@@ -75,8 +75,8 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
75
75
76
76
1 . Get the tenant ID of the source and target tenants. The example configuration described in this article uses the following tenant IDs:
77
77
78
- - Source tenant ID: 3d0f5dec-5d3d-455c-8016-e2af1ae4d31a
79
- - Target tenant ID: 376a1f89-b02f-4a85-8252-2974d1984d14
78
+ - Source tenant ID: {sourceTenantId}
79
+ - Target tenant ID: {targetTenantId}
80
80
81
81
## Step 2: Enable user synchronization in the target tenant
82
82
@@ -91,7 +91,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
91
91
Content-Type: application/json
92
92
93
93
{
94
- "tenantId": "3d0f5dec-5d3d-455c-8016-e2af1ae4d31a "
94
+ "tenantId": "{sourceTenantId} "
95
95
}
96
96
```
97
97
@@ -103,7 +103,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
103
103
104
104
{
105
105
"@odata.context": "https://graph.microsoft.com/beta/$metadata#policies/crossTenantAccessPolicy/partners/$entity",
106
- "tenantId": "3d0f5dec-5d3d-455c-8016-e2af1ae4d31a ",
106
+ "tenantId": "{sourceTenantId} ",
107
107
"isServiceProvider": null,
108
108
"inboundTrust": null,
109
109
"b2bCollaborationOutbound": null,
@@ -129,7 +129,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
129
129
**Request**
130
130
131
131
```http
132
- PUT https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners/3d0f5dec-5d3d-455c-8016-e2af1ae4d31a /identitySynchronization
132
+ PUT https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners/{sourceTenantId} /identitySynchronization
133
133
Content-type: application/json
134
134
135
135
{
@@ -156,7 +156,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
156
156
**Request**
157
157
158
158
```http
159
- PATCH https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners/3d0f5dec-5d3d-455c-8016-e2af1ae4d31a
159
+ PATCH https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners/{sourceTenantId}
160
160
Content-Type: application/json
161
161
162
162
{
@@ -187,7 +187,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
187
187
Content-Type: application/json
188
188
189
189
{
190
- "tenantId": "376a1f89-b02f-4a85-8252-2974d1984d14 "
190
+ "tenantId": "{targetTenantId} "
191
191
}
192
192
```
193
193
@@ -199,7 +199,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
199
199
200
200
{
201
201
"@odata.context": "https://graph.microsoft.com/beta/$metadata#policies/crossTenantAccessPolicy/partners/$entity",
202
- "tenantId": "376a1f89-b02f-4a85-8252-2974d1984d14 ",
202
+ "tenantId": "{targetTenantId} ",
203
203
"isServiceProvider": null,
204
204
"inboundTrust": null,
205
205
"b2bCollaborationOutbound": null,
@@ -225,7 +225,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
225
225
**Request**
226
226
227
227
```http
228
- PATCH https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners/376a1f89-b02f-4a85-8252-2974d1984d14
228
+ PATCH https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners/{targetTenantId}
229
229
Content-Type: application/json
230
230
231
231
{
@@ -290,7 +290,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
290
290
"appId": "{appId}",
291
291
"appDisplayName": "Fabrikam",
292
292
"applicationTemplateId": "518e5f48-1fc8-4c48-9387-9fdf28b0dfe7",
293
- "appOwnerTenantId": "376a1f89-b02f-4a85-8252-2974d1984d14 ",
293
+ "appOwnerTenantId": "{targetTenantId} ",
294
294
"appRoleAssignmentRequired": true,
295
295
"displayName": "Fabrikam",
296
296
"errorUrl": null,
@@ -342,7 +342,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
342
342
"credentials": [
343
343
{
344
344
"key": "CompanyId",
345
- "value": "376a1f89-b02f-4a85-8252-2974d1984d14 "
345
+ "value": "{targetTenantId} "
346
346
},
347
347
{
348
348
"key": "AuthenticationType",
@@ -439,7 +439,7 @@ In the source tenant, to enable provisioning, create a provisioning job.
439
439
"value": [
440
440
{
441
441
"key": "CompanyId",
442
- "value": "376a1f89-b02f-4a85-8252-2974d1984d14 "
442
+ "value": "{targetTenantId} "
443
443
},
444
444
{
445
445
"key": "AuthenticationType",
@@ -645,7 +645,7 @@ Now that you have a configuration, you can test on-demand provisioning with one
645
645
{
646
646
"id": "{id}",
647
647
"activityDateTime": "2022-12-11T00:40:37Z",
648
- "tenantId": "376a1f89-b02f-4a85-8252-2974d1984d14 ",
648
+ "tenantId": "{targetTenantId} ",
649
649
"jobId": "{jobId}",
650
650
"cycleId": "{cycleId}",
651
651
"changeId": "{changeId}",
0 commit comments