Skip to content

Commit 9048609

Browse files
committed
Minor edits
1 parent da9f7cf commit 9048609

File tree

2 files changed

+20
-20
lines changed

2 files changed

+20
-20
lines changed

articles/active-directory/manage-apps/assign-user-or-group-access-portal.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -243,7 +243,7 @@ $assignments | ForEach-Object {
243243
1. Get the enterprise application. Filter by DisplayName.
244244

245245
```http
246-
GET servicePrincipal?$filter=DisplayName eq '{appDisplayName}'
246+
GET https://graph.microsoft.com/v1.0/servicePrincipals?$filter=displayName eq '{appDisplayName}'
247247
```
248248
Record the following values from the response body:
249249
@@ -253,11 +253,11 @@ $assignments | ForEach-Object {
253253
1. Get the user by filtering by the user's principal name. Record the object ID of the user.
254254
255255
```http
256-
GET /users/{userPrincipalName}
256+
GET https://graph.microsoft.com/v1.0/users/{userPrincipalName}
257257
```
258258
1. Assign the user to the application.
259259
```http
260-
POST /servicePrincipals/resource-servicePrincipal-id/appRoleAssignedTo
260+
POST https://graph.microsoft.com/v1.0/servicePrincipals/{resource-servicePrincipal-id}/appRoleAssignedTo
261261
262262
{
263263
"principalId": "33ad69f9-da99-4bed-acd0-3f24235cb296",
@@ -270,20 +270,20 @@ $assignments | ForEach-Object {
270270
## Unassign users, and groups, from an application
271271
To unassign user and groups from the application, run the following query.
272272
273-
1. Get the enterprise application. Filter by DisplayName.
273+
1. Get the enterprise application. Filter by displayName.
274274
275275
```http
276-
GET servicePrincipal?$filter=DisplayName eq '{appDisplayName}'
276+
GET https://graph.microsoft.com/v1.0/servicePrincipals?$filter=displayName eq '{appDisplayName}'
277277
```
278278
1. Get the list of appRoleAssignments for the application.
279279
280-
```http
281-
GET /servicePrincipals/{id}/appRoleAssignedTo
282-
```
280+
```http
281+
GET https://graph.microsoft.com/v1.0/servicePrincipals/{id}/appRoleAssignedTo
282+
```
283283
1. Remove the appRoleAssignments by specifying the appRoleAssignment ID.
284284
285285
```http
286-
DELETE /servicePrincipals/{resource-servicePrincipal-id}/appRoleAssignedTo/{appRoleAssignment-id}
286+
DELETE https://graph.microsoft.com/v1.0/servicePrincipals/{resource-servicePrincipal-id}/appRoleAssignedTo/{appRoleAssignment-id}
287287
```
288288
:::zone-end
289289

articles/active-directory/manage-apps/manage-application-permissions.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -162,27 +162,27 @@ You'll need to consent to the following permissions:
162162

163163
Run the following queries to review delegated permissions granted to an application.
164164

165-
1. Get Service Principal using objectID
165+
1. Get service principal using the object ID.
166166

167167
```http
168-
GET /servicePrincipals/{id}
168+
GET https://graph.microsoft.com/v1.0/servicePrincipals/{id}
169169
```
170170
171171
Example:
172172
173173
```http
174-
GET /servicePrincipals/57443554-98f5-4435-9002-852986eea510
174+
GET https://graph.microsoft.com/v1.0/servicePrincipals/00063ffc-54e9-405d-b8f3-56124728e051
175175
```
176176
177177
1. Get all delegated permissions for the service principal
178178
179179
```http
180-
GET /servicePrincipals/{id}/oauth2PermissionGrants
180+
GET https://graph.microsoft.com/v1.0/servicePrincipals/{id}/oauth2PermissionGrants
181181
```
182182
1. Remove delegated permissions using oAuth2PermissionGrants ID.
183183
184184
```http
185-
DELETE /oAuth2PermissionGrants/{id}
185+
DELETE https://graph.microsoft.com/v1.0/oAuth2PermissionGrants/{id}
186186
```
187187
188188
### Application permissions
@@ -192,12 +192,12 @@ Run the following queries to review application permissions granted to an applic
192192
1. Get all application permissions for the service principal
193193
194194
```http
195-
GET /servicePrincipals/{servicePrincipal-id}/appRoleAssignments
195+
GET https://graph.microsoft.com/v1.0/servicePrincipals/{servicePrincipal-id}/appRoleAssignments
196196
```
197197
1. Remove application permissions using appRoleAssignment ID
198198
199199
```http
200-
DELETE /servicePrincipals/{resource-servicePrincipal-id}/appRoleAssignedTo/{appRoleAssignment-id}
200+
DELETE https://graph.microsoft.com/v1.0/servicePrincipals/{resource-servicePrincipal-id}/appRoleAssignedTo/{appRoleAssignment-id}
201201
```
202202
203203
## Invalidate the refresh tokens
@@ -207,22 +207,22 @@ Run the following queries to remove appRoleAssignments of users or groups to the
207207
1. Get Service Principal using objectID.
208208
209209
```http
210-
GET /servicePrincipals/{id}
210+
GET https://graph.microsoft.com/v1.0/servicePrincipals/{id}
211211
```
212212
Example:
213213
214214
```http
215-
GET /servicePrincipals/57443554-98f5-4435-9002-852986eea510
215+
GET https://graph.microsoft.com/v1.0/servicePrincipals/57443554-98f5-4435-9002-852986eea510
216216
```
217217
1. Get Azure AD App role assignments using objectID of the Service Principal.
218218
219219
```http
220-
GET /servicePrincipals/{servicePrincipal-id}/appRoleAssignedTo
220+
GET https://graph.microsoft.com/v1.0/servicePrincipals/{servicePrincipal-id}/appRoleAssignedTo
221221
```
222222
1. Revoke refresh token for users and groups assigned to the application using appRoleAssignment ID.
223223
224224
```http
225-
DELETE /servicePrincipals/{servicePrincipal-id}/appRoleAssignedTo/{appRoleAssignment-id}
225+
DELETE https://graph.microsoft.com/v1.0/servicePrincipals/{servicePrincipal-id}/appRoleAssignedTo/{appRoleAssignment-id}
226226
```
227227
:::zone-end
228228

0 commit comments

Comments
 (0)