Skip to content

Commit 1676c7e

Browse files
committed
Merge branch 'main' into phecke-plugin-updates
2 parents 86af0a6 + 626c851 commit 1676c7e

File tree

602 files changed

+92630
-5769
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

602 files changed

+92630
-5769
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -480,6 +480,16 @@
480480
"redirect_url": "/power-pages/configure/azure-front-door",
481481
"redirect_document_id": false
482482
},
483+
{
484+
"source_path": "powerapps-docs/developer/data-platform/search/index.md",
485+
"redirect_url": "/powerapps/developer/data-platform/search/overview",
486+
"redirect_document_id": "false"
487+
},
488+
{
489+
"source_path": "powerapps-docs/developer/data-platform/webapi/relevance-search.md",
490+
"redirect_url": "../search/overview.md",
491+
"redirect_document_id": false
492+
},
483493
{
484494
"source_path": "powerapps-docs/maker/portals/admin/portal-checker-analysis.md",
485495
"redirect_url": "/power-apps/maker/portals/admin/portal-checker#next-steps",

powerapps-docs/developer/component-framework/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,8 @@ items:
1010
href: code-components-model-driven-apps.md
1111
- name: For canvas apps
1212
href: component-framework-for-canvas-apps.md
13-
- name: For portals
14-
href: ../../maker/portals/component-framework.md
13+
- name: For Power Pages
14+
href: /power-pages/configure/component-framework
1515
- name: "React controls & platform libraries (Preview)"
1616
href: react-controls-platform-libraries.md
1717
- name: Get tooling

powerapps-docs/developer/data-platform/TOC.yml

Lines changed: 16 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@
2424
href: security-access-coding.md
2525
- name: Security roles and templates
2626
href: security-roles.md
27-
- name: Active Directory group teams
27+
- name: Microsoft Entra ID group teams
2828
href: aad-group-team.md
2929
- name: Work with data using code
3030
href: work-with-data.md
@@ -33,7 +33,20 @@
3333
href: ./webapi/overview.md
3434
- name: Use the SDK for .NET
3535
href: ./org-service/overview.md
36-
- name: Use bulk operation messages
36+
- name: Search for records
37+
href: ./search/overview.md
38+
items:
39+
- name: Query
40+
href: ./search/query.md
41+
- name: Suggest
42+
href: ./search/suggest.md
43+
- name: Autocomplete
44+
href: ./search/autocomplete.md
45+
- name: Statistics and Status
46+
href: ./search/statistics-status.md
47+
- name: Legacy search
48+
href: ./search/legacy.md
49+
- name: Bulk Operation messages
3750
href: bulk-operations.md
3851
- name: Create your own messages
3952
href: custom-actions.md
@@ -446,7 +459,7 @@
446459
href: sample-discovery-service-crmserviceclient.md
447460
- name: Tutorials
448461
items:
449-
- name: "Tutorial: Register an app with Azure Active Directory"
462+
- name: "Tutorial: Register an app with Microsoft Entra ID"
450463
href: walkthrough-register-app-azure-active-directory.md
451464
- name: "Tutorial: Create an ASP.NET Core Blazor WebAssembly App"
452465
href: walkthrough-blazor-webassembly-single-tenant.md

powerapps-docs/developer/data-platform/aad-group-team.md

Lines changed: 29 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: "Work with Azure Active Directory group teams (Dataverse)| Microsoft Docs"
3-
description: "Learn about working with an Azure Active Directory group team using the Web API."
2+
title: "Work with Microsoft Entra ID group teams (Dataverse)| Microsoft Docs"
3+
description: "Learn about working with an Microsoft Entra ID group team using the Web API."
44
ms.custom: ""
55
ms.date: 09/21/2023
66

@@ -18,28 +18,28 @@ search.audienceType:
1818
- developer
1919
---
2020

21-
# Work with Azure Active Directory group teams
21+
# Work with Microsoft Entra ID group teams
2222

23-
An Azure Active Directory (AAD) group team, similar to an owner team, can own records and can have security roles assigned to the team. To read more about AAD group teams see [Manage group teams](/power-platform/admin/manage-group-teams).
23+
An Microsoft Entra ID group team, similar to an owner team, can own records and can have security roles assigned to the team. To read more about Microsoft Entra ID group teams see [Manage group teams](/power-platform/admin/manage-group-teams).
2424

2525
## Just-in-time updates
26-
Just-in-time updates mean that the actions are taken at run-time to eliminate the need for syncing data from Azure Active Directory and Microsoft Dataverse. These actions include creating AAD group teams, adding/removing AAD group members from AAD group teams, and adding users into Dataverse.
26+
Just-in-time updates mean that the actions are taken at run-time to eliminate the need for syncing data from Microsoft Entra ID and Microsoft Dataverse. These actions include creating Microsoft Entra ID group teams, adding/removing Microsoft Entra ID group members from Microsoft Entra ID group teams, and adding users into Dataverse.
2727

28-
1. If the AAD group team doesn't exist and a security role is assigned or a record is assigned to the AAD group, the AAD group team is created just-in-time.
28+
1. If the Microsoft Entra ID group team doesn't exist and a security role is assigned or a record is assigned to the Microsoft Entra ID group, the Microsoft Entra ID group team is created just-in-time.
2929

30-
2. When an AAD group member accesses Dataverse interactively or through a non-interactive process makes a call on behalf of the user, the group member is added into the AAD group team at run-time. Similarly, when a member who was removed from the AAD group accesses Dataverse interactively or by a non-interactive process call, the group member is removed from the AAD group team.
30+
2. When an Microsoft Entra ID group member accesses Dataverse interactively or through a non-interactive process makes a call on behalf of the user, the group member is added into the Microsoft Entra ID group team at run-time. Similarly, when a member who was removed from the Microsoft Entra ID group accesses Dataverse interactively or by a non-interactive process call, the group member is removed from the Microsoft Entra ID group team.
3131

32-
3. When an AAD group member accesses Dataverse interactively or through a non-interactive process makes a call on behalf of the user, and the user doesn't exist in Dataverse, the user is added in Dataverse just-in-time.
32+
3. When an Microsoft Entra ID group member accesses Dataverse interactively or through a non-interactive process makes a call on behalf of the user, and the user doesn't exist in Dataverse, the user is added in Dataverse just-in-time.
3333

34-
The following sections describe how to work with AAD group teams using the Web API.
34+
The following sections describe how to work with Microsoft Entra ID group teams using the Web API.
3535

3636
## Impersonate another user
37-
Your service can make calls on behalf of another system user by [impersonating the user](impersonate-another-user.md#impersonate-another-user-using-the-web-api). If the system user belongs to an AAD Security group and the AAD security group is a Dataverse group team, that user is added into Dataverse automatically (if the user doesn't already exist in Dataverse). The user is also automatically added into the Dataverse group team after being added to Dataverse or if the user already exists in Dataverse.
37+
Your service can make calls on behalf of another system user by [impersonating the user](impersonate-another-user.md#impersonate-another-user-using-the-web-api). If the system user belongs to an Microsoft Entra ID Security group and the Microsoft Entra ID security group is a Dataverse group team, that user is added into Dataverse automatically (if the user doesn't already exist in Dataverse). The user is also automatically added into the Dataverse group team after being added to Dataverse or if the user already exists in Dataverse.
3838

39-
## Create an AAD group team
40-
An AAD group team can be created in Dataverse by making an API call (programmatically) or by just-in-time when a security role is assigned to the AAD group, or when a record is assigned to the AAD group.
39+
## Create an Microsoft Entra ID group team
40+
An Microsoft Entra ID group team can be created in Dataverse by making an API call (programmatically) or by just-in-time when a security role is assigned to the Microsoft Entra ID group, or when a record is assigned to the Microsoft Entra ID group.
4141

42-
Citizen developers wanting to programmatically create a Microsoft Dataverse AAD group team can do so by providing the object ID of an existing AAD group as shown in the following command.
42+
Citizen developers wanting to programmatically create a Microsoft Dataverse Microsoft Entra ID group team can do so by providing the object ID of an existing Microsoft Entra ID group as shown in the following command.
4343

4444
**Request:**
4545

@@ -56,12 +56,12 @@ Accept: application/json
5656
Where:
5757

5858
- Membership type is defined in the [team property](/dynamics365/customer-engagement/web-api/team#properties) `membershiptype`
59-
- Name of the team is the name of the AAD group
60-
- Team type is based on the AAD group type - for example "Security" or "Microsoft 365"
59+
- Name of the team is the name of the Microsoft Entra ID group
60+
- Team type is based on the Microsoft Entra ID group type - for example "Security" or "Microsoft 365"
6161

62-
## Assign a security role to an AAD group team
62+
## Assign a security role to an Microsoft Entra ID group team
6363

64-
An administrator can assign a security role to an AAD group team after the AAD group is created in AAD. The AAD group team is created into Dataverse automatically if it doesn't exist in Dataverse.
64+
An administrator can assign a security role to an Microsoft Entra ID group team after the Microsoft Entra ID group is created in Microsoft Entra ID. The Microsoft Entra ID group team is created into Dataverse automatically if it doesn't exist in Dataverse.
6565

6666
**Request:**
6767

@@ -76,7 +76,7 @@ Accept: application/json
7676

7777
## Assign a security role to a user
7878

79-
An administrator can assign a security role to an AAD group user. The user is added into Dataverse automatically if the user doesn't exist in Dataverse and the role is assigned directly to the user.
79+
An administrator can assign a security role to an Microsoft Entra ID group user. The user is added into Dataverse automatically if the user doesn't exist in Dataverse and the role is assigned directly to the user.
8080

8181
**Request:**
8282

@@ -88,9 +88,9 @@ Accept: application/json
8888
"@odata.id":"[Organization URI]/api/data/v9.0/roles(<role ID>)"
8989
}
9090
```
91-
## Assign a record to an AAD group
91+
## Assign a record to an Microsoft Entra ID group
9292

93-
An administrator can assign a record to an AAD group. The AAD group team is created into Dataverse automatically if it doesn't exist in Dataverse.
93+
An administrator can assign a record to an Microsoft Entra ID group. The Microsoft Entra ID group team is created into Dataverse automatically if it doesn't exist in Dataverse.
9494

9595
The example below shows the syntax for assigning an account record.
9696

@@ -105,9 +105,9 @@ Accept: application/json
105105
}
106106
```
107107

108-
## Assign a record to an AAD group member
108+
## Assign a record to an Microsoft Entra ID group member
109109

110-
An administrator can assign a record to an AAD group member. The AAD group member is added into Dataverse automatically if the user doesn't exist in Dataverse.
110+
An administrator can assign a record to an Microsoft Entra ID group member. The Microsoft Entra ID group member is added into Dataverse automatically if the user doesn't exist in Dataverse.
111111

112112
The example below shows the syntax for assigning an account record.
113113

@@ -121,9 +121,9 @@ Accept: application/json
121121
"[email protected]": "[Organization URI]/api/data/v9.0/systemusers(azureactivedirectoryobjectid=<user object ID>)"
122122
}
123123
```
124-
<!-- ## Share a record to an AAD group
124+
<!-- ## Share a record to an Microsoft Entra ID group
125125
126-
"An administrator or a record owner can share a record to an AAD group. The AAD group team is created into Dataverse automatically if it doesn't exist in Dataverse.
126+
"An administrator or a record owner can share a record to an Microsoft Entra ID group. The Microsoft Entra ID group team is created into Dataverse automatically if it doesn't exist in Dataverse.
127127
128128
The example below shows the syntax for sharing an account record.
129129
@@ -147,9 +147,9 @@ Accept: application/json
147147
}
148148
``` -->
149149

150-
<!-- ## Share a record to an AAD group member
150+
<!-- ## Share a record to an Microsoft Entra ID group member
151151
152-
"An administrator or a record owner can share a record to an AAD group member. The AAD group member is added into Dataverse automatically if the user doesn't exist in Dataverse.
152+
"An administrator or a record owner can share a record to an Microsoft Entra ID group member. The Microsoft Entra ID group member is added into Dataverse automatically if the user doesn't exist in Dataverse.
153153
154154
The example below shows the syntax for sharing an account record.
155155
@@ -175,7 +175,7 @@ Accept: application/json
175175

176176
## Retrieve a user
177177

178-
You can retrieve a system user table row using an Azure user object identifier (ID). If the system user doesn't exist in Dataverse, the user is added to Dataverse automatically and added into the Dataverse group team if the user belongs to an AAD group that exists in Dataverse. **If the user exists in Dataverse, the user is not added to the Dataverse group team.**
178+
You can retrieve a system user table row using an Azure user object identifier (ID). If the system user doesn't exist in Dataverse, the user is added to Dataverse automatically and added into the Dataverse group team if the user belongs to an Microsoft Entra ID group that exists in Dataverse. **If the user exists in Dataverse, the user is not added to the Dataverse group team.**
179179

180180
The example below shows the syntax for retrieving a user row.
181181

@@ -187,7 +187,7 @@ GET [Organization URI]/api/data/v9.0/SystemUser(azureactivedirectoryobjectid=<us
187187

188188
## Security roles and privileges
189189

190-
Members of an AAD group can query all the security roles that are directly and indirectly assigned to them using the following command.
190+
Members of an Microsoft Entra ID group can query all the security roles that are directly and indirectly assigned to them using the following command.
191191

192192
**Request:**
193193

@@ -215,7 +215,7 @@ GET [Organization URI]/api/data/v9.0/RetrieveAadUserRoles(DirectoryObjectId=<use
215215
}
216216
```
217217

218-
Members of an AAD group can check their security privileges without being a user of Dataverse using the following command.
218+
Members of an Microsoft Entra ID group can check their security privileges without being a user of Dataverse using the following command.
219219

220220
**Request:**
221221

powerapps-docs/developer/data-platform/aaduser-entity.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,9 @@ search.audienceType:
1414
---
1515
# Azure Active Directory user table
1616

17+
> [!NOTE]
18+
> Azure Active Directory is now Microsoft Entra ID. [Learn more](/azure/active-directory/fundamentals/new-name)
19+
1720
Microsoft Dataverse includes a virtual table named AAD user (aaduser). This virtual table provides a connection to Azure Active Directory (AAD) and returns data about users within your AAD organization. No virtual table configuration is required to use the functionality. This is an online only feature.
1821

1922
> [!NOTE]

powerapps-docs/developer/data-platform/activityparty-entity.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,7 @@ An activity party represents a person or group associated with an activity. An a
3636
|Resource|10|Specifies a resource.|
3737
|Customer|11|Specifies a customer.|
3838
|ChatParticipant|12|Specifies a participant in a Teams chat.|
39+
|Related|13|Specifies one or more related records.|
3940

4041
<a name="SupportedActivityPartyTypes"></a>
4142

@@ -53,7 +54,7 @@ Not all activity party types are available for each activity in Dataverse, excep
5354
|CampaignActivity|Sender|CampaignActivity.Partners<br />CampaignActivity.From|
5455
|CampaignResponse|Customer|CampaignResponse.Customer<br />CampaignResponse.Partner<br />CampaignResponse.From|
5556
|Chat|ChatParticipant|None|
56-
|Email|BccRecipient<br />CcRecipient<br />Sender<br />ToRecipient|Email.Bcc<br />Email.Cc<br />Email.From<br />Email.To|
57+
|Email|BccRecipient<br />CcRecipient<br />Related<br />Sender<br />ToRecipient|Email.Bcc<br />Email.Cc<br />Email.Related<br />Email.From<br />Email.To|
5758
|Fax|Sender<br />ToRecipient|Fax.From<br />Fax.To|
5859
|Letter|BccRecipient<br />Sender<br />ToRecipient|Letter.Bcc<br />Letter.From<br />Letter.To|
5960
|PhoneCall|Sender<br />ToRecipient|PhoneCall.From<br />PhoneCall.To|

powerapps-docs/developer/data-platform/api-limits.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -279,9 +279,9 @@ Work with the ETL application vendor to learn which settings to apply. Make sure
279279

280280
### Do these limits apply to Dataverse search?
281281

282-
No. Dataverse search is a different API (`api/search` rather than `api/data`) and has different rules. When using the Dataverse search API, there is a throttling limit of one request per second for each user.
282+
No. Dataverse native search is a different API (`api/search` rather than `api/data`) and has different rules. When using the Dataverse search API, there is a throttling limit of one request per second for each user.
283283

284-
More information: [Search across table data using Dataverse search](webapi/relevance-search.md)
284+
More information: [Dataverse Search Service Protection Limits](search/overview.md#service-protection-limits)
285285

286286
### How do these limits apply to how many requests a user is entitled to each day?
287287

0 commit comments

Comments
 (0)