Skip to content

Commit 61f3d79

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-rbac-conditional-access-azure-management-redirect
2 parents eec6565 + 9c0713b commit 61f3d79

17 files changed

+402
-422
lines changed

articles/active-directory/roles/assign-roles-different-scopes.md

Lines changed: 36 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: roles
1010
ms.topic: how-to
11-
ms.date: 09/13/2021
11+
ms.date: 02/04/2022
1212
ms.author: absinh
1313
ms.reviewer: rolyon
1414
ms.custom: it-pro
@@ -93,23 +93,24 @@ Follow these instructions to assign a role using the Microsoft Graph API in [Gra
9393
9494
1. Sign in to the [Graph Explorer](https://aka.ms/ge).
9595
96-
1. Use [List user](/graph/api/user-list) API to get the user.
96+
1. Use [List users](/graph/api/user-list) API to get the user.
9797
98-
```HTTP
99-
GET https://graph.microsoft.com/beta/users?$filter=userPrincipalName eq '[email protected]'
98+
```http
99+
GET https://graph.microsoft.com/v1.0/users?$filter=userPrincipalName eq '[email protected]'
100100
```
101101
102-
1. Use the [List roleDefinitions](/graph/api/rbacapplication-list-roledefinitions) API to get the role you want to assign.
102+
1. Use the [List unifiedRoleDefinitions](/graph/api/rbacapplication-list-roledefinitions) API to get the role you want to assign.
103103
104-
```HTTP
105-
GET https://graph.microsoft.com/beta/rolemanagement/directory/roleDefinitions?$filter=displayName eq 'Billing Administrator'
104+
```http
105+
GET https://graph.microsoft.com/v1.0/rolemanagement/directory/roleDefinitions?$filter=displayName eq 'Billing Administrator'
106106
```
107107
108-
1. Use the [Create roleAssignments](/graph/api/rbacapplication-post-roleassignments) API to assign the role.\
108+
1. Use the [Create unifiedRoleAssignment](/graph/api/rbacapplication-post-roleassignments) API to assign the role.
109109
110-
```HTTP
111-
POST https://graph.microsoft.com/beta/roleManagement/directory/roleAssignments
110+
```http
111+
POST https://graph.microsoft.com/v1.0/roleManagement/directory/roleAssignments
112112
{
113+
"@odata.type": "#microsoft.graph.unifiedRoleAssignment",
113114
"principalId": "<provide objectId of the user obtained above>",
114115
"roleDefinitionId": "<provide templateId of the role obtained above>",
115116
"directoryScopeId": "/"
@@ -190,29 +191,30 @@ Follow these instructions to assign a role at administrative unit scope using th
190191
191192
1. Sign in to the [Graph Explorer](https://aka.ms/ge).
192193
193-
1. Use [List user](/graph/api/user-list) API to get the user.
194+
1. Use [List users](/graph/api/user-list) API to get the user.
194195
195-
```HTTP
196-
GET https://graph.microsoft.com/beta/users?$filter=userPrincipalName eq '[email protected]'
196+
```http
197+
GET https://graph.microsoft.com/v1.0/users?$filter=userPrincipalName eq '[email protected]'
197198
```
198199
199-
1. Use the [List roleDefinitions](/graph/api/rbacapplication-list-roledefinitions) API to get the role you want to assign.
200+
1. Use the [List unifiedRoleDefinitions](/graph/api/rbacapplication-list-roledefinitions) API to get the role you want to assign.
200201
201-
```HTTP
202-
GET https://graph.microsoft.com/beta/rolemanagement/directory/roleDefinitions?$filter=displayName eq 'User Administrator'
202+
```http
203+
GET https://graph.microsoft.com/v1.0/rolemanagement/directory/roleDefinitions?$filter=displayName eq 'User Administrator'
203204
```
204205
205206
1. Use the [List administrativeUnits](/graph/api/administrativeunit-list) API to get the administrative unit you want the role assignment to be scoped to.
206207
207-
```HTTP
208-
GET https://graph.microsoft.com/beta/administrativeUnits?$filter=displayName eq 'Seattle Admin Unit'
208+
```http
209+
GET https://graph.microsoft.com/v1.0/directory/administrativeUnits?$filter=displayName eq 'Seattle Admin Unit'
209210
```
210211
211-
1. Use the [Create roleAssignments](/graph/api/rbacapplication-post-roleassignments) API to assign the role.
212+
1. Use the [Create unifiedRoleAssignment](/graph/api/rbacapplication-post-roleassignments) API to assign the role.
212213
213-
```HTTP
214-
POST https://graph.microsoft.com/beta/roleManagement/directory/roleAssignments
214+
```http
215+
POST https://graph.microsoft.com/v1.0/roleManagement/directory/roleAssignments
215216
{
217+
"@odata.type": "#microsoft.graph.unifiedRoleAssignment",
216218
"principalId": "<provide objectId of the user obtained above>",
217219
"roleDefinitionId": "<provide templateId of the role obtained above>",
218220
"directoryScopeId": "/administrativeUnits/<provide objectId of the admin unit obtained above>"
@@ -304,29 +306,31 @@ Follow these instructions to assign a role at application scope using the Micros
304306
305307
1. Sign in to the [Graph Explorer](https://aka.ms/ge).
306308
307-
1. Use [List user](/graph/api/user-list) API to get the user.
309+
1. Use [List users](/graph/api/user-list) API to get the user.
308310
309-
```HTTP
310-
GET https://graph.microsoft.com/beta/users?$filter=userPrincipalName eq '[email protected]'
311+
```http
312+
GET https://graph.microsoft.com/v1.0/users?$filter=userPrincipalName eq '[email protected]'
311313
```
312314
313-
1. Use the [List roleDefinitions](/graph/api/rbacapplication-list-roledefinitions) API to get the role you want to assign.
315+
1. Use the [List unifiedRoleDefinitions](/graph/api/rbacapplication-list-roledefinitions) API to get the role you want to assign.
314316
315-
```HTTP
316-
GET https://graph.microsoft.com/beta/rolemanagement/directory/roleDefinitions?$filter=displayName eq 'Application Administrator'
317+
```http
318+
GET https://graph.microsoft.com/v1.0/rolemanagement/directory/roleDefinitions?$filter=displayName eq 'Application Administrator'
317319
```
318320
319321
1. Use the [List applications](/graph/api/application-list) API to get the administrative unit you want the role assignment to be scoped to.
320322
321-
```HTTP
322-
GET https://graph.microsoft.com/beta/applications?$filter=displayName eq 'f/128 Filter Photos'
323+
```http
324+
GET https://graph.microsoft.com/v1.0/applications?$filter=displayName eq 'f/128 Filter Photos'
323325
```
324326
325-
1. Use the [Create roleAssignments](/graph/api/rbacapplication-post-roleassignments) API to assign the role.
327+
1. Use the [Create unifiedRoleAssignment](/graph/api/rbacapplication-post-roleassignments) API to assign the role.
328+
329+
```http
330+
POST https://graph.microsoft.com/v1.0/roleManagement/directory/roleAssignments
326331
327-
```HTTP
328-
POST https://graph.microsoft.com/beta/roleManagement/directory/roleAssignments
329332
{
333+
"@odata.type": "#microsoft.graph.unifiedRoleAssignment",
330334
"principalId": "<provide objectId of the user obtained above>",
331335
"roleDefinitionId": "<provide templateId of the role obtained above>",
332336
"directoryScopeId": "/<provide objectId of the app registration obtained above>"

0 commit comments

Comments
 (0)