@@ -35,7 +35,7 @@ Citizen developers wanting to programmatically create a Microsoft Dataverse AAD
35
35
** Request**
36
36
37
37
``` http
38
- POST [Organization URI]/api/data/v9.1 /teams
38
+ POST [Organization URI]/api/data/v9.0 /teams
39
39
Accept: application/json
40
40
41
41
{
@@ -57,11 +57,11 @@ An administrator can assign a security role to an AAD group team after the AAD g
57
57
** Request**
58
58
59
59
``` http
60
- POST [Organization URI]/api/data/v9.1 /teams(azureactivedirectoryobjectid=<group team ID>,membershiptype=0)/teamroles_association/$ref
60
+ POST [Organization URI]/api/data/v9.0 /teams(azureactivedirectoryobjectid=<group team ID>,membershiptype=0)/teamroles_association/$ref
61
61
Accept: application/json
62
62
63
63
{
64
- "@odata.id":"[Organization URI]/api/data/v9.1 /roles(<role ID>)"
64
+ "@odata.id":"[Organization URI]/api/data/v9.0 /roles(<role ID>)"
65
65
}
66
66
```
67
67
@@ -72,11 +72,11 @@ An administrator can assign a security role to an AAD group user. The user is a
72
72
** Request**
73
73
74
74
``` http
75
- POST [Organization URI]/api/data/v9.1/teams (azureactivedirectoryobjectid=<user object ID>,membershiptype=0)/teamroles_association /$ref
75
+ POST [Organization URI]/api/data/v9.0/systemusers (azureactivedirectoryobjectid=<user object ID>)/systemuserroles_association /$ref
76
76
Accept: application/json
77
77
78
78
{
79
- "@odata.id":"[Organization URI]/api/data/v9.1 /roles(<role ID>)"
79
+ "@odata.id":"[Organization URI]/api/data/v9.0 /roles(<role ID>)"
80
80
}
81
81
```
82
82
@@ -89,11 +89,11 @@ The example below shows the syntax for assigning an account record.
89
89
** Request**
90
90
91
91
``` http
92
- PATCH [Organization URI]/api/data/v9.1 /accounts(<account ID>)
92
+ PATCH [Organization URI]/api/data/v9.0 /accounts(<account ID>)
93
93
Accept: application/json
94
94
95
95
{
96
- "[email protected] ": "[Organization URI]/api/data/v9.2 /systemusers(azureactivedirectoryobjectid=<user object ID>)"
96
+ "[email protected] ": "[Organization URI]/api/data/v9.0 /systemusers(azureactivedirectoryobjectid=<user object ID>)"
97
97
}
98
98
```
99
99
@@ -106,7 +106,7 @@ The example below shows the syntax for sharing an account record.
106
106
** Request**
107
107
108
108
``` http
109
- POST [Organization URI]/api/data/v9.1 /GrantAccess
109
+ POST [Organization URI]/api/data/v9.0 /GrantAccess
110
110
Accept: application/json
111
111
112
112
{
@@ -116,7 +116,7 @@ Accept: application/json
116
116
},
117
117
"PrincipalAccess":{
118
118
"Principal":{
119
- "@odata.id":"[Organization URI]/api/data/v9.1 /systemusers(azureactivedirectoryobjectid=<user object ID>)"
119
+ "@odata.id":"[Organization URI]/api/data/v9.0 /systemusers(azureactivedirectoryobjectid=<user object ID>)"
120
120
},
121
121
"AccessMask":"ReadAccess"
122
122
}
@@ -130,14 +130,14 @@ Members of an AAD group can query all the security roles that are directly and i
130
130
** Request**
131
131
132
132
``` http
133
- GET [Organization URI]/api/data/v9.1 /RetrieveAadUserRoles(DirectoryObjectId=<user object ID)?$select=_parentrootroleid_value,name
133
+ GET [Organization URI]/api/data/v9.0 /RetrieveAadUserRoles(DirectoryObjectId=<user object ID)?$select=_parentrootroleid_value,name
134
134
```
135
135
136
136
** Response**
137
137
138
138
``` json
139
139
{
140
- "@odata.context" : " https://contoso.crm2.dynamics.com/api/data/v9.1 /$metadata#roles" ,
140
+ "@odata.context" : " https://contoso.crm2.dynamics.com/api/data/v9.0 /$metadata#roles" ,
141
141
"value" : [
142
142
{
143
143
"@odata.etag" : " W/\" 1649865\" " ,
@@ -158,14 +158,14 @@ Members of an AAD group can check their security privileges without being a user
158
158
** Request**
159
159
160
160
``` http
161
- GET [Organization URI]/api/data/v9.1 /RetrieveAadUserPrivileges(DirectoryObjectId=<user object ID>)
161
+ GET [Organization URI]/api/data/v9.0 /RetrieveAadUserPrivileges(DirectoryObjectId=<user object ID>)
162
162
```
163
163
164
164
** Response**
165
165
166
166
``` json
167
167
{
168
- "@odata.context" : " https://contoso.crm2.dynamics.com/api/data/v9.1 /$metadata#Microsoft.Dynamics.CRM.RetrieveAadUserPrivilegesResponse" ,
168
+ "@odata.context" : " https://contoso.crm2.dynamics.com/api/data/v9.0 /$metadata#Microsoft.Dynamics.CRM.RetrieveAadUserPrivilegesResponse" ,
169
169
"RolePrivileges" : [
170
170
{
171
171
"Depth" : " Global" ,
0 commit comments