Skip to content

Commit 90294fb

Browse files
Merge pull request #1207 from microsoftgraph/mmainer/mergemaster
chore: add missing descriptions
2 parents 80417f7 + 515bcc1 commit 90294fb

File tree

2 files changed

+48
-2
lines changed

2 files changed

+48
-2
lines changed

permissions/permissions-descriptions.json

Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -630,6 +630,16 @@
630630
"isEnabled": true,
631631
"value": "Group-Conversation.Read.All"
632632
},
633+
{
634+
"adminConsentDescription": "Allows the app to read and update the on-premises sync behavior of groups on behalf of the signed-in user.",
635+
"adminConsentDisplayName": "Read and update the on-premises sync behavior of groups",
636+
"consentDescription": "Allows the app to update the on-premises sync behavior of groups on your behalf.",
637+
"consentDisplayName": "Read and update the on-premises sync behavior of groups",
638+
"id": "37e00479-5776-4659-aecf-4841ec5d590a",
639+
"isAdmin": true,
640+
"isEnabled": true,
641+
"value": "Group-OnPremisesSyncBehavior.ReadWrite.All"
642+
},
633643
{
634644
"adminConsentDescription": "Allow the application to access files explicitly permissioned to the application on behalf of the signed in user. The specific files and the permissions granted will be configured in SharePoint Online or OneDrive.",
635645
"adminConsentDisplayName": "Access selected Files, on behalf of the signed-in user",
@@ -3030,6 +3040,16 @@
30303040
"isEnabled": true,
30313041
"value": "Policy.ReadWrite.CrossTenantAccess"
30323042
},
3043+
{
3044+
"adminConsentDescription": "Allows the app to read and write your organization's M365 cross tenant access capabilities on behalf of the signed-in user.",
3045+
"adminConsentDisplayName": "Read and write your organization's M365 cross tenant access capabilities",
3046+
"consentDescription": "Allows the app to read and write your organization's M365 cross tenant access capabilities on your behalf.",
3047+
"consentDisplayName": "Read and write your organization's M365 cross tenant access capabilities",
3048+
"id": "9ef7463f-1d39-406f-89ea-3483a4645e1c",
3049+
"isAdmin": true,
3050+
"isEnabled": true,
3051+
"value": "Policy.ReadWrite.CrossTenantCapability"
3052+
},
30333053
{
30343054
"adminConsentDescription": "Allows the app to read custom security attribute definitions for the tenant on behalf of a signed in user.",
30353055
"adminConsentDisplayName": "Read custom security attribute definitions",
@@ -6640,6 +6660,19 @@
66406660
"isEnabled": true,
66416661
"value": "Group-Conversation.Read.All"
66426662
},
6663+
{
6664+
"adminConsentDescription": "Allows the app to update the on-premises sync behavior of all groups without a signed-in user.",
6665+
"adminConsentDisplayName": "Read and update the on-premises sync behavior of groups",
6666+
"allowedMemberTypes": [
6667+
"Application"
6668+
],
6669+
"consentDescription": null,
6670+
"consentDisplayName": null,
6671+
"id": "2d9bd318-b883-40be-9df7-63ec4fcdc424",
6672+
"isAdmin": true,
6673+
"isEnabled": true,
6674+
"value": "Group-OnPremisesSyncBehavior.ReadWrite.All"
6675+
},
66436676
{
66446677
"adminConsentDescription": "Allow the application to access a subset of files without a signed in user. The specific files and the permissions granted will be configured in SharePoint Online or OneDrive.",
66456678
"adminConsentDisplayName": "Access selected Files without a signed in user.",
@@ -9741,6 +9774,19 @@
97419774
"isEnabled": true,
97429775
"value": "Policy.ReadWrite.CrossTenantAccess"
97439776
},
9777+
{
9778+
"adminConsentDescription": "Allows the app to read and write your organization's M365 cross tenant access capabilities without a signed-in user.",
9779+
"adminConsentDisplayName": "Read and write your organization's M365 cross tenant access capabilities",
9780+
"allowedMemberTypes": [
9781+
"Application"
9782+
],
9783+
"consentDescription": null,
9784+
"consentDisplayName": null,
9785+
"id": "a6325ae7-2b73-4dbd-abed-fbeacfbf8696",
9786+
"isAdmin": true,
9787+
"isEnabled": true,
9788+
"value": "Policy.ReadWrite.CrossTenantCapability"
9789+
},
97449790
{
97459791
"adminConsentDescription": "Allows the app to read all external items without a signed-in user.",
97469792
"adminConsentDisplayName": "Read all external items",

sample-queries/sample-queries.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1851,7 +1851,7 @@
18511851
"method": "GET",
18521852
"humanName": "list articles",
18531853
"requestUrl": "/beta/security/threatIntelligence/articles",
1854-
"docLink": "https://learn.microsoft.com/en-us/graph/api/security-article-list?view=graph-rest-beta",
1854+
"docLink": "https://learn.microsoft.com/en-us/graph/api/security-threatintelligence-list-articles?view=graph-rest-beta",
18551855
"skipTest": false
18561856
},
18571857
{
@@ -1995,7 +1995,7 @@
19951995
"method": "GET",
19961996
"humanName": "list intelligence profiles",
19971997
"requestUrl": "/beta/security/threatIntelligence/intelProfiles",
1998-
"docLink": "https://learn.microsoft.com/en-us/graph/api/security-intelligenceprofile-list?view=graph-rest-beta",
1998+
"docLink": "https://learn.microsoft.com/en-us/graph/api/security-threatintelligence-list-intelprofiles?view=graph-rest-beta",
19991999
"skipTest": false
20002000
},
20012001
{

0 commit comments

Comments
 (0)