Updates from: 07/01/2022 23:01:06
Service Microsoft Docs article Related commit history on GitHub Change details
v1.0 Crosstenantaccesspolicy List Partners https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/beta/api/crosstenantaccesspolicy-list-partners.md
If successful, this method returns a `200 OK` response code and a collection of
### Request -
-# [HTTP](#tab/http)
<!-- { "blockType": "request", "name": "list_crosstenantaccesspolicyconfigurationpartner"
If successful, this method returns a `200 OK` response code and a collection of
``` http GET https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners ```
-# [C#](#tab/csharp)
-
-# [JavaScript](#tab/javascript)
-
-# [Objective-C](#tab/objc)
-
-# [Java](#tab/java)
-
-# [Go](#tab/go)
-
-# [PowerShell](#tab/powershell)
--- ### Response
v1.0 Crosstenantaccesspolicy Post Partners https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/beta/api/crosstenantaccesspolicy-post-partners.md
If successful, this method returns a `201 Created` response code and a [crossTen
### Request -
-# [HTTP](#tab/http)
<!-- { "blockType": "request", "name": "create_crosstenantaccesspolicyconfigurationpartner_from_"
Content-Type: application/json
} } ```
-# [C#](#tab/csharp)
-
-# [JavaScript](#tab/javascript)
-
-# [Objective-C](#tab/objc)
-
-# [Java](#tab/java)
-
-# [Go](#tab/go)
-
-# [PowerShell](#tab/powershell)
--- ### Response
v1.0 Crosstenantaccesspolicy Update https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/beta/api/crosstenantaccesspolicy-update.md
The [crossTenantAccessPolicy](../resources/crosstenantaccesspolicy.md) object si
### Request -
-# [HTTP](#tab/http)
<!-- { "blockType": "request", "name": "update_crosstenantaccesspolicy"
Content-Type: application/json
"allowedCloudEndpoints": ["microsoftonline.us", "partner.microsoftonline.cn"] } ```+ # [JavaScript](#tab/javascript) [!INCLUDE [sample-code](../includes/snippets/javascript/update-crosstenantaccesspolicy-javascript-snippets.md)] [!INCLUDE [sdk-documentation](../includes/snippets/snippets-sdk-documentation-link.md)]
Content-Type: application/json
- ### Response <!-- {
v1.0 Deletedteam Getallmessages https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/beta/api/deletedteam-getallmessages.md
+
+ Title: "deletedTeam: getAllMessages"
+description: "Retrieve all messages across all channels in a deleted team."
+
+ms.localizationpriority: high
++
+# deletedTeam: getAllMessages
+Namespace: microsoft.graph
++
+Retrieve all [messages](../resources/chatmessage.md) across all [channels](../resources/channel.md) in a [deleted team](../resources/deletedteam.md), including text, audio, and video conversations.
+
+To learn more about using the Microsoft Teams export APIs to export content, see [Export content with the Microsoft Teams Export APIs](/microsoftteams/export-teams-content).
++
+## Permissions
+One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Permissions](/graph/permissions-reference).
+
+|Permission type|Permissions (from least to most privileged)|
+|:|:|
+|Delegated (work or school account)|Not supported.|
+|Delegated (personal Microsoft account)|Not supported.|
+|Application|ChannelMessage.Read.All|
+
+> [!NOTE]
+> Before you call this API with application permissions, you must request access. For details, see [Protected APIs in Microsoft Teams](/graph/teams-protected-apis).
+
+## HTTP request
+
+<!-- {
+ "blockType": "ignored"
+}
+-->
+``` http
+GET /teamwork/deletedTeams/{deletedTeamId}/channels/getAllMessages
+```
+
+## Request headers
+|Name|Description|
+|:|:|
+|Authorization|Bearer {token}. Required.|
+
+## Optional query parameters
+
+You can use the `model` query parameter, which supports the values `A` and `B`, based on the preferred [licensing and payment model](/graph/teams-licenses),
+as shown in the following examples.
+
+```http
+GET /teamwork/deletedTeams/{deletedTeamId}/channels/getAllMessages?model=A
+GET /teamwork/deletedTeams/{deletedTeamId}/channels/getAllMessages?model=B
+```
+
+If the `model` parameter is not specified, the [evaluation mode](/graph/teams-licenses#evaluation-mode-default-requirements) will be used.
+
+This method supports the [$top](/graph/query-parameters#top-parameter) query parameter to control the number of items per response and the [$filter](/graph/query-parameters#filter-parameter) query parameter with the **dateTime** range query on **lastModifiedDateTime**. Other [OData query parameters](/graph/query-parameters) are currently not supported.
+
+## Request body
+Do not supply a request body for this method.
+
+## Response
+
+If successful, this function returns a `200 OK` response code and a collection of [chatMessage](../resources/chatmessage.md) objects in the response body.
+
+## Examples
+
+### Request
+The following is an example of a request.
+<!-- {
+ "blockType": "request",
+ "name": "deletedteamthis_getallmessages"
+}
+-->
+``` http
+GET https://graph.microsoft.com/beta/teamwork/deletedTeams/fbe2bf47-16c8-47cf-b4a5-4b9b187c508b/channels/getAllMessages
+```
++
+### Response
+The following is an example of the response.
+>**Note:** The response object shown here might be shortened for readability.
+<!-- {
+ "blockType": "response",
+ "truncated": true,
+ "@odata.type": "microsoft.graph.chatMessage",
+ "isCollection": true
+}
+-->
+``` http
+HTTP/1.1 200 OK
+
+{
+ "@odata.context": "https://graph.microsoft.com/beta/$metadata#Collection(chatMessage)",
+ "@odata.count": 2,
+ "@odata.nextLink": "https://graph.microsoft.com/beta/teamwork/deletedTeams/fbe2bf47-16c8-47cf-b4a5-4b9b187c508b/channels/getAllMessages",
+ "value": [
+ {
+ "@odata.type": "#microsoft.graph.chatMessage",
+ "id": "1616990417393",
+ "replyToId": null,
+ "etag": "1616990417393",
+ "messageType": "message",
+ "createdDateTime": "2021-03-29T04:00:17.393Z",
+ "lastModifiedDateTime": "2021-03-29T04:00:17.393Z",
+ "lastEditedDateTime": null,
+ "deletedDateTime": null,
+ "subject": null,
+ "summary": null,
+ "chatId": null,
+ "importance": "normal",
+ "locale": "en-us",
+ "webUrl": "https://teams.microsoft.com/l/message/19%3Ad5d2708d408c41d98424c1c354c19db3%40thread.tacv2/1616990417393?groupId=fbe2bf47-16c8-47cf-b4a5-4b9b187c508b&tenantId=2432b57b-0abd-43db-aa7b-16eadd115d34&createdTime=1616990417393&parentMessageId=1616990417393",
+ "policyViolation": null,
+ "eventDetail": null,
+ "from": {
+ "application": null,
+ "device": null,
+ "conversation": null,
+ "user": {
+ "id": "8ea0e38b-efb3-4757-924a-5f94061cf8c2",
+ "displayName": "Robin Kline",
+ "userIdentityType": "aadUser"
+ }
+ },
+ "body": {
+ "contentType": "text",
+ "content": "Test message"
+ },
+ "channelIdentity": {
+ "teamId": "fbe2bf47-16c8-47cf-b4a5-4b9b187c508b",
+ "channelId": "19:d5d2708d408c41d98424c1c354c19db3@thread.tacv2"
+ },
+ "attachments": [],
+ "mentions": [],
+ "reactions": []
+ }
+ ]
+}
+```
+
v1.0 Driveitem Createuploadsession https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/beta/api/driveitem-createuploadsession.md
The following example controls the behavior if the filename is already taken, an
## Parameters
-| Parameter | Type | Description
-|:|:|:
-| item | [driveItemUploadableProperties](../resources/driveItemUploadableProperties.md) | Data about the file being uploaded
-| deferCommit | Boolean | If set to true, final creation of the file in the destination will require an explicit request. Only on OneDrive for Business.
+| Parameter | Type | Description |
+|:|:-|:|
+| deferCommit | Boolean | If set to `true`, the final creation of the file in the destination will require an explicit request. |
+| item | [driveItemUploadableProperties](../resources/driveItemUploadableProperties.md) | Data about the file being uploaded. |
### Request
v1.0 Reportroot Getm365appplatformusercounts https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/beta/api/reportroot-getm365appplatformusercounts.md
Do not supply a request body with this method.
## Response
-If successful, this method returns a `200 OK` response code and a [report](../resources/intune-shared-report.md) object in the response body. Report data is contained in the **content** property of the **report** object.
+If successful, this method returns a `200 OK` response code and a Edm.Stream object in the response body.
### CSV
-If successful, requesting the **content** property returns a `302 Found` response that redirects to a preauthenticated download URL for the report. That URL can be found in the `Location` header in the response.
+If successful, this method returns a `302 Found` response that redirects to a preauthenticated download URL for the report. That URL can be found in the `Location` header in the response.
Preauthenticated download URLs are only valid for a short period of time (a few minutes) and do not require an `Authorization` header.
The CSV file has the following headers for columns:
### JSON
-If successful, requesting the **content** property returns a `200 OK` response code and a JSON object in response body.
+If successful, this method returns a `200 OK` response code and a JSON object in response body.
## Examples
The following is an example that outputs CSV.
#### Request
-The following is an example of the request to get the **content** property.
+The following is an example of the request.
The following is an example of the request to get the **content** property.
}--> ```msgraph-interactive
-GET https://graph.microsoft.com/beta/reports/getM365AppPlatformUserCounts(period='D7')/content?$format=text/csv
+GET https://graph.microsoft.com/beta/reports/getM365AppPlatformUserCounts(period='D7')?$format=text/csv
``` # [C#](#tab/csharp) [!INCLUDE [sample-code](../includes/snippets/csharp/reportroot-getm365appplatformusercounts-csv-csharp-snippets.md)]
The following is an example that returns JSON.
#### Request
-The following is an example of the request to get the **content** property.
+The following is an example of the request.
The following is an example of the request to get the **content** property.
}--> ```msgraph-interactive
-GET https://graph.microsoft.com/beta/reports/getM365AppPlatformUserCounts(period='D7')/content?$format=application/json
+GET https://graph.microsoft.com/beta/reports/getM365AppPlatformUserCounts(period='D7')?$format=application/json
``` # [C#](#tab/csharp) [!INCLUDE [sample-code](../includes/snippets/csharp/reportroot-getm365appplatformusercounts-json-csharp-snippets.md)]
v1.0 Reportroot Getm365appusercounts https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/beta/api/reportroot-getm365appusercounts.md
Do not supply a request body with this method.
## Response
-If successful, this method returns a `200 OK` response code and a [report](../resources/intune-shared-report.md) object in the response body. Report data is contained in the **content** property of the **report** object.
+If successful, this method returns a `200 OK` response code and a Edm.Stream object in the response body.
### CSV
-If successful, requesting the **content** property returns a `302 Found` response that redirects to a preauthenticated download URL for the report. That URL can be found in the `Location` header in the response.
+If successful, this method returns a `302 Found` response that redirects to a preauthenticated download URL for the report. That URL can be found in the `Location` header in the response.
Preauthenticated download URLs are only valid for a short period of time (a few minutes) and do not require an `Authorization` header.
The CSV file has the following headers for columns:
### JSON
-If successful, requesting the **content** property returns a `200 OK` response code and a JSON object in response body.
+If successful, this method returns a `200 OK` response code and a JSON object in response body.
## Examples
The following is an example that outputs CSV.
#### Request
-The following is an example of the request to get the **content** property.
+The following is an example of the request.
The following is an example of the request to get the **content** property.
}--> ```msgraph-interactive
-GET https://graph.microsoft.com/beta/reports/getM365AppUserCounts(period='D7')/content?$format=text/csv
+GET https://graph.microsoft.com/beta/reports/getM365AppUserCounts(period='D7')?$format=text/csv
``` # [C#](#tab/csharp) [!INCLUDE [sample-code](../includes/snippets/csharp/reportroot-getm365appusercounts-csv-csharp-snippets.md)]
The following is an example that returns JSON.
#### Request
-The following is an example of the request to get the **content** property.
+The following is an example of the request.
The following is an example of the request to get the **content** property.
}--> ```msgraph-interactive
-GET https://graph.microsoft.com/beta/reports/getM365AppUserCounts(period='D7')/content?$format=application/json
+GET https://graph.microsoft.com/beta/reports/getM365AppUserCounts(period='D7')?$format=application/json
``` # [C#](#tab/csharp) [!INCLUDE [sample-code](../includes/snippets/csharp/reportroot-getm365appusercounts-json-csharp-snippets.md)]
v1.0 Reportroot Getm365appuserdetail https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/beta/api/reportroot-getm365appuserdetail.md
Do not supply a request body with this method.
## Response
-If successful, this method returns a `200 OK` response code and a [report](../resources/intune-shared-report.md) object in the response body. Report data is contained in the **content** property of the **report** object.
+If successful, this method returns a `200 OK` response code and a Edm.Stream object in the response body.
### CSV
-If successful, requesting the **content** property returns a `302 Found` response that redirects to a preauthenticated download URL for the report. That URL can be found in the `Location` header in the response.
+If successful, this method returns a `302 Found` response that redirects to a preauthenticated download URL for the report. That URL can be found in the `Location` header in the response.
Preauthenticated download URLs are only valid for a short period of time (a few minutes) and do not require an `Authorization` header.
The CSV file has the following headers for columns:
### JSON
-If successful, requesting the **content** property returns a `200 OK` response code and a JSON object in response body.
+If successful, this method returns a `200 OK` response code and a JSON object in response body.
The default page size for this request is 200 items.
The following is an example that outputs CSV.
#### Request
-The following is an example of the request to get the **content** property.
+The following is an example of the request.
The following is an example of the request to get the **content** property.
}--> ```msgraph-interactive
-GET https://graph.microsoft.com/beta/reports/getM365AppUserDetail(period='D7')/content?$format=text/csv
+GET https://graph.microsoft.com/beta/reports/getM365AppUserDetail(period='D7')?$format=text/csv
``` # [C#](#tab/csharp) [!INCLUDE [sample-code](../includes/snippets/csharp/reportroot-getm365appusercoundetail-csharp-snippets.md)]
The following is an example that returns JSON.
#### Request
-The following is an example of the request to get the **content** property.
+The following is an example of the request.
The following is an example of the request to get the **content** property.
}--> ```msgraph-interactive
-GET https://graph.microsoft.com/beta/reports/getM365AppUserDetail(period='D7')/content?$format=application/json
+GET https://graph.microsoft.com/beta/reports/getM365AppUserDetail(period='D7')?$format=application/json
``` # [C#](#tab/csharp) [!INCLUDE [sample-code](../includes/snippets/csharp/reportroot-getm365appusercountdetail-csharp-snippets.md)]
Content-Type: application/json
Content-Length: 951 {
- "@odata.nextLink": "https://graph.microsoft.com/beta/reports/getM365AppUserDetail(period='D7')/content?$format=application/json&$skiptoken=AAAAA",
+ "@odata.nextLink": "https://graph.microsoft.com/beta/reports/getM365AppUserDetail(period='D7')?$format=application/json&$skiptoken=AAAAA",
"value": [ { "reportRefreshDate": "2020-06-30",
v1.0 Site List https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/beta/api/site-list.md
Title: "Enumerate sites"
-description: "List the available [sites][] in an organization that match provided filter criteria and query options."
+description: "List all available sites in an organization or list the sites that match the provided filter criteria and query options."
ms.localizationpriority: medium ms.prod: "sharepoint" doc_type: apiPageType
Namespace: microsoft.graph
[!INCLUDE [beta-disclaimer](../../includes/beta-disclaimer.md)]
-List the available [sites][] in an organization that match provided filter criteria and query options.
+List all available [sites][] in an organization.
-Only the following query options are currently supported:
+Specific filter criteria and query options are also supported and described below:
| Filter statement | Select statement | Description |:--|:|:-- |`siteCollection/root ne null` | `siteCollection,webUrl` | Lists all root-level site collections in the organization. Useful for discovering the home site for each geography.
-In addition, you may use a **[$search][]** query against the '/sites' collection to find sites matching given keywords.
+In addition, you can use a **[$search][]** query against the `/sites` collection to find sites matching given keywords.
[$search]: site-search.md [sites]: ../resources/site.md
+For more guidance about building applications that use site discovery for scanning purposes, see [Best practices for discovering files and detecting changes at scale](/onedrive/developer/rest-api/concepts/scan-guidance?view=odsp-graph-online).
+ ## Permissions One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Permissions](/graph/permissions-reference).
-|Permission type | Permissions (from least to most privileged)
-|:--|:-
-|Delegated (work or school account) | Sites.Read.All, Sites.ReadWrite.All
-|Delegated (personal Microsoft account) | Not supported.
-|Application | Sites.Read.All, Sites.ReadWrite.All
+### List all site collections
+
+| Permission type | Permissions (from least to most privileged) |
+|:|:--|
+| Delegated (work or school account) | Not supported. |
+| Delegated (personal Microsoft account) | Not supported. |
+| Application | Sites.Read.All, Sites.ReadWrite.All |
+
+### Discover the home site for each geography
+
+| Permission type | Permissions (from least to most privileged) |
+|:|:--|
+| Delegated (work or school account) | Sites.Read.All, Sites.ReadWrite.All |
+| Delegated (personal Microsoft account) | Not supported. |
+| Application | Sites.Read.All, Sites.ReadWrite.All |
## HTTP request <!-- { "blockType": "ignored" } --> ```http
+GET /sites
GET /sites?$filter=siteCollection/root ne null ``` ## Example
-#### Request
+### Request
# [HTTP](#tab/http)
GET https://graph.microsoft.com/beta/sites?$select=siteCollection,webUrl&$filter
-#### Response
+### Response
<!-- { "blockType": "response", "@type": "microsoft.graph.site", "isCollection": true, "truncated": true } -->
Content-type: application/json
} ```
+### Request
+
+<!-- { "blockType": "request", "name": "list-sites", "scopes": "sites.read.all" } -->
+
+```http
+GET /sites
+```
+
+### Response
+
+<!-- { "blockType": "response", "@type": "microsoft.graph.site", "isCollection": true, "truncated": true } -->
+
+```json
+HTTP/1.1 200 OK
+Content-type: application/json
+
+{
+ "value": [
+ {
+ "id": "contoso.sharepoint.com,bf6fb551-d508-4946-a439-b2a6154fc1d9,65a04b8b-1f44-442b-a1fc-9e5852fb946c",
+ "name": "Root Site",
+ "root": { },
+ "siteCollection": {
+ "hostname": "contoso.sharepoint.com",
+ "dataLocationCode": "NAM",
+ "root": { }
+ },
+ "webUrl": "https://contoso.sharepoint.com"
+ },
+ {
+ "id": "contoso.sharepoint.com,d9ecf079-9b13-4376-ac5d-f242dda55626,746dbcc1-fa2b-4120-b657-2670bae5bb6f",
+ "name": "Site A",
+ "root": { },
+ "siteCollection": {
+ "hostname": "contoso.sharepoint.com"
+ },
+ "webUrl": "https://contoso.sharepoint.com/sites/siteA"
+ },
+ {
+ "id": "contoso.sharepoint.com,fd1a778f-263e-4c43-acdf-d5c2519d80eb,c06016db-dfec-4f79-83a1-09c6dbfd7022",
+ "name": "Site B",
+ "root": { },
+ "siteCollection": {
+ "hostname": "contoso.sharepoint.com"
+ },
+ "webUrl": "https://contoso.sharepoint.com/sites/siteB"
+ }
+ ]
+}
+```
+ <!-- { "type": "#page.annotation",
v1.0 Teamwork List Deletedteams https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/beta/api/teamwork-list-deletedteams.md
+
+ Title: "List deletedTeams"
+description: "Get a list of the deletedTeam objects and their properties."
+
+ms.localizationpriority: high
++
+# List deletedTeams
+Namespace: microsoft.graph
++
+Get a list of the [deletedTeam](../resources/deletedteam.md) objects and their properties.
+
+## Permissions
+One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Permissions](/graph/permissions-reference).
+
+|Permission type|Permissions (from least to most privileged)|
+|:|:|
+|Delegated (work or school account)|Team.ReadBasic.All|
+|Delegated (personal Microsoft account)|Not supported.|
+|Application|Team.ReadBasic.All|
+
+## HTTP request
+
+<!-- {
+ "blockType": "ignored"
+}
+-->
+``` http
+GET /teamwork/deletedTeams
+```
+
+## Optional query parameters
+This method supports some of the OData query parameters to help customize the response. For general information, see [OData query parameters](/graph/query-parameters).
+
+## Request headers
+|Name|Description|
+|:|:|
+|Authorization|Bearer {token}. Required.|
+
+## Request body
+Do not supply a request body for this method.
+
+## Response
+
+If successful, this method returns a `200 OK` response code and a collection of [deletedTeam](../resources/deletedteam.md) objects in the response body.
+
+## Examples
+
+### Request
+The following is an example of a request.
+<!-- {
+ "blockType": "request",
+ "name": "list_deletedteam"
+}
+-->
+``` http
+GET https://graph.microsoft.com/beta/teamwork/deletedTeams
+```
++
+### Response
+The following is an example of the response.
+>**Note:** The response object shown here might be shortened for readability.
+<!-- {
+ "blockType": "response",
+ "truncated": true,
+ "@odata.type": "microsoft.graph.deletedTeam",
+ "isCollection": true
+}
+-->
+``` http
+HTTP/1.1 200 OK
+Content-Type: application/json
+
+{
+ "value": [
+ {
+ "@odata.type": "#microsoft.graph.deletedTeam",
+ "id": "bac01407-8047-d8d4-2547-988daf836adf"
+ }
+ ]
+}
+```
+
v1.0 Crosstenantaccesspolicy Overview https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/beta/resources/crosstenantaccesspolicy-overview.md
Cross-tenant access settings is used to enable collaboration with Azure AD organ
+ Microsoft Azure commercial and Microsoft Azure Government + Microsoft Azure commercial and Microsoft Azure China
-<!Learn more about [collaborating with organizations from a different Microsoft cloud](azure/active-directory/external-identities/cross-cloud-settings).>
+Learn more about [collaborating with organizations from a different Microsoft cloud](https://docs.microsoft.com/azure/active-directory/external-identities/cross-cloud-settings).
## Interpreting the API response
v1.0 Deletedteam https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/beta/resources/deletedteam.md
+
+ Title: "deletedTeam resource type"
+description: "Represents a deleted team in Microsoft Teams."
+
+ms.localizationpriority: high
++
+# deletedTeam resource type
+
+Namespace: microsoft.graph
++
+Represents a deleted [team](../resources/team.md) in Microsoft Teams.
+
+Every deleted team is associated with a [Microsoft 365 group](../resources/group.md). For more information about working with groups and members in teams, see [Use the Microsoft Graph API to work with Microsoft Teams](teams-api-overview.md).
+
+Inherits from [entity](../resources/entity.md).
+
+## Methods
+|Method|Return type|Description|
+|:|:|:|
+|[getAllMessages](../api/deletedteam-getallmessages.md)|[chatMessage](../resources/chatmessage.md) collection|Retrieve all [messages](../resources/chatmessage.md) across all [channels](../resources/channel.md) in a [deleted team](../resources/deletedteam.md)|
+
+## Properties
+|Property|Type|Description|
+|:|:|:|
+|id|String|The ID of a deleted team. Inherited from [entity](../resources/entity.md).|
+
+## Relationships
+|Relationship|Type|Description|
+|:|:|:|
+|channels|[channel](../resources/channel.md) collection|The channels those are either shared with this deleted team or created in this deleted team.|
+
+## JSON representation
+The following is a JSON representation of the resource.
+<!-- {
+ "blockType": "resource",
+ "keyProperty": "id",
+ "@odata.type": "microsoft.graph.deletedTeam",
+ "baseType": "microsoft.graph.entity",
+ "openType": false
+}
+-->
+``` json
+{
+ "@odata.type": "#microsoft.graph.deletedTeam",
+ "id": "String (identifier)"
+}
+```
+
v1.0 List https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/beta/resources/list.md
This resource contains the top level properties of the list, including template
## Tasks on a list The following tasks are available for list resources.
-**Note:** This beta only allows navigating lists, not creating or updating them.
-You can, however, create or update [list items][listItem].
All examples below are relative to a site, for example, `https://graph.microsoft.com/beta/sites/{site-id}`.
v1.0 Teamwork https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/beta/resources/teamwork.md
Namespace: microsoft.graph
A container for the range of Microsoft Teams functionalities that are available for the organization.
+## Methods
+
+| Method | Return Type |Description |
+|:--|:-|:--|
+|[List deletedTeams](../api/teamwork-list-deletedteams.md)|[deletedTeam](../resources/deletedteam.md) collection|Get a list of the [deletedTeam](../resources/deletedteam.md) objects and their properties.|
+ ## Properties | Property | Type | Description |
A container for the range of Microsoft Teams functionalities that are available
| Relationship | Type | Description | |:|:--|:-|
+|deletedTeams|[deletedTeam](../resources/deletedteam.md) collection| A collection of deleted teams.|
|devices|[teamworkDevice](../resources/teamworkdevice.md) collection|The Teams devices provisioned for the tenant.| |workforceIntegrations|[workforceIntegration](../resources/workforceintegration.md) collection| A workforce integration with shifts.|
The following is a JSON representation of the resource.
"baseType": "microsoft.graph.entity" }-->
-```json
+``` json
{
- "id": "string"
+ "@odata.type": "#microsoft.graph.teamwork",
+ "id": "String (identifier)"
}- ```
+## See also
+
+- [userTeamwork resource](userteamwork.md)
+ <!-- uuid: 8fcb5dbc-d5aa-4681-8e31-b001d5168d79 2015-10-25 14:57:30 UTC --> <!--
The following is a JSON representation of the resource.
"suppressions": [] } -->-
-## See Also
--- [userTeamwork resource](userteamwork.md)
v1.0 Crosstenantaccesspolicy Get https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/api/crosstenantaccesspolicy-get.md
+
+ Title: "Get crossTenantAccessPolicy"
+description: "Read the properties and relationships of a crossTenantAccessPolicy object."
+
+ms.localizationpriority: medium
++
+# Get crossTenantAccessPolicy
+
+Namespace: microsoft.graph
+
+Read the properties and relationships of a [crossTenantAccessPolicy](../resources/crosstenantaccesspolicy.md) object.
+
+## Permissions
+
+One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Permissions](/graph/permissions-reference).
+
+|Permission type|Permissions (from least to most privileged)|
+|:|:|
+|Delegated (work or school account)|Policy.Read.All, Policy.ReadWrite.CrossTenantAccess|
+|Delegated (personal Microsoft account)|Not applicable|
+|Application|Policy.Read.All, Policy.ReadWrite.CrossTenantAccess|
+
+## HTTP request
+
+<!-- {
+ "blockType": "ignored"
+}
+-->
+
+``` http
+GET /policies/crossTenantAccessPolicy
+```
+
+## Request headers
+
+|Name|Description|
+|:|:|
+|Authorization|Bearer {token}. Required.|
+
+## Request body
+
+Do not supply a request body for this method.
+
+## Response
+
+If successful, this method returns a `200 OK` response code and a [crossTenantAccessPolicy](../resources/crosstenantaccesspolicy.md) object in the response body.
+
+## Examples
+
+### Request
+
+<!-- {
+ "blockType": "request",
+ "name": "get_crosstenantaccesspolicy"
+}
+-->
+
+``` http
+GET https://graph.microsoft.com/v1.0/policies/crossTenantAccessPolicy
+```
+
+### Response
+
+<!-- {
+ "blockType": "response",
+ "truncated": true,
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicy"
+}
+-->
+
+``` http
+HTTP/1.1 200 OK
+Content-Type: application/json
+
+{
+ "value": {
+ "@odata.type": "#microsoft.graph.crossTenantAccessPolicy",
+ "displayName": "CrossTenantAccessPolicy",
+ "definition": "Cross tenant access policy..."
+ }
+}
+```
v1.0 Crosstenantaccesspolicy List Partners https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/api/crosstenantaccesspolicy-list-partners.md
+
+ Title: "List partners"
+description: "Get a list of all partner configurations within a cross-tenant access policy."
+
+ms.localizationpriority: medium
++
+# List partners
+
+Namespace: microsoft.graph
+
+Get a list of all partner configurations within a cross-tenant access policy.
+
+## Permissions
+
+One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Permissions](/graph/permissions-reference).
+
+|Permission type|Permissions (from least to most privileged)|
+|:|:|
+|Delegated (work or school account)|Policy.Read.All, Policy.ReadWrite.CrossTenantAccess|
+|Delegated (personal Microsoft account)|Not applicable|
+|Application|Policy.Read.All, Policy.ReadWrite.CrossTenantAccess|
+
+## HTTP request
+
+<!-- {
+ "blockType": "ignored"
+}
+-->
+
+``` http
+GET /policies/crossTenantAccessPolicy/partners
+```
+
+## Request headers
+
+|Name|Description|
+|:|:|
+|Authorization|Bearer {token}. Required.|
+
+## Request body
+
+Do not supply a request body for this method.
+
+## Response
+
+If successful, this method returns a `200 OK` response code and a collection of [crossTenantAccessPolicyConfigurationPartner](../resources/crosstenantaccesspolicyconfigurationpartner.md) objects in the response body.
+
+## Examples
+
+### Request
+
+<!-- {
+ "blockType": "request",
+ "name": "list_crosstenantaccesspolicyconfigurationpartner"
+}
+-->
+
+``` http
+GET https://graph.microsoft.com/v1.0/policies/crossTenantAccessPolicy/partners
+```
+
+### Response
+
+>**Note:** The response object shown here might be shortened for readability.
+<!-- {
+ "blockType": "response",
+ "truncated": true,
+ "@odata.type": "Collection(microsoft.graph.crossTenantAccessPolicyConfigurationPartner)"
+}
+-->
+
+``` http
+HTTP/1.1 200 OK
+Content-Type: application/json
+
+{
+ "value": [
+ {
+ "tenantId": "123f4846-ba00-4fd7-ba43-dac1f8f63013",
+ "inboundTrust": null,
+ "b2bCollaborationInbound": null,
+ "b2bCollaborationOutbound": null,
+ "b2bDirectConnectOutbound": null,
+ "b2bDirectConnectInbound":
+ {
+ "usersAndGroups":
+ {
+ "accessType": "allowed",
+ "targets": [
+ {
+ "target": "AllUsers",
+ "targetType": "user"
+ }
+ ]
+ },
+ "applications":
+ {
+ "accessType": "allowed",
+ "targets": [
+ {
+ "target": "Office365",
+ "targetType": "application"
+ }
+ ]
+ }
+ }
+ }
+ ]
+}
+```
v1.0 Crosstenantaccesspolicy Post Partners https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/api/crosstenantaccesspolicy-post-partners.md
+
+ Title: "Create crossTenantAccessPolicyConfigurationPartner"
+description: "Create a new partner configuration in a cross-tenant access policy."
+
+ms.localizationpriority: medium
++
+# Create crossTenantAccessPolicyConfigurationPartner
+
+Namespace: microsoft.graph
+
+Create a new partner configuration in a cross-tenant access policy.
+
+## Permissions
+
+One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Permissions](/graph/permissions-reference).
+
+|Permission type|Permissions (from least to most privileged)|
+|:|:|
+|Delegated (work or school account)|Policy.ReadWrite.CrossTenantAccess|
+|Delegated (personal Microsoft account)|Not applicable|
+|Application|Policy.ReadWrite.CrossTenantAccess|
+
+## HTTP request
+
+<!-- {
+ "blockType": "ignored"
+}
+-->
+
+``` http
+POST /policies/crossTenantAccessPolicy/partners
+```
+
+## Request headers
+
+|Name|Description|
+|:|:|
+|Authorization|Bearer {token}. Required.|
+|Content-Type|application/json. Required.|
+
+## Request body
+
+In the request body, supply a JSON representation of the [crossTenantAccessPolicyConfigurationPartner](../resources/crosstenantaccesspolicyconfigurationpartner.md) object.
+
+The following table shows the properties that are required when you create the [crossTenantAccessPolicyConfigurationPartner](../resources/crosstenantaccesspolicyconfigurationpartner.md).
+
+|Property|Type|Description|
+|:|:|:|
+| b2bCollaborationInbound | [crossTenantAccessPolicyB2BSetting](../resources/crosstenantaccesspolicyb2bsetting.md) | Defines your partner-specific configuration for users from other organizations accessing your resources via Azure AD B2B collaboration. |
+| b2bCollaborationOutbound | [crossTenantAccessPolicyB2BSetting](../resources/crosstenantaccesspolicyb2bsetting.md) | Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B collaboration. |
+| b2bDirectConnectInbound | [crossTenantAccessPolicyB2BSetting](../resources/crosstenantaccesspolicyb2bsetting.md) | Defines your partner-specific configuration for users from other organizations accessing your resources via Azure AD B2B direct connect. |
+| b2bDirectConnectOutbound | [crossTenantAccessPolicyB2BSetting](../resources/crosstenantaccesspolicyb2bsetting.md) | Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B direct connect. |
+| inboundTrust | [crossTenantAccessPolicyInboundTrust](../resources/crosstenantaccesspolicyinboundtrust.md) | Determines the partner-specific configuration for trusting other Conditional Access claims from external Azure AD organizations. |
+| tenantId | String | The tenant identifier for the partner Azure Active Directory (Azure AD) organization. |
+
+## Response
+
+If successful, this method returns a `201 Created` response code and a [crossTenantAccessPolicyConfigurationPartner](../resources/crosstenantaccesspolicyconfigurationpartner.md) object in the response body.
+
+## Examples
+
+### Request
+
+<!-- {
+ "blockType": "request",
+ "name": "create_crosstenantaccesspolicyconfigurationpartner_from_"
+}
+-->
+
+``` http
+POST https://graph.microsoft.com/v1.0/policies/crossTenantAccessPolicy/partners
+Content-Type: application/json
+
+{
+ "tenantId": "3d0f5dec-5d3d-455c-8016-e2af1ae4d31a",
+ "b2bDirectConnectOutbound":
+ {
+ "usersAndGroups":
+ {
+ "accessType": "blocked",
+ "targets": [
+ {
+ "target": "6f546279-4da5-4b53-a095-09ea0cef9971",
+ "targetType": "group"
+ }
+ ]
+ }
+ },
+ "b2bDirectConnectInbound":
+ {
+ "applications":
+ {
+ "accessType": "allowed",
+ "targets": [
+ {
+ "target": "Office365",
+ "targetType": "application"
+ }
+ ]
+ }
+ }
+}
+```
+
+### Response
+
+The following is an example of the response.
+>**Note:** The response object shown here might be shortened for readability.
+<!-- {
+ "blockType": "response",
+ "truncated": true,
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyConfigurationPartner"
+}
+-->
+
+``` http
+HTTP/1.1 201 Created
+Content-Type: application/json
+
+{
+ "tenantId": "3d0f5dec-5d3d-455c-8016-e2af1ae4d31a",
+ "inboundTrust": null,
+ "b2bCollaborationInbound": null,
+ "b2bCollaborationOutbound": null,
+ "b2bDirectConnectOutbound":
+ {
+ "usersAndGroups":
+ {
+ "accessType": "blocked",
+ "targets": [
+ {
+ "target": "6f546279-4da5-4b53-a095-09ea0cef9971",
+ "targetType": "group"
+ }
+ ]
+ }
+ },
+ "b2bDirectConnectInbound":
+ {
+ "applications":
+ {
+ "accessType": "allowed",
+ "targets": [
+ {
+ "target": "Office365",
+ "targetType": "application"
+ }
+ ]
+ }
+ }
+}
+```
v1.0 Crosstenantaccesspolicy Update https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/api/crosstenantaccesspolicy-update.md
+
+ Title: "Update crossTenantAccessPolicy"
+description: "Update the properties of a cross-tenant access policy."
+
+ms.localizationpriority: medium
++
+# Update crossTenantAccessPolicy
+
+Namespace: microsoft.graph
+
+Update the properties of a [cross-tenant access policy](../resources/crosstenantaccesspolicy.md).
+
+## Permissions
+
+One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Permissions](/graph/permissions-reference).
+
+|Permission type|Permissions (from least to most privileged)|
+|:|:|
+|Delegated (work or school account)|Policy.ReadWrite.CrossTenantAccess|
+|Delegated (personal Microsoft account)|Not applicable|
+|Application|Policy.ReadWrite.CrossTenantAccess|
+
+## HTTP request
+
+<!-- {
+ "blockType": "ignored"
+}
+-->
+
+``` http
+PATCH /policies/crossTenantAccessPolicy
+```
+
+## Request headers
+
+|Name|Description|
+|:|:|
+|Authorization|Bearer {token}. Required.|
+|Content-Type|application/json. Required.|
+
+## Request body
++
+|Property|Type|Description|
+|:|:|:|
+|displayName|String|The display name of the cross-tenant access policy.|
+
+## Response
+
+If successful, this method returns a `204 No Content` response code.
+
+The [crossTenantAccessPolicy](../resources/crosstenantaccesspolicy.md) object size is currently limited to 25KB. This method will return a `400 Bad Request` error code if the size of the policy will exceed 25KB.
+
+## Examples
+
+### Request
+
+<!-- {
+ "blockType": "request",
+ "name": "update_crosstenantaccesspolicy"
+}
+-->
+
+``` http
+PATCH https://graph.microsoft.com/v1.0/policies/crossTenantAccessPolicy
+Content-Type: application/json
+
+{
+ "displayName": "CrossTenantAccessPolicy",
+}
+```
+
+### Response
+
+<!-- {
+ "blockType": "response",
+ "truncated": true
+}
+-->
+
+``` http
+HTTP/1.1 204 No Content
+```
v1.0 Crosstenantaccesspolicyconfigurationdefault Get https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/api/crosstenantaccesspolicyconfigurationdefault-get.md
+
+ Title: "Get crossTenantAccessPolicyConfigurationDefault"
+description: "Read the default configuration of a cross-tenant access policy."
+
+ms.localizationpriority: medium
++
+# Get crossTenantAccessPolicyConfigurationDefault
+
+Namespace: microsoft.graph
+
+Read the [default configuration](../resources/crosstenantaccesspolicyconfigurationdefault.md) of a cross-tenant access policy. This default configuration may be the service default assigned by Azure AD (**isServiceDefault** is `true`) or may be customized in your tenant (**isServiceDefault** is `false`).
+
+## Permissions
+
+One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Permissions](/graph/permissions-reference).
+
+|Permission type|Permissions (from least to most privileged)|
+|:|:|
+|Delegated (work or school account)|Policy.Read.All, Policy.ReadWrite.CrossTenantAccess|
+|Delegated (personal Microsoft account)|Not applicable|
+|Application|Policy.Read.All, Policy.ReadWrite.CrossTenantAccess|
+
+## HTTP request
+
+<!-- {
+ "blockType": "ignored"
+}
+-->
+
+``` http
+GET /policies/crossTenantAccessPolicy/default
+```
+
+## Request headers
+
+|Name|Description|
+|:|:|
+|Authorization|Bearer {token}. Required.|
+
+## Request body
+
+Do not supply a request body for this method.
+
+## Response
+
+If successful, this method returns a `200 OK` response code and a [crossTenantAccessPolicyConfigurationDefault](../resources/crosstenantaccesspolicyconfigurationdefault.md) object in the response body.
+
+## Examples
+
+### Request
+
+<!-- {
+ "blockType": "request",
+ "name": "get_crosstenantaccesspolicyconfigurationdefault"
+}
+-->
+
+``` http
+GET https://graph.microsoft.com/v1.0/policies/crossTenantAccessPolicy/default
+```
+
+### Response
+
+The following response object shows a default cross-tenant policy inherited from Azure AD, as identified by **isServiceDefault** set to `true`.
+>**Note:** The response object shown here might be shortened for readability.
+<!-- {
+ "blockType": "response",
+ "truncated": true,
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyConfigurationDefault"
+}
+-->
+
+``` http
+HTTP/1.1 200 OK
+Content-Type: application/json
+
+{
+ "isServiceDefault": true,
+ "inboundTrust":
+ {
+ "isMfaAccepted": false,
+ "isCompliantDeviceAccepted": false,
+ "isHybridAzureADJoinedDeviceAccepted": false,
+ },
+ "b2bCollaborationOutbound":
+ {
+ "usersAndGroups":
+ {
+ "accessType": "allowed",
+ "targets": [
+ {
+ "target": "AllUsers",
+ "targetType": "user"
+ }
+ ]
+ },
+ "applications":
+ {
+ "accessType": "allowed",
+ "targets": [
+ {
+ "target": "AllApplications",
+ "targetType": "application"
+ }
+ ]
+ }
+ },
+ "b2bCollaborationInbound":
+ {
+ "usersAndGroups":
+ {
+ "accessType": "allowed",
+ "targets": [
+ {
+ "target": "AllUsers",
+ "targetType": "user"
+ }
+ ]
+ },
+ "applications":
+ {
+ "accessType": "allowed",
+ "targets": [
+ {
+ "target": "AllApplications",
+ "targetType": "application"
+ }
+ ]
+ }
+ },
+ "b2bDirectConnectOutbound":
+ {
+ "usersAndGroups":
+ {
+ "accessType": "blocked",
+ "targets": [
+ {
+ "target": "AllUsers",
+ "targetType": "user"
+ }
+ ]
+ },
+ "applications":
+ {
+ "accessType": "blocked",
+ "targets": [
+ {
+ "target": "AllApplications",
+ "targetType": "application"
+ }
+ ]
+ }
+ },
+ "b2bDirectConnectInbound":
+ {
+ "usersAndGroups":
+ {
+ "accessType": "blocked",
+ "targets": [
+ {
+ "target": "AllUsers",
+ "targetType": "user"
+ }
+ ]
+ },
+ "applications":
+ {
+ "accessType": "blocked",
+ "targets": [
+ {
+ "target": "AllApplications",
+ "targetType": "application"
+ }
+ ]
+ }
+ }
+}
+```
v1.0 Crosstenantaccesspolicyconfigurationdefault Resettosystemdefault https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/api/crosstenantaccesspolicyconfigurationdefault-resettosystemdefault.md
+
+ Title: "crossTenantAccessPolicyConfigurationDefault: resetToSystemDefault"
+description: "Reset any changes made to the default configuration in a cross-tenant access policy back to the system default."
+
+ms.localizationpriority: medium
++
+# crossTenantAccessPolicyConfigurationDefault: resetToSystemDefault
+
+Namespace: microsoft.graph
+
+Reset any changes made to the default configuration in a cross-tenant access policy back to the system default.
+
+## Permissions
+
+One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Permissions](/graph/permissions-reference).
+
+|Permission type|Permissions (from least to most privileged)|
+|:|:|
+|Delegated (work or school account)|Policy.ReadWrite.CrossTenantAccess|
+|Delegated (personal Microsoft account)|Not applicable|
+|Application|Policy.ReadWrite.CrossTenantAccess|
+
+## HTTP request
+
+<!-- {
+ "blockType": "ignored"
+}
+-->
+
+``` http
+POST /policies/crossTenantAccessPolicy/default/resetToSystemDefault
+```
+
+## Request headers
+
+|Name|Description|
+|:|:|
+|Authorization|Bearer {token}. Required.|
+
+## Request body
+
+Do not supply a request body for this method.
+
+## Response
+
+If successful, this action returns a `204 No Content` response code. To confirm that the default configuration has been restored to the system defaults, run [Get crossTenantAccessPolicyConfigurationDefault](../api/crosstenantaccesspolicyconfigurationdefault-get.md) and confirm that **isSystemDefault** is set to `true`.
+
+## Examples
+
+### Request
+
+<!-- {
+ "blockType": "request",
+ "name": "crosstenantaccesspolicyconfigurationdefault_resettosystemdefault"
+}
+-->
+
+``` http
+POST https://graph.microsoft.com/v1.0/policies/crossTenantAccessPolicy/default/resetToSystemDefault
+```
+
+### Response
+
+<!-- {
+ "blockType": "response",
+ "truncated": true
+}
+-->
+
+``` http
+HTTP/1.1 204 No Content
+```
v1.0 Crosstenantaccesspolicyconfigurationdefault Update https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/api/crosstenantaccesspolicyconfigurationdefault-update.md
+
+ Title: "Update crossTenantAccessPolicyConfigurationDefault"
+description: "Update the default configuration of a cross-tenant access policy."
+
+ms.localizationpriority: medium
++
+# Update crossTenantAccessPolicyConfigurationDefault
+
+Namespace: microsoft.graph
+
+Update the [default configuration](../resources/crosstenantaccesspolicyconfigurationdefault.md) of a cross-tenant access policy.
+
+## Permissions
+
+One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Permissions](/graph/permissions-reference).
+
+|Permission type|Permissions (from least to most privileged)|
+|:|:|
+|Delegated (work or school account)|Policy.ReadWrite.CrossTenantAccess|
+|Delegated (personal Microsoft account)|Not applicable|
+|Application|Policy.ReadWrite.CrossTenantAccess|
+
+## HTTP request
+
+<!-- {
+ "blockType": "ignored"
+}
+-->
+
+``` http
+PATCH /policies/crossTenantAccessPolicy/default
+```
+
+## Request headers
+
+|Name|Description|
+|:|:|
+|Authorization|Bearer {token}. Required.|
+|Content-Type|application/json. Required.|
+
+## Request body
++
+|Property|Type|Description|
+|:|:|:|
+| inboundTrust | [crossTenantAccessPolicyInboundTrust](../resources/crosstenantaccesspolicyinboundtrust.md) | Determines the default configuration for trusting other Conditional Access claims from external Azure AD organizations. |
+| b2bCollaborationInbound | [crossTenantAccessPolicyB2BSetting](../resources/crosstenantaccesspolicyb2bsetting.md) | Defines your default configuration for users from other organizations accessing your resources via Azure AD B2B collaboration. |
+| b2bCollaborationOutbound | [crossTenantAccessPolicyB2BSetting](../resources/crosstenantaccesspolicyb2bsetting.md) | Defines your default configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B collaboration. |
+| b2bDirectConnectInbound | [crossTenantAccessPolicyB2BSetting](../resources/crosstenantaccesspolicyb2bsetting.md) | Defines your default configuration for users from other organizations accessing your resources via Azure AD B2B direct connect. |
+| b2bDirectConnectOutbound | [crossTenantAccessPolicyB2BSetting](../resources/crosstenantaccesspolicyb2bsetting.md) | Defines your default configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B direct connect. |
+
+## Response
+
+If successful, this method returns a `204 No Content` response code.
+
+## Examples
+
+### Request
+
+<!-- {
+ "blockType": "request",
+ "name": "update_crosstenantaccesspolicyconfigurationdefault"
+}
+-->
+
+``` http
+PATCH https://graph.microsoft.com/v1.0/policies/crossTenantAccessPolicy/default
+Content-Type: application/json
+
+{
+ "b2bCollaborationOutbound":
+ {
+ "usersAndGroups":
+ {
+ "accessType": "blocked",
+ "targets": [
+ {
+ "target": "0be493dc-cb56-4a53-936f-9cf64410b8b0",
+ "targetType": "group"
+ }
+ ]
+ },
+ "applications":
+ {
+ "accessType": "blocked",
+ "targets": [
+ {
+ "target": "AllApplications",
+ "targetType": "application"
+ }
+ ]
+ }
+ }
+}
+```
+
+### Response
+
+<!-- {
+ "blockType": "response",
+ "truncated": true
+}
+-->
+
+``` http
+HTTP/1.1 204 No Content
+```
v1.0 Crosstenantaccesspolicyconfigurationpartner Delete https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/api/crosstenantaccesspolicyconfigurationpartner-delete.md
+
+ Title: "Delete crossTenantAccessPolicyConfigurationPartner"
+description: "Delete a partner-specific configuration in a cross-tenant access policy."
+
+ms.localizationpriority: medium
++
+# Delete crossTenantAccessPolicyConfigurationPartner
+
+Namespace: microsoft.graph
+
+Delete a [partner-specific configuration](../resources/crosstenantaccesspolicyconfigurationpartner.md) in a cross-tenant access policy.
+
+## Permissions
+
+One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Permissions](/graph/permissions-reference).
+
+|Permission type|Permissions (from least to most privileged)|
+|:|:|
+|Delegated (work or school account)|Policy.ReadWrite.CrossTenantAccess|
+|Delegated (personal Microsoft account)|Not applicable|
+|Application|Policy.ReadWrite.CrossTenantAccess|
+
+## HTTP request
+
+<!-- {
+ "blockType": "ignored"
+}
+-->
+
+``` http
+DELETE /policies/crossTenantAccessPolicy/partners/{id}
+```
+
+## Request headers
+
+|Name|Description|
+|:|:|
+|Authorization|Bearer {token}. Required.|
+
+## Request body
+
+Do not supply a request body for this method.
+
+## Response
+
+If successful, this method returns a `204 No Content` response code.
+
+## Examples
+
+### Request
+
+<!-- {
+ "blockType": "request",
+ "name": "delete_crosstenantaccesspolicyconfigurationpartner"
+}
+-->
+
+``` http
+DELETE https://graph.microsoft.com/v1.0/policies/crossTenantAccessPolicy/partners/9c5d131d-b1c3-4fc4-9e3f-c6557947d551
+```
+
+### Response
+
+<!-- {
+ "blockType": "response",
+ "truncated": true
+}
+-->
+
+``` http
+HTTP/1.1 204 No Content
+```
v1.0 Crosstenantaccesspolicyconfigurationpartner Get https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/api/crosstenantaccesspolicyconfigurationpartner-get.md
+
+ Title: "Get crossTenantAccessPolicyConfigurationPartner"
+description: "Read the properties and relationships of a partner-specific configuration."
+
+ms.localizationpriority: medium
++
+# Get crossTenantAccessPolicyConfigurationPartner
+
+Namespace: microsoft.graph
+
+Read the properties and relationships of a [partner-specific](../resources/crosstenantaccesspolicyconfigurationpartner.md) configuration.
+
+## Permissions
+
+One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Permissions](/graph/permissions-reference).
+
+|Permission type|Permissions (from least to most privileged)|
+|:|:|
+|Delegated (work or school account)|Policy.Read.All, Policy.ReadWrite.CrossTenantAccess|
+|Delegated (personal Microsoft account)|Not applicable|
+|Application|Policy.Read.All, Policy.ReadWrite.CrossTenantAccess|
+
+## HTTP request
+
+<!-- {
+ "blockType": "ignored"
+}
+-->
+
+``` http
+GET /policies/crossTenantAccessPolicy/partners/{id}
+```
+
+## Request headers
+
+|Name|Description|
+|:|:|
+|Authorization|Bearer {token}. Required.|
+
+## Request body
+
+Do not supply a request body for this method.
+
+## Response
+
+If successful, this method returns a `200 OK` response code and a [crossTenantAccessPolicyConfigurationPartner](../resources/crosstenantaccesspolicyconfigurationpartner.md) object in the response body.
+
+## Examples
+
+### Request
+
+<!-- {
+ "blockType": "request",
+ "name": "get_crosstenantaccesspolicyconfigurationpartner"
+}
+-->
+
+``` http
+GET https://graph.microsoft.com/v1.0/policies/crossTenantAccessPolicy/partners/9c5d131d-b1c3-4fc4-9e3f-c6557947d551
+```
+
+### Response
+
+>**Note:** The response object shown here might be shortened for readability.
+<!-- {
+ "blockType": "response",
+ "truncated": true,
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyConfigurationPartner"
+}
+-->
+
+``` http
+HTTP/1.1 200 OK
+Content-Type: application/json
+
+{
+ "tenantId": "9c5d131d-b1c3-4fc4-9e3f-c6557947d551",
+ "inboundTrust": null,
+ "b2bCollaborationInbound": null,
+ "b2bCollaborationOutbound": null,
+ "b2bDirectConnectOutbound": null,
+ "b2bDirectConnectInbound":
+ {
+ "usersAndGroups":
+ {
+ "accessType": "allowed",
+ "targets": [
+ {
+ "target": "AllUsers",
+ "targetType": "user"
+ }
+ ]
+ },
+ "applications":
+ {
+ "accessType": "allowed",
+ "targets": [
+ {
+ "target": "Office365",
+ "targetType": "application"
+ }
+ ]
+ }
+ }
+}
+```
v1.0 Crosstenantaccesspolicyconfigurationpartner Update https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/api/crosstenantaccesspolicyconfigurationpartner-update.md
+
+ Title: "Update crossTenantAccessPolicyConfigurationPartner"
+description: "Update the properties of a partner-specific configuration."
+
+ms.localizationpriority: medium
++
+# Update crossTenantAccessPolicyConfigurationPartner
+
+Namespace: microsoft.graph
+
+Update the properties of a [partner-specific](../resources/crosstenantaccesspolicyconfigurationpartner.md) configuration.
+
+## Permissions
+
+One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Permissions](/graph/permissions-reference).
+
+|Permission type|Permissions (from least to most privileged)|
+|:|:|
+|Delegated (work or school account)|Policy.ReadWrite.CrossTenantAccess|
+|Delegated (personal Microsoft account)|Not applicable|
+|Application|Policy.ReadWrite.CrossTenantAccess|
+
+## HTTP request
+
+<!-- {
+ "blockType": "ignored"
+}
+-->
+
+``` http
+PATCH /policies/crossTenantAccessPolicy/partners/{id}
+```
+
+## Request headers
+
+|Name|Description|
+|:|:|
+|Authorization|Bearer {token}. Required.|
+|Content-Type|application/json. Required.|
+
+## Request body
++
+|Property|Type|Description|
+|:|:|:|
+| b2bCollaborationInbound | [crossTenantAccessPolicyB2BSetting](../resources/crosstenantaccesspolicyb2bsetting.md) | Defines your partner-specific configuration for users from other organizations accessing your resources via Azure AD B2B collaboration. |
+| b2bCollaborationOutbound | [crossTenantAccessPolicyB2BSetting](../resources/crosstenantaccesspolicyb2bsetting.md) | Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B collaboration. |
+| b2bDirectConnectInbound | [crossTenantAccessPolicyB2BSetting](../resources/crosstenantaccesspolicyb2bsetting.md) | Defines your partner-specific configuration for users from other organizations accessing your resources via Azure AD B2B direct connect. |
+| b2bDirectConnectOutbound | [crossTenantAccessPolicyB2BSetting](../resources/crosstenantaccesspolicyb2bsetting.md) | Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B direct connect. |
+| inboundTrust | [crossTenantAccessPolicyInboundTrust](../resources/crosstenantaccesspolicyinboundtrust.md) | Determines the partner-specific configuration for trusting other Conditional Access claims from external Azure Active Directory (Azure AD) organizations. |
+
+## Response
+
+If successful, this method returns a `204 No Content` response code.
+
+## Examples
+
+### Request
+
+<!-- {
+ "blockType": "request",
+ "name": "update_crosstenantaccesspolicyconfigurationpartner"
+}
+-->
+
+``` http
+PATCH https://graph.microsoft.com/v1.0/policies/crossTenantAccessPolicy/partners/90e29127-71ad-49c7-9ce8-db3f41ea06f1
+Content-Type: application/json
+
+{
+ "inboundTrust":
+ {
+ "isMfaAccepted": true,
+ "isCompliantDeviceAccepted": true,
+ "isHybridAzureADJoinedDeviceAccepted" : true
+ }
+}
+```
+
+### Response
+
+<!-- {
+ "blockType": "response",
+ "truncated": true
+}
+-->
+
+``` http
+HTTP/1.1 204 No Content
+```
v1.0 Driveitem Createuploadsession https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/api/driveitem-createuploadsession.md
Previously updated : 09/10/2017 Title: Resumable file upload
+ Title: "driveItem: createUploadSession"
ms.localizationpriority: high ms.prod: "sharepoint" description: "Create an upload session to allow your app to upload files up to the maximum file size." doc_type: apiPageType
-# Upload large files with an upload session
+# driveItem: createUploadSession
Namespace: microsoft.graph
The following example controls the behavior if the filename is already taken, an
## Parameters
-| Parameter | Type | Description
-|:|:|:
-| item | [driveItemUploadableProperties](../resources/driveItemUploadableProperties.md) | Data about the file being uploaded
-| deferCommit | Boolean | If set to true, final creation of the file in the destination will require an explicit request. Only on OneDrive for Business.
+| Parameter | Type | Description |
+|:|:-|:|
+| deferCommit | Boolean | If set to `true`, the final creation of the file in the destination will require an explicit request. |
+| item | [driveItemUploadableProperties](../resources/driveItemUploadableProperties.md) | Data about the file being uploaded. |
### Request
v1.0 Driveitemversion Get Contents https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/api/driveitemversion-get-contents.md
Namespace: microsoft.graph
Retrieve the contents of a specific version of a [driveItem](../resources/driveitem.md).
+>**Note:** Getting the content of the current version is not supported. To do that, use the [Download the contents of a driveItem](driveitem-get-content.md) method.
++ ## Permissions One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Permissions](/graph/permissions-reference).
Pre-authenticated download URLs are only valid for a short period of time (a few
This example retrieves a version of a file in the current user's drive.
-### HTTP request
+### Request
# [HTTP](#tab/http)
v1.0 Site List https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/api/site-list.md
+
+ Title: "List sites"
+description: "List all available sites in an organization or list the sites that match the provided filter criteria and query options."
+ms.localizationpriority: medium
+++
+# List sites
+
+Namespace: microsoft.graph
+
+List all available [sites][] in an organization.
+
+Specific filter criteria and query options are also supported and described below:
+
+| Filter statement | Select statement | Description
+|:--|:|:--
+|`siteCollection/root ne null` | `siteCollection,webUrl` | Lists all root-level site collections in the organization. Useful for discovering the home site for each geography.
+
+In addition, you can use a **[$search][]** query against the `/sites` collection to find sites matching given keywords.
+
+[$search]: site-search.md
+[sites]: ../resources/site.md
+
+For more guidance about building applications that use site discovery for scanning purposes, see [Best practices for discovering files and detecting changes at scale](/onedrive/developer/rest-api/concepts/scan-guidance?view=odsp-graph-online).
+
+## Permissions
+
+One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Permissions](/graph/permissions-reference).
+
+### List all site collections
+
+| Permission type | Permissions (from least to most privileged) |
+|:|:--|
+| Delegated (work or school account) | Not supported. |
+| Delegated (personal Microsoft account) | Not supported. |
+| Application | Sites.Read.All, Sites.ReadWrite.All |
+
+### Discover the home site for each geography
+
+| Permission type | Permissions (from least to most privileged) |
+|:|:--|
+| Delegated (work or school account) | Sites.Read.All, Sites.ReadWrite.All |
+| Delegated (personal Microsoft account) | Not supported. |
+| Application | Sites.Read.All, Sites.ReadWrite.All |
+
+## HTTP request
+
+<!-- { "blockType": "ignored" } -->
+
+```http
+GET /sites
+GET /sites?$filter=siteCollection/root ne null
+```
+
+## Example
+
+### Request
++
+<!-- { "blockType": "ignored" } -->
+
+```http
+GET https://graph.microsoft.com/v1.0/sites?$select=siteCollection,webUrl&$filter=siteCollection/root%20ne%20null
+```
+
+### Response
+
+<!-- { "blockType": "response", "@type": "microsoft.graph.site", "isCollection": true, "truncated": true } -->
+
+```http
+HTTP/1.1 200 OK
+Content-type: application/json
+
+{
+ "value": [
+ {
+ "id": "contoso.sharepoint.com,da60e844-ba1d-49bc-b4d4-d5e36bae9019,712a596e-90a1-49e3-9b48-bfa80bee8740",
+ "name": "Contoso USA",
+ "root": { },
+ "siteCollection": {
+ "hostname": "contoso.sharepoint.com",
+ "dataLocationCode": "NAM",
+ "root": { }
+ },
+ "webUrl": "https://contoso.sharepoint.com"
+ },
+ {
+ "id": "contoso-jpn.sharepoint.com,da60e844-ba1d-49bc-b4d4-d5e36bae9019,0271110f-634f-4300-a841-3a8a2e851851",
+ "name": "Contoso Japan",
+ "root": { },
+ "siteCollection": {
+ "hostname": "contoso-jp.sharepoint.com",
+ "dataLocationCode": "JPN",
+ "root": { }
+ },
+ "webUrl": "https://contoso-jp.sharepoint.com"
+ }
+ ]
+}
+```
+
+### Request
+
+<!-- { "blockType": "ignored" } -->
+
+```http
+GET https://graph.microsoft.com/v1.0/sites
+```
+
+### Response
+
+<!-- { "blockType": "response", "@type": "microsoft.graph.site", "isCollection": true, "truncated": true } -->
+
+```json
+HTTP/1.1 200 OK
+Content-type: application/json
+
+{
+ "value": [
+ {
+ "id": "contoso.sharepoint.com,bf6fb551-d508-4946-a439-b2a6154fc1d9,65a04b8b-1f44-442b-a1fc-9e5852fb946c",
+ "name": "Root Site",
+ "root": { },
+ "siteCollection": {
+ "hostname": "contoso.sharepoint.com",
+ "dataLocationCode": "NAM",
+ "root": { }
+ },
+ "webUrl": "https://contoso.sharepoint.com"
+ },
+ {
+ "id": "contoso.sharepoint.com,d9ecf079-9b13-4376-ac5d-f242dda55626,746dbcc1-fa2b-4120-b657-2670bae5bb6f",
+ "name": "Site A",
+ "root": { },
+ "siteCollection": {
+ "hostname": "contoso.sharepoint.com"
+ },
+ "webUrl": "https://contoso.sharepoint.com/sites/siteA"
+ },
+ {
+ "id": "contoso.sharepoint.com,fd1a778f-263e-4c43-acdf-d5c2519d80eb,c06016db-dfec-4f79-83a1-09c6dbfd7022",
+ "name": "Site B",
+ "root": { },
+ "siteCollection": {
+ "hostname": "contoso.sharepoint.com"
+ },
+ "webUrl": "https://contoso.sharepoint.com/sites/siteB"
+ }
+ ]
+}
+```
+
+<!--
+{
+ "type": "#page.annotation",
+ "description": "",
+ "keywords": "",
+ "section": "documentation",
+ "tocPath": "Site/List sites",
+ "suppressions": [
+ ]
+}
+-->
++
v1.0 Crosstenantaccesspolicy Overview https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/resources/crosstenantaccesspolicy-overview.md
+
+ Title: "Cross-tenant access settings API overview"
+description: "Cross-tenant access settings let you manage both B2B collaboration and B2B direct connect for your organization."
+
+ms.localizationpriority: medium
++
+# Cross-tenant access settings API overview
+
+Namespace: microsoft.graph
+
+In the traditional Azure AD B2B collaboration, any invited user from an organization could use their identity to access resources in external organizations. Administrators didn't have control over the user identities in their tenant that are allowed to sign in to external organizations. These limited controls made it difficult to prevent identities from your organization from being used in unauthorized ways.
+
+**Cross-tenant access settings** let you control and manage collaboration between users in your organization and other organizations. The control can be on either **outbound access** (how your users collaborate with other organizations), **inbound access** (how other organizations collaborate with you), or both.
+
+Granular controls let you determine the users, groups, and apps, both in your organization and in external organizations, that can participate in Azure AD B2B collaboration and Azure AD B2B direct connect. These controls are implemented through:
+++ **Default cross-tenant access settings** which set the baseline inbound and outbound access settings.
+ + In Azure AD B2B collaboration, both access settings are enabled by default. This means all your users can be invited to external organizations, and all your users can invite external users.
+ + In Azure AD B2B direct connect, both access settings are disabled by default.
+ + The service default settings may be updated.
++ **Partner-specific access settings** which allow you to configure customized settings for individual organizations. For the configured organizations, this configuration takes precedence over the default settings. Therefore, while Azure AD B2B collaboration and Azure AD B2B direct connect might be disabled across your organization by default, you can enable these features for a specific external organization.+
+> [!IMPORTANT]
+>
+> By configuring B2B direct connect outbound settings, you agree to allow external organizations that you have enabled outbound settings with to access limited contact data about your users. Microsoft shares this data with those organizations to help them send a request to connect with your users. Data collected by external organizations, including limited contact data, is subject to the privacy policies and practices of those organizations.
+
+## Default cross-tenant access settings
+
+Default cross-tenant access settings determine your stance for inbound and outbound collaboration with all other Azure AD organizations. Any external collaboration with an organization not listed explicitly in your cross-tenant access settings will inherit these default settings. Default settings are defined using the [crossTenantAccessPolicyConfigurationDefault](../resources/crosstenantaccesspolicyconfigurationdefault.md) resource type.
+
+By default, Azure AD assigns all Azure AD tenants a service default configuration for cross-tenant access settings. You can override these service defaults with your own configuration to suit your organization. You can confirm whether you're using the service default settings or have modified the default settings by looking at the **isServiceDefault** property returned when you query the default endpoint.
+
+## Partner cross-tenant access settings
+
+Partner-specific cross-tenant access settings determine your stance for inbound and outbound collaboration with a specific Azure AD organization. Any collaboration with this organization will inherit these partner-specific settings. Partner settings are defined using the [crossTenantAccessPolicyConfigurationPartner](../resources/crosstenantaccesspolicyconfigurationpartner.md) resource type.
+
+Even though you have added a partner to your cross-tenant access settings, some of your default settings will still apply. For example, if you configure only **b2bCollaborationInbound** for a partner in your cross-tenant access settings, all other settings for that partner configuration will be inherited from the default cross-tenant access settings. When querying the partner endpoint, any property on the partner object that is `null` means that for that property, it's inheriting settings from the default policy.
+
+## Inbound trust settings in cross-tenant access settings
+
+Inbound trust settings enable you to trust the MFA external users perform in their home directories. This prevents external users from having to perform MFA both in their home directories and in your directory. With inbound trust settings, you enable a seamless authentication experience for your external users and save on the MFA costs incurred by your organization.
+
+For example, when you configure your trust settings to trust MFA, your MFA policies are still applied to external users, but users who have already completed MFA in their home tenants won't have to complete MFA again in your tenant.
+
+Inbound trust settings also enable you to trust devices that are compliant, or hybrid Azure AD joined in their home directories. With inbound trust settings in cross-tenant access settings, you can now protect access to your apps and resources by requiring that external users use compliant, or hybrid Azure AD joined devices.
+
+## Interpreting the API response
+
+The cross-tenant access settings API can be used to set up multiple configurations for allowing or blocking access to and from your organization. The following table highlights scenarios, shows an example of the API response, and what the interpretation should be of that response. **b2bSetting** is used as a placeholder for any B2B inbound (**b2bCollaborationInbound** or **b2bDirectConnectInbound**) or outbound (**b2bCollaborationOutbound** or **b2bDirectConnectOutbound**) configuration.
+
+<br/>
+
+<table>
+<tr>
+<th> Scenario </th> <th> API output </th> <th> Interpretation </th>
+</tr>
+<tr>
+<td> Block all users and block all applications </td>
+<td>
+
+``` json
+"b2bsetting": {
+ "usersAndGroups": {
+ "accessType": "blocked",
+ "targets": [
+ {
+ "target": "AllUsers",
+ "targetType": "user"
+ }
+ ]
+ },
+ "applications": {
+ "accessType": "blocked",
+ "targets": [
+ {
+ "target": "AllApplications",
+ "targetType": "application"
+ }
+ ]
+ }
+}
+```
+
+</td>
+<td> - </td>
+</tr>
+<tr>
+<td> Allow all users and allow all applications </td>
+<td>
+
+``` json
+"b2bsetting": {
+ "usersAndGroups": {
+ "accessType": "allowed",
+ "targets": [
+ {
+ "target": "AllUsers",
+ "targetType": "user"
+ }
+ ]
+ },
+ "applications": {
+ "accessType": "allowed",
+ "targets": [
+ {
+ "target": "AllApplications",
+ "targetType": "application"
+ }
+ ]
+ }
+}
+```
+
+</td>
+<td> - </td>
+</tr>
+<tr>
+<td> Allow users in group 'g1' to access any app </td>
+<td>
+
+``` json
+"b2bSetting": {
+ "usersAndGroups": {
+ "accessType": "allowed",
+ "targets": [
+ {
+ "target": "g1",
+ "targetType": "group"
+ }
+ ]
+ },
+ "applications": {
+ "accessType": "allowed",
+ "targets": [
+ {
+ "target": "AllApplications",
+ "targetType": "application"
+ }
+ ]
+ }
+}
+```
+
+</td>
+<td> Users in group 'g1' can access any app. All other users not in group 'g1' are blocked. </td>
+</tr>
+<tr>
+<td> Allow access to only application 'a1' </td>
+<td>
+
+``` json
+"b2bSetting": {
+ "usersAndGroups": {
+ "accessType": "allowed",
+ "targets": [
+ {
+ "target": "AllUsers",
+ "targetType": "user"
+ }
+ ]
+ },
+ "applications": {
+ "accessType": "allowed",
+ "targets": [
+ {
+ "target": "a1",
+ "targetType": "application"
+ }
+ ]
+ }
+}
+```
+
+</td>
+<td> All users are only allowed to access application 'a1' </td>
+</tr>
+<tr>
+<td> Allow users in group 'g1' and block access to application 'a1' </td>
+<td>
+
+``` json
+"b2bSetting": {
+ "usersAndGroups": {
+ "accessType": "allowed",
+ "targets": [
+ {
+ "target": "g1",
+ "targetType": "group"
+ }
+ ]
+ },
+ "applications": {
+ "accessType": "blocked",
+ "targets": [
+ {
+ "target": "a1",
+ "targetType": "application"
+ }
+ ]
+ }
+}
+```
+
+</td>
+<td> All users in group 'g1' are allowed to access any application <b>except</b> application 'a1'. </td>
+</tr>
+<tr>
+<td> Block users in group 'g1' from accessing any application </td>
+<td>
+
+``` json
+"b2bSetting": {
+ "usersAndGroups": {
+ "accessType": " blocked",
+ "targets": [
+ {
+ "target": "g1",
+ "targetType": "group"
+ }
+ ]
+ },
+ "applications": {
+ "accessType": "blocked",
+ "targets": [
+ {
+ "target": "AllApplications",
+ "targetType": "application"
+ }
+ ]
+ }
+}
+```
+
+</td>
+<td> Users in group 'g1' can't access any application. Other users not in group 'g1' have access to all applications. </td>
+</tr>
+<tr>
+<td> Block users in group 'g1' and allow access to application 'a1' only </td>
+<td>
+
+``` json
+"b2bSetting": {
+ "usersAndGroups": {
+ "accessType": "blocked",
+ "targets": [
+ {
+ "target": "g1",
+ "targetType": "group"
+ }
+ ]
+ },
+ "applications": {
+ "accessType": "allowed",
+ "targets": [
+ {
+ "target": "a1",
+ "targetType": "application"
+ }
+ ]
+ }
+}
+```
+
+</td>
+<td> Users in group 'g1' can't access any application. Any user not in group 'g1' can only access application 'a1'. </td>
+</tr>
+<tr>
+<td> Allow users in group 'g1' to access to only application 'a1' </td>
+<td>
+
+``` json
+"b2bSetting": {
+ "usersAndGroups": {
+ "accessType": "allowed",
+ "targets": [
+ {
+ "target": "g1",
+ "targetType": "group"
+ }
+ ]
+ },
+ "applications": {
+ "accessType": "allowed",
+ "targets": [
+ {
+ "target": "a1",
+ "targetType": "application"
+ }
+ ]
+ }
+}
+```
+
+</td>
+<td> Users in group 'g1' are only allowed to access application 'a1'. All users, including users in group 'g1', are blocked from accessing any other application. </td>
+</tr>
+<tr>
+<td> Block users in group 'g1' from accessing application 'a1' </td>
+<td>
+
+``` json
+"b2bSetting": {
+ "usersAndGroups": {
+ "accessType": "blocked",
+ "targets": [
+ {
+ "target": "g1",
+ "targetType": "group"
+ }
+ ]
+ },
+ "applications": {
+ "accessType": "blocked",
+ "targets": [
+ {
+ "target": "a1",
+ "targetType": "application"
+ }
+ ]
+ }
+}
+```
+
+</td>
+<td> Users in group 'g1' are blocked from accessing application 'a1' only. All users, including users in group 'g1' are able to access any other application. </td>
+</tr>
+</table>
+
+## Cross-tenant access settings vs tenant restrictions
+
+Cross-tenant access settings outbound controls are for controlling how **your organization's accounts** are used for accessing resources in other Azure AD organizations. Tenant Restrictions are for controlling how your employees use **other Azure AD organizations' accounts while the employee is on your networks or devices**. Critically, outbound controls work all the time because they're associated with your accounts, while Tenant Restrictions require additional signals to be injected into the authentication requests to be enforced, because Tenant Restrictions are scoped to networks and devices, not accounts. Learn more about [Tenant Restrictions](/azure/active-directory/manage-apps/tenant-restrictions).
+
+## Next steps
+++ [Cross-tenant access settings documentation](/azure/active-directory/external-identities/cross-tenant-access-overview)++ [crossTenantAccessPolicyConfigurationDefault](../resources/crosstenantaccesspolicyconfigurationdefault.md) resource type++ [crossTenantAccessPolicyConfigurationPartner](../resources/crosstenantaccesspolicyconfigurationpartner.md) resource type
v1.0 Crosstenantaccesspolicy https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/resources/crosstenantaccesspolicy.md
+
+ Title: "crossTenantAccessPolicy resource type"
+description: "Cross-tenant access policy represents the base policy in the directory for cross-tenant access settings."
+
+ms.localizationpriority: medium
++
+# crossTenantAccessPolicy resource type
+
+Namespace: microsoft.graph
+
+Represents the base policy in the directory for cross-tenant access settings.
+
+## Methods
+
+|Method|Return type|Description|
+|:|:|:|
+|[Get crossTenantAccessPolicy](../api/crosstenantaccesspolicy-get.md)|[crossTenantAccessPolicy](../resources/crosstenantaccesspolicy.md)|Read the properties and relationships of a [crossTenantAccessPolicy](../resources/crosstenantaccesspolicy.md) object.|
+|[Update crossTenantAccessPolicy](../api/crosstenantaccesspolicy-update.md)|[crossTenantAccessPolicy](../resources/crosstenantaccesspolicy.md)|Update the properties of a [crossTenantAccessPolicy](../resources/crosstenantaccesspolicy.md) object.|
+
+## Properties
+
+|Property|Type|Description|
+|:|:|:|
+| displayName | String | The display name of the cross-tenant access policy. Inherited from [policyBase](../resources/policybase.md).|
+
+## Relationships
+
+|Relationship|Type|Description|
+|:|:|:|
+|default|[crossTenantAccessPolicyConfigurationDefault](../resources/crosstenantaccesspolicyconfigurationdefault.md)|Defines the default configuration for how your organization interacts with external Azure Active Directory organizations.|
+|partners|[crossTenantAccessPolicyConfigurationPartner](../resources/crosstenantaccesspolicyconfigurationpartner.md) collection|Defines partner-specific configurations for external Azure Active Directory organizations.|
+
+## JSON representation
+
+The following is a JSON representation of the resource.
+<!-- {
+ "blockType": "resource",
+ "keyProperty": "id",
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicy",
+ "baseType": "microsoft.graph.tenantRelationshipAccessPolicyBase",
+ "openType": false
+}
+-->
+
+``` json
+{
+ "@odata.type": "#microsoft.graph.crossTenantAccessPolicy",
+ "displayName": "String"
+}
+```
v1.0 Crosstenantaccesspolicyb2bsetting https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/resources/crosstenantaccesspolicyb2bsetting.md
+
+ Title: "crossTenantAccessPolicyB2BSetting resource type"
+description: "Defines the inbound and outbound rulesets for Azure Active Directory (Azure AD) B2B collaboration."
+
+ms.localizationpriority: medium
++
+# crossTenantAccessPolicyB2BSetting resource type
+
+Namespace: microsoft.graph
+
+Defines the inbound and outbound rulesets for Azure Active Directory (Azure AD) B2B collaboration.
+
+## Properties
+
+|Property|Type|Description|
+|:|:|:|
+|applications|[crossTenantAccessPolicyTargetConfiguration](../resources/crosstenantaccesspolicytargetconfiguration.md)|The list of applications targeted with your cross-tenant access policy.|
+|usersAndGroups|[crossTenantAccessPolicyTargetConfiguration](../resources/crosstenantaccesspolicytargetconfiguration.md)|The list of users and groups targeted with your cross-tenant access policy.|
+
+## Relationships
+
+None.
+
+## JSON representation
+
+The following is a JSON representation of the resource.
+<!-- {
+ "blockType": "resource",
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyB2BSetting"
+}
+-->
+
+``` json
+{
+ "@odata.type": "#microsoft.graph.crossTenantAccessPolicyB2BSetting",
+ "usersAndGroups": {
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyTargetConfiguration"
+ },
+ "applications": {
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyTargetConfiguration"
+ }
+}
+```
v1.0 Crosstenantaccesspolicyconfigurationdefault https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/resources/crosstenantaccesspolicyconfigurationdefault.md
+
+ Title: "crossTenantAccessPolicyConfigurationDefault resource type"
+description: "The default configuration defined for inbound and outbound settings of Azure AD B2B collaboration and B2B direct connect."
+
+ms.localizationpriority: medium
++
+# crossTenantAccessPolicyConfigurationDefault resource type
+
+Namespace: microsoft.graph
+
+The default configuration defined for inbound and outbound settings of Azure AD B2B collaboration and B2B direct connect.
+
+## Methods
+
+|Method|Return type|Description|
+|:|:|:|
+|[Get crossTenantAccessPolicyConfigurationDefault](../api/crosstenantaccesspolicyconfigurationdefault-get.md)|[crossTenantAccessPolicyConfigurationDefault](../resources/crosstenantaccesspolicyconfigurationdefault.md)|Get the default configuration for B2B collaboration and B2B direct connect inbound and outbound settings.|
+|[Update crossTenantAccessPolicyConfigurationDefault](../api/crosstenantaccesspolicyconfigurationdefault-update.md)|None|Update the default configuration for B2B collaboration and B2B direct connect inbound and outbound settings.|
+|[Reset to system default](../api/crosstenantaccesspolicyconfigurationdefault-resettosystemdefault.md)|None|Reset the default configuration for a cross-tenant access policy to the system default settings.|
+
+## Properties
+
+|Property|Type|Description|
+|:|:|:|
+| b2bCollaborationInbound | [crossTenantAccessPolicyB2BSetting](../resources/crosstenantaccesspolicyb2bsetting.md) |Defines your default configuration for users from other organizations accessing your resources via Azure AD B2B collaboration. |
+| b2bCollaborationOutbound | [crossTenantAccessPolicyB2BSetting](../resources/crosstenantaccesspolicyb2bsetting.md) |Defines your default configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B collaboration. |
+| b2bDirectConnectInbound |[crossTenantAccessPolicyB2BSetting](../resources/crosstenantaccesspolicyb2bsetting.md) | Defines your default configuration for users from other organizations accessing your resources via Azure AD B2B direct connect. |
+| b2bDirectConnectOutbound | [crossTenantAccessPolicyB2BSetting](../resources/crosstenantaccesspolicyb2bsetting.md) |Defines your default configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B direct connect. |
+| inboundTrust | [crossTenantAccessPolicyInboundTrust](../resources/crosstenantaccesspolicyinboundtrust.md) | Determines the default configuration for trusting other Conditional Access claims from external Azure AD organizations. |
+| isServiceDefault | Boolean | If `true`, the default configuration is set to the system default configuration. If `false`, the default settings have been customized. |
+
+## Relationships
+
+None.
+
+## JSON representation
+
+The following is a JSON representation of the resource.
+<!-- {
+ "blockType": "resource",
+ "keyProperty": "id",
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyConfigurationDefault",
+ "openType": false
+}
+-->
+
+``` json
+{
+ "@odata.type": "#microsoft.graph.crossTenantAccessPolicyConfigurationDefault",
+ "inboundTrust": {
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyInboundTrust"
+ },
+ "b2bCollaborationOutbound": {
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyB2BSetting"
+ },
+ "b2bCollaborationInbound": {
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyB2BSetting"
+ },
+ "b2bDirectConnectOutbound": {
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyB2BSetting"
+ },
+ "b2bDirectConnectInbound": {
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyB2BSetting"
+ },
+ "isServiceDefault": "Boolean"
+}
+```
v1.0 Crosstenantaccesspolicyconfigurationpartner https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/resources/crosstenantaccesspolicyconfigurationpartner.md
+
+ Title: "crossTenantAccessPolicyConfigurationPartner resource type"
+description: "The partner-specific configuration that is defined for inbound and outbound settings of Azure AD B2B collaboration and B2B direct connect."
+
+ms.localizationpriority: medium
++
+# crossTenantAccessPolicyConfigurationPartner resource type
+
+Namespace: microsoft.graph
+
+The partner-specific configuration that is defined for inbound and outbound settings of Azure AD B2B and B2B direct connect collaboration.
+
+For any partner-specific property that is `null`, these settings will inherit the behavior configured in your [default cross tenant access settings](../resources/crosstenantaccesspolicyconfigurationdefault.md).
+
+## Methods
+
+|Method|Return type|Description|
+|:|:|:|
+| [List partners](../api/crosstenantaccesspolicy-list-partners.md) | [crossTenantAccessPolicyConfigurationPartner](../resources/crosstenantaccesspolicyconfigurationpartner.md) collection | Get a list of all partner-specific configurations. |
+| [Create crossTenantAccessPolicyConfigurationPartner](../api/crosstenantaccesspolicy-post-partners.md) | [crossTenantAccessPolicyConfigurationPartner](../resources/crosstenantaccesspolicyconfigurationpartner.md) | Create a new partner-specific configuration. |
+| [Get crossTenantAccessPolicyConfigurationPartner](../api/crosstenantaccesspolicyconfigurationpartner-get.md) | [crossTenantAccessPolicyConfigurationPartner](../resources/crosstenantaccesspolicyconfigurationpartner.md) | Read the partner-specific configuration settings. |
+| [Update crossTenantAccessPolicyConfigurationPartner](../api/crosstenantaccesspolicyconfigurationpartner-update.md) | [crossTenantAccessPolicyConfigurationPartner](../resources/crosstenantaccesspolicyconfigurationpartner.md) | Update the properties of a partner-specific configuration. |
+| [Delete crossTenantAccessPolicyConfigurationPartner](../api/crosstenantaccesspolicyconfigurationpartner-delete.md) | None | Delete the partner-specific configuration. |
+
+## Properties
+
+|Property|Type|Description|
+|:|:|:|
+| b2bCollaborationInbound | [crossTenantAccessPolicyB2BSetting](../resources/crosstenantaccesspolicyb2bsetting.md) | Defines your partner-specific configuration for users from other organizations accessing your resources via Azure AD B2B collaboration. |
+| b2bCollaborationOutbound | [crossTenantAccessPolicyB2BSetting](../resources/crosstenantaccesspolicyb2bsetting.md) | Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B collaboration. |
+| b2bDirectConnectInbound | [crossTenantAccessPolicyB2BSetting](../resources/crosstenantaccesspolicyb2bsetting.md) | Defines your partner-specific configuration for users from other organizations accessing your resources via Azure B2B direct connect. |
+| b2bDirectConnectOutbound | [crossTenantAccessPolicyB2BSetting](../resources/crosstenantaccesspolicyb2bsetting.md) | Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B direct connect. |
+| inboundTrust | [crossTenantAccessPolicyInboundTrust](../resources/crosstenantaccesspolicyinboundtrust.md) | Determines the partner-specific configuration for trusting other Conditional Access claims from external Azure AD organizations. |
+| isServiceProvider | Boolean | Identifies whether the partner-specific configuration is a Cloud Service Provider for your organization. |
+| tenantId | String | The tenant identifier for the partner Azure AD organization. Read-only. Key.|
+
+## Relationships
+
+None.
+
+## JSON representation
+
+The following is a JSON representation of the resource.
+<!-- {
+ "blockType": "resource",
+ "keyProperty": "tenantId",
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyConfigurationPartner",
+ "openType": false
+}
+-->
+
+``` json
+{
+ "@odata.type": "#microsoft.graph.crossTenantAccessPolicyConfigurationPartner",
+ "tenantId": "String (identifier)",
+ "inboundTrust": {
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyInboundTrust"
+ },
+ "b2bCollaborationOutbound": {
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyB2BSetting"
+ },
+ "b2bCollaborationInbound": {
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyB2BSetting"
+ },
+ "b2bDirectConnectOutbound": {
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyB2BSetting"
+ },
+ "b2bDirectConnectInbound": {
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyB2BSetting"
+ },
+ "isServiceProvider": "Boolean"
+}
+```
v1.0 Crosstenantaccesspolicyinboundtrust https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/resources/crosstenantaccesspolicyinboundtrust.md
+
+ Title: "crossTenantAccessPolicyInboundTrust resource type"
+description: "Defines the Conditional Access claims you want to accept from other organizations via your cross-tenant access policy configuration."
+
+ms.localizationpriority: medium
++
+# crossTenantAccessPolicyInboundTrust resource type
+
+Namespace: microsoft.graph
+
+Defines the Conditional Access claims you want to accept from other Azure AD organizations via your cross-tenant access policy configuration. These can be configured in your default configuration, partner-specific configuration, or both.
+
+## Properties
+
+|Property|Type|Description|
+|:|:|:|
+| isCompliantDeviceAccepted | Boolean | Specifies whether compliant devices from external Azure AD organizations are trusted. |
+| isHybridAzureADJoinedDeviceAccepted | Boolean | Specifies whether hybrid Azure AD joined devices from external Azure AD organizations are trusted. |
+| isMfaAccepted | Boolean | Specifies whether MFA from external Azure AD organizations is trusted.|
+
+## Relationships
+
+None.
+
+## JSON representation
+
+The following is a JSON representation of the resource.
+<!-- {
+ "blockType": "resource",
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyInboundTrust"
+}
+-->
+
+``` json
+{
+ "@odata.type": "#microsoft.graph.crossTenantAccessPolicyInboundTrust",
+ "isMfaAccepted": "Boolean",
+ "isCompliantDeviceAccepted": "Boolean",
+ "isHybridAzureADJoinedDeviceAccepted": "Boolean"
+}
+```
v1.0 Crosstenantaccesspolicytarget https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/resources/crosstenantaccesspolicytarget.md
+
+ Title: "crossTenantAccessPolicyTarget resource type"
+description: "Defines how to target your cross-tenant access policy settings. Settings can be targeted to specific users, groups, or applications."
+
+ms.localizationpriority: medium
++
+# crossTenantAccessPolicyTarget resource type
+
+Namespace: microsoft.graph
+
+Defines how to target your cross-tenant access policy settings. Settings can be targeted to specific users, groups, or applications. You can also use keywords to target specific groups or applications.
+
+## Properties
+
+|Property|Type|Description|
+|:|:|:|
+| target | String | The unique identifier of the user, group, or application; one of the following keywords: `AllUsers` and `AllApplications`; or for targets that are applications, you may use [reserved values](#reserved-values-for-targets-that-are-applications). |
+| targetType | crossTenantAccessPolicyTargetType | The type of resource that you want to target. The possible values are: `user`, `group`, `application`, `unknownFutureValue`. |
+
+### Reserved values for targets that are applications
+
+When setting application targets, you can also use the following reserved values:
+
+| Symbol | Description |
+|:|:|
+| AllMicrosoftApps | Refers to any [Microsoft cloud application](/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps#microsoft-cloud-applications). |
+| Office365 | Includes the applications mentioned as part of the [Office365](/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps#office-365) suite. |
+
+## Relationships
+
+None.
+
+## JSON representation
+
+The following is a JSON representation of the resource.
+<!-- {
+ "blockType": "resource",
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyTarget"
+}
+-->
+
+``` json
+{
+ "@odata.type": "#microsoft.graph.crossTenantAccessPolicyTarget",
+ "target": "String",
+ "targetType": "microsoft.graph.crossTenantAccessPolicyTargetType"
+}
+```
v1.0 Crosstenantaccesspolicytargetconfiguration https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/resources/crosstenantaccesspolicytargetconfiguration.md
+
+ Title: "crossTenantAccessPolicyTargetConfiguration resource type"
+description: "Defines the target of a cross-tenant access policy setting configuration."
+
+ms.localizationpriority: medium
++
+# crossTenantAccessPolicyTargetConfiguration resource type
+
+Namespace: microsoft.graph
+
+Defines the target of a cross-tenant access policy setting configuration.
+
+## Properties
+
+|Property|Type|Description|
+|:|:|:|
+| accessType| crossTenantAccessPolicyTargetConfigurationAccessType | Defines whether access is allowed or blocked. The possible values are: `allowed`, `blocked`, `unknownFutureValue`. |
+|targets|[crossTenantAccessPolicyTarget](../resources/crosstenantaccesspolicytarget.md) collection|Specifies whether to target users, groups, or applications with this rule.|
+
+## Relationships
+
+None.
+
+## JSON representation
+
+The following is a JSON representation of the resource.
+<!-- {
+ "blockType": "resource",
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyTargetConfiguration"
+}
+-->
+
+``` json
+{
+ "@odata.type": "#microsoft.graph.crossTenantAccessPolicyTargetConfiguration",
+ "accessType": "String",
+ "targets": [
+ {
+ "@odata.type": "microsoft.graph.crossTenantAccessPolicyTarget"
+ }
+ ]
+}
+```
v1.0 Enums https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/resources/enums.md
doc_type: enumPageType
Namespace: microsoft.graph +
+### crossTenantAccessPolicyTargetConfigurationAccessType values
+
+|Member|
+|:|
+|allowed|
+|blocked|
+|unknownFutureValue|
+
+### crossTenantAccessPolicyTargetType values
+
+|Member|
+|:|
+|user|
+|group|
+ ### federatedIdpMfaBehavior values |Member| |:|
v1.0 List https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/resources/list.md
This resource contains the top level properties of the list, including template
The following tasks are available for list resources. - All examples below are relative to a site, for example, `https://graph.microsoft.com/v1.0/sites/{site-id}`. | Common task | HTTP method
v1.0 Policyroot https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/resources/policyroot.md
None
| authenticationMethodsPolicy | [authenticationMethodsPolicy](authenticationmethodspolicy.md) | The authentication methods and the users that are allowed to use them to sign in and perform multi-factor authentication (MFA) in Azure Active Directory (Azure AD). | | authorizationPolicy | [authorizationPolicy](authorizationpolicy.md) collection | The policy that controls Azure AD authorization settings. | | claimsMappingPolicies | [claimsMappingPolicy](claimsmappingpolicy.md) collection | The claim-mapping policies for WS-Fed, SAML, OAuth 2.0, and OpenID Connect protocols, for tokens issued to a specific application. |
+| crossTenantAccessPolicy | [crossTenantAccessPolicy](crosstenantaccesspolicy.md) | The custom rules that define an access scenario when interacting with external Azure AD tenants. |
| conditionalAccessPolicies | [conditionalAccessPolicy](conditionalaccesspolicy.md) | The custom rules that define an access scenario. | | featureRolloutPolicies | [featureRolloutPolicy](featurerolloutpolicy.md) collection | The feature rollout policy associated with a directory object. | | homeRealmDiscoveryPolicies | [homeRealmDiscoveryPolicy](homerealmdiscoverypolicy.md) collection | The policy to control Azure AD authentication behavior for federated users. |
v1.0 Tenantrelationshipaccesspolicybase https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/resources/tenantrelationshipaccesspolicybase.md
+
+ Title: "tenantRelationshipAccessPolicyBase resource type"
+description: "The base type that defines a tenant relationship."
+
+ms.localizationpriority: medium
++
+# tenantRelationshipAccessPolicyBase resource type
+
+Namespace: microsoft.graph
+
+The base type that defines a tenant relationship. This is an abstract type that's inherited by cross-tenant policy objects including [crossTenantAccessPolicy](crosstenantaccesspolicy.md).
+
+Inherits from [policyBase](policybase.md).
+
+## Properties
+
+|Property|Type|Description|
+|:|:|:|
+| definition (deprecated) | String collection | The raw JSON definition of the cross-tenant access policy. **Deprecated. Do not use.** |
+| description | String | Description for this policy. Required. Inherited from [policyBase](../resources/policybase.md). |
+| displayName | String collection | Display name for this policy. Required. Inherited from [policyBase](../resources/policybase.md). |
+
+## Relationships
+
+None.
+
+## JSON representation
+
+The following is a JSON representation of the resource.
+<!-- {
+ "blockType": "resource",
+ "keyProperty": "id",
+ "@odata.type": "microsoft.graph.tenantRelationshipAccessPolicyBase",
+ "baseType": "microsoft.graph.policyBase",
+ "openType": false
+}
+-->
+
+``` json
+{
+ "@odata.type": "#microsoft.graph.tenantRelationshipAccessPolicyBase",
+ "definition": [
+ "String"
+ ],
+ "description": "String",
+ "displayName": "String"
+}
+```
v1.0 Toc.Yml https://github.com/microsoftgraph/microsoft-graph-docs/commits/main/api-reference/v1.0/toc.yml a/api-reference/v1.0/toc.yml
items:
href: api/ipnamedlocation-update.md - name: Delete href: api/ipnamedlocation-delete.md
+ - name: Cross-tenant access
+ items:
+ - name: Overview
+ href: resources/crosstenantaccesspolicy-overview.md
+ - name: Policy
+ items:
+ - name: Cross-tenant access policy
+ href: resources/crosstenantaccesspolicy.md
+ - name: Get
+ href: api/crosstenantaccesspolicy-get.md
+ - name: Update
+ href: api/crosstenantaccesspolicy-update.md
+ - name: Default settings
+ items:
+ - name: Cross-tenant access default settings
+ href: resources/crosstenantaccesspolicyconfigurationdefault.md
+ - name: Get
+ href: api/crosstenantaccesspolicyconfigurationdefault-get.md
+ - name: Update
+ href: api/crosstenantaccesspolicyconfigurationdefault-update.md
+ - name: Reset to system default
+ href: api/crosstenantaccesspolicyconfigurationdefault-resettosystemdefault.md
+ - name: Partner settings
+ items:
+ - name: Cross-tenant access partner settings
+ href: resources/crosstenantaccesspolicyconfigurationpartner.md
+ - name: List
+ href: api/crosstenantaccesspolicy-list-partners.md
+ - name: Create
+ href: api/crosstenantaccesspolicy-post-partners.md
+ - name: Get
+ href: api/crosstenantaccesspolicyconfigurationpartner-get.md
+ - name: Update
+ href: api/crosstenantaccesspolicyconfigurationpartner-update.md
+ - name: Delete
+ href: api/crosstenantaccesspolicyconfigurationpartner-delete.md
- name: Data policy operation href: resources/datapolicyoperation.md items:
items:
items: - name: Get site href: api/site-get.md
+ - name: List sites
+ href: api/site-list.md
- name: Get lists href: api/list-list.md - name: Get item analytics