@pnp/cli-microsoft365 10.3.0-beta.d1b978f → 10.3.0-beta.df85113
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.eslintrc.cjs +1 -0
- package/allCommands.json +1 -1
- package/allCommandsFull.json +1 -1
- package/dist/config.js +2 -1
- package/dist/m365/entra/commands/app/app-add.js +3 -0
- package/dist/m365/entra/commands/pim/pim-role-assignment-remove.js +186 -0
- package/dist/m365/entra/commands/roledefinition/roledefinition-add.js +58 -0
- package/dist/m365/entra/commands/roledefinition/roledefinition-set.js +84 -0
- package/dist/m365/entra/commands/rolepermission/rolepermission-list.js +42 -0
- package/dist/m365/entra/commands.js +4 -0
- package/dist/m365/exo/commands/approleassignment/approleassignment-add.js +235 -0
- package/dist/m365/exo/commands.js +5 -0
- package/dist/m365/outlook/commands/mailbox/mailbox-settings-set.js +163 -0
- package/dist/m365/outlook/commands.js +1 -0
- package/dist/m365/pp/commands/website/website-get.js +60 -0
- package/dist/m365/pp/commands.js +2 -1
- package/dist/m365/spe/commands/container/container-activate.js +50 -0
- package/dist/m365/spe/commands.js +1 -0
- package/dist/m365/spo/commands/folder/folder-roleassignment-add.js +0 -13
- package/dist/m365/spo/commands/list/list-defaultvalue-clear.js +184 -0
- package/dist/m365/spo/commands/list/list-defaultvalue-remove.js +181 -0
- package/dist/m365/spo/commands/list/list-defaultvalue-set.js +210 -0
- package/dist/m365/spo/commands.js +3 -0
- package/dist/m365/tenant/commands/people/people-pronouns-set.js +46 -0
- package/dist/m365/tenant/commands/report/report-settings-set.js +47 -0
- package/dist/m365/tenant/commands.js +2 -0
- package/dist/utils/customAppScope.js +29 -0
- package/dist/utils/entraServicePrincipal.js +46 -0
- package/dist/utils/powerPlatform.js +38 -0
- package/dist/utils/roleDefinition.js +23 -0
- package/dist/utils/validation.js +4 -0
- package/docs/docs/cmd/entra/app/app-add.mdx +1 -1
- package/docs/docs/cmd/entra/pim/pim-role-assignment-remove.mdx +197 -0
- package/docs/docs/cmd/entra/roledefinition/roledefinition-add.mdx +131 -0
- package/docs/docs/cmd/entra/roledefinition/roledefinition-set.mdx +64 -0
- package/docs/docs/cmd/entra/rolepermission/rolepermission-list.mdx +162 -0
- package/docs/docs/cmd/exo/approleassignment/approleassignment-add.mdx +170 -0
- package/docs/docs/cmd/outlook/mailbox/mailbox-settings-set.mdx +166 -0
- package/docs/docs/cmd/pp/website/website-get.mdx +153 -0
- package/docs/docs/cmd/spe/container/container-activate.mdx +34 -0
- package/docs/docs/cmd/spo/list/list-defaultvalue-clear.mdx +62 -0
- package/docs/docs/cmd/spo/list/list-defaultvalue-remove.mdx +62 -0
- package/docs/docs/cmd/spo/list/list-defaultvalue-set.mdx +112 -0
- package/docs/docs/cmd/tenant/people/people-pronouns-set.mdx +82 -0
- package/docs/docs/cmd/tenant/report/report-settings-set.mdx +32 -0
- package/npm-shrinkwrap.json +54 -74
- package/package.json +9 -9
package/dist/utils/validation.js
CHANGED
|
@@ -357,6 +357,10 @@ export const validation = {
|
|
|
357
357
|
.split(' ')
|
|
358
358
|
.filter(permission => permission.indexOf('/') < 0);
|
|
359
359
|
return invalidPermissions.length > 0 ? invalidPermissions : true;
|
|
360
|
+
},
|
|
361
|
+
isValidPowerPagesUrl(url) {
|
|
362
|
+
const powerPagesUrlPattern = /^https:\/\/[a-zA-Z0-9-]+\.powerappsportals\.com$/;
|
|
363
|
+
return powerPagesUrlPattern.test(url);
|
|
360
364
|
}
|
|
361
365
|
};
|
|
362
366
|
//# sourceMappingURL=validation.js.map
|
|
@@ -31,7 +31,7 @@ m365 entra appregistration add [options]
|
|
|
31
31
|
: Comma-separated list of redirect URIs. Requires `platform` to be specified.
|
|
32
32
|
|
|
33
33
|
`-p, --platform [platform]`
|
|
34
|
-
: Platform for which the `redirectUris` should be configured. Allowed values `spa`, `web`, `publicClient`.
|
|
34
|
+
: Platform for which the `redirectUris` should be configured. Allowed values `spa`, `web`, `publicClient`. Requires `redirectUris` to be specified.
|
|
35
35
|
|
|
36
36
|
`--implicitFlow`
|
|
37
37
|
: Specify, to indicate that the authorization endpoint should return ID and access tokens.
|
|
@@ -0,0 +1,197 @@
|
|
|
1
|
+
import Global from '/docs/cmd/_global.mdx';
|
|
2
|
+
import Tabs from '@theme/Tabs';
|
|
3
|
+
import TabItem from '@theme/TabItem';
|
|
4
|
+
|
|
5
|
+
# entra pim role assignment remove
|
|
6
|
+
|
|
7
|
+
Request deactivation of an Entra role assignment for a user or group.
|
|
8
|
+
|
|
9
|
+
## Usage
|
|
10
|
+
|
|
11
|
+
```sh
|
|
12
|
+
m365 entra pim role assignment remove [options]
|
|
13
|
+
```
|
|
14
|
+
|
|
15
|
+
## Options
|
|
16
|
+
|
|
17
|
+
```md definition-list
|
|
18
|
+
`-n, --roleDefinitionName [roleDefinitionName]`
|
|
19
|
+
: Name of the role definition that should be assigned. Specify either `roleDefinitionName` or `roleDefinitionId` but not both.
|
|
20
|
+
|
|
21
|
+
`-i, --roleDefinitionId [roleDefinitionId]`
|
|
22
|
+
: Id of the role definition that is being assigned. Specify either `roleDefinitionName` or `roleDefinitionId` but not both.
|
|
23
|
+
|
|
24
|
+
`--userId [userId]`
|
|
25
|
+
: Id of the user that will be granted the assignment. Specify either `userId`, `userName`, `groupId` or `groupName`. If not specified, the current user will be used.
|
|
26
|
+
|
|
27
|
+
`--userName [userName]`
|
|
28
|
+
: UPN of the user that will be granted the assignment. Specify either `userId`, `userName`, `groupId` or `groupName`. If not specified, the current user will be used.
|
|
29
|
+
|
|
30
|
+
`--groupId [groupId]`
|
|
31
|
+
: Id of the group that will be granted the assignment. Specify either `userId`, `userName`, `groupId` or `groupName`. If not specified, the current user will be used.
|
|
32
|
+
|
|
33
|
+
`--groupName [groupName]`
|
|
34
|
+
: Display name of the group that will be granted the assignment. Specify either `userId`, `userName`, `groupId` or `groupName`. If not specified, the current user will be used.
|
|
35
|
+
|
|
36
|
+
`--administrativeUnitId [administrativeUnitId]`
|
|
37
|
+
: Id of the administrative unit representing the scope of the assignment. Specify either `administrativeUnitId` or `applicationId`. If not specified, default scope will be tenant-wide.
|
|
38
|
+
|
|
39
|
+
`--applicationId [applicationId]`
|
|
40
|
+
: Object Id of the application representing the scope of the assignment. Specify either `administrativeUnitId` or `applicationId`. If not specified, default scope will be tenant-wide.
|
|
41
|
+
|
|
42
|
+
`-j, --justification [justification]`
|
|
43
|
+
: An optional justification message.
|
|
44
|
+
|
|
45
|
+
`--ticketNumber [ticketNumber]`
|
|
46
|
+
: Optional ticket number value to communicate with the request.
|
|
47
|
+
|
|
48
|
+
`--ticketSystem [ticketSystem]`
|
|
49
|
+
: Optional ticket system to communicate with the request.
|
|
50
|
+
```
|
|
51
|
+
|
|
52
|
+
<Global />
|
|
53
|
+
|
|
54
|
+
## Remarks
|
|
55
|
+
|
|
56
|
+
:::info
|
|
57
|
+
|
|
58
|
+
When deactivating a role for other users, you must be **Privileged Role Administrator**.
|
|
59
|
+
|
|
60
|
+
:::
|
|
61
|
+
|
|
62
|
+
## Examples
|
|
63
|
+
|
|
64
|
+
Request deactivation of the SharePoint Administrator Entra role assignment for the current user.
|
|
65
|
+
|
|
66
|
+
```sh
|
|
67
|
+
m365 entra pim role assignment remove --roleDefinitionName 'SharePoint Administrator'
|
|
68
|
+
```
|
|
69
|
+
|
|
70
|
+
Request deactivation of an Entra role assignment for the current user.
|
|
71
|
+
|
|
72
|
+
```sh
|
|
73
|
+
m365 entra pim role assignment remove --roleDefinitionId 'f1417aa3-bf0b-4cc5-a845-a0b2cf11f690'
|
|
74
|
+
```
|
|
75
|
+
|
|
76
|
+
Request deactivation of an Entra role assignment for the current user with a justification
|
|
77
|
+
|
|
78
|
+
```sh
|
|
79
|
+
m365 entra pim role assignment remove --roleDefinitionId 'f1417aa3-bf0b-4cc5-a845-a0b2cf11f690' --justification 'Need Global Admin to release application xyz to production'
|
|
80
|
+
```
|
|
81
|
+
|
|
82
|
+
Request deactivation of an Entra role assignment for a specified user with tenant scope.
|
|
83
|
+
|
|
84
|
+
```sh
|
|
85
|
+
m365 entra pim role assignment remove --roleDefinitionId 'f1417aa3-bf0b-4cc5-a845-a0b2cf11f690' --userId '3488d6b8-6b2e-41c3-9583-1991205323c2'
|
|
86
|
+
```
|
|
87
|
+
|
|
88
|
+
Request deactivation of the User Administrator Entra role assignment for a specified group with administrative unit scope.
|
|
89
|
+
|
|
90
|
+
```sh
|
|
91
|
+
m365 entra pim role assignment remove --roleDefinitionName 'User Administrator' --groupId '3488d6b8-6b2e-41c3-9583-1991205323c2' --administrativeUnitId '03c4c9dc-6f0c-4c4f-a4e6-0c9ed80f54c7'
|
|
92
|
+
```
|
|
93
|
+
|
|
94
|
+
Request deactivation of the Application Administrator Entra role assignment for a specified group with scope to a specific application.
|
|
95
|
+
|
|
96
|
+
```sh
|
|
97
|
+
m365 entra pim role assignment remove --roleDefinitionName 'Application Administrator' --groupName 'Applications admins' --applicationId '03c4c9dc-6f0c-4c4f-a4e6-0c9ed80f54c7'
|
|
98
|
+
```
|
|
99
|
+
|
|
100
|
+
## Response
|
|
101
|
+
|
|
102
|
+
<Tabs>
|
|
103
|
+
<TabItem value="JSON">
|
|
104
|
+
|
|
105
|
+
```json
|
|
106
|
+
{
|
|
107
|
+
"id": "3f7d1bd6-a9a5-45bc-b831-00cfa3e3c649",
|
|
108
|
+
"status": "Revoked",
|
|
109
|
+
"createdDateTime": "2024-07-30T12:08:29.7734603Z",
|
|
110
|
+
"completedDateTime": null,
|
|
111
|
+
"approvalId": null,
|
|
112
|
+
"customData": null,
|
|
113
|
+
"action": "adminRemove",
|
|
114
|
+
"principalId": "61b0c52f-a902-4769-9a09-c6628335b00a",
|
|
115
|
+
"roleDefinitionId": "f28a1f50-f6e7-4571-818b-6a12f2af6b6c",
|
|
116
|
+
"directoryScopeId": "/",
|
|
117
|
+
"appScopeId": null,
|
|
118
|
+
"isValidationOnly": false,
|
|
119
|
+
"targetScheduleId": null,
|
|
120
|
+
"justification": "Removing SharePoint Administrator role",
|
|
121
|
+
"createdBy": {
|
|
122
|
+
"application": null,
|
|
123
|
+
"device": null,
|
|
124
|
+
"user": {
|
|
125
|
+
"displayName": null,
|
|
126
|
+
"id": "893f9116-e024-4bc6-8e98-54c245129485"
|
|
127
|
+
}
|
|
128
|
+
},
|
|
129
|
+
"scheduleInfo": null,
|
|
130
|
+
"ticketInfo": {
|
|
131
|
+
"ticketNumber": null,
|
|
132
|
+
"ticketSystem": null
|
|
133
|
+
}
|
|
134
|
+
}
|
|
135
|
+
```
|
|
136
|
+
|
|
137
|
+
</TabItem>
|
|
138
|
+
<TabItem value="Text">
|
|
139
|
+
|
|
140
|
+
```text
|
|
141
|
+
action : adminRemove
|
|
142
|
+
appScopeId : null
|
|
143
|
+
approvalId : null
|
|
144
|
+
completedDateTime: null
|
|
145
|
+
createdBy : null
|
|
146
|
+
createdDateTime : 2024-07-30T12:08:29.7734603Z
|
|
147
|
+
customData : null
|
|
148
|
+
directoryScopeId : /
|
|
149
|
+
id : c221e106-0711-470a-83cf-f8d7cbc51ecd
|
|
150
|
+
isValidationOnly : false
|
|
151
|
+
justification : Removing SharePoint Administrator role
|
|
152
|
+
principalId : 61b0c52f-a902-4769-9a09-c6628335b00a
|
|
153
|
+
roleDefinitionId : f28a1f50-f6e7-4571-818b-6a12f2af6b6c
|
|
154
|
+
scheduleInfo : null
|
|
155
|
+
status : Revoked
|
|
156
|
+
targetScheduleId : c221e106-0711-470a-83cf-f8d7cbc51ecd
|
|
157
|
+
ticketInfo : {"ticketNumber":null,"ticketSystem":null}
|
|
158
|
+
```
|
|
159
|
+
|
|
160
|
+
</TabItem>
|
|
161
|
+
<TabItem value="CSV">
|
|
162
|
+
|
|
163
|
+
```csv
|
|
164
|
+
id,status,createdDateTime,completedDateTime,approvalId,customData,action,principalId,roleDefinitionId,directoryScopeId,appScopeId,isValidationOnly,targetScheduleId,justification
|
|
165
|
+
7d727f44-c2dd-459e-8665-99ce003d12a9,Revoked,2024-07-30T12:08:29.7734603Z,,,,adminRemove,61b0c52f-a902-4769-9a09-c6628335b00a,f28a1f50-f6e7-4571-818b-6a12f2af6b6c,/,,,7d727f44-c2dd-459e-8665-99ce003d12a9,Removing SharePoint Administrator role
|
|
166
|
+
```
|
|
167
|
+
|
|
168
|
+
</TabItem>
|
|
169
|
+
<TabItem value="Markdown">
|
|
170
|
+
|
|
171
|
+
```md
|
|
172
|
+
# entra pim roleassignment remove --roleDefinitionId "f28a1f50-f6e7-4571-818b-6a12f2af6b6c" --userId "61b0c52f-a902-4769-9a09-c6628335b00a" --justification "Removing SharePoint Administrator role"
|
|
173
|
+
|
|
174
|
+
Date: 7/30/2024
|
|
175
|
+
|
|
176
|
+
## 7622802f-648b-4dd9-820f-dccaf8bbbab5
|
|
177
|
+
|
|
178
|
+
Property | Value
|
|
179
|
+
---------|-------
|
|
180
|
+
id | 7622802f-648b-4dd9-820f-dccaf8bbbab5
|
|
181
|
+
status | Revoked
|
|
182
|
+
createdDateTime | 2024-07-30T12:08:29.7734603Z
|
|
183
|
+
action | adminRemove
|
|
184
|
+
principalId | 61b0c52f-a902-4769-9a09-c6628335b00a
|
|
185
|
+
roleDefinitionId | f28a1f50-f6e7-4571-818b-6a12f2af6b6c
|
|
186
|
+
directoryScopeId | /
|
|
187
|
+
isValidationOnly | false
|
|
188
|
+
targetScheduleId | 7622802f-648b-4dd9-820f-dccaf8bbbab5
|
|
189
|
+
justification | Removing SharePoint Administrator role
|
|
190
|
+
```
|
|
191
|
+
|
|
192
|
+
</TabItem>
|
|
193
|
+
</Tabs>
|
|
194
|
+
|
|
195
|
+
## More information
|
|
196
|
+
|
|
197
|
+
- Role assignment request: https://learn.microsoft.com/graph/api/rbacapplication-post-roleassignmentschedulerequests
|
|
@@ -0,0 +1,131 @@
|
|
|
1
|
+
import Global from '/docs/cmd/_global.mdx';
|
|
2
|
+
import Tabs from '@theme/Tabs';
|
|
3
|
+
import TabItem from '@theme/TabItem';
|
|
4
|
+
|
|
5
|
+
# entra roledefinition add
|
|
6
|
+
|
|
7
|
+
Creates a custom Microsoft Entra ID role definition
|
|
8
|
+
|
|
9
|
+
## Usage
|
|
10
|
+
|
|
11
|
+
```sh
|
|
12
|
+
m365 entra roledefinition add [options]
|
|
13
|
+
```
|
|
14
|
+
|
|
15
|
+
## Options
|
|
16
|
+
|
|
17
|
+
```md definition-list
|
|
18
|
+
`-n, --displayName <displayName>`
|
|
19
|
+
: The display name for the role definition.
|
|
20
|
+
|
|
21
|
+
`-a, --allowedResourceActions <allowedResourceActions>`
|
|
22
|
+
: Comma-separated list of resource actions allowed for the role.
|
|
23
|
+
|
|
24
|
+
`-d, --description [description]`
|
|
25
|
+
: The description for the role definition.
|
|
26
|
+
|
|
27
|
+
`-e, --enabled [enabled]`
|
|
28
|
+
: Indicates if the role is enabled for the assignment. If not specified, the role is enabled by default.
|
|
29
|
+
|
|
30
|
+
`-v, --version [version]`
|
|
31
|
+
: The version of the role definition.
|
|
32
|
+
```
|
|
33
|
+
|
|
34
|
+
<Global />
|
|
35
|
+
|
|
36
|
+
## Remarks
|
|
37
|
+
|
|
38
|
+
Use the `m365 entra rolepermission list --resourceNamespace microsoft.directory` command to get a list of available resource actions.
|
|
39
|
+
|
|
40
|
+
## Examples
|
|
41
|
+
|
|
42
|
+
Create a custom Microsoft Entra ID role
|
|
43
|
+
|
|
44
|
+
```sh
|
|
45
|
+
m365 entra roledefinition add --displayName 'Application Remover' --description 'Allows to remove any Entra ID application' --allowedResourceActions 'microsoft.directory/applications/delete'
|
|
46
|
+
```
|
|
47
|
+
|
|
48
|
+
Create a custom Microsoft Entra ID role, but disable it for the assignment
|
|
49
|
+
|
|
50
|
+
```sh
|
|
51
|
+
m365 entra roledefinition add --displayName 'Application Remover' --version '1.0' --enabled false --allowedResourceActions 'microsoft.directory/applications/delete,microsoft.directory/applications/owners/update'
|
|
52
|
+
```
|
|
53
|
+
|
|
54
|
+
## Response
|
|
55
|
+
|
|
56
|
+
<Tabs>
|
|
57
|
+
<TabItem value="JSON">
|
|
58
|
+
|
|
59
|
+
```json
|
|
60
|
+
{
|
|
61
|
+
"id": "3844129d-f748-4c03-8165-4412ee9b4ceb",
|
|
62
|
+
"description": null,
|
|
63
|
+
"displayName": "Custom Role",
|
|
64
|
+
"isBuiltIn": false,
|
|
65
|
+
"isEnabled": true,
|
|
66
|
+
"resourceScopes": [
|
|
67
|
+
"/"
|
|
68
|
+
],
|
|
69
|
+
"templateId": "3844129d-f748-4c03-8165-4412ee9b4ceb",
|
|
70
|
+
"version": "1",
|
|
71
|
+
"rolePermissions": [
|
|
72
|
+
{
|
|
73
|
+
"allowedResourceActions": [
|
|
74
|
+
"microsoft.directory/groups.unified/create",
|
|
75
|
+
"microsoft.directory/groups.unified/delete"
|
|
76
|
+
],
|
|
77
|
+
"condition": null
|
|
78
|
+
}
|
|
79
|
+
]
|
|
80
|
+
}
|
|
81
|
+
```
|
|
82
|
+
|
|
83
|
+
</TabItem>
|
|
84
|
+
<TabItem value="Text">
|
|
85
|
+
|
|
86
|
+
```text
|
|
87
|
+
description : null
|
|
88
|
+
displayName : Custom Role
|
|
89
|
+
id : 3844129d-f748-4c03-8165-4412ee9b4ceb
|
|
90
|
+
isBuiltIn : false
|
|
91
|
+
isEnabled : true
|
|
92
|
+
resourceScopes : ["/"]
|
|
93
|
+
rolePermissions: [{"allowedResourceActions":["microsoft.directory/groups.unified/create","microsoft.directory/groups.unified/delete"],"condition":null}]
|
|
94
|
+
templateId : 3844129d-f748-4c03-8165-4412ee9b4ceb
|
|
95
|
+
version : 1
|
|
96
|
+
```
|
|
97
|
+
|
|
98
|
+
</TabItem>
|
|
99
|
+
<TabItem value="CSV">
|
|
100
|
+
|
|
101
|
+
```csv
|
|
102
|
+
id,description,displayName,isBuiltIn,isEnabled,templateId,version
|
|
103
|
+
3844129d-f748-4c03-8165-4412ee9b4ceb,,Custom Role,0,1,3844129d-f748-4c03-8165-4412ee9b4ceb,1
|
|
104
|
+
```
|
|
105
|
+
|
|
106
|
+
</TabItem>
|
|
107
|
+
<TabItem value="Markdown">
|
|
108
|
+
|
|
109
|
+
```md
|
|
110
|
+
# entra roledefinition add --displayName "Custom Role" --allowedResourceActions "microsoft.directory/groups.unified/create,microsoft.directory/groups.unified/delete" --version 1
|
|
111
|
+
|
|
112
|
+
Date: 12/15/2024
|
|
113
|
+
|
|
114
|
+
## Custom Role (3844129d-f748-4c03-8165-4412ee9b4ceb)
|
|
115
|
+
|
|
116
|
+
Property | Value
|
|
117
|
+
---------|-------
|
|
118
|
+
id | 3844129d-f748-4c03-8165-4412ee9b4ceb
|
|
119
|
+
displayName | Custom Role
|
|
120
|
+
isBuiltIn | false
|
|
121
|
+
isEnabled | true
|
|
122
|
+
templateId | 3844129d-f748-4c03-8165-4412ee9b4ceb
|
|
123
|
+
version | 1
|
|
124
|
+
```
|
|
125
|
+
|
|
126
|
+
</TabItem>
|
|
127
|
+
</Tabs>
|
|
128
|
+
|
|
129
|
+
## More information
|
|
130
|
+
|
|
131
|
+
- https://learn.microsoft.com/graph/api/rbacapplication-post-roledefinitions
|
|
@@ -0,0 +1,64 @@
|
|
|
1
|
+
import Global from '/docs/cmd/_global.mdx';
|
|
2
|
+
|
|
3
|
+
# entra roledefinition set
|
|
4
|
+
|
|
5
|
+
Updates a custom Microsoft Entra ID role definition
|
|
6
|
+
|
|
7
|
+
## Usage
|
|
8
|
+
|
|
9
|
+
```sh
|
|
10
|
+
m365 entra roledefinition set [options]
|
|
11
|
+
```
|
|
12
|
+
|
|
13
|
+
## Options
|
|
14
|
+
|
|
15
|
+
```md definition-list
|
|
16
|
+
`-i, --id [id]`
|
|
17
|
+
: The id of the role definition to be updated. Specify either `id` or `displayName`, but not both.
|
|
18
|
+
|
|
19
|
+
`-n, --displayName [displayName]`
|
|
20
|
+
: The display name of the role definition to be updated. Specify either `id` or `displayName`, but not both.
|
|
21
|
+
|
|
22
|
+
`--newDisplayName [newDisplayName]`
|
|
23
|
+
: Updated display name for the role definition.
|
|
24
|
+
|
|
25
|
+
`-d, --description [description]`
|
|
26
|
+
: Updated description for the role definition.
|
|
27
|
+
|
|
28
|
+
`-e, --enabled [enabled]`
|
|
29
|
+
: Indicates if the role is enabled for the assignment.
|
|
30
|
+
|
|
31
|
+
`a-, --allowedResourceActions [allowedResourceActions]`
|
|
32
|
+
: Updated comma-separated list of resource actions allowed for the role.
|
|
33
|
+
|
|
34
|
+
`-v, --version [version]`
|
|
35
|
+
: Updated version of the role definition.
|
|
36
|
+
```
|
|
37
|
+
|
|
38
|
+
<Global />
|
|
39
|
+
|
|
40
|
+
## Remarks
|
|
41
|
+
|
|
42
|
+
Use the `m365 entra rolepermission list --resourceNamespace microsoft.directory` command to get a list of available resource actions.
|
|
43
|
+
|
|
44
|
+
## Examples
|
|
45
|
+
|
|
46
|
+
Update a custom Microsoft Entra ID role specified by the id
|
|
47
|
+
|
|
48
|
+
```sh
|
|
49
|
+
m365 entra roledefinition set --id fadbc488-151d-4431-9143-6abbffae759f --newDisplayName 'Application Remover' --description 'Allows to remove any Entra ID application' --allowedResourceActions 'microsoft.directory/applications/delete'
|
|
50
|
+
```
|
|
51
|
+
|
|
52
|
+
Update a custom Microsoft Entra ID role specified by the display name
|
|
53
|
+
|
|
54
|
+
```sh
|
|
55
|
+
m365 entra roledefinition set --displayName 'Application Remover' --version '1.0' --enabled true --allowedResourceActions 'microsoft.directory/applications/delete,microsoft.directory/applications/owners/update'
|
|
56
|
+
```
|
|
57
|
+
|
|
58
|
+
## Response
|
|
59
|
+
|
|
60
|
+
The command won't return a response on success
|
|
61
|
+
|
|
62
|
+
## More information
|
|
63
|
+
|
|
64
|
+
- https://learn.microsoft.com/graph/api/rbacapplication-post-roledefinitions
|
|
@@ -0,0 +1,162 @@
|
|
|
1
|
+
import Global from '/docs/cmd/_global.mdx';
|
|
2
|
+
import Tabs from '@theme/Tabs';
|
|
3
|
+
import TabItem from '@theme/TabItem';
|
|
4
|
+
|
|
5
|
+
# entra rolepermission list
|
|
6
|
+
|
|
7
|
+
Lists all Microsoft Entra ID role permissions
|
|
8
|
+
|
|
9
|
+
## Usage
|
|
10
|
+
|
|
11
|
+
```sh
|
|
12
|
+
m365 entra rolepermission list [options]
|
|
13
|
+
```
|
|
14
|
+
|
|
15
|
+
## Options
|
|
16
|
+
|
|
17
|
+
```md definition-list
|
|
18
|
+
`-n, --resourceNamespace [resourceNamespace]`
|
|
19
|
+
: The namespace of the resource for which to retrieve role permissions.
|
|
20
|
+
|
|
21
|
+
`-p, --privileged`
|
|
22
|
+
: Retrieve only sensitive role permissions.
|
|
23
|
+
```
|
|
24
|
+
|
|
25
|
+
<Global />
|
|
26
|
+
|
|
27
|
+
## Remarks
|
|
28
|
+
|
|
29
|
+
:::warning
|
|
30
|
+
|
|
31
|
+
The command is based on an API that is currently in preview and is subject to change once the API reached general availability.
|
|
32
|
+
|
|
33
|
+
:::
|
|
34
|
+
|
|
35
|
+
## Examples
|
|
36
|
+
|
|
37
|
+
Get a list of role permissions
|
|
38
|
+
|
|
39
|
+
```sh
|
|
40
|
+
m365 entra rolepermission list --resourceNamespace 'microsoft.directory'
|
|
41
|
+
```
|
|
42
|
+
|
|
43
|
+
Get a list of sensitive role permissions
|
|
44
|
+
|
|
45
|
+
```sh
|
|
46
|
+
m365 entra rolepermission list --resourceNamespace 'microsoft.directory' --privileged
|
|
47
|
+
```
|
|
48
|
+
|
|
49
|
+
## Response
|
|
50
|
+
|
|
51
|
+
<Tabs>
|
|
52
|
+
<TabItem value="JSON">
|
|
53
|
+
|
|
54
|
+
```json
|
|
55
|
+
[
|
|
56
|
+
{
|
|
57
|
+
"actionVerb": null,
|
|
58
|
+
"description": "Create and delete access reviews, and read and update all properties of access reviews in Microsoft Entra ID",
|
|
59
|
+
"id": "microsoft.directory-accessReviews-allProperties-allTasks",
|
|
60
|
+
"isPrivileged": false,
|
|
61
|
+
"name": "microsoft.directory/accessReviews/allProperties/allTasks",
|
|
62
|
+
"resourceScopeId": null
|
|
63
|
+
},
|
|
64
|
+
{
|
|
65
|
+
"actionVerb": "GET",
|
|
66
|
+
"description": "Read all properties of access reviews",
|
|
67
|
+
"id": "microsoft.directory-accessReviews-allProperties-read-get",
|
|
68
|
+
"isPrivileged": false,
|
|
69
|
+
"name": "microsoft.directory/accessReviews/allProperties/read",
|
|
70
|
+
"resourceScopeId": null
|
|
71
|
+
},
|
|
72
|
+
{
|
|
73
|
+
"actionVerb": null,
|
|
74
|
+
"description": "Manage access reviews of application role assignments in Microsoft Entra ID",
|
|
75
|
+
"id": "microsoft.directory-accessReviews-definitions.applications-allProperties-allTasks",
|
|
76
|
+
"isPrivileged": false,
|
|
77
|
+
"name": "microsoft.directory/accessReviews/definitions.applications/allProperties/allTasks",
|
|
78
|
+
"resourceScopeId": null
|
|
79
|
+
},
|
|
80
|
+
{
|
|
81
|
+
"actionVerb": "GET",
|
|
82
|
+
"description": "Read all properties of access reviews of application role assignments in Microsoft Entra ID",
|
|
83
|
+
"id": "microsoft.directory-accessReviews-definitions.applications-allProperties-read-get",
|
|
84
|
+
"isPrivileged": false,
|
|
85
|
+
"name": "microsoft.directory/accessReviews/definitions.applications/allProperties/read",
|
|
86
|
+
"resourceScopeId": null
|
|
87
|
+
}
|
|
88
|
+
]
|
|
89
|
+
```
|
|
90
|
+
|
|
91
|
+
</TabItem>
|
|
92
|
+
<TabItem value="Text">
|
|
93
|
+
|
|
94
|
+
```text
|
|
95
|
+
id name actionVerb isPrivileged
|
|
96
|
+
-------------------------------------------------------------------------------------- --------------------------------------------------------------------------------------- ---------- ------------
|
|
97
|
+
microsoft.directory-accessReviews-allProperties-allTasks microsoft.directory/accessReviews/allProperties/allTasks null false
|
|
98
|
+
microsoft.directory-accessReviews-allProperties-read-get microsoft.directory/accessReviews/allProperties/read GET false
|
|
99
|
+
microsoft.directory-accessReviews-definitions.applications-allProperties-allTasks microsoft.directory/accessReviews/definitions.applications/allProperties/allTasks null false
|
|
100
|
+
microsoft.directory-accessReviews-definitions.applications-allProperties-read-get microsoft.directory/accessReviews/definitions.applications/allProperties/read GET false
|
|
101
|
+
```
|
|
102
|
+
|
|
103
|
+
</TabItem>
|
|
104
|
+
<TabItem value="CSV">
|
|
105
|
+
|
|
106
|
+
```csv
|
|
107
|
+
actionVerb,description,id,isPrivileged,name,resourceScopeId
|
|
108
|
+
,"Create and delete access reviews, and read and update all properties of access reviews in Microsoft Entra ID",microsoft.directory-accessReviews-allProperties-allTasks,0,microsoft.directory/accessReviews/allProperties/allTasks,
|
|
109
|
+
GET,Read all properties of access reviews,microsoft.directory-accessReviews-allProperties-read-get,0,microsoft.directory/accessReviews/allProperties/read,
|
|
110
|
+
,Manage access reviews of application role assignments in Microsoft Entra ID,microsoft.directory-accessReviews-definitions.applications-allProperties-allTasks,0,microsoft.directory/accessReviews/definitions.applications/allProperties/allTasks,
|
|
111
|
+
GET,Read all properties of access reviews of application role assignments in Microsoft Entra ID,microsoft.directory-accessReviews-definitions.applications-allProperties-read-get,0,microsoft.directory/accessReviews/definitions.applications/allProperties/read,
|
|
112
|
+
```
|
|
113
|
+
|
|
114
|
+
</TabItem>
|
|
115
|
+
<TabItem value="Markdown">
|
|
116
|
+
|
|
117
|
+
```md
|
|
118
|
+
# entra rolepermission list --resourceNamespace "microsoft.directory"
|
|
119
|
+
|
|
120
|
+
Date: 1/16/2025
|
|
121
|
+
|
|
122
|
+
## microsoft.directory/accessReviews/allProperties/allTasks (microsoft.directory-accessReviews-allProperties-allTasks)
|
|
123
|
+
|
|
124
|
+
Property | Value
|
|
125
|
+
---------|-------
|
|
126
|
+
description | Create and delete access reviews, and read and update all properties of access reviews in Microsoft Entra ID
|
|
127
|
+
id | microsoft.directory-accessReviews-allProperties-allTasks
|
|
128
|
+
isPrivileged | false
|
|
129
|
+
name | microsoft.directory/accessReviews/allProperties/allTasks
|
|
130
|
+
|
|
131
|
+
## microsoft.directory/accessReviews/allProperties/read (microsoft.directory-accessReviews-allProperties-read-get)
|
|
132
|
+
|
|
133
|
+
Property | Value
|
|
134
|
+
---------|-------
|
|
135
|
+
actionVerb | GET
|
|
136
|
+
description | Read all properties of access reviews
|
|
137
|
+
id | microsoft.directory-accessReviews-allProperties-read-get
|
|
138
|
+
isPrivileged | false
|
|
139
|
+
name | microsoft.directory/accessReviews/allProperties/read
|
|
140
|
+
|
|
141
|
+
## microsoft.directory/accessReviews/definitions.applications/allProperties/allTasks (microsoft.directory-accessReviews-definitions.applications-allProperties-allTasks)
|
|
142
|
+
|
|
143
|
+
Property | Value
|
|
144
|
+
---------|-------
|
|
145
|
+
description | Manage access reviews of application role assignments in Microsoft Entra ID
|
|
146
|
+
id | microsoft.directory-accessReviews-definitions.applications-allProperties-allTasks
|
|
147
|
+
isPrivileged | false
|
|
148
|
+
name | microsoft.directory/accessReviews/definitions.applications/allProperties/allTasks
|
|
149
|
+
|
|
150
|
+
## microsoft.directory/accessReviews/definitions.applications/allProperties/read (microsoft.directory-accessReviews-definitions.applications-allProperties-read-get)
|
|
151
|
+
|
|
152
|
+
Property | Value
|
|
153
|
+
---------|-------
|
|
154
|
+
actionVerb | GET
|
|
155
|
+
description | Read all properties of access reviews of application role assignments in Microsoft Entra ID
|
|
156
|
+
id | microsoft.directory-accessReviews-definitions.applications-allProperties-read-get
|
|
157
|
+
isPrivileged | false
|
|
158
|
+
name | microsoft.directory/accessReviews/definitions.applications/allProperties/read
|
|
159
|
+
```
|
|
160
|
+
|
|
161
|
+
</TabItem>
|
|
162
|
+
</Tabs>
|