Skip to content

Commit 3922b5b

Browse files
learn-build-service-prod[bot]kawkaurDanipocketLi DaiFaithOmbongi
authored
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/microsoftgraph/microsoft-graph-docs-contrib (branch main) (#28684)
* add whiteboard extension * JSON Format fix - remove trailing comma * cross-link to parent (#9856) * Update supported source extensions for HTML format * Rename 'Tenant management' to 'Tenants' * Document auto-owner behavior for Agent ID Developer role (#9857) * Document auto-owner behavior for Agent ID Developer role Added notes to the Create agentIdentityBlueprint and Create agentIdentityBlueprintPrincipal API docs explaining that users with the Agent ID Developer role are automatically added as owners of the blueprints and blueprint principals they create. Updated the shared RBAC include (rbac-agentid-apis-write.md) to: - Expand scope to cover blueprints, blueprint principals, and agent identities - Clarify the auto-owner behavior Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com> * Address review: update auto-owner language, remove redundant notes - Update RBAC include to use 'principal...is assigned ownership' language per reviewer feedback - Remove [!NOTE] blocks from blueprint and blueprint principal create docs (info already in shared RBAC include) Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com> * Trigger crlf check; concise --------- Co-authored-by: STALLAMRAJU <swtallamraju@microsoft.com> Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com> Co-authored-by: Faith Moraa Ombongi <ombongi.moraa.fe@gmail.com> * Fix formatting of known issue in RBAC documentation (#9864) * Fix formatting of known issue in RBAC documentation * Fix formatting of known issue in RBAC documentation --------- Co-authored-by: kawkaur <kawkaur@microsoft.com_msteamsmdb> Co-authored-by: Danipocket <88507770+Danipocket@users.noreply.github.com> Co-authored-by: Li Dai <daili@microsoft.com> Co-authored-by: Faith Moraa Ombongi <ombongi.moraa.fe@gmail.com> Co-authored-by: Laura Graham <Lauragra@users.noreply.github.com> Co-authored-by: learn-build-service-prod[bot] <113403604+learn-build-service-prod[bot]@users.noreply.github.com> Co-authored-by: Learn Build Service GitHub App <Learn Build Service LearnBuild@microsoft.com> Co-authored-by: swetheendra <31578080+swetheendra@users.noreply.github.com> Co-authored-by: STALLAMRAJU <swtallamraju@microsoft.com> Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
1 parent 2b0a3fc commit 3922b5b

2 files changed

Lines changed: 4 additions & 4 deletions

File tree

api-reference/beta/includes/rbac-for-apis/rbac-agentid-apis-write.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ ms.topic: include
44
---
55

66
> [!IMPORTANT]
7-
> - **Known issue**: If the client is granted either the *Directory.AccessAsUser.All* or *Directory.ReadWrite.All* permission, the client's permissions to create, update, and delete Agent IDs are ignored, which can cause requests to fail with `403 Forbidden` error. To resolve this issue, remove these permissions from the client, request new access tokens, and retry the request.
8-
>
97
> For delegated access using work or school accounts, the admin must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json). This operation supports the following built-in roles, which provide only the least privilege necessary:
108
> - Agent ID Administrator.
119
> - Agent ID Developer - Create agent identity blueprints and blueprint principals. The principal with this role is assigned ownership of the blueprint or blueprint principal they create and can perform write operations on the resources they own.
10+
>
11+
> **Known issue**: If the client is granted either the *Directory.AccessAsUser.All* or *Directory.ReadWrite.All* permission, the client's permissions to create, update, and delete Agent IDs are ignored, which can cause requests to fail with `403 Forbidden` error. To resolve this issue, remove these permissions from the client, request new access tokens, and retry the request.

api-reference/v1.0/includes/rbac-for-apis/rbac-agentid-apis-write.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ ms.topic: include
44
---
55

66
> [!IMPORTANT]
7-
> - **Known issue**: If the client is granted either the *Directory.AccessAsUser.All* or *Directory.ReadWrite.All* permission, the client's permissions to create, update, and delete Agent IDs are ignored, which can cause requests to fail with `403 Forbidden` error. To resolve this issue, remove these permissions from the client, request new access tokens, and retry the request.
8-
>
97
> For delegated access using work or school accounts, the admin must be assigned a supported [Microsoft Entra role](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json). This operation supports the following built-in roles, which provide only the least privilege necessary:
108
> - Agent ID Administrator.
119
> - Agent ID Developer - Create agent identity blueprints and blueprint principals. The principal with this role is assigned ownership of the blueprint or blueprint principal they create and can perform write operations on the resources they own.
10+
>
11+
> **Known issue**: If the client is granted either the *Directory.AccessAsUser.All* or *Directory.ReadWrite.All* permission, the client's permissions to create, update, and delete Agent IDs are ignored, which can cause requests to fail with `403 Forbidden` error. To resolve this issue, remove these permissions from the client, request new access tokens, and retry the request.

0 commit comments

Comments
 (0)