Skip to content

Commit b40b097

Browse files
Merge pull request #220875 from FaithOmbongi/msgraphPermissionsLinks
Update links to Graph permissions reference
2 parents 2d7c880 + 6b27f7d commit b40b097

8 files changed

+10
-9
lines changed

articles/active-directory/fundamentals/active-directory-ops-guide-auth.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -315,6 +315,7 @@ To avoid this scenario, you should refer to [detect and remediate illicit consen
315315

316316
#### Consent grants recommended reading
317317

318+
- [Overview of Microsoft Graph permissions](/graph/permissions-overview)
318319
- [Microsoft Graph API permissions](/graph/permissions-reference)
319320

320321
### User and group settings

articles/active-directory/fundamentals/service-accounts-governing-azure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ We recommend the following practices for service account privileges.
6161
* [Use OAuth 2.0 scopes](../develop/v2-permissions-and-consent.md) to limit the functionality a service account can access on a resource.
6262
* Service principals and managed identities can use OAuth 2.0 scopes in either a delegated context that is impersonating a signed-on user, or as service account in the application context. In the application context no is signed-on.
6363

64-
* Check the scopes service accounts request for resources to ensure they're appropriate. For example, if an account is requesting Files.ReadWrite.All, evaluate if it actually needs only File.Read.All. For more information on permissions, see to [Microsoft Graph permission reference](/graph/permissions-reference).
64+
* Check the scopes service accounts request for resources to ensure they're appropriate. For example, if an account is requesting Files.ReadWrite.All, evaluate if it actually needs only File.Read.All. For more information on permissions, see the [Overview of Microsoft Graph permissions](/graph/permissions-overview).
6565

6666
* Ensure you trust the developer of the application or API with the access requested to your resources.
6767

articles/active-directory/governance/entitlement-management-catalog-create.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ To require attributes for access requests:
138138
1. If you chose **Built-in**, select an attribute from the dropdown list. If you chose **Directory schema extension**, enter the attribute name in the text box.
139139

140140
> [!NOTE]
141-
> The User.mobilePhone attribute can be updated only for non-administrator users. Learn more at [this website](/graph/permissions-reference#remarks-5).
141+
> The User.mobilePhone attribute is a sensitive property that can be updated only by some administrators. Learn more at [Who can update sensitive user attributes?](/graph/api/resources/users#who-can-update-sensitive-attributes).
142142
143143
1. Select the answer format you want requestors to use for their answer. Answer formats include **short text**, **multiple choice**, and **long text**.
144144

articles/databox-gateway/data-box-gateway-manage-access-power-connectivity-mode.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ When generating the activation key for the device, or performing any operations
6565

6666
You should have `User` access on the Active Directory tenant so you can `Read all directory objects`. A Guest user doesn't have permissions to `Read all directory objects`. If you're a guest, operations like generating an activation key, creating a share on your device, and creating a user will fail.
6767

68-
For more information on how to provide access to users to Microsoft Graph API, see [Microsoft Graph permissions reference](/graph/permissions-reference).
68+
For more information on how to provide access to users to Microsoft Graph API, see [Overview of Microsoft Graph permissions](/graph/permissions-overview).
6969

7070
### Register resource providers
7171

articles/databox-online/azure-stack-edge-gpu-manage-access-power-connectivity-mode.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -145,14 +145,14 @@ To create your Azure Stack Edge / Data Box Gateway, IoT Hub, and Azure Storage r
145145

146146
### Manage Microsoft Graph API permissions
147147

148-
When generating the activation key for the Azure Stack Edge Pro device, or performing any operations that require credentials, you need permissions to Azure Active Directory Graph API. The operations that need credentials could be:
148+
When generating the activation key for the Azure Stack Edge Pro device, or performing any operations that require credentials, you need permissions to the Microsoft Graph API. The operations that need credentials could be:
149149

150150
- Creating a share with an associated storage account.
151151
- Creating a user who can access the shares on the device.
152152

153-
You should have a `User` access on Active Directory tenant as you need to be able to `Read all directory objects`. You can't be a Guest user as they don't have permissions to `Read all directory objects`. If you're a guest, then the operations such as generation of an activation key, creation of a share on your Azure Stack Edge Pro device, creation of a user, configuration of Edge compute role, reset device password will all fail.
153+
You should have a `User` access on the Azure Active Directory tenant as you need to be able to `Read all directory objects`. You can't be a Guest user as they don't have permissions to `Read all directory objects`. If you're a guest, then the operations such as generation of an activation key, creation of a share on your Azure Stack Edge Pro device, creation of a user, configuration of Edge compute role, reset device password will all fail.
154154

155-
For more information on how to provide access to users to Microsoft Graph API, see [Microsoft Graph permissions reference](/graph/permissions-reference).
155+
For more information on how to provide access to users to Microsoft Graph API, see [Overview of Microsoft Graph permissions](/graph/permissions-overview).
156156

157157
### Register resource providers
158158

articles/databox-online/azure-stack-edge-manage-access-power-connectivity-mode.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ When generating the activation key for the Azure Stack Edge Pro FPGA device, or
6565

6666
You should have a `User` access on Active Directory tenant as you need to be able to `Read all directory objects`. You can't be a Guest user as they don't have permissions to `Read all directory objects`. If you're a guest, then the operations such as generation of an activation key, creation of a share on your Azure Stack Edge Pro FPGA device, creation of a user, configuration of Edge compute role, reset device password will all fail.
6767

68-
For more information on how to provide access to users to Microsoft Graph API, see [Microsoft Graph permissions reference](/graph/permissions-reference).
68+
For more information on how to provide access to users to Microsoft Graph API, see [Overview of Microsoft Graph permissions](/graph/permissions-overview).
6969

7070
### Register resource providers
7171

articles/mysql/flexible-server/concepts-azure-ad-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ The following permissions are required to allow the UMI to read from the Microso
7979
- [GroupMember.Read.All](/graph/permissions-reference#group-permissions): Allows access to Azure AD group information.
8080
- [Application.Read.ALL](/graph/permissions-reference#application-resource-permissions): Allows access to Azure AD service principal (application) information.
8181

82-
For guidance about how to grant and use the permissions, refer to [Microsoft Graph permissions](/graph/permissions-reference)
82+
For guidance about how to grant and use the permissions, refer to [Overview of Microsoft Graph permissions](/graph/permissions-overview)
8383

8484
After you grant the permissions to the UMI, they're enabled for all servers or instances created with the UMI assigned as a server identity.
8585

articles/mysql/flexible-server/how-to-azure-ad.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ To create an Azure AD Admin user, follow the following steps.
5555
- [GroupMember.Read.All](/graph/permissions-reference#group-permissions): Allows access to Azure AD group information.
5656
- [Application.Read.ALL](/graph/permissions-reference#application-resource-permissions): Allows access to Azure AD service principal (application) information.
5757

58-
For guidance about how to grant and use the permissions, refer to [Microsoft Graph permissions](/graph/permissions-reference)
58+
For guidance about how to grant and use the permissions, refer to [Overview of Microsoft Graph permissions](/graph/permissions-overview)
5959

6060
After you grant the permissions to the UMI, they're enabled for all servers or instances created with the UMI assigned as a server identity.
6161

0 commit comments

Comments
 (0)