@pnp/cli-microsoft365 11.7.0-beta.bd906c5 → 11.7.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.devproxy/api-specs/sharepoint.yaml +53 -0
- package/allCommands.json +1 -1
- package/allCommandsFull.json +1 -1
- package/dist/m365/context/commands/option/option-list.js +6 -1
- package/dist/m365/entra/commands/resourcenamespace/resourcenamespace-list.js +6 -0
- package/dist/m365/external/commands/connection/connection-list.js +6 -0
- package/dist/m365/outlook/commands/calendar/calendar-set.js +132 -0
- package/dist/m365/outlook/commands/calendargroup/calendargroup-get.js +114 -0
- package/dist/m365/outlook/commands.js +2 -0
- package/dist/m365/spo/commands/applicationcustomizer/applicationcustomizer-add.js +13 -1
- package/dist/m365/spo/commands/applicationcustomizer/applicationcustomizer-set.js +24 -3
- package/dist/m365/spo/commands/brandcenter/brandcenter-colors-list.js +59 -0
- package/dist/m365/spo/commands/file/file-archive.js +83 -0
- package/dist/m365/spo/commands/propertybag/propertybag-set.js +3 -9
- package/dist/m365/spo/commands/tenant/tenant-applicationcustomizer-add.js +20 -0
- package/dist/m365/spo/commands/tenant/tenant-applicationcustomizer-set.js +27 -2
- package/dist/m365/spo/commands/tenant/tenant-settings-set.js +5 -1
- package/dist/m365/spo/commands.js +2 -0
- package/dist/request.js +0 -16
- package/docs/docs/cmd/entra/m365group/m365group-user-add.mdx +21 -0
- package/docs/docs/cmd/entra/m365group/m365group-user-list.mdx +19 -0
- package/docs/docs/cmd/entra/m365group/m365group-user-remove.mdx +21 -0
- package/docs/docs/cmd/entra/m365group/m365group-user-set.mdx +21 -0
- package/docs/docs/cmd/entra/roledefinition/roledefinition-add.mdx +19 -0
- package/docs/docs/cmd/entra/roledefinition/roledefinition-get.mdx +19 -0
- package/docs/docs/cmd/entra/roledefinition/roledefinition-list.mdx +19 -0
- package/docs/docs/cmd/entra/roledefinition/roledefinition-remove.mdx +21 -0
- package/docs/docs/cmd/entra/roledefinition/roledefinition-set.mdx +21 -0
- package/docs/docs/cmd/entra/siteclassification/siteclassification-disable.mdx +21 -0
- package/docs/docs/cmd/entra/siteclassification/siteclassification-enable.mdx +21 -0
- package/docs/docs/cmd/entra/siteclassification/siteclassification-get.mdx +19 -0
- package/docs/docs/cmd/entra/siteclassification/siteclassification-set.mdx +20 -0
- package/docs/docs/cmd/external/connection/connection-add.mdx +21 -0
- package/docs/docs/cmd/external/connection/connection-doctor.mdx +19 -0
- package/docs/docs/cmd/external/connection/connection-get.mdx +19 -0
- package/docs/docs/cmd/external/connection/connection-list.mdx +19 -0
- package/docs/docs/cmd/external/connection/connection-remove.mdx +21 -0
- package/docs/docs/cmd/external/connection/connection-schema-add.mdx +21 -0
- package/docs/docs/cmd/external/connection/connection-urltoitemresolver-add.mdx +21 -0
- package/docs/docs/cmd/external/item/item-add.mdx +19 -0
- package/docs/docs/cmd/outlook/calendar/calendar-set.mdx +178 -0
- package/docs/docs/cmd/outlook/calendargroup/calendargroup-get.mdx +125 -0
- package/docs/docs/cmd/spo/applicationcustomizer/applicationcustomizer-add.mdx +14 -11
- package/docs/docs/cmd/spo/applicationcustomizer/applicationcustomizer-set.mdx +9 -6
- package/docs/docs/cmd/spo/brandcenter/brandcenter-colors-list.mdx +115 -0
- package/docs/docs/cmd/spo/file/file-archive.mdx +68 -0
- package/docs/docs/cmd/spo/propertybag/propertybag-set.mdx +1 -1
- package/docs/docs/cmd/spo/tenant/tenant-applicationcustomizer-add.mdx +13 -10
- package/docs/docs/cmd/spo/tenant/tenant-applicationcustomizer-set.mdx +7 -4
- package/docs/docs/cmd/spo/tenant/tenant-settings-set.mdx +3 -0
- package/package.json +2 -2
|
@@ -121,7 +121,7 @@ class SpoTenantApplicationCustomizerSetCommand extends SpoCommand {
|
|
|
121
121
|
return outputParsed[0];
|
|
122
122
|
}
|
|
123
123
|
async updateTenantWideExtension(appCatalogUrl, options, listServerRelativeUrl, itemId, logger) {
|
|
124
|
-
const { title, id, clientSideComponentId, newTitle, newClientSideComponentId, clientSideComponentProperties, webTemplate } = options;
|
|
124
|
+
const { title, id, clientSideComponentId, newTitle, newClientSideComponentId, clientSideComponentProperties, hostProperties, webTemplate } = options;
|
|
125
125
|
if (this.verbose) {
|
|
126
126
|
await logger.logToStderr(`Updating tenant-wide application customizer: "${title || id || clientSideComponentId}"...`);
|
|
127
127
|
}
|
|
@@ -144,6 +144,12 @@ class SpoTenantApplicationCustomizerSetCommand extends SpoCommand {
|
|
|
144
144
|
FieldValue: clientSideComponentProperties
|
|
145
145
|
});
|
|
146
146
|
}
|
|
147
|
+
if (hostProperties !== undefined) {
|
|
148
|
+
formValues.push({
|
|
149
|
+
FieldName: 'TenantWideExtensionHostProperties',
|
|
150
|
+
FieldValue: hostProperties
|
|
151
|
+
});
|
|
152
|
+
}
|
|
147
153
|
if (webTemplate !== undefined) {
|
|
148
154
|
formValues.push({
|
|
149
155
|
FieldName: 'TenantWideExtensionWebTemplate',
|
|
@@ -172,6 +178,7 @@ _SpoTenantApplicationCustomizerSetCommand_instances = new WeakSet(), _SpoTenantA
|
|
|
172
178
|
newTitle: typeof args.options.newTitle !== 'undefined',
|
|
173
179
|
newClientSideComponentId: typeof args.options.newClientSideComponentId !== 'undefined',
|
|
174
180
|
clientSideComponentProperties: typeof args.options.clientSideComponentProperties !== 'undefined',
|
|
181
|
+
hostProperties: typeof args.options.hostProperties !== 'undefined',
|
|
175
182
|
webTemplate: typeof args.options.webTemplate !== 'undefined'
|
|
176
183
|
});
|
|
177
184
|
});
|
|
@@ -188,6 +195,8 @@ _SpoTenantApplicationCustomizerSetCommand_instances = new WeakSet(), _SpoTenantA
|
|
|
188
195
|
option: '--newClientSideComponentId [newClientSideComponentId]'
|
|
189
196
|
}, {
|
|
190
197
|
option: '-p, --clientSideComponentProperties [clientSideComponentProperties]'
|
|
198
|
+
}, {
|
|
199
|
+
option: '--hostProperties [hostProperties]'
|
|
191
200
|
}, {
|
|
192
201
|
option: '-w, --webTemplate [webTemplate]'
|
|
193
202
|
});
|
|
@@ -202,7 +211,23 @@ _SpoTenantApplicationCustomizerSetCommand_instances = new WeakSet(), _SpoTenantA
|
|
|
202
211
|
if (args.options.newClientSideComponentId && !validation.isValidGuid(args.options.newClientSideComponentId)) {
|
|
203
212
|
return `${args.options.newClientSideComponentId} is not a valid GUID`;
|
|
204
213
|
}
|
|
205
|
-
if (
|
|
214
|
+
if (args.options.clientSideComponentProperties) {
|
|
215
|
+
try {
|
|
216
|
+
JSON.parse(args.options.clientSideComponentProperties);
|
|
217
|
+
}
|
|
218
|
+
catch (e) {
|
|
219
|
+
return `An error has occurred while parsing clientSideComponentProperties: ${e}`;
|
|
220
|
+
}
|
|
221
|
+
}
|
|
222
|
+
if (args.options.hostProperties) {
|
|
223
|
+
try {
|
|
224
|
+
JSON.parse(args.options.hostProperties);
|
|
225
|
+
}
|
|
226
|
+
catch (e) {
|
|
227
|
+
return `An error has occurred while parsing hostProperties: ${e}`;
|
|
228
|
+
}
|
|
229
|
+
}
|
|
230
|
+
if (!args.options.newTitle && !args.options.newClientSideComponentId && !args.options.clientSideComponentProperties && args.options.hostProperties === undefined && !args.options.webTemplate) {
|
|
206
231
|
return `Please specify an option to be updated`;
|
|
207
232
|
}
|
|
208
233
|
return true;
|
|
@@ -414,6 +414,9 @@ _a = SpoTenantSettingsSetCommand, _SpoTenantSettingsSetCommand_instances = new W
|
|
|
414
414
|
}, {
|
|
415
415
|
option: '--SyncAadB2BManagementPolicy [SyncAadB2BManagementPolicy]',
|
|
416
416
|
autocomplete: ['true', 'false']
|
|
417
|
+
}, {
|
|
418
|
+
option: '--AllowWebPropertyBagUpdateWhenDenyAddAndCustomizePagesIsEnabled [AllowWebPropertyBagUpdateWhenDenyAddAndCustomizePagesIsEnabled]',
|
|
419
|
+
autocomplete: ['true', 'false']
|
|
417
420
|
});
|
|
418
421
|
}, _SpoTenantSettingsSetCommand_initValidators = function _SpoTenantSettingsSetCommand_initValidators() {
|
|
419
422
|
this.validators.push(async (args) => {
|
|
@@ -496,7 +499,8 @@ SpoTenantSettingsSetCommand.booleanOptions = [
|
|
|
496
499
|
'DisableCustomAppAuthentication',
|
|
497
500
|
'CommentsOnListItemsDisabled',
|
|
498
501
|
'EnableAzureADB2BIntegration',
|
|
499
|
-
'SyncAadB2BManagementPolicy'
|
|
502
|
+
'SyncAadB2BManagementPolicy',
|
|
503
|
+
'AllowWebPropertyBagUpdateWhenDenyAddAndCustomizePagesIsEnabled'
|
|
500
504
|
];
|
|
501
505
|
export default new SpoTenantSettingsSetCommand();
|
|
502
506
|
//# sourceMappingURL=tenant-settings-set.js.map
|
|
@@ -19,6 +19,7 @@ export default {
|
|
|
19
19
|
APPLICATIONCUSTOMIZER_SET: `${prefix} applicationcustomizer set`,
|
|
20
20
|
APPPAGE_ADD: `${prefix} apppage add`,
|
|
21
21
|
APPPAGE_SET: `${prefix} apppage set`,
|
|
22
|
+
BRANDCENTER_COLORS_LIST: `${prefix} brandcenter colors list`,
|
|
22
23
|
BRANDCENTER_SETTINGS_LIST: `${prefix} brandcenter settings list`,
|
|
23
24
|
CDN_GET: `${prefix} cdn get`,
|
|
24
25
|
CDN_ORIGIN_ADD: `${prefix} cdn origin add`,
|
|
@@ -61,6 +62,7 @@ export default {
|
|
|
61
62
|
FIELD_REMOVE: `${prefix} field remove`,
|
|
62
63
|
FIELD_SET: `${prefix} field set`,
|
|
63
64
|
FILE_ADD: `${prefix} file add`,
|
|
65
|
+
FILE_ARCHIVE: `${prefix} file archive`,
|
|
64
66
|
FILE_CHECKIN: `${prefix} file checkin`,
|
|
65
67
|
FILE_CHECKOUT: `${prefix} file checkout`,
|
|
66
68
|
FILE_CHECKOUT_UNDO: `${prefix} file checkout undo`,
|
package/dist/request.js
CHANGED
|
@@ -154,10 +154,6 @@ class Request {
|
|
|
154
154
|
options.headers.authorization = `Bearer ${accessToken}`;
|
|
155
155
|
}
|
|
156
156
|
}
|
|
157
|
-
const proxyUrl = process.env.HTTP_PROXY || process.env.HTTPS_PROXY;
|
|
158
|
-
if (proxyUrl) {
|
|
159
|
-
options.proxy = this.createProxyConfigFromUrl(proxyUrl);
|
|
160
|
-
}
|
|
161
157
|
const res = await this.req(options);
|
|
162
158
|
const end = process.hrtime.bigint();
|
|
163
159
|
timings.api.push(Number(end - start));
|
|
@@ -192,18 +188,6 @@ class Request {
|
|
|
192
188
|
options.url = options.url.substring(0, 8) +
|
|
193
189
|
options.url.substring(8).replace('//', '/');
|
|
194
190
|
}
|
|
195
|
-
createProxyConfigFromUrl(url) {
|
|
196
|
-
const parsedUrl = new URL(url);
|
|
197
|
-
const port = parsedUrl.port || (url.toLowerCase().startsWith('https') ? 443 : 80);
|
|
198
|
-
let authObject = null;
|
|
199
|
-
if (parsedUrl.username && parsedUrl.password) {
|
|
200
|
-
authObject = {
|
|
201
|
-
username: parsedUrl.username,
|
|
202
|
-
password: parsedUrl.password
|
|
203
|
-
};
|
|
204
|
-
}
|
|
205
|
-
return { host: parsedUrl.hostname, port: Number(port), protocol: 'http', ...(authObject && { auth: authObject }) };
|
|
206
|
-
}
|
|
207
191
|
}
|
|
208
192
|
export default new Request();
|
|
209
193
|
//# sourceMappingURL=request.js.map
|
|
@@ -1,4 +1,6 @@
|
|
|
1
1
|
import Global from '../../_global.mdx';
|
|
2
|
+
import Tabs from '@theme/Tabs';
|
|
3
|
+
import TabItem from '@theme/TabItem';
|
|
2
4
|
|
|
3
5
|
# entra m365group user add
|
|
4
6
|
|
|
@@ -43,6 +45,25 @@ m365 teams user add [options]
|
|
|
43
45
|
|
|
44
46
|
<Global />
|
|
45
47
|
|
|
48
|
+
## Permissions
|
|
49
|
+
|
|
50
|
+
<Tabs>
|
|
51
|
+
<TabItem value="Delegated">
|
|
52
|
+
|
|
53
|
+
| Resource | Permissions |
|
|
54
|
+
|-----------------|-----------------------------------------|
|
|
55
|
+
| Microsoft Graph | Group.ReadWrite.All, User.ReadBasic.All |
|
|
56
|
+
|
|
57
|
+
</TabItem>
|
|
58
|
+
<TabItem value="Application">
|
|
59
|
+
|
|
60
|
+
| Resource | Permissions |
|
|
61
|
+
|-----------------|------------------------------------|
|
|
62
|
+
| Microsoft Graph | Group.ReadWrite.All, User.Read.All |
|
|
63
|
+
|
|
64
|
+
</TabItem>
|
|
65
|
+
</Tabs>
|
|
66
|
+
|
|
46
67
|
## Examples
|
|
47
68
|
|
|
48
69
|
Add a new member with the userNames parameter to the specified Microsoft 365 Group.
|
|
@@ -37,6 +37,25 @@ m365 entra m365group user list [options]
|
|
|
37
37
|
|
|
38
38
|
When the `properties` option includes values with a `/`, for example: `manager/displayName`, an additional `$expand` query parameter will be included on `manager`.
|
|
39
39
|
|
|
40
|
+
## Permissions
|
|
41
|
+
|
|
42
|
+
<Tabs>
|
|
43
|
+
<TabItem value="Delegated">
|
|
44
|
+
|
|
45
|
+
| Resource | Permissions |
|
|
46
|
+
|-----------------|------------------------------------------|
|
|
47
|
+
| Microsoft Graph | GroupMember.Read.All, User.ReadBasic.All |
|
|
48
|
+
|
|
49
|
+
</TabItem>
|
|
50
|
+
<TabItem value="Application">
|
|
51
|
+
|
|
52
|
+
| Resource | Permissions |
|
|
53
|
+
|-----------------|-------------------------------------|
|
|
54
|
+
| Microsoft Graph | GroupMember.Read.All, User.Read.All |
|
|
55
|
+
|
|
56
|
+
</TabItem>
|
|
57
|
+
</Tabs>
|
|
58
|
+
|
|
40
59
|
## Examples
|
|
41
60
|
|
|
42
61
|
List all users and their role from Microsoft 365 group specified by ID.
|
|
@@ -1,4 +1,6 @@
|
|
|
1
1
|
import Global from '../../_global.mdx';
|
|
2
|
+
import Tabs from '@theme/Tabs';
|
|
3
|
+
import TabItem from '@theme/TabItem';
|
|
2
4
|
|
|
3
5
|
# entra m365group user remove
|
|
4
6
|
|
|
@@ -41,6 +43,25 @@ m365 entra m365group user remove [options]
|
|
|
41
43
|
|
|
42
44
|
You can remove users from a Microsoft 365 Group or Microsoft Teams team if you are owner of that group or team.
|
|
43
45
|
|
|
46
|
+
## Permissions
|
|
47
|
+
|
|
48
|
+
<Tabs>
|
|
49
|
+
<TabItem value="Delegated">
|
|
50
|
+
|
|
51
|
+
| Resource | Permissions |
|
|
52
|
+
|-----------------|-----------------------------------------|
|
|
53
|
+
| Microsoft Graph | Group.ReadWrite.All, User.ReadBasic.All |
|
|
54
|
+
|
|
55
|
+
</TabItem>
|
|
56
|
+
<TabItem value="Application">
|
|
57
|
+
|
|
58
|
+
| Resource | Permissions |
|
|
59
|
+
|-----------------|------------------------------------|
|
|
60
|
+
| Microsoft Graph | Group.ReadWrite.All, User.Read.All |
|
|
61
|
+
|
|
62
|
+
</TabItem>
|
|
63
|
+
</Tabs>
|
|
64
|
+
|
|
44
65
|
## Examples
|
|
45
66
|
|
|
46
67
|
Removes user from the specified Microsoft 365 Group.
|
|
@@ -1,4 +1,6 @@
|
|
|
1
1
|
import Global from '../../_global.mdx';
|
|
2
|
+
import Tabs from '@theme/Tabs';
|
|
3
|
+
import TabItem from '@theme/TabItem';
|
|
2
4
|
|
|
3
5
|
# entra m365group user set
|
|
4
6
|
|
|
@@ -41,6 +43,25 @@ m365 entra m365group user set [options]
|
|
|
41
43
|
|
|
42
44
|
The command will return an error if the user already has the specified role in the given Microsoft 365 Group or Microsoft Teams team.
|
|
43
45
|
|
|
46
|
+
## Permissions
|
|
47
|
+
|
|
48
|
+
<Tabs>
|
|
49
|
+
<TabItem value="Delegated">
|
|
50
|
+
|
|
51
|
+
| Resource | Permissions |
|
|
52
|
+
|-----------------|-----------------------------------------|
|
|
53
|
+
| Microsoft Graph | Group.ReadWrite.All, User.ReadBasic.All |
|
|
54
|
+
|
|
55
|
+
</TabItem>
|
|
56
|
+
<TabItem value="Application">
|
|
57
|
+
|
|
58
|
+
| Resource | Permissions |
|
|
59
|
+
|-----------------|------------------------------------|
|
|
60
|
+
| Microsoft Graph | Group.ReadWrite.All, User.Read.All |
|
|
61
|
+
|
|
62
|
+
</TabItem>
|
|
63
|
+
</Tabs>
|
|
64
|
+
|
|
44
65
|
## Examples
|
|
45
66
|
|
|
46
67
|
Promote a single user to Owner of the given Microsoft 365 Group
|
|
@@ -37,6 +37,25 @@ m365 entra roledefinition add [options]
|
|
|
37
37
|
|
|
38
38
|
Use the `m365 entra rolepermission list --resourceNamespace microsoft.directory` command to get a list of available resource actions.
|
|
39
39
|
|
|
40
|
+
## Permissions
|
|
41
|
+
|
|
42
|
+
<Tabs>
|
|
43
|
+
<TabItem value="Delegated">
|
|
44
|
+
|
|
45
|
+
| Resource | Permissions |
|
|
46
|
+
|-----------------|------------------------------------|
|
|
47
|
+
| Microsoft Graph | RoleManagement.ReadWrite.Directory |
|
|
48
|
+
|
|
49
|
+
</TabItem>
|
|
50
|
+
<TabItem value="Application">
|
|
51
|
+
|
|
52
|
+
| Resource | Permissions |
|
|
53
|
+
|-----------------|------------------------------------|
|
|
54
|
+
| Microsoft Graph | RoleManagement.ReadWrite.Directory |
|
|
55
|
+
|
|
56
|
+
</TabItem>
|
|
57
|
+
</Tabs>
|
|
58
|
+
|
|
40
59
|
## Examples
|
|
41
60
|
|
|
42
61
|
Create a custom Microsoft Entra ID role
|
|
@@ -27,6 +27,25 @@ m365 entra roledefinition get [options]
|
|
|
27
27
|
|
|
28
28
|
<Global />
|
|
29
29
|
|
|
30
|
+
## Permissions
|
|
31
|
+
|
|
32
|
+
<Tabs>
|
|
33
|
+
<TabItem value="Delegated">
|
|
34
|
+
|
|
35
|
+
| Resource | Permissions |
|
|
36
|
+
|-----------------|-------------------------------|
|
|
37
|
+
| Microsoft Graph | RoleManagement.Read.Directory |
|
|
38
|
+
|
|
39
|
+
</TabItem>
|
|
40
|
+
<TabItem value="Application">
|
|
41
|
+
|
|
42
|
+
| Resource | Permissions |
|
|
43
|
+
|-----------------|-------------------------------|
|
|
44
|
+
| Microsoft Graph | RoleManagement.Read.Directory |
|
|
45
|
+
|
|
46
|
+
</TabItem>
|
|
47
|
+
</Tabs>
|
|
48
|
+
|
|
30
49
|
## Examples
|
|
31
50
|
|
|
32
51
|
Get info about a role specified by the id
|
|
@@ -24,6 +24,25 @@ m365 entra roledefinition list [options]
|
|
|
24
24
|
|
|
25
25
|
<Global />
|
|
26
26
|
|
|
27
|
+
## Permissions
|
|
28
|
+
|
|
29
|
+
<Tabs>
|
|
30
|
+
<TabItem value="Delegated">
|
|
31
|
+
|
|
32
|
+
| Resource | Permissions |
|
|
33
|
+
|-----------------|-------------------------------|
|
|
34
|
+
| Microsoft Graph | RoleManagement.Read.Directory |
|
|
35
|
+
|
|
36
|
+
</TabItem>
|
|
37
|
+
<TabItem value="Application">
|
|
38
|
+
|
|
39
|
+
| Resource | Permissions |
|
|
40
|
+
|-----------------|-------------------------------|
|
|
41
|
+
| Microsoft Graph | RoleManagement.Read.Directory |
|
|
42
|
+
|
|
43
|
+
</TabItem>
|
|
44
|
+
</Tabs>
|
|
45
|
+
|
|
27
46
|
## Examples
|
|
28
47
|
|
|
29
48
|
Retrieve all Microsoft Entra ID role definitions
|
|
@@ -1,4 +1,6 @@
|
|
|
1
1
|
import Global from '../../_global.mdx';
|
|
2
|
+
import Tabs from '@theme/Tabs';
|
|
3
|
+
import TabItem from '@theme/TabItem';
|
|
2
4
|
|
|
3
5
|
# entra roledefinition remove
|
|
4
6
|
|
|
@@ -33,6 +35,25 @@ When the role definition is removed, all the associated role assignments are del
|
|
|
33
35
|
|
|
34
36
|
:::
|
|
35
37
|
|
|
38
|
+
## Permissions
|
|
39
|
+
|
|
40
|
+
<Tabs>
|
|
41
|
+
<TabItem value="Delegated">
|
|
42
|
+
|
|
43
|
+
| Resource | Permissions |
|
|
44
|
+
|-----------------|------------------------------------|
|
|
45
|
+
| Microsoft Graph | RoleManagement.ReadWrite.Directory |
|
|
46
|
+
|
|
47
|
+
</TabItem>
|
|
48
|
+
<TabItem value="Application">
|
|
49
|
+
|
|
50
|
+
| Resource | Permissions |
|
|
51
|
+
|-----------------|------------------------------------|
|
|
52
|
+
| Microsoft Graph | RoleManagement.ReadWrite.Directory |
|
|
53
|
+
|
|
54
|
+
</TabItem>
|
|
55
|
+
</Tabs>
|
|
56
|
+
|
|
36
57
|
## Examples
|
|
37
58
|
|
|
38
59
|
Remove a role definition specified by id without prompting
|
|
@@ -1,4 +1,6 @@
|
|
|
1
1
|
import Global from '../../_global.mdx';
|
|
2
|
+
import Tabs from '@theme/Tabs';
|
|
3
|
+
import TabItem from '@theme/TabItem';
|
|
2
4
|
|
|
3
5
|
# entra roledefinition set
|
|
4
6
|
|
|
@@ -41,6 +43,25 @@ m365 entra roledefinition set [options]
|
|
|
41
43
|
|
|
42
44
|
Use the `m365 entra rolepermission list --resourceNamespace microsoft.directory` command to get a list of available resource actions.
|
|
43
45
|
|
|
46
|
+
## Permissions
|
|
47
|
+
|
|
48
|
+
<Tabs>
|
|
49
|
+
<TabItem value="Delegated">
|
|
50
|
+
|
|
51
|
+
| Resource | Permissions |
|
|
52
|
+
|-----------------|------------------------------------|
|
|
53
|
+
| Microsoft Graph | RoleManagement.ReadWrite.Directory |
|
|
54
|
+
|
|
55
|
+
</TabItem>
|
|
56
|
+
<TabItem value="Application">
|
|
57
|
+
|
|
58
|
+
| Resource | Permissions |
|
|
59
|
+
|-----------------|------------------------------------|
|
|
60
|
+
| Microsoft Graph | RoleManagement.ReadWrite.Directory |
|
|
61
|
+
|
|
62
|
+
</TabItem>
|
|
63
|
+
</Tabs>
|
|
64
|
+
|
|
44
65
|
## Examples
|
|
45
66
|
|
|
46
67
|
Update a custom Microsoft Entra ID role specified by the id
|
|
@@ -1,4 +1,6 @@
|
|
|
1
1
|
import Global from '../../_global.mdx';
|
|
2
|
+
import Tabs from '@theme/Tabs';
|
|
3
|
+
import TabItem from '@theme/TabItem';
|
|
2
4
|
|
|
3
5
|
# entra siteclassification disable
|
|
4
6
|
|
|
@@ -19,6 +21,25 @@ m365 entra siteclassification disable [options]
|
|
|
19
21
|
|
|
20
22
|
<Global />
|
|
21
23
|
|
|
24
|
+
## Permissions
|
|
25
|
+
|
|
26
|
+
<Tabs>
|
|
27
|
+
<TabItem value="Delegated">
|
|
28
|
+
|
|
29
|
+
| Resource | Permissions |
|
|
30
|
+
|-----------------|-----------------------------|
|
|
31
|
+
| Microsoft Graph | GroupSettings.ReadWrite.All |
|
|
32
|
+
|
|
33
|
+
</TabItem>
|
|
34
|
+
<TabItem value="Application">
|
|
35
|
+
|
|
36
|
+
| Resource | Permissions |
|
|
37
|
+
|-----------------|-----------------------------|
|
|
38
|
+
| Microsoft Graph | GroupSettings.ReadWrite.All |
|
|
39
|
+
|
|
40
|
+
</TabItem>
|
|
41
|
+
</Tabs>
|
|
42
|
+
|
|
22
43
|
## Examples
|
|
23
44
|
|
|
24
45
|
Disable site classification.
|
|
@@ -1,4 +1,6 @@
|
|
|
1
1
|
import Global from '../../_global.mdx';
|
|
2
|
+
import Tabs from '@theme/Tabs';
|
|
3
|
+
import TabItem from '@theme/TabItem';
|
|
2
4
|
|
|
3
5
|
# entra siteclassification enable
|
|
4
6
|
|
|
@@ -28,6 +30,25 @@ m365 entra siteclassification enable [options]
|
|
|
28
30
|
|
|
29
31
|
<Global />
|
|
30
32
|
|
|
33
|
+
## Permissions
|
|
34
|
+
|
|
35
|
+
<Tabs>
|
|
36
|
+
<TabItem value="Delegated">
|
|
37
|
+
|
|
38
|
+
| Resource | Permissions |
|
|
39
|
+
|-----------------|-----------------------------|
|
|
40
|
+
| Microsoft Graph | GroupSettings.ReadWrite.All |
|
|
41
|
+
|
|
42
|
+
</TabItem>
|
|
43
|
+
<TabItem value="Application">
|
|
44
|
+
|
|
45
|
+
| Resource | Permissions |
|
|
46
|
+
|-----------------|-----------------------------|
|
|
47
|
+
| Microsoft Graph | GroupSettings.ReadWrite.All |
|
|
48
|
+
|
|
49
|
+
</TabItem>
|
|
50
|
+
</Tabs>
|
|
51
|
+
|
|
31
52
|
## Examples
|
|
32
53
|
|
|
33
54
|
Enable site classification.
|
|
@@ -16,6 +16,25 @@ m365 entra siteclassification get [options]
|
|
|
16
16
|
|
|
17
17
|
<Global />
|
|
18
18
|
|
|
19
|
+
## Permissions
|
|
20
|
+
|
|
21
|
+
<Tabs>
|
|
22
|
+
<TabItem value="Delegated">
|
|
23
|
+
|
|
24
|
+
| Resource | Permissions |
|
|
25
|
+
|-----------------|------------------------|
|
|
26
|
+
| Microsoft Graph | GroupSettings.Read.All |
|
|
27
|
+
|
|
28
|
+
</TabItem>
|
|
29
|
+
<TabItem value="Application">
|
|
30
|
+
|
|
31
|
+
| Resource | Permissions |
|
|
32
|
+
|-----------------|------------------------|
|
|
33
|
+
| Microsoft Graph | GroupSettings.Read.All |
|
|
34
|
+
|
|
35
|
+
</TabItem>
|
|
36
|
+
</Tabs>
|
|
37
|
+
|
|
19
38
|
## Examples
|
|
20
39
|
|
|
21
40
|
Get information about the Microsoft 365 Tenant site classification.
|
|
@@ -1,4 +1,6 @@
|
|
|
1
1
|
import Global from '../../_global.mdx';
|
|
2
|
+
import Tabs from '@theme/Tabs';
|
|
3
|
+
import TabItem from '@theme/TabItem';
|
|
2
4
|
|
|
3
5
|
# entra siteclassification set
|
|
4
6
|
|
|
@@ -28,6 +30,24 @@ m365 entra siteclassification set [options]
|
|
|
28
30
|
|
|
29
31
|
<Global />
|
|
30
32
|
|
|
33
|
+
## Permissions
|
|
34
|
+
|
|
35
|
+
<Tabs>
|
|
36
|
+
<TabItem value="Delegated">
|
|
37
|
+
|
|
38
|
+
| Resource | Permissions |
|
|
39
|
+
|-----------------|-----------------------------|
|
|
40
|
+
| Microsoft Graph | GroupSettings.ReadWrite.All |
|
|
41
|
+
|
|
42
|
+
</TabItem>
|
|
43
|
+
<TabItem value="Application">
|
|
44
|
+
|
|
45
|
+
| Resource | Permissions |
|
|
46
|
+
|-----------------|-----------------------------|
|
|
47
|
+
| Microsoft Graph | GroupSettings.ReadWrite.All |
|
|
48
|
+
|
|
49
|
+
</TabItem>
|
|
50
|
+
</Tabs>
|
|
31
51
|
|
|
32
52
|
## Examples
|
|
33
53
|
|
|
@@ -1,4 +1,6 @@
|
|
|
1
1
|
import Global from '../../_global.mdx';
|
|
2
|
+
import Tabs from '@theme/Tabs';
|
|
3
|
+
import TabItem from '@theme/TabItem';
|
|
2
4
|
|
|
3
5
|
# external connection add
|
|
4
6
|
|
|
@@ -38,6 +40,25 @@ m365 search externalconnection add
|
|
|
38
40
|
|
|
39
41
|
The `id` must be at least 3 and no more than 32 characters long. It can contain only alphanumeric characters, can't begin with _Microsoft_ and can be any of the following values: *None, Directory, Exchange, ExchangeArchive, LinkedIn, Mailbox, OneDriveBusiness, SharePoint, Teams, Yammer, Connectors, TaskFabric, PowerBI, Assistant, TopicEngine, MSFT_All_Connectors*.
|
|
40
42
|
|
|
43
|
+
## Permissions
|
|
44
|
+
|
|
45
|
+
<Tabs>
|
|
46
|
+
<TabItem value="Delegated">
|
|
47
|
+
|
|
48
|
+
| Resource | Permissions |
|
|
49
|
+
|-----------------|--------------------------------------|
|
|
50
|
+
| Microsoft Graph | ExternalConnection.ReadWrite.OwnedBy |
|
|
51
|
+
|
|
52
|
+
</TabItem>
|
|
53
|
+
<TabItem value="Application">
|
|
54
|
+
|
|
55
|
+
| Resource | Permissions |
|
|
56
|
+
|-----------------|--------------------------------------|
|
|
57
|
+
| Microsoft Graph | ExternalConnection.ReadWrite.OwnedBy |
|
|
58
|
+
|
|
59
|
+
</TabItem>
|
|
60
|
+
</Tabs>
|
|
61
|
+
|
|
41
62
|
## Examples
|
|
42
63
|
|
|
43
64
|
Adds a new external connection with name and description of test app.
|
|
@@ -49,6 +49,25 @@ Some checks must be done manually, because there are no APIs available to verify
|
|
|
49
49
|
|
|
50
50
|
When you check the compatibility with all UXs, and there are multiple checks with the same ID, the command will use the first matching check, following the order listed above.
|
|
51
51
|
|
|
52
|
+
## Permissions
|
|
53
|
+
|
|
54
|
+
<Tabs>
|
|
55
|
+
<TabItem value="Delegated">
|
|
56
|
+
|
|
57
|
+
| Resource | Permissions |
|
|
58
|
+
|-----------------|----------------------------------------------------------------------|
|
|
59
|
+
| Microsoft Graph | ExternalConnection.ReadWrite.OwnedBy, ExternalItem.ReadWrite.OwnedBy |
|
|
60
|
+
|
|
61
|
+
</TabItem>
|
|
62
|
+
<TabItem value="Application">
|
|
63
|
+
|
|
64
|
+
| Resource | Permissions |
|
|
65
|
+
|-----------------|----------------------------------------------------------------------|
|
|
66
|
+
| Microsoft Graph | ExternalConnection.ReadWrite.OwnedBy, ExternalItem.ReadWrite.OwnedBy |
|
|
67
|
+
|
|
68
|
+
</TabItem>
|
|
69
|
+
</Tabs>
|
|
70
|
+
|
|
52
71
|
## Examples
|
|
53
72
|
|
|
54
73
|
Checks if the external connection with the specified ID is correctly configured for use with Copilot for Microsoft 365.
|
|
@@ -30,6 +30,25 @@ m365 search externalconnection get
|
|
|
30
30
|
|
|
31
31
|
<Global />
|
|
32
32
|
|
|
33
|
+
## Permissions
|
|
34
|
+
|
|
35
|
+
<Tabs>
|
|
36
|
+
<TabItem value="Delegated">
|
|
37
|
+
|
|
38
|
+
| Resource | Permissions |
|
|
39
|
+
|-----------------|--------------------------------------|
|
|
40
|
+
| Microsoft Graph | ExternalConnection.ReadWrite.OwnedBy |
|
|
41
|
+
|
|
42
|
+
</TabItem>
|
|
43
|
+
<TabItem value="Application">
|
|
44
|
+
|
|
45
|
+
| Resource | Permissions |
|
|
46
|
+
|-----------------|--------------------------------------|
|
|
47
|
+
| Microsoft Graph | ExternalConnection.ReadWrite.OwnedBy |
|
|
48
|
+
|
|
49
|
+
</TabItem>
|
|
50
|
+
</Tabs>
|
|
51
|
+
|
|
33
52
|
## Examples
|
|
34
53
|
|
|
35
54
|
Get the External Connection by its id.
|
|
@@ -22,6 +22,25 @@ m365 search externalconnection list
|
|
|
22
22
|
|
|
23
23
|
<Global />
|
|
24
24
|
|
|
25
|
+
## Permissions
|
|
26
|
+
|
|
27
|
+
<Tabs>
|
|
28
|
+
<TabItem value="Delegated">
|
|
29
|
+
|
|
30
|
+
| Resource | Permissions |
|
|
31
|
+
|-----------------|--------------------------------------|
|
|
32
|
+
| Microsoft Graph | ExternalConnection.ReadWrite.OwnedBy |
|
|
33
|
+
|
|
34
|
+
</TabItem>
|
|
35
|
+
<TabItem value="Application">
|
|
36
|
+
|
|
37
|
+
| Resource | Permissions |
|
|
38
|
+
|-----------------|--------------------------------------|
|
|
39
|
+
| Microsoft Graph | ExternalConnection.ReadWrite.OwnedBy |
|
|
40
|
+
|
|
41
|
+
</TabItem>
|
|
42
|
+
</Tabs>
|
|
43
|
+
|
|
25
44
|
## Examples
|
|
26
45
|
|
|
27
46
|
List external connections.
|
|
@@ -1,4 +1,6 @@
|
|
|
1
1
|
import Global from '../../_global.mdx';
|
|
2
|
+
import Tabs from '@theme/Tabs';
|
|
3
|
+
import TabItem from '@theme/TabItem';
|
|
2
4
|
|
|
3
5
|
# external connection remove
|
|
4
6
|
|
|
@@ -35,6 +37,25 @@ m365 search externalconnection remove
|
|
|
35
37
|
|
|
36
38
|
If the command finds multiple external connections with the specified name, it will prompt you to disambiguate which external connection it should remove, listing the discovered IDs.
|
|
37
39
|
|
|
40
|
+
## Permissions
|
|
41
|
+
|
|
42
|
+
<Tabs>
|
|
43
|
+
<TabItem value="Delegated">
|
|
44
|
+
|
|
45
|
+
| Resource | Permissions |
|
|
46
|
+
|-----------------|--------------------------------------|
|
|
47
|
+
| Microsoft Graph | ExternalConnection.ReadWrite.OwnedBy |
|
|
48
|
+
|
|
49
|
+
</TabItem>
|
|
50
|
+
<TabItem value="Application">
|
|
51
|
+
|
|
52
|
+
| Resource | Permissions |
|
|
53
|
+
|-----------------|--------------------------------------|
|
|
54
|
+
| Microsoft Graph | ExternalConnection.ReadWrite.OwnedBy |
|
|
55
|
+
|
|
56
|
+
</TabItem>
|
|
57
|
+
</Tabs>
|
|
58
|
+
|
|
38
59
|
## Examples
|
|
39
60
|
|
|
40
61
|
Removes external connection by its id.
|