You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: powerapps-docs/developer/data-platform/aad-group-team.md
+29-29Lines changed: 29 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: "Work with Azure Active Directory group teams (Dataverse)| Microsoft Docs"
3
-
description: "Learn about working with an Azure Active Directory group team using the Web API."
2
+
title: "Work with Microsoft Entra ID group teams (Dataverse)| Microsoft Docs"
3
+
description: "Learn about working with an Microsoft Entra ID group team using the Web API."
4
4
ms.custom: ""
5
5
ms.date: 09/21/2023
6
6
@@ -18,28 +18,28 @@ search.audienceType:
18
18
- developer
19
19
---
20
20
21
-
# Work with Azure Active Directory group teams
21
+
# Work with Microsoft Entra ID group teams
22
22
23
-
An Azure Active Directory (AAD) group team, similar to an owner team, can own records and can have security roles assigned to the team. To read more about AAD group teams see [Manage group teams](/power-platform/admin/manage-group-teams).
23
+
An Microsoft Entra ID group team, similar to an owner team, can own records and can have security roles assigned to the team. To read more about Microsoft Entra ID group teams see [Manage group teams](/power-platform/admin/manage-group-teams).
24
24
25
25
## Just-in-time updates
26
-
Just-in-time updates mean that the actions are taken at run-time to eliminate the need for syncing data from Azure Active Directory and Microsoft Dataverse. These actions include creating AAD group teams, adding/removing AAD group members from AAD group teams, and adding users into Dataverse.
26
+
Just-in-time updates mean that the actions are taken at run-time to eliminate the need for syncing data from Microsoft Entra ID and Microsoft Dataverse. These actions include creating Microsoft Entra ID group teams, adding/removing Microsoft Entra ID group members from Microsoft Entra ID group teams, and adding users into Dataverse.
27
27
28
-
1. If the AAD group team doesn't exist and a security role is assigned or a record is assigned to the AAD group, the AAD group team is created just-in-time.
28
+
1. If the Microsoft Entra ID group team doesn't exist and a security role is assigned or a record is assigned to the Microsoft Entra ID group, the Microsoft Entra ID group team is created just-in-time.
29
29
30
-
2. When an AAD group member accesses Dataverse interactively or through a non-interactive process makes a call on behalf of the user, the group member is added into the AAD group team at run-time. Similarly, when a member who was removed from the AAD group accesses Dataverse interactively or by a non-interactive process call, the group member is removed from the AAD group team.
30
+
2. When an Microsoft Entra ID group member accesses Dataverse interactively or through a non-interactive process makes a call on behalf of the user, the group member is added into the Microsoft Entra ID group team at run-time. Similarly, when a member who was removed from the Microsoft Entra ID group accesses Dataverse interactively or by a non-interactive process call, the group member is removed from the Microsoft Entra ID group team.
31
31
32
-
3. When an AAD group member accesses Dataverse interactively or through a non-interactive process makes a call on behalf of the user, and the user doesn't exist in Dataverse, the user is added in Dataverse just-in-time.
32
+
3. When an Microsoft Entra ID group member accesses Dataverse interactively or through a non-interactive process makes a call on behalf of the user, and the user doesn't exist in Dataverse, the user is added in Dataverse just-in-time.
33
33
34
-
The following sections describe how to work with AAD group teams using the Web API.
34
+
The following sections describe how to work with Microsoft Entra ID group teams using the Web API.
35
35
36
36
## Impersonate another user
37
-
Your service can make calls on behalf of another system user by [impersonating the user](impersonate-another-user.md#impersonate-another-user-using-the-web-api). If the system user belongs to an AAD Security group and the AAD security group is a Dataverse group team, that user is added into Dataverse automatically (if the user doesn't already exist in Dataverse). The user is also automatically added into the Dataverse group team after being added to Dataverse or if the user already exists in Dataverse.
37
+
Your service can make calls on behalf of another system user by [impersonating the user](impersonate-another-user.md#impersonate-another-user-using-the-web-api). If the system user belongs to an Microsoft Entra ID Security group and the Microsoft Entra ID security group is a Dataverse group team, that user is added into Dataverse automatically (if the user doesn't already exist in Dataverse). The user is also automatically added into the Dataverse group team after being added to Dataverse or if the user already exists in Dataverse.
38
38
39
-
## Create an AAD group team
40
-
An AAD group team can be created in Dataverse by making an API call (programmatically) or by just-in-time when a security role is assigned to the AAD group, or when a record is assigned to the AAD group.
39
+
## Create an Microsoft Entra ID group team
40
+
An Microsoft Entra ID group team can be created in Dataverse by making an API call (programmatically) or by just-in-time when a security role is assigned to the Microsoft Entra ID group, or when a record is assigned to the Microsoft Entra ID group.
41
41
42
-
Citizen developers wanting to programmatically create a Microsoft Dataverse AAD group team can do so by providing the object ID of an existing AAD group as shown in the following command.
42
+
Citizen developers wanting to programmatically create a Microsoft Dataverse Microsoft Entra ID group team can do so by providing the object ID of an existing Microsoft Entra ID group as shown in the following command.
43
43
44
44
**Request:**
45
45
@@ -56,12 +56,12 @@ Accept: application/json
56
56
Where:
57
57
58
58
- Membership type is defined in the [team property](/dynamics365/customer-engagement/web-api/team#properties)`membershiptype`
59
-
- Name of the team is the name of the AAD group
60
-
- Team type is based on the AAD group type - for example "Security" or "Microsoft 365"
59
+
- Name of the team is the name of the Microsoft Entra ID group
60
+
- Team type is based on the Microsoft Entra ID group type - for example "Security" or "Microsoft 365"
61
61
62
-
## Assign a security role to an AAD group team
62
+
## Assign a security role to an Microsoft Entra ID group team
63
63
64
-
An administrator can assign a security role to an AAD group team after the AAD group is created in AAD. The AAD group team is created into Dataverse automatically if it doesn't exist in Dataverse.
64
+
An administrator can assign a security role to an Microsoft Entra ID group team after the Microsoft Entra ID group is created in Microsoft Entra ID. The Microsoft Entra ID group team is created into Dataverse automatically if it doesn't exist in Dataverse.
65
65
66
66
**Request:**
67
67
@@ -76,7 +76,7 @@ Accept: application/json
76
76
77
77
## Assign a security role to a user
78
78
79
-
An administrator can assign a security role to an AAD group user. The user is added into Dataverse automatically if the user doesn't exist in Dataverse and the role is assigned directly to the user.
79
+
An administrator can assign a security role to an Microsoft Entra ID group user. The user is added into Dataverse automatically if the user doesn't exist in Dataverse and the role is assigned directly to the user.
An administrator can assign a record to an AAD group. The AAD group team is created into Dataverse automatically if it doesn't exist in Dataverse.
93
+
An administrator can assign a record to an Microsoft Entra ID group. The Microsoft Entra ID group team is created into Dataverse automatically if it doesn't exist in Dataverse.
94
94
95
95
The example below shows the syntax for assigning an account record.
96
96
@@ -105,9 +105,9 @@ Accept: application/json
105
105
}
106
106
```
107
107
108
-
## Assign a record to an AAD group member
108
+
## Assign a record to an Microsoft Entra ID group member
109
109
110
-
An administrator can assign a record to an AAD group member. The AAD group member is added into Dataverse automatically if the user doesn't exist in Dataverse.
110
+
An administrator can assign a record to an Microsoft Entra ID group member. The Microsoft Entra ID group member is added into Dataverse automatically if the user doesn't exist in Dataverse.
111
111
112
112
The example below shows the syntax for assigning an account record.
<!-- ## Share a record to an Microsoft Entra ID group
125
125
126
-
"An administrator or a record owner can share a record to an AAD group. The AAD group team is created into Dataverse automatically if it doesn't exist in Dataverse.
126
+
"An administrator or a record owner can share a record to an Microsoft Entra ID group. The Microsoft Entra ID group team is created into Dataverse automatically if it doesn't exist in Dataverse.
127
127
128
128
The example below shows the syntax for sharing an account record.
129
129
@@ -147,9 +147,9 @@ Accept: application/json
147
147
}
148
148
``` -->
149
149
150
-
<!-- ## Share a record to an AAD group member
150
+
<!-- ## Share a record to an Microsoft Entra ID group member
151
151
152
-
"An administrator or a record owner can share a record to an AAD group member. The AAD group member is added into Dataverse automatically if the user doesn't exist in Dataverse.
152
+
"An administrator or a record owner can share a record to an Microsoft Entra ID group member. The Microsoft Entra ID group member is added into Dataverse automatically if the user doesn't exist in Dataverse.
153
153
154
154
The example below shows the syntax for sharing an account record.
155
155
@@ -175,7 +175,7 @@ Accept: application/json
175
175
176
176
## Retrieve a user
177
177
178
-
You can retrieve a system user table row using an Azure user object identifier (ID). If the system user doesn't exist in Dataverse, the user is added to Dataverse automatically and added into the Dataverse group team if the user belongs to an AAD group that exists in Dataverse. **If the user exists in Dataverse, the user is not added to the Dataverse group team.**
178
+
You can retrieve a system user table row using an Azure user object identifier (ID). If the system user doesn't exist in Dataverse, the user is added to Dataverse automatically and added into the Dataverse group team if the user belongs to an Microsoft Entra ID group that exists in Dataverse. **If the user exists in Dataverse, the user is not added to the Dataverse group team.**
179
179
180
180
The example below shows the syntax for retrieving a user row.
181
181
@@ -187,7 +187,7 @@ GET [Organization URI]/api/data/v9.0/SystemUser(azureactivedirectoryobjectid=<us
187
187
188
188
## Security roles and privileges
189
189
190
-
Members of an AAD group can query all the security roles that are directly and indirectly assigned to them using the following command.
190
+
Members of an Microsoft Entra ID group can query all the security roles that are directly and indirectly assigned to them using the following command.
191
191
192
192
**Request:**
193
193
@@ -215,7 +215,7 @@ GET [Organization URI]/api/data/v9.0/RetrieveAadUserRoles(DirectoryObjectId=<use
215
215
}
216
216
```
217
217
218
-
Members of an AAD group can check their security privileges without being a user of Dataverse using the following command.
218
+
Members of an Microsoft Entra ID group can check their security privileges without being a user of Dataverse using the following command.
Copy file name to clipboardExpand all lines: powerapps-docs/developer/data-platform/aaduser-entity.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,6 +14,9 @@ search.audienceType:
14
14
---
15
15
# Azure Active Directory user table
16
16
17
+
> [!NOTE]
18
+
> Azure Active Directory is now Microsoft Entra ID. [Learn more](/azure/active-directory/fundamentals/new-name)
19
+
17
20
Microsoft Dataverse includes a virtual table named AAD user (aaduser). This virtual table provides a connection to Azure Active Directory (AAD) and returns data about users within your AAD organization. No virtual table configuration is required to use the functionality. This is an online only feature.
Copy file name to clipboardExpand all lines: powerapps-docs/developer/data-platform/api-limits.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -279,9 +279,9 @@ Work with the ETL application vendor to learn which settings to apply. Make sure
279
279
280
280
### Do these limits apply to Dataverse search?
281
281
282
-
No. Dataverse search is a different API (`api/search` rather than `api/data`) and has different rules. When using the Dataverse search API, there is a throttling limit of one request per second for each user.
282
+
No. Dataverse native search is a different API (`api/search` rather than `api/data`) and has different rules. When using the Dataverse search API, there is a throttling limit of one request per second for each user.
283
283
284
-
More information: [Search across table data using Dataverse search](webapi/relevance-search.md)
284
+
More information: [Dataverse Search Service Protection Limits](search/overview.md#service-protection-limits)
285
285
286
286
### How do these limits apply to how many requests a user is entitled to each day?
0 commit comments