Skip to content

Commit 7bfcb81

Browse files
committed
renaming
1 parent 877b801 commit 7bfcb81

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

articles/active-directory/multi-tenant-organizations/cross-tenant-synchronization-configure-graph.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -75,8 +75,8 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
7575

7676
1. Get the tenant ID of the source and target tenants. The example configuration described in this article uses the following tenant IDs:
7777

78-
- Source tenant ID: {source-targetId}
79-
- Target tenant ID: {target-targetId}
78+
- Source tenant ID: {source-tenant-id}
79+
- Target tenant ID: {target-tenant-id}
8080

8181
## Step 2: Enable user synchronization in the target tenant
8282

@@ -91,7 +91,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
9191
Content-Type: application/json
9292
9393
{
94-
"tenantId": "{source-targetId}"
94+
"tenantId": "{source-tenant-id}"
9595
}
9696
```
9797
@@ -103,7 +103,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
103103
104104
{
105105
"@odata.context": "https://graph.microsoft.com/beta/$metadata#policies/crossTenantAccessPolicy/partners/$entity",
106-
"tenantId": "{source-targetId}",
106+
"tenantId": "{source-tenant-id}",
107107
"isServiceProvider": null,
108108
"inboundTrust": null,
109109
"b2bCollaborationOutbound": null,
@@ -129,7 +129,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
129129
**Request**
130130
131131
```http
132-
PUT https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners/{source-targetId}/identitySynchronization
132+
PUT https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners/{source-tenant-id}/identitySynchronization
133133
Content-type: application/json
134134
135135
{
@@ -156,7 +156,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
156156
**Request**
157157
158158
```http
159-
PATCH https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners/{source-targetId}
159+
PATCH https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners/{source-tenant-id}
160160
Content-Type: application/json
161161
162162
{
@@ -187,7 +187,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
187187
Content-Type: application/json
188188
189189
{
190-
"tenantId": "{target-targetId}"
190+
"tenantId": "{target-tenant-id}"
191191
}
192192
```
193193
@@ -199,7 +199,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
199199
200200
{
201201
"@odata.context": "https://graph.microsoft.com/beta/$metadata#policies/crossTenantAccessPolicy/partners/$entity",
202-
"tenantId": "{target-targetId}",
202+
"tenantId": "{target-tenant-id}",
203203
"isServiceProvider": null,
204204
"inboundTrust": null,
205205
"b2bCollaborationOutbound": null,
@@ -225,7 +225,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
225225
**Request**
226226
227227
```http
228-
PATCH https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners/{target-targetId}
228+
PATCH https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners/{target-tenant-id}
229229
Content-Type: application/json
230230
231231
{
@@ -290,7 +290,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
290290
"appId": "{appId}",
291291
"appDisplayName": "Fabrikam",
292292
"applicationTemplateId": "518e5f48-1fc8-4c48-9387-9fdf28b0dfe7",
293-
"appOwnerTenantId": "{target-targetId}",
293+
"appOwnerTenantId": "{target-tenant-id}",
294294
"appRoleAssignmentRequired": true,
295295
"displayName": "Fabrikam",
296296
"errorUrl": null,
@@ -342,7 +342,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
342342
"credentials": [
343343
{
344344
"key": "CompanyId",
345-
"value": "{target-targetId}"
345+
"value": "{target-tenant-id}"
346346
},
347347
{
348348
"key": "AuthenticationType",
@@ -439,7 +439,7 @@ In the source tenant, to enable provisioning, create a provisioning job.
439439
"value": [
440440
{
441441
"key": "CompanyId",
442-
"value": "{target-targetId}"
442+
"value": "{target-tenant-id}"
443443
},
444444
{
445445
"key": "AuthenticationType",
@@ -645,7 +645,7 @@ Now that you have a configuration, you can test on-demand provisioning with one
645645
{
646646
"id": "{id}",
647647
"activityDateTime": "2022-12-11T00:40:37Z",
648-
"tenantId": "{target-targetId}",
648+
"tenantId": "{target-tenant-id}",
649649
"jobId": "{jobId}",
650650
"cycleId": "{cycleId}",
651651
"changeId": "{changeId}",

0 commit comments

Comments
 (0)