@pnp/cli-microsoft365 7.5.0 → 7.6.0-beta.480812d

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (209) hide show
  1. package/.eslintrc.cjs +3 -0
  2. package/README.md +1 -1
  3. package/allCommands.json +1 -1
  4. package/allCommandsFull.json +1 -1
  5. package/dist/Auth.js +12 -10
  6. package/dist/AuthServer.js +1 -1
  7. package/dist/cli/cli.js +1 -1
  8. package/dist/config.js +2 -2
  9. package/dist/m365/app/commands/app-get.js +1 -1
  10. package/dist/m365/app/commands/app-open.js +1 -1
  11. package/dist/m365/app/commands/permission/permission-add.js +2 -2
  12. package/dist/m365/app/commands/permission/permission-list.js +2 -2
  13. package/dist/m365/cli/commands/cli-consent.js +2 -2
  14. package/dist/m365/cli/commands/cli-reconsent.js +3 -3
  15. package/dist/m365/commands/login.js +1 -1
  16. package/dist/m365/entra/commands/administrativeunit/administrativeunit-add.js +1 -0
  17. package/dist/m365/entra/commands/administrativeunit/administrativeunit-get.js +1 -0
  18. package/dist/m365/entra/commands/administrativeunit/administrativeunit-list.js +1 -0
  19. package/dist/m365/entra/commands/administrativeunit/administrativeunit-member-add.js +1 -0
  20. package/dist/m365/entra/commands/administrativeunit/administrativeunit-member-get.js +1 -0
  21. package/dist/m365/entra/commands/administrativeunit/administrativeunit-member-list.js +1 -0
  22. package/dist/m365/entra/commands/administrativeunit/administrativeunit-remove.js +1 -0
  23. package/dist/m365/entra/commands/app/app-add.js +7 -6
  24. package/dist/m365/entra/commands/app/app-get.js +4 -3
  25. package/dist/m365/entra/commands/app/app-list.js +1 -0
  26. package/dist/m365/entra/commands/app/app-permission-add.js +3 -2
  27. package/dist/m365/entra/commands/app/app-permission-list.js +1 -1
  28. package/dist/m365/entra/commands/app/app-remove.js +5 -4
  29. package/dist/m365/entra/commands/app/app-role-add.js +6 -5
  30. package/dist/m365/entra/commands/app/app-role-list.js +4 -3
  31. package/dist/m365/entra/commands/app/app-role-remove.js +6 -5
  32. package/dist/m365/entra/commands/app/app-set.js +8 -7
  33. package/dist/m365/entra/commands/approleassignment/approleassignment-add.js +2 -1
  34. package/dist/m365/entra/commands/approleassignment/approleassignment-list.js +1 -0
  35. package/dist/m365/entra/commands/approleassignment/approleassignment-remove.js +1 -0
  36. package/dist/m365/entra/commands/enterpriseapp/enterpriseapp-add.js +1 -0
  37. package/dist/m365/entra/commands/enterpriseapp/enterpriseapp-get.js +1 -0
  38. package/dist/m365/entra/commands/enterpriseapp/enterpriseapp-list.js +1 -0
  39. package/dist/m365/entra/commands/group/group-get.js +1 -0
  40. package/dist/m365/entra/commands/group/group-list.js +1 -0
  41. package/dist/m365/entra/commands/group/group-remove.js +1 -0
  42. package/dist/m365/entra/commands/group/group-user-list.js +1 -0
  43. package/dist/m365/entra/commands/groupsetting/groupsetting-add.js +1 -0
  44. package/dist/m365/entra/commands/groupsetting/groupsetting-get.js +1 -0
  45. package/dist/m365/entra/commands/groupsetting/groupsetting-list.js +1 -0
  46. package/dist/m365/entra/commands/groupsetting/groupsetting-remove.js +1 -0
  47. package/dist/m365/entra/commands/groupsetting/groupsetting-set.js +1 -0
  48. package/dist/m365/entra/commands/groupsettingtemplate/groupsettingtemplate-get.js +1 -0
  49. package/dist/m365/entra/commands/groupsettingtemplate/groupsettingtemplate-list.js +1 -0
  50. package/dist/m365/entra/commands/license/license-list.js +1 -0
  51. package/dist/m365/entra/commands/m365group/m365group-add.js +1 -0
  52. package/dist/m365/entra/commands/m365group/m365group-conversation-list.js +1 -0
  53. package/dist/m365/entra/commands/m365group/m365group-conversation-post-list.js +1 -0
  54. package/dist/m365/entra/commands/m365group/m365group-get.js +1 -0
  55. package/dist/m365/entra/commands/m365group/m365group-list.js +1 -0
  56. package/dist/m365/entra/commands/m365group/m365group-recyclebinitem-clear.js +1 -0
  57. package/dist/m365/entra/commands/m365group/m365group-recyclebinitem-list.js +1 -0
  58. package/dist/m365/entra/commands/m365group/m365group-recyclebinitem-remove.js +1 -0
  59. package/dist/m365/entra/commands/m365group/m365group-recyclebinitem-restore.js +1 -0
  60. package/dist/m365/entra/commands/m365group/m365group-remove.js +1 -0
  61. package/dist/m365/entra/commands/m365group/m365group-renew.js +1 -0
  62. package/dist/m365/entra/commands/m365group/m365group-set.js +1 -0
  63. package/dist/m365/entra/commands/m365group/m365group-teamify.js +1 -0
  64. package/dist/m365/entra/commands/m365group/m365group-user-add.js +1 -0
  65. package/dist/m365/entra/commands/m365group/m365group-user-list.js +1 -0
  66. package/dist/m365/entra/commands/m365group/m365group-user-remove.js +1 -0
  67. package/dist/m365/entra/commands/m365group/m365group-user-set.js +1 -0
  68. package/dist/m365/entra/commands/oauth2grant/oauth2grant-add.js +1 -0
  69. package/dist/m365/entra/commands/oauth2grant/oauth2grant-list.js +1 -0
  70. package/dist/m365/entra/commands/oauth2grant/oauth2grant-remove.js +1 -0
  71. package/dist/m365/entra/commands/oauth2grant/oauth2grant-set.js +1 -0
  72. package/dist/m365/entra/commands/policy/policy-list.js +1 -0
  73. package/dist/m365/entra/commands/siteclassification/siteclassification-disable.js +1 -0
  74. package/dist/m365/entra/commands/siteclassification/siteclassification-enable.js +1 -0
  75. package/dist/m365/entra/commands/siteclassification/siteclassification-get.js +1 -0
  76. package/dist/m365/entra/commands/siteclassification/siteclassification-set.js +1 -0
  77. package/dist/m365/entra/commands/user/user-add.js +1 -0
  78. package/dist/m365/entra/commands/user/user-get.js +1 -0
  79. package/dist/m365/entra/commands/user/user-guest-add.js +1 -0
  80. package/dist/m365/entra/commands/user/user-hibp.js +1 -0
  81. package/dist/m365/entra/commands/user/user-license-add.js +1 -0
  82. package/dist/m365/entra/commands/user/user-license-list.js +1 -0
  83. package/dist/m365/entra/commands/user/user-license-remove.js +1 -0
  84. package/dist/m365/entra/commands/user/user-list.js +1 -0
  85. package/dist/m365/entra/commands/user/user-password-validate.js +1 -0
  86. package/dist/m365/entra/commands/user/user-recyclebinitem-clear.js +1 -0
  87. package/dist/m365/entra/commands/user/user-recyclebinitem-list.js +1 -0
  88. package/dist/m365/entra/commands/user/user-recyclebinitem-remove.js +2 -1
  89. package/dist/m365/entra/commands/user/user-recyclebinitem-restore.js +1 -0
  90. package/dist/m365/entra/commands/user/user-remove.js +1 -0
  91. package/dist/m365/entra/commands/user/user-set.js +1 -0
  92. package/dist/m365/entra/commands/user/user-signin-list.js +1 -0
  93. package/dist/m365/outlook/commands/message/message-remove.js +113 -0
  94. package/dist/m365/outlook/commands.js +1 -0
  95. package/dist/m365/pp/commands/managementapp/managementapp-add.js +7 -7
  96. package/dist/m365/purview/commands/threatassessment/threatassessment-add.js +123 -0
  97. package/dist/m365/purview/commands/threatassessment/threatassessment-list.js +104 -0
  98. package/dist/m365/purview/commands.js +3 -1
  99. package/dist/m365/spfx/commands/project/DeployWorkflow.js +111 -0
  100. package/dist/m365/spfx/commands/project/project-azuredevops-pipeline-add.js +183 -0
  101. package/dist/m365/spfx/commands/project/project-azuredevops-pipeline-model.js +2 -0
  102. package/dist/m365/spfx/commands/project/project-github-workflow-add.js +3 -4
  103. package/dist/m365/spfx/commands.js +1 -0
  104. package/dist/m365/spo/commands/folder/FolderColor.js +19 -0
  105. package/dist/m365/spo/commands/folder/folder-add.js +46 -17
  106. package/dist/m365/spo/commands/folder/folder-set.js +118 -0
  107. package/dist/m365/spo/commands/group/group-member-add.js +2 -2
  108. package/dist/m365/spo/commands/group/group-member-remove.js +1 -1
  109. package/dist/m365/spo/commands/site/site-apppermission-add.js +2 -2
  110. package/dist/m365/spo/commands/site/site-recyclebinitem-restore.js +66 -27
  111. package/dist/m365/spo/commands/tenant/tenant-settings-set.js +1 -1
  112. package/dist/m365/spo/commands/user/user-remove.js +93 -16
  113. package/dist/m365/spo/commands.js +1 -0
  114. package/dist/m365/teams/commands/tab/tab-get.js +1 -1
  115. package/dist/utils/spo.js +1 -1
  116. package/docs/docs/cmd/app/app-get.mdx +10 -10
  117. package/docs/docs/cmd/app/app-open.mdx +6 -6
  118. package/docs/docs/cmd/app/permission/permission-add.mdx +2 -2
  119. package/docs/docs/cmd/app/permission/permission-list.mdx +5 -5
  120. package/docs/docs/cmd/cli/cli-consent.mdx +2 -2
  121. package/docs/docs/cmd/cli/cli-reconsent.mdx +6 -6
  122. package/docs/docs/cmd/entra/app/app-permission-add.mdx +6 -6
  123. package/docs/docs/cmd/entra/approleassignment/approleassignment-add.mdx +1 -1
  124. package/docs/docs/cmd/entra/approleassignment/approleassignment-list.mdx +4 -4
  125. package/docs/docs/cmd/entra/enterpriseapp/enterpriseapp-add.mdx +1 -1
  126. package/docs/docs/cmd/entra/enterpriseapp/enterpriseapp-get.mdx +1 -1
  127. package/docs/docs/cmd/entra/group/group-user-add.mdx +7 -7
  128. package/docs/docs/cmd/entra/oauth2grant/oauth2grant-add.mdx +1 -1
  129. package/docs/docs/cmd/entra/oauth2grant/oauth2grant-list.mdx +1 -1
  130. package/docs/docs/cmd/entra/oauth2grant/oauth2grant-remove.mdx +1 -1
  131. package/docs/docs/cmd/entra/oauth2grant/oauth2grant-set.mdx +1 -1
  132. package/docs/docs/cmd/external/connection/connection-add.mdx +2 -2
  133. package/docs/docs/cmd/file/file-add.mdx +1 -1
  134. package/docs/docs/cmd/graph/schemaextension/schemaextension-add.mdx +2 -2
  135. package/docs/docs/cmd/graph/schemaextension/schemaextension-set.mdx +1 -1
  136. package/docs/docs/cmd/login.mdx +18 -18
  137. package/docs/docs/cmd/outlook/message/message-remove.mdx +67 -0
  138. package/docs/docs/cmd/pa/app/app-owner-set.mdx +1 -1
  139. package/docs/docs/cmd/pa/app/app-permission-ensure.mdx +3 -3
  140. package/docs/docs/cmd/pa/app/app-permission-remove.mdx +3 -3
  141. package/docs/docs/cmd/planner/plan/plan-add.mdx +1 -1
  142. package/docs/docs/cmd/planner/roster/roster-add.mdx +5 -5
  143. package/docs/docs/cmd/planner/roster/roster-get.mdx +7 -7
  144. package/docs/docs/cmd/planner/roster/roster-member-add.mdx +4 -4
  145. package/docs/docs/cmd/planner/roster/roster-member-get.mdx +4 -4
  146. package/docs/docs/cmd/planner/roster/roster-member-list.mdx +2 -2
  147. package/docs/docs/cmd/planner/roster/roster-member-remove.mdx +5 -5
  148. package/docs/docs/cmd/planner/roster/roster-plan-list.mdx +1 -1
  149. package/docs/docs/cmd/planner/roster/roster-remove.mdx +2 -2
  150. package/docs/docs/cmd/planner/task/task-add.mdx +1 -1
  151. package/docs/docs/cmd/planner/task/task-get.mdx +1 -1
  152. package/docs/docs/cmd/planner/task/task-list.mdx +1 -1
  153. package/docs/docs/cmd/planner/task/task-remove.mdx +1 -1
  154. package/docs/docs/cmd/planner/task/task-set.mdx +1 -1
  155. package/docs/docs/cmd/pp/environment/environment-get.mdx +1 -1
  156. package/docs/docs/cmd/pp/environment/environment-list.mdx +1 -1
  157. package/docs/docs/cmd/pp/managementapp/managementapp-add.mdx +9 -9
  158. package/docs/docs/cmd/purview/auditlog/auditlog-list.mdx +1 -1
  159. package/docs/docs/cmd/purview/sensitivitylabel/sensitivitylabel-get.mdx +1 -1
  160. package/docs/docs/cmd/purview/sensitivitylabel/sensitivitylabel-list.mdx +1 -1
  161. package/docs/docs/cmd/purview/sensitivitylabel/sensitivitylabel-policysettings-list.mdx +1 -1
  162. package/docs/docs/cmd/purview/threatassessment/threatassessment-add.mdx +131 -0
  163. package/docs/docs/cmd/purview/threatassessment/threatassessment-list.mdx +110 -0
  164. package/docs/docs/cmd/request.mdx +1 -1
  165. package/docs/docs/cmd/spfx/project/project-azuredevops-pipeline-add.mdx +87 -0
  166. package/docs/docs/cmd/spfx/project/project-github-workflow-add.mdx +2 -2
  167. package/docs/docs/cmd/spo/file/file-roleassignment-add.mdx +3 -3
  168. package/docs/docs/cmd/spo/file/file-roleassignment-remove.mdx +2 -2
  169. package/docs/docs/cmd/spo/folder/folder-add.mdx +38 -0
  170. package/docs/docs/cmd/spo/folder/folder-roleassignment-add.mdx +1 -1
  171. package/docs/docs/cmd/spo/folder/folder-roleassignment-remove.mdx +1 -1
  172. package/docs/docs/cmd/spo/folder/folder-set.mdx +88 -0
  173. package/docs/docs/cmd/spo/group/group-member-add.mdx +2 -2
  174. package/docs/docs/cmd/spo/group/group-member-remove.mdx +3 -3
  175. package/docs/docs/cmd/spo/list/list-roleassignment-add.mdx +3 -3
  176. package/docs/docs/cmd/spo/list/list-roleassignment-remove.mdx +2 -2
  177. package/docs/docs/cmd/spo/listitem/listitem-roleassignment-add.mdx +8 -8
  178. package/docs/docs/cmd/spo/listitem/listitem-roleassignment-remove.mdx +2 -2
  179. package/docs/docs/cmd/spo/site/site-apppermission-add.mdx +2 -2
  180. package/docs/docs/cmd/spo/site/site-apppermission-set.mdx +2 -2
  181. package/docs/docs/cmd/spo/site/site-recyclebinitem-restore.mdx +29 -5
  182. package/docs/docs/cmd/spo/tenant/tenant-settings-set.mdx +89 -89
  183. package/docs/docs/cmd/spo/user/user-ensure.mdx +1 -1
  184. package/docs/docs/cmd/spo/user/user-remove.mdx +40 -9
  185. package/docs/docs/cmd/spo/web/web-roleassignment-add.mdx +3 -3
  186. package/docs/docs/cmd/spo/web/web-roleassignment-remove.mdx +2 -2
  187. package/docs/docs/cmd/teams/channel/channel-member-remove.mdx +1 -1
  188. package/docs/docs/cmd/teams/channel/channel-member-set.mdx +1 -1
  189. package/docs/docs/cmd/teams/chat/chat-member-remove.mdx +3 -3
  190. package/docs/docs/cmd/teams/report/report-directroutingcalls.mdx +1 -1
  191. package/docs/docs/cmd/teams/report/report-pstncalls.mdx +1 -1
  192. package/docs/docs/cmd/teams/tab/tab-get.mdx +19 -12
  193. package/docs/docs/cmd/tenant/security/security-alerts-list.mdx +1 -1
  194. package/docs/docs/cmd/viva/engage/engage-group-list.mdx +1 -1
  195. package/docs/docs/cmd/viva/engage/engage-group-user-add.mdx +1 -1
  196. package/docs/docs/cmd/viva/engage/engage-group-user-remove.mdx +1 -1
  197. package/docs/docs/cmd/viva/engage/engage-message-add.mdx +1 -1
  198. package/docs/docs/cmd/viva/engage/engage-message-get.mdx +1 -1
  199. package/docs/docs/cmd/viva/engage/engage-message-like-set.mdx +1 -1
  200. package/docs/docs/cmd/viva/engage/engage-message-list.mdx +1 -1
  201. package/docs/docs/cmd/viva/engage/engage-message-remove.mdx +1 -1
  202. package/docs/docs/cmd/viva/engage/engage-network-list.mdx +1 -1
  203. package/docs/docs/cmd/viva/engage/engage-search.mdx +1 -1
  204. package/docs/docs/cmd/viva/engage/engage-user-get.mdx +1 -1
  205. package/docs/docs/cmd/viva/engage/engage-user-list.mdx +1 -1
  206. package/npm-shrinkwrap.json +64 -60
  207. package/package.json +12 -12
  208. package/dist/m365/spo/commands/folder/folder-rename.js +0 -72
  209. package/docs/docs/cmd/spo/folder/folder-rename.mdx +0 -44
@@ -5,11 +5,14 @@ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (
5
5
  };
6
6
  var _SpoUserRemoveCommand_instances, _SpoUserRemoveCommand_initTelemetry, _SpoUserRemoveCommand_initOptions, _SpoUserRemoveCommand_initValidators, _SpoUserRemoveCommand_initOptionSets;
7
7
  import { cli } from '../../../../cli/cli.js';
8
+ import { spo } from '../../../../utils/spo.js';
8
9
  import request from '../../../../request.js';
10
+ import { entraGroup } from '../../../../utils/entraGroup.js';
9
11
  import { formatting } from '../../../../utils/formatting.js';
10
12
  import { validation } from '../../../../utils/validation.js';
11
13
  import SpoCommand from '../../../base/SpoCommand.js';
12
14
  import commands from '../../commands.js';
15
+ ;
13
16
  class SpoUserRemoveCommand extends SpoCommand {
14
17
  get name() {
15
18
  return commands.USER_REMOVE;
@@ -40,13 +43,58 @@ class SpoUserRemoveCommand extends SpoCommand {
40
43
  if (this.verbose) {
41
44
  await logger.logToStderr(`Removing user from subsite ${options.webUrl} ...`);
42
45
  }
43
- let requestUrl = `${encodeURI(options.webUrl)}/_api/web/siteusers/`;
44
- if (options.id) {
45
- requestUrl += `removebyid(${options.id})`;
46
+ try {
47
+ let requestUrl = `${encodeURI(options.webUrl)}/_api/web/siteusers/`;
48
+ if (options.id) {
49
+ requestUrl += `removebyid(${options.id})`;
50
+ }
51
+ else if (options.loginName) {
52
+ requestUrl += `removeByLoginName('${formatting.encodeQueryParameter(options.loginName)}')`;
53
+ }
54
+ else if (options.email) {
55
+ const user = await spo.getUserByEmail(options.webUrl, options.email, logger, this.verbose);
56
+ requestUrl += `removebyid(${user.Id})`;
57
+ }
58
+ else if (options.userName) {
59
+ const user = await this.getUser(options);
60
+ if (!user) {
61
+ throw new Error(`User not found: ${options.userName}`);
62
+ }
63
+ if (this.verbose) {
64
+ await logger.logToStderr(`Removing user ${user.Title} ...`);
65
+ }
66
+ requestUrl += `removebyid(${user.Id})`;
67
+ }
68
+ else if (options.entraGroupId || options.entraGroupName) {
69
+ const entraGroup = await this.getEntraGroup(options);
70
+ if (this.verbose) {
71
+ await logger.logToStderr(`Removing entra group ${entraGroup?.displayName} ...`);
72
+ }
73
+ //for entra groups, M365 groups have an associated email and security groups don't
74
+ if (entraGroup?.mail) {
75
+ //M365 group is prefixed with c:0o.c|federateddirectoryclaimprovider
76
+ requestUrl += `removeByLoginName('c:0o.c|federateddirectoryclaimprovider|${entraGroup.id}')`;
77
+ }
78
+ else {
79
+ //security group is prefixed with c:0t.c|tenant
80
+ requestUrl += `removeByLoginName('c:0t.c|tenant|${entraGroup?.id}')`;
81
+ }
82
+ }
83
+ const requestOptions = {
84
+ url: requestUrl,
85
+ headers: {
86
+ accept: 'application/json;odata=nometadata'
87
+ },
88
+ responseType: 'json'
89
+ };
90
+ await request.post(requestOptions);
46
91
  }
47
- else if (options.loginName) {
48
- requestUrl += `removeByLoginName('${formatting.encodeQueryParameter(options.loginName)}')`;
92
+ catch (err) {
93
+ this.handleRejectedODataJsonPromise(err);
49
94
  }
95
+ }
96
+ async getUser(options) {
97
+ const requestUrl = `${options.webUrl}/_api/web/siteusers?$filter=UserPrincipalName eq ('${formatting.encodeQueryParameter(options.userName)}')`;
50
98
  const requestOptions = {
51
99
  url: requestUrl,
52
100
  headers: {
@@ -54,20 +102,23 @@ class SpoUserRemoveCommand extends SpoCommand {
54
102
  },
55
103
  responseType: 'json'
56
104
  };
57
- try {
58
- await request.post(requestOptions);
59
- }
60
- catch (err) {
61
- this.handleRejectedODataJsonPromise(err);
62
- }
105
+ const userInstance = await request.get(requestOptions);
106
+ return userInstance.value[0];
107
+ }
108
+ async getEntraGroup(options) {
109
+ return options.entraGroupId ? await entraGroup.getGroupById(options.entraGroupId) : await entraGroup.getGroupByDisplayName(options.entraGroupName);
63
110
  }
64
111
  }
65
112
  _SpoUserRemoveCommand_instances = new WeakSet(), _SpoUserRemoveCommand_initTelemetry = function _SpoUserRemoveCommand_initTelemetry() {
66
113
  this.telemetry.push((args) => {
67
114
  Object.assign(this.telemetryProperties, {
68
- id: (!(!args.options.id)).toString(),
69
- loginName: (!(!args.options.loginName)).toString(),
70
- force: (!(!args.options.force)).toString()
115
+ id: typeof args.options.id !== 'undefined',
116
+ loginName: typeof args.options.loginName !== 'undefined',
117
+ email: typeof args.options.email !== 'undefined',
118
+ userName: typeof args.options.userName !== 'undefined',
119
+ entraGroupId: typeof args.options.entraGroupId !== 'undefined',
120
+ entraGroupName: typeof args.options.entraGroupName !== 'undefined',
121
+ force: !!args.options.force
71
122
  });
72
123
  });
73
124
  }, _SpoUserRemoveCommand_initOptions = function _SpoUserRemoveCommand_initOptions() {
@@ -77,15 +128,41 @@ _SpoUserRemoveCommand_instances = new WeakSet(), _SpoUserRemoveCommand_initTelem
77
128
  option: '-i, --id [id]'
78
129
  }, {
79
130
  option: '--loginName [loginName]'
131
+ }, {
132
+ option: '--email [email]'
133
+ }, {
134
+ option: '--userName [userName]'
135
+ }, {
136
+ option: '--entraGroupId [entraGroupId]'
137
+ }, {
138
+ option: '--entraGroupName [entraGroupName]'
80
139
  }, {
81
140
  option: '-f, --force'
82
141
  });
83
142
  }, _SpoUserRemoveCommand_initValidators = function _SpoUserRemoveCommand_initValidators() {
84
143
  this.validators.push(async (args) => {
85
- return validation.isValidSharePointUrl(args.options.webUrl);
144
+ const isValidSharePointUrl = validation.isValidSharePointUrl(args.options.webUrl);
145
+ if (isValidSharePointUrl !== true) {
146
+ return isValidSharePointUrl;
147
+ }
148
+ if (args.options.id && isNaN(parseInt(args.options.id))) {
149
+ return `Specified id ${args.options.id} is not a number`;
150
+ }
151
+ if (args.options.entraGroupId && !validation.isValidGuid(args.options.entraGroupId)) {
152
+ return `${args.options.entraId} is not a valid GUID.`;
153
+ }
154
+ if (args.options.userName && !validation.isValidUserPrincipalName(args.options.userName)) {
155
+ return `${args.options.userName} is not a valid userName.`;
156
+ }
157
+ if (args.options.email && !validation.isValidUserPrincipalName(args.options.email)) {
158
+ return `${args.options.email} is not a valid email.`;
159
+ }
160
+ return true;
86
161
  });
87
162
  }, _SpoUserRemoveCommand_initOptionSets = function _SpoUserRemoveCommand_initOptionSets() {
88
- this.optionSets.push({ options: ['id', 'loginName'] });
163
+ this.optionSets.push({
164
+ options: ['id', 'loginName', 'email', 'userName', 'entraGroupId', 'entraGroupName']
165
+ });
89
166
  };
90
167
  export default new SpoUserRemoveCommand();
91
168
  //# sourceMappingURL=user-remove.js.map
@@ -91,6 +91,7 @@ export default {
91
91
  FOLDER_MOVE: `${prefix} folder move`,
92
92
  FOLDER_REMOVE: `${prefix} folder remove`,
93
93
  FOLDER_RENAME: `${prefix} folder rename`,
94
+ FOLDER_SET: `${prefix} folder set`,
94
95
  FOLDER_RETENTIONLABEL_ENSURE: `${prefix} folder retentionlabel ensure`,
95
96
  FOLDER_RETENTIONLABEL_REMOVE: `${prefix} folder retentionlabel remove`,
96
97
  FOLDER_ROLEASSIGNMENT_REMOVE: `${prefix} folder roleassignment remove`,
@@ -78,7 +78,7 @@ class TeamsTabGetCommand extends GraphCommand {
78
78
  this.teamId = await this.getTeamId(args);
79
79
  this.channelId = await this.getChannelId(args);
80
80
  const tabId = await this.getTabId(args);
81
- const endpoint = `${this.resource}/v1.0/teams/${formatting.encodeQueryParameter(this.teamId)}/channels/${formatting.encodeQueryParameter(this.channelId)}/tabs/${formatting.encodeQueryParameter(tabId)}`;
81
+ const endpoint = `${this.resource}/v1.0/teams/${formatting.encodeQueryParameter(this.teamId)}/channels/${formatting.encodeQueryParameter(this.channelId)}/tabs/${formatting.encodeQueryParameter(tabId)}?$expand=teamsApp`;
82
82
  const requestOptions = {
83
83
  url: endpoint,
84
84
  headers: {
package/dist/utils/spo.js CHANGED
@@ -490,7 +490,7 @@ export const spo = {
490
490
  return result.CorporateCatalogUrl;
491
491
  },
492
492
  /**
493
- * Retrieves the Azure AD ID from a SP user.
493
+ * Retrieves the Microsoft Entra ID from a SP user.
494
494
  * @param webUrl Web url
495
495
  * @param id The Id of the user
496
496
  */
@@ -4,7 +4,7 @@ import TabItem from '@theme/TabItem';
4
4
 
5
5
  # app get
6
6
 
7
- Retrieves information about the current Azure AD app
7
+ Retrieves information about the current Microsoft Entra app
8
8
 
9
9
  ## Usage
10
10
 
@@ -16,26 +16,26 @@ m365 app get [options]
16
16
 
17
17
  ```md definition-list
18
18
  `--appId [appId]`
19
- : Client ID of the Azure AD app registered in the .m365rc.json file to retrieve information for.
19
+ : Client ID of the Microsoft Entra app registered in the .m365rc.json file to retrieve information for.
20
20
  ```
21
21
 
22
22
  <Global />
23
23
 
24
24
  ## Remarks
25
25
 
26
- Use this command to quickly look up information for the Azure AD application registration registered in the .m365rc.json file in your current project (folder).
26
+ Use this command to quickly look up information for the Microsoft Entra application registration registered in the .m365rc.json file in your current project (folder).
27
27
 
28
28
  If you have multiple apps registered in your .m365rc.json file, you can specify the app for which you'd like to retrieve permissions using the `--appId` option. If you don't specify the app using the `--appId` option, you'll be prompted to select one of the applications from your .m365rc.json file.
29
29
 
30
30
  ## Examples
31
31
 
32
- Retrieve information about your current Azure AD app.
32
+ Retrieve information about your current Microsoft Entra app.
33
33
 
34
34
  ```sh
35
35
  m365 app get
36
36
  ```
37
37
 
38
- Retrieve information about the Azure AD app with client ID specified in the _.m365rc.json_ file.
38
+ Retrieve information about the Microsoft Entra app with client ID specified in the _.m365rc.json_ file.
39
39
 
40
40
  ```sh
41
41
  m365 app get --appId e23d235c-fcdf-45d1-ac5f-24ab2ee0695d
@@ -54,7 +54,7 @@ m365 app get --appId e23d235c-fcdf-45d1-ac5f-24ab2ee0695d
54
54
  "applicationTemplateId": null,
55
55
  "disabledByMicrosoftStatus": null,
56
56
  "createdDateTime": "2022-10-28T21:20:57Z",
57
- "displayName": "My AAD app",
57
+ "displayName": "My Microsoft Entra app",
58
58
  "description": null,
59
59
  "groupMembershipClaims": null,
60
60
  "identifierUris": [],
@@ -167,7 +167,7 @@ m365 app get --appId e23d235c-fcdf-45d1-ac5f-24ab2ee0695d
167
167
  deletedDateTime : null
168
168
  description : null
169
169
  disabledByMicrosoftStatus : null
170
- displayName : My AAD app
170
+ displayName : My Microsoft Entra app
171
171
  groupMembershipClaims : null
172
172
  id : b3241f2a-6551-43d4-a72f-0d02ccfeb77f
173
173
  identifierUris : []
@@ -197,7 +197,7 @@ m365 app get --appId e23d235c-fcdf-45d1-ac5f-24ab2ee0695d
197
197
 
198
198
  ```csv
199
199
  id,deletedDateTime,appId,applicationTemplateId,disabledByMicrosoftStatus,createdDateTime,displayName,description,groupMembershipClaims,identifierUris,isDeviceOnlyAuthSupported,isFallbackPublicClient,notes,publisherDomain,serviceManagementReference,signInAudience,tags,tokenEncryptionKeyId,samlMetadataUrl,defaultRedirectUri,certification,optionalClaims,addIns,api,appRoles,info,keyCredentials,parentalControlSettings,passwordCredentials,publicClient,requiredResourceAccess,verifiedPublisher,web,spa
200
- b3241f2a-6551-43d4-a72f-0d02ccfeb77f,,02f9ff8c-b79e-4552-bdda-4facd74d6df1,,,2022-10-28T21:20:57Z,My AAD app,,,[],,,,contoso.onmicrosoft.com,,AzureADMyOrg,[],,,,,,[],"{""acceptMappedClaims"":null,""knownClientApplications"":[],""requestedAccessTokenVersion"":null,""oauth2PermissionScopes"":[],""preAuthorizedApplications"":[]}","[{""allowedMemberTypes"":[""User""],""description"":""Managers"",""displayName"":""Managers"",""id"":""d7c46856-8a66-485a-9047-098eba08b9a3"",""isEnabled"":true,""origin"":""Application"",""value"":""managers""}]","{""logoUrl"":null,""marketingUrl"":null,""privacyStatementUrl"":null,""supportUrl"":null,""termsOfServiceUrl"":null}",[],"{""countriesBlockedForMinors"":[],""legalAgeGroupRule"":""Allow""}",[],"{""redirectUris"":[]}","[{""resourceAppId"":""b55b276d-2b09-4ad2-8de5-f09cf24ffba9"",""resourceAccess"":[{""id"":""162b1576-a2b2-458d-b7b9-04481911b4ef"",""type"":""Role""}]},{""resourceAppId"":""00000005-0000-0ff1-ce00-000000000000"",""resourceAccess"":[{""id"":""8e5870bb-8808-44dc-8e10-c509ed919ddd"",""type"":""Scope""},{""id"":""5db81a03-0de0-432b-b31e-71d57c8d2e0b"",""type"":""Scope""}]}]","{""displayName"":null,""verifiedPublisherId"":null,""addedDateTime"":null}","{""homePageUrl"":null,""logoutUrl"":null,""redirectUris"":[],""implicitGrantSettings"":{""enableAccessTokenIssuance"":false,""enableIdTokenIssuance"":false},""redirectUriSettings"":[]}","{""redirectUris"":[]}"
200
+ b3241f2a-6551-43d4-a72f-0d02ccfeb77f,,02f9ff8c-b79e-4552-bdda-4facd74d6df1,,,2022-10-28T21:20:57Z,My Microsoft Entra app,,,[],,,,contoso.onmicrosoft.com,,AzureADMyOrg,[],,,,,,[],"{""acceptMappedClaims"":null,""knownClientApplications"":[],""requestedAccessTokenVersion"":null,""oauth2PermissionScopes"":[],""preAuthorizedApplications"":[]}","[{""allowedMemberTypes"":[""User""],""description"":""Managers"",""displayName"":""Managers"",""id"":""d7c46856-8a66-485a-9047-098eba08b9a3"",""isEnabled"":true,""origin"":""Application"",""value"":""managers""}]","{""logoUrl"":null,""marketingUrl"":null,""privacyStatementUrl"":null,""supportUrl"":null,""termsOfServiceUrl"":null}",[],"{""countriesBlockedForMinors"":[],""legalAgeGroupRule"":""Allow""}",[],"{""redirectUris"":[]}","[{""resourceAppId"":""b55b276d-2b09-4ad2-8de5-f09cf24ffba9"",""resourceAccess"":[{""id"":""162b1576-a2b2-458d-b7b9-04481911b4ef"",""type"":""Role""}]},{""resourceAppId"":""00000005-0000-0ff1-ce00-000000000000"",""resourceAccess"":[{""id"":""8e5870bb-8808-44dc-8e10-c509ed919ddd"",""type"":""Scope""},{""id"":""5db81a03-0de0-432b-b31e-71d57c8d2e0b"",""type"":""Scope""}]}]","{""displayName"":null,""verifiedPublisherId"":null,""addedDateTime"":null}","{""homePageUrl"":null,""logoutUrl"":null,""redirectUris"":[],""implicitGrantSettings"":{""enableAccessTokenIssuance"":false,""enableIdTokenIssuance"":false},""redirectUriSettings"":[]}","{""redirectUris"":[]}"
201
201
  ```
202
202
 
203
203
  </TabItem>
@@ -208,14 +208,14 @@ m365 app get --appId e23d235c-fcdf-45d1-ac5f-24ab2ee0695d
208
208
 
209
209
  Date: 5/29/2023
210
210
 
211
- ## My AAD app (b3241f2a-6551-43d4-a72f-0d02ccfeb77f)
211
+ ## My Microsoft Entra app (b3241f2a-6551-43d4-a72f-0d02ccfeb77f)
212
212
 
213
213
  Property | Value
214
214
  ---------|-------
215
215
  id | b3241f2a-6551-43d4-a72f-0d02ccfeb77f
216
216
  appId | 02f9ff8c-b79e-4552-bdda-4facd74d6df1
217
217
  createdDateTime | 2022-10-28T21:20:57Z
218
- displayName | My AAD app
218
+ displayName | My Microsoft Entra app
219
219
  publisherDomain | contoso.onmicrosoft.com
220
220
  signInAudience | AzureADMyOrg
221
221
  ```
@@ -4,7 +4,7 @@ import TabItem from '@theme/TabItem';
4
4
 
5
5
  # app open
6
6
 
7
- Returns deep link of the current AD app to open the Azure portal on the Azure AD app registration management page.
7
+ Opens Microsoft Entra app in the Microsoft Entra ID portal
8
8
 
9
9
  ## Usage
10
10
 
@@ -16,10 +16,10 @@ m365 app open [options]
16
16
 
17
17
  ```md definition-list
18
18
  `--appId [appId]`
19
- : Optional Application (client) ID of the Azure AD application registration to open. Uses the app from the `.m365rc.json` file corresponding to the `appId`. If multiple apps are available, this will evade the prompt to choose an app. If the `appId` is not available in the list of apps, an error is thrown.
19
+ : Optional Application (client) ID of the Microsoft Entra application registration to open. Uses the app from the `.m365rc.json` file corresponding to the `appId`. If multiple apps are available, this will evade the prompt to choose an app. If the `appId` is not available in the list of apps, an error is thrown.
20
20
 
21
21
  `--preview`
22
- : Use to open the url of the Azure AD preview portal.
22
+ : Use to open the url of the Microsoft Entra ID preview portal.
23
23
  ```
24
24
 
25
25
  <Global />
@@ -32,19 +32,19 @@ Gets the app from the `.m365rc.json` file in the current directory. If the `--ap
32
32
 
33
33
  ## Examples
34
34
 
35
- Prints the URL to the Azure AD application registration management page on the Azure Portal.
35
+ Prints the URL to the Microsoft Entra application registration management page on the Azure Portal.
36
36
 
37
37
  ```sh
38
38
  m365 app open
39
39
  ```
40
40
 
41
- Prints the url of the Azure AD application registration management page on the preview Azure Portal.
41
+ Prints the url of the Microsoft Entra application registration management page on the preview Azure Portal.
42
42
 
43
43
  ```sh
44
44
  m365 app open --preview
45
45
  ```
46
46
 
47
- Prints the URL to the Azure AD application registration management page on the Azure Portal, evading a possible choice prompt in the case of multiple saved apps in the `.m365rc.json` file.
47
+ Prints the URL to the Microsoft Entra application registration management page on the Azure Portal, evading a possible choice prompt in the case of multiple saved apps in the `.m365rc.json` file.
48
48
 
49
49
  ```sh
50
50
  m365 app open --appId d75be2e1-0204-4f95-857d-51a37cf40be8
@@ -2,7 +2,7 @@ import Global from '/docs/cmd/_global.mdx';
2
2
 
3
3
  # app permission add
4
4
 
5
- Adds the specified application and/or delegated permissions to the current AAD app API permissions
5
+ Adds the specified application and/or delegated permissions to the current Microsoft Entra app API permissions
6
6
 
7
7
  ## Usage
8
8
 
@@ -14,7 +14,7 @@ m365 app permission add [options]
14
14
 
15
15
  ```md definition-list
16
16
  `--appId [appId]`
17
- : Client ID of the Azure AD app registered in the .m365rc.json file to retrieve API permissions for.
17
+ : Client ID of the Microsoft Entra app registered in the .m365rc.json file to retrieve API permissions for.
18
18
 
19
19
  `--applicationPermission [applicationPermission]`
20
20
  : Space-separated list of application permissions to add.
@@ -4,7 +4,7 @@ import TabItem from '@theme/TabItem';
4
4
 
5
5
  # app permission list
6
6
 
7
- Lists API permissions for the current AAD app
7
+ Lists API permissions for the current Microsoft Entra app
8
8
 
9
9
  ## Usage
10
10
 
@@ -16,26 +16,26 @@ m365 app permission list [options]
16
16
 
17
17
  ```md definition-list
18
18
  `--appId [appId]`
19
- : Client ID of the Azure AD app registered in the .m365rc.json file to retrieve API permissions for.
19
+ : Client ID of the Microsoft Entra app registered in the .m365rc.json file to retrieve API permissions for.
20
20
  ```
21
21
 
22
22
  <Global />
23
23
 
24
24
  ## Remarks
25
25
 
26
- Use this command to quickly look up API permissions for the Azure AD application registration registered in the _.m365rc.json_ file in your current project (folder).
26
+ Use this command to quickly look up API permissions for the Microsoft Entra application registration registered in the _.m365rc.json_ file in your current project (folder).
27
27
 
28
28
  If you have multiple apps registered in your .m365rc.json file, you can specify the app for which you'd like to retrieve permissions using the `--appId` option. If you don't specify the app using the `--appId` option, you'll be prompted to select one of the applications from your _.m365rc.json_ file.
29
29
 
30
30
  ## Examples
31
31
 
32
- Retrieve API permissions for your current Azure AD app.
32
+ Retrieve API permissions for your current Microsoft Entra app.
33
33
 
34
34
  ```sh
35
35
  m365 app permission list
36
36
  ```
37
37
 
38
- Retrieve API permissions for the Azure AD app with the client ID specified in the _.m365rc.json_ file.
38
+ Retrieve API permissions for the Microsoft Entra app with the client ID specified in the _.m365rc.json_ file.
39
39
 
40
40
  ```sh
41
41
  m365 app permission list --appId e23d235c-fcdf-45d1-ac5f-24ab2ee0695d
@@ -4,7 +4,7 @@ import TabItem from '@theme/TabItem';
4
4
 
5
5
  # cli consent
6
6
 
7
- Consent additional permissions for the Azure AD application used by the CLI for Microsoft 365
7
+ Consent additional permissions for the Microsoft Entra application used by the CLI for Microsoft 365
8
8
 
9
9
  ## Usage
10
10
 
@@ -23,7 +23,7 @@ m365 cli consent [options]
23
23
 
24
24
  ## Remarks
25
25
 
26
- Using the `cli consent` command you can consent additional permissions for the Azure AD application used by the CLI for Microsoft 365. This is for example necessary to use Viva Engage commands, which require the Viva Engage API permission that isn't granted to the CLI by default.
26
+ Using the `cli consent` command you can consent additional permissions for the Microsoft Entra application used by the CLI for Microsoft 365. This is for example necessary to use Viva Engage commands, which require the Viva Engage API permission that isn't granted to the CLI by default.
27
27
 
28
28
  After executing the command, the CLI for Microsoft 365 will present you with a URL that you need to open in the web browser in order to consent the permissions for the selected Microsoft 365 service.
29
29
 
@@ -4,7 +4,7 @@ import TabItem from '@theme/TabItem';
4
4
 
5
5
  # cli reconsent
6
6
 
7
- Returns Azure AD URL to open in the browser to re-consent CLI for Microsoft 365 permissions
7
+ Returns URL to open in the browser to re-consent CLI for Microsoft 365 Microsoft Entra permissions
8
8
 
9
9
  ## Usage
10
10
 
@@ -30,28 +30,28 @@ m365 cli reconsent
30
30
  <TabItem value="JSON">
31
31
 
32
32
  ```json
33
- "To re-consent the PnP Microsoft 365 Management Shell Azure AD application navigate in your web browser to https://login.microsoftonline.com/common/oauth2/authorize?client_id=31359c7f-bd7e-475c-86db-fdb8c937548e&response_type=code&prompt=admin_consent"
33
+ "To re-consent the PnP Microsoft 365 Management Shell Microsoft Entra application navigate in your web browser to https://login.microsoftonline.com/common/oauth2/authorize?client_id=31359c7f-bd7e-475c-86db-fdb8c937548e&response_type=code&prompt=admin_consent"
34
34
  ```
35
35
 
36
36
  </TabItem>
37
37
  <TabItem value="Text">
38
38
 
39
39
  ```text
40
- To re-consent the PnP Microsoft 365 Management Shell Azure AD application navigate in your web browser to https://login.microsoftonline.com/common/oauth2/authorize?client_id=31359c7f-bd7e-475c-86db-fdb8c937548e&response_type=code&prompt=admin_consent
40
+ To re-consent the PnP Microsoft 365 Management Shell Microsoft Entra application navigate in your web browser to https://login.microsoftonline.com/common/oauth2/authorize?client_id=31359c7f-bd7e-475c-86db-fdb8c937548e&response_type=code&prompt=admin_consent
41
41
  ```
42
42
 
43
43
  </TabItem>
44
44
  <TabItem value="CSV">
45
45
 
46
46
  ```csv
47
- To re-consent the PnP Microsoft 365 Management Shell Azure AD application navigate in your web browser to https://login.microsoftonline.com/common/oauth2/authorize?client_id=31359c7f-bd7e-475c-86db-fdb8c937548e&response_type=code&prompt=admin_consent
47
+ To re-consent the PnP Microsoft 365 Management Shell Microsoft Entra application navigate in your web browser to https://login.microsoftonline.com/common/oauth2/authorize?client_id=31359c7f-bd7e-475c-86db-fdb8c937548e&response_type=code&prompt=admin_consent
48
48
  ```
49
49
 
50
50
  </TabItem>
51
51
  <TabItem value="Markdown">
52
52
 
53
53
  ```md
54
- To re-consent the PnP Microsoft 365 Management Shell Azure AD application navigate in your web browser to https://login.microsoftonline.com/common/oauth2/authorize?client_id=31359c7f-bd7e-475c-86db-fdb8c937548e&response_type=code&prompt=admin_consent
54
+ To re-consent the PnP Microsoft 365 Management Shell Microsoft Entra application navigate in your web browser to https://login.microsoftonline.com/common/oauth2/authorize?client_id=31359c7f-bd7e-475c-86db-fdb8c937548e&response_type=code&prompt=admin_consent
55
55
  ```
56
56
 
57
57
  </TabItem>
@@ -59,4 +59,4 @@ m365 cli reconsent
59
59
 
60
60
  ## More information
61
61
 
62
- - Re-consent the PnP Microsoft 365 Management Shell Azure AD application: [https://pnp.github.io/cli-microsoft365/user-guide/connecting-office-365/#re-consent-the-pnp-office-365-management-shell-azure-ad-application](https://pnp.github.io/cli-microsoft365/user-guide/connecting-office-365/#re-consent-the-pnp-office-365-management-shell-azure-ad-application)
62
+ - Re-consent the PnP Microsoft 365 Management Shell Microsoft Entra application: [https://pnp.github.io/cli-microsoft365/user-guide/connecting-microsoft-365/#re-consent-the-pnp-microsoft-365-management-shell-azure-ad-application](https://pnp.github.io/cli-microsoft365/user-guide/connecting-microsoft-365/#re-consent-the-pnp-microsoft-365-management-shell-azure-ad-application)
@@ -4,7 +4,7 @@ import TabItem from '@theme/TabItem';
4
4
 
5
5
  # entra app permission add
6
6
 
7
- Adds the specified application and/or delegated permissions to a specified Entra (Azure AD) app
7
+ Adds the specified application and/or delegated permissions to a Microsoft Entra app
8
8
 
9
9
  ## Usage
10
10
 
@@ -23,10 +23,10 @@ m365 entra appregistration permission add [options]
23
23
 
24
24
  ```md definition-list
25
25
  `-i, --appId [appId]`
26
- : Client ID of the Entra (Azure AD) app to add the API permissions to. Specify `appId` or `appObjectId` but not both.
26
+ : Client ID of the Microsoft Entra app to add the API permissions to. Specify `appId` or `appObjectId` but not both.
27
27
 
28
28
  `--appObjectId [appObjectId]`
29
- : Object ID of the Entra (Azure AD) app to add the API permissions to. Specify `appId` or `appObjectId` but not both.
29
+ : Object ID of the Microsoft Entra app to add the API permissions to. Specify `appId` or `appObjectId` but not both.
30
30
 
31
31
  `-a, --applicationPermissions [applicationPermissions]`
32
32
  : Space-separated list of application permissions to add. Specify at least `applicationPermissions` or `delegatedPermissions`.
@@ -46,19 +46,19 @@ Scopes/Roles to grant must be fully-qualified so that we can disambiguate them b
46
46
 
47
47
  ## Examples
48
48
 
49
- Grant multiple delegated API permissions to an Entra (Azure AD) app specified by client id
49
+ Grant multiple delegated API permissions to a Microsoft Entra app specified by client id.
50
50
 
51
51
  ```sh
52
52
  m365 entra app permission add --appId 'f1417aa3-bf0b-4cc5-a845-a0b2cf11f690' --delegatedPermissions 'https://management.azure.com/user_impersonation https://service.flow.microsoft.com/Flows.Read.All https://graph.microsoft.com/Agreement.Read.All'
53
53
  ```
54
54
 
55
- Grant multiple delegated API permissions to an Entra (Azure AD) app specified by object id
55
+ Grant multiple delegated API permissions to a Microsoft Entra app specified by object id.
56
56
 
57
57
  ```sh
58
58
  m365 entra app permission add --appObjectId 'e0306bb2-bf0b-4cc5-a845-a0b2cf11f690' --delegatedPermissions 'https://management.azure.com/user_impersonation https://service.flow.microsoft.com/Flows.Read.All https://graph.microsoft.com/Agreement.Read.All'
59
59
  ```
60
60
 
61
- Grant multiple app-only permissions to an Entra (Azure AD) app specified by client id and grant admin consent
61
+ Grant multiple app-only permissions to a Microsoft Entra app specified by client id and grant admin consent.
62
62
 
63
63
  ```sh
64
64
  m365 entra app permission add --appId 'f1417aa3-bf0b-4cc5-a845-a0b2cf11f690' --applicationPermissions 'https://graph.microsoft.com/Sites.FullControl.All https://microsoft.sharepoint-df.com/Sites.FullControl.All' --grantAdminConsent
@@ -4,7 +4,7 @@ import TabItem from '@theme/TabItem';
4
4
 
5
5
  # entra approleassignment add
6
6
 
7
- Adds service principal permissions also known as scopes and app role assignments for specified Entra application registration
7
+ Adds service principal permissions also known as scopes and app role assignments for specified Microsoft Entra application registration
8
8
 
9
9
  ## Usage
10
10
 
@@ -57,10 +57,6 @@ List app roles assigned to service principal with ObjectId _b2307a39-e878-458b-b
57
57
  m365 entra approleassignment list --appObjectId b2307a39-e878-458b-bc90-03bc578531dd
58
58
  ```
59
59
 
60
- ## More information
61
-
62
- - Application and service principal objects in Entra ID (Azure AD): [https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects](https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects)
63
-
64
60
  ## Response
65
61
 
66
62
  <Tabs>
@@ -117,3 +113,7 @@ m365 entra approleassignment list --appObjectId b2307a39-e878-458b-bc90-03bc5785
117
113
 
118
114
  </TabItem>
119
115
  </Tabs>
116
+
117
+ ## More information
118
+
119
+ - Application and service principal objects in Microsoft Entra ID: [https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects](https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects)
@@ -196,5 +196,5 @@ m365 entra enterpriseapp add --objectId b2307a39-e878-458b-bc90-03bc578531d6
196
196
 
197
197
  ## More information
198
198
 
199
- - Application and enterprise application objects in Entra ID (Azure AD): [https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects](https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects)
199
+ - Application and service principal objects in Microsoft Entra ID: [https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects](https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects)
200
200
  - Create servicePrincipal: [https://learn.microsoft.com/graph/api/serviceprincipal-post-serviceprincipals?view=graph-rest-1.0](https://learn.microsoft.com/graph/api/serviceprincipal-post-serviceprincipals?view=graph-rest-1.0)
@@ -224,5 +224,5 @@ m365 entra enterpriseapp get --appObjectId b2307a39-e878-458b-bc90-03bc578531dd
224
224
 
225
225
  ## More information
226
226
 
227
- - Application and enterprise application objects in Entra ID (Azure AD): [https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects](https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects)
227
+ - Application and service principal objects in Microsoft Entra ID: [https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects](https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects)
228
228
  - Get servicePrincipal: [https://learn.microsoft.com/graph/api/serviceprincipal-get?view=graph-rest-1.0](https://learn.microsoft.com/graph/api/serviceprincipal-get?view=graph-rest-1.0)
@@ -14,13 +14,13 @@ m365 entra group user add [options]
14
14
 
15
15
  ```md definition-list
16
16
  `-i, --groupId [groupId]`
17
- : The ID of the Entra ID group. Specify `groupId` or `groupDisplayName` but not both.
17
+ : The ID of the Microsoft Entra group. Specify `groupId` or `groupDisplayName` but not both.
18
18
 
19
19
  `-n, --groupDisplayName [groupDisplayName]`
20
- : The display name of the Entra ID group. Specify `groupId` or `groupDisplayName` but not both.
20
+ : The display name of the Microsoft Entra group. Specify `groupId` or `groupDisplayName` but not both.
21
21
 
22
22
  `--ids [ids]`
23
- : Entra ID IDs of users. You can also pass a comma-separated list of IDs. Specify either `ids` or `userNames` but not both.
23
+ : Microsoft Entra IDs of users. You can also pass a comma-separated list of IDs. Specify either `ids` or `userNames` but not both.
24
24
 
25
25
  `--userNames [userNames]`
26
26
  : The user principal names of users. You can also pass a comma-separated list of UPNs. Specify either `ids` or `userNames` but not both.
@@ -33,25 +33,25 @@ m365 entra group user add [options]
33
33
 
34
34
  ## Examples
35
35
 
36
- Add a single user specified by ID as a member to a group specified by display name
36
+ Add a single user specified by ID as a member to a group specified by display name.
37
37
 
38
38
  ```sh
39
39
  m365 entra group user add --groupDisplayName Developers --ids 098b9f52-f48c-4401-819f-29c33794c3f5 --role Member
40
40
  ```
41
41
 
42
- Add multiple users specified by ID as members to a group specified by ID
42
+ Add multiple users specified by ID as members to a group specified by ID.
43
43
 
44
44
  ```sh
45
45
  m365 entra group user add --groupId a03c0c35-ef9a-419b-8cab-f89e0a8d2d2a --ids "098b9f52-f48c-4401-819f-29c33794c3f5,f1e06e31-3abf-4746-83c2-1513d71f38b8" --role Member
46
46
  ```
47
47
 
48
- Add a single user specified by UPN as an owner to a group specified by display name
48
+ Add a single user specified by UPN as an owner to a group specified by display name.
49
49
 
50
50
  ```sh
51
51
  m365 entra group user add --groupDisplayName Developers --userNames john.doe@contoso.com --role Owner
52
52
  ```
53
53
 
54
- Adds multiple users specified by UPN as owners to a group specified by ID
54
+ Adds multiple users specified by UPN as owners to a group specified by ID.
55
55
 
56
56
  ```sh
57
57
  m365 entra group user add --groupId a03c0c35-ef9a-419b-8cab-f89e0a8d2d2a --userNames "john.doe@contoso.com,adele.vance@contoso.com" --role Owner
@@ -61,4 +61,4 @@ The command won't return a response on success.
61
61
 
62
62
  ## More information
63
63
 
64
- - Application and service principal objects in Entra ID (Azure AD): [https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects](https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects)
64
+ - Application and service principal objects in Microsoft Entra ID: [https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects](https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects)
@@ -100,5 +100,5 @@ m365 entra oauth2grant list --spObjectId b2307a39-e878-458b-bc90-03bc578531d6
100
100
 
101
101
  ## More information
102
102
 
103
- - Application and service principal objects in Entra ID (Azure AD): [https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects](https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects)
103
+ - Application and service principal objects in Microsoft Entra ID: [https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects](https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects)
104
104
  - List oauth2PermissionGrants: [https://learn.microsoft.com/graph/api/oauth2permissiongrant-list?view=graph-rest-1.0](https://learn.microsoft.com/graph/api/oauth2permissiongrant-list?view=graph-rest-1.0)
@@ -58,5 +58,5 @@ The command won't return a response on success.
58
58
 
59
59
  ## More information
60
60
 
61
- - Application and service principal objects in Entra ID (Azure AD): [https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects](https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects)
61
+ - Application and service principal objects in Microsoft Entra ID: [https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects](https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects)
62
62
  - Delete a delegated permission grant (oAuth2PermissionGrant): [https://learn.microsoft.com/graph/api/oauth2permissiongrant-delete?view=graph-rest-1.0](https://learn.microsoft.com/graph/api/oauth2permissiongrant-delete?view=graph-rest-1.0)
@@ -52,5 +52,5 @@ The command won't return a response on success.
52
52
 
53
53
  ## More information
54
54
 
55
- - Application and service principal objects in Entra ID (Azure AD): [https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects](https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects)
55
+ - Application and service principal objects in Microsoft Entra ID: [https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects](https://learn.microsoft.com/azure/active-directory/develop/active-directory-application-objects)
56
56
  - Update a delegated permission grant (oAuth2PermissionGrant): [https://learn.microsoft.com/graph/api/oauth2permissiongrant-update?view=graph-rest-1.0](https://learn.microsoft.com/graph/api/oauth2permissiongrant-update?view=graph-rest-1.0)