@pnp/cli-microsoft365 11.7.0-beta.bd906c5 → 11.7.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (51) hide show
  1. package/.devproxy/api-specs/sharepoint.yaml +53 -0
  2. package/allCommands.json +1 -1
  3. package/allCommandsFull.json +1 -1
  4. package/dist/m365/context/commands/option/option-list.js +6 -1
  5. package/dist/m365/entra/commands/resourcenamespace/resourcenamespace-list.js +6 -0
  6. package/dist/m365/external/commands/connection/connection-list.js +6 -0
  7. package/dist/m365/outlook/commands/calendar/calendar-set.js +132 -0
  8. package/dist/m365/outlook/commands/calendargroup/calendargroup-get.js +114 -0
  9. package/dist/m365/outlook/commands.js +2 -0
  10. package/dist/m365/spo/commands/applicationcustomizer/applicationcustomizer-add.js +13 -1
  11. package/dist/m365/spo/commands/applicationcustomizer/applicationcustomizer-set.js +24 -3
  12. package/dist/m365/spo/commands/brandcenter/brandcenter-colors-list.js +59 -0
  13. package/dist/m365/spo/commands/file/file-archive.js +83 -0
  14. package/dist/m365/spo/commands/propertybag/propertybag-set.js +3 -9
  15. package/dist/m365/spo/commands/tenant/tenant-applicationcustomizer-add.js +20 -0
  16. package/dist/m365/spo/commands/tenant/tenant-applicationcustomizer-set.js +27 -2
  17. package/dist/m365/spo/commands/tenant/tenant-settings-set.js +5 -1
  18. package/dist/m365/spo/commands.js +2 -0
  19. package/dist/request.js +0 -16
  20. package/docs/docs/cmd/entra/m365group/m365group-user-add.mdx +21 -0
  21. package/docs/docs/cmd/entra/m365group/m365group-user-list.mdx +19 -0
  22. package/docs/docs/cmd/entra/m365group/m365group-user-remove.mdx +21 -0
  23. package/docs/docs/cmd/entra/m365group/m365group-user-set.mdx +21 -0
  24. package/docs/docs/cmd/entra/roledefinition/roledefinition-add.mdx +19 -0
  25. package/docs/docs/cmd/entra/roledefinition/roledefinition-get.mdx +19 -0
  26. package/docs/docs/cmd/entra/roledefinition/roledefinition-list.mdx +19 -0
  27. package/docs/docs/cmd/entra/roledefinition/roledefinition-remove.mdx +21 -0
  28. package/docs/docs/cmd/entra/roledefinition/roledefinition-set.mdx +21 -0
  29. package/docs/docs/cmd/entra/siteclassification/siteclassification-disable.mdx +21 -0
  30. package/docs/docs/cmd/entra/siteclassification/siteclassification-enable.mdx +21 -0
  31. package/docs/docs/cmd/entra/siteclassification/siteclassification-get.mdx +19 -0
  32. package/docs/docs/cmd/entra/siteclassification/siteclassification-set.mdx +20 -0
  33. package/docs/docs/cmd/external/connection/connection-add.mdx +21 -0
  34. package/docs/docs/cmd/external/connection/connection-doctor.mdx +19 -0
  35. package/docs/docs/cmd/external/connection/connection-get.mdx +19 -0
  36. package/docs/docs/cmd/external/connection/connection-list.mdx +19 -0
  37. package/docs/docs/cmd/external/connection/connection-remove.mdx +21 -0
  38. package/docs/docs/cmd/external/connection/connection-schema-add.mdx +21 -0
  39. package/docs/docs/cmd/external/connection/connection-urltoitemresolver-add.mdx +21 -0
  40. package/docs/docs/cmd/external/item/item-add.mdx +19 -0
  41. package/docs/docs/cmd/outlook/calendar/calendar-set.mdx +178 -0
  42. package/docs/docs/cmd/outlook/calendargroup/calendargroup-get.mdx +125 -0
  43. package/docs/docs/cmd/spo/applicationcustomizer/applicationcustomizer-add.mdx +14 -11
  44. package/docs/docs/cmd/spo/applicationcustomizer/applicationcustomizer-set.mdx +9 -6
  45. package/docs/docs/cmd/spo/brandcenter/brandcenter-colors-list.mdx +115 -0
  46. package/docs/docs/cmd/spo/file/file-archive.mdx +68 -0
  47. package/docs/docs/cmd/spo/propertybag/propertybag-set.mdx +1 -1
  48. package/docs/docs/cmd/spo/tenant/tenant-applicationcustomizer-add.mdx +13 -10
  49. package/docs/docs/cmd/spo/tenant/tenant-applicationcustomizer-set.mdx +7 -4
  50. package/docs/docs/cmd/spo/tenant/tenant-settings-set.mdx +3 -0
  51. package/package.json +2 -2
@@ -121,7 +121,7 @@ class SpoTenantApplicationCustomizerSetCommand extends SpoCommand {
121
121
  return outputParsed[0];
122
122
  }
123
123
  async updateTenantWideExtension(appCatalogUrl, options, listServerRelativeUrl, itemId, logger) {
124
- const { title, id, clientSideComponentId, newTitle, newClientSideComponentId, clientSideComponentProperties, webTemplate } = options;
124
+ const { title, id, clientSideComponentId, newTitle, newClientSideComponentId, clientSideComponentProperties, hostProperties, webTemplate } = options;
125
125
  if (this.verbose) {
126
126
  await logger.logToStderr(`Updating tenant-wide application customizer: "${title || id || clientSideComponentId}"...`);
127
127
  }
@@ -144,6 +144,12 @@ class SpoTenantApplicationCustomizerSetCommand extends SpoCommand {
144
144
  FieldValue: clientSideComponentProperties
145
145
  });
146
146
  }
147
+ if (hostProperties !== undefined) {
148
+ formValues.push({
149
+ FieldName: 'TenantWideExtensionHostProperties',
150
+ FieldValue: hostProperties
151
+ });
152
+ }
147
153
  if (webTemplate !== undefined) {
148
154
  formValues.push({
149
155
  FieldName: 'TenantWideExtensionWebTemplate',
@@ -172,6 +178,7 @@ _SpoTenantApplicationCustomizerSetCommand_instances = new WeakSet(), _SpoTenantA
172
178
  newTitle: typeof args.options.newTitle !== 'undefined',
173
179
  newClientSideComponentId: typeof args.options.newClientSideComponentId !== 'undefined',
174
180
  clientSideComponentProperties: typeof args.options.clientSideComponentProperties !== 'undefined',
181
+ hostProperties: typeof args.options.hostProperties !== 'undefined',
175
182
  webTemplate: typeof args.options.webTemplate !== 'undefined'
176
183
  });
177
184
  });
@@ -188,6 +195,8 @@ _SpoTenantApplicationCustomizerSetCommand_instances = new WeakSet(), _SpoTenantA
188
195
  option: '--newClientSideComponentId [newClientSideComponentId]'
189
196
  }, {
190
197
  option: '-p, --clientSideComponentProperties [clientSideComponentProperties]'
198
+ }, {
199
+ option: '--hostProperties [hostProperties]'
191
200
  }, {
192
201
  option: '-w, --webTemplate [webTemplate]'
193
202
  });
@@ -202,7 +211,23 @@ _SpoTenantApplicationCustomizerSetCommand_instances = new WeakSet(), _SpoTenantA
202
211
  if (args.options.newClientSideComponentId && !validation.isValidGuid(args.options.newClientSideComponentId)) {
203
212
  return `${args.options.newClientSideComponentId} is not a valid GUID`;
204
213
  }
205
- if (!args.options.newTitle && !args.options.newClientSideComponentId && !args.options.clientSideComponentProperties && !args.options.webTemplate) {
214
+ if (args.options.clientSideComponentProperties) {
215
+ try {
216
+ JSON.parse(args.options.clientSideComponentProperties);
217
+ }
218
+ catch (e) {
219
+ return `An error has occurred while parsing clientSideComponentProperties: ${e}`;
220
+ }
221
+ }
222
+ if (args.options.hostProperties) {
223
+ try {
224
+ JSON.parse(args.options.hostProperties);
225
+ }
226
+ catch (e) {
227
+ return `An error has occurred while parsing hostProperties: ${e}`;
228
+ }
229
+ }
230
+ if (!args.options.newTitle && !args.options.newClientSideComponentId && !args.options.clientSideComponentProperties && args.options.hostProperties === undefined && !args.options.webTemplate) {
206
231
  return `Please specify an option to be updated`;
207
232
  }
208
233
  return true;
@@ -414,6 +414,9 @@ _a = SpoTenantSettingsSetCommand, _SpoTenantSettingsSetCommand_instances = new W
414
414
  }, {
415
415
  option: '--SyncAadB2BManagementPolicy [SyncAadB2BManagementPolicy]',
416
416
  autocomplete: ['true', 'false']
417
+ }, {
418
+ option: '--AllowWebPropertyBagUpdateWhenDenyAddAndCustomizePagesIsEnabled [AllowWebPropertyBagUpdateWhenDenyAddAndCustomizePagesIsEnabled]',
419
+ autocomplete: ['true', 'false']
417
420
  });
418
421
  }, _SpoTenantSettingsSetCommand_initValidators = function _SpoTenantSettingsSetCommand_initValidators() {
419
422
  this.validators.push(async (args) => {
@@ -496,7 +499,8 @@ SpoTenantSettingsSetCommand.booleanOptions = [
496
499
  'DisableCustomAppAuthentication',
497
500
  'CommentsOnListItemsDisabled',
498
501
  'EnableAzureADB2BIntegration',
499
- 'SyncAadB2BManagementPolicy'
502
+ 'SyncAadB2BManagementPolicy',
503
+ 'AllowWebPropertyBagUpdateWhenDenyAddAndCustomizePagesIsEnabled'
500
504
  ];
501
505
  export default new SpoTenantSettingsSetCommand();
502
506
  //# sourceMappingURL=tenant-settings-set.js.map
@@ -19,6 +19,7 @@ export default {
19
19
  APPLICATIONCUSTOMIZER_SET: `${prefix} applicationcustomizer set`,
20
20
  APPPAGE_ADD: `${prefix} apppage add`,
21
21
  APPPAGE_SET: `${prefix} apppage set`,
22
+ BRANDCENTER_COLORS_LIST: `${prefix} brandcenter colors list`,
22
23
  BRANDCENTER_SETTINGS_LIST: `${prefix} brandcenter settings list`,
23
24
  CDN_GET: `${prefix} cdn get`,
24
25
  CDN_ORIGIN_ADD: `${prefix} cdn origin add`,
@@ -61,6 +62,7 @@ export default {
61
62
  FIELD_REMOVE: `${prefix} field remove`,
62
63
  FIELD_SET: `${prefix} field set`,
63
64
  FILE_ADD: `${prefix} file add`,
65
+ FILE_ARCHIVE: `${prefix} file archive`,
64
66
  FILE_CHECKIN: `${prefix} file checkin`,
65
67
  FILE_CHECKOUT: `${prefix} file checkout`,
66
68
  FILE_CHECKOUT_UNDO: `${prefix} file checkout undo`,
package/dist/request.js CHANGED
@@ -154,10 +154,6 @@ class Request {
154
154
  options.headers.authorization = `Bearer ${accessToken}`;
155
155
  }
156
156
  }
157
- const proxyUrl = process.env.HTTP_PROXY || process.env.HTTPS_PROXY;
158
- if (proxyUrl) {
159
- options.proxy = this.createProxyConfigFromUrl(proxyUrl);
160
- }
161
157
  const res = await this.req(options);
162
158
  const end = process.hrtime.bigint();
163
159
  timings.api.push(Number(end - start));
@@ -192,18 +188,6 @@ class Request {
192
188
  options.url = options.url.substring(0, 8) +
193
189
  options.url.substring(8).replace('//', '/');
194
190
  }
195
- createProxyConfigFromUrl(url) {
196
- const parsedUrl = new URL(url);
197
- const port = parsedUrl.port || (url.toLowerCase().startsWith('https') ? 443 : 80);
198
- let authObject = null;
199
- if (parsedUrl.username && parsedUrl.password) {
200
- authObject = {
201
- username: parsedUrl.username,
202
- password: parsedUrl.password
203
- };
204
- }
205
- return { host: parsedUrl.hostname, port: Number(port), protocol: 'http', ...(authObject && { auth: authObject }) };
206
- }
207
191
  }
208
192
  export default new Request();
209
193
  //# sourceMappingURL=request.js.map
@@ -1,4 +1,6 @@
1
1
  import Global from '../../_global.mdx';
2
+ import Tabs from '@theme/Tabs';
3
+ import TabItem from '@theme/TabItem';
2
4
 
3
5
  # entra m365group user add
4
6
 
@@ -43,6 +45,25 @@ m365 teams user add [options]
43
45
 
44
46
  <Global />
45
47
 
48
+ ## Permissions
49
+
50
+ <Tabs>
51
+ <TabItem value="Delegated">
52
+
53
+ | Resource | Permissions |
54
+ |-----------------|-----------------------------------------|
55
+ | Microsoft Graph | Group.ReadWrite.All, User.ReadBasic.All |
56
+
57
+ </TabItem>
58
+ <TabItem value="Application">
59
+
60
+ | Resource | Permissions |
61
+ |-----------------|------------------------------------|
62
+ | Microsoft Graph | Group.ReadWrite.All, User.Read.All |
63
+
64
+ </TabItem>
65
+ </Tabs>
66
+
46
67
  ## Examples
47
68
 
48
69
  Add a new member with the userNames parameter to the specified Microsoft 365 Group.
@@ -37,6 +37,25 @@ m365 entra m365group user list [options]
37
37
 
38
38
  When the `properties` option includes values with a `/`, for example: `manager/displayName`, an additional `$expand` query parameter will be included on `manager`.
39
39
 
40
+ ## Permissions
41
+
42
+ <Tabs>
43
+ <TabItem value="Delegated">
44
+
45
+ | Resource | Permissions |
46
+ |-----------------|------------------------------------------|
47
+ | Microsoft Graph | GroupMember.Read.All, User.ReadBasic.All |
48
+
49
+ </TabItem>
50
+ <TabItem value="Application">
51
+
52
+ | Resource | Permissions |
53
+ |-----------------|-------------------------------------|
54
+ | Microsoft Graph | GroupMember.Read.All, User.Read.All |
55
+
56
+ </TabItem>
57
+ </Tabs>
58
+
40
59
  ## Examples
41
60
 
42
61
  List all users and their role from Microsoft 365 group specified by ID.
@@ -1,4 +1,6 @@
1
1
  import Global from '../../_global.mdx';
2
+ import Tabs from '@theme/Tabs';
3
+ import TabItem from '@theme/TabItem';
2
4
 
3
5
  # entra m365group user remove
4
6
 
@@ -41,6 +43,25 @@ m365 entra m365group user remove [options]
41
43
 
42
44
  You can remove users from a Microsoft 365 Group or Microsoft Teams team if you are owner of that group or team.
43
45
 
46
+ ## Permissions
47
+
48
+ <Tabs>
49
+ <TabItem value="Delegated">
50
+
51
+ | Resource | Permissions |
52
+ |-----------------|-----------------------------------------|
53
+ | Microsoft Graph | Group.ReadWrite.All, User.ReadBasic.All |
54
+
55
+ </TabItem>
56
+ <TabItem value="Application">
57
+
58
+ | Resource | Permissions |
59
+ |-----------------|------------------------------------|
60
+ | Microsoft Graph | Group.ReadWrite.All, User.Read.All |
61
+
62
+ </TabItem>
63
+ </Tabs>
64
+
44
65
  ## Examples
45
66
 
46
67
  Removes user from the specified Microsoft 365 Group.
@@ -1,4 +1,6 @@
1
1
  import Global from '../../_global.mdx';
2
+ import Tabs from '@theme/Tabs';
3
+ import TabItem from '@theme/TabItem';
2
4
 
3
5
  # entra m365group user set
4
6
 
@@ -41,6 +43,25 @@ m365 entra m365group user set [options]
41
43
 
42
44
  The command will return an error if the user already has the specified role in the given Microsoft 365 Group or Microsoft Teams team.
43
45
 
46
+ ## Permissions
47
+
48
+ <Tabs>
49
+ <TabItem value="Delegated">
50
+
51
+ | Resource | Permissions |
52
+ |-----------------|-----------------------------------------|
53
+ | Microsoft Graph | Group.ReadWrite.All, User.ReadBasic.All |
54
+
55
+ </TabItem>
56
+ <TabItem value="Application">
57
+
58
+ | Resource | Permissions |
59
+ |-----------------|------------------------------------|
60
+ | Microsoft Graph | Group.ReadWrite.All, User.Read.All |
61
+
62
+ </TabItem>
63
+ </Tabs>
64
+
44
65
  ## Examples
45
66
 
46
67
  Promote a single user to Owner of the given Microsoft 365 Group
@@ -37,6 +37,25 @@ m365 entra roledefinition add [options]
37
37
 
38
38
  Use the `m365 entra rolepermission list --resourceNamespace microsoft.directory` command to get a list of available resource actions.
39
39
 
40
+ ## Permissions
41
+
42
+ <Tabs>
43
+ <TabItem value="Delegated">
44
+
45
+ | Resource | Permissions |
46
+ |-----------------|------------------------------------|
47
+ | Microsoft Graph | RoleManagement.ReadWrite.Directory |
48
+
49
+ </TabItem>
50
+ <TabItem value="Application">
51
+
52
+ | Resource | Permissions |
53
+ |-----------------|------------------------------------|
54
+ | Microsoft Graph | RoleManagement.ReadWrite.Directory |
55
+
56
+ </TabItem>
57
+ </Tabs>
58
+
40
59
  ## Examples
41
60
 
42
61
  Create a custom Microsoft Entra ID role
@@ -27,6 +27,25 @@ m365 entra roledefinition get [options]
27
27
 
28
28
  <Global />
29
29
 
30
+ ## Permissions
31
+
32
+ <Tabs>
33
+ <TabItem value="Delegated">
34
+
35
+ | Resource | Permissions |
36
+ |-----------------|-------------------------------|
37
+ | Microsoft Graph | RoleManagement.Read.Directory |
38
+
39
+ </TabItem>
40
+ <TabItem value="Application">
41
+
42
+ | Resource | Permissions |
43
+ |-----------------|-------------------------------|
44
+ | Microsoft Graph | RoleManagement.Read.Directory |
45
+
46
+ </TabItem>
47
+ </Tabs>
48
+
30
49
  ## Examples
31
50
 
32
51
  Get info about a role specified by the id
@@ -24,6 +24,25 @@ m365 entra roledefinition list [options]
24
24
 
25
25
  <Global />
26
26
 
27
+ ## Permissions
28
+
29
+ <Tabs>
30
+ <TabItem value="Delegated">
31
+
32
+ | Resource | Permissions |
33
+ |-----------------|-------------------------------|
34
+ | Microsoft Graph | RoleManagement.Read.Directory |
35
+
36
+ </TabItem>
37
+ <TabItem value="Application">
38
+
39
+ | Resource | Permissions |
40
+ |-----------------|-------------------------------|
41
+ | Microsoft Graph | RoleManagement.Read.Directory |
42
+
43
+ </TabItem>
44
+ </Tabs>
45
+
27
46
  ## Examples
28
47
 
29
48
  Retrieve all Microsoft Entra ID role definitions
@@ -1,4 +1,6 @@
1
1
  import Global from '../../_global.mdx';
2
+ import Tabs from '@theme/Tabs';
3
+ import TabItem from '@theme/TabItem';
2
4
 
3
5
  # entra roledefinition remove
4
6
 
@@ -33,6 +35,25 @@ When the role definition is removed, all the associated role assignments are del
33
35
 
34
36
  :::
35
37
 
38
+ ## Permissions
39
+
40
+ <Tabs>
41
+ <TabItem value="Delegated">
42
+
43
+ | Resource | Permissions |
44
+ |-----------------|------------------------------------|
45
+ | Microsoft Graph | RoleManagement.ReadWrite.Directory |
46
+
47
+ </TabItem>
48
+ <TabItem value="Application">
49
+
50
+ | Resource | Permissions |
51
+ |-----------------|------------------------------------|
52
+ | Microsoft Graph | RoleManagement.ReadWrite.Directory |
53
+
54
+ </TabItem>
55
+ </Tabs>
56
+
36
57
  ## Examples
37
58
 
38
59
  Remove a role definition specified by id without prompting
@@ -1,4 +1,6 @@
1
1
  import Global from '../../_global.mdx';
2
+ import Tabs from '@theme/Tabs';
3
+ import TabItem from '@theme/TabItem';
2
4
 
3
5
  # entra roledefinition set
4
6
 
@@ -41,6 +43,25 @@ m365 entra roledefinition set [options]
41
43
 
42
44
  Use the `m365 entra rolepermission list --resourceNamespace microsoft.directory` command to get a list of available resource actions.
43
45
 
46
+ ## Permissions
47
+
48
+ <Tabs>
49
+ <TabItem value="Delegated">
50
+
51
+ | Resource | Permissions |
52
+ |-----------------|------------------------------------|
53
+ | Microsoft Graph | RoleManagement.ReadWrite.Directory |
54
+
55
+ </TabItem>
56
+ <TabItem value="Application">
57
+
58
+ | Resource | Permissions |
59
+ |-----------------|------------------------------------|
60
+ | Microsoft Graph | RoleManagement.ReadWrite.Directory |
61
+
62
+ </TabItem>
63
+ </Tabs>
64
+
44
65
  ## Examples
45
66
 
46
67
  Update a custom Microsoft Entra ID role specified by the id
@@ -1,4 +1,6 @@
1
1
  import Global from '../../_global.mdx';
2
+ import Tabs from '@theme/Tabs';
3
+ import TabItem from '@theme/TabItem';
2
4
 
3
5
  # entra siteclassification disable
4
6
 
@@ -19,6 +21,25 @@ m365 entra siteclassification disable [options]
19
21
 
20
22
  <Global />
21
23
 
24
+ ## Permissions
25
+
26
+ <Tabs>
27
+ <TabItem value="Delegated">
28
+
29
+ | Resource | Permissions |
30
+ |-----------------|-----------------------------|
31
+ | Microsoft Graph | GroupSettings.ReadWrite.All |
32
+
33
+ </TabItem>
34
+ <TabItem value="Application">
35
+
36
+ | Resource | Permissions |
37
+ |-----------------|-----------------------------|
38
+ | Microsoft Graph | GroupSettings.ReadWrite.All |
39
+
40
+ </TabItem>
41
+ </Tabs>
42
+
22
43
  ## Examples
23
44
 
24
45
  Disable site classification.
@@ -1,4 +1,6 @@
1
1
  import Global from '../../_global.mdx';
2
+ import Tabs from '@theme/Tabs';
3
+ import TabItem from '@theme/TabItem';
2
4
 
3
5
  # entra siteclassification enable
4
6
 
@@ -28,6 +30,25 @@ m365 entra siteclassification enable [options]
28
30
 
29
31
  <Global />
30
32
 
33
+ ## Permissions
34
+
35
+ <Tabs>
36
+ <TabItem value="Delegated">
37
+
38
+ | Resource | Permissions |
39
+ |-----------------|-----------------------------|
40
+ | Microsoft Graph | GroupSettings.ReadWrite.All |
41
+
42
+ </TabItem>
43
+ <TabItem value="Application">
44
+
45
+ | Resource | Permissions |
46
+ |-----------------|-----------------------------|
47
+ | Microsoft Graph | GroupSettings.ReadWrite.All |
48
+
49
+ </TabItem>
50
+ </Tabs>
51
+
31
52
  ## Examples
32
53
 
33
54
  Enable site classification.
@@ -16,6 +16,25 @@ m365 entra siteclassification get [options]
16
16
 
17
17
  <Global />
18
18
 
19
+ ## Permissions
20
+
21
+ <Tabs>
22
+ <TabItem value="Delegated">
23
+
24
+ | Resource | Permissions |
25
+ |-----------------|------------------------|
26
+ | Microsoft Graph | GroupSettings.Read.All |
27
+
28
+ </TabItem>
29
+ <TabItem value="Application">
30
+
31
+ | Resource | Permissions |
32
+ |-----------------|------------------------|
33
+ | Microsoft Graph | GroupSettings.Read.All |
34
+
35
+ </TabItem>
36
+ </Tabs>
37
+
19
38
  ## Examples
20
39
 
21
40
  Get information about the Microsoft 365 Tenant site classification.
@@ -1,4 +1,6 @@
1
1
  import Global from '../../_global.mdx';
2
+ import Tabs from '@theme/Tabs';
3
+ import TabItem from '@theme/TabItem';
2
4
 
3
5
  # entra siteclassification set
4
6
 
@@ -28,6 +30,24 @@ m365 entra siteclassification set [options]
28
30
 
29
31
  <Global />
30
32
 
33
+ ## Permissions
34
+
35
+ <Tabs>
36
+ <TabItem value="Delegated">
37
+
38
+ | Resource | Permissions |
39
+ |-----------------|-----------------------------|
40
+ | Microsoft Graph | GroupSettings.ReadWrite.All |
41
+
42
+ </TabItem>
43
+ <TabItem value="Application">
44
+
45
+ | Resource | Permissions |
46
+ |-----------------|-----------------------------|
47
+ | Microsoft Graph | GroupSettings.ReadWrite.All |
48
+
49
+ </TabItem>
50
+ </Tabs>
31
51
 
32
52
  ## Examples
33
53
 
@@ -1,4 +1,6 @@
1
1
  import Global from '../../_global.mdx';
2
+ import Tabs from '@theme/Tabs';
3
+ import TabItem from '@theme/TabItem';
2
4
 
3
5
  # external connection add
4
6
 
@@ -38,6 +40,25 @@ m365 search externalconnection add
38
40
 
39
41
  The `id` must be at least 3 and no more than 32 characters long. It can contain only alphanumeric characters, can't begin with _Microsoft_ and can be any of the following values: *None, Directory, Exchange, ExchangeArchive, LinkedIn, Mailbox, OneDriveBusiness, SharePoint, Teams, Yammer, Connectors, TaskFabric, PowerBI, Assistant, TopicEngine, MSFT_All_Connectors*.
40
42
 
43
+ ## Permissions
44
+
45
+ <Tabs>
46
+ <TabItem value="Delegated">
47
+
48
+ | Resource | Permissions |
49
+ |-----------------|--------------------------------------|
50
+ | Microsoft Graph | ExternalConnection.ReadWrite.OwnedBy |
51
+
52
+ </TabItem>
53
+ <TabItem value="Application">
54
+
55
+ | Resource | Permissions |
56
+ |-----------------|--------------------------------------|
57
+ | Microsoft Graph | ExternalConnection.ReadWrite.OwnedBy |
58
+
59
+ </TabItem>
60
+ </Tabs>
61
+
41
62
  ## Examples
42
63
 
43
64
  Adds a new external connection with name and description of test app.
@@ -49,6 +49,25 @@ Some checks must be done manually, because there are no APIs available to verify
49
49
 
50
50
  When you check the compatibility with all UXs, and there are multiple checks with the same ID, the command will use the first matching check, following the order listed above.
51
51
 
52
+ ## Permissions
53
+
54
+ <Tabs>
55
+ <TabItem value="Delegated">
56
+
57
+ | Resource | Permissions |
58
+ |-----------------|----------------------------------------------------------------------|
59
+ | Microsoft Graph | ExternalConnection.ReadWrite.OwnedBy, ExternalItem.ReadWrite.OwnedBy |
60
+
61
+ </TabItem>
62
+ <TabItem value="Application">
63
+
64
+ | Resource | Permissions |
65
+ |-----------------|----------------------------------------------------------------------|
66
+ | Microsoft Graph | ExternalConnection.ReadWrite.OwnedBy, ExternalItem.ReadWrite.OwnedBy |
67
+
68
+ </TabItem>
69
+ </Tabs>
70
+
52
71
  ## Examples
53
72
 
54
73
  Checks if the external connection with the specified ID is correctly configured for use with Copilot for Microsoft 365.
@@ -30,6 +30,25 @@ m365 search externalconnection get
30
30
 
31
31
  <Global />
32
32
 
33
+ ## Permissions
34
+
35
+ <Tabs>
36
+ <TabItem value="Delegated">
37
+
38
+ | Resource | Permissions |
39
+ |-----------------|--------------------------------------|
40
+ | Microsoft Graph | ExternalConnection.ReadWrite.OwnedBy |
41
+
42
+ </TabItem>
43
+ <TabItem value="Application">
44
+
45
+ | Resource | Permissions |
46
+ |-----------------|--------------------------------------|
47
+ | Microsoft Graph | ExternalConnection.ReadWrite.OwnedBy |
48
+
49
+ </TabItem>
50
+ </Tabs>
51
+
33
52
  ## Examples
34
53
 
35
54
  Get the External Connection by its id.
@@ -22,6 +22,25 @@ m365 search externalconnection list
22
22
 
23
23
  <Global />
24
24
 
25
+ ## Permissions
26
+
27
+ <Tabs>
28
+ <TabItem value="Delegated">
29
+
30
+ | Resource | Permissions |
31
+ |-----------------|--------------------------------------|
32
+ | Microsoft Graph | ExternalConnection.ReadWrite.OwnedBy |
33
+
34
+ </TabItem>
35
+ <TabItem value="Application">
36
+
37
+ | Resource | Permissions |
38
+ |-----------------|--------------------------------------|
39
+ | Microsoft Graph | ExternalConnection.ReadWrite.OwnedBy |
40
+
41
+ </TabItem>
42
+ </Tabs>
43
+
25
44
  ## Examples
26
45
 
27
46
  List external connections.
@@ -1,4 +1,6 @@
1
1
  import Global from '../../_global.mdx';
2
+ import Tabs from '@theme/Tabs';
3
+ import TabItem from '@theme/TabItem';
2
4
 
3
5
  # external connection remove
4
6
 
@@ -35,6 +37,25 @@ m365 search externalconnection remove
35
37
 
36
38
  If the command finds multiple external connections with the specified name, it will prompt you to disambiguate which external connection it should remove, listing the discovered IDs.
37
39
 
40
+ ## Permissions
41
+
42
+ <Tabs>
43
+ <TabItem value="Delegated">
44
+
45
+ | Resource | Permissions |
46
+ |-----------------|--------------------------------------|
47
+ | Microsoft Graph | ExternalConnection.ReadWrite.OwnedBy |
48
+
49
+ </TabItem>
50
+ <TabItem value="Application">
51
+
52
+ | Resource | Permissions |
53
+ |-----------------|--------------------------------------|
54
+ | Microsoft Graph | ExternalConnection.ReadWrite.OwnedBy |
55
+
56
+ </TabItem>
57
+ </Tabs>
58
+
38
59
  ## Examples
39
60
 
40
61
  Removes external connection by its id.