Skip to content

Commit 4d06055

Browse files
committed
fix blocking and non blocking issues
1 parent c3b273b commit 4d06055

File tree

3 files changed

+18
-24
lines changed

3 files changed

+18
-24
lines changed

articles/active-directory/manage-apps/configure-user-consent-groups.md

Lines changed: 10 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -324,11 +324,11 @@ PATCH https://graph.microsoft.com/beta/settings/{directorySettingId}
324324
:::zone-end
325325

326326
> [!NOTE]
327-
> "User can consent to apps accessing company data on their behalf" setting, when turned off, does not disable the "Users can consent to apps accessing company data for groups they own" option
327+
> **User can consent to apps accessing company data on their behalf** setting, when turned off, doesn't disable the **Users can consent to apps accessing company data for groups they own** option.
328328
329329
## Manage group owner consent to apps by app consent policy
330330

331-
You can configure which users are allowed to consent to apps accessing their groups' or teams' data through app consent policies. To allow group owner consent subject to app consent policies, the group owner consent setting **must** be disabled. Once disabled, your current policy is read from app consent policies.
331+
You can configure which users are allowed to consent to apps accessing their groups' or teams' data through app consent policies. To allow group owner consent subject to app consent policies, the group owner consent setting must be disabled. Once disabled, your current policy is read from app consent policies.
332332

333333
:::zone pivot="ms-powershell"
334334

@@ -348,21 +348,21 @@ Connect-MgGraph -Scopes "Policy.ReadWrite.Authorization"
348348

349349
### Disable group owner consent to use app consent policies
350350

351-
1. check if the `ManagePermissionGrantPoliciesForOwnedResource` is scoped in `group`
351+
1. Check if the `ManagePermissionGrantPoliciesForOwnedResource` is scoped in `group`
352352

353353
1. Retrieve the current value for the group owner consent setting
354354
```powershell
355355
Get-MgPolicyAuthorizationPolicy | select -ExpandProperty DefaultUserRolePermissions | ft PermissionGrantPoliciesAssigned
356356
```
357357
If `ManagePermissionGrantPoliciesForOwnedResource` is returned in `PermissionGrantPoliciesAssigned`, your group owner consent setting **might** have been governed by the app consent policy.
358358
359-
2.Check if the policy is scoped to `group`
359+
1. Check if the policy is scoped to `group`
360360
```powershell
361361
Get-MgPolicyPermissionGrantPolicy -PermissionGrantPolicyId {"microsoft-all-application-permissions-for-group"} | ft AdditionalProperties
362362
```
363363
If `resourceScopeType` == `group`, your group owner consent setting **has been** governed by the app consent policy.
364364
365-
2. To disable group owner consent to utilize app consent policies, ensure that the consent policies (`PermissionGrantPoliciesAssigned`) include the current `ManagePermissionGrantsForSelf.*` policy and other current `ManagePermissionGrantsForOwnedResource.*` policies if any that aren't applicable to groups while updating the collection. This way, you can maintain your current configuration for user consent settings and other resource consent settings.
365+
1. To disable group owner consent to utilize app consent policies, ensure that the consent policies (`PermissionGrantPoliciesAssigned`) include the current `ManagePermissionGrantsForSelf.*` policy and other current `ManagePermissionGrantsForOwnedResource.*` policies if any that aren't applicable to groups while updating the collection. This way, you can maintain your current configuration for user consent settings and other resource consent settings.
366366
367367
```powershell
368368
# only exclude policies that are scoped in group
@@ -419,19 +419,19 @@ Use the [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) t
419419

420420
### Disable group owner consent to use app consent policies
421421

422-
1. check if the `ManagePermissionGrantPoliciesForOwnedResource` is scoped in `group`
422+
1. Check if the `ManagePermissionGrantPoliciesForOwnedResource` is scoped in `group`
423423

424424
1. Retrieve the current value for the group owner consent setting
425425
```http
426426
GET https://graph.microsoft.com/v1.0/policies/authorizationPolicy
427427
```
428-
If `ManagePermissionGrantsForOwnedResource` is returned in `permissionGrantPolicyIdsAssignedToDefaultUserRole`, your group owner consent setting **might** have been governed by the app consent policy.
428+
If `ManagePermissionGrantsForOwnedResource` is returned in `permissionGrantPolicyIdsAssignedToDefaultUserRole`, your group owner consent setting might have been governed by the app consent policy.
429429
430430
2.Check if the policy is scoped to `group`
431431
```http
432432
GET https://graph.microsoft.com/beta/policies/permissionGrantPolicies/{microsoft-all-application-permissions-for-group}
433433
```
434-
If `resourceScopeType` == `group`, your group owner consent setting **has been** governed by the app consent policy.
434+
If `resourceScopeType` == `group`, your group owner consent setting has been governed by the app consent policy.
435435
436436
2. To disable group owner consent to utilize app consent policies, ensure that the consent policies (`PermissionGrantPoliciesAssigned`) include the current `ManagePermissionGrantsForSelf.*` policy and other current `ManagePermissionGrantsForOwnedResource.*` policies if any that aren't applicable to groups. This way, you can maintain your current configuration for user consent settings and other resource consent settings.
437437
```http
@@ -488,15 +488,8 @@ PATCH https://graph.microsoft.com/v1.0/policies/authorizationPolicy
488488

489489
## Next steps
490490

491-
To learn more:
492-
493-
* [Managing group owner consent by app consent policies](manage-group-owner-consent-policies.md)
494-
* [Configure user consent settings](configure-user-consent.md)
495-
* [Configure the admin consent workflow](configure-admin-consent-workflow.md)
496-
* [Learn how to manage consent to applications and evaluate consent requests](manage-consent-requests.md)
497-
* [Grant tenant-wide admin consent to an application](grant-admin-consent.md)
498-
* [Permissions and consent in the Microsoft identity platform](../develop/permissions-consent-overview.md)
491+
- [Manage group owner consent policies](manage-group-owner-consent-policies.md)
499492

500493
To get help or find answers to your questions:
501494

502-
* [Azure AD on Microsoft Q&A](/answers/topics/azure-active-directory.html)
495+
- [Azure AD on Microsoft Q&A](/answers/topics/azure-active-directory.html)

articles/active-directory/manage-apps/manage-app-consent-policies.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -114,10 +114,11 @@ Once the app consent policy has been created, you can [allow user consent](confi
114114

115115
## Delete a custom app consent policy
116116

117-
1. The following shows how you can delete a custom app consent policy.
118-
```powershell
117+
The following cmdlet shows how you can delete a custom app consent policy.
118+
119+
```powershell
119120
Remove-MgPolicyPermissionGrantPolicy -PermissionGrantPolicyId "my-custom-policy"
120-
```
121+
```
121122

122123
:::zone-end
123124

@@ -220,7 +221,7 @@ The following table provides the list of supported conditions for app consent po
220221
| PermissionClassification | The [permission classification](configure-permission-classifications.md) for the permission being granted, or "all" to match with any permission classification (including permissions that aren't classified). Default is "all". |
221222
| PermissionType | The permission type of the permission being granted. Use "application" for application permissions (for example, app roles) or "delegated" for delegated permissions. <br><br>**Note**: The value "delegatedUserConsentable" indicates delegated permissions that haven't been configured by the API publisher to require admin consent. This value may be used in built-in permission grant policies, but can't be used in custom permission grant policies. Required. |
222223
| ResourceApplication | The **AppId** of the resource application (for example, the API) for which a permission is being granted, or "any" to match with any resource application or API. Default is "any". |
223-
| Permissions | The list of permission IDs for the specific permissions to match with, or a list with the single value "all" to match with any permission. Default is the single value "all". <ul><li>Delegated permission IDs can be found in the **OAuth2Permissions** property of the API's ServicePrincipal object.</li><li>Application permission IDs can be found in the **AppRoles** property of the API's ServicePrincipal object.</li></ol> |
224+
| Permissions | The list of permission IDs for the specific permissions to match with, or a list with the single value "all" to match with any permission. Default is the single value "all". <br> - Delegated permission IDs can be found in the **OAuth2Permissions** property of the API's ServicePrincipal object. <br> - Application permission IDs can be found in the **AppRoles** property of the API's ServicePrincipal object. |
224225
| ClientApplicationIds | A list of **AppId** values for the client applications to match with, or a list with the single value "all" to match any client application. Default is the single value "all". |
225226
| ClientApplicationTenantIds | A list of Azure Active Directory tenant IDs in which the client application is registered, or a list with the single value "all" to match with client apps registered in any tenant. Default is the single value "all". |
226227
| ClientApplicationPublisherIds | A list of Microsoft Partner Network (MPN) IDs for [verified publishers](../develop/publisher-verification-overview.md) of the client application, or a list with the single value "all" to match with client apps from any publisher. Default is the single value "all". |

articles/active-directory/manage-apps/manage-group-owner-consent-policies.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ To manage group owner consent policies for applications with Microsoft Graph Pow
5252
Connect-MgGraph -Scopes "Policy.ReadWrite.PermissionGrant"
5353
```
5454

55-
## Retrieve the current value for the Group Owner Consent Policy
55+
## Retrieve the current value for the group owner consent policy
5656

5757
Learn how to verify if your group owner consent setting has been authorized in other ways.
5858

@@ -149,7 +149,7 @@ Once the app consent policy for group has been created, you can [allow group own
149149

150150
To manage group owner consent policies, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) with one of the roles listed in the prerequisite section. You also need to consent to the `Policy.ReadWrite.PermissionGrant` permission.
151151

152-
## Retrieve the current value for the Group Owner Consent Policy
152+
## Retrieve the current value for the group owner consent policy
153153

154154
Learn how to verify if your group owner consent setting has been authorized in other ways.
155155
1. Retrieve the current policy value
@@ -257,7 +257,7 @@ The following table provides the list of supported conditions for group owner co
257257
| PermissionClassification | The [permission classification](configure-permission-classifications.md) for the permission being granted, or "all" to match with any permission classification (including permissions that aren't classified). Default is "all". |
258258
| PermissionType | The permission type of the permission being granted. Use "application" for application permissions (for example, app roles) or "delegated" for delegated permissions. <br><br>**Note**: The value "delegatedUserConsentable" indicates delegated permissions that haven't been configured by the API publisher to require admin consent. This value may be used in built-in permission grant policies, but can't be used in custom permission grant policies. Required. |
259259
| ResourceApplication | The **AppId** of the resource application (for example, the API) for which a permission is being granted, or "any" to match with any resource application or API. Default is "any". |
260-
| Permissions | The list of permission IDs for the specific permissions to match with, or a list with the single value "all" to match with any permission. Default is the single value "all". <ul><li>Delegated permission IDs can be found in the **OAuth2Permissions** property of the API's ServicePrincipal object.</li><li>Application permission IDs can be found in the **AppRoles** property of the API's ServicePrincipal object.</li></ol> |
260+
| Permissions | The list of permission IDs for the specific permissions to match with, or a list with the single value "all" to match with any permission. Default is the single value "all". <br> - Delegated permission IDs can be found in the **OAuth2Permissions** property of the API's ServicePrincipal object.<br> - Application permission IDs can be found in the **AppRoles** property of the API's ServicePrincipal object. |
261261
| ClientApplicationIds | A list of **AppId** values for the client applications to match with, or a list with the single value "all" to match any client application. Default is the single value "all". |
262262
| ClientApplicationTenantIds | A list of Azure Active Directory tenant IDs in which the client application is registered, or a list with the single value "all" to match with client apps registered in any tenant. Default is the single value "all". |
263263
| ClientApplicationPublisherIds | A list of Microsoft Partner Network (MPN) IDs for [verified publishers](../develop/publisher-verification-overview.md) of the client application, or a list with the single value "all" to match with client apps from any publisher. Default is the single value "all". |

0 commit comments

Comments
 (0)