@pnp/cli-microsoft365 6.7.0 → 6.8.0-beta.2463cfa
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/m365/planner/commands/roster/roster-plan-list.js +102 -0
- package/dist/m365/planner/commands.js +1 -0
- package/dist/m365/spo/commands/tenant/tenant-settings-set.js +4 -0
- package/dist/m365/teams/commands/meeting/meeting-transcript-list.js +124 -0
- package/dist/m365/teams/commands.js +1 -0
- package/docs/docs/cmd/planner/roster/roster-plan-list.md +109 -0
- package/docs/docs/cmd/spo/feature/feature-enable.md +2 -2
- package/docs/docs/cmd/spo/tenant/tenant-settings-set.md +57 -54
- package/docs/docs/cmd/teams/meeting/meeting-transcript-list.md +96 -0
- package/npm-shrinkwrap.json +2 -2
- package/package.json +3 -2
|
@@ -0,0 +1,102 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
3
|
+
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
4
|
+
return new (P || (P = Promise))(function (resolve, reject) {
|
|
5
|
+
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
6
|
+
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
7
|
+
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
8
|
+
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
9
|
+
});
|
|
10
|
+
};
|
|
11
|
+
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
12
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
13
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
14
|
+
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
15
|
+
};
|
|
16
|
+
var _PlannerRosterPlanListCommand_instances, _PlannerRosterPlanListCommand_initTelemetry, _PlannerRosterPlanListCommand_initOptions, _PlannerRosterPlanListCommand_initValidators, _PlannerRosterPlanListCommand_initOptionSets;
|
|
17
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
18
|
+
const Auth_1 = require("../../../../Auth");
|
|
19
|
+
const GraphCommand_1 = require("../../../base/GraphCommand");
|
|
20
|
+
const commands_1 = require("../../commands");
|
|
21
|
+
const validation_1 = require("../../../../utils/validation");
|
|
22
|
+
const accessToken_1 = require("../../../../utils/accessToken");
|
|
23
|
+
const odata_1 = require("../../../../utils/odata");
|
|
24
|
+
class PlannerRosterPlanListCommand extends GraphCommand_1.default {
|
|
25
|
+
get name() {
|
|
26
|
+
return commands_1.default.ROSTER_PLAN_LIST;
|
|
27
|
+
}
|
|
28
|
+
get description() {
|
|
29
|
+
return 'Lists all Microsoft Planner Roster plans for a specific user';
|
|
30
|
+
}
|
|
31
|
+
constructor() {
|
|
32
|
+
super();
|
|
33
|
+
_PlannerRosterPlanListCommand_instances.add(this);
|
|
34
|
+
__classPrivateFieldGet(this, _PlannerRosterPlanListCommand_instances, "m", _PlannerRosterPlanListCommand_initTelemetry).call(this);
|
|
35
|
+
__classPrivateFieldGet(this, _PlannerRosterPlanListCommand_instances, "m", _PlannerRosterPlanListCommand_initOptions).call(this);
|
|
36
|
+
__classPrivateFieldGet(this, _PlannerRosterPlanListCommand_instances, "m", _PlannerRosterPlanListCommand_initValidators).call(this);
|
|
37
|
+
__classPrivateFieldGet(this, _PlannerRosterPlanListCommand_instances, "m", _PlannerRosterPlanListCommand_initOptionSets).call(this);
|
|
38
|
+
}
|
|
39
|
+
defaultProperties() {
|
|
40
|
+
return ['id', 'title', 'createdDateTime', 'owner'];
|
|
41
|
+
}
|
|
42
|
+
commandAction(logger, args) {
|
|
43
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
44
|
+
const isAppOnlyAccessToken = accessToken_1.accessToken.isAppOnlyAccessToken(Auth_1.default.service.accessTokens[this.resource].accessToken);
|
|
45
|
+
if (isAppOnlyAccessToken && !args.options.userId && !args.options.userName) {
|
|
46
|
+
this.handleError(`Specify at least 'userId' or 'userName' when using application permissions.`);
|
|
47
|
+
}
|
|
48
|
+
else if (!isAppOnlyAccessToken && (args.options.userId || args.options.userName)) {
|
|
49
|
+
this.handleError(`The options 'userId' or 'userName' cannot be used when obtaining Microsoft Planner Roster plans using delegated permissions.`);
|
|
50
|
+
}
|
|
51
|
+
if (this.verbose) {
|
|
52
|
+
logger.logToStderr(`Retrieving Microsoft Planner Roster plans for user: ${args.options.userId || args.options.userName || 'current user'}.`);
|
|
53
|
+
}
|
|
54
|
+
let requestUrl = `${this.resource}/beta/`;
|
|
55
|
+
if (args.options.userId || args.options.userName) {
|
|
56
|
+
requestUrl += `users/${args.options.userId || args.options.userName}`;
|
|
57
|
+
}
|
|
58
|
+
else {
|
|
59
|
+
requestUrl += 'me';
|
|
60
|
+
}
|
|
61
|
+
requestUrl += `/planner/rosterPlans`;
|
|
62
|
+
try {
|
|
63
|
+
const items = yield odata_1.odata.getAllItems(requestUrl);
|
|
64
|
+
logger.log(items);
|
|
65
|
+
}
|
|
66
|
+
catch (err) {
|
|
67
|
+
this.handleRejectedODataJsonPromise(err);
|
|
68
|
+
}
|
|
69
|
+
});
|
|
70
|
+
}
|
|
71
|
+
}
|
|
72
|
+
_PlannerRosterPlanListCommand_instances = new WeakSet(), _PlannerRosterPlanListCommand_initTelemetry = function _PlannerRosterPlanListCommand_initTelemetry() {
|
|
73
|
+
this.telemetry.push((args) => {
|
|
74
|
+
Object.assign(this.telemetryProperties, {
|
|
75
|
+
userId: typeof args.options.userId !== 'undefined',
|
|
76
|
+
userName: typeof args.options.userName !== 'undefined'
|
|
77
|
+
});
|
|
78
|
+
});
|
|
79
|
+
}, _PlannerRosterPlanListCommand_initOptions = function _PlannerRosterPlanListCommand_initOptions() {
|
|
80
|
+
this.options.unshift({
|
|
81
|
+
option: '--userId [userId]'
|
|
82
|
+
}, {
|
|
83
|
+
option: '--userName [userName]'
|
|
84
|
+
});
|
|
85
|
+
}, _PlannerRosterPlanListCommand_initValidators = function _PlannerRosterPlanListCommand_initValidators() {
|
|
86
|
+
this.validators.push((args) => __awaiter(this, void 0, void 0, function* () {
|
|
87
|
+
if (args.options.userId && !validation_1.validation.isValidGuid(args.options.userId)) {
|
|
88
|
+
return `${args.options.userId} is not a valid GUID`;
|
|
89
|
+
}
|
|
90
|
+
if (args.options.userName && !validation_1.validation.isValidUserPrincipalName(args.options.userName)) {
|
|
91
|
+
return `${args.options.userName} is not a valid user principal name (UPN)`;
|
|
92
|
+
}
|
|
93
|
+
return true;
|
|
94
|
+
}));
|
|
95
|
+
}, _PlannerRosterPlanListCommand_initOptionSets = function _PlannerRosterPlanListCommand_initOptionSets() {
|
|
96
|
+
this.optionSets.push({
|
|
97
|
+
options: ['userId', 'userName'],
|
|
98
|
+
runsWhen: (args) => args.options.userId || args.options.userName
|
|
99
|
+
});
|
|
100
|
+
};
|
|
101
|
+
module.exports = new PlannerRosterPlanListCommand();
|
|
102
|
+
//# sourceMappingURL=roster-plan-list.js.map
|
|
@@ -18,6 +18,7 @@ exports.default = {
|
|
|
18
18
|
ROSTER_MEMBER_GET: `${prefix} roster member get`,
|
|
19
19
|
ROSTER_MEMBER_LIST: `${prefix} roster member list`,
|
|
20
20
|
ROSTER_MEMBER_REMOVE: `${prefix} roster member remove`,
|
|
21
|
+
ROSTER_PLAN_LIST: `${prefix} roster plan list`,
|
|
21
22
|
ROSTER_REMOVE: `${prefix} roster remove`,
|
|
22
23
|
TASK_ADD: `${prefix} task add`,
|
|
23
24
|
TASK_CHECKLISTITEM_ADD: `${prefix} task checklistitem add`,
|
|
@@ -418,6 +418,9 @@ _SpoTenantSettingsSetCommand_instances = new WeakSet(), _SpoTenantSettingsSetCom
|
|
|
418
418
|
}, {
|
|
419
419
|
option: '--DisableCustomAppAuthentication [DisableCustomAppAuthentication]',
|
|
420
420
|
autocomplete: ['true', 'false']
|
|
421
|
+
}, {
|
|
422
|
+
option: '--CommentsOnListItemsDisabled [CommentsOnListItemsDisabled]',
|
|
423
|
+
autocomplete: ['true', 'false']
|
|
421
424
|
}, {
|
|
422
425
|
option: '--EnableAzureADB2BIntegration [EnableAzureADB2BIntegration]',
|
|
423
426
|
autocomplete: ['true', 'false']
|
|
@@ -504,6 +507,7 @@ SpoTenantSettingsSetCommand.booleanOptions = [
|
|
|
504
507
|
'ShowNGSCDialogForSyncOnODB',
|
|
505
508
|
'SyncPrivacyProfileProperties',
|
|
506
509
|
'DisableCustomAppAuthentication',
|
|
510
|
+
'CommentsOnListItemsDisabled',
|
|
507
511
|
'EnableAzureADB2BIntegration',
|
|
508
512
|
'SyncAadB2BManagementPolicy'
|
|
509
513
|
];
|
|
@@ -0,0 +1,124 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
3
|
+
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
4
|
+
return new (P || (P = Promise))(function (resolve, reject) {
|
|
5
|
+
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
6
|
+
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
7
|
+
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
8
|
+
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
9
|
+
});
|
|
10
|
+
};
|
|
11
|
+
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
12
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
13
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
14
|
+
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
15
|
+
};
|
|
16
|
+
var _TeamsMeetingTranscriptListCommand_instances, _TeamsMeetingTranscriptListCommand_initTelemetry, _TeamsMeetingTranscriptListCommand_initOptions, _TeamsMeetingTranscriptListCommand_initValidators, _TeamsMeetingTranscriptListCommand_initOptionSets;
|
|
17
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
18
|
+
const Auth_1 = require("../../../../Auth");
|
|
19
|
+
const GraphCommand_1 = require("../../../base/GraphCommand");
|
|
20
|
+
const commands_1 = require("../../commands");
|
|
21
|
+
const odata_1 = require("../../../../utils/odata");
|
|
22
|
+
const validation_1 = require("../../../../utils/validation");
|
|
23
|
+
const accessToken_1 = require("../../../../utils/accessToken");
|
|
24
|
+
const aadUser_1 = require("../../../../utils/aadUser");
|
|
25
|
+
class TeamsMeetingTranscriptListCommand extends GraphCommand_1.default {
|
|
26
|
+
get name() {
|
|
27
|
+
return commands_1.default.MEETING_TRANSCRIPT_LIST;
|
|
28
|
+
}
|
|
29
|
+
get description() {
|
|
30
|
+
return 'Lists all transcripts for a given meeting';
|
|
31
|
+
}
|
|
32
|
+
defaultProperties() {
|
|
33
|
+
return ['id', 'createdDateTime'];
|
|
34
|
+
}
|
|
35
|
+
constructor() {
|
|
36
|
+
super();
|
|
37
|
+
_TeamsMeetingTranscriptListCommand_instances.add(this);
|
|
38
|
+
__classPrivateFieldGet(this, _TeamsMeetingTranscriptListCommand_instances, "m", _TeamsMeetingTranscriptListCommand_initTelemetry).call(this);
|
|
39
|
+
__classPrivateFieldGet(this, _TeamsMeetingTranscriptListCommand_instances, "m", _TeamsMeetingTranscriptListCommand_initOptions).call(this);
|
|
40
|
+
__classPrivateFieldGet(this, _TeamsMeetingTranscriptListCommand_instances, "m", _TeamsMeetingTranscriptListCommand_initValidators).call(this);
|
|
41
|
+
__classPrivateFieldGet(this, _TeamsMeetingTranscriptListCommand_instances, "m", _TeamsMeetingTranscriptListCommand_initOptionSets).call(this);
|
|
42
|
+
}
|
|
43
|
+
commandAction(logger, args) {
|
|
44
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
45
|
+
try {
|
|
46
|
+
const isAppOnlyAccessToken = accessToken_1.accessToken.isAppOnlyAccessToken(Auth_1.default.service.accessTokens[this.resource].accessToken);
|
|
47
|
+
if (this.verbose) {
|
|
48
|
+
logger.logToStderr(`Retrieving transcript list for the given meeting...`);
|
|
49
|
+
}
|
|
50
|
+
let requestUrl = `${this.resource}/beta/`;
|
|
51
|
+
if (isAppOnlyAccessToken) {
|
|
52
|
+
if (!args.options.userId && !args.options.userName && !args.options.email) {
|
|
53
|
+
throw `The option 'userId', 'userName' or 'email' is required when retrieving meeting transcripts list using app only permissions`;
|
|
54
|
+
}
|
|
55
|
+
requestUrl += 'users/';
|
|
56
|
+
if (args.options.userId) {
|
|
57
|
+
requestUrl += args.options.userId;
|
|
58
|
+
}
|
|
59
|
+
else if (args.options.userName) {
|
|
60
|
+
requestUrl += args.options.userName;
|
|
61
|
+
}
|
|
62
|
+
else if (args.options.email) {
|
|
63
|
+
if (this.verbose) {
|
|
64
|
+
logger.logToStderr(`Getting user ID for user with email '${args.options.email}'.`);
|
|
65
|
+
}
|
|
66
|
+
const userId = yield aadUser_1.aadUser.getUserIdByEmail(args.options.email);
|
|
67
|
+
requestUrl += userId;
|
|
68
|
+
}
|
|
69
|
+
}
|
|
70
|
+
else {
|
|
71
|
+
if (args.options.userId || args.options.userName || args.options.email) {
|
|
72
|
+
throw `The options 'userId', 'userName' and 'email' cannot be used while retrieving meeting transcripts using delegated permissions`;
|
|
73
|
+
}
|
|
74
|
+
requestUrl += `me`;
|
|
75
|
+
}
|
|
76
|
+
requestUrl += `/onlineMeetings/${args.options.meetingId}/transcripts`;
|
|
77
|
+
const res = yield odata_1.odata.getAllItems(requestUrl);
|
|
78
|
+
logger.log(res);
|
|
79
|
+
}
|
|
80
|
+
catch (err) {
|
|
81
|
+
this.handleRejectedODataJsonPromise(err);
|
|
82
|
+
}
|
|
83
|
+
});
|
|
84
|
+
}
|
|
85
|
+
}
|
|
86
|
+
_TeamsMeetingTranscriptListCommand_instances = new WeakSet(), _TeamsMeetingTranscriptListCommand_initTelemetry = function _TeamsMeetingTranscriptListCommand_initTelemetry() {
|
|
87
|
+
this.telemetry.push((args) => {
|
|
88
|
+
Object.assign(this.telemetryProperties, {
|
|
89
|
+
userId: typeof args.options.userId !== 'undefined',
|
|
90
|
+
userName: typeof args.options.userName !== 'undefined',
|
|
91
|
+
email: typeof args.options.email !== 'undefined'
|
|
92
|
+
});
|
|
93
|
+
});
|
|
94
|
+
}, _TeamsMeetingTranscriptListCommand_initOptions = function _TeamsMeetingTranscriptListCommand_initOptions() {
|
|
95
|
+
this.options.unshift({
|
|
96
|
+
option: '-u, --userId [userId]'
|
|
97
|
+
}, {
|
|
98
|
+
option: '-n, --userName [userName]'
|
|
99
|
+
}, {
|
|
100
|
+
option: '--email [email]'
|
|
101
|
+
}, {
|
|
102
|
+
option: '-m, --meetingId <meetingId>'
|
|
103
|
+
});
|
|
104
|
+
}, _TeamsMeetingTranscriptListCommand_initValidators = function _TeamsMeetingTranscriptListCommand_initValidators() {
|
|
105
|
+
this.validators.push((args) => __awaiter(this, void 0, void 0, function* () {
|
|
106
|
+
if (args.options.userId && !validation_1.validation.isValidGuid(args.options.userId)) {
|
|
107
|
+
return `${args.options.userId} is not a valid Guid`;
|
|
108
|
+
}
|
|
109
|
+
if (args.options.userName && !validation_1.validation.isValidUserPrincipalName(args.options.userName)) {
|
|
110
|
+
return `${args.options.userName} is not a valid user principal name (UPN)`;
|
|
111
|
+
}
|
|
112
|
+
if (args.options.email && !validation_1.validation.isValidUserPrincipalName(args.options.email)) {
|
|
113
|
+
return `${args.options.email} is not a valid email`;
|
|
114
|
+
}
|
|
115
|
+
return true;
|
|
116
|
+
}));
|
|
117
|
+
}, _TeamsMeetingTranscriptListCommand_initOptionSets = function _TeamsMeetingTranscriptListCommand_initOptionSets() {
|
|
118
|
+
this.optionSets.push({
|
|
119
|
+
options: ['userId', 'userName', 'email'],
|
|
120
|
+
runsWhen: (args) => args.options.userId || args.options.userName || args.options.email
|
|
121
|
+
});
|
|
122
|
+
};
|
|
123
|
+
module.exports = new TeamsMeetingTranscriptListCommand();
|
|
124
|
+
//# sourceMappingURL=meeting-transcript-list.js.map
|
|
@@ -30,6 +30,7 @@ exports.default = {
|
|
|
30
30
|
MEETING_ATTENDANCEREPORT_LIST: `${prefix} meeting attendancereport list`,
|
|
31
31
|
MEETING_GET: `${prefix} meeting get`,
|
|
32
32
|
MEETING_LIST: `${prefix} meeting list`,
|
|
33
|
+
MEETING_TRANSCRIPT_LIST: `${prefix} meeting transcript list`,
|
|
33
34
|
MEMBERSETTINGS_LIST: `${prefix} membersettings list`,
|
|
34
35
|
MEMBERSETTINGS_SET: `${prefix} membersettings set`,
|
|
35
36
|
MESSAGE_GET: `${prefix} message get`,
|
|
@@ -0,0 +1,109 @@
|
|
|
1
|
+
# planner roster plan list
|
|
2
|
+
|
|
3
|
+
Lists all Microsoft Planner Roster plans for a specific user
|
|
4
|
+
|
|
5
|
+
## Usage
|
|
6
|
+
|
|
7
|
+
```sh
|
|
8
|
+
m365 planner roster plan list [options]
|
|
9
|
+
```
|
|
10
|
+
|
|
11
|
+
## Options
|
|
12
|
+
|
|
13
|
+
`--userId [userId]`
|
|
14
|
+
: User's Azure AD ID. Specify either `userId` or `userName` but not both. Specify this option only when using application permissions.
|
|
15
|
+
|
|
16
|
+
`--userName [userName]`
|
|
17
|
+
: User's UPN (user principal name, e.g. johndoe@example.com). Specify either `userId` or `userName` but not both. Specify this option only when using application permissions.
|
|
18
|
+
|
|
19
|
+
--8<-- "docs/cmd/_global.md"
|
|
20
|
+
|
|
21
|
+
## Remarks
|
|
22
|
+
|
|
23
|
+
!!! attention
|
|
24
|
+
This command is based on an API that is currently in preview and is subject to change once the API reached general availability.
|
|
25
|
+
|
|
26
|
+
## Examples
|
|
27
|
+
|
|
28
|
+
List all Planner plans contained in a Roster where the current logged in user is member of.
|
|
29
|
+
|
|
30
|
+
```sh
|
|
31
|
+
m365 planner roster plan list
|
|
32
|
+
```
|
|
33
|
+
|
|
34
|
+
List all Planner plans contained in a Roster where specific user is member of by its UPN.
|
|
35
|
+
|
|
36
|
+
```sh
|
|
37
|
+
m365 planner roster plan list --userName john.doe@contoso.com
|
|
38
|
+
```
|
|
39
|
+
|
|
40
|
+
List all Planner plans contained in a Roster where specific user is member of by its Id.
|
|
41
|
+
|
|
42
|
+
```sh
|
|
43
|
+
m365 planner roster plan list --userId 59f80e08-24b1-41f8-8586-16765fd830d3
|
|
44
|
+
```
|
|
45
|
+
|
|
46
|
+
## Response
|
|
47
|
+
|
|
48
|
+
=== "JSON"
|
|
49
|
+
|
|
50
|
+
```json
|
|
51
|
+
[
|
|
52
|
+
{
|
|
53
|
+
"createdDateTime": "2023-04-06T14:41:49.8676617Z",
|
|
54
|
+
"owner": "59f80e08-24b1-41f8-8586-16765fd830d3",
|
|
55
|
+
"title": "My Planner Plan",
|
|
56
|
+
"creationSource": null,
|
|
57
|
+
"id": "_5GY9MJpZU2vb3DC46CP3MkACr8m",
|
|
58
|
+
"createdBy": {
|
|
59
|
+
"user": {
|
|
60
|
+
"displayName": null,
|
|
61
|
+
"id": "59f80e08-24b1-41f8-8586-16765fd830d3"
|
|
62
|
+
},
|
|
63
|
+
"application": {
|
|
64
|
+
"displayName": null,
|
|
65
|
+
"id": "31359c7f-bd7e-475c-86db-fdb8c937548e"
|
|
66
|
+
}
|
|
67
|
+
},
|
|
68
|
+
"container": {
|
|
69
|
+
"containerId": "_5GY9MJpZU2vb3DC46CP3MkACr8m",
|
|
70
|
+
"type": "unknownFutureValue",
|
|
71
|
+
"url": "https://graph.microsoft.com/beta/planner/rosters/_5GY9MJpZU2vb3DC46CP3MkACr8m"
|
|
72
|
+
},
|
|
73
|
+
"contexts": {},
|
|
74
|
+
"sharedWithContainers": []
|
|
75
|
+
}
|
|
76
|
+
]
|
|
77
|
+
```
|
|
78
|
+
|
|
79
|
+
=== "Text"
|
|
80
|
+
|
|
81
|
+
```text
|
|
82
|
+
id title createdDateTime owner
|
|
83
|
+
---------------------------- --------------- ---------------------------- ------------------------------------
|
|
84
|
+
_5GY9MJpZU2vb3DC46CP3MkACr8m My Planner Plan 2023-04-06T14:41:49.8676617Z 59f80e08-24b1-41f8-8586-16765fd830d3
|
|
85
|
+
```
|
|
86
|
+
|
|
87
|
+
=== "CSV"
|
|
88
|
+
|
|
89
|
+
```csv
|
|
90
|
+
createdDateTime,owner,title,id
|
|
91
|
+
2023-04-06T14:41:49.8676617Z,59f80e08-24b1-41f8-8586-16765fd830d3,My Planner Plan,_5GY9MJpZU2vb3DC46CP3MkACr8m
|
|
92
|
+
```
|
|
93
|
+
|
|
94
|
+
=== "Markdown"
|
|
95
|
+
|
|
96
|
+
```md
|
|
97
|
+
# planner roster plan list --userId "59f80e08-24b1-41f8-8586-16765fd830d3"
|
|
98
|
+
|
|
99
|
+
Date: 4/8/2023
|
|
100
|
+
|
|
101
|
+
## My Planner Plan (_5GY9MJpZU2vb3DC46CP3MkACr8m)
|
|
102
|
+
|
|
103
|
+
Property | Value
|
|
104
|
+
---------|-------
|
|
105
|
+
createdDateTime | 2023-04-06T14:41:49.8676617Z
|
|
106
|
+
owner | 59f80e08-24b1-41f8-8586-16765fd830d3
|
|
107
|
+
title | My Planner Plan
|
|
108
|
+
id | \_5GY9MJpZU2vb3DC46CP3MkACr8m
|
|
109
|
+
```
|
|
@@ -33,11 +33,11 @@ If the specified url doesn't refer to an existing site collection, you will get
|
|
|
33
33
|
Enable site feature
|
|
34
34
|
|
|
35
35
|
```sh
|
|
36
|
-
m365 spo feature enable --
|
|
36
|
+
m365 spo feature enable --webUrl https://contoso.sharepoint.com/sites/sales --id 915c240e-a6cc-49b8-8b2c-0bff8b553ed3 --scope Site
|
|
37
37
|
```
|
|
38
38
|
|
|
39
39
|
Enable web feature (with force to overwrite feature with same id)
|
|
40
40
|
|
|
41
41
|
```sh
|
|
42
|
-
m365 spo feature enable --
|
|
42
|
+
m365 spo feature enable --webUrl https://contoso.sharepoint.com/sites/sales --id 00bfea71-5932-4f9c-ad71-1557e5751100 --scope Web --force
|
|
43
43
|
```
|
|
@@ -17,7 +17,7 @@ m365 spo tenant settings set [options]
|
|
|
17
17
|
: Specifies the upper bound on the compatibility level for new sites
|
|
18
18
|
|
|
19
19
|
`--ExternalServicesEnabled [ExternalServicesEnabled]`
|
|
20
|
-
: Enables external services for a tenant. External services are defined as services that are not in the Microsoft 365 data centers. Allowed values `true
|
|
20
|
+
: Enables external services for a tenant. External services are defined as services that are not in the Microsoft 365 data centers. Allowed values `true`, `false`
|
|
21
21
|
|
|
22
22
|
`--NoAccessRedirectUrl [NoAccessRedirectUrl]`
|
|
23
23
|
: Specifies the URL of the redirected site for those site collections which have the locked state "NoAccess"
|
|
@@ -26,55 +26,55 @@ m365 spo tenant settings set [options]
|
|
|
26
26
|
: Determines what level of sharing is available for the site. The valid values are: ExternalUserAndGuestSharing (default) - External user sharing (share by email) and guest link sharing are both enabled. Disabled - External user sharing (share by email) and guest link sharing are both disabled. ExternalUserSharingOnly - External user sharing (share by email) is enabled, but guest link sharing is disabled. Allowed values `Disabled,ExternalUserSharingOnly,ExternalUserAndGuestSharing,ExistingExternalUserSharingOnly`
|
|
27
27
|
|
|
28
28
|
`--DisplayStartASiteOption [DisplayStartASiteOption]`
|
|
29
|
-
: Determines whether tenant users see the Start a Site menu option. Allowed values `true
|
|
29
|
+
: Determines whether tenant users see the Start a Site menu option. Allowed values `true`, `false`
|
|
30
30
|
|
|
31
31
|
`--StartASiteFormUrl [StartASiteFormUrl]`
|
|
32
32
|
: Specifies URL of the form to load in the Start a Site dialog. The valid values are: "" (default) - Blank by default, this will also remove or clear any value that has been set. Full URL - Example:"https://contoso.sharepoint.com/path/to/form"
|
|
33
33
|
|
|
34
34
|
`--ShowEveryoneClaim [ShowEveryoneClaim]`
|
|
35
|
-
: Enables the administrator to hide the Everyone claim in the People Picker. When users share an item with Everyone, it is accessible to all authenticated users in the tenant's Azure Active Directory, including any active external users who have previously accepted invitations. Note, that some SharePoint system resources such as templates and pages are required to be shared with Everyone and this type of sharing does not expose any user data or metadata. Allowed values `true
|
|
35
|
+
: Enables the administrator to hide the Everyone claim in the People Picker. When users share an item with Everyone, it is accessible to all authenticated users in the tenant's Azure Active Directory, including any active external users who have previously accepted invitations. Note, that some SharePoint system resources such as templates and pages are required to be shared with Everyone and this type of sharing does not expose any user data or metadata. Allowed values `true`, `false`
|
|
36
36
|
|
|
37
37
|
`--ShowAllUsersClaim [ShowAllUsersClaim]`
|
|
38
|
-
: Enables the administrator to hide the All Users claim groups in People Picker. When users share an item with "All Users (x)", it is accessible to all organization members in the tenant's Azure Active Directory who have authenticated via this method. When users share an item with "All Users (x)" it is accessible to all organization members in the tenant that used NTLM to authenticate with SharePoint. Allowed values `true
|
|
38
|
+
: Enables the administrator to hide the All Users claim groups in People Picker. When users share an item with "All Users (x)", it is accessible to all organization members in the tenant's Azure Active Directory who have authenticated via this method. When users share an item with "All Users (x)" it is accessible to all organization members in the tenant that used NTLM to authenticate with SharePoint. Allowed values `true`, `false`
|
|
39
39
|
|
|
40
40
|
`--ShowEveryoneExceptExternalUsersClaim [ShowEveryoneExceptExternalUsersClaim]`
|
|
41
|
-
: Enables the administrator to hide the "Everyone except external users" claim in the People Picker. When users share an item with "Everyone except external users", it is accessible to all organization members in the tenant's Azure Active Directory, but not to any users who have previously accepted invitations. Allowed values `true
|
|
41
|
+
: Enables the administrator to hide the "Everyone except external users" claim in the People Picker. When users share an item with "Everyone except external users", it is accessible to all organization members in the tenant's Azure Active Directory, but not to any users who have previously accepted invitations. Allowed values `true`, `false`
|
|
42
42
|
|
|
43
43
|
`--SearchResolveExactEmailOrUPN [SearchResolveExactEmailOrUPN]`
|
|
44
|
-
: Removes the search capability from People Picker. Note, recently resolved names will still appear in the list until the browser cache is cleared or expired. SharePoint Administrators will still be able to use starts with or partial name matching when enabled. Allowed values `true
|
|
44
|
+
: Removes the search capability from People Picker. Note, recently resolved names will still appear in the list until the browser cache is cleared or expired. SharePoint Administrators will still be able to use starts with or partial name matching when enabled. Allowed values `true`, `false`
|
|
45
45
|
|
|
46
46
|
`--OfficeClientADALDisabled [OfficeClientADALDisabled]`
|
|
47
|
-
: When set to true this will disable the ability to use Modern Authentication that leverages ADAL across the tenant. Allowed values `true
|
|
47
|
+
: When set to true this will disable the ability to use Modern Authentication that leverages ADAL across the tenant. Allowed values `true`, `false`
|
|
48
48
|
|
|
49
49
|
`--LegacyAuthProtocolsEnabled [LegacyAuthProtocolsEnabled]`
|
|
50
|
-
: By default, this value is set to true. Setting this parameter prevents Office clients using non-modern authentication protocols from accessing SharePoint Online resources. A value of true - Enables Office clients using non-modern authentication protocols (such as Forms-Based Authentication (FBA) or Identity Client Runtime Library (IDCRL)) to access SharePoint resources. Allowed values `true
|
|
50
|
+
: By default, this value is set to true. Setting this parameter prevents Office clients using non-modern authentication protocols from accessing SharePoint Online resources. A value of true - Enables Office clients using non-modern authentication protocols (such as Forms-Based Authentication (FBA) or Identity Client Runtime Library (IDCRL)) to access SharePoint resources. Allowed values `true`, `false`
|
|
51
51
|
|
|
52
52
|
`--RequireAcceptingAccountMatchInvitedAccount [RequireAcceptingAccountMatchInvitedAccount]`
|
|
53
|
-
: Ensures that an external user can only accept an external sharing invitation with an account matching the invited email address. Administrators who desire increased control over external collaborators should consider enabling this feature. Allowed values `true
|
|
53
|
+
: Ensures that an external user can only accept an external sharing invitation with an account matching the invited email address. Administrators who desire increased control over external collaborators should consider enabling this feature. Allowed values `true`, `false`
|
|
54
54
|
|
|
55
55
|
`--ProvisionSharedWithEveryoneFolder [ProvisionSharedWithEveryoneFolder]`
|
|
56
|
-
: Creates a Shared with Everyone folder in every user's new OneDrive for Business document library. The valid values are: True (default) - The Shared with Everyone folder is created. False - No folder is created when the site and OneDrive for Business document library are created. Allowed values `true
|
|
56
|
+
: Creates a Shared with Everyone folder in every user's new OneDrive for Business document library. The valid values are: True (default) - The Shared with Everyone folder is created. False - No folder is created when the site and OneDrive for Business document library are created. Allowed values `true`, `false`
|
|
57
57
|
|
|
58
58
|
`--SignInAccelerationDomain [SignInAccelerationDomain]`
|
|
59
59
|
: Specifies the home realm discovery value to be sent to Azure Active Directory (AAD) during the user sign-in process. When the organization uses a third-party identity provider, this prevents the user from seeing the Azure Active Directory Home Realm Discovery web page and ensures the user only sees their company's Identity Provider's portal. This value can also be used with Azure Active Directory Premium to customize the Azure Active Directory login page. Acceleration will not occur on-site collections that are shared externally. This value should be configured with the login domain that is used by your company (that is, example@contoso.com). If your company has multiple third-party identity providers, configuring the sign-in acceleration value will break sign-in for your organization. The valid values are: "" (default) - Blank by default, this will also remove or clear any value that has been set. Login Domain - For example: "contoso.com". No value assigned by default
|
|
60
60
|
|
|
61
61
|
`--EnableGuestSignInAcceleration [EnableGuestSignInAcceleration]`
|
|
62
|
-
: Accelerates guest-enabled site collections as well as member-only site collections when the SignInAccelerationDomain parameter is set. Allowed values `true
|
|
62
|
+
: Accelerates guest-enabled site collections as well as member-only site collections when the SignInAccelerationDomain parameter is set. Allowed values `true`, `false`
|
|
63
63
|
|
|
64
64
|
`--UsePersistentCookiesForExplorerView [UsePersistentCookiesForExplorerView]`
|
|
65
|
-
: Lets SharePoint issue a special cookie that will allow this feature to work even when "Keep Me Signed In" is not selected. "Open with Explorer" requires persisted cookies to operate correctly. When the user does not select "Keep Me Signed in" at the time of sign-in, "Open with Explorer" will fail. This special cookie expires after 30 minutes and cannot be cleared by closing the browser or signing out of SharePoint Online.To clear this cookie, the user must log out of their Windows session. The valid values are: False(default) - No special cookie is generated and the normal Microsoft 365 sign-in length/timing applies. True - Generates a special cookie that will allow "Open with Explorer" to function if the "Keep Me Signed In" box is not checked at sign-in. Allowed values `true
|
|
65
|
+
: Lets SharePoint issue a special cookie that will allow this feature to work even when "Keep Me Signed In" is not selected. "Open with Explorer" requires persisted cookies to operate correctly. When the user does not select "Keep Me Signed in" at the time of sign-in, "Open with Explorer" will fail. This special cookie expires after 30 minutes and cannot be cleared by closing the browser or signing out of SharePoint Online.To clear this cookie, the user must log out of their Windows session. The valid values are: False(default) - No special cookie is generated and the normal Microsoft 365 sign-in length/timing applies. True - Generates a special cookie that will allow "Open with Explorer" to function if the "Keep Me Signed In" box is not checked at sign-in. Allowed values `true`, `false`
|
|
66
66
|
|
|
67
67
|
`--BccExternalSharingInvitations [BccExternalSharingInvitations]`
|
|
68
|
-
: When the feature is enabled, all external sharing invitations that are sent will blindly copy the e-mail messages listed in the BccExternalSharingsInvitationList. Allowed values `true
|
|
68
|
+
: When the feature is enabled, all external sharing invitations that are sent will blindly copy the e-mail messages listed in the BccExternalSharingsInvitationList. Allowed values `true`, `false`
|
|
69
69
|
|
|
70
70
|
`--BccExternalSharingInvitationsList [BccExternalSharingInvitationsList]`
|
|
71
71
|
: Specifies a list of e-mail addresses to be BCC'd when the BCC for External Sharing feature is enabled. Multiple addresses can be specified by creating a comma-separated list with no spaces
|
|
72
72
|
|
|
73
73
|
`--UserVoiceForFeedbackEnabled [UserVoiceForFeedbackEnabled]`
|
|
74
|
-
: Enables or disables the User Voice Feedback button. Allowed values `true
|
|
74
|
+
: Enables or disables the User Voice Feedback button. Allowed values `true`, `false`
|
|
75
75
|
|
|
76
76
|
`--PublicCdnEnabled [PublicCdnEnabled]`
|
|
77
|
-
: Enables or disables the publish CDN. Allowed values `true
|
|
77
|
+
: Enables or disables the publish CDN. Allowed values `true`, `false`
|
|
78
78
|
|
|
79
79
|
`--PublicCdnAllowedFileTypes [PublicCdnAllowedFileTypes]`
|
|
80
80
|
: Sets public CDN-allowed file types
|
|
@@ -95,10 +95,10 @@ m365 spo tenant settings set [options]
|
|
|
95
95
|
: Sets a default OneDrive for Business storage quota for the tenant. It will be used for new OneDrive for Business sites created. A typical use will be to reduce the amount of storage associated with OneDrive for Business to a level below what the License entitles the users. For example, it could be used to set the quota to 10 gigabytes (GB) by default
|
|
96
96
|
|
|
97
97
|
`--OneDriveForGuestsEnabled [OneDriveForGuestsEnabled]`
|
|
98
|
-
: Lets OneDrive for Business creation for administrator-managed guest users. Administrator-managed Guest users use credentials in the resource tenant to access the resources. Allowed values `true
|
|
98
|
+
: Lets OneDrive for Business creation for administrator-managed guest users. Administrator-managed Guest users use credentials in the resource tenant to access the resources. Allowed values `true`, `false`
|
|
99
99
|
|
|
100
100
|
`--IPAddressEnforcement [IPAddressEnforcement]`
|
|
101
|
-
: Allows access from network locations that are defined by an administrator. The values are true and false. The default value is false which means the setting is disabled. Before the iPAddressEnforcement parameter is set, make sure you add a valid IPv4 or IPv6 address to the iPAddressAllowList parameter. Allowed values `true
|
|
101
|
+
: Allows access from network locations that are defined by an administrator. The values are true and false. The default value is false which means the setting is disabled. Before the iPAddressEnforcement parameter is set, make sure you add a valid IPv4 or IPv6 address to the iPAddressAllowList parameter. Allowed values `true`, `false`
|
|
102
102
|
|
|
103
103
|
`--IPAddressAllowList [IPAddressAllowList]`
|
|
104
104
|
: Configures multiple IP addresses or IP address ranges (IPv4 or IPv6). Use commas to separate multiple IP addresses or IP address ranges. Verify there are no overlapping IP addresses and ensure IP ranges use Classless Inter-Domain Routing (CIDR) notation. For example, `172.16.0.0, 192.168.1.0/27`. No value is assigned by default
|
|
@@ -107,7 +107,7 @@ m365 spo tenant settings set [options]
|
|
|
107
107
|
: Sets IP Address WAC token lifetime'
|
|
108
108
|
|
|
109
109
|
`--UseFindPeopleInPeoplePicker [UseFindPeopleInPeoplePicker]`
|
|
110
|
-
: Sets use to find people in PeoplePicker to true or false. Note: When set to true, users aren't able to share with security groups or SharePoint groups. Allowed values `true
|
|
110
|
+
: Sets use to find people in PeoplePicker to true or false. Note: When set to true, users aren't able to share with security groups or SharePoint groups. Allowed values `true`, `false`
|
|
111
111
|
|
|
112
112
|
`--DefaultSharingLinkType [DefaultSharingLinkType]`
|
|
113
113
|
: Let's administrators choose what type of link appears is selected in the “Get a link” sharing dialog box in OneDrive for Business and SharePoint Online. Allowed values `None,Direct,Internal,AnonymousAccess`
|
|
@@ -119,10 +119,10 @@ m365 spo tenant settings set [options]
|
|
|
119
119
|
: Lets administrators set policy on access requests and requests to share in OneDrive for Business. Allowed values `Unspecified,On,Off`
|
|
120
120
|
|
|
121
121
|
`--PreventExternalUsersFromResharing [PreventExternalUsersFromResharing]`
|
|
122
|
-
: Prevents external users from resharing. Allowed values `true
|
|
122
|
+
: Prevents external users from resharing. Allowed values `true`, `false`
|
|
123
123
|
|
|
124
124
|
`--ShowPeoplePickerSuggestionsForGuestUsers [ShowPeoplePickerSuggestionsForGuestUsers]`
|
|
125
|
-
: Shows people picker suggestions for guest users. Allowed values `true
|
|
125
|
+
: Shows people picker suggestions for guest users. Allowed values `true`, `false`
|
|
126
126
|
|
|
127
127
|
`--FileAnonymousLinkType [FileAnonymousLinkType]`
|
|
128
128
|
: Sets the file anonymous link type to `None`, `View` or `Edit`
|
|
@@ -131,31 +131,31 @@ m365 spo tenant settings set [options]
|
|
|
131
131
|
: Sets the folder anonymous link type to `None`, `View` or `Edit`
|
|
132
132
|
|
|
133
133
|
`--NotifyOwnersWhenItemsReshared [NotifyOwnersWhenItemsReshared]`
|
|
134
|
-
: When this parameter is set to true and another user re-shares a document from a user's OneDrive for Business, the OneDrive for Business owner is notified by email. For additional information about how to configure notifications for external sharing, see Configure notifications for external sharing for OneDrive for Business. Allowed values `true
|
|
134
|
+
: When this parameter is set to true and another user re-shares a document from a user's OneDrive for Business, the OneDrive for Business owner is notified by email. For additional information about how to configure notifications for external sharing, see Configure notifications for external sharing for OneDrive for Business. Allowed values `true`, `false`
|
|
135
135
|
|
|
136
136
|
`--NotifyOwnersWhenInvitationsAccepted [NotifyOwnersWhenInvitationsAccepted]`
|
|
137
|
-
: When this parameter is set to true and when an external user accepts an invitation to a resource in a user's OneDrive for Business, the OneDrive for Business owner is notified by email. For additional information about how to configure notifications for external sharing, see Configure notifications for external sharing for OneDrive for Business. Allowed values `true
|
|
137
|
+
: When this parameter is set to true and when an external user accepts an invitation to a resource in a user's OneDrive for Business, the OneDrive for Business owner is notified by email. For additional information about how to configure notifications for external sharing, see Configure notifications for external sharing for OneDrive for Business. Allowed values `true`, `false`
|
|
138
138
|
|
|
139
139
|
`--NotificationsInOneDriveForBusinessEnabled [NotificationsInOneDriveForBusinessEnabled]`
|
|
140
|
-
: Enables or disables notifications in OneDrive for business. Allowed values `true
|
|
140
|
+
: Enables or disables notifications in OneDrive for business. Allowed values `true`, `false`
|
|
141
141
|
|
|
142
142
|
`--NotificationsInSharePointEnabled [NotificationsInSharePointEnabled]`
|
|
143
|
-
: Enables or disables notifications in SharePoint. Allowed values `true
|
|
143
|
+
: Enables or disables notifications in SharePoint. Allowed values `true`, `false`
|
|
144
144
|
|
|
145
145
|
`--OwnerAnonymousNotification [OwnerAnonymousNotification]`
|
|
146
|
-
: Enables or disables owner-anonymous notification. Allowed values `true
|
|
146
|
+
: Enables or disables owner-anonymous notification. Allowed values `true`, `false`
|
|
147
147
|
|
|
148
148
|
`--CommentsOnSitePagesDisabled [CommentsOnSitePagesDisabled]`
|
|
149
|
-
: Enables or disables comments on site pages. Allowed values `true
|
|
149
|
+
: Enables or disables comments on site pages. Allowed values `true`, `false`
|
|
150
150
|
|
|
151
151
|
`--SocialBarOnSitePagesDisabled [SocialBarOnSitePagesDisabled]`
|
|
152
|
-
: Enables or disables social bar on site pages. Allowed values `true
|
|
152
|
+
: Enables or disables social bar on site pages. Allowed values `true`, `false`
|
|
153
153
|
|
|
154
154
|
`--OrphanedPersonalSitesRetentionPeriod [OrphanedPersonalSitesRetentionPeriod]`
|
|
155
155
|
: Specifies the number of days after a user's Active Directory account is deleted that their OneDrive for Business content will be deleted. The value range is in days, between 30 and 3650. The default value is 30
|
|
156
156
|
|
|
157
157
|
`--DisallowInfectedFileDownload [DisallowInfectedFileDownload]`
|
|
158
|
-
: Prevents the Download button from being displayed on the Virus Found warning page. Allowed values `true
|
|
158
|
+
: Prevents the Download button from being displayed on the Virus Found warning page. Allowed values `true`, `false`
|
|
159
159
|
|
|
160
160
|
`--DefaultLinkPermission [DefaultLinkPermission]`
|
|
161
161
|
: Choose the default permission that is selected when users share. This applies to anonymous access, internal and direct links. Allowed values `None,View,Edit`
|
|
@@ -164,85 +164,85 @@ m365 spo tenant settings set [options]
|
|
|
164
164
|
: Configures conditional access policy. Allowed values `AllowFullAccess,AllowLimitedAccess,BlockAccess`
|
|
165
165
|
|
|
166
166
|
`--AllowDownloadingNonWebViewableFiles [AllowDownloadingNonWebViewableFiles]`
|
|
167
|
-
: Allows downloading non-web viewable files. The Allowed values `true
|
|
167
|
+
: Allows downloading non-web viewable files. The Allowed values `true`, `false`
|
|
168
168
|
|
|
169
169
|
`--AllowEditing [AllowEditing]`
|
|
170
|
-
: Allows editing. Allowed values `true
|
|
170
|
+
: Allows editing. Allowed values `true`, `false`
|
|
171
171
|
|
|
172
172
|
`--ApplyAppEnforcedRestrictionsToAdHocRecipients [ApplyAppEnforcedRestrictionsToAdHocRecipients]`
|
|
173
|
-
: Applies app-enforced restrictions to AdHoc recipients. Allowed values `true
|
|
173
|
+
: Applies app-enforced restrictions to AdHoc recipients. Allowed values `true`, `false`
|
|
174
174
|
|
|
175
175
|
`--FilePickerExternalImageSearchEnabled [FilePickerExternalImageSearchEnabled]`
|
|
176
|
-
: Enables file picker external image search. Allowed values `true
|
|
176
|
+
: Enables file picker external image search. Allowed values `true`, `false`
|
|
177
177
|
|
|
178
178
|
`--EmailAttestationRequired [EmailAttestationRequired]`
|
|
179
|
-
: Sets email attestation to required. Allowed values `true
|
|
179
|
+
: Sets email attestation to required. Allowed values `true`, `false`
|
|
180
180
|
|
|
181
181
|
`--EmailAttestationReAuthDays [EmailAttestationReAuthDays]`
|
|
182
182
|
: Sets email attestation re-auth days
|
|
183
183
|
|
|
184
184
|
`--HideDefaultThemes [HideDefaultThemes]`
|
|
185
|
-
: Defines if the default themes are visible or hidden. Allowed values `true
|
|
185
|
+
: Defines if the default themes are visible or hidden. Allowed values `true`, `false`
|
|
186
186
|
|
|
187
187
|
`--BlockAccessOnUnmanagedDevices [BlockAccessOnUnmanagedDevices]`
|
|
188
|
-
: Blocks access on unmanaged devices. Allowed values `true
|
|
188
|
+
: Blocks access on unmanaged devices. Allowed values `true`, `false`
|
|
189
189
|
|
|
190
190
|
`--AllowLimitedAccessOnUnmanagedDevices [AllowLimitedAccessOnUnmanagedDevices]`
|
|
191
|
-
: Allows limited access on unmanaged device blocks. Allowed values `true
|
|
191
|
+
: Allows limited access on unmanaged device blocks. Allowed values `true`, `false`
|
|
192
192
|
|
|
193
193
|
`--BlockDownloadOfAllFilesForGuests [BlockDownloadOfAllFilesForGuests]`
|
|
194
|
-
: Blocks download of all files for guests. Allowed values `true
|
|
194
|
+
: Blocks download of all files for guests. Allowed values `true`, `false`
|
|
195
195
|
|
|
196
196
|
`--BlockDownloadOfAllFilesOnUnmanagedDevices [BlockDownloadOfAllFilesOnUnmanagedDevices]`
|
|
197
|
-
: Blocks download of all files on unmanaged devices. Allowed values `true
|
|
197
|
+
: Blocks download of all files on unmanaged devices. Allowed values `true`, `false`
|
|
198
198
|
|
|
199
199
|
`--BlockDownloadOfViewableFilesForGuests [BlockDownloadOfViewableFilesForGuests]`
|
|
200
|
-
: Blocks download of viewable files for guests. Allowed values `true
|
|
200
|
+
: Blocks download of viewable files for guests. Allowed values `true`, `false`
|
|
201
201
|
|
|
202
202
|
`--BlockDownloadOfViewableFilesOnUnmanagedDevices [BlockDownloadOfViewableFilesOnUnmanagedDevices]`
|
|
203
|
-
: Blocks download of viewable files on unmanaged devices. Allowed values `true
|
|
203
|
+
: Blocks download of viewable files on unmanaged devices. Allowed values `true`, `false`
|
|
204
204
|
|
|
205
205
|
`--BlockMacSync [BlockMacSync]`
|
|
206
|
-
: Blocks Mac sync. Allowed values `true
|
|
206
|
+
: Blocks Mac sync. Allowed values `true`, `false`
|
|
207
207
|
|
|
208
208
|
`--DisableReportProblemDialog [DisableReportProblemDialog]`
|
|
209
|
-
: Disables report problem dialog. Allowed values `true
|
|
209
|
+
: Disables report problem dialog. Allowed values `true`, `false`
|
|
210
210
|
|
|
211
211
|
`--DisplayNamesOfFileViewers [DisplayNamesOfFileViewers]`
|
|
212
|
-
: Displays names of file viewers. Allowed values `true
|
|
212
|
+
: Displays names of file viewers. Allowed values `true`, `false`
|
|
213
213
|
|
|
214
214
|
`--EnableMinimumVersionRequirement [EnableMinimumVersionRequirement]`
|
|
215
|
-
: Enables minimum version requirement. Allowed values `true
|
|
215
|
+
: Enables minimum version requirement. Allowed values `true`, `false`
|
|
216
216
|
|
|
217
217
|
`--HideSyncButtonOnODB [HideSyncButtonOnODB]`
|
|
218
|
-
: Hides the sync button on One Drive for Business. Allowed values `true
|
|
218
|
+
: Hides the sync button on One Drive for Business. Allowed values `true`, `false`
|
|
219
219
|
|
|
220
220
|
`--IsUnmanagedSyncClientForTenantRestricted [IsUnmanagedSyncClientForTenantRestricted]`
|
|
221
|
-
: Is unmanaged sync client for tenant restricted. Allowed values `true
|
|
221
|
+
: Is unmanaged sync client for tenant restricted. Allowed values `true`, `false`
|
|
222
222
|
|
|
223
223
|
`--LimitedAccessFileType [LimitedAccessFileType]`
|
|
224
224
|
: Allows users to preview only Office files in the browser. This option increases security but may be a barrier to user productivity. Allowed values `OfficeOnlineFilesOnly,WebPreviewableFiles,OtherFiles`
|
|
225
225
|
|
|
226
226
|
`--OptOutOfGrooveBlock [OptOutOfGrooveBlock]`
|
|
227
|
-
: Opts out of the groove block. Allowed values `true
|
|
227
|
+
: Opts out of the groove block. Allowed values `true`, `false`
|
|
228
228
|
|
|
229
229
|
`--OptOutOfGrooveSoftBlock [OptOutOfGrooveSoftBlock]`
|
|
230
|
-
: Opts out of Groove soft block. Allowed values `true
|
|
230
|
+
: Opts out of Groove soft block. Allowed values `true`, `false`
|
|
231
231
|
|
|
232
232
|
`--OrgNewsSiteUrl [OrgNewsSiteUrl]`
|
|
233
233
|
: Organization news site url'
|
|
234
234
|
|
|
235
235
|
`--PermissiveBrowserFileHandlingOverride [PermissiveBrowserFileHandlingOverride]`
|
|
236
|
-
: Permissive browser file handling override. Allowed values `true
|
|
236
|
+
: Permissive browser file handling override. Allowed values `true`, `false`
|
|
237
237
|
|
|
238
238
|
`--ShowNGSCDialogForSyncOnODB [ShowNGSCDialogForSyncOnODB]`
|
|
239
|
-
: Show NGSC dialog for sync on OneDrive for Business. Allowed values `true
|
|
239
|
+
: Show NGSC dialog for sync on OneDrive for Business. Allowed values `true`, `false`
|
|
240
240
|
|
|
241
241
|
`--SpecialCharactersStateInFileFolderNames [SpecialCharactersStateInFileFolderNames]`
|
|
242
242
|
: Sets the special characters state in file and folder names in SharePoint and OneDrive for Business. Allowed values `NoPreference,Allowed,Disallowed`
|
|
243
243
|
|
|
244
244
|
`--SyncPrivacyProfileProperties [SyncPrivacyProfileProperties]`
|
|
245
|
-
: Syncs privacy profile properties. Allowed values `true
|
|
245
|
+
: Syncs privacy profile properties. Allowed values `true`, `false`
|
|
246
246
|
|
|
247
247
|
`--ExcludedFileExtensionsForSyncClient [ExcludedFileExtensionsForSyncClient]`
|
|
248
248
|
: Excluded file extensions for sync client. Array of strings split by comma
|
|
@@ -254,13 +254,16 @@ m365 spo tenant settings set [options]
|
|
|
254
254
|
: Sets disabled web part Ids. Array of GUIDs split by comma. Example: `c9b1909e-901a-0000-2cdb-e91c3f46320a,c9b1909e-901a-0000-2cdb-e91c3f463201`
|
|
255
255
|
|
|
256
256
|
`--DisableCustomAppAuthentication [DisableCustomAppAuthentication]`
|
|
257
|
-
: Configure if ACS-based app-only auth should be disabled or not. Allowed values `true
|
|
257
|
+
: Configure if ACS-based app-only auth should be disabled or not. Allowed values `true`, `false`
|
|
258
|
+
|
|
259
|
+
`--CommentsOnListItemsDisabled [CommentsOnListItemsDisabled]`
|
|
260
|
+
: Enables or disables comments on lists. Allowed values `true`, `false`
|
|
258
261
|
|
|
259
262
|
`--EnableAzureADB2BIntegration [EnableAzureADB2BIntegration]`
|
|
260
|
-
: Enables the preview for OneDrive and SharePoint integration with Azure AD B2B. Allowed values `true
|
|
263
|
+
: Enables the preview for OneDrive and SharePoint integration with Azure AD B2B. Allowed values `true`, `false`. Azure AD one-time passcode needs to be enabled for this integration to work. For more information see [http://aka.ms/spo-b2b-integration](https://aka.ms/spo-b2b-integration).
|
|
261
264
|
|
|
262
265
|
`--SyncAadB2BManagementPolicy [SyncAadB2BManagementPolicy]`
|
|
263
|
-
: Syncs Azure B2B Management Policies. Allowed values `true
|
|
266
|
+
: Syncs Azure B2B Management Policies. Allowed values `true`, `false`. For more information, see [SharePoint and OneDrive integration with Azure AD B2B](https://aka.ms/spo-b2b-integration).
|
|
264
267
|
|
|
265
268
|
--8<-- "docs/cmd/_global.md"
|
|
266
269
|
|
|
@@ -0,0 +1,96 @@
|
|
|
1
|
+
# teams meeting transcript list
|
|
2
|
+
|
|
3
|
+
Lists all transcripts for a given meeting
|
|
4
|
+
|
|
5
|
+
## Usage
|
|
6
|
+
|
|
7
|
+
```sh
|
|
8
|
+
m365 teams meeting transcript list [options]
|
|
9
|
+
```
|
|
10
|
+
|
|
11
|
+
## Options
|
|
12
|
+
|
|
13
|
+
`-u, --userId [userId]`
|
|
14
|
+
: The id of the user, omit to list meeting transcripts list for current signed in user. Use either `id`, `userName` or `email`, but not multiple.
|
|
15
|
+
|
|
16
|
+
`-n, --userName [userName]`
|
|
17
|
+
: The upn of the user, omit to list meeting transcripts list for current signed in user. Use either `id`, `userName` or `email`, but not multiple.
|
|
18
|
+
|
|
19
|
+
`--email [email]`
|
|
20
|
+
: The email of the user, omit to list meeting transcripts list for current signed in user. Use either `id`, `userName` or `email`, but not multiple.
|
|
21
|
+
|
|
22
|
+
`-m, --meetingId <meetingId>`
|
|
23
|
+
: The id of the meeting.
|
|
24
|
+
|
|
25
|
+
--8<-- "docs/cmd/_global.md"
|
|
26
|
+
|
|
27
|
+
## Examples
|
|
28
|
+
|
|
29
|
+
Lists all transcripts made for the current signed in user and Microsoft Teams meeting with given id
|
|
30
|
+
|
|
31
|
+
```sh
|
|
32
|
+
m365 teams meeting transcript list --meetingId MSo1N2Y5ZGFjYy03MWJmLTQ3NDMtYjQxMy01M2EdFGkdRWHJlQ
|
|
33
|
+
```
|
|
34
|
+
|
|
35
|
+
Lists all transcripts for a meeting of a specific user
|
|
36
|
+
|
|
37
|
+
```sh
|
|
38
|
+
m365 teams meeting transcript list --userName garthf@contoso.com --meetingId MSo1N2Y5ZGFjYy03MWJmLTQ3NDMtYjQxMy01M2EdFGkdRWHJlQ
|
|
39
|
+
```
|
|
40
|
+
|
|
41
|
+
## Remarks
|
|
42
|
+
|
|
43
|
+
!!! attention
|
|
44
|
+
This command is based on a Microsoft Graph API that is currently in preview and is subject to change once the API reached general availability.
|
|
45
|
+
|
|
46
|
+
!!! attention
|
|
47
|
+
To run this command with application permissions, tenant administrators must create an application access policy and grant it to a user. This authorizes the app configured in the policy to fetch online meetings and/or online meeting artifacts on behalf of that user. For more details, click [here](https://learn.microsoft.com/en-us/graph/cloud-communication-online-meeting-application-access-policy).
|
|
48
|
+
|
|
49
|
+
## Response
|
|
50
|
+
|
|
51
|
+
=== "JSON"
|
|
52
|
+
|
|
53
|
+
```json
|
|
54
|
+
[
|
|
55
|
+
{
|
|
56
|
+
"id": "MSMjMCMjZDAwYWU3NjUtNmM2Yi00NjQxLTgwMWQtMTkzMmFmMjEzNzdh",
|
|
57
|
+
"meetingId": "MSpiZTExZjUyMy0yYTRkLTRlYWUtOWQ0Mi0yNzc0MTA4OTNjNDEqMCoqMTk6bWVldGluZ19aakU0WmpVMllqY3RZMkV3T1MwME1UaGtMV0prWlRRdE1qRXhPVGN4T0RaalpUUTJAdGhyZWFkLnYy",
|
|
58
|
+
"meetingOrganizerId": "be11f523-2a4d-4eae-9d42-277410893c41",
|
|
59
|
+
"transcriptContentUrl": "https://graph.microsoft.com/beta/users/be11f523-2a4d-4eae-9d42-277410893c41/onlineMeetings/MSpiZTExZjUyMy0yYTRkLTRlYWUtOWQ0Mi0yNzc0MTA4OTNjNDEqMCoqMTk6bWVldGluZ19aakU0WmpVMllqY3RZMkV3T1MwME1UaGtMV0prWlRRdE1qRXhPVGN4T0RaalpUUTJAdGhyZWFkLnYy/transcripts/MSMjMCMjZDAwYWU3NjUtNmM2Yi00NjQxLTgwMWQtMTkzMmFmMjEzNzdh/content",
|
|
60
|
+
"createdDateTime": "2021-09-17T06:09:24.8968037Z"
|
|
61
|
+
}
|
|
62
|
+
]
|
|
63
|
+
```
|
|
64
|
+
|
|
65
|
+
=== "Text"
|
|
66
|
+
|
|
67
|
+
```text
|
|
68
|
+
id createdDateTime
|
|
69
|
+
-------------------------------------------------------- ---------------------
|
|
70
|
+
MSMjMCMjZDAwYWU3NjUtNmM2Yi00NjQxLTgwMWQtMTkzMmFmMjEzNzdh 2021-09-17T06:09:24.8968037Z
|
|
71
|
+
```
|
|
72
|
+
|
|
73
|
+
=== "CSV"
|
|
74
|
+
|
|
75
|
+
```csv
|
|
76
|
+
id,meetingId,meetingOrganizerId,transcriptContentUrl,createdDateTime
|
|
77
|
+
MSMjMCMjMTAxOGIzZDgtMWJlMy00Y2Y2LWE4YjUtODFhNmVhYzFjNTYz,MSpiZTExZjUyMy0yYTRkLTRlYWUtOWQ0Mi0yNzc0MTA4OTNjNDEqMCoqMTk6bWVldGluZ19aakU0WmpVMllqY3RZMkV3T1MwME1UaGtMV0prWlRRdE1qRXhPVGN4T0RaalpUUTJAdGhyZWFkLnYy,be11f523-2a4d-4eae-9d42-277410893c41,https://graph.microsoft.com/beta/users/be11f523-2a4d-4eae-9d42-277410893c41/onlineMeetings/MSpiZTExZjUyMy0yYTRkLTRlYWUtOWQ0Mi0yNzc0MTA4OTNjNDEqMCoqMTk6bWVldGluZ19aakU0WmpVMllqY3RZMkV3T1MwME1UaGtMV0prWlRRdE1qRXhPVGN4T0RaalpUUTJAdGhyZWFkLnYy/transcripts/MSMjMCMjMTAxOGIzZDgtMWJlMy00Y2Y2LWE4YjUtODFhNmVhYzFjNTYz/content,2023-03-25T21:32:08.5586288Z
|
|
78
|
+
```
|
|
79
|
+
|
|
80
|
+
=== "Markdown"
|
|
81
|
+
|
|
82
|
+
```md
|
|
83
|
+
# teams meeting transcript list --meetingId "MSpiZTExZjUyMy0yYTRkLTRlYWUtOWQ0Mi0yNzc0MTA4OTNjNDEqMCoqMTk6bWVldGluZ19aakU0WmpVMllqY3RZMkV3T1MwME1UaGtMV0prWlRRdE1qRXhPVGN4T0RaalpUUTJAdGhyZWFkLnYy"
|
|
84
|
+
|
|
85
|
+
Date: 3/25/2023
|
|
86
|
+
|
|
87
|
+
## MSMjMCMjZDAwYWU3NjUtNmM2Yi00NjQxLTgwMWQtMTkzMmFmMjEzNzdh
|
|
88
|
+
|
|
89
|
+
Property | Value
|
|
90
|
+
---------|-------
|
|
91
|
+
id | MSMjMCMjZDAwYWU3NjUtNmM2Yi00NjQxLTgwMWQtMTkzMmFmMjEzNzdh
|
|
92
|
+
meetingId | MSpiZTExZjUyMy0yYTRkLTRlYWUtOWQ0Mi0yNzc0MTA4OTNjNDEqMCoqMTk6bWVldGluZ19aakU0WmpVMllqY3RZMkV3T1MwME1UaGtMV0prWlRRdE1qRXhPVGN4T0RaalpUUTJAdGhyZWFkLnYy
|
|
93
|
+
meetingOrganizerId | be11f523-2a4d-4eae-9d42-277410893c41
|
|
94
|
+
transcriptContentUrl | https://graph.microsoft.com/beta/users/be11f523-2a4d-4eae-9d42-277410893c41/onlineMeetings/MSpiZTExZjUyMy0yYTRkLTRlYWUtOWQ0Mi0yNzc0MTA4OTNjNDEqMCoqMTk6bWVldGluZ19aakU0WmpVMllqY3RZMkV3T1MwME1UaGtMV0prWlRRdE1qRXhPVGN4T0RaalpUUTJAdGhyZWFkLnYy/transcripts/MSMjMCMjZDAwYWU3NjUtNmM2Yi00NjQxLTgwMWQtMTkzMmFmMjEzNzdh/content
|
|
95
|
+
createdDateTime | 2023-03-25T21:32:08.5586288Z
|
|
96
|
+
```
|
package/npm-shrinkwrap.json
CHANGED
|
@@ -1,12 +1,12 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pnp/cli-microsoft365",
|
|
3
|
-
"version": "6.
|
|
3
|
+
"version": "6.8.0",
|
|
4
4
|
"lockfileVersion": 2,
|
|
5
5
|
"requires": true,
|
|
6
6
|
"packages": {
|
|
7
7
|
"": {
|
|
8
8
|
"name": "@pnp/cli-microsoft365",
|
|
9
|
-
"version": "6.
|
|
9
|
+
"version": "6.8.0",
|
|
10
10
|
"license": "MIT",
|
|
11
11
|
"dependencies": {
|
|
12
12
|
"@azure/msal-node": "^1.16.0",
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pnp/cli-microsoft365",
|
|
3
|
-
"version": "6.
|
|
3
|
+
"version": "6.8.0-beta.2463cfa",
|
|
4
4
|
"description": "Manage Microsoft 365 and SharePoint Framework projects on any platform",
|
|
5
5
|
"license": "MIT",
|
|
6
6
|
"main": "./dist/api.js",
|
|
@@ -169,6 +169,7 @@
|
|
|
169
169
|
"O'Callaghan, Conor <brioscaibriste@gmail.com>",
|
|
170
170
|
"Otto <berot3@gmail.com>",
|
|
171
171
|
"Pandey, Vividh <vividh.pandey.13@gmail.com>",
|
|
172
|
+
"Patel, Ashish <ashishp.nuku@gmail.com>",
|
|
172
173
|
"Patil, Atharva <atharvapatil19202@gmail.com>",
|
|
173
174
|
"Peck, Taaqif <taaqifpeck@gmail.com>",
|
|
174
175
|
"Plenevaux, Yannick <yannick.plenevaux@gmail.com>",
|
|
@@ -279,4 +280,4 @@
|
|
|
279
280
|
"sinon": "^15.0.3",
|
|
280
281
|
"source-map-support": "^0.5.21"
|
|
281
282
|
}
|
|
282
|
-
}
|
|
283
|
+
}
|