167
```http
173168
POST https://graph.microsoft.com/v1.0/roleManagement/directory/roleAssignments
@@ -183,69 +178,72 @@ Content-type: application/json
183178

184179
### Assign a role using PIM
185180

186-
In this example, a security principal with objectID `f8ca5a85-489a-49a0-b555-0a6d81e56f0d` is assigned a time-bound eligible role assignment to Billing Administrator (role definition ID `b0f54661-2d74-4c50-afa3-1ec803f12efe`) for 180 days.
181+
#### Assign a time-bound eligible role assignment
187182

188-
1. Sign in to the [Graph Explorer](https://aka.ms/ge).
189-
2. Select **POST** as the HTTP method from the dropdown.
190-
3. Select the API version to **beta**.
191-
4. Use the [Create unifiedRoleEligibilityScheduleRequest](/graph/api/unifiedroleeligibilityschedulerequest-post-unifiedroleeligibilityschedulerequests) API to assign roles using PIM. Add following details to the URL and Request Body and select **Run query**.
183+
In this example, a security principal with objectID `f8ca5a85-489a-49a0-b555-0a6d81e56f0d` is assigned a time-bound eligible role assignment to Billing Administrator (role definition ID `b0f54661-2d74-4c50-afa3-1ec803f12efe`) for 180 days.
192184

193185
```http
194-
POST https://graph.microsoft.com/beta/rolemanagement/directory/roleEligibilityScheduleRequests
186+
POST https://graph.microsoft.com/v1.0/rolemanagement/directory/roleEligibilityScheduleRequests
195187
Content-type: application/json
196188
197189
{
198-
"action": "AdminAssign",
190+
"action": "adminAssign",
199191
"justification": "for managing admin tasks",
200192
"directoryScopeId": "/",
201193
"principalId": "f8ca5a85-489a-49a0-b555-0a6d81e56f0d",
202194
"roleDefinitionId": "b0f54661-2d74-4c50-afa3-1ec803f12efe",
203195
"scheduleInfo": {
204196
"startDateTime": "2021-07-15T19:15:08.941Z",
205197
"expiration": {
206-
"type": "AfterDuration",
198+
"type": "afterDuration",
207199
"duration": "PT180D"
208200
}
209201
}
210202
}
211203
```
212204

205+
#### Assign a permanent eligible role assignment
206+
213207
In the following example, a security principal is assigned a permanent eligible role assignment to Billing Administrator.
214208

215209
```http
216-
POST https://graph.microsoft.com/beta/rolemanagement/directory/roleEligibilityScheduleRequests
210+
POST https://graph.microsoft.com/v1.0/rolemanagement/directory/roleEligibilityScheduleRequests
217211
Content-type: application/json
218212
219213
{
220-
"action": "AdminAssign",
214+
"action": "adminAssign",
221215
"justification": "for managing admin tasks",
222216
"directoryScopeId": "/",
223217
"principalId": "f8ca5a85-489a-49a0-b555-0a6d81e56f0d",
224218
"roleDefinitionId": "b0f54661-2d74-4c50-afa3-1ec803f12efe",
225219
"scheduleInfo": {
226220
"startDateTime": "2021-07-15T19:15:08.941Z",
227221
"expiration": {
228-
"type": "NoExpiration"
222+
"type": "noExpiration"
229223
}
230224
}
231225
}
232226
```
233227

234-
To activate the role assignment, use the [Create unifiedRoleAssignmentScheduleRequest](/graph/api/unifiedroleassignmentschedulerequest-post-unifiedroleassignmentschedulerequests) API.
228+
#### Activate a role assignment
229+
230+
To activate the role assignment, use the [Create roleAssignmentScheduleRequests](/graph/api/rbacapplication-post-roleeligibilityschedulerequests) API.
235231

236232
```http
237-
POST https://graph.microsoft.com/beta/roleManagement/directory/roleAssignmentScheduleRequests
233+
POST https://graph.microsoft.com/v1.0/roleManagement/directory/roleAssignmentScheduleRequests
238234
Content-type: application/json
239235
240236
{
241-
"action": "SelfActivate",
237+
"action": "selfActivate",
242238
"justification": "activating role assignment for admin privileges",
243239
"roleDefinitionId": "b0f54661-2d74-4c50-afa3-1ec803f12efe",
244240
"directoryScopeId": "/",
245241
"principalId": "f8ca5a85-489a-49a0-b555-0a6d81e56f0d"
246242
}
247243
```
248244

245+
For more information about managing Azure AD roles through the PIM API in Microsoft Graph, see [Overview of role management through the privileged identity management (PIM) API](/graph/api/resources/privilegedidentitymanagementv3-overview).
246+
249247
## Next steps
250248

251249
- [List Azure AD role assignments](view-assignments.md)

0 commit comments

Comments
 (0)