Skip to content

Commit 9de0c58

Browse files
committed
Incorp tech feedback
1 parent 11eed93 commit 9de0c58

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

powerapps-docs/developer/data-platform/webapi/aad-group-team.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Citizen developers wanting to programmatically create a Microsoft Dataverse AAD
3535
**Request**
3636

3737
```http
38-
POST [Organization URI]/api/data/v9.1/teams
38+
POST [Organization URI]/api/data/v9.0/teams
3939
Accept: application/json
4040
4141
{
@@ -57,11 +57,11 @@ An administrator can assign a security role to an AAD group team after the AAD g
5757
**Request**
5858

5959
```http
60-
POST [Organization URI]/api/data/v9.1/teams(azureactivedirectoryobjectid=<group team ID>,membershiptype=0)/teamroles_association/$ref
60+
POST [Organization URI]/api/data/v9.0/teams(azureactivedirectoryobjectid=<group team ID>,membershiptype=0)/teamroles_association/$ref
6161
Accept: application/json
6262
6363
{
64-
"@odata.id":"[Organization URI]/api/data/v9.1/roles(<role ID>)"
64+
"@odata.id":"[Organization URI]/api/data/v9.0/roles(<role ID>)"
6565
}
6666
```
6767

@@ -72,11 +72,11 @@ An administrator can assign a security role to an AAD group user. The user is a
7272
**Request**
7373

7474
```http
75-
POST [Organization URI]/api/data/v9.1/teams(azureactivedirectoryobjectid=<user object ID>,membershiptype=0)/teamroles_association/$ref
75+
POST [Organization URI]/api/data/v9.0/systemusers(azureactivedirectoryobjectid=<user object ID>)/systemuserroles_association/$ref
7676
Accept: application/json
7777
7878
{
79-
"@odata.id":"[Organization URI]/api/data/v9.1/roles(<role ID>)"
79+
"@odata.id":"[Organization URI]/api/data/v9.0/roles(<role ID>)"
8080
}
8181
```
8282

@@ -89,11 +89,11 @@ The example below shows the syntax for assigning an account record.
8989
**Request**
9090

9191
```http
92-
PATCH [Organization URI]/api/data/v9.1/accounts(<account ID>)
92+
PATCH [Organization URI]/api/data/v9.0/accounts(<account ID>)
9393
Accept: application/json
9494
9595
{
96-
"[email protected]": "[Organization URI]/api/data/v9.2/systemusers(azureactivedirectoryobjectid=<user object ID>)"
96+
"[email protected]": "[Organization URI]/api/data/v9.0/systemusers(azureactivedirectoryobjectid=<user object ID>)"
9797
}
9898
```
9999

@@ -106,7 +106,7 @@ The example below shows the syntax for sharing an account record.
106106
**Request**
107107

108108
```http
109-
POST [Organization URI]/api/data/v9.1/GrantAccess
109+
POST [Organization URI]/api/data/v9.0/GrantAccess
110110
Accept: application/json
111111
112112
{
@@ -116,7 +116,7 @@ Accept: application/json
116116
},
117117
"PrincipalAccess":{
118118
"Principal":{
119-
"@odata.id":"[Organization URI]/api/data/v9.1/systemusers(azureactivedirectoryobjectid=<user object ID>)"
119+
"@odata.id":"[Organization URI]/api/data/v9.0/systemusers(azureactivedirectoryobjectid=<user object ID>)"
120120
},
121121
"AccessMask":"ReadAccess"
122122
}
@@ -130,14 +130,14 @@ Members of an AAD group can query all the security roles that are directly and i
130130
**Request**
131131

132132
```http
133-
GET [Organization URI]/api/data/v9.1/RetrieveAadUserRoles(DirectoryObjectId=<user object ID)?$select=_parentrootroleid_value,name
133+
GET [Organization URI]/api/data/v9.0/RetrieveAadUserRoles(DirectoryObjectId=<user object ID)?$select=_parentrootroleid_value,name
134134
```
135135

136136
**Response**
137137

138138
```json
139139
{
140-
"@odata.context": "https://contoso.crm2.dynamics.com/api/data/v9.1/$metadata#roles",
140+
"@odata.context": "https://contoso.crm2.dynamics.com/api/data/v9.0/$metadata#roles",
141141
"value": [
142142
{
143143
"@odata.etag": "W/\"1649865\"",
@@ -158,14 +158,14 @@ Members of an AAD group can check their security privileges without being a user
158158
**Request**
159159

160160
```http
161-
GET [Organization URI]/api/data/v9.1/RetrieveAadUserPrivileges(DirectoryObjectId=<user object ID>)
161+
GET [Organization URI]/api/data/v9.0/RetrieveAadUserPrivileges(DirectoryObjectId=<user object ID>)
162162
```
163163

164164
**Response**
165165

166166
```json
167167
{
168-
"@odata.context": "https://contoso.crm2.dynamics.com/api/data/v9.1/$metadata#Microsoft.Dynamics.CRM.RetrieveAadUserPrivilegesResponse",
168+
"@odata.context": "https://contoso.crm2.dynamics.com/api/data/v9.0/$metadata#Microsoft.Dynamics.CRM.RetrieveAadUserPrivilegesResponse",
169169
"RolePrivileges": [
170170
{
171171
"Depth": "Global",

0 commit comments

Comments
 (0)