From c63a0634a7894a91255d7860449c0448642ab561 Mon Sep 17 00:00:00 2001 From: Megan Bradley Date: Fri, 18 Oct 2024 12:57:45 -0600 Subject: [PATCH 1/4] status --- .../AzureAD/Get-AzureADGroupOwner.yml | 2 +- .../AzureAD/Get-AzureADMSApplication.md | 17 ++++++++--------- .../AzureAD/Get-AzureADMSApplication.yml | 16 ++++++++-------- ...Get-AzureADMSApplicationExtensionProperty.md | 3 +-- ...et-AzureADMSApplicationExtensionProperty.yml | 2 +- .../AzureAD/Get-AzureADMSApplicationOwner.md | 5 ++--- .../AzureAD/Get-AzureADMSApplicationOwner.yml | 4 ++-- .../Get-AzureADMSConditionalAccessPolicy.md | 7 +++---- .../Get-AzureADMSConditionalAccessPolicy.yml | 6 +++--- .../Get-AzureADMSGroupPermissionGrant.md | 2 +- .../Get-AzureADMSGroupPermissionGrant.yml | 2 +- .../AzureAD/Get-AzureADMSNamedLocationPolicy.md | 5 ++--- .../Get-AzureADMSNamedLocationPolicy.yml | 4 ++-- ...t-AzureADMSPasswordSingleSignOnCredential.md | 2 +- ...-AzureADMSPasswordSingleSignOnCredential.yml | 2 +- .../Get-AzureADMSPermissionGrantConditionSet.md | 3 +-- ...Get-AzureADMSPermissionGrantConditionSet.yml | 2 +- .../Get-AzureADMSPrivilegedRoleAssignment.md | 4 ++-- .../Get-AzureADMSPrivilegedRoleAssignment.yml | 4 ++-- ...-AzureADMSPrivilegedRoleAssignmentRequest.md | 2 +- 20 files changed, 44 insertions(+), 50 deletions(-) diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADGroupOwner.yml b/azureadps-2.0-preview/AzureAD/Get-AzureADGroupOwner.yml index dc3cec5a..8efb2d8c 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADGroupOwner.yml +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADGroupOwner.yml @@ -13,7 +13,7 @@ syntaxes: examples: - title: 'Example 1: Get a group owner by ID' code: |- - PS C:\>Get-AzureADGroupOwner -ObjectId "62438306-7c37-4638-a72d-0ee8d9217680" + PS C:\>Get-AzureADGroupOwner -ObjectId "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" ObjectId ObjectType -------- ---------- diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplication.md b/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplication.md index a0673fe8..a71917e6 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplication.md +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplication.md @@ -48,7 +48,7 @@ PS C:\>Get-AzureADMSApplication -Filter "DisplayName eq 'My App'" System.Collections.Generic.List`1[Microsoft.Open.MSGraph.Model.PermissionScope] } - AppId : 807dd73f-8451-4cfa-b3bc-52ac3fd95330 + AppId : 00001111-aaaa-2222-bbbb-3333cccc4444 AppRoles : {} IsDeviceOnlyAuthSupported : IsFallbackPublicClient : @@ -92,7 +92,7 @@ This command gets an application by its display name. ### Example 2: Get an application by ID ``` -PS C:\>Get-AzureADMSApplication -Filter "AppId eq 'ed192e92-84d4-4baf-997d-1e190a81f28e'" +PS C:\>Get-AzureADMSApplication -Filter "AppId eq '11112222-bbbb-3333-cccc-4444dddd5555'" ``` This command gets an application by its ID. @@ -110,7 +110,7 @@ Id : ba4a97a7-3815-4752-bf4c-f1c0cccfff6a System.Collections.Generic.List\`1\[Microsoft.Open.MSGraph.Model.PermissionScope\] } - AppId : 807dd73f-8451-4cfa-b3bc-52ac3fd95330 + AppId : 00001111-aaaa-2222-bbbb-3333cccc4444 AppRoles : {} IsDeviceOnlyAuthSupported : IsFallbackPublicClient : @@ -156,7 +156,7 @@ Get-AzureADMSApplication -Filter "identifierUris/any(uri:uri eq 'http://wingtips ### Example 4: Get an application by object ID ``` -PS C:\>Get-AzureADMSApplication -ObjectId ffe886bc-e978-4002-829e-cf5b1e83d56a +PS C:\>Get-AzureADMSApplication -ObjectId aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb ``` This command gets an application by its object ID. @@ -176,7 +176,7 @@ Id : f8bbcbe4-df80-4a6b-80c5-926e28e41407 ResourceSpecificApplicationPermissions: } - AppId : 18f78c92-365c-4fa0-9b6f-7e06fff27ffe + AppId : 22223333-cccc-4444-dddd-5555eeee6666 ApplicationTemplateId : AppRoles : {} GroupMembershipClaims : @@ -244,7 +244,7 @@ Id : 121ce3aa-64cb-44f2-99e8-deb705caeddd ResourceSpecificApplicationPermissions: } - AppId : a1293e4b-97ae-4f58-9eeb-d0ba5b4b821a + AppId : 33334444-dddd-5555-eeee-6666ffff7777 ApplicationTemplateId : AppRoles : {} GroupMembershipClaims : @@ -304,7 +304,7 @@ Id : 121ce3aa-64cb-44f2-99e8-deb705caeddd ResourceSpecificApplicationPermissions: } - AppId : 51546bbc-4233-42d3-a08e-c73a370f5d41 + AppId : 44445555-eeee-6666-ffff-7777aaaa8888 ApplicationTemplateId : AppRoles : {} GroupMembershipClaims : @@ -377,7 +377,7 @@ Id : 88da75d4-2cba-4c47-9a15-80a983228ad4 ResourceSpecificApplicationPermissions: } - AppId : 2cffc854-bbcf-404a-8bba-70d043534129 + AppId : 55556666-ffff-7777-aaaa-8888bbbb9999 ApplicationTemplateId : AppRoles : {} GroupMembershipClaims : @@ -522,4 +522,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Remove-AzureADMSApplication]() [Set-AzureADMSApplication]() - diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplication.yml b/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplication.yml index 703f5c6d..8bebab95 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplication.yml +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplication.yml @@ -33,7 +33,7 @@ examples: System.Collections.Generic.List`1[Microsoft.Open.MSGraph.Model.PermissionScope] } - AppId : 807dd73f-8451-4cfa-b3bc-52ac3fd95330 + AppId : 00001111-aaaa-2222-bbbb-3333cccc4444 AppRoles : {} IsDeviceOnlyAuthSupported : IsFallbackPublicClient : @@ -76,7 +76,7 @@ examples: summary: "" - title: 'Example 2: Get an application by ID' code: |- - PS C:\>Get-AzureADMSApplication -Filter "AppId eq 'ed192e92-84d4-4baf-997d-1e190a81f28e'" + PS C:\>Get-AzureADMSApplication -Filter "AppId eq '11112222-bbbb-3333-cccc-4444dddd5555'" description: |- This command gets an application by its ID. @@ -93,7 +93,7 @@ examples: System.Collections.Generic.List\`1\[Microsoft.Open.MSGraph.Model.PermissionScope\] } - AppId : 807dd73f-8451-4cfa-b3bc-52ac3fd95330 + AppId : 00001111-aaaa-2222-bbbb-3333cccc4444 AppRoles : {} IsDeviceOnlyAuthSupported : IsFallbackPublicClient : @@ -139,7 +139,7 @@ examples: summary: "" - title: 'Example 4: Get an application by object ID' code: |- - PS C:\>Get-AzureADMSApplication -ObjectId ffe886bc-e978-4002-829e-cf5b1e83d56a + PS C:\>Get-AzureADMSApplication -ObjectId aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb description: |- This command gets an application by its object ID. @@ -158,7 +158,7 @@ examples: ResourceSpecificApplicationPermissions: } - AppId : 18f78c92-365c-4fa0-9b6f-7e06fff27ffe + AppId : 22223333-cccc-4444-dddd-5555eeee6666 ApplicationTemplateId : AppRoles : {} GroupMembershipClaims : @@ -225,7 +225,7 @@ examples: ResourceSpecificApplicationPermissions: } - AppId : a1293e4b-97ae-4f58-9eeb-d0ba5b4b821a + AppId : 33334444-dddd-5555-eeee-6666ffff7777 ApplicationTemplateId : AppRoles : {} GroupMembershipClaims : @@ -285,7 +285,7 @@ examples: ResourceSpecificApplicationPermissions: } - AppId : 51546bbc-4233-42d3-a08e-c73a370f5d41 + AppId : 44445555-eeee-6666-ffff-7777aaaa8888 ApplicationTemplateId : AppRoles : {} GroupMembershipClaims : @@ -357,7 +357,7 @@ examples: ResourceSpecificApplicationPermissions: } - AppId : 2cffc854-bbcf-404a-8bba-70d043534129 + AppId : 55556666-ffff-7777-aaaa-8888bbbb9999 ApplicationTemplateId : AppRoles : {} GroupMembershipClaims : diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplicationExtensionProperty.md b/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplicationExtensionProperty.md index e48c8784..17e93d82 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplicationExtensionProperty.md +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplicationExtensionProperty.md @@ -23,7 +23,7 @@ Retrieves the list of extension properties on an application object. ### Example 1: Get extension properties ``` -PS C:\>Get-AzureADMSApplicationExtensionProperty -ObjectId "3ddd22e7-a150-4bb3-b100-e410dea1cb84" +PS C:\>Get-AzureADMSApplicationExtensionProperty -ObjectId "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" ObjectId Name TargetObjects -------- ---- ------------- @@ -65,4 +65,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [New-AzureADMSApplicationExtensionProperty]() [Remove-AzureADMSApplicationExtensionProperty]() - diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplicationExtensionProperty.yml b/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplicationExtensionProperty.yml index 285d1147..7f8080f3 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplicationExtensionProperty.yml +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplicationExtensionProperty.yml @@ -14,7 +14,7 @@ syntaxes: examples: - title: 'Example 1: Get extension properties' code: |- - PS C:\>Get-AzureADMSApplicationExtensionProperty -ObjectId "3ddd22e7-a150-4bb3-b100-e410dea1cb84" + PS C:\>Get-AzureADMSApplicationExtensionProperty -ObjectId "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" ObjectId Name TargetObjects -------- ---- ------------- diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplicationOwner.md b/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplicationOwner.md index 4b07fd94..fa868844 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplicationOwner.md +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplicationOwner.md @@ -23,7 +23,7 @@ Retrieves the list of owners for an application object. ### Example 1: Get the owner of an application ``` -PS C:\>Get-AzureADMSApplicationOwner -ObjectId "3ddd22e7-a150-4bb3-b100-e410dea1cb84" -Top 1 +PS C:\>Get-AzureADMSApplicationOwner -ObjectId "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" -Top 1 ObjectId ObjectType -------- ---------- @@ -34,7 +34,7 @@ This command gets the owner of an application. ### Example 1: Get the owners of an application ``` -PS C:\>Get-AzureADMSApplicationOwner -ObjectId "3ddd22e7-a150-4bb3-b100-e410dea1cb84" -All $true +PS C:\>Get-AzureADMSApplicationOwner -ObjectId "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" -All $true ObjectId ObjectType -------- ---------- @@ -109,4 +109,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Add-AzureADMSApplicationOwner]() [Remove-AzureADMSApplicationOwner]() - diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplicationOwner.yml b/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplicationOwner.yml index e46925f0..e14661c3 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplicationOwner.yml +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSApplicationOwner.yml @@ -18,7 +18,7 @@ syntaxes: examples: - title: 'Example 1: Get the owner of an application' code: |- - PS C:\>Get-AzureADMSApplicationOwner -ObjectId "3ddd22e7-a150-4bb3-b100-e410dea1cb84" -Top 1 + PS C:\>Get-AzureADMSApplicationOwner -ObjectId "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" -Top 1 ObjectId ObjectType -------- ---------- @@ -28,7 +28,7 @@ examples: summary: "" - title: 'Example 1: Get the owners of an application' code: |- - PS C:\>Get-AzureADMSApplicationOwner -ObjectId "3ddd22e7-a150-4bb3-b100-e410dea1cb84" -All $true + PS C:\>Get-AzureADMSApplicationOwner -ObjectId "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" -All $true ObjectId ObjectType -------- ---------- diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSConditionalAccessPolicy.md b/azureadps-2.0-preview/AzureAD/Get-AzureADMSConditionalAccessPolicy.md index a69afe53..46445424 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSConditionalAccessPolicy.md +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSConditionalAccessPolicy.md @@ -32,7 +32,7 @@ Conditional access policies are custom rules that define an access scenario. ``` PS C:\> Get-AzureADMSConditionalAccessPolicy - Id : 6b5e999b-0ba8-4186-a106-e0296c1c4358 + Id : 1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5 DisplayName : Demo app for documentation CreatedDateTime : 2019-09-26T23:12:16.0792706Z ModifiedDateTime : 2019-09-27T00:12:12.5986473Z @@ -43,9 +43,9 @@ This command retrieves a list of all conditional access policies in Azure AD. ### Example 2: Retrieves a conditional access policy in Azure AD with given Id. ``` -PS C:\> Get-AzureADMSConditionalAccessPolicy -PolicyId "6b5e999b-0ba8-4186-a106-e0296c1c4358" +PS C:\> Get-AzureADMSConditionalAccessPolicy -PolicyId "1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5" - Id : 6b5e999b-0ba8-4186-a106-e0296c1c4358 + Id : 1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5 DisplayName : Demo app for documentation CreatedDateTime : 2019-09-26T23:12:16.0792706Z ModifiedDateTime : 2019-09-27T00:12:12.5986473Z @@ -86,4 +86,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Set-AzureADMSConditionalAccessPolicy]() [Remove-AzureADMSConditionalAccessPolicy]() - diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSConditionalAccessPolicy.yml b/azureadps-2.0-preview/AzureAD/Get-AzureADMSConditionalAccessPolicy.yml index a1359585..ffa0d37b 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSConditionalAccessPolicy.yml +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSConditionalAccessPolicy.yml @@ -11,7 +11,7 @@ examples: code: |- PS C:\> Get-AzureADMSConditionalAccessPolicy - Id : 6b5e999b-0ba8-4186-a106-e0296c1c4358 + Id : 1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5 DisplayName : Demo app for documentation CreatedDateTime : 2019-09-26T23:12:16.0792706Z ModifiedDateTime : 2019-09-27T00:12:12.5986473Z @@ -21,9 +21,9 @@ examples: summary: "" - title: 'Example 2: Retrieves a conditional access policy in Azure AD with given Id.' code: |- - PS C:\> Get-AzureADMSConditionalAccessPolicy -PolicyId "6b5e999b-0ba8-4186-a106-e0296c1c4358" + PS C:\> Get-AzureADMSConditionalAccessPolicy -PolicyId "1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5" - Id : 6b5e999b-0ba8-4186-a106-e0296c1c4358 + Id : 1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5 DisplayName : Demo app for documentation CreatedDateTime : 2019-09-26T23:12:16.0792706Z ModifiedDateTime : 2019-09-27T00:12:12.5986473Z diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSGroupPermissionGrant.md b/azureadps-2.0-preview/AzureAD/Get-AzureADMSGroupPermissionGrant.md index 62c5df93..9b10e9a6 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSGroupPermissionGrant.md +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSGroupPermissionGrant.md @@ -28,7 +28,7 @@ List exisiting permission grants for the group. Get-AzureADMSGroupPermissionGrant -Id "4823e767eca44858aed244154009b764" Id : vsMaSY2k_E7761KhRqpx7OGFvAwvdZnJM1s7Iqkt4PU - ClientId : deefce9d-be43-4b49-a9d3-851af6d2c26c + ClientId : 00001111-aaaa-2222-bbbb-3333cccc4444 ClientAppId : ba4e4a78-c352-4e59-b657-81b2b395d32b ResourceAppId : 00000003-0000-0000-c000-000000000000 PermissionType : Application diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSGroupPermissionGrant.yml b/azureadps-2.0-preview/AzureAD/Get-AzureADMSGroupPermissionGrant.yml index 10fc7f62..efbc862d 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSGroupPermissionGrant.yml +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSGroupPermissionGrant.yml @@ -19,7 +19,7 @@ examples: Get-AzureADMSGroupPermissionGrant -Id "4823e767eca44858aed244154009b764" Id : vsMaSY2k_E7761KhRqpx7OGFvAwvdZnJM1s7Iqkt4PU - ClientId : deefce9d-be43-4b49-a9d3-851af6d2c26c + ClientId : 00001111-aaaa-2222-bbbb-3333cccc4444 ClientAppId : ba4e4a78-c352-4e59-b657-81b2b395d32b ResourceAppId : 00000003-0000-0000-c000-000000000000 PermissionType : Application diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSNamedLocationPolicy.md b/azureadps-2.0-preview/AzureAD/Get-AzureADMSNamedLocationPolicy.md index fe78fdb6..a2387782 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSNamedLocationPolicy.md +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSNamedLocationPolicy.md @@ -49,10 +49,10 @@ This command retrieves a list of all named location policies in Azure AD. ### Example 2: Retrieves a named location policy in Azure AD with given Id. ``` -PS C:\> Get-AzureADMSNamedLocationPolicy -PolicyId 1b7f0916-7677-40d8-97a1-d606f4ed8fcf +PS C:\> Get-AzureADMSNamedLocationPolicy -PolicyId 1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5 OdataType : #microsoft.graph.countryNamedLocation - Id : 1b7f0916-7677-40d8-97a1-d606f4ed8fcf + Id : 1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5 DisplayName : Country named location CreatedDateTime : 2019-09-26T23:12:16.0792706Z ModifiedDateTime : 2019-09-27T00:12:12.5986473Z @@ -97,4 +97,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Set-AzureADMSNamedLocationPolicy]() [Remove-AzureADMSNamedLocationPolicy]() - diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSNamedLocationPolicy.yml b/azureadps-2.0-preview/AzureAD/Get-AzureADMSNamedLocationPolicy.yml index a912d6ff..3c284c8e 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSNamedLocationPolicy.yml +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSNamedLocationPolicy.yml @@ -27,10 +27,10 @@ examples: summary: "" - title: 'Example 2: Retrieves a named location policy in Azure AD with given Id.' code: |- - PS C:\> Get-AzureADMSNamedLocationPolicy -PolicyId 1b7f0916-7677-40d8-97a1-d606f4ed8fcf + PS C:\> Get-AzureADMSNamedLocationPolicy -PolicyId 1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5 OdataType : #microsoft.graph.countryNamedLocation - Id : 1b7f0916-7677-40d8-97a1-d606f4ed8fcf + Id : 1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5 DisplayName : Country named location CreatedDateTime : 2019-09-26T23:12:16.0792706Z ModifiedDateTime : 2019-09-27T00:12:12.5986473Z diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSPasswordSingleSignOnCredential.md b/azureadps-2.0-preview/AzureAD/Get-AzureADMSPasswordSingleSignOnCredential.md index 52192269..d048f1ba 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSPasswordSingleSignOnCredential.md +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSPasswordSingleSignOnCredential.md @@ -26,7 +26,7 @@ Note that the password field will be hidden for security purpose. ### Get password single-sign-on credentials ``` -PS C:\> $get_creds_output = Get-AzureADMSPasswordSingleSignOnCredential -ObjectId 9ac9883e-0ac5-4c32-8737-4267f56a28cc -PasswordSSOObjectId a4210a97-5e26-4cfe-88f1-118ed4886f27 +PS C:\> $get_creds_output = Get-AzureADMSPasswordSingleSignOnCredential -ObjectId aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb -PasswordSSOObjectId bbbbbbbb-1111-2222-3333-cccccccccccc ``` This command gets the password sso credentials for the given ObjectId and PasswordSSOObjectId. diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSPasswordSingleSignOnCredential.yml b/azureadps-2.0-preview/AzureAD/Get-AzureADMSPasswordSingleSignOnCredential.yml index 495b9c75..2e370e91 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSPasswordSingleSignOnCredential.yml +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSPasswordSingleSignOnCredential.yml @@ -14,7 +14,7 @@ syntaxes: examples: - title: Get password single-sign-on credentials code: |- - PS C:\> $get_creds_output = Get-AzureADMSPasswordSingleSignOnCredential -ObjectId 9ac9883e-0ac5-4c32-8737-4267f56a28cc -PasswordSSOObjectId a4210a97-5e26-4cfe-88f1-118ed4886f27 + PS C:\> $get_creds_output = Get-AzureADMSPasswordSingleSignOnCredential -ObjectId aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb -PasswordSSOObjectId bbbbbbbb-1111-2222-3333-cccccccccccc description: |- This command gets the password sso credentials for the given ObjectId and PasswordSSOObjectId. summary: "" diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSPermissionGrantConditionSet.md b/azureadps-2.0-preview/AzureAD/Get-AzureADMSPermissionGrantConditionSet.md index a365307f..8bdebf5c 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSPermissionGrantConditionSet.md +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSPermissionGrantConditionSet.md @@ -40,7 +40,7 @@ PS C:\>Get-AzureADMSPermissionGrantConditionSet -PolicyId "policy1" -ConditionSe ### Example 3: Get a permission grant condition set ``` -PS C:\>Get-AzureADMSPermissionGrantConditionSet -PolicyId "policy1" -ConditionSetType "includes" -Id "665a9903-0398-48ab-b4e9-7a570d468b66" +PS C:\>Get-AzureADMSPermissionGrantConditionSet -PolicyId "policy1" -ConditionSetType "includes" -Id "1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5" ``` ## PARAMETERS @@ -110,4 +110,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Set-AzureADMSPermissionGrantConditionSet]() [Remove-AzureADMSPermissionGrantConditionSet]() - diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSPermissionGrantConditionSet.yml b/azureadps-2.0-preview/AzureAD/Get-AzureADMSPermissionGrantConditionSet.yml index 341af2b1..c84029c4 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSPermissionGrantConditionSet.yml +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSPermissionGrantConditionSet.yml @@ -32,7 +32,7 @@ examples: summary: "" - title: 'Example 3: Get a permission grant condition set' code: |- - PS C:\>Get-AzureADMSPermissionGrantConditionSet -PolicyId "policy1" -ConditionSetType "includes" -Id "665a9903-0398-48ab-b4e9-7a570d468b66" + PS C:\>Get-AzureADMSPermissionGrantConditionSet -PolicyId "policy1" -ConditionSetType "includes" -Id "1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5" description: "" summary: "" parameters: diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSPrivilegedRoleAssignment.md b/azureadps-2.0-preview/AzureAD/Get-AzureADMSPrivilegedRoleAssignment.md index 7d4aba49..4a790c38 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSPrivilegedRoleAssignment.md +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSPrivilegedRoleAssignment.md @@ -31,14 +31,14 @@ Get role assignments for a specific provider and resource ### Example 1 ``` -PS C:\> Get-AzureADMSPrivilegedRoleAssignment -ProviderId AzureResources -ResourceId 3f5887ed-dd6e-4821-8bde-c813ec508cf9 +PS C:\> Get-AzureADMSPrivilegedRoleAssignment -ProviderId AzureResources -ResourceId a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1 ``` Get all role assignments for a specific provider and resource ### Example 2 ``` -PS C:\> Get-AzureADMSPrivilegedRoleAssignment -ProviderId AzureResources -ResourceId 3f5887ed-dd6e-4821-8bde-c813ec508cf9 -Id b83c177a-10e0-4eeb-8d0b-f3668fbf81fa +PS C:\> Get-AzureADMSPrivilegedRoleAssignment -ProviderId AzureResources -ResourceId a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1 -Id b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 ``` Get a role assignment for a specific provider and resource diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSPrivilegedRoleAssignment.yml b/azureadps-2.0-preview/AzureAD/Get-AzureADMSPrivilegedRoleAssignment.yml index 6fd54d7a..acdbb6fc 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSPrivilegedRoleAssignment.yml +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSPrivilegedRoleAssignment.yml @@ -23,13 +23,13 @@ syntaxes: examples: - title: Example 1 code: |- - PS C:\> Get-AzureADMSPrivilegedRoleAssignment -ProviderId AzureResources -ResourceId 3f5887ed-dd6e-4821-8bde-c813ec508cf9 + PS C:\> Get-AzureADMSPrivilegedRoleAssignment -ProviderId AzureResources -ResourceId a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1 description: |- Get all role assignments for a specific provider and resource summary: "" - title: Example 2 code: |- - PS C:\> Get-AzureADMSPrivilegedRoleAssignment -ProviderId AzureResources -ResourceId 3f5887ed-dd6e-4821-8bde-c813ec508cf9 -Id b83c177a-10e0-4eeb-8d0b-f3668fbf81fa + PS C:\> Get-AzureADMSPrivilegedRoleAssignment -ProviderId AzureResources -ResourceId a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1 -Id b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 description: |- Get a role assignment for a specific provider and resource summary: "" diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSPrivilegedRoleAssignmentRequest.md b/azureadps-2.0-preview/AzureAD/Get-AzureADMSPrivilegedRoleAssignmentRequest.md index 6173a59d..a3290892 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSPrivilegedRoleAssignmentRequest.md +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSPrivilegedRoleAssignmentRequest.md @@ -30,7 +30,7 @@ Get role assignment request for a specific resource ### Example 1 ``` -PS C:\> Get-AzureADMSPrivilegedRoleAssignmentRequest -ProviderId AzureResources -Filter "ResourceId eq 'e5e7d29d-5465-45ac-885f-4716a5ee74b5'" +PS C:\> Get-AzureADMSPrivilegedRoleAssignmentRequest -ProviderId AzureResources -Filter "ResourceId eq 'a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1'" ``` Get all role assigment requests for a specific provider and resource From 7c18b3e9954648ca3213138245ab557206841ebc Mon Sep 17 00:00:00 2001 From: Eunice Waweru <73849846+msewaweru@users.noreply.github.com> Date: Thu, 5 Dec 2024 18:35:16 +0300 Subject: [PATCH 2/4] Apply suggestions from code review Co-authored-by: Chris Werner <59959532+cilwerner@users.noreply.github.com> --- .../AzureAD/Get-AzureADMSConditionalAccessPolicy.md | 6 +++--- .../AzureAD/Get-AzureADMSConditionalAccessPolicy.yml | 6 +++--- .../AzureAD/Get-AzureADMSNamedLocationPolicy.md | 4 ++-- .../AzureAD/Get-AzureADMSNamedLocationPolicy.yml | 4 ++-- .../AzureAD/Get-AzureADMSPermissionGrantConditionSet.md | 2 +- .../AzureAD/Get-AzureADMSPermissionGrantConditionSet.yml | 2 +- 6 files changed, 12 insertions(+), 12 deletions(-) diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSConditionalAccessPolicy.md b/azureadps-2.0-preview/AzureAD/Get-AzureADMSConditionalAccessPolicy.md index 46445424..fa6fc3e1 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSConditionalAccessPolicy.md +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSConditionalAccessPolicy.md @@ -32,7 +32,7 @@ Conditional access policies are custom rules that define an access scenario. ``` PS C:\> Get-AzureADMSConditionalAccessPolicy - Id : 1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5 + Id : 6b5e999b-0ba8-4186-a106-e0296c1c4358 DisplayName : Demo app for documentation CreatedDateTime : 2019-09-26T23:12:16.0792706Z ModifiedDateTime : 2019-09-27T00:12:12.5986473Z @@ -43,9 +43,9 @@ This command retrieves a list of all conditional access policies in Azure AD. ### Example 2: Retrieves a conditional access policy in Azure AD with given Id. ``` -PS C:\> Get-AzureADMSConditionalAccessPolicy -PolicyId "1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5" +PS C:\> Get-AzureADMSConditionalAccessPolicy -PolicyId "6b5e999b-0ba8-4186-a106-e0296c1c4358" - Id : 1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5 + Id : 6b5e999b-0ba8-4186-a106-e0296c1c4358 DisplayName : Demo app for documentation CreatedDateTime : 2019-09-26T23:12:16.0792706Z ModifiedDateTime : 2019-09-27T00:12:12.5986473Z diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSConditionalAccessPolicy.yml b/azureadps-2.0-preview/AzureAD/Get-AzureADMSConditionalAccessPolicy.yml index ffa0d37b..a1359585 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSConditionalAccessPolicy.yml +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSConditionalAccessPolicy.yml @@ -11,7 +11,7 @@ examples: code: |- PS C:\> Get-AzureADMSConditionalAccessPolicy - Id : 1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5 + Id : 6b5e999b-0ba8-4186-a106-e0296c1c4358 DisplayName : Demo app for documentation CreatedDateTime : 2019-09-26T23:12:16.0792706Z ModifiedDateTime : 2019-09-27T00:12:12.5986473Z @@ -21,9 +21,9 @@ examples: summary: "" - title: 'Example 2: Retrieves a conditional access policy in Azure AD with given Id.' code: |- - PS C:\> Get-AzureADMSConditionalAccessPolicy -PolicyId "1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5" + PS C:\> Get-AzureADMSConditionalAccessPolicy -PolicyId "6b5e999b-0ba8-4186-a106-e0296c1c4358" - Id : 1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5 + Id : 6b5e999b-0ba8-4186-a106-e0296c1c4358 DisplayName : Demo app for documentation CreatedDateTime : 2019-09-26T23:12:16.0792706Z ModifiedDateTime : 2019-09-27T00:12:12.5986473Z diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSNamedLocationPolicy.md b/azureadps-2.0-preview/AzureAD/Get-AzureADMSNamedLocationPolicy.md index a2387782..0f1d6f14 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSNamedLocationPolicy.md +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSNamedLocationPolicy.md @@ -49,10 +49,10 @@ This command retrieves a list of all named location policies in Azure AD. ### Example 2: Retrieves a named location policy in Azure AD with given Id. ``` -PS C:\> Get-AzureADMSNamedLocationPolicy -PolicyId 1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5 +PS C:\> Get-AzureADMSNamedLocationPolicy -PolicyId 1b7f0916-7677-40d8-97a1-d606f4ed8fcf OdataType : #microsoft.graph.countryNamedLocation - Id : 1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5 + Id : 1b7f0916-7677-40d8-97a1-d606f4ed8fcf DisplayName : Country named location CreatedDateTime : 2019-09-26T23:12:16.0792706Z ModifiedDateTime : 2019-09-27T00:12:12.5986473Z diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSNamedLocationPolicy.yml b/azureadps-2.0-preview/AzureAD/Get-AzureADMSNamedLocationPolicy.yml index 3c284c8e..a912d6ff 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSNamedLocationPolicy.yml +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSNamedLocationPolicy.yml @@ -27,10 +27,10 @@ examples: summary: "" - title: 'Example 2: Retrieves a named location policy in Azure AD with given Id.' code: |- - PS C:\> Get-AzureADMSNamedLocationPolicy -PolicyId 1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5 + PS C:\> Get-AzureADMSNamedLocationPolicy -PolicyId 1b7f0916-7677-40d8-97a1-d606f4ed8fcf OdataType : #microsoft.graph.countryNamedLocation - Id : 1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5 + Id : 1b7f0916-7677-40d8-97a1-d606f4ed8fcf DisplayName : Country named location CreatedDateTime : 2019-09-26T23:12:16.0792706Z ModifiedDateTime : 2019-09-27T00:12:12.5986473Z diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSPermissionGrantConditionSet.md b/azureadps-2.0-preview/AzureAD/Get-AzureADMSPermissionGrantConditionSet.md index 8bdebf5c..bf518357 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSPermissionGrantConditionSet.md +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSPermissionGrantConditionSet.md @@ -40,7 +40,7 @@ PS C:\>Get-AzureADMSPermissionGrantConditionSet -PolicyId "policy1" -ConditionSe ### Example 3: Get a permission grant condition set ``` -PS C:\>Get-AzureADMSPermissionGrantConditionSet -PolicyId "policy1" -ConditionSetType "includes" -Id "1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5" +PS C:\>Get-AzureADMSPermissionGrantConditionSet -PolicyId "policy1" -ConditionSetType "includes" -Id "665a9903-0398-48ab-b4e9-7a570d468b66" ``` ## PARAMETERS diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSPermissionGrantConditionSet.yml b/azureadps-2.0-preview/AzureAD/Get-AzureADMSPermissionGrantConditionSet.yml index c84029c4..341af2b1 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSPermissionGrantConditionSet.yml +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSPermissionGrantConditionSet.yml @@ -32,7 +32,7 @@ examples: summary: "" - title: 'Example 3: Get a permission grant condition set' code: |- - PS C:\>Get-AzureADMSPermissionGrantConditionSet -PolicyId "policy1" -ConditionSetType "includes" -Id "1aaaaaa1-2bb2-3cc3-4dd4-5eeeeeeeeee5" + PS C:\>Get-AzureADMSPermissionGrantConditionSet -PolicyId "policy1" -ConditionSetType "includes" -Id "665a9903-0398-48ab-b4e9-7a570d468b66" description: "" summary: "" parameters: From 60853f29bc5a6cb922e6f23eb46f900f09acfdc2 Mon Sep 17 00:00:00 2001 From: Eunice Waweru <73849846+msewaweru@users.noreply.github.com> Date: Thu, 5 Dec 2024 18:44:20 +0300 Subject: [PATCH 3/4] Update Get-AzureADMSGroupPermissionGrant.yml --- .../AzureAD/Get-AzureADMSGroupPermissionGrant.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSGroupPermissionGrant.yml b/azureadps-2.0-preview/AzureAD/Get-AzureADMSGroupPermissionGrant.yml index efbc862d..b9eb2263 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSGroupPermissionGrant.yml +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSGroupPermissionGrant.yml @@ -20,7 +20,7 @@ examples: Id : vsMaSY2k_E7761KhRqpx7OGFvAwvdZnJM1s7Iqkt4PU ClientId : 00001111-aaaa-2222-bbbb-3333cccc4444 - ClientAppId : ba4e4a78-c352-4e59-b657-81b2b395d32b + ClientAppId : 11112222-bbbb-3333-cccc-4444dddd5555 ResourceAppId : 00000003-0000-0000-c000-000000000000 PermissionType : Application Permission : Member.Read.Group From e3b4253ed555e5fa20a4df349968e1489d5ac754 Mon Sep 17 00:00:00 2001 From: Eunice Waweru <73849846+msewaweru@users.noreply.github.com> Date: Thu, 5 Dec 2024 18:45:02 +0300 Subject: [PATCH 4/4] Update Get-AzureADMSGroupPermissionGrant.md --- .../AzureAD/Get-AzureADMSGroupPermissionGrant.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/azureadps-2.0-preview/AzureAD/Get-AzureADMSGroupPermissionGrant.md b/azureadps-2.0-preview/AzureAD/Get-AzureADMSGroupPermissionGrant.md index 9b10e9a6..df7b913f 100644 --- a/azureadps-2.0-preview/AzureAD/Get-AzureADMSGroupPermissionGrant.md +++ b/azureadps-2.0-preview/AzureAD/Get-AzureADMSGroupPermissionGrant.md @@ -29,7 +29,7 @@ List exisiting permission grants for the group. Id : vsMaSY2k_E7761KhRqpx7OGFvAwvdZnJM1s7Iqkt4PU ClientId : 00001111-aaaa-2222-bbbb-3333cccc4444 - ClientAppId : ba4e4a78-c352-4e59-b657-81b2b395d32b + ClientAppId : 11112222-bbbb-3333-cccc-4444dddd5555 ResourceAppId : 00000003-0000-0000-c000-000000000000 PermissionType : Application Permission : Member.Read.Group