Skip to content

Commit 670314d

Browse files
authored
Merge pull request #646 from MicrosoftDocs/main
Changes from main to live
2 parents 172dea6 + aac8d53 commit 670314d

File tree

8,008 files changed

+37882
-12296
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

8,008 files changed

+37882
-12296
lines changed

.openpublishing.redirection.json

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,22 @@
22
"redirections": [
33
{
44
"source_path": "microsoftgraph/graph-powershell-1.0/Microsoft.Graph.Calendar/Get-MgPlace.md",
5-
"redirect_url": "https://learn.microsoft.com/en-us/powershell/microsoftgraph/?view=graph-powershell-1.0",
5+
"redirect_url": "https://learn.microsoft.com//powershell/microsoftgraph/",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "microsoftgraph/docs-conceptual/tutorial-grant-delegated-api-permissions.md",
10+
"redirect_url": "https://learn.microsoft.com/powershell/microsoftgraph/how-to-grant-revoke-api-permissions&pivots=grant-delegated-permissions",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "microsoftgraph/docs-conceptual/tutorial-grant-app-only-api-permissions.md",
15+
"redirect_url": "https://learn.microsoft.com/powershell/microsoftgraph/how-to-grant-revoke-api-permissions&pivots=grant-application-permissions",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "microsoftgraph/docs-conceptual/tutorial-pim.md",
20+
"redirect_url": "https://learn.microsoft.com/powershell/microsoftgraph/how-to-assign-microsoft-entra-roles-in-pim",
621
"redirect_document_id": false
722
}
823
]

azure-pipelines/powershell-docs.yml

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ variables:
3232
extends:
3333
template: v1/1ES.Official.PipelineTemplate.yml@1ESPipelineTemplates
3434
parameters:
35-
pool:
35+
pool:
3636
name: Azure-Pipelines-1ESPT-ExDShared
3737
image: windows-2022
3838
os: windows
@@ -108,13 +108,21 @@ extends:
108108
targetType: 'filePath'
109109
pwsh: true
110110
filePath: scripts/MsSubserviceUpdate.ps1
111+
- task: PowerShell@2
112+
displayName: 'Generate permissions table'
113+
continueOnError: false
114+
inputs:
115+
targetType: 'filePath'
116+
pwsh: true
117+
filePath: scripts/GeneratePermissionsTable.ps1
111118
- task: PowerShell@2
112119
displayName: 'Update Links'
113120
continueOnError: false
114121
inputs:
115122
targetType: 'filePath'
116123
pwsh: true
117124
filePath: scripts/UpdateLinks.ps1
125+
errorActionPreference: 'stop'
118126
- task: PowerShell@2
119127
displayName: 'Repair Examples and Descriptions and Title'
120128
continueOnError: false

microsoftgraph/docs-conceptual/find-mg-graph-command.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Using Find-MgGraphCommand cmdlet"
33
description: "Learn how to use the Find-MgGraphCommand to aid in discoverability of cmdlets."
44

55
ms.topic: how-to
6-
ms.date: 01/15/2024
6+
ms.date: 01/22/2025
77
author: msewaweru
88
manager: CelesteDG
99
ms.author: eunicewaweru
@@ -14,17 +14,17 @@ reviewer: maisarissi
1414

1515
# Using Find-MgGraphCommand cmdlet
1616

17-
Find-MgGraphCommand aims to make it easier for you to discover which API path a command calls, by providing a URI or a command name.
17+
`Find-MgGraphCommand` aims to make it easier for you to discover which API path a command calls, by providing a URI or a command name.
1818

19-
The Find-MgGraphCommand allows to:
19+
The `Find-MgGraphCommand` cmdlet allows you to:
2020

2121
- Pass a Microsoft Graph URL (relative and absolute) and get an equivalent Microsoft Graph PowerShell command.
2222
- Pass a command and get the URL it calls.
2323
- Pass a command or URI wildcard (.*) to find all commands that match it.
2424

2525
The output of this cmdlet also includes the permissions required to authenticate the specified cmdlet. For more information on cmdlet permissions, see [Using Find-MgGraphPermission](find-mg-graph-permission.md). Not all cmdlets have the permissions available on running this command. This is an ongoing feature, and permissions will continue to be added.
2626

27-
The permissions displayed don't show the privilege levels. To learn more, including how to choose permissions, permission type and what is the most privileged/least privileged permission, use the corresponding API page doc.
27+
The permissions displayed don't show the privilege levels. To learn more, including how to choose permissions, permission type, and what is the most privileged/least privileged permission, use the corresponding API page doc.
2828

2929
## Find Microsoft Graph PowerShell commands by URI
3030

@@ -62,8 +62,8 @@ Update-MgUser Users PATCH /users/{user-id} {DeviceManageme
6262
```
6363

6464
>[!Note]
65-
>1. For **-ApiVersion** parameter, there are two possible values: `v1.0` and `Beta`.
66-
>1. The **-Method** parameter is only available when using URI to find commands and allows the HTTPs methods such as GET, POST, PUT, PATCH and DELETE.
65+
>1. For **-ApiVersion** parameter, there are two possible values: `v1.0` and `beta`.
66+
>1. The **-Method** parameter is only available when using URI to find commands and allows the HTTPs methods such as GET, POST, PUT, PATCH, and DELETE.
6767
>1. The output shown in this article has been shortened for readability.
6868
6969
## Find Microsoft Graph PowerShell commands by command name
@@ -172,3 +172,7 @@ Get-MgUserActivity CrossDeviceExperiences GET /users
172172
Get-MgUserActivity CrossDeviceExperiences GET /users/{user-id}/activities
173173
Get-MgUserActivityHistoryItem CrossDeviceExperiences GET /users/{user-id}/activities/{userActivity-id}/historyItems/{activityHistoryItem-id}
174174
```
175+
176+
## See also
177+
178+
- [Using Find-MgGraphPermission cmdlet](find-mg-graph-permission.md)

microsoftgraph/docs-conceptual/find-mg-graph-permission.md

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Using Find-MgGraphPermission cmdlet"
33
description: "Learn how to use the Find-MgGraphPermission to discover permissions related to a ___domain."
44

55
ms.topic: how-to
6-
ms.date: 01/31/2024
6+
ms.date: 01/22/2025
77
author: msewaweru
88
manager: CelesteDG
99
ms.author: eunicewaweru
@@ -14,12 +14,13 @@ reviewer: maisarissi
1414

1515
# Using Find-MgGraphPermission cmdlet
1616

17-
The Microsoft Graph PowerShell SDK application requires users to have ___domain knowledge of both the semantics and syntax of Microsoft Graph API permissions used to authorize access to the API. This cmdlet helps to answer the following questions:
17+
The Microsoft Graph PowerShell SDK application requires users to have ___domain knowledge of both the semantics and syntax of Microsoft Graph API permissions used to authorize access to the API. The `Find-MgGraphPermission` cmdlet helps to answer the following questions:
1818

19-
- How do I find the values to supply to the permission-related parameters of commands like New-MgApplication and other application and consent related commands?
20-
- What permissions are applicable to a certain ___domain, for example, application, directory? To use Microsoft Graph PowerShell SDK to access Microsoft Graph, users must sign in to a Microsoft Entra application using the `Connect-MgGraph` command. Use the [Find-MgGraphCommand](find-mg-graph-command.md) to find which permissions to use for a specific cmdlet or API.
19+
- How do I find the values to supply to the permission-related parameters of commands like `New-MgApplication` and other application and consent related commands?
20+
- What permissions are applicable to a certain ___domain? For example, application.
21+
To use Microsoft Graph PowerShell to access Microsoft Graph, users must sign in to a Microsoft Entra application using the `Connect-MgGraph` command. Use the [Find-MgGraphCommand](find-mg-graph-command.md) to find which permissions to use for a specific cmdlet or API.
2122

22-
Currently, PowerShell commands and scripts have no way of validating user input that refers to permissions or providing an auto-complete user experience to help users accurately supply input to commands. This also affects commands or scripts implemented with the Microsoft Graph PowerShell SDK itself.
23+
Currently, PowerShell commands and scripts have no way of validating user input that refers to permissions or providing an *auto-complete* user experience to help users accurately supply input to commands. This also affects commands or scripts implemented with the Microsoft Graph PowerShell SDK itself.
2324

2425
## Find permissions related to a given ___domain
2526

@@ -72,3 +73,7 @@ Consent : Admin
7273
Name : Application.Read.All
7374
Description : Allows the app to read all applications and service principals without a signed-in user.
7475
```
76+
77+
## See also
78+
79+
- [Using Find-MgGraphCommand cmdlet](find-mg-graph-command.md)

microsoftgraph/docs-conceptual/tutorial-pim.md renamed to microsoftgraph/docs-conceptual/how-to-assign-microsoft-entra-roles-in-pim.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: "Assign Microsoft Entra roles in Privileged Identity Management using Microsoft Graph PowerShell"
33
description: "Learn how to create eligible and active role assignments in Microsoft Entra Privileged Identity Management using Microsoft Graph PowerShell"
44

5-
ms.topic: tutorial
6-
ms.date: 01/31/2024
5+
ms.topic: how-to
6+
ms.date: 01/28/2025
77
author: msewaweru
88
manager: CelesteDG
99
ms.author: eunicewaweru
@@ -12,21 +12,21 @@ ms.reviewer: mandardalvi
1212
#customer intent: As an IT administrator using Microsoft Entra ID, I want to assign and manage admin roles in Privileged Identity Management using Microsoft Graph PowerShell, so that I can control and monitor access to privileged roles in my organization.
1313
---
1414

15-
# Tutorial: Assign Microsoft Entra roles in Privileged Identity Management using Microsoft Graph PowerShell
15+
# Assign Microsoft Entra roles in Privileged Identity Management using Microsoft Graph PowerShell
1616

1717
The Microsoft Entra Privileged Identity Management (PIM) service allows role administrators to make time-bound admin role assignments. Additionally, privileged role administrators can make users eligible for Microsoft Entra admin roles. An eligible administrator can activate the role when they need the role, and the permissions expire once the eligible administrator is done.
1818

19-
In this tutorial, you'll create, extend, activate, deactivate, and remove eligible role assignments.
19+
In this article, you create, extend, activate, deactivate, and remove eligible role assignments.
2020

2121
## Prerequisites
2222

23-
To successfully complete this tutorial, make sure you have the required prerequisites:
23+
To successfully complete this guide, make sure you have the required prerequisites:
2424

2525
1. Microsoft Graph PowerShell SDK is installed. Follow the [Install the Microsoft Graph PowerShell SDK](installation.md) guide to install the SDK.
2626
1. To use the Microsoft Entra Privileged Identity Management, you must have one of the following licenses:
2727
- Microsoft Entra ID P2
2828
- Enterprise Mobility + Security (EMS) E5 license
29-
1. Microsoft Graph PowerShell using a Privileged Role Administrator role and the appropriate permissions. For this tutorial, the `RoleManagement.ReadWrite.Directory` delegated permission is required. To set the permissions in Microsoft Graph PowerShell, run;
29+
1. Microsoft Graph PowerShell using a [Privileged Role Administrator](/entra/identity/role-based-access-control/permissions-reference#privileged-role-administrator) role and the appropriate permissions. For this guide, the `RoleManagement.ReadWrite.Directory` delegated permission is required. To set the permissions in Microsoft Graph PowerShell, run;
3030

3131
```powershell
3232
Connect-MgGraph -Scopes "RoleManagement.ReadWrite.Directory"
@@ -36,7 +36,7 @@ To successfully complete this tutorial, make sure you have the required prerequi
3636
3737
## Step 1: Create a user account
3838
39-
In this step, you'll create a user who will be the target of the admin assignments. When you make these calls, change `contoso.onmicrosoft.com` to the ___domain name of your tenant. You can find tenant information on the Microsoft Entra overview page.
39+
In this step, you create a user who is the target of the admin assignments. When you make these calls, change `contoso.onmicrosoft.com` to the ___domain name of your tenant. You can find tenant information on the Microsoft Entra overview page.
4040
4141
```powershell
4242
$passwordProfile =@{
@@ -176,7 +176,7 @@ There are two ways to create active role assignments:
176176
- An admin can directly create an active role assignment for a user without first creating an eligible role assignment.
177177
- A user can activate an existing eligible role assignment.
178178

179-
In this step, you'll activate the eligible role assignment created in step 2. To complete this step, sign in to the terminal as the user we created in step 1.
179+
In this step, you activate the eligible role assignment created in step 2. To complete this step, sign in to the terminal as the user we created in step 1.
180180

181181
```powershell
182182
$params = @{

0 commit comments

Comments
 (0)