@pnp/cli-microsoft365 7.3.0-beta.6062919 → 7.3.0-beta.66401a3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (35) hide show
  1. package/allCommands.json +1 -1
  2. package/allCommandsFull.json +1 -1
  3. package/dist/Auth.js +3 -0
  4. package/dist/m365/aad/commands/administrativeunit/administrativeunit-member-add.js +137 -0
  5. package/dist/m365/aad/commands/administrativeunit/administrativeunit-member-get.js +112 -0
  6. package/dist/m365/aad/commands/administrativeunit/administrativeunit-member-list.js +138 -0
  7. package/dist/m365/aad/commands/app/app-permission-add.js +237 -0
  8. package/dist/m365/aad/commands.js +5 -1
  9. package/dist/m365/base/PowerAutomateCommand.js +18 -0
  10. package/dist/m365/flow/commands/environment/environment-get.js +3 -3
  11. package/dist/m365/flow/commands/environment/environment-list.js +3 -3
  12. package/dist/m365/flow/commands/flow-disable.js +3 -3
  13. package/dist/m365/flow/commands/flow-enable.js +3 -3
  14. package/dist/m365/flow/commands/flow-get.js +3 -3
  15. package/dist/m365/flow/commands/flow-list.js +14 -12
  16. package/dist/m365/flow/commands/flow-remove.js +3 -3
  17. package/dist/m365/flow/commands/owner/owner-ensure.js +3 -3
  18. package/dist/m365/flow/commands/owner/owner-list.js +3 -3
  19. package/dist/m365/flow/commands/owner/owner-remove.js +3 -3
  20. package/dist/m365/flow/commands/run/run-cancel.js +3 -3
  21. package/dist/m365/flow/commands/run/run-get.js +3 -3
  22. package/dist/m365/flow/commands/run/run-list.js +8 -7
  23. package/dist/m365/flow/commands/run/run-resubmit.js +4 -4
  24. package/dist/m365/teams/commands/app/app-install.js +30 -3
  25. package/dist/m365/teams/commands/user/user-app-add.js +23 -5
  26. package/dist/utils/aadAdministrativeUnit.js +4 -4
  27. package/dist/utils/aadDevice.js +25 -0
  28. package/docs/docs/cmd/aad/administrativeunit/administrativeunit-member-add.mdx +93 -0
  29. package/docs/docs/cmd/aad/administrativeunit/administrativeunit-member-get.mdx +130 -0
  30. package/docs/docs/cmd/aad/administrativeunit/administrativeunit-member-list.mdx +312 -0
  31. package/docs/docs/cmd/aad/app/app-permission-add.mdx +62 -0
  32. package/docs/docs/cmd/teams/app/app-install.mdx +11 -2
  33. package/docs/docs/cmd/teams/user/user-app-add.mdx +12 -3
  34. package/docs/docs/cmd/teams/user/user-app-remove.mdx +2 -2
  35. package/package.json +1 -1
@@ -0,0 +1,93 @@
1
+ import Global from '/docs/cmd/_global.mdx';
2
+ import Tabs from '@theme/Tabs';
3
+ import TabItem from '@theme/TabItem';
4
+
5
+ # aad administrativeunit member add
6
+
7
+ Add a member (user, group, or device) to an administrative unit
8
+
9
+ ## Usage
10
+
11
+ ```sh
12
+ m365 aad administrativeunit member add [options]
13
+ ```
14
+
15
+ ## Options
16
+
17
+ ```md definition-list
18
+ `-i, --administrativeUnitId [administrativeUnitId]`
19
+ : The id of the administrative unit. Specify either `administrativeUnitId` or `administrativeUnitName` but not both.
20
+
21
+ `-n, --administrativeUnitName [administrativeUnitName]`
22
+ : The name of the administrative unit. Specify either `administrativeUnitId` or `administrativeUnitName` but not both.
23
+
24
+ `--userId [userId]`
25
+ : The id of the user to be added. Specify `userId`, `userName`, `groupId`, `groupName`, `deviceId` or `deviceName`.
26
+
27
+ `--userName [userName]`
28
+ : The user principal name (UPN) of the user to be added. Specify `userId`, `userName`, `groupId`, `groupName`, `deviceId` or `deviceName`.
29
+
30
+ `--groupId [groupId]`
31
+ : The id of the group to be added. Specify `userId`, `userName`, `groupId`, `groupName`, `deviceId` or `deviceName`.
32
+
33
+ `--groupName [groupName]`
34
+ : The name of the group to be added. Specify `userId`, `userName`, `groupId`, `groupName`, `deviceId` or `deviceName`.
35
+
36
+ `--deviceId [deviceId]`
37
+ : The id of the device to be added. Specify `userId`, `userName`, `groupId`, `groupName`, `deviceId` or `deviceName`.
38
+
39
+ `--deviceName [deviceName]`
40
+ : The name of the device to be added. Specify `userId`, `userName`, `groupId`, `groupName`, `deviceId` or `deviceName`.
41
+ ```
42
+
43
+ <Global />
44
+
45
+ ## Remarks
46
+
47
+ :::info
48
+
49
+ To use this command you must be either **Global Administrator** or **Privileged Role Administrator**.
50
+
51
+ :::
52
+
53
+ ## Examples
54
+
55
+ Add a single user specified by id to an administrative unit specified by id
56
+
57
+ ```sh
58
+ m365 aad administrativeunit member add --administrativeUnitId 03c4c9dc-6f0c-4c4f-a4e6-0c9ed80f54c7 --userId 1caf7dcd-7e83-4c3a-94f7-932a1299c844
59
+ ```
60
+
61
+ Add a single user specified by user principal name to an administrative unit specified by name
62
+
63
+ ```sh
64
+ m365 aad administrativeunit member add --administrativeUnitName 'Marketing Division' --userName john.doe@contoso.com
65
+ ```
66
+
67
+ Add a single group specified by id to an administrative unit specified by id
68
+
69
+ ```sh
70
+ m365 aad administrativeunit member add --administrativeUnitId 03c4c9dc-6f0c-4c4f-a4e6-0c9ed80f54c7 --groupId b2307a39-e878-458b-bc90-03bc578531d6
71
+ ```
72
+
73
+ Add a single group specified by name to an administrative unit specified by name
74
+
75
+ ```sh
76
+ m365 aad administrativeunit member add --administrativeUnitName 'Marketing Division' --groupName 'Marketing Group'
77
+ ```
78
+
79
+ Add a single device specified by id to an administrative unit specified by id
80
+
81
+ ```sh
82
+ m365 aad administrativeunit member add --administrativeUnitId 03c4c9dc-6f0c-4c4f-a4e6-0c9ed80f54c7 --deviceId 810c84a8-4a9e-49e6-bf7d-12d183f40d01
83
+ ```
84
+
85
+ Add a single device specified by name to an administrative unit specified by name
86
+
87
+ ```sh
88
+ m365 aad administrativeunit member add --administrativeUnitName 'Marketing Division' --deviceName 'JohnDoe-PC'
89
+ ```
90
+
91
+ ## More information
92
+
93
+ - Administrative units: https://learn.microsoft.com/entra/identity/role-based-access-control/administrative-units
@@ -0,0 +1,130 @@
1
+ import Global from '/docs/cmd/_global.mdx';
2
+ import Tabs from '@theme/Tabs';
3
+ import TabItem from '@theme/TabItem';
4
+
5
+ # aad administrativeunit member get
6
+
7
+ Retrieves info about a specific member of an administrative unit
8
+
9
+ ## Usage
10
+
11
+ ```sh
12
+ m365 aad administrativeunit member get [options]
13
+ ```
14
+
15
+ ## Options
16
+
17
+ ```md definition-list
18
+ `-i, --id <id>`
19
+ : The id of a member to be retrieved.
20
+
21
+ `-u, --administrativeUnitId [administrativeUnitId]`
22
+ : The id of the administrative unit. Specify either `administrativeUnitId` or `administrativeUnitName`.
23
+
24
+ `-n, --administrativeUnitName [administrativeUnitName]`
25
+ : The name of the administrative unit. Specify either `administrativeUnitId` or `administrativeUnitName`.
26
+
27
+ `-p, --properties [properties]`
28
+ : Comma-separated list of properties to retrieve.
29
+ ```
30
+
31
+ <Global />
32
+
33
+ ## Remarks
34
+
35
+ To get the member of a hidden membership in an administrative unit, the `Member.Read.Hidden` permission is required.
36
+
37
+ When the `properties` option includes values with a `/`, for example: `manager/displayName`, an additional `$expand` query parameter will be included on manager.
38
+
39
+ ## Examples
40
+
41
+ Get information about a member specified by id from an administrative unit specified by id
42
+
43
+ ```sh
44
+ m365 aad administrativeunit member get --id 64131a70-beb9-4ccb-b590-4401e58446ec --administrativeUnitId 03c4c9dc-6f0c-4c4f-a4e6-0c9ed80f54c7
45
+ ```
46
+
47
+ Get information about a member specified by id from an administrative unit specified by name
48
+
49
+ ```sh
50
+ m365 aad administrativeunit member get --id 64131a70-beb9-4ccb-b590-4401e58446ec --administrativeUnitName 'Marketing Division'
51
+ ```
52
+
53
+ ## Response
54
+
55
+ <Tabs>
56
+ <TabItem value="JSON">
57
+
58
+ ```json
59
+ {
60
+ "id": "64131a70-beb9-4ccb-b590-4401e58446ec",
61
+ "businessPhones": [
62
+ "+20 255501070"
63
+ ],
64
+ "displayName": "Pradeep Gupta",
65
+ "givenName": "Pradeep",
66
+ "jobTitle": "Accountant",
67
+ "mail": "PradeepG@contoso.com",
68
+ "mobilePhone": null,
69
+ "officeLocation": "98/2202",
70
+ "preferredLanguage": "en-US",
71
+ "surname": "Gupta",
72
+ "userPrincipalName": "PradeepG@contoso.com",
73
+ "type": "user"
74
+ }
75
+ ```
76
+
77
+ </TabItem>
78
+ <TabItem value="Text">
79
+
80
+ ```text
81
+ businessPhones : ["+20 255501070"]
82
+ displayName : Pradeep Gupta
83
+ givenName : Pradeep
84
+ id : 64131a70-beb9-4ccb-b590-4401e58446ec
85
+ jobTitle : Accountant
86
+ mail : PradeepG@contoso.com
87
+ mobilePhone : null
88
+ officeLocation : 98/2202
89
+ preferredLanguage: en-US
90
+ surname : Gupta
91
+ type : user
92
+ userPrincipalName: PradeepG@contoso.com
93
+ ```
94
+
95
+ </TabItem>
96
+ <TabItem value="CSV">
97
+
98
+ ```csv
99
+ id,displayName,givenName,jobTitle,mail,officeLocation,preferredLanguage,surname,userPrincipalName,type
100
+ 64131a70-beb9-4ccb-b590-4401e58446ec,Pradeep Gupta,Pradeep,Accountant,PradeepG@contoso.com,98/2202,en-US,Gupta,PradeepG@contoso.com,user
101
+ ```
102
+
103
+ </TabItem>
104
+ <TabItem value="Markdown">
105
+
106
+ ```md
107
+ Date: 11/10/2023
108
+
109
+ ## Pradeep Gupta (64131a70-beb9-4ccb-b590-4401e58446ec)
110
+
111
+ Property | Value
112
+ ---------|-------
113
+ id | 64131a70-beb9-4ccb-b590-4401e58446ec
114
+ displayName | Pradeep Gupta
115
+ givenName | Pradeep
116
+ jobTitle | Accountant
117
+ mail | PradeepG@contoso.com
118
+ officeLocation | 98/2202
119
+ preferredLanguage | en-US
120
+ surname | Gupta
121
+ userPrincipalName | PradeepG@contoso.com
122
+ type | user
123
+ ```
124
+
125
+ </TabItem>
126
+ </Tabs>
127
+
128
+ ## More information
129
+
130
+ - Administrative units: https://learn.microsoft.com/entra/identity/role-based-access-control/administrative-units
@@ -0,0 +1,312 @@
1
+ import Global from '/docs/cmd/_global.mdx';
2
+ import Tabs from '@theme/Tabs';
3
+ import TabItem from '@theme/TabItem';
4
+
5
+ # aad administrativeunit member list
6
+
7
+ Retrieves members (users, groups, or devices) of an administrative unit
8
+
9
+ ## Usage
10
+
11
+ ```sh
12
+ m365 aad administrativeunit member list [options]
13
+ ```
14
+
15
+ ## Options
16
+
17
+ ```md definition-list
18
+ `-i, --administrativeUnitId [administrativeUnitId]`
19
+ : The id of the administrative unit. Specify either `administrativeUnitId` or `administrativeUnitName`.
20
+
21
+ `-n, --administrativeUnitName [administrativeUnitName]`
22
+ : The name of the administrative unit. Specify either `administrativeUnitId` or `administrativeUnitName`.
23
+
24
+ `-t, --type [type]`
25
+ : When specified, the command returns only objects of specified type. Allowed values are `user`, `group` and `device`.
26
+
27
+ `-p, --properties [properties]`
28
+ : Comma-separated list of properties to retrieve.
29
+
30
+ `-f, --filter [filter]`
31
+ : OData filter to use to query the list of members with. Applied only when `type` is specified.
32
+ ```
33
+
34
+ <Global />
35
+
36
+ ## Remarks
37
+
38
+ To list the members of a hidden membership in an administrative unit, the `Member.Read.Hidden` permission is required.
39
+
40
+ When the `properties` option includes values with a `/`, for example: `manager/displayName`, an additional `$expand` query parameter will be included on manager.
41
+
42
+ ## Examples
43
+
44
+ List members of an administrative unit specified by id
45
+
46
+ ```sh
47
+ m365 aad administrativeunit member list --administrativeUnitId 03c4c9dc-6f0c-4c4f-a4e6-0c9ed80f54c7
48
+ ```
49
+
50
+ List members of an administrative unit specified by id. For each one return the `id` and the `displayName`
51
+
52
+ ```sh
53
+ m365 aad administrativeunit member list --administrativeUnitId 03c4c9dc-6f0c-4c4f-a4e6-0c9ed80f54c7 --properties 'id,displayName'
54
+ ```
55
+
56
+ List members of an administrative unit specified by name
57
+
58
+ ```sh
59
+ m365 aad administrativeunit member list --administrativeUnitName 'Marketing Division'
60
+ ```
61
+
62
+ List users of an administrative unit specified by id
63
+
64
+ ```sh
65
+ m365 aad administrativeunit member list --administrativeUnitId 03c4c9dc-6f0c-4c4f-a4e6-0c9ed80f54c7 --type user
66
+ ```
67
+
68
+ List users of an administrative unit specified by id that are guest users
69
+
70
+ ```sh
71
+ m365 aad administrativeunit member list --administrativeUnitId 03c4c9dc-6f0c-4c4f-a4e6-0c9ed80f54c7 --type user --filter "userType eq 'Guest'"
72
+ ```
73
+
74
+ List groups of an administrative unit specified by id
75
+
76
+ ```sh
77
+ m365 aad administrativeunit member list --administrativeUnitId 03c4c9dc-6f0c-4c4f-a4e6-0c9ed80f54c7 --type group
78
+ ```
79
+
80
+ List groups of an administrative unit specified by id and include owners names, for each member return the `id` and the `displayName`
81
+
82
+ ```sh
83
+ m365 aad administrativeunit member list --administrativeUnitId 03c4c9dc-6f0c-4c4f-a4e6-0c9ed80f54c7 --type group --properties 'id,displayName,owners/displayName'
84
+ ```
85
+
86
+ List devices of an administrative unit specified by id
87
+
88
+ ```sh
89
+ m365 aad administrativeunit member list --administrativeUnitId 03c4c9dc-6f0c-4c4f-a4e6-0c9ed80f54c7 --type device
90
+ ```
91
+
92
+ List devices with linux operating system of an administrative unit specified by id
93
+
94
+ ```sh
95
+ m365 aad administrativeunit member list --administrativeUnitId 03c4c9dc-6f0c-4c4f-a4e6-0c9ed80f54c7 --type device --filter "operatingSystem eq 'linux'"
96
+ ```
97
+
98
+ ## Response
99
+
100
+ <Tabs>
101
+ <TabItem value="JSON">
102
+
103
+ ```json
104
+ [
105
+ {
106
+ "id": "64131a70-beb9-4ccb-b590-4401e58446ec",
107
+ "businessPhones": [
108
+ "+20 255501070"
109
+ ],
110
+ "displayName": "Pradeep Gupta",
111
+ "givenName": "Pradeep",
112
+ "jobTitle": "Accountant",
113
+ "mail": "PradeepG@contoso.com",
114
+ "mobilePhone": null,
115
+ "officeLocation": "98/2202",
116
+ "preferredLanguage": "en-US",
117
+ "surname": "Gupta",
118
+ "userPrincipalName": "PradeepG@contoso.com",
119
+ "type": "user"
120
+ },
121
+ {
122
+ "id": "c121c70b-deb1-43f7-8298-9111bf3036b4",
123
+ "deletedDateTime": null,
124
+ "classification": null,
125
+ "createdDateTime": "2023-02-22T06:39:13Z",
126
+ "creationOptions": [
127
+ "Team",
128
+ "ExchangeProvisioningFlags:3552"
129
+ ],
130
+ "description": "Welcome to the team that we've assembled to create the Mark 8.",
131
+ "displayName": "Mark 8 Project Team",
132
+ "expirationDateTime": null,
133
+ "groupTypes": [
134
+ "Unified"
135
+ ],
136
+ "isAssignableToRole": null,
137
+ "mail": "Mark8ProjectTeam@contoso.com",
138
+ "mailEnabled": true,
139
+ "mailNickname": "Mark8ProjectTeam",
140
+ "membershipRule": null,
141
+ "membershipRuleProcessingState": null,
142
+ "onPremisesDomainName": null,
143
+ "onPremisesLastSyncDateTime": null,
144
+ "onPremisesNetBiosName": null,
145
+ "onPremisesSamAccountName": null,
146
+ "onPremisesSecurityIdentifier": null,
147
+ "onPremisesSyncEnabled": null,
148
+ "preferredDataLocation": null,
149
+ "preferredLanguage": null,
150
+ "proxyAddresses": [
151
+ "SPO:SPO_e9b87117-c271-4ea9-8bf8-ec0a52253c50@SPO_70cf0eca-e1e8-4d78-9d03-62ecf811dfc2",
152
+ "SMTP:Mark8ProjectTeam@contoso.com"
153
+ ],
154
+ "renewedDateTime": "2023-02-22T06:39:13Z",
155
+ "resourceBehaviorOptions": [
156
+ "HideGroupInOutlook",
157
+ "SubscribeMembersToCalendarEventsDisabled",
158
+ "WelcomeEmailDisabled"
159
+ ],
160
+ "resourceProvisioningOptions": [
161
+ "Team"
162
+ ],
163
+ "securityEnabled": false,
164
+ "securityIdentifier": "S-1-12-1-3240216331-1140317873-294754434-3023450303",
165
+ "theme": null,
166
+ "visibility": "Public",
167
+ "onPremisesProvisioningErrors": [],
168
+ "serviceProvisioningErrors": [],
169
+ "type": "group"
170
+ },
171
+ {
172
+ "id": "3f9fd7c3-73ad-4ce3-b053-76bb8252964d",
173
+ "deletedDateTime": null,
174
+ "accountEnabled": true,
175
+ "approximateLastSignInDateTime": null,
176
+ "complianceExpirationDateTime": null,
177
+ "createdDateTime": "2023-11-06T06:18:26Z",
178
+ "deviceCategory": null,
179
+ "deviceId": "4c299165-6e8f-4b45-a5ba-c5d250a707ff",
180
+ "deviceMetadata": null,
181
+ "deviceOwnership": null,
182
+ "deviceVersion": null,
183
+ "displayName": "AdeleVence-PC",
184
+ "domainName": null,
185
+ "enrollmentProfileName": null,
186
+ "enrollmentType": null,
187
+ "externalSourceName": null,
188
+ "isCompliant": null,
189
+ "isManaged": null,
190
+ "isRooted": null,
191
+ "managementType": null,
192
+ "manufacturer": null,
193
+ "mdmAppId": null,
194
+ "model": null,
195
+ "onPremisesLastSyncDateTime": null,
196
+ "onPremisesSyncEnabled": null,
197
+ "operatingSystem": "windows",
198
+ "operatingSystemVersion": "10",
199
+ "physicalIds": [],
200
+ "profileType": null,
201
+ "registrationDateTime": null,
202
+ "sourceType": null,
203
+ "systemLabels": [],
204
+ "trustType": null,
205
+ "extensionAttributes": {
206
+ "extensionAttribute1": null,
207
+ "extensionAttribute2": null,
208
+ "extensionAttribute3": null,
209
+ "extensionAttribute4": null,
210
+ "extensionAttribute5": null,
211
+ "extensionAttribute6": null,
212
+ "extensionAttribute7": null,
213
+ "extensionAttribute8": null,
214
+ "extensionAttribute9": null,
215
+ "extensionAttribute10": null,
216
+ "extensionAttribute11": null,
217
+ "extensionAttribute12": null,
218
+ "extensionAttribute13": null,
219
+ "extensionAttribute14": null,
220
+ "extensionAttribute15": null
221
+ },
222
+ "alternativeSecurityIds": [
223
+ {
224
+ "type": 2,
225
+ "identityProvider": null,
226
+ "key": "Y3YxN2E1MWFlYw=="
227
+ }
228
+ ],
229
+ "type": "device"
230
+ }
231
+ ]
232
+ ```
233
+
234
+ </TabItem>
235
+ <TabItem value="Text">
236
+
237
+ ```text
238
+ id displayName
239
+ ------------------------------------ -------------------
240
+ 64131a70-beb9-4ccb-b590-4401e58446ec Pradeep Gupta
241
+ c121c70b-deb1-43f7-8298-9111bf3036b4 Mark 8 Project Team
242
+ 3f9fd7c3-73ad-4ce3-b053-76bb8252964d AdeleVence-PC
243
+ ```
244
+
245
+ </TabItem>
246
+ <TabItem value="CSV">
247
+
248
+ ```csv
249
+ id,displayName,givenName,jobTitle,mail,officeLocation,preferredLanguage,surname,userPrincipalName,type
250
+ 64131a70-beb9-4ccb-b590-4401e58446ec,Pradeep Gupta,Pradeep,Accountant,PradeepG@contoso.com,98/2202,en-US,Gupta,PradeepG@contoso.com,user
251
+ c121c70b-deb1-43f7-8298-9111bf3036b4,Mark 8 Project Team,,,Mark8ProjectTeam@contoso.com,,,,,group
252
+ 3f9fd7c3-73ad-4ce3-b053-76bb8252964d,AdeleVence-PC,,,,,,,,device
253
+ ```
254
+
255
+ </TabItem>
256
+ <TabItem value="Markdown">
257
+
258
+ ```md
259
+ Date: 11/9/2023
260
+
261
+ ## Pradeep Gupta (64131a70-beb9-4ccb-b590-4401e58446ec)
262
+
263
+ Property | Value
264
+ ---------|-------
265
+ id | 64131a70-beb9-4ccb-b590-4401e58446ec
266
+ displayName | Pradeep Gupta
267
+ givenName | Pradeep
268
+ jobTitle | Accountant
269
+ mail | PradeepG@contoso.com
270
+ officeLocation | 98/2202
271
+ preferredLanguage | en-US
272
+ surname | Gupta
273
+ userPrincipalName | PradeepG@contoso.com
274
+ type | user
275
+
276
+ ## Mark 8 Project Team (c121c70b-deb1-43f7-8298-9111bf3036b4)
277
+
278
+ Property | Value
279
+ ---------|-------
280
+ id | c121c70b-deb1-43f7-8298-9111bf3036b4
281
+ createdDateTime | 2023-02-22T06:39:13Z
282
+ description | Welcome to the team that we've assembled to create the Mark 8.
283
+ displayName | Mark 8 Project Team
284
+ mail | Mark8ProjectTeam@contoso.com
285
+ mailEnabled | true
286
+ mailNickname | Mark8ProjectTeam
287
+ renewedDateTime | 2023-02-22T06:39:13Z
288
+ securityEnabled | false
289
+ securityIdentifier | S-1-12-1-3240216331-1140317873-294754434-3023450303
290
+ visibility | Public
291
+ type | group
292
+
293
+ ## AdeleVence-PC (3f9fd7c3-73ad-4ce3-b053-76bb8252964d)
294
+
295
+ Property | Value
296
+ ---------|-------
297
+ id | 3f9fd7c3-73ad-4ce3-b053-76bb8252964d
298
+ accountEnabled | true
299
+ createdDateTime | 2023-11-09T06:18:26Z
300
+ deviceId | 4c299165-6e8f-4b45-a5ba-c5d250a707ff
301
+ displayName | AdeleVence-PC
302
+ operatingSystem | windows
303
+ operatingSystemVersion | 10
304
+ type | device
305
+ ```
306
+
307
+ </TabItem>
308
+ </Tabs>
309
+
310
+ ## More information
311
+
312
+ - Administrative units: https://learn.microsoft.com/entra/identity/role-based-access-control/administrative-units
@@ -0,0 +1,62 @@
1
+ import Global from '/docs/cmd/_global.mdx';
2
+ import Tabs from '@theme/Tabs';
3
+ import TabItem from '@theme/TabItem';
4
+
5
+ # aad app permission add
6
+
7
+ Adds the specified application and/or delegated permissions to a specified Entra ID (Azure AD) app
8
+
9
+ ## Usage
10
+
11
+ ```sh
12
+ m365 aad app permission add [options]
13
+ ```
14
+
15
+ ## Options
16
+
17
+ ```md definition-list
18
+ `-i, --appId [appId]`
19
+ : Client ID of the Entra ID (Azure AD) app to add the API permissions to. Specify `appId` or `appObjectId` but not both.
20
+
21
+ `--appObjectId [appObjectId]`
22
+ : Object ID of the Entra ID (Azure AD) app to add the API permissions to. Specify `appId` or `appObjectId` but not both.
23
+
24
+ `-a, --applicationPermissions [applicationPermissions]`
25
+ : Space-separated list of application permissions to add. Specify at least `applicationPermissions` or `delegatedPermissions`.
26
+
27
+ `-d, --delegatedPermissions [delegatedPermissions]`
28
+ : Space-separated list of delegated permissions to add. Specify at least `applicationPermissions` or `delegatedPermissions`.
29
+
30
+ `--grantAdminConsent`
31
+ : When specified, grants application & delegated permissions through admin consent.
32
+ ```
33
+
34
+ <Global />
35
+
36
+ ## Remarks
37
+
38
+ Scopes/Roles to grant must be fully-qualified so that we can disambiguate them between the different resources.
39
+
40
+ ## Examples
41
+
42
+ Grant multiple delegated API permissions to an Entra ID (Azure AD) app specified by client id
43
+
44
+ ```sh
45
+ m365 aad app permission add --appId 'f1417aa3-bf0b-4cc5-a845-a0b2cf11f690' --delegatedPermissions 'https://management.azure.com/user_impersonation https://service.flow.microsoft.com/Flows.Read.All https://graph.microsoft.com/Agreement.Read.All'
46
+ ```
47
+
48
+ Grant multiple delegated API permissions to an Entra ID (Azure AD) app specified by object id
49
+
50
+ ```sh
51
+ m365 aad app permission add --appObjectId 'e0306bb2-bf0b-4cc5-a845-a0b2cf11f690' --delegatedPermissions 'https://management.azure.com/user_impersonation https://service.flow.microsoft.com/Flows.Read.All https://graph.microsoft.com/Agreement.Read.All'
52
+ ```
53
+
54
+ Grant multiple app-only permissions to an Entra ID (Azure AD) app specified by client id and grant admin consent
55
+
56
+ ```sh
57
+ m365 aad app permission add --appId 'f1417aa3-bf0b-4cc5-a845-a0b2cf11f690' --applicationPermissions 'https://graph.microsoft.com/Sites.FullControl.All https://microsoft.sharepoint-df.com/Sites.FullControl.All' --grandAdminConsent
58
+ ```
59
+
60
+ ## Response
61
+
62
+ The command won't return a response on success.
@@ -13,8 +13,11 @@ m365 teams app install [options]
13
13
  ## Options
14
14
 
15
15
  ```md definition-list
16
- `--id <id>`
17
- : The ID of the app to install
16
+ `-i, --id [id]`
17
+ : ID of the app to update. Specify either id or name, but not both
18
+
19
+ `-n, --name [name]`
20
+ : The display name of the app to update. Specify either id or name, but not both
18
21
 
19
22
  `--teamId [teamId]`
20
23
  : The ID of the Microsoft Teams team to which to install the app
@@ -52,6 +55,12 @@ Install a personal app for the user specified using their ID
52
55
  m365 teams app install --id 4440558e-8c73-4597-abc7-3644a64c4bce --userId 2609af39-7775-4f94-a3dc-0dd67657e900
53
56
  ```
54
57
 
58
+ Install an app with name _Test app_ from the catalog in a Microsoft Teams team
59
+
60
+ ```sh
61
+ m365 teams app install --name "Test app" --teamId 2609af39-7775-4f94-a3dc-0dd67657e900
62
+ ```
63
+
55
64
  ## Response
56
65
 
57
66
  The command won't return a response on success.
@@ -16,8 +16,11 @@ m365 teams user app add [options]
16
16
  `--id <id>`
17
17
  : The ID of the app to install.
18
18
 
19
- `--userId <userId>`
20
- : The ID of the user to install the app for.
19
+ `--userId [userId]`
20
+ : The ID of the user to install the app for. Specify either `userId` or `userName` but not both.
21
+
22
+ `--userName [userName]`
23
+ : The UPN of the user to install the app for. Specify either `userId` or `userName` but not both.
21
24
  ```
22
25
 
23
26
  <Global />
@@ -28,12 +31,18 @@ The `id` has to be the ID of the app from the Microsoft Teams App Catalog. Do no
28
31
 
29
32
  ## Examples
30
33
 
31
- Install an app from the catalog for the specified user.
34
+ Install an app from the catalog for the specified user by id.
32
35
 
33
36
  ```sh
34
37
  m365 teams user app add --id 4440558e-8c73-4597-abc7-3644a64c4bce --userId 2609af39-7775-4f94-a3dc-0dd67657e900
35
38
  ```
36
39
 
40
+ Install an app from the catalog for the specified user by name.
41
+
42
+ ```sh
43
+ m365 teams user app add --id 4440558e-8c73-4597-abc7-3644a64c4bce --userName admin@contoso.com
44
+ ```
45
+
37
46
  ## Response
38
47
 
39
48
  The command won't return a response on success.
@@ -20,10 +20,10 @@ m365 teams user app remove [options]
20
20
  : Name of the app instance installed for the user. Specify either `id` or `name`.
21
21
 
22
22
  `--userId [userId]`
23
- : The ID of the user to uninstall the app for. Specify `userId` or `userName` but not both.
23
+ : The ID of the user to uninstall the app for. Specify either `userId` or `userName`.
24
24
 
25
25
  `--userName [userName]`
26
- : The UPN of the user to uninstall the app for. Specify `userId` or `userName` but not both.
26
+ : The UPN of the user to uninstall the app for. Specify either `userId` or `userName`.
27
27
 
28
28
  `-f, --force`
29
29
  : Confirm removal of app for user.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pnp/cli-microsoft365",
3
- "version": "7.3.0-beta.6062919",
3
+ "version": "7.3.0-beta.66401a3",
4
4
  "description": "Manage Microsoft 365 and SharePoint Framework projects on any platform",
5
5
  "license": "MIT",
6
6
  "main": "./dist/api.js",