@pnp/cli-microsoft365 10.3.0-beta.d1b978f → 10.3.0-beta.df85113

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (47) hide show
  1. package/.eslintrc.cjs +1 -0
  2. package/allCommands.json +1 -1
  3. package/allCommandsFull.json +1 -1
  4. package/dist/config.js +2 -1
  5. package/dist/m365/entra/commands/app/app-add.js +3 -0
  6. package/dist/m365/entra/commands/pim/pim-role-assignment-remove.js +186 -0
  7. package/dist/m365/entra/commands/roledefinition/roledefinition-add.js +58 -0
  8. package/dist/m365/entra/commands/roledefinition/roledefinition-set.js +84 -0
  9. package/dist/m365/entra/commands/rolepermission/rolepermission-list.js +42 -0
  10. package/dist/m365/entra/commands.js +4 -0
  11. package/dist/m365/exo/commands/approleassignment/approleassignment-add.js +235 -0
  12. package/dist/m365/exo/commands.js +5 -0
  13. package/dist/m365/outlook/commands/mailbox/mailbox-settings-set.js +163 -0
  14. package/dist/m365/outlook/commands.js +1 -0
  15. package/dist/m365/pp/commands/website/website-get.js +60 -0
  16. package/dist/m365/pp/commands.js +2 -1
  17. package/dist/m365/spe/commands/container/container-activate.js +50 -0
  18. package/dist/m365/spe/commands.js +1 -0
  19. package/dist/m365/spo/commands/folder/folder-roleassignment-add.js +0 -13
  20. package/dist/m365/spo/commands/list/list-defaultvalue-clear.js +184 -0
  21. package/dist/m365/spo/commands/list/list-defaultvalue-remove.js +181 -0
  22. package/dist/m365/spo/commands/list/list-defaultvalue-set.js +210 -0
  23. package/dist/m365/spo/commands.js +3 -0
  24. package/dist/m365/tenant/commands/people/people-pronouns-set.js +46 -0
  25. package/dist/m365/tenant/commands/report/report-settings-set.js +47 -0
  26. package/dist/m365/tenant/commands.js +2 -0
  27. package/dist/utils/customAppScope.js +29 -0
  28. package/dist/utils/entraServicePrincipal.js +46 -0
  29. package/dist/utils/powerPlatform.js +38 -0
  30. package/dist/utils/roleDefinition.js +23 -0
  31. package/dist/utils/validation.js +4 -0
  32. package/docs/docs/cmd/entra/app/app-add.mdx +1 -1
  33. package/docs/docs/cmd/entra/pim/pim-role-assignment-remove.mdx +197 -0
  34. package/docs/docs/cmd/entra/roledefinition/roledefinition-add.mdx +131 -0
  35. package/docs/docs/cmd/entra/roledefinition/roledefinition-set.mdx +64 -0
  36. package/docs/docs/cmd/entra/rolepermission/rolepermission-list.mdx +162 -0
  37. package/docs/docs/cmd/exo/approleassignment/approleassignment-add.mdx +170 -0
  38. package/docs/docs/cmd/outlook/mailbox/mailbox-settings-set.mdx +166 -0
  39. package/docs/docs/cmd/pp/website/website-get.mdx +153 -0
  40. package/docs/docs/cmd/spe/container/container-activate.mdx +34 -0
  41. package/docs/docs/cmd/spo/list/list-defaultvalue-clear.mdx +62 -0
  42. package/docs/docs/cmd/spo/list/list-defaultvalue-remove.mdx +62 -0
  43. package/docs/docs/cmd/spo/list/list-defaultvalue-set.mdx +112 -0
  44. package/docs/docs/cmd/tenant/people/people-pronouns-set.mdx +82 -0
  45. package/docs/docs/cmd/tenant/report/report-settings-set.mdx +32 -0
  46. package/npm-shrinkwrap.json +54 -74
  47. package/package.json +9 -9
@@ -357,6 +357,10 @@ export const validation = {
357
357
  .split(' ')
358
358
  .filter(permission => permission.indexOf('/') < 0);
359
359
  return invalidPermissions.length > 0 ? invalidPermissions : true;
360
+ },
361
+ isValidPowerPagesUrl(url) {
362
+ const powerPagesUrlPattern = /^https:\/\/[a-zA-Z0-9-]+\.powerappsportals\.com$/;
363
+ return powerPagesUrlPattern.test(url);
360
364
  }
361
365
  };
362
366
  //# sourceMappingURL=validation.js.map
@@ -31,7 +31,7 @@ m365 entra appregistration add [options]
31
31
  : Comma-separated list of redirect URIs. Requires `platform` to be specified.
32
32
 
33
33
  `-p, --platform [platform]`
34
- : Platform for which the `redirectUris` should be configured. Allowed values `spa`, `web`, `publicClient`.
34
+ : Platform for which the `redirectUris` should be configured. Allowed values `spa`, `web`, `publicClient`. Requires `redirectUris` to be specified.
35
35
 
36
36
  `--implicitFlow`
37
37
  : Specify, to indicate that the authorization endpoint should return ID and access tokens.
@@ -0,0 +1,197 @@
1
+ import Global from '/docs/cmd/_global.mdx';
2
+ import Tabs from '@theme/Tabs';
3
+ import TabItem from '@theme/TabItem';
4
+
5
+ # entra pim role assignment remove
6
+
7
+ Request deactivation of an Entra role assignment for a user or group.
8
+
9
+ ## Usage
10
+
11
+ ```sh
12
+ m365 entra pim role assignment remove [options]
13
+ ```
14
+
15
+ ## Options
16
+
17
+ ```md definition-list
18
+ `-n, --roleDefinitionName [roleDefinitionName]`
19
+ : Name of the role definition that should be assigned. Specify either `roleDefinitionName` or `roleDefinitionId` but not both.
20
+
21
+ `-i, --roleDefinitionId [roleDefinitionId]`
22
+ : Id of the role definition that is being assigned. Specify either `roleDefinitionName` or `roleDefinitionId` but not both.
23
+
24
+ `--userId [userId]`
25
+ : Id of the user that will be granted the assignment. Specify either `userId`, `userName`, `groupId` or `groupName`. If not specified, the current user will be used.
26
+
27
+ `--userName [userName]`
28
+ : UPN of the user that will be granted the assignment. Specify either `userId`, `userName`, `groupId` or `groupName`. If not specified, the current user will be used.
29
+
30
+ `--groupId [groupId]`
31
+ : Id of the group that will be granted the assignment. Specify either `userId`, `userName`, `groupId` or `groupName`. If not specified, the current user will be used.
32
+
33
+ `--groupName [groupName]`
34
+ : Display name of the group that will be granted the assignment. Specify either `userId`, `userName`, `groupId` or `groupName`. If not specified, the current user will be used.
35
+
36
+ `--administrativeUnitId [administrativeUnitId]`
37
+ : Id of the administrative unit representing the scope of the assignment. Specify either `administrativeUnitId` or `applicationId`. If not specified, default scope will be tenant-wide.
38
+
39
+ `--applicationId [applicationId]`
40
+ : Object Id of the application representing the scope of the assignment. Specify either `administrativeUnitId` or `applicationId`. If not specified, default scope will be tenant-wide.
41
+
42
+ `-j, --justification [justification]`
43
+ : An optional justification message.
44
+
45
+ `--ticketNumber [ticketNumber]`
46
+ : Optional ticket number value to communicate with the request.
47
+
48
+ `--ticketSystem [ticketSystem]`
49
+ : Optional ticket system to communicate with the request.
50
+ ```
51
+
52
+ <Global />
53
+
54
+ ## Remarks
55
+
56
+ :::info
57
+
58
+ When deactivating a role for other users, you must be **Privileged Role Administrator**.
59
+
60
+ :::
61
+
62
+ ## Examples
63
+
64
+ Request deactivation of the SharePoint Administrator Entra role assignment for the current user.
65
+
66
+ ```sh
67
+ m365 entra pim role assignment remove --roleDefinitionName 'SharePoint Administrator'
68
+ ```
69
+
70
+ Request deactivation of an Entra role assignment for the current user.
71
+
72
+ ```sh
73
+ m365 entra pim role assignment remove --roleDefinitionId 'f1417aa3-bf0b-4cc5-a845-a0b2cf11f690'
74
+ ```
75
+
76
+ Request deactivation of an Entra role assignment for the current user with a justification
77
+
78
+ ```sh
79
+ m365 entra pim role assignment remove --roleDefinitionId 'f1417aa3-bf0b-4cc5-a845-a0b2cf11f690' --justification 'Need Global Admin to release application xyz to production'
80
+ ```
81
+
82
+ Request deactivation of an Entra role assignment for a specified user with tenant scope.
83
+
84
+ ```sh
85
+ m365 entra pim role assignment remove --roleDefinitionId 'f1417aa3-bf0b-4cc5-a845-a0b2cf11f690' --userId '3488d6b8-6b2e-41c3-9583-1991205323c2'
86
+ ```
87
+
88
+ Request deactivation of the User Administrator Entra role assignment for a specified group with administrative unit scope.
89
+
90
+ ```sh
91
+ m365 entra pim role assignment remove --roleDefinitionName 'User Administrator' --groupId '3488d6b8-6b2e-41c3-9583-1991205323c2' --administrativeUnitId '03c4c9dc-6f0c-4c4f-a4e6-0c9ed80f54c7'
92
+ ```
93
+
94
+ Request deactivation of the Application Administrator Entra role assignment for a specified group with scope to a specific application.
95
+
96
+ ```sh
97
+ m365 entra pim role assignment remove --roleDefinitionName 'Application Administrator' --groupName 'Applications admins' --applicationId '03c4c9dc-6f0c-4c4f-a4e6-0c9ed80f54c7'
98
+ ```
99
+
100
+ ## Response
101
+
102
+ <Tabs>
103
+ <TabItem value="JSON">
104
+
105
+ ```json
106
+ {
107
+ "id": "3f7d1bd6-a9a5-45bc-b831-00cfa3e3c649",
108
+ "status": "Revoked",
109
+ "createdDateTime": "2024-07-30T12:08:29.7734603Z",
110
+ "completedDateTime": null,
111
+ "approvalId": null,
112
+ "customData": null,
113
+ "action": "adminRemove",
114
+ "principalId": "61b0c52f-a902-4769-9a09-c6628335b00a",
115
+ "roleDefinitionId": "f28a1f50-f6e7-4571-818b-6a12f2af6b6c",
116
+ "directoryScopeId": "/",
117
+ "appScopeId": null,
118
+ "isValidationOnly": false,
119
+ "targetScheduleId": null,
120
+ "justification": "Removing SharePoint Administrator role",
121
+ "createdBy": {
122
+ "application": null,
123
+ "device": null,
124
+ "user": {
125
+ "displayName": null,
126
+ "id": "893f9116-e024-4bc6-8e98-54c245129485"
127
+ }
128
+ },
129
+ "scheduleInfo": null,
130
+ "ticketInfo": {
131
+ "ticketNumber": null,
132
+ "ticketSystem": null
133
+ }
134
+ }
135
+ ```
136
+
137
+ </TabItem>
138
+ <TabItem value="Text">
139
+
140
+ ```text
141
+ action : adminRemove
142
+ appScopeId : null
143
+ approvalId : null
144
+ completedDateTime: null
145
+ createdBy : null
146
+ createdDateTime : 2024-07-30T12:08:29.7734603Z
147
+ customData : null
148
+ directoryScopeId : /
149
+ id : c221e106-0711-470a-83cf-f8d7cbc51ecd
150
+ isValidationOnly : false
151
+ justification : Removing SharePoint Administrator role
152
+ principalId : 61b0c52f-a902-4769-9a09-c6628335b00a
153
+ roleDefinitionId : f28a1f50-f6e7-4571-818b-6a12f2af6b6c
154
+ scheduleInfo : null
155
+ status : Revoked
156
+ targetScheduleId : c221e106-0711-470a-83cf-f8d7cbc51ecd
157
+ ticketInfo : {"ticketNumber":null,"ticketSystem":null}
158
+ ```
159
+
160
+ </TabItem>
161
+ <TabItem value="CSV">
162
+
163
+ ```csv
164
+ id,status,createdDateTime,completedDateTime,approvalId,customData,action,principalId,roleDefinitionId,directoryScopeId,appScopeId,isValidationOnly,targetScheduleId,justification
165
+ 7d727f44-c2dd-459e-8665-99ce003d12a9,Revoked,2024-07-30T12:08:29.7734603Z,,,,adminRemove,61b0c52f-a902-4769-9a09-c6628335b00a,f28a1f50-f6e7-4571-818b-6a12f2af6b6c,/,,,7d727f44-c2dd-459e-8665-99ce003d12a9,Removing SharePoint Administrator role
166
+ ```
167
+
168
+ </TabItem>
169
+ <TabItem value="Markdown">
170
+
171
+ ```md
172
+ # entra pim roleassignment remove --roleDefinitionId "f28a1f50-f6e7-4571-818b-6a12f2af6b6c" --userId "61b0c52f-a902-4769-9a09-c6628335b00a" --justification "Removing SharePoint Administrator role"
173
+
174
+ Date: 7/30/2024
175
+
176
+ ## 7622802f-648b-4dd9-820f-dccaf8bbbab5
177
+
178
+ Property | Value
179
+ ---------|-------
180
+ id | 7622802f-648b-4dd9-820f-dccaf8bbbab5
181
+ status | Revoked
182
+ createdDateTime | 2024-07-30T12:08:29.7734603Z
183
+ action | adminRemove
184
+ principalId | 61b0c52f-a902-4769-9a09-c6628335b00a
185
+ roleDefinitionId | f28a1f50-f6e7-4571-818b-6a12f2af6b6c
186
+ directoryScopeId | /
187
+ isValidationOnly | false
188
+ targetScheduleId | 7622802f-648b-4dd9-820f-dccaf8bbbab5
189
+ justification | Removing SharePoint Administrator role
190
+ ```
191
+
192
+ </TabItem>
193
+ </Tabs>
194
+
195
+ ## More information
196
+
197
+ - Role assignment request: https://learn.microsoft.com/graph/api/rbacapplication-post-roleassignmentschedulerequests
@@ -0,0 +1,131 @@
1
+ import Global from '/docs/cmd/_global.mdx';
2
+ import Tabs from '@theme/Tabs';
3
+ import TabItem from '@theme/TabItem';
4
+
5
+ # entra roledefinition add
6
+
7
+ Creates a custom Microsoft Entra ID role definition
8
+
9
+ ## Usage
10
+
11
+ ```sh
12
+ m365 entra roledefinition add [options]
13
+ ```
14
+
15
+ ## Options
16
+
17
+ ```md definition-list
18
+ `-n, --displayName <displayName>`
19
+ : The display name for the role definition.
20
+
21
+ `-a, --allowedResourceActions <allowedResourceActions>`
22
+ : Comma-separated list of resource actions allowed for the role.
23
+
24
+ `-d, --description [description]`
25
+ : The description for the role definition.
26
+
27
+ `-e, --enabled [enabled]`
28
+ : Indicates if the role is enabled for the assignment. If not specified, the role is enabled by default.
29
+
30
+ `-v, --version [version]`
31
+ : The version of the role definition.
32
+ ```
33
+
34
+ <Global />
35
+
36
+ ## Remarks
37
+
38
+ Use the `m365 entra rolepermission list --resourceNamespace microsoft.directory` command to get a list of available resource actions.
39
+
40
+ ## Examples
41
+
42
+ Create a custom Microsoft Entra ID role
43
+
44
+ ```sh
45
+ m365 entra roledefinition add --displayName 'Application Remover' --description 'Allows to remove any Entra ID application' --allowedResourceActions 'microsoft.directory/applications/delete'
46
+ ```
47
+
48
+ Create a custom Microsoft Entra ID role, but disable it for the assignment
49
+
50
+ ```sh
51
+ m365 entra roledefinition add --displayName 'Application Remover' --version '1.0' --enabled false --allowedResourceActions 'microsoft.directory/applications/delete,microsoft.directory/applications/owners/update'
52
+ ```
53
+
54
+ ## Response
55
+
56
+ <Tabs>
57
+ <TabItem value="JSON">
58
+
59
+ ```json
60
+ {
61
+ "id": "3844129d-f748-4c03-8165-4412ee9b4ceb",
62
+ "description": null,
63
+ "displayName": "Custom Role",
64
+ "isBuiltIn": false,
65
+ "isEnabled": true,
66
+ "resourceScopes": [
67
+ "/"
68
+ ],
69
+ "templateId": "3844129d-f748-4c03-8165-4412ee9b4ceb",
70
+ "version": "1",
71
+ "rolePermissions": [
72
+ {
73
+ "allowedResourceActions": [
74
+ "microsoft.directory/groups.unified/create",
75
+ "microsoft.directory/groups.unified/delete"
76
+ ],
77
+ "condition": null
78
+ }
79
+ ]
80
+ }
81
+ ```
82
+
83
+ </TabItem>
84
+ <TabItem value="Text">
85
+
86
+ ```text
87
+ description : null
88
+ displayName : Custom Role
89
+ id : 3844129d-f748-4c03-8165-4412ee9b4ceb
90
+ isBuiltIn : false
91
+ isEnabled : true
92
+ resourceScopes : ["/"]
93
+ rolePermissions: [{"allowedResourceActions":["microsoft.directory/groups.unified/create","microsoft.directory/groups.unified/delete"],"condition":null}]
94
+ templateId : 3844129d-f748-4c03-8165-4412ee9b4ceb
95
+ version : 1
96
+ ```
97
+
98
+ </TabItem>
99
+ <TabItem value="CSV">
100
+
101
+ ```csv
102
+ id,description,displayName,isBuiltIn,isEnabled,templateId,version
103
+ 3844129d-f748-4c03-8165-4412ee9b4ceb,,Custom Role,0,1,3844129d-f748-4c03-8165-4412ee9b4ceb,1
104
+ ```
105
+
106
+ </TabItem>
107
+ <TabItem value="Markdown">
108
+
109
+ ```md
110
+ # entra roledefinition add --displayName "Custom Role" --allowedResourceActions "microsoft.directory/groups.unified/create,microsoft.directory/groups.unified/delete" --version 1
111
+
112
+ Date: 12/15/2024
113
+
114
+ ## Custom Role (3844129d-f748-4c03-8165-4412ee9b4ceb)
115
+
116
+ Property | Value
117
+ ---------|-------
118
+ id | 3844129d-f748-4c03-8165-4412ee9b4ceb
119
+ displayName | Custom Role
120
+ isBuiltIn | false
121
+ isEnabled | true
122
+ templateId | 3844129d-f748-4c03-8165-4412ee9b4ceb
123
+ version | 1
124
+ ```
125
+
126
+ </TabItem>
127
+ </Tabs>
128
+
129
+ ## More information
130
+
131
+ - https://learn.microsoft.com/graph/api/rbacapplication-post-roledefinitions
@@ -0,0 +1,64 @@
1
+ import Global from '/docs/cmd/_global.mdx';
2
+
3
+ # entra roledefinition set
4
+
5
+ Updates a custom Microsoft Entra ID role definition
6
+
7
+ ## Usage
8
+
9
+ ```sh
10
+ m365 entra roledefinition set [options]
11
+ ```
12
+
13
+ ## Options
14
+
15
+ ```md definition-list
16
+ `-i, --id [id]`
17
+ : The id of the role definition to be updated. Specify either `id` or `displayName`, but not both.
18
+
19
+ `-n, --displayName [displayName]`
20
+ : The display name of the role definition to be updated. Specify either `id` or `displayName`, but not both.
21
+
22
+ `--newDisplayName [newDisplayName]`
23
+ : Updated display name for the role definition.
24
+
25
+ `-d, --description [description]`
26
+ : Updated description for the role definition.
27
+
28
+ `-e, --enabled [enabled]`
29
+ : Indicates if the role is enabled for the assignment.
30
+
31
+ `a-, --allowedResourceActions [allowedResourceActions]`
32
+ : Updated comma-separated list of resource actions allowed for the role.
33
+
34
+ `-v, --version [version]`
35
+ : Updated version of the role definition.
36
+ ```
37
+
38
+ <Global />
39
+
40
+ ## Remarks
41
+
42
+ Use the `m365 entra rolepermission list --resourceNamespace microsoft.directory` command to get a list of available resource actions.
43
+
44
+ ## Examples
45
+
46
+ Update a custom Microsoft Entra ID role specified by the id
47
+
48
+ ```sh
49
+ m365 entra roledefinition set --id fadbc488-151d-4431-9143-6abbffae759f --newDisplayName 'Application Remover' --description 'Allows to remove any Entra ID application' --allowedResourceActions 'microsoft.directory/applications/delete'
50
+ ```
51
+
52
+ Update a custom Microsoft Entra ID role specified by the display name
53
+
54
+ ```sh
55
+ m365 entra roledefinition set --displayName 'Application Remover' --version '1.0' --enabled true --allowedResourceActions 'microsoft.directory/applications/delete,microsoft.directory/applications/owners/update'
56
+ ```
57
+
58
+ ## Response
59
+
60
+ The command won't return a response on success
61
+
62
+ ## More information
63
+
64
+ - https://learn.microsoft.com/graph/api/rbacapplication-post-roledefinitions
@@ -0,0 +1,162 @@
1
+ import Global from '/docs/cmd/_global.mdx';
2
+ import Tabs from '@theme/Tabs';
3
+ import TabItem from '@theme/TabItem';
4
+
5
+ # entra rolepermission list
6
+
7
+ Lists all Microsoft Entra ID role permissions
8
+
9
+ ## Usage
10
+
11
+ ```sh
12
+ m365 entra rolepermission list [options]
13
+ ```
14
+
15
+ ## Options
16
+
17
+ ```md definition-list
18
+ `-n, --resourceNamespace [resourceNamespace]`
19
+ : The namespace of the resource for which to retrieve role permissions.
20
+
21
+ `-p, --privileged`
22
+ : Retrieve only sensitive role permissions.
23
+ ```
24
+
25
+ <Global />
26
+
27
+ ## Remarks
28
+
29
+ :::warning
30
+
31
+ The command is based on an API that is currently in preview and is subject to change once the API reached general availability.
32
+
33
+ :::
34
+
35
+ ## Examples
36
+
37
+ Get a list of role permissions
38
+
39
+ ```sh
40
+ m365 entra rolepermission list --resourceNamespace 'microsoft.directory'
41
+ ```
42
+
43
+ Get a list of sensitive role permissions
44
+
45
+ ```sh
46
+ m365 entra rolepermission list --resourceNamespace 'microsoft.directory' --privileged
47
+ ```
48
+
49
+ ## Response
50
+
51
+ <Tabs>
52
+ <TabItem value="JSON">
53
+
54
+ ```json
55
+ [
56
+ {
57
+ "actionVerb": null,
58
+ "description": "Create and delete access reviews, and read and update all properties of access reviews in Microsoft Entra ID",
59
+ "id": "microsoft.directory-accessReviews-allProperties-allTasks",
60
+ "isPrivileged": false,
61
+ "name": "microsoft.directory/accessReviews/allProperties/allTasks",
62
+ "resourceScopeId": null
63
+ },
64
+ {
65
+ "actionVerb": "GET",
66
+ "description": "Read all properties of access reviews",
67
+ "id": "microsoft.directory-accessReviews-allProperties-read-get",
68
+ "isPrivileged": false,
69
+ "name": "microsoft.directory/accessReviews/allProperties/read",
70
+ "resourceScopeId": null
71
+ },
72
+ {
73
+ "actionVerb": null,
74
+ "description": "Manage access reviews of application role assignments in Microsoft Entra ID",
75
+ "id": "microsoft.directory-accessReviews-definitions.applications-allProperties-allTasks",
76
+ "isPrivileged": false,
77
+ "name": "microsoft.directory/accessReviews/definitions.applications/allProperties/allTasks",
78
+ "resourceScopeId": null
79
+ },
80
+ {
81
+ "actionVerb": "GET",
82
+ "description": "Read all properties of access reviews of application role assignments in Microsoft Entra ID",
83
+ "id": "microsoft.directory-accessReviews-definitions.applications-allProperties-read-get",
84
+ "isPrivileged": false,
85
+ "name": "microsoft.directory/accessReviews/definitions.applications/allProperties/read",
86
+ "resourceScopeId": null
87
+ }
88
+ ]
89
+ ```
90
+
91
+ </TabItem>
92
+ <TabItem value="Text">
93
+
94
+ ```text
95
+ id name actionVerb isPrivileged
96
+ -------------------------------------------------------------------------------------- --------------------------------------------------------------------------------------- ---------- ------------
97
+ microsoft.directory-accessReviews-allProperties-allTasks microsoft.directory/accessReviews/allProperties/allTasks null false
98
+ microsoft.directory-accessReviews-allProperties-read-get microsoft.directory/accessReviews/allProperties/read GET false
99
+ microsoft.directory-accessReviews-definitions.applications-allProperties-allTasks microsoft.directory/accessReviews/definitions.applications/allProperties/allTasks null false
100
+ microsoft.directory-accessReviews-definitions.applications-allProperties-read-get microsoft.directory/accessReviews/definitions.applications/allProperties/read GET false
101
+ ```
102
+
103
+ </TabItem>
104
+ <TabItem value="CSV">
105
+
106
+ ```csv
107
+ actionVerb,description,id,isPrivileged,name,resourceScopeId
108
+ ,"Create and delete access reviews, and read and update all properties of access reviews in Microsoft Entra ID",microsoft.directory-accessReviews-allProperties-allTasks,0,microsoft.directory/accessReviews/allProperties/allTasks,
109
+ GET,Read all properties of access reviews,microsoft.directory-accessReviews-allProperties-read-get,0,microsoft.directory/accessReviews/allProperties/read,
110
+ ,Manage access reviews of application role assignments in Microsoft Entra ID,microsoft.directory-accessReviews-definitions.applications-allProperties-allTasks,0,microsoft.directory/accessReviews/definitions.applications/allProperties/allTasks,
111
+ GET,Read all properties of access reviews of application role assignments in Microsoft Entra ID,microsoft.directory-accessReviews-definitions.applications-allProperties-read-get,0,microsoft.directory/accessReviews/definitions.applications/allProperties/read,
112
+ ```
113
+
114
+ </TabItem>
115
+ <TabItem value="Markdown">
116
+
117
+ ```md
118
+ # entra rolepermission list --resourceNamespace "microsoft.directory"
119
+
120
+ Date: 1/16/2025
121
+
122
+ ## microsoft.directory/accessReviews/allProperties/allTasks (microsoft.directory-accessReviews-allProperties-allTasks)
123
+
124
+ Property | Value
125
+ ---------|-------
126
+ description | Create and delete access reviews, and read and update all properties of access reviews in Microsoft Entra ID
127
+ id | microsoft.directory-accessReviews-allProperties-allTasks
128
+ isPrivileged | false
129
+ name | microsoft.directory/accessReviews/allProperties/allTasks
130
+
131
+ ## microsoft.directory/accessReviews/allProperties/read (microsoft.directory-accessReviews-allProperties-read-get)
132
+
133
+ Property | Value
134
+ ---------|-------
135
+ actionVerb | GET
136
+ description | Read all properties of access reviews
137
+ id | microsoft.directory-accessReviews-allProperties-read-get
138
+ isPrivileged | false
139
+ name | microsoft.directory/accessReviews/allProperties/read
140
+
141
+ ## microsoft.directory/accessReviews/definitions.applications/allProperties/allTasks (microsoft.directory-accessReviews-definitions.applications-allProperties-allTasks)
142
+
143
+ Property | Value
144
+ ---------|-------
145
+ description | Manage access reviews of application role assignments in Microsoft Entra ID
146
+ id | microsoft.directory-accessReviews-definitions.applications-allProperties-allTasks
147
+ isPrivileged | false
148
+ name | microsoft.directory/accessReviews/definitions.applications/allProperties/allTasks
149
+
150
+ ## microsoft.directory/accessReviews/definitions.applications/allProperties/read (microsoft.directory-accessReviews-definitions.applications-allProperties-read-get)
151
+
152
+ Property | Value
153
+ ---------|-------
154
+ actionVerb | GET
155
+ description | Read all properties of access reviews of application role assignments in Microsoft Entra ID
156
+ id | microsoft.directory-accessReviews-definitions.applications-allProperties-read-get
157
+ isPrivileged | false
158
+ name | microsoft.directory/accessReviews/definitions.applications/allProperties/read
159
+ ```
160
+
161
+ </TabItem>
162
+ </Tabs>