From 55d05acea3c752fcf25a16e60f35349a324d4580 Mon Sep 17 00:00:00 2001 From: Roel van der Wegen Date: Fri, 18 Aug 2023 10:51:54 +0200 Subject: [PATCH 001/158] Footer spacing fix --- src/components/layout/AppFooter.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/components/layout/AppFooter.js b/src/components/layout/AppFooter.js index d7893c9533b6..ecfba658b219 100644 --- a/src/components/layout/AppFooter.js +++ b/src/components/layout/AppFooter.js @@ -20,7 +20,7 @@ const AppFooter = () => { {' '} - + {' '} From b01bb1ed10b848b1882a6252f221d5cc7588d932 Mon Sep 17 00:00:00 2001 From: Roel van der Wegen Date: Tue, 22 Aug 2023 08:12:35 +0200 Subject: [PATCH 002/158] Remove repoUrl variable --- deployment/AzureDeploymentTemplate.json | 1 - 1 file changed, 1 deletion(-) diff --git a/deployment/AzureDeploymentTemplate.json b/deployment/AzureDeploymentTemplate.json index bc7eb0ba9efe..ff7e9a97bada 100644 --- a/deployment/AzureDeploymentTemplate.json +++ b/deployment/AzureDeploymentTemplate.json @@ -36,7 +36,6 @@ "funcAppName": "[toLower(concat(parameters('baseName'), variables('suffix')))]", "funcStorageName": "[tolower(concat(substring(parameters('baseName'), 0, min(length(parameters('baseName')),16)), 'stg', variables('suffix')))]", "serverFarmName": "[concat(substring(parameters('baseName'), 0, min(length(parameters('baseName')),14)), '-srv-', variables('suffix'))]", - "repoURL": "https://github.com/KelvinTegelaar/AzValidate.git", "uniqueResourceNameBase": "[toLower(concat(parameters('baseName'), variables('suffix')))]", "swaName": "[toLower(concat(parameters('baseName'), '-swa-', variables('suffix')))]" }, From 9713f0d9fb08c48cceafb299c7573ce82555b9b2 Mon Sep 17 00:00:00 2001 From: Roel van der Wegen Date: Tue, 22 Aug 2023 08:12:52 +0200 Subject: [PATCH 003/158] Remove repoUrl variable --- deployment/AzureDeploymentTemplate_regionoptions.json | 1 - 1 file changed, 1 deletion(-) diff --git a/deployment/AzureDeploymentTemplate_regionoptions.json b/deployment/AzureDeploymentTemplate_regionoptions.json index 11fccba7350c..bc2f24089d4d 100644 --- a/deployment/AzureDeploymentTemplate_regionoptions.json +++ b/deployment/AzureDeploymentTemplate_regionoptions.json @@ -36,7 +36,6 @@ "funcAppName": "[toLower(concat(parameters('baseName'), variables('suffix')))]", "funcStorageName": "[tolower(concat(substring(parameters('baseName'), 0, min(length(parameters('baseName')),16)), 'stg', variables('suffix')))]", "serverFarmName": "[concat(substring(parameters('baseName'), 0, min(length(parameters('baseName')),14)), '-srv-', variables('suffix'))]", - "repoURL": "https://github.com/KelvinTegelaar/AzValidate.git", "uniqueResourceNameBase": "[toLower(concat(parameters('baseName'), variables('suffix')))]", "swaName": "[toLower(concat(parameters('baseName'), '-swa-', variables('suffix')))]" }, From 4e186fe3b832dc8b96e90cf4dced92b80897969f Mon Sep 17 00:00:00 2001 From: Roel van der Wegen Date: Tue, 22 Aug 2023 08:13:08 +0200 Subject: [PATCH 004/158] Update DevAzureDeploymentTemplate.json --- deployment/DevAzureDeploymentTemplate.json | 1 - 1 file changed, 1 deletion(-) diff --git a/deployment/DevAzureDeploymentTemplate.json b/deployment/DevAzureDeploymentTemplate.json index dee70ee11871..8beefadd450c 100644 --- a/deployment/DevAzureDeploymentTemplate.json +++ b/deployment/DevAzureDeploymentTemplate.json @@ -64,7 +64,6 @@ "funcAppName": "[toLower(concat(parameters('baseName'), variables('suffix')))]", "funcStorageName": "[tolower(concat(substring(parameters('baseName'), 0, min(length(parameters('baseName')),16)), 'stg', variables('suffix')))]", "serverFarmName": "[concat(substring(parameters('baseName'), 0, min(length(parameters('baseName')),14)), '-srv-', variables('suffix'))]", - "repoURL": "https://github.com/KelvinTegelaar/AzValidate.git", "uniqueResourceNameBase": "[toLower(concat(parameters('baseName'), variables('suffix')))]", "swaName": "[toLower(concat(parameters('baseName'), '-swa-', variables('suffix')))]" }, From fd3eea5a6ddba930838ab8f407be55bab9e004a5 Mon Sep 17 00:00:00 2001 From: Roel van der Wegen Date: Tue, 22 Aug 2023 08:13:28 +0200 Subject: [PATCH 005/158] Remove repoUrl variable --- deployment/DevAzureDeploymentTemplate_regionoptions.json | 1 - 1 file changed, 1 deletion(-) diff --git a/deployment/DevAzureDeploymentTemplate_regionoptions.json b/deployment/DevAzureDeploymentTemplate_regionoptions.json index 301d50d5437a..0fb300af06c9 100644 --- a/deployment/DevAzureDeploymentTemplate_regionoptions.json +++ b/deployment/DevAzureDeploymentTemplate_regionoptions.json @@ -64,7 +64,6 @@ "funcAppName": "[toLower(concat(parameters('baseName'), variables('suffix')))]", "funcStorageName": "[tolower(concat(substring(parameters('baseName'), 0, min(length(parameters('baseName')),16)), 'stg', variables('suffix')))]", "serverFarmName": "[concat(substring(parameters('baseName'), 0, min(length(parameters('baseName')),14)), '-srv-', variables('suffix'))]", - "repoURL": "https://github.com/KelvinTegelaar/AzValidate.git", "uniqueResourceNameBase": "[toLower(concat(parameters('baseName'), variables('suffix')))]", "swaName": "[toLower(concat(parameters('baseName'), '-swa-', variables('suffix')))]" }, From b78888714fa56cafb03b10effa45f29db3fb740a Mon Sep 17 00:00:00 2001 From: KelvinTegelaar <49186168+KelvinTegelaar@users.noreply.github.com> Date: Tue, 22 Aug 2023 11:20:28 +0200 Subject: [PATCH 006/158] fixes --- src/components/tables/CippTable.js | 14 ++++---------- src/views/cipp/CIPPSettings.js | 8 +++++--- 2 files changed, 9 insertions(+), 13 deletions(-) diff --git a/src/components/tables/CippTable.js b/src/components/tables/CippTable.js index 75e3380d2a79..4cdad5b0c56f 100644 --- a/src/components/tables/CippTable.js +++ b/src/components/tables/CippTable.js @@ -505,16 +505,10 @@ export default function CippTable({ {(massResults.length >= 1 || loopRunning) && ( {massResults.map((message, idx) => { - return ( -
  • - { - //if message.data.results is an array, join, else just show the message - message.data?.Results?.length > 1 - ? message.data?.Results?.join(', ') - : message.data?.Results - } -
  • - ) + const results = message.data?.Results + const displayResults = Array.isArray(results) ? results.join(', ') : results + + return
  • {displayResults}
  • })} {loopRunning && (
  • diff --git a/src/views/cipp/CIPPSettings.js b/src/views/cipp/CIPPSettings.js index 19520444cda2..f3206116d62d 100644 --- a/src/views/cipp/CIPPSettings.js +++ b/src/views/cipp/CIPPSettings.js @@ -766,13 +766,15 @@ const ExcludedTenantsSettings = () => { {removeExcludeTenantResult.data?.Results} )} - {refreshPermissionsResults.isSuccess && ( + {refreshPermissionsResults.isSuccess && + refreshPermissionsResults.data?.Results && + Array.isArray(refreshPermissionsResults.data.Results) ? ( - {refreshPermissionsResults.data?.Results.map((result, idx) => ( + {refreshPermissionsResults.data.Results.map((result, idx) => (
  • {result}
  • ))}
    - )} + ) : null} {addExcludeTenantResult.isSuccess && ( {addExcludeTenantResult.data?.Results} From 9fc0c30ca8fd37fde08bb0d9b0fb1db9f20052d1 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar <49186168+KelvinTegelaar@users.noreply.github.com> Date: Tue, 22 Aug 2023 11:42:53 +0200 Subject: [PATCH 007/158] add smtp basic auth standard --- src/data/standards.json | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/src/data/standards.json b/src/data/standards.json index bfc4f5df0b4b..255449b17c3a 100644 --- a/src/data/standards.json +++ b/src/data/standards.json @@ -78,6 +78,13 @@ "addedComponent": null, "label": "Disable Basic Authentication" }, + { + "name": "standards.DisableBasicAuthSMTP", + "cat": "Global", + "helpText": "", + "addedComponent": null, + "label": "Disable SMTP Basic Authentication" + }, { "name": "standards.laps", "cat": "AAD", From 2e44d45f65460e7d3153cea3d17f10886d9734ba Mon Sep 17 00:00:00 2001 From: John Duprey Date: Tue, 22 Aug 2023 17:59:04 -0400 Subject: [PATCH 008/158] Autopilot import Multiple CSV support --- src/views/endpoint/autopilot/AutopilotAddDevice.js | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/src/views/endpoint/autopilot/AutopilotAddDevice.js b/src/views/endpoint/autopilot/AutopilotAddDevice.js index 0496ea4e1acc..6073da03f5fe 100644 --- a/src/views/endpoint/autopilot/AutopilotAddDevice.js +++ b/src/views/endpoint/autopilot/AutopilotAddDevice.js @@ -33,7 +33,7 @@ Error.propTypes = { const AddAPDevice = () => { const [genericPostRequest, postResults] = useLazyGenericPostRequestQuery() - const [autopilotData, setAutopilotdata] = useState(false) + const [autopilotData, setAutopilotdata] = useState([]) const tableColumns = [ { name: 'serialNumber', @@ -74,7 +74,9 @@ const AddAPDevice = () => { }, ] const valbutton = (value) => - autopilotData ? undefined : 'You must add at least one device. Did you forget to click add?' + autopilotData.length + ? undefined + : 'You must add at least one device. Did you forget to click add?' const handleOnDrop = (data) => { const importdata = data.map((item) => { const normalizedData = {} @@ -90,7 +92,7 @@ const AddAPDevice = () => { modelName: normalizedData['device model'], } }) - setAutopilotdata(importdata) + setAutopilotdata([...autopilotData, ...importdata]) // console.log(importdata) } From 8a407ad5e2c2116b6232c66d3e047df797b20787 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar <49186168+KelvinTegelaar@users.noreply.github.com> Date: Wed, 23 Aug 2023 00:01:47 +0200 Subject: [PATCH 009/158] add tenantfilter for named location deployment --- src/views/tenant/conditional/ConditionalAccess.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/views/tenant/conditional/ConditionalAccess.js b/src/views/tenant/conditional/ConditionalAccess.js index 205816829601..54df028702e6 100644 --- a/src/views/tenant/conditional/ConditionalAccess.js +++ b/src/views/tenant/conditional/ConditionalAccess.js @@ -42,7 +42,7 @@ const Offcanvas = (row, rowIndex, formatExtraData) => { icon: , modalBody: JSON.parse(row.rawjson), modalType: 'POST', - modalUrl: `/api/AddCATemplate`, + modalUrl: `/api/AddCATemplate?TenantFilter=${tenant.defaultDomainName}`, modalMessage: 'Are you sure you want to create a template based on this rule?', }, { From e23a46892d69ee62f01228e39adb3a17d3feb060 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar <49186168+KelvinTegelaar@users.noreply.github.com> Date: Wed, 23 Aug 2023 11:51:25 +0200 Subject: [PATCH 010/158] token cache clear removeal --- src/views/cipp/Setup.js | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/src/views/cipp/Setup.js b/src/views/cipp/Setup.js index 0304e311993e..603e2a07a0e2 100644 --- a/src/views/cipp/Setup.js +++ b/src/views/cipp/Setup.js @@ -130,8 +130,7 @@ const Setup = () => { Click the buttons below to refresh your token.
    Remember to login under a account that has been added to the correct GDAP - groups or the group 'AdminAgents'. After confirmation that the refresh is successful, - the token cache must be cleared. + groups and the group 'AdminAgents'.
    {getResults.isUninitialized && genericGetRequest({ path: 'api/ExecListAppId' })} {getResults.isSuccess && ( @@ -255,7 +254,7 @@ const Setup = () => { {usedWizard && - 'You have used the setup wizard. You can close this screen. Setup has been completed. You must execute a clear of the token cache. See the documentation on how to perform this.'} + 'You have used the setup wizard. You can close this screen. Setup has been completed.'} {!usedWizard && 'You are sending your own Secure Application Model setup to the Keyvault. For security reasons we do not show the keys. Please make sure you have entered the keys correctly.'} From d59444a75ff702063ac5f66fec4310e0c8788858 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Sun, 27 Aug 2023 22:56:27 +0200 Subject: [PATCH 011/158] version up --- version_latest.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/version_latest.txt b/version_latest.txt index cc868b62c301..99eba4de9311 100644 --- a/version_latest.txt +++ b/version_latest.txt @@ -1 +1 @@ -4.0.1 \ No newline at end of file +4.1.0 \ No newline at end of file From 34a30c0d6ffe92cf12d8d30f129479f24b9fea1c Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Sun, 27 Aug 2023 22:57:07 +0200 Subject: [PATCH 012/158] version --- public/version_latest.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/public/version_latest.txt b/public/version_latest.txt index cc868b62c301..99eba4de9311 100644 --- a/public/version_latest.txt +++ b/public/version_latest.txt @@ -1 +1 @@ -4.0.1 \ No newline at end of file +4.1.0 \ No newline at end of file From e5780cc3d3a44068e4c91f2b3bee0ac3699547de Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Wed, 30 Aug 2023 20:26:55 +0200 Subject: [PATCH 013/158] group template --- src/views/tenant/standards/ListAppliedStandards.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/views/tenant/standards/ListAppliedStandards.js b/src/views/tenant/standards/ListAppliedStandards.js index 01cd41c41be2..94bcc688001b 100644 --- a/src/views/tenant/standards/ListAppliedStandards.js +++ b/src/views/tenant/standards/ListAppliedStandards.js @@ -482,7 +482,7 @@ const ListAppliedStandards = () => { name: template.Displayname, }))} placeholder="Select a template" - label="Choose your intune templates to apply" + label="Choose your group templates to apply" /> )} From 974e48682dc92be101fafa420af959f2ac0153a6 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Thu, 31 Aug 2023 12:36:44 +0200 Subject: [PATCH 014/158] webhook bulk removal fix --- src/views/tenant/administration/ListAlertsQueue.js | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/views/tenant/administration/ListAlertsQueue.js b/src/views/tenant/administration/ListAlertsQueue.js index 8b52ee6d9624..7888d38aac6e 100644 --- a/src/views/tenant/administration/ListAlertsQueue.js +++ b/src/views/tenant/administration/ListAlertsQueue.js @@ -255,7 +255,7 @@ const ListAlertsQueue = () => { label: 'Delete alerts', color: 'info', modal: true, - modalUrl: `/api/RemoveQueuedAlert?ID=!tenantId`, + modalUrl: `/api/RemoveQueuedAlert?ID=!tenantid`, modalMessage: 'Are you sure you want to delete these alerts?', }, ], @@ -281,7 +281,7 @@ const ListAlertsQueue = () => { label: 'Delete webhook', color: 'info', modal: true, - modalUrl: `/api/RemoveWebhookAlert?CIPPID=!CIPPID&tenantfilter=!tenantid`, + modalUrl: `/api/RemoveWebhookAlert?CIPPID=!CIPPID&tenantfilter=!tenantName`, modalMessage: 'Are you sure you want to delete this webhook alert?', }, ], From 06c0057800b3bf7aa0ea73a3211053963b3be407 Mon Sep 17 00:00:00 2001 From: John Duprey Date: Sun, 3 Sep 2023 15:14:29 -0400 Subject: [PATCH 015/158] Tenant Selector Offcanvas --- .../utilities/CippTenantOffcanvas.js | 105 ++++++++++++++++++ src/components/utilities/TenantSelector.js | 62 ++++++----- src/views/tenant/administration/Tenants.js | 102 +---------------- 3 files changed, 143 insertions(+), 126 deletions(-) create mode 100644 src/components/utilities/CippTenantOffcanvas.js diff --git a/src/components/utilities/CippTenantOffcanvas.js b/src/components/utilities/CippTenantOffcanvas.js new file mode 100644 index 000000000000..1cb80cbacfeb --- /dev/null +++ b/src/components/utilities/CippTenantOffcanvas.js @@ -0,0 +1,105 @@ +import React, { useState } from 'react' +import { CButton } from '@coreui/react' +import { FontAwesomeIcon } from '@fortawesome/react-fontawesome' +import { faCog, faEdit, faEllipsisV, faBuilding } from '@fortawesome/free-solid-svg-icons' +import { CippActionsOffcanvas } from 'src/components/utilities' +import { useLazyGenericGetRequestQuery } from 'src/store/api/app' +import Skeleton from 'react-loading-skeleton' +import Portals from 'src/data/portals' + +export const CippTenantOffcanvasRow = (row, rowIndex, formatExtraData) => { + const tenant = row + console.log('tenant offcanvas row') + return CippTenantOffcanvas({ tenant: row }) +} + +function CippTenantOffcanvas({ tenant, buildingIcon = false }) { + const [getTenantDetails, tenantDetails] = useLazyGenericGetRequestQuery() + const [ocVisible, setOCVisible] = useState(false) + console.log(tenant) + function loadOffCanvasDetails(domainName) { + setOCVisible(true) + getTenantDetails({ path: `api/ListTenantDetails?tenantfilter=${domainName}` }) + } + + function tenantProperty(tenantDetails, propertyName) { + return ( + <> + {tenantDetails.isFetching && } + {!tenantDetails.isFetching && + tenantDetails.isSuccess && + (tenantDetails.data[propertyName]?.toString() ?? ' ')} + + ) + } + const actions = Portals.map((portal) => ({ + icon: , + label: portal.label, + external: true, + color: 'info', + link: portal.url.replace(portal.variable, tenant[portal.variable]), + })) + return ( + <> + loadOffCanvasDetails(tenant.defaultDomainName)} + > + + + , + label: 'Edit Tenant', + link: `/tenant/administration/tenants/Edit?tenantFilter=${tenant.defaultDomainName}&customerId=${tenant.customerId}`, + color: 'warning', + }, + ...actions, + ]} + placement="end" + visible={ocVisible} + id={tenant.id} + hideFunction={() => setOCVisible(false)} + /> + + ) +} + +export default CippTenantOffcanvas diff --git a/src/components/utilities/TenantSelector.js b/src/components/utilities/TenantSelector.js index bf4020eceb62..dfa54ac55ab6 100644 --- a/src/components/utilities/TenantSelector.js +++ b/src/components/utilities/TenantSelector.js @@ -4,11 +4,12 @@ import { useDispatch, useSelector } from 'react-redux' import PropTypes from 'prop-types' import { useListTenantsQuery } from 'src/store/api/tenants' import { setCurrentTenant } from 'src/store/features/app' -import { CDropdown, CDropdownMenu, CDropdownToggle } from '@coreui/react' +import { CButton, CDropdown, CDropdownMenu, CDropdownToggle } from '@coreui/react' import { useNavigate, useSearchParams } from 'react-router-dom' import { queryString } from 'src/helpers' import { faBuilding } from '@fortawesome/free-solid-svg-icons' import { FontAwesomeIcon } from '@fortawesome/react-fontawesome' +import CippTenantOffcanvas from './CippTenantOffcanvas' const TenantSelector = ({ action, showAllTenantSelector = true, NavSelector = false }) => { const currentTenant = useSelector((state) => state.app.currentTenant) @@ -57,7 +58,6 @@ const TenantSelector = ({ action, showAllTenantSelector = true, NavSelector = fa return t.customerId === customerId }) dispatch(setCurrentTenant({ tenant: selectedTenant[0] })) - if (typeof action === 'function') { action(selectedTenant[0]) } else { @@ -75,32 +75,38 @@ const TenantSelector = ({ action, showAllTenantSelector = true, NavSelector = fa return ( <> {NavSelector && ( - - - - {currentTenant?.defaultDomainName ? ( - <> - {currentTenant.displayName} - - ) : ( - placeholder - )} - - - ({ - value: customerId, - name: [displayName] + [` (${defaultDomainName})`], - }))} - /> - - + <> + + + {currentTenant?.customerId !== 'AllTenants' ? ( + + ) : ( + + )} + {currentTenant?.defaultDomainName ? ( + <> + {currentTenant.displayName} + + ) : ( + placeholder + )} + + + ({ + value: customerId, + name: [displayName] + [` (${defaultDomainName})`], + }))} + /> + + + )} {!NavSelector && ( { - const [getTenantDetails, tenantDetails] = useLazyGenericGetRequestQuery() - const [ocVisible, setOCVisible] = useState(false) - - function loadOffCanvasDetails(domainName) { - setOCVisible(true) - getTenantDetails({ path: `api/ListTenantDetails?tenantfilter=${domainName}` }) - } - - function tenantProperty(tenantDetails, propertyName) { - return ( - <> - {tenantDetails.isFetching && } - {!tenantDetails.isFetching && - tenantDetails.isSuccess && - (tenantDetails.data[propertyName]?.toString() ?? ' ')} - - ) - } - const actions = Portals.map((portal) => ({ - icon: , - label: portal.label, - external: true, - color: 'info', - link: portal.url.replace(portal.variable, row[portal.variable]), - })) - return ( - <> - loadOffCanvasDetails(row.defaultDomainName)}> - - - , - label: 'Edit Tenant', - link: `/tenant/administration/tenants/Edit?tenantFilter=${row.defaultDomainName}&customerId=${row.customerId}`, - color: 'warning', - }, - ...actions, - ]} - placement="end" - visible={ocVisible} - id={row.id} - hideFunction={() => setOCVisible(false)} - /> - - ) -} +import { CippTenantOffcanvasRow } from 'src/components/utilities/CippTenantOffcanvas' const TenantsList = () => { const TenantListSelector = useSelector((state) => state.app.TenantListSelector) @@ -148,7 +54,7 @@ const TenantsList = () => { { name: 'Actions', center: true, - cell: Offcanvas, + cell: CippTenantOffcanvasRow, }, ] const titleButton = ( From eecd749050f2876037abb07f1df0ab618891a816 Mon Sep 17 00:00:00 2001 From: John Duprey Date: Sun, 3 Sep 2023 15:58:17 -0400 Subject: [PATCH 016/158] remove logging --- src/components/utilities/CippTenantOffcanvas.js | 2 -- 1 file changed, 2 deletions(-) diff --git a/src/components/utilities/CippTenantOffcanvas.js b/src/components/utilities/CippTenantOffcanvas.js index 1cb80cbacfeb..b15a595b3a92 100644 --- a/src/components/utilities/CippTenantOffcanvas.js +++ b/src/components/utilities/CippTenantOffcanvas.js @@ -9,14 +9,12 @@ import Portals from 'src/data/portals' export const CippTenantOffcanvasRow = (row, rowIndex, formatExtraData) => { const tenant = row - console.log('tenant offcanvas row') return CippTenantOffcanvas({ tenant: row }) } function CippTenantOffcanvas({ tenant, buildingIcon = false }) { const [getTenantDetails, tenantDetails] = useLazyGenericGetRequestQuery() const [ocVisible, setOCVisible] = useState(false) - console.log(tenant) function loadOffCanvasDetails(domainName) { setOCVisible(true) getTenantDetails({ path: `api/ListTenantDetails?tenantfilter=${domainName}` }) From 1be36e0e5d5613536cf98e2502aafacd4268fd7d Mon Sep 17 00:00:00 2001 From: John Duprey Date: Sun, 3 Sep 2023 16:10:22 -0400 Subject: [PATCH 017/158] Tenant Dashboard Improvements - Hide tenant overview on All Tenants - Adjust breakpoints for smaller resolutions - Move delegatedAdminPrivilege formatter to components - Bring CellBadge with delegated admin privilege to tenant overview --- .../tables/CellDelegatedPrivilege.js | 25 ++ src/components/tables/index.js | 2 + src/views/cipp/CIPPSettings.js | 21 +- src/views/home/Home.js | 344 +++++++++--------- 4 files changed, 209 insertions(+), 183 deletions(-) create mode 100644 src/components/tables/CellDelegatedPrivilege.js diff --git a/src/components/tables/CellDelegatedPrivilege.js b/src/components/tables/CellDelegatedPrivilege.js new file mode 100644 index 000000000000..66d44d8a65c0 --- /dev/null +++ b/src/components/tables/CellDelegatedPrivilege.js @@ -0,0 +1,25 @@ +import PropTypes from 'prop-types' +import { CellBadge } from './CellBadge' + +export function CellDelegatedPrivilege({ cell }) { + if (!cell) { + return + } + if (cell.toLowerCase() == 'none') { + return + } + if (cell === 'delegatedAdminPrivileges') { + return + } + if (cell === 'delegatedAndGranularDelegetedAdminPrivileges') { + return + } + if (cell === 'granularDelegatedAdminPrivileges') { + return + } + return +} + +CellDelegatedPrivilege.propTypes = { + cell: PropTypes.string, +} diff --git a/src/components/tables/index.js b/src/components/tables/index.js index 3358c488e18b..6c45e48aa1c1 100644 --- a/src/components/tables/index.js +++ b/src/components/tables/index.js @@ -4,6 +4,7 @@ import { CellDate, cellDateFormatter } from 'src/components/tables/CellDate' import { CellTip, CellTipButton, CellTipIcon } from 'src/components/tables/CellTip' import { CellNullText, cellNullTextFormatter } from 'src/components/tables/CellNullText' import { CellProgressBar, cellProgressBarFormatter } from 'src/components/tables/CellProgressBar' +import { CellDelegatedPrivilege } from './CellDelegatedPrivilege' import CippDatatable from 'src/components/tables/CippDatatable' import CippOffcanvasTable from 'src/components/tables/CippOffcanvasTable' import CippTable from 'src/components/tables/CippTable' @@ -27,4 +28,5 @@ export { CippOffcanvasTable, CippTable, WizardTableField, + CellDelegatedPrivilege, } diff --git a/src/views/cipp/CIPPSettings.js b/src/views/cipp/CIPPSettings.js index f3206116d62d..827441ad2b1c 100644 --- a/src/views/cipp/CIPPSettings.js +++ b/src/views/cipp/CIPPSettings.js @@ -80,6 +80,7 @@ import { TitleButton } from 'src/components/buttons' import Skeleton from 'react-loading-skeleton' import { Buffer } from 'buffer' import Extensions from 'src/data/Extensions.json' +import { CellDelegatedPrivilege } from 'src/components/tables/CellDelegatedPrivilege' const CIPPSettings = () => { const [active, setActive] = useState(1) @@ -702,25 +703,7 @@ const ExcludedTenantsSettings = () => { name: 'Relationship Type', selector: (row) => row['delegatedPrivilegeStatus'], sortable: true, - cell: (row, index, column) => { - const cell = column.selector(row) - if (!cell) { - return - } - if (cell.toLowerCase() == 'none') { - return - } - if (cell === 'delegatedAdminPrivileges') { - return - } - if (cell === 'delegatedAndGranularDelegetedAdminPrivileges') { - return - } - if (cell === 'granularDelegatedAdminPrivileges') { - return - } - return - }, + cell: (row) => CellDelegatedPrivilege({ cell: row['delegatedPrivilegeStatus'] }), exportSelector: 'delegatedPrivilegeStatus', }, { diff --git a/src/views/home/Home.js b/src/views/home/Home.js index 9e3741288987..1f4602f210f6 100644 --- a/src/views/home/Home.js +++ b/src/views/home/Home.js @@ -25,6 +25,7 @@ import { ActionContentCard } from 'src/components/contentcards' import { useSelector } from 'react-redux' import allStandardsList from 'src/data/standards' import ReactTimeAgo from 'react-time-ago' +import { CellDelegatedPrivilege } from 'src/components/tables/CellDelegatedPrivilege' const Home = () => { const currentTenant = useSelector((state) => state.app.currentTenant) @@ -171,173 +172,188 @@ const Home = () => {
    - - - -
    - {issuccessUserCounts && !isFetchingUserCount ? dashboard?.Users : } -
    -
    -
    - - -
    - {issuccessUserCounts && !isFetchingUserCount ? dashboard?.LicUsers : } -
    -
    -
    - - -
    {issuccessUserCounts && !isFetchingUserCount ? dashboard?.Gas : }
    -
    -
    - - -
    - {issuccessUserCounts && !isFetchingUserCount ? dashboard?.Guests : } -
    -
    -
    -
    - - - - - -

    Tenant Name

    - {currentTenant?.displayName} -
    - -

    Tenant ID

    - {currentTenant?.customerId} -
    - -

    Default Domain Name

    - {currentTenant?.defaultDomainName} -
    -
    - - -

    Tenant Status

    - {currentTenant?.delegatedPrivilegeStatus} -
    - -

    Creation Date

    - {(isLoadingOrg || isFetchingOrg) && } - {organization && !isFetchingOrg && organization?.createdDateTime} -
    - -

    AD Connect Status

    - {(isLoadingOrg || isFetchingOrg) && } - {!isLoadingOrg && !isFetchingOrg && organization?.onPremisesSyncEnabled ? ( - <> -
  • - Directory Sync: - {organization?.onPremisesLastSyncDateTime ? ( - - ) : ( - 'Never' - )} -
  • -
  • - Password Sync: - {organization?.onPremisesLastPasswordSyncDateTime ? ( - - ) : ( - 'Never' - )} -
  • - - ) : ( - 'Disabled' - )} -
    -
    - - -

    Domain(s)

    - {(isLoadingOrg || isFetchingOrg) && } - {!isFetchingOrg && - issuccessOrg && - organization?.verifiedDomains?.map((item) =>
  • {item.name}
  • )} -
    - -

    Capabilities

    - {(isLoadingOrg || isFetchingOrg) && } - {!isFetchingOrg && - issuccessOrg && - organization?.assignedPlans - ?.filter((p) => p.capabilityStatus == 'Enabled') - .reduce((plan, curr) => { - if (!plan.includes(curr.service)) { - plan.push(curr.service) - } - return plan - }, []) - .map((plan) => ( + {currentTenant?.customerId !== 'AllTenants' ? ( + <> + + + +
    + {issuccessUserCounts && !isFetchingUserCount ? dashboard?.Users : } +
    +
    +
    + + +
    + {issuccessUserCounts && !isFetchingUserCount ? dashboard?.LicUsers : } +
    +
    +
    + + +
    + {issuccessUserCounts && !isFetchingUserCount ? dashboard?.Gas : } +
    +
    +
    + + +
    + {issuccessUserCounts && !isFetchingUserCount ? dashboard?.Guests : } +
    +
    +
    +
    + + + + + +

    Tenant Name

    + {currentTenant?.displayName} +
    + +

    Tenant ID

    + {currentTenant?.customerId} +
    + +

    Default Domain Name

    + {currentTenant?.defaultDomainName} +
    +
    + + +

    Tenant Status

    + +
    + +

    Creation Date

    + {(isLoadingOrg || isFetchingOrg) && } + {organization && !isFetchingOrg && organization?.createdDateTime} +
    + +

    AD Connect Status

    + {(isLoadingOrg || isFetchingOrg) && } + {!isLoadingOrg && !isFetchingOrg && organization?.onPremisesSyncEnabled ? ( <> - {plan == 'exchange' &&
  • Exchange
  • } - {plan == 'AADPremiumService' &&
  • AAD Premium
  • } - {plan == 'WindowsDefenderATP' &&
  • Windows Defender
  • } +
  • + Directory Sync: + {organization?.onPremisesLastSyncDateTime ? ( + + ) : ( + 'Never' + )} +
  • +
  • + Password Sync: + {organization?.onPremisesLastPasswordSyncDateTime ? ( + + ) : ( + 'Never' + )} +
  • - ))} -
    - -

    Sharepoint Quota

    - {(isLoadingSPQuota || isFetchingSPQuota) && } - {sharepoint && !isFetchingSPQuota && sharepoint?.Dashboard} -
    - -

    Applied Standards

    - {(isLoadingStandards || isFetchingStandards) && } - {issuccessStandards && - !isFetchingStandards && - standards - .filter( - (p) => - p.displayName == 'AllTenants' || - p.displayName == currentTenant.defaultDomainName, - ) - .flatMap((tenant) => { - return Object.keys(tenant.standards).map((standard) => { - const standardDisplayname = allStandardsList.filter((p) => - p.name.includes(standard), - ) - return ( -
  • - {standardDisplayname[0]?.label} ({tenant.displayName}) -
  • + ) : ( + 'Disabled' + )} +
    +
    + + +

    Domain(s)

    + {(isLoadingOrg || isFetchingOrg) && } + {!isFetchingOrg && + issuccessOrg && + organization?.verifiedDomains?.map((item) =>
  • {item.name}
  • )} +
    + +

    Capabilities

    + {(isLoadingOrg || isFetchingOrg) && } + {!isFetchingOrg && + issuccessOrg && + organization?.assignedPlans + ?.filter((p) => p.capabilityStatus == 'Enabled') + .reduce((plan, curr) => { + if (!plan.includes(curr.service)) { + plan.push(curr.service) + } + return plan + }, []) + .map((plan) => ( + <> + {plan == 'exchange' &&
  • Exchange
  • } + {plan == 'AADPremiumService' &&
  • AAD Premium
  • } + {plan == 'WindowsDefenderATP' &&
  • Windows Defender
  • } + + ))} +
    + +

    Sharepoint Quota

    + {(isLoadingSPQuota || isFetchingSPQuota) && } + {sharepoint && !isFetchingSPQuota && sharepoint?.Dashboard} +
    + +

    Applied Standards

    + {(isLoadingStandards || isFetchingStandards) && } + {issuccessStandards && + !isFetchingStandards && + standards + .filter( + (p) => + p.displayName == 'AllTenants' || + p.displayName == currentTenant.defaultDomainName, ) - }) - })} -
    - -

    Partner Relationships

    - {(isLoadingPartners || isFetchingPartners) && } - {issuccessPartners && - !isFetchingPartners && - partners.map((partner) => { - if (partner.TenantInfo) { - return ( -
  • - {partner.TenantInfo.displayName} ({partner.TenantInfo.defaultDomainName}) -
  • - ) - } - })} -
    -
    -
    -
    -
    - - - - - - - - + .flatMap((tenant) => { + return Object.keys(tenant.standards).map((standard) => { + const standardDisplayname = allStandardsList.filter((p) => + p.name.includes(standard), + ) + return ( +
  • + {standardDisplayname[0]?.label} ({tenant.displayName}) +
  • + ) + }) + })} +
    + +

    Partner Relationships

    + {(isLoadingPartners || isFetchingPartners) && } + {issuccessPartners && + !isFetchingPartners && + partners.map((partner) => { + if (partner.TenantInfo) { + return ( +
  • + {partner.TenantInfo.displayName} ( + {partner.TenantInfo.defaultDomainName}) +
  • + ) + } + })} +
    +
    +
    +
    +
    + + + + + + + + + + ) : ( + + + + Select a Tenant to show the dashboard + + + + )} ) } From d273f25da2ed84c585939fe86d716d99104f3ce2 Mon Sep 17 00:00:00 2001 From: John Duprey Date: Sun, 3 Sep 2023 18:49:15 -0400 Subject: [PATCH 018/158] FontAwesome Global Library - Import FontAwesome fas library in App.js - Add icon property to portals.json - Update dashboard portal links to use portals.json instead of static list - Update Tenant offcanvas to use icon property - Update tenant list to use icon property --- src/App.js | 4 ++ .../utilities/CippTenantOffcanvas.js | 3 +- src/data/portals.json | 24 ++++++--- src/views/home/Home.js | 50 +++---------------- src/views/tenant/administration/Tenants.js | 2 +- 5 files changed, 31 insertions(+), 52 deletions(-) diff --git a/src/App.js b/src/App.js index 3ed5f1f12ae4..f3fa887346d6 100644 --- a/src/App.js +++ b/src/App.js @@ -9,6 +9,10 @@ import Skeleton from 'react-loading-skeleton' import TimeAgo from 'javascript-time-ago' import en from 'javascript-time-ago/locale/en.json' TimeAgo.addDefaultLocale(en) +import { library } from '@fortawesome/fontawesome-svg-core' +import { fas } from '@fortawesome/free-solid-svg-icons' + +library.add(fas) // Containers const DefaultLayout = React.lazy(() => import('./layout/DefaultLayout')) diff --git a/src/components/utilities/CippTenantOffcanvas.js b/src/components/utilities/CippTenantOffcanvas.js index b15a595b3a92..d8c003fe99ba 100644 --- a/src/components/utilities/CippTenantOffcanvas.js +++ b/src/components/utilities/CippTenantOffcanvas.js @@ -31,7 +31,7 @@ function CippTenantOffcanvas({ tenant, buildingIcon = false }) { ) } const actions = Portals.map((portal) => ({ - icon: , + icon: , label: portal.label, external: true, color: 'info', @@ -84,6 +84,7 @@ function CippTenantOffcanvas({ tenant, buildingIcon = false }) { ]} actions={[ { + id: 'edittenant', icon: , label: 'Edit Tenant', link: `/tenant/administration/tenants/Edit?tenantFilter=${tenant.defaultDomainName}&customerId=${tenant.customerId}`, diff --git a/src/data/portals.json b/src/data/portals.json index 38851cfcff98..3c09331a2440 100644 --- a/src/data/portals.json +++ b/src/data/portals.json @@ -5,7 +5,8 @@ "url": "https://admin.microsoft.com/Partner/BeginClientSession.aspx?CTID=customerId&CSDEST=o365admincenter", "variable": "customerId", "target": "_blank", - "external": true + "external": true, + "icon": "cog" }, { "label": "Exchange Portal", @@ -13,7 +14,8 @@ "url": "https://admin.exchange.microsoft.com/?landingpage=homepage&form=mac_sidebar&delegatedOrg=defaultDomainName#", "variable": "defaultDomainName", "target": "_blank", - "external": true + "external": true, + "icon": "mail-bulk" }, { "label": "Entra Portal", @@ -21,7 +23,8 @@ "url": "https://entra.microsoft.com/defaultDomainName", "variable": "defaultDomainName", "target": "_blank", - "external": true + "external": true, + "icon": "users" }, { "label": "Teams Portal", @@ -29,7 +32,8 @@ "url": "https://admin.teams.microsoft.com/?delegatedOrg=defaultDomainName", "variable": "defaultDomainName", "target": "_blank", - "external": true + "external": true, + "icon": "comments" }, { "label": "Azure Portal", @@ -37,7 +41,8 @@ "url": "https://portal.azure.com/defaultDomainName", "variable": "defaultDomainName", "target": "_blank", - "external": true + "external": true, + "icon": "server" }, { "label": "Intune Portal", @@ -45,7 +50,8 @@ "url": "https://intune.microsoft.com/defaultDomainName", "variable": "defaultDomainName", "target": "_blank", - "external": true + "external": true, + "icon": "laptop-code" }, { "label": "Security Portal", @@ -53,7 +59,8 @@ "url": "https://security.microsoft.com/?tid=customerId", "variable": "customerId", "target": "_blank", - "external": true + "external": true, + "icon": "shield-alt" }, { "label": "Sharepoint Admin", @@ -61,6 +68,7 @@ "url": "https://admin.microsoft.com/Partner/beginclientsession.aspx?CTID=customerId&CSDEST=SharePoint", "variable": "customerId", "target": "_blank", - "external": true + "external": true, + "icon": "book" } ] diff --git a/src/views/home/Home.js b/src/views/home/Home.js index 1f4602f210f6..e3025e587fda 100644 --- a/src/views/home/Home.js +++ b/src/views/home/Home.js @@ -26,6 +26,8 @@ import { useSelector } from 'react-redux' import allStandardsList from 'src/data/standards' import ReactTimeAgo from 'react-time-ago' import { CellDelegatedPrivilege } from 'src/components/tables/CellDelegatedPrivilege' +import Portals from 'src/data/portals' +import { FontAwesomeIcon } from '@fortawesome/react-fontawesome' const Home = () => { const currentTenant = useSelector((state) => state.app.currentTenant) @@ -83,48 +85,12 @@ const Home = () => { }, }) - const actions1 = [ - { - label: 'M365 Admin', - link: `https://portal.office.com/Partner/BeginClientSession.aspx?CTID=${currentTenant.customerId}&CSDEST=o365admincenter`, - target: '_blank', - icon: faCog, - }, - { - label: 'Exchange', - link: `https://admin.exchange.microsoft.com/?landingpage=homepage&form=mac_sidebar&delegatedOrg=${currentTenant.defaultDomainName}#`, - target: '_blank', - icon: faMailBulk, - }, - { - label: 'Intune', - link: `https://intune.microsoft.com/${currentTenant.defaultDomainName}`, - target: '_blank', - icon: faLaptopCode, - }, - { - label: 'Entra', - link: `https://entra.microsoft.com/${currentTenant.defaultDomainName}`, - target: '_blank', - icon: faUsers, - }, - { - label: 'Security', - link: `https://security.microsoft.com/?tid=${currentTenant.customerId}`, - target: '_blank', - icon: faShieldAlt, - }, - { - label: 'Azure', - link: `https://portal.azure.com/#@${currentTenant.customerId}`, - icon: faServer, - }, - { - label: 'Sharepoint', - link: `https://admin.microsoft.com/Partner/beginclientsession.aspx?CTID=${currentTenant.customerId}&CSDEST=SharePoint`, - icon: faBook, - }, - ] + const actions1 = Portals.map((portal) => ({ + icon: portal.icon, + label: portal.label, + target: '_blank', + link: portal.url.replace(portal.variable, currentTenant[portal.variable]), + })) const actions2 = [ { diff --git a/src/views/tenant/administration/Tenants.js b/src/views/tenant/administration/Tenants.js index 2b99aaad1033..24b700a30f08 100644 --- a/src/views/tenant/administration/Tenants.js +++ b/src/views/tenant/administration/Tenants.js @@ -25,7 +25,7 @@ const TenantsList = () => { className="dlink" rel="noreferrer" > - + ), }) From 7e3140a4a92d62b4f3fde4b75ae6f940f96a1e1b Mon Sep 17 00:00:00 2001 From: John Duprey Date: Sun, 3 Sep 2023 18:50:06 -0400 Subject: [PATCH 019/158] Set footer position to sticky --- src/components/layout/AppFooter.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/components/layout/AppFooter.js b/src/components/layout/AppFooter.js index ecfba658b219..967f7bb3d1ff 100644 --- a/src/components/layout/AppFooter.js +++ b/src/components/layout/AppFooter.js @@ -8,7 +8,7 @@ import netfriends from 'src/assets/images/netfriends.png' //todo: Add darkmode detection and change logos accordingly. const AppFooter = () => { return ( - +

    This application is sponsored by{' '} From 90dc81e533ef7939c23edd99a4ffcf29eda18ff1 Mon Sep 17 00:00:00 2001 From: John Duprey Date: Sun, 3 Sep 2023 18:51:39 -0400 Subject: [PATCH 020/158] CippActionsOffcanvas - Refresh button - Add refreshFunction prop to CippActionsOffcanvas and CippOffcanvas - Add refresh function to Recent Jobs in AppHeaderDropdown --- src/components/header/AppHeaderDropdown.js | 15 +++++++++---- .../utilities/CippActionsOffcanvas.js | 3 ++- src/components/utilities/CippOffcanvas.js | 21 ++++++++++++++++--- 3 files changed, 31 insertions(+), 8 deletions(-) diff --git a/src/components/header/AppHeaderDropdown.js b/src/components/header/AppHeaderDropdown.js index 568e03211542..93b9c499d493 100644 --- a/src/components/header/AppHeaderDropdown.js +++ b/src/components/header/AppHeaderDropdown.js @@ -18,24 +18,30 @@ const AppHeaderDropdown = () => { const [profileVisible, setProfileVisible] = useState(false) const [cippQueueExtendedInfo, setCippQueueExtendedInfo] = useState([]) const [cippQueueVisible, setCippQueueVisible] = useState(false) - const [cippQueueRefresh, setCippQueueRefresh] = useState('') + const [cippQueueRefresh, setCippQueueRefresh] = useState( + (Math.random() + 1).toString(36).substring(7), + ) const { data: profile } = authApi.endpoints.loadClientPrincipal.useQueryState() const [getCippQueueList, cippQueueList] = useLazyGenericGetRequestQuery() function loadCippQueue() { setCippQueueVisible(true) + getCippQueueList({ path: 'api/ListCippQueue', params: { refresh: cippQueueRefresh } }) + } + + function refreshCippQueue() { setCippQueueRefresh((Math.random() + 1).toString(36).substring(7)) - getCippQueueList({ path: `api/ListCippQueue?refresh=${cippQueueRefresh}` }) + loadCippQueue() } useEffect(() => { - if (cippQueueList.isFetching) { + if (cippQueueList.isFetching || cippQueueList.isLoading) { setCippQueueExtendedInfo([ { label: 'Fetching recent jobs', value: 'Please wait', - timpestamp: Date(), + timestamp: Date(), link: '#', }, ]) @@ -101,6 +107,7 @@ const AppHeaderDropdown = () => { title="Recent Jobs" extendedInfo={[]} cards={cippQueueExtendedInfo} + refreshFunction={refreshCippQueue} actions={[ { label: 'Clear History', diff --git a/src/components/utilities/CippActionsOffcanvas.js b/src/components/utilities/CippActionsOffcanvas.js index bdf28fae5cff..1bcf1773251f 100644 --- a/src/components/utilities/CippActionsOffcanvas.js +++ b/src/components/utilities/CippActionsOffcanvas.js @@ -101,7 +101,7 @@ export default function CippActionsOffcanvas(props) { try { cardContent = props.cards.map((action, index) => ( <> - + Report Name: {action.label} @@ -178,6 +178,7 @@ export default function CippActionsOffcanvas(props) { visible={props.visible} id={props.id} hideFunction={props.hideFunction} + refreshFunction={props.refreshFunction} > {getResults.isFetching && ( diff --git a/src/components/utilities/CippOffcanvas.js b/src/components/utilities/CippOffcanvas.js index 624f26c135ba..7a6590eb57d1 100644 --- a/src/components/utilities/CippOffcanvas.js +++ b/src/components/utilities/CippOffcanvas.js @@ -17,9 +17,23 @@ export default function CippOffcanvas(props) { >

    {props.title}

    - - - + + {props.refreshFunction && ( + { + console.log('refresh') + props.refreshFunction() + }} + > + + + )} + + + + {props.children} @@ -33,6 +47,7 @@ export const CippOffcanvasPropTypes = { visible: PropTypes.bool, id: PropTypes.string.isRequired, hideFunction: PropTypes.func.isRequired, + refreshFunction: PropTypes.func, } CippOffcanvas.propTypes = CippOffcanvasPropTypes From 16d7a1925f1f513477dd95ffae16922ed8cd78bb Mon Sep 17 00:00:00 2001 From: John Duprey Date: Sun, 3 Sep 2023 19:47:25 -0400 Subject: [PATCH 021/158] Add tooltips --- .../utilities/CippTenantOffcanvas.js | 20 +++++---- src/views/cipp/CIPPSettings.js | 45 +++++++++++-------- 2 files changed, 37 insertions(+), 28 deletions(-) diff --git a/src/components/utilities/CippTenantOffcanvas.js b/src/components/utilities/CippTenantOffcanvas.js index d8c003fe99ba..79f249452f6e 100644 --- a/src/components/utilities/CippTenantOffcanvas.js +++ b/src/components/utilities/CippTenantOffcanvas.js @@ -1,7 +1,7 @@ import React, { useState } from 'react' -import { CButton } from '@coreui/react' +import { CButton, CTooltip } from '@coreui/react' import { FontAwesomeIcon } from '@fortawesome/react-fontawesome' -import { faCog, faEdit, faEllipsisV, faBuilding } from '@fortawesome/free-solid-svg-icons' +import { faEdit, faEllipsisV, faBuilding } from '@fortawesome/free-solid-svg-icons' import { CippActionsOffcanvas } from 'src/components/utilities' import { useLazyGenericGetRequestQuery } from 'src/store/api/app' import Skeleton from 'react-loading-skeleton' @@ -39,13 +39,15 @@ function CippTenantOffcanvas({ tenant, buildingIcon = false }) { })) return ( <> - loadOffCanvasDetails(tenant.defaultDomainName)} - > - - + + loadOffCanvasDetails(tenant.defaultDomainName)} + > + + + { return ( <> {row.Excluded && ( - handleRemoveExclusion(row.defaultDomainName)} - > - - + + handleRemoveExclusion(row.defaultDomainName)} + > + + + )} {!row.Excluded && ( - handleConfirmExcludeTenant({ value: row.customerId })} - > - - + + handleConfirmExcludeTenant({ value: row.customerId })} + > + + + )} - handleCPVPermissions(row)}> - - + + handleCPVPermissions(row)}> + + + ) } From 598fbba0d6b22d6a321692d2b2d6a46be51e2119 Mon Sep 17 00:00:00 2001 From: John Duprey Date: Sun, 3 Sep 2023 19:48:28 -0400 Subject: [PATCH 022/158] Update TenantSelector.js --- src/components/utilities/TenantSelector.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/components/utilities/TenantSelector.js b/src/components/utilities/TenantSelector.js index dfa54ac55ab6..686fdd0727e4 100644 --- a/src/components/utilities/TenantSelector.js +++ b/src/components/utilities/TenantSelector.js @@ -4,7 +4,7 @@ import { useDispatch, useSelector } from 'react-redux' import PropTypes from 'prop-types' import { useListTenantsQuery } from 'src/store/api/tenants' import { setCurrentTenant } from 'src/store/features/app' -import { CButton, CDropdown, CDropdownMenu, CDropdownToggle } from '@coreui/react' +import { CDropdown, CDropdownMenu, CDropdownToggle } from '@coreui/react' import { useNavigate, useSearchParams } from 'react-router-dom' import { queryString } from 'src/helpers' import { faBuilding } from '@fortawesome/free-solid-svg-icons' From ce3c999783f2b281c00c30eb316f3206fbf22a24 Mon Sep 17 00:00:00 2001 From: John Duprey Date: Mon, 4 Sep 2023 23:15:48 -0400 Subject: [PATCH 023/158] BPA Field Builder - Added to Tools menu - Install @monaco-editor/react - Install @rjsf/core, @rjsf/utils, @rjsf/validator-ajv8 --- package-lock.json | 417 +++++++++++++++++- package.json | 4 + src/_nav.js | 5 + src/data/BPAField.schema.v1.json | 229 ++++++++++ src/data/BPAField.uischema.v1.json | 26 ++ src/routes.js | 6 + src/scss/_custom.scss | 24 + src/views/tenant/standards/BPAFieldBuilder.js | 56 +++ 8 files changed, 747 insertions(+), 20 deletions(-) create mode 100644 src/data/BPAField.schema.v1.json create mode 100644 src/data/BPAField.uischema.v1.json create mode 100644 src/views/tenant/standards/BPAFieldBuilder.js diff --git a/package-lock.json b/package-lock.json index f3e873c9bc78..a7f3bc927e18 100644 --- a/package-lock.json +++ b/package-lock.json @@ -19,8 +19,12 @@ "@fortawesome/free-regular-svg-icons": "^5.15.4", "@fortawesome/free-solid-svg-icons": "^5.15.4", "@fortawesome/react-fontawesome": "^0.1.16", + "@monaco-editor/react": "^4.5.2", "@popperjs/core": "^2.10.2", "@reduxjs/toolkit": "^1.7.0", + "@rjsf/core": "^5.12.1", + "@rjsf/utils": "^5.12.1", + "@rjsf/validator-ajv8": "^5.12.1", "@wojtekmaj/enzyme-adapter-react-17": "^0.6.3", "axios": "^0.24.0", "buffer": "^6.0.3", @@ -3057,6 +3061,30 @@ "dev": true, "license": "MIT" }, + "node_modules/@monaco-editor/loader": { + "version": "1.3.3", + "resolved": "https://registry.npmjs.org/@monaco-editor/loader/-/loader-1.3.3.tgz", + "integrity": "sha512-6KKF4CTzcJiS8BJwtxtfyYt9shBiEv32ateQ9T4UVogwn4HM/uPo9iJd2Dmbkpz8CM6Y0PDUpjnZzCwC+eYo2Q==", + "dependencies": { + "state-local": "^1.0.6" + }, + "peerDependencies": { + "monaco-editor": ">= 0.21.0 < 1" + } + }, + "node_modules/@monaco-editor/react": { + "version": "4.5.2", + "resolved": "https://registry.npmjs.org/@monaco-editor/react/-/react-4.5.2.tgz", + "integrity": "sha512-emcWu6vg1OpXPiYll4aPOaXe8bwYB4UaaNTwtArFLgMoNGBzRZb2Xn0Bra2HMIFM7QLgs7fCGunHO5LkfT2LBA==", + "dependencies": { + "@monaco-editor/loader": "^1.3.3" + }, + "peerDependencies": { + "monaco-editor": ">= 0.25.0 < 1", + "react": "^16.8.0 || ^17.0.0 || ^18.0.0", + "react-dom": "^16.8.0 || ^17.0.0 || ^18.0.0" + } + }, "node_modules/@nodelib/fs.scandir": { "version": "2.1.5", "dev": true, @@ -3183,6 +3211,85 @@ "@babel/runtime": "^7.9.2" } }, + "node_modules/@rjsf/core": { + "version": "5.12.1", + "resolved": "https://registry.npmjs.org/@rjsf/core/-/core-5.12.1.tgz", + "integrity": "sha512-1YFhZ90/uHRx1akQmDdIjBxGMjs/5gtuTLUFwl6GbOwTm2fhZRh3qXRFyTXz81Oy6TGcbrxBJEYvFg2iHjYKCA==", + "dependencies": { + "lodash": "^4.17.21", + "lodash-es": "^4.17.21", + "markdown-to-jsx": "^7.3.2", + "nanoid": "^3.3.6", + "prop-types": "^15.8.1" + }, + "engines": { + "node": ">=14" + }, + "peerDependencies": { + "@rjsf/utils": "^5.8.x", + "react": "^16.14.0 || >=17" + } + }, + "node_modules/@rjsf/utils": { + "version": "5.12.1", + "resolved": "https://registry.npmjs.org/@rjsf/utils/-/utils-5.12.1.tgz", + "integrity": "sha512-/k8+7WdLwhaYsOQvH5BQINipj2IJvjEW3QQv4jQQ7sXtkpdUjieZayRfaE8DHfRdm9HjgJURJFDy3EODkWPl6A==", + "dependencies": { + "json-schema-merge-allof": "^0.8.1", + "jsonpointer": "^5.0.1", + "lodash": "^4.17.21", + "lodash-es": "^4.17.21", + "react-is": "^18.2.0" + }, + "engines": { + "node": ">=14" + }, + "peerDependencies": { + "react": "^16.14.0 || >=17" + } + }, + "node_modules/@rjsf/utils/node_modules/react-is": { + "version": "18.2.0", + "resolved": "https://registry.npmjs.org/react-is/-/react-is-18.2.0.tgz", + "integrity": "sha512-xWGDIW6x921xtzPkhiULtthJHoJvBbF3q26fzloPCK0hsvxtPVelvftw3zjbHWSkR2km9Z+4uxbDDK/6Zw9B8w==" + }, + "node_modules/@rjsf/validator-ajv8": { + "version": "5.12.1", + "resolved": "https://registry.npmjs.org/@rjsf/validator-ajv8/-/validator-ajv8-5.12.1.tgz", + "integrity": "sha512-m4QO44yp60LTIfd4RPUu/h07B8U9umbD3I4Nh4iv9oyUudncaZFFXRopKcBm08v30VkN0tjMwuu0SxGDpzMtHA==", + "dependencies": { + "ajv": "^8.12.0", + "ajv-formats": "^2.1.1", + "lodash": "^4.17.21", + "lodash-es": "^4.17.21" + }, + "engines": { + "node": ">=14" + }, + "peerDependencies": { + "@rjsf/utils": "^5.8.x" + } + }, + "node_modules/@rjsf/validator-ajv8/node_modules/ajv": { + "version": "8.12.0", + "resolved": "https://registry.npmjs.org/ajv/-/ajv-8.12.0.tgz", + "integrity": "sha512-sRu1kpcO9yLtYxBKvqfTeh9KzZEwO3STyX1HT+4CaDzC6HpTGYhIhPIzj9XuKU7KYDwnaeh5hcOwjy1QuJzBPA==", + "dependencies": { + "fast-deep-equal": "^3.1.1", + "json-schema-traverse": "^1.0.0", + "require-from-string": "^2.0.2", + "uri-js": "^4.2.2" + }, + "funding": { + "type": "github", + "url": "https://github.com/sponsors/epoberezkin" + } + }, + "node_modules/@rjsf/validator-ajv8/node_modules/json-schema-traverse": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/json-schema-traverse/-/json-schema-traverse-1.0.0.tgz", + "integrity": "sha512-NM8/P9n3XjXhIZn1lLhkFaACTOURQXjWhV4BA/RnOv8xvgqtqpAX9IO4mRQxSx1Rlo4tqzeqb0sOlruaOy3dug==" + }, "node_modules/@rollup/plugin-babel": { "version": "5.3.1", "dev": true, @@ -4723,7 +4830,6 @@ }, "node_modules/ajv-formats": { "version": "2.1.1", - "dev": true, "license": "MIT", "dependencies": { "ajv": "^8.0.0" @@ -4739,7 +4845,6 @@ }, "node_modules/ajv-formats/node_modules/ajv": { "version": "8.10.0", - "dev": true, "license": "MIT", "dependencies": { "fast-deep-equal": "^3.1.1", @@ -4754,7 +4859,6 @@ }, "node_modules/ajv-formats/node_modules/json-schema-traverse": { "version": "1.0.0", - "dev": true, "license": "MIT" }, "node_modules/ajv-keywords": { @@ -6074,6 +6178,27 @@ "dev": true, "license": "MIT" }, + "node_modules/compute-gcd": { + "version": "1.2.1", + "resolved": "https://registry.npmjs.org/compute-gcd/-/compute-gcd-1.2.1.tgz", + "integrity": "sha512-TwMbxBNz0l71+8Sc4czv13h4kEqnchV9igQZBi6QUaz09dnz13juGnnaWWJTRsP3brxOoxeB4SA2WELLw1hCtg==", + "dependencies": { + "validate.io-array": "^1.0.3", + "validate.io-function": "^1.0.2", + "validate.io-integer-array": "^1.0.0" + } + }, + "node_modules/compute-lcm": { + "version": "1.1.2", + "resolved": "https://registry.npmjs.org/compute-lcm/-/compute-lcm-1.1.2.tgz", + "integrity": "sha512-OFNPdQAXnQhDSKioX8/XYT6sdUlXwpeMjfd6ApxMJfyZ4GxmLR1xvMERctlYhlHwIiz6CSpBc2+qYKjHGZw4TQ==", + "dependencies": { + "compute-gcd": "^1.2.1", + "validate.io-array": "^1.0.3", + "validate.io-function": "^1.0.2", + "validate.io-integer-array": "^1.0.0" + } + }, "node_modules/concat-map": { "version": "0.0.1", "dev": true, @@ -11886,6 +12011,27 @@ "dev": true, "license": "(AFL-2.1 OR BSD-3-Clause)" }, + "node_modules/json-schema-compare": { + "version": "0.2.2", + "resolved": "https://registry.npmjs.org/json-schema-compare/-/json-schema-compare-0.2.2.tgz", + "integrity": "sha512-c4WYmDKyJXhs7WWvAWm3uIYnfyWFoIp+JEoX34rctVvEkMYCPGhXtvmFFXiffBbxfZsvQ0RNnV5H7GvDF5HCqQ==", + "dependencies": { + "lodash": "^4.17.4" + } + }, + "node_modules/json-schema-merge-allof": { + "version": "0.8.1", + "resolved": "https://registry.npmjs.org/json-schema-merge-allof/-/json-schema-merge-allof-0.8.1.tgz", + "integrity": "sha512-CTUKmIlPJbsWfzRRnOXz+0MjIqvnleIXwFTzz+t9T86HnYX/Rozria6ZVGLktAU9e+NygNljveP+yxqtQp/Q4w==", + "dependencies": { + "compute-lcm": "^1.1.2", + "json-schema-compare": "^0.2.2", + "lodash": "^4.17.20" + }, + "engines": { + "node": ">=12.0.0" + } + }, "node_modules/json-schema-traverse": { "version": "0.4.1", "license": "MIT" @@ -11923,9 +12069,9 @@ } }, "node_modules/jsonpointer": { - "version": "5.0.0", - "dev": true, - "license": "MIT", + "version": "5.0.1", + "resolved": "https://registry.npmjs.org/jsonpointer/-/jsonpointer-5.0.1.tgz", + "integrity": "sha512-p/nXbhSEcu3pZRdkW1OfJhpsVtW1gd4Wa1fnQc9YLiTfAjn0312eMKimbdIQzuZl9aa9xUGaRlP9T/CJE/ditQ==", "engines": { "node": ">=0.10.0" } @@ -12078,6 +12224,11 @@ "version": "4.17.21", "license": "MIT" }, + "node_modules/lodash-es": { + "version": "4.17.21", + "resolved": "https://registry.npmjs.org/lodash-es/-/lodash-es-4.17.21.tgz", + "integrity": "sha512-mKnC+QJ9pWVzv+C4/U3rRsHapFfHvQFoFB92e52xeyGMcX6/OlIl78je1u8vePzYZSkkogMPJ2yjxxsb89cxyw==" + }, "node_modules/lodash.debounce": { "version": "4.0.8", "license": "MIT" @@ -12204,6 +12355,17 @@ "url": "https://github.com/sponsors/sindresorhus" } }, + "node_modules/markdown-to-jsx": { + "version": "7.3.2", + "resolved": "https://registry.npmjs.org/markdown-to-jsx/-/markdown-to-jsx-7.3.2.tgz", + "integrity": "sha512-B+28F5ucp83aQm+OxNrPkS8z0tMKaeHiy0lHJs3LqCyDQFtWuenaIrkaVTgAm1pf1AU85LXltva86hlaT17i8Q==", + "engines": { + "node": ">= 10" + }, + "peerDependencies": { + "react": ">= 0.14.0" + } + }, "node_modules/masonry-layout": { "version": "4.2.2", "license": "MIT", @@ -12485,6 +12647,12 @@ "node": "*" } }, + "node_modules/monaco-editor": { + "version": "0.41.0", + "resolved": "https://registry.npmjs.org/monaco-editor/-/monaco-editor-0.41.0.tgz", + "integrity": "sha512-1o4olnZJsiLmv5pwLEAmzHTE/5geLKQ07BrGxlF4Ri/AXAc2yyDGZwHjiTqD8D/ROKUZmwMA28A+yEowLNOEcA==", + "peer": true + }, "node_modules/moo": { "version": "0.5.1", "license": "BSD-3-Clause" @@ -12506,9 +12674,15 @@ } }, "node_modules/nanoid": { - "version": "3.3.4", - "dev": true, - "license": "MIT", + "version": "3.3.6", + "resolved": "https://registry.npmjs.org/nanoid/-/nanoid-3.3.6.tgz", + "integrity": "sha512-BGcqMMJuToF7i1rt+2PWSNVnWIkGCU78jBG3RxO/bZlnZPK2Cmi2QaffxGO/2RvWi9sL+FAiRiXMgsyxQ1DIDA==", + "funding": [ + { + "type": "github", + "url": "https://github.com/sponsors/ai" + } + ], "bin": { "nanoid": "bin/nanoid.cjs" }, @@ -15582,7 +15756,6 @@ }, "node_modules/require-from-string": { "version": "2.0.2", - "dev": true, "license": "MIT", "engines": { "node": ">=0.10.0" @@ -16378,6 +16551,11 @@ "dev": true, "license": "MIT" }, + "node_modules/state-local": { + "version": "1.0.7", + "resolved": "https://registry.npmjs.org/state-local/-/state-local-1.0.7.tgz", + "integrity": "sha512-HTEHMNieakEnoe33shBYcZ7NX83ACUjCu8c40iOGEZsngj9zRnkqS9j1pqQPXwobB0ZcVTk27REb7COQ0UR59w==" + }, "node_modules/statuses": { "version": "1.5.0", "dev": true, @@ -17586,6 +17764,38 @@ "spdx-expression-parse": "^3.0.0" } }, + "node_modules/validate.io-array": { + "version": "1.0.6", + "resolved": "https://registry.npmjs.org/validate.io-array/-/validate.io-array-1.0.6.tgz", + "integrity": "sha512-DeOy7CnPEziggrOO5CZhVKJw6S3Yi7e9e65R1Nl/RTN1vTQKnzjfvks0/8kQ40FP/dsjRAOd4hxmJ7uLa6vxkg==" + }, + "node_modules/validate.io-function": { + "version": "1.0.2", + "resolved": "https://registry.npmjs.org/validate.io-function/-/validate.io-function-1.0.2.tgz", + "integrity": "sha512-LlFybRJEriSuBnUhQyG5bwglhh50EpTL2ul23MPIuR1odjO7XaMLFV8vHGwp7AZciFxtYOeiSCT5st+XSPONiQ==" + }, + "node_modules/validate.io-integer": { + "version": "1.0.5", + "resolved": "https://registry.npmjs.org/validate.io-integer/-/validate.io-integer-1.0.5.tgz", + "integrity": "sha512-22izsYSLojN/P6bppBqhgUDjCkr5RY2jd+N2a3DCAUey8ydvrZ/OkGvFPR7qfOpwR2LC5p4Ngzxz36g5Vgr/hQ==", + "dependencies": { + "validate.io-number": "^1.0.3" + } + }, + "node_modules/validate.io-integer-array": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/validate.io-integer-array/-/validate.io-integer-array-1.0.0.tgz", + "integrity": "sha512-mTrMk/1ytQHtCY0oNO3dztafHYyGU88KL+jRxWuzfOmQb+4qqnWmI+gykvGp8usKZOM0H7keJHEbRaFiYA0VrA==", + "dependencies": { + "validate.io-array": "^1.0.3", + "validate.io-integer": "^1.0.4" + } + }, + "node_modules/validate.io-number": { + "version": "1.0.3", + "resolved": "https://registry.npmjs.org/validate.io-number/-/validate.io-number-1.0.3.tgz", + "integrity": "sha512-kRAyotcbNaSYoDnXvb4MHg/0a1egJdLwS6oJ38TJY7aw9n93Fl/3blIXdyYvPOp55CNxywooG/3BcrwNrBpcSg==" + }, "node_modules/vary": { "version": "1.1.2", "dev": true, @@ -20330,6 +20540,22 @@ "version": "2.0.3", "dev": true }, + "@monaco-editor/loader": { + "version": "1.3.3", + "resolved": "https://registry.npmjs.org/@monaco-editor/loader/-/loader-1.3.3.tgz", + "integrity": "sha512-6KKF4CTzcJiS8BJwtxtfyYt9shBiEv32ateQ9T4UVogwn4HM/uPo9iJd2Dmbkpz8CM6Y0PDUpjnZzCwC+eYo2Q==", + "requires": { + "state-local": "^1.0.6" + } + }, + "@monaco-editor/react": { + "version": "4.5.2", + "resolved": "https://registry.npmjs.org/@monaco-editor/react/-/react-4.5.2.tgz", + "integrity": "sha512-emcWu6vg1OpXPiYll4aPOaXe8bwYB4UaaNTwtArFLgMoNGBzRZb2Xn0Bra2HMIFM7QLgs7fCGunHO5LkfT2LBA==", + "requires": { + "@monaco-editor/loader": "^1.3.3" + } + }, "@nodelib/fs.scandir": { "version": "2.1.5", "dev": true, @@ -20391,6 +20617,66 @@ } } }, + "@rjsf/core": { + "version": "5.12.1", + "resolved": "https://registry.npmjs.org/@rjsf/core/-/core-5.12.1.tgz", + "integrity": "sha512-1YFhZ90/uHRx1akQmDdIjBxGMjs/5gtuTLUFwl6GbOwTm2fhZRh3qXRFyTXz81Oy6TGcbrxBJEYvFg2iHjYKCA==", + "requires": { + "lodash": "^4.17.21", + "lodash-es": "^4.17.21", + "markdown-to-jsx": "^7.3.2", + "nanoid": "^3.3.6", + "prop-types": "^15.8.1" + } + }, + "@rjsf/utils": { + "version": "5.12.1", + "resolved": "https://registry.npmjs.org/@rjsf/utils/-/utils-5.12.1.tgz", + "integrity": "sha512-/k8+7WdLwhaYsOQvH5BQINipj2IJvjEW3QQv4jQQ7sXtkpdUjieZayRfaE8DHfRdm9HjgJURJFDy3EODkWPl6A==", + "requires": { + "json-schema-merge-allof": "^0.8.1", + "jsonpointer": "^5.0.1", + "lodash": "^4.17.21", + "lodash-es": "^4.17.21", + "react-is": "^18.2.0" + }, + "dependencies": { + "react-is": { + "version": "18.2.0", + "resolved": "https://registry.npmjs.org/react-is/-/react-is-18.2.0.tgz", + "integrity": "sha512-xWGDIW6x921xtzPkhiULtthJHoJvBbF3q26fzloPCK0hsvxtPVelvftw3zjbHWSkR2km9Z+4uxbDDK/6Zw9B8w==" + } + } + }, + "@rjsf/validator-ajv8": { + "version": "5.12.1", + "resolved": "https://registry.npmjs.org/@rjsf/validator-ajv8/-/validator-ajv8-5.12.1.tgz", + "integrity": "sha512-m4QO44yp60LTIfd4RPUu/h07B8U9umbD3I4Nh4iv9oyUudncaZFFXRopKcBm08v30VkN0tjMwuu0SxGDpzMtHA==", + "requires": { + "ajv": "^8.12.0", + "ajv-formats": "^2.1.1", + "lodash": "^4.17.21", + "lodash-es": "^4.17.21" + }, + "dependencies": { + "ajv": { + "version": "8.12.0", + "resolved": "https://registry.npmjs.org/ajv/-/ajv-8.12.0.tgz", + "integrity": "sha512-sRu1kpcO9yLtYxBKvqfTeh9KzZEwO3STyX1HT+4CaDzC6HpTGYhIhPIzj9XuKU7KYDwnaeh5hcOwjy1QuJzBPA==", + "requires": { + "fast-deep-equal": "^3.1.1", + "json-schema-traverse": "^1.0.0", + "require-from-string": "^2.0.2", + "uri-js": "^4.2.2" + } + }, + "json-schema-traverse": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/json-schema-traverse/-/json-schema-traverse-1.0.0.tgz", + "integrity": "sha512-NM8/P9n3XjXhIZn1lLhkFaACTOURQXjWhV4BA/RnOv8xvgqtqpAX9IO4mRQxSx1Rlo4tqzeqb0sOlruaOy3dug==" + } + } + }, "@rollup/plugin-babel": { "version": "5.3.1", "dev": true, @@ -21370,14 +21656,12 @@ }, "ajv-formats": { "version": "2.1.1", - "dev": true, "requires": { "ajv": "^8.0.0" }, "dependencies": { "ajv": { "version": "8.10.0", - "dev": true, "requires": { "fast-deep-equal": "^3.1.1", "json-schema-traverse": "^1.0.0", @@ -21386,8 +21670,7 @@ } }, "json-schema-traverse": { - "version": "1.0.0", - "dev": true + "version": "1.0.0" } } }, @@ -22218,6 +22501,27 @@ } } }, + "compute-gcd": { + "version": "1.2.1", + "resolved": "https://registry.npmjs.org/compute-gcd/-/compute-gcd-1.2.1.tgz", + "integrity": "sha512-TwMbxBNz0l71+8Sc4czv13h4kEqnchV9igQZBi6QUaz09dnz13juGnnaWWJTRsP3brxOoxeB4SA2WELLw1hCtg==", + "requires": { + "validate.io-array": "^1.0.3", + "validate.io-function": "^1.0.2", + "validate.io-integer-array": "^1.0.0" + } + }, + "compute-lcm": { + "version": "1.1.2", + "resolved": "https://registry.npmjs.org/compute-lcm/-/compute-lcm-1.1.2.tgz", + "integrity": "sha512-OFNPdQAXnQhDSKioX8/XYT6sdUlXwpeMjfd6ApxMJfyZ4GxmLR1xvMERctlYhlHwIiz6CSpBc2+qYKjHGZw4TQ==", + "requires": { + "compute-gcd": "^1.2.1", + "validate.io-array": "^1.0.3", + "validate.io-function": "^1.0.2", + "validate.io-integer-array": "^1.0.0" + } + }, "concat-map": { "version": "0.0.1", "dev": true @@ -25866,6 +26170,24 @@ "version": "0.4.0", "dev": true }, + "json-schema-compare": { + "version": "0.2.2", + "resolved": "https://registry.npmjs.org/json-schema-compare/-/json-schema-compare-0.2.2.tgz", + "integrity": "sha512-c4WYmDKyJXhs7WWvAWm3uIYnfyWFoIp+JEoX34rctVvEkMYCPGhXtvmFFXiffBbxfZsvQ0RNnV5H7GvDF5HCqQ==", + "requires": { + "lodash": "^4.17.4" + } + }, + "json-schema-merge-allof": { + "version": "0.8.1", + "resolved": "https://registry.npmjs.org/json-schema-merge-allof/-/json-schema-merge-allof-0.8.1.tgz", + "integrity": "sha512-CTUKmIlPJbsWfzRRnOXz+0MjIqvnleIXwFTzz+t9T86HnYX/Rozria6ZVGLktAU9e+NygNljveP+yxqtQp/Q4w==", + "requires": { + "compute-lcm": "^1.1.2", + "json-schema-compare": "^0.2.2", + "lodash": "^4.17.20" + } + }, "json-schema-traverse": { "version": "0.4.1" }, @@ -25891,8 +26213,9 @@ } }, "jsonpointer": { - "version": "5.0.0", - "dev": true + "version": "5.0.1", + "resolved": "https://registry.npmjs.org/jsonpointer/-/jsonpointer-5.0.1.tgz", + "integrity": "sha512-p/nXbhSEcu3pZRdkW1OfJhpsVtW1gd4Wa1fnQc9YLiTfAjn0312eMKimbdIQzuZl9aa9xUGaRlP9T/CJE/ditQ==" }, "jspdf": { "version": "2.5.1", @@ -25989,6 +26312,11 @@ "lodash": { "version": "4.17.21" }, + "lodash-es": { + "version": "4.17.21", + "resolved": "https://registry.npmjs.org/lodash-es/-/lodash-es-4.17.21.tgz", + "integrity": "sha512-mKnC+QJ9pWVzv+C4/U3rRsHapFfHvQFoFB92e52xeyGMcX6/OlIl78je1u8vePzYZSkkogMPJ2yjxxsb89cxyw==" + }, "lodash.debounce": { "version": "4.0.8" }, @@ -26075,6 +26403,12 @@ "version": "4.3.0", "dev": true }, + "markdown-to-jsx": { + "version": "7.3.2", + "resolved": "https://registry.npmjs.org/markdown-to-jsx/-/markdown-to-jsx-7.3.2.tgz", + "integrity": "sha512-B+28F5ucp83aQm+OxNrPkS8z0tMKaeHiy0lHJs3LqCyDQFtWuenaIrkaVTgAm1pf1AU85LXltva86hlaT17i8Q==", + "requires": {} + }, "masonry-layout": { "version": "4.2.2", "requires": { @@ -26246,6 +26580,12 @@ "moment": { "version": "2.29.4" }, + "monaco-editor": { + "version": "0.41.0", + "resolved": "https://registry.npmjs.org/monaco-editor/-/monaco-editor-0.41.0.tgz", + "integrity": "sha512-1o4olnZJsiLmv5pwLEAmzHTE/5geLKQ07BrGxlF4Ri/AXAc2yyDGZwHjiTqD8D/ROKUZmwMA28A+yEowLNOEcA==", + "peer": true + }, "moo": { "version": "0.5.1" }, @@ -26261,8 +26601,9 @@ } }, "nanoid": { - "version": "3.3.4", - "dev": true + "version": "3.3.6", + "resolved": "https://registry.npmjs.org/nanoid/-/nanoid-3.3.6.tgz", + "integrity": "sha512-BGcqMMJuToF7i1rt+2PWSNVnWIkGCU78jBG3RxO/bZlnZPK2Cmi2QaffxGO/2RvWi9sL+FAiRiXMgsyxQ1DIDA==" }, "natural-compare": { "version": "1.4.0", @@ -28093,8 +28434,7 @@ "dev": true }, "require-from-string": { - "version": "2.0.2", - "dev": true + "version": "2.0.2" }, "requires-port": { "version": "1.0.0", @@ -28608,6 +28948,11 @@ "version": "1.2.1", "dev": true }, + "state-local": { + "version": "1.0.7", + "resolved": "https://registry.npmjs.org/state-local/-/state-local-1.0.7.tgz", + "integrity": "sha512-HTEHMNieakEnoe33shBYcZ7NX83ACUjCu8c40iOGEZsngj9zRnkqS9j1pqQPXwobB0ZcVTk27REb7COQ0UR59w==" + }, "statuses": { "version": "1.5.0", "dev": true @@ -29393,6 +29738,38 @@ "spdx-expression-parse": "^3.0.0" } }, + "validate.io-array": { + "version": "1.0.6", + "resolved": "https://registry.npmjs.org/validate.io-array/-/validate.io-array-1.0.6.tgz", + "integrity": "sha512-DeOy7CnPEziggrOO5CZhVKJw6S3Yi7e9e65R1Nl/RTN1vTQKnzjfvks0/8kQ40FP/dsjRAOd4hxmJ7uLa6vxkg==" + }, + "validate.io-function": { + "version": "1.0.2", + "resolved": "https://registry.npmjs.org/validate.io-function/-/validate.io-function-1.0.2.tgz", + "integrity": "sha512-LlFybRJEriSuBnUhQyG5bwglhh50EpTL2ul23MPIuR1odjO7XaMLFV8vHGwp7AZciFxtYOeiSCT5st+XSPONiQ==" + }, + "validate.io-integer": { + "version": "1.0.5", + "resolved": "https://registry.npmjs.org/validate.io-integer/-/validate.io-integer-1.0.5.tgz", + "integrity": "sha512-22izsYSLojN/P6bppBqhgUDjCkr5RY2jd+N2a3DCAUey8ydvrZ/OkGvFPR7qfOpwR2LC5p4Ngzxz36g5Vgr/hQ==", + "requires": { + "validate.io-number": "^1.0.3" + } + }, + "validate.io-integer-array": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/validate.io-integer-array/-/validate.io-integer-array-1.0.0.tgz", + "integrity": "sha512-mTrMk/1ytQHtCY0oNO3dztafHYyGU88KL+jRxWuzfOmQb+4qqnWmI+gykvGp8usKZOM0H7keJHEbRaFiYA0VrA==", + "requires": { + "validate.io-array": "^1.0.3", + "validate.io-integer": "^1.0.4" + } + }, + "validate.io-number": { + "version": "1.0.3", + "resolved": "https://registry.npmjs.org/validate.io-number/-/validate.io-number-1.0.3.tgz", + "integrity": "sha512-kRAyotcbNaSYoDnXvb4MHg/0a1egJdLwS6oJ38TJY7aw9n93Fl/3blIXdyYvPOp55CNxywooG/3BcrwNrBpcSg==" + }, "vary": { "version": "1.1.2", "dev": true diff --git a/package.json b/package.json index 6040e8710664..ccb4c6383316 100644 --- a/package.json +++ b/package.json @@ -38,8 +38,12 @@ "@fortawesome/free-regular-svg-icons": "^5.15.4", "@fortawesome/free-solid-svg-icons": "^5.15.4", "@fortawesome/react-fontawesome": "^0.1.16", + "@monaco-editor/react": "^4.5.2", "@popperjs/core": "^2.10.2", "@reduxjs/toolkit": "^1.7.0", + "@rjsf/core": "^5.12.1", + "@rjsf/utils": "^5.12.1", + "@rjsf/validator-ajv8": "^5.12.1", "@wojtekmaj/enzyme-adapter-react-17": "^0.6.3", "axios": "^0.24.0", "buffer": "^6.0.3", diff --git a/src/_nav.js b/src/_nav.js index 5f802d6144bc..415109e33280 100644 --- a/src/_nav.js +++ b/src/_nav.js @@ -171,6 +171,11 @@ const _nav = [ name: 'Individual Domain Check', to: '/tenant/standards/individual-domains', }, + { + component: CNavItem, + name: 'BPA Field Builder', + to: '/tenant/tools/bpa-field-builder', + }, ], }, { diff --git a/src/data/BPAField.schema.v1.json b/src/data/BPAField.schema.v1.json new file mode 100644 index 000000000000..56a6a07fd1de --- /dev/null +++ b/src/data/BPAField.schema.v1.json @@ -0,0 +1,229 @@ +{ + "title": "BPA Field Builder", + "type": "object", + "required": ["name", "API", "StoreAs"], + "properties": { + "name": { + "type": "string", + "title": "Field Name", + "description": "Identifier for each set or category of data." + }, + "UseExistingInfo": { + "type": "boolean", + "title": "Use Existing Info?", + "default": false + }, + "StoreAs": { + "type": "string", + "title": "Store As", + "description": "The format in which to store the fetched data.", + "anyOf": [ + { + "const": "JSON", + "title": "JSON - For structured data" + }, + { + "const": "bool", + "title": "Boolean - True/False values" + } + ] + }, + "ExtractFields": { + "title": "Extract Fields", + "description": "Lists the attributes or fields to extract from the returned data.", + "type": "array", + "items": { + "type": "string" + }, + "minItems": 1 + }, + "where": { + "title": "Where", + "description": "A conditional filter to determine which data gets displayed or processed. Use PowerShell's Where-Object Filterscript format.", + "type": "string" + }, + "FrontendFields": { + "type": "array", + "title": "Frontend Fields", + "description": "Describes how each data attribute will be displayed in the report.", + "items": { + "type": "object", + "properties": { + "name": { + "title": "Name", + "description": "Label for the data in the report.", + "type": "string" + }, + "value": { + "title": "Value", + "description": "Reference to the data's location or attribute.", + "type": "string" + }, + "formatter": { + "title": "Formatter", + "description": "Specifies how the data will be formatted for display.", + "type": "string", + "anyOf": [ + { + "const": "string", + "title": "Display as plain text" + }, + { + "const": "bool", + "title": "Presents as True or False" + }, + { + "const": "warnBool", + "title": "Shows boolean values with potential visual warnings" + }, + { + "const": "reverseBool", + "title": "Inverts the boolean value for display" + }, + { + "const": "table", + "title": "Represents the data in a table format" + }, + { + "const": "number", + "title": "Displays as a numerical value" + } + ] + } + } + }, + "minItems": 1, + "required": ["name", "value", "formatter"] + }, + "desc": { + "title": "Field Description", + "description": "A description field shown on the end of the card on the tenant overview page", + "type": "string" + } + }, + "allOf": [ + { + "if": { + "properties": { + "UseExistingInfo": { + "enum": [false] + } + } + }, + "then": { + "properties": { + "API": { + "type": "string", + "title": "API", + "anyOf": [ + { + "const": "Graph", + "title": "Graph" + }, + { + "const": "Exchange", + "title": "Exchange" + }, + { + "const": "CIPPFunction", + "title": "CIPP Function" + } + ], + "default": "Graph", + "description": "Defines the source or type of API to fetch the data." + } + }, + "allOf": [ + { + "if": { + "properties": { + "API": { + "enum": ["CIPPFunction"] + } + } + }, + "then": { + "properties": { + "URL": { + "type": "string", + "description": "The endpoint for CIPP Function" + } + }, + "required": ["URL"] + } + }, + { + "if": { + "properties": { + "API": { + "enum": ["Exchange"] + } + } + }, + "then": { + "properties": { + "command": { + "type": "string", + "title": "Command", + "pattern": "^Get-", + "description": "Command for Exchange (Get only)" + } + }, + "required": ["command"] + } + }, + { + "if": { + "properties": { + "API": { + "enum": ["Graph"] + } + } + }, + "then": { + "properties": { + "parameters": { + "type": "object", + "title": "Parameters", + "description": "Additional settings or parameters required for the API call.", + "properties": { + "asApp": { + "title": "Use Application Permissions", + "type": "boolean" + } + }, + "additionalProperties": true + }, + "URL": { + "type": "string", + "pattern": "^https://graph.microsoft.com/", + "description": "The endpoint for Graph" + } + }, + "required": ["URL"] + } + }, + { + "if": { + "properties": { + "API": { + "enum": ["Exchange", "CIPPFunction"] + } + } + }, + "then": { + "properties": { + "parameters": { + "type": "object", + "title": "Parameters", + "description": "Additional settings or parameters required for the API call.", + "additionalProperties": true + } + } + } + } + ] + } + } + ] +} diff --git a/src/data/BPAField.uischema.v1.json b/src/data/BPAField.uischema.v1.json new file mode 100644 index 000000000000..4eeb72527109 --- /dev/null +++ b/src/data/BPAField.uischema.v1.json @@ -0,0 +1,26 @@ +{ + "ui:disabled": false, + "ui:readonly": false, + "ui:order": [ + "name", + "desc", + "UseExistingInfo", + "API", + "StoreAs", + "URL", + "command", + "parameters", + "where", + "ExtractFields", + "FrontendFields", + "*" + ], + "ui:submitButtonOptions": { + "submitText": "Validate", + "norender": false, + "props": { + "disabled": false, + "className": "btn btn-info" + } + } +} diff --git a/src/routes.js b/src/routes.js index 94181b42074f..2851d6e96eb7 100644 --- a/src/routes.js +++ b/src/routes.js @@ -71,6 +71,7 @@ const DeviceComplianceReport = React.lazy(() => const BestPracticeAnalyzer = React.lazy(() => import('src/views/tenant/standards/BestPracticeAnalyser'), ) +const BPAFieldBuilder = React.lazy(() => import('src/views/tenant/standards/BPAFieldBuilder')) const DomainsAnalyser = React.lazy(() => import('src/views/tenant/standards/DomainsAnalyser')) const OffboardingWizard = React.lazy(() => import('src/views/identity/administration/OffboardingWizard'), @@ -385,6 +386,11 @@ const routes = [ name: 'Geo IP Lookup', component: GeoIPLookup, }, + { + path: '/tenant/tools/bpa-field-builder', + name: 'BPA Field Builder', + component: BPAFieldBuilder, + }, { path: '/tenant/standards/alert-list', name: 'Alert List (Alpha)', component: ListAlerts }, { path: '/endpoint', name: 'Endpoint' }, { path: '/endpoint/applications', name: 'Applications' }, diff --git a/src/scss/_custom.scss b/src/scss/_custom.scss index 95f65a7aa949..5edc21372ec9 100644 --- a/src/scss/_custom.scss +++ b/src/scss/_custom.scss @@ -584,4 +584,28 @@ .teams-wide-card { width: 500px; +} + +i.glyphicon { + display: none; +} + +.btn-add::after { + content: 'Add'; +} + +.array-item-copy::after { + content: 'Copy'; +} + +.array-item-move-up::after { + content: 'Move Up'; +} + +.array-item-move-down::after { + content: 'Move Down'; +} + +.array-item-remove::after { + content: 'Remove'; } \ No newline at end of file diff --git a/src/views/tenant/standards/BPAFieldBuilder.js b/src/views/tenant/standards/BPAFieldBuilder.js new file mode 100644 index 000000000000..738c37946809 --- /dev/null +++ b/src/views/tenant/standards/BPAFieldBuilder.js @@ -0,0 +1,56 @@ +import React, { useState, useRef } from 'react' +import { CippPage } from 'src/components/layout' +import BPAFieldSchema from 'src/data/BPAField.schema.v1' +import BPAFieldUISchema from 'src/data/BPAField.uischema.v1' +import validator from '@rjsf/validator-ajv8' +import Form from '@rjsf/core' +import { CippContentCard } from 'src/components/layout' +import { CRow, CCol, CButton } from '@coreui/react' +import Editor from '@monaco-editor/react' +import { useSelector } from 'react-redux' + +const BPAFieldBuilder = () => { + const [formData, setFormData] = useState(null) + const editorRef = useRef(null) + const currentTheme = useSelector((state) => state.app.currentTheme) + function handleEditorChange(value, event) { + setFormData(JSON.parse(value)) + } + + return ( + + + + +
    setFormData(e.formData)} + enable={true} + showErrorList="bottom" + omitExtraData={true} + liveOmit={true} + /> + + + + + + + + + + ) +} + +export default BPAFieldBuilder From e7e3b65f34c9d9ef94a018b1107255e045fceb84 Mon Sep 17 00:00:00 2001 From: John Duprey Date: Tue, 5 Sep 2023 17:52:34 -0400 Subject: [PATCH 024/158] Switch to BPA Report schema --- src/_nav.js | 4 +- src/data/BPAReport.schema.v1.json | 251 ++++++++++++++++++ src/data/BPAReport.uischema.v1.json | 36 +++ src/routes.js | 8 +- ...BPAFieldBuilder.js => BPAReportBuilder.js} | 21 +- 5 files changed, 304 insertions(+), 16 deletions(-) create mode 100644 src/data/BPAReport.schema.v1.json create mode 100644 src/data/BPAReport.uischema.v1.json rename src/views/tenant/standards/{BPAFieldBuilder.js => BPAReportBuilder.js} (74%) diff --git a/src/_nav.js b/src/_nav.js index 415109e33280..2f8d05e25f85 100644 --- a/src/_nav.js +++ b/src/_nav.js @@ -173,8 +173,8 @@ const _nav = [ }, { component: CNavItem, - name: 'BPA Field Builder', - to: '/tenant/tools/bpa-field-builder', + name: 'BPA Report Builder', + to: '/tenant/tools/bpa-report-builder', }, ], }, diff --git a/src/data/BPAReport.schema.v1.json b/src/data/BPAReport.schema.v1.json new file mode 100644 index 000000000000..45d6e0e56c2b --- /dev/null +++ b/src/data/BPAReport.schema.v1.json @@ -0,0 +1,251 @@ +{ + "title": "BPA Report Builder", + "type": "object", + "required": ["name", "style", "Fields"], + "properties": { + "name": { + "type": "string", + "title": "Report Name", + "description": "The title or name of the report." + }, + "style": { + "type": "string", + "title": "Report Style", + "default": "Table", + "enum": ["Table", "Tenant"], + "description": "Specifies the layout or presentation style of the report." + }, + "Fields": { + "title": "Report Fields", + "type": "array", + "minItems": 1, + "items": { + "required": ["name", "API", "StoreAs"], + "properties": { + "name": { + "type": "string", + "title": "Field Name", + "description": "Identifier for each set or category of data." + }, + "UseExistingInfo": { + "type": "boolean", + "title": "Use Existing Info?", + "default": false + }, + "StoreAs": { + "type": "string", + "title": "Store As", + "description": "The format in which to store the fetched data.", + "anyOf": [ + { + "const": "JSON", + "title": "JSON - For structured data" + }, + { + "const": "bool", + "title": "Boolean - True/False values" + } + ] + }, + "ExtractFields": { + "title": "Extract Fields", + "description": "Lists the attributes or fields to extract from the returned data.", + "type": "array", + "items": { + "type": "string" + }, + "minItems": 1 + }, + "where": { + "title": "Where", + "description": "A conditional filter to determine which data gets displayed or processed. Use PowerShell's Where-Object Filterscript format.", + "type": "string" + }, + "FrontendFields": { + "type": "array", + "title": "Frontend Fields", + "description": "Describes how each data attribute will be displayed in the report.", + "items": { + "type": "object", + "properties": { + "name": { + "title": "Name", + "description": "Label for the data in the report.", + "type": "string" + }, + "value": { + "title": "Value", + "description": "Reference to the data's location or attribute.", + "type": "string" + }, + "formatter": { + "title": "Formatter", + "description": "Specifies how the data will be formatted for display.", + "type": "string", + "anyOf": [ + { + "const": "string", + "title": "Display as plain text" + }, + { + "const": "bool", + "title": "Presents as True or False" + }, + { + "const": "warnBool", + "title": "Shows boolean values with potential visual warnings" + }, + { + "const": "reverseBool", + "title": "Inverts the boolean value for display" + }, + { + "const": "table", + "title": "Represents the data in a table format" + }, + { + "const": "number", + "title": "Displays as a numerical value" + } + ] + } + } + }, + "minItems": 1, + "required": ["name", "value", "formatter"] + }, + "desc": { + "title": "Field Description", + "description": "A description field shown on the end of the card on the tenant overview page", + "type": "string" + } + }, + "allOf": [ + { + "if": { + "properties": { + "UseExistingInfo": { + "enum": [false] + } + } + }, + "then": { + "properties": { + "API": { + "type": "string", + "title": "API", + "anyOf": [ + { + "const": "Graph", + "title": "Graph" + }, + { + "const": "Exchange", + "title": "Exchange" + }, + { + "const": "CIPPFunction", + "title": "CIPP Function" + } + ], + "default": "Graph", + "description": "Defines the source or type of API to fetch the data." + } + }, + "allOf": [ + { + "if": { + "properties": { + "API": { + "enum": ["CIPPFunction"] + } + } + }, + "then": { + "properties": { + "URL": { + "type": "string", + "description": "The endpoint for CIPP Function" + } + }, + "required": ["URL"] + } + }, + { + "if": { + "properties": { + "API": { + "enum": ["Exchange"] + } + } + }, + "then": { + "properties": { + "Command": { + "type": "string", + "title": "Command", + "pattern": "^Get-", + "description": "Command for Exchange (Get only)" + } + }, + "required": ["Command"] + } + }, + { + "if": { + "properties": { + "API": { + "enum": ["Graph"] + } + } + }, + "then": { + "properties": { + "parameters": { + "type": "object", + "title": "Parameters", + "description": "Additional settings or parameters required for the API call.", + "properties": { + "asApp": { + "title": "Use Application Permissions", + "type": "boolean" + } + }, + "additionalProperties": true + }, + "URL": { + "type": "string", + "pattern": "^https://graph.microsoft.com/", + "description": "The endpoint for Graph" + } + }, + "required": ["URL"] + } + }, + { + "if": { + "properties": { + "API": { + "enum": ["Exchange", "CIPPFunction"] + } + } + }, + "then": { + "properties": { + "parameters": { + "type": "object", + "title": "Parameters", + "description": "Additional settings or parameters required for the API call.", + "additionalProperties": true + } + } + } + } + ] + } + } + ] + } + } + } +} diff --git a/src/data/BPAReport.uischema.v1.json b/src/data/BPAReport.uischema.v1.json new file mode 100644 index 000000000000..14c831199f2c --- /dev/null +++ b/src/data/BPAReport.uischema.v1.json @@ -0,0 +1,36 @@ +{ + "ui:disabled": false, + "ui:readonly": false, + "ui:order": ["name", "style", "*"], + "Fields": { + "items": { + "ui:order": [ + "name", + "desc", + "UseExistingInfo", + "StoreAs", + "API", + "URL", + "Command", + "parameters", + "where", + "ExtractFields", + "FrontendFields", + "*" + ] + } + }, + "ui:submitButtonOptions": { + "submitText": "Validate", + "norender": false, + "props": { + "disabled": false, + "className": "btn btn-info" + } + }, + "Fields": { + "items": { + "ui:classNames": "card card-title p-4 my-4" + } + } +} diff --git a/src/routes.js b/src/routes.js index 2851d6e96eb7..75079b327e2c 100644 --- a/src/routes.js +++ b/src/routes.js @@ -71,7 +71,7 @@ const DeviceComplianceReport = React.lazy(() => const BestPracticeAnalyzer = React.lazy(() => import('src/views/tenant/standards/BestPracticeAnalyser'), ) -const BPAFieldBuilder = React.lazy(() => import('src/views/tenant/standards/BPAFieldBuilder')) +const BPAReportBuilder = React.lazy(() => import('src/views/tenant/standards/BPAReportBuilder')) const DomainsAnalyser = React.lazy(() => import('src/views/tenant/standards/DomainsAnalyser')) const OffboardingWizard = React.lazy(() => import('src/views/identity/administration/OffboardingWizard'), @@ -387,9 +387,9 @@ const routes = [ component: GeoIPLookup, }, { - path: '/tenant/tools/bpa-field-builder', - name: 'BPA Field Builder', - component: BPAFieldBuilder, + path: '/tenant/tools/bpa-report-builder', + name: 'BPA Report Builder', + component: BPAReportBuilder, }, { path: '/tenant/standards/alert-list', name: 'Alert List (Alpha)', component: ListAlerts }, { path: '/endpoint', name: 'Endpoint' }, diff --git a/src/views/tenant/standards/BPAFieldBuilder.js b/src/views/tenant/standards/BPAReportBuilder.js similarity index 74% rename from src/views/tenant/standards/BPAFieldBuilder.js rename to src/views/tenant/standards/BPAReportBuilder.js index 738c37946809..660b1142229f 100644 --- a/src/views/tenant/standards/BPAFieldBuilder.js +++ b/src/views/tenant/standards/BPAReportBuilder.js @@ -1,15 +1,15 @@ import React, { useState, useRef } from 'react' import { CippPage } from 'src/components/layout' -import BPAFieldSchema from 'src/data/BPAField.schema.v1' -import BPAFieldUISchema from 'src/data/BPAField.uischema.v1' +import BPAReportSchema from 'src/data/BPAReport.schema.v1' +import BPAReportUISchema from 'src/data/BPAReport.uischema.v1' import validator from '@rjsf/validator-ajv8' import Form from '@rjsf/core' import { CippContentCard } from 'src/components/layout' -import { CRow, CCol, CButton } from '@coreui/react' +import { CRow, CCol } from '@coreui/react' import Editor from '@monaco-editor/react' import { useSelector } from 'react-redux' -const BPAFieldBuilder = () => { +const BPAReportBuilder = () => { const [formData, setFormData] = useState(null) const editorRef = useRef(null) const currentTheme = useSelector((state) => state.app.currentTheme) @@ -18,19 +18,19 @@ const BPAFieldBuilder = () => { } return ( - + setFormData(e.formData)} enable={true} - showErrorList="bottom" + showErrorList="none" omitExtraData={true} liveOmit={true} /> @@ -42,9 +42,10 @@ const BPAFieldBuilder = () => { defaultLanguage="json" value={JSON.stringify(formData, null, 2)} onChange={handleEditorChange} - schema={BPAFieldSchema} + schema={BPAReportSchema} validator={validator} theme={currentTheme == 'cyberdrain' ? 'vs-light' : 'vs-dark'} + height="700px" /> @@ -53,4 +54,4 @@ const BPAFieldBuilder = () => { ) } -export default BPAFieldBuilder +export default BPAReportBuilder From 038be3774fbd583d47506cc3625550b400fd42cb Mon Sep 17 00:00:00 2001 From: John Duprey Date: Tue, 5 Sep 2023 19:01:19 -0400 Subject: [PATCH 025/158] Update BPAReport.uischema.v1.json --- src/data/BPAReport.uischema.v1.json | 18 ++++++------------ 1 file changed, 6 insertions(+), 12 deletions(-) diff --git a/src/data/BPAReport.uischema.v1.json b/src/data/BPAReport.uischema.v1.json index 14c831199f2c..f5d3db89270d 100644 --- a/src/data/BPAReport.uischema.v1.json +++ b/src/data/BPAReport.uischema.v1.json @@ -17,20 +17,14 @@ "ExtractFields", "FrontendFields", "*" - ] + ], + "FrontendFields": { + "ui:classNames": "card card-title p-4 my-4" + }, + "ui:classNames": "card card-title p-4 my-4" } }, "ui:submitButtonOptions": { - "submitText": "Validate", - "norender": false, - "props": { - "disabled": false, - "className": "btn btn-info" - } - }, - "Fields": { - "items": { - "ui:classNames": "card card-title p-4 my-4" - } + "norender": true } } From bcb1dcb74d79b022a0ca9a5d28cf9f25aaaf116e Mon Sep 17 00:00:00 2001 From: John Duprey Date: Tue, 5 Sep 2023 19:18:05 -0400 Subject: [PATCH 026/158] Update BPAReportBuilder.js --- src/views/tenant/standards/BPAReportBuilder.js | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/src/views/tenant/standards/BPAReportBuilder.js b/src/views/tenant/standards/BPAReportBuilder.js index 660b1142229f..003ac1e6f1a7 100644 --- a/src/views/tenant/standards/BPAReportBuilder.js +++ b/src/views/tenant/standards/BPAReportBuilder.js @@ -16,6 +16,9 @@ const BPAReportBuilder = () => { function handleEditorChange(value, event) { setFormData(JSON.parse(value)) } + const options = { + wordWrap: true, + } return ( @@ -42,10 +45,9 @@ const BPAReportBuilder = () => { defaultLanguage="json" value={JSON.stringify(formData, null, 2)} onChange={handleEditorChange} - schema={BPAReportSchema} - validator={validator} theme={currentTheme == 'cyberdrain' ? 'vs-light' : 'vs-dark'} height="700px" + options={options} /> From 409da1c7e927b5ff3b63ff9dd1ef236a0d620cae Mon Sep 17 00:00:00 2001 From: John Duprey Date: Tue, 5 Sep 2023 20:09:51 -0400 Subject: [PATCH 027/158] Add custom widgets --- .../tenant/standards/BPAReportBuilder.js | 49 +++++++++++++++++++ 1 file changed, 49 insertions(+) diff --git a/src/views/tenant/standards/BPAReportBuilder.js b/src/views/tenant/standards/BPAReportBuilder.js index 003ac1e6f1a7..a50f885400a4 100644 --- a/src/views/tenant/standards/BPAReportBuilder.js +++ b/src/views/tenant/standards/BPAReportBuilder.js @@ -8,6 +8,54 @@ import { CippContentCard } from 'src/components/layout' import { CRow, CCol } from '@coreui/react' import Editor from '@monaco-editor/react' import { useSelector } from 'react-redux' +import { WidgetProps, RegistryWidgetsType } from '@rjsf/utils' +import { CFormInput, CFormSelect, CFormSwitch } from '@coreui/react' + +const CippTextWidget = (props: WidgetProps) => { + return ( + props.onChange(event.target.value)} + /> + ) +} +const CippSelectWidget = (props: WidgetProps) => { + const options = props?.options.length > 0 ? props.options : props.options.enumOptions + console.log(options) + return ( + props.onChange(event.target.value)} + > + {options.map(({ label, value }, idx) => ( + + ))} + + ) +} + +const CippCheckboxWidget = (props: WidgetProps) => { + // not working yet + return ( + props.onChange(!props.value)} + /> + ) +} +const CippWidgets: RegistryWidgetsType = { + TextWidget: CippTextWidget, + SelectWidget: CippSelectWidget, +} const BPAReportBuilder = () => { const [formData, setFormData] = useState(null) @@ -36,6 +84,7 @@ const BPAReportBuilder = () => { showErrorList="none" omitExtraData={true} liveOmit={true} + widgets={CippWidgets} /> From a042dd6df1d936848230231d66688af0b9268bf8 Mon Sep 17 00:00:00 2001 From: John Duprey Date: Wed, 6 Sep 2023 00:30:58 -0400 Subject: [PATCH 028/158] Report/schema tweaks --- src/data/BPAReport.schema.v1.json | 61 +++++++++++-------- .../tenant/standards/BPAReportBuilder.js | 24 +++++--- 2 files changed, 49 insertions(+), 36 deletions(-) diff --git a/src/data/BPAReport.schema.v1.json b/src/data/BPAReport.schema.v1.json index 45d6e0e56c2b..41eff446c312 100644 --- a/src/data/BPAReport.schema.v1.json +++ b/src/data/BPAReport.schema.v1.json @@ -20,7 +20,7 @@ "type": "array", "minItems": 1, "items": { - "required": ["name", "API", "StoreAs"], + "required": ["name", "API"], "properties": { "name": { "type": "string", @@ -32,21 +32,6 @@ "title": "Use Existing Info?", "default": false }, - "StoreAs": { - "type": "string", - "title": "Store As", - "description": "The format in which to store the fetched data.", - "anyOf": [ - { - "const": "JSON", - "title": "JSON - For structured data" - }, - { - "const": "bool", - "title": "Boolean - True/False values" - } - ] - }, "ExtractFields": { "title": "Extract Fields", "description": "Lists the attributes or fields to extract from the returned data.", @@ -56,11 +41,7 @@ }, "minItems": 1 }, - "where": { - "title": "Where", - "description": "A conditional filter to determine which data gets displayed or processed. Use PowerShell's Where-Object Filterscript format.", - "type": "string" - }, + "FrontendFields": { "type": "array", "title": "Frontend Fields", @@ -89,15 +70,15 @@ }, { "const": "bool", - "title": "Presents as True or False" + "title": "True/False" }, { "const": "warnBool", - "title": "Shows boolean values with potential visual warnings" + "title": "True/False values with potential visual warnings" }, { "const": "reverseBool", - "title": "Inverts the boolean value for display" + "title": "Inverts the True/False value for display" }, { "const": "table", @@ -131,6 +112,31 @@ }, "then": { "properties": { + "required": "StoreAs", + "where": { + "title": "Where", + "description": "A conditional filter to determine which data gets displayed or processed. Use PowerShell's Where-Object Filterscript format.", + "type": "string" + }, + "StoreAs": { + "type": "string", + "title": "Store As", + "description": "The format in which to store the fetched data.", + "anyOf": [ + { + "const": "string", + "title": "String - For plain text" + }, + { + "const": "JSON", + "title": "JSON - For structured data" + }, + { + "const": "bool", + "title": "Boolean - True/False values" + } + ] + }, "API": { "type": "string", "title": "API", @@ -163,12 +169,13 @@ }, "then": { "properties": { - "URL": { + "Command": { "type": "string", - "description": "The endpoint for CIPP Function" + "pattern": "^Get-CIPP", + "description": "Command for CIPP Function (Get-CIPP)" } }, - "required": ["URL"] + "required": ["Command"] } }, { diff --git a/src/views/tenant/standards/BPAReportBuilder.js b/src/views/tenant/standards/BPAReportBuilder.js index a50f885400a4..384c78d9e24c 100644 --- a/src/views/tenant/standards/BPAReportBuilder.js +++ b/src/views/tenant/standards/BPAReportBuilder.js @@ -8,10 +8,9 @@ import { CippContentCard } from 'src/components/layout' import { CRow, CCol } from '@coreui/react' import Editor from '@monaco-editor/react' import { useSelector } from 'react-redux' -import { WidgetProps, RegistryWidgetsType } from '@rjsf/utils' import { CFormInput, CFormSelect, CFormSwitch } from '@coreui/react' -const CippTextWidget = (props: WidgetProps) => { +const CippTextWidget = (props) => { return ( { /> ) } -const CippSelectWidget = (props: WidgetProps) => { +const CippSelectWidget = (props) => { const options = props?.options.length > 0 ? props.options : props.options.enumOptions - console.log(options) return ( { ) } -const CippCheckboxWidget = (props: WidgetProps) => { +const CippCheckboxWidget = (props) => { // not working yet + console.log(props) return ( props.onChange(!props.value)} + onChange={(event) => { + props.onChange(event.target.checked) + }} /> ) } -const CippWidgets: RegistryWidgetsType = { +const CippWidgets = { TextWidget: CippTextWidget, SelectWidget: CippSelectWidget, + CheckboxWidget: CippCheckboxWidget, } const BPAReportBuilder = () => { @@ -62,7 +64,11 @@ const BPAReportBuilder = () => { const editorRef = useRef(null) const currentTheme = useSelector((state) => state.app.currentTheme) function handleEditorChange(value, event) { - setFormData(JSON.parse(value)) + try { + setFormData(JSON.parse(value)) + } catch { + setFormData({}) + } } const options = { wordWrap: true, From c2efca5b38327467f45c6b7ae614c394f4b218d9 Mon Sep 17 00:00:00 2001 From: John Duprey Date: Wed, 6 Sep 2023 00:37:30 -0400 Subject: [PATCH 029/158] Update BPAReport.schema.v1.json --- src/data/BPAReport.schema.v1.json | 23 +++++++++++------------ 1 file changed, 11 insertions(+), 12 deletions(-) diff --git a/src/data/BPAReport.schema.v1.json b/src/data/BPAReport.schema.v1.json index 41eff446c312..f84418893481 100644 --- a/src/data/BPAReport.schema.v1.json +++ b/src/data/BPAReport.schema.v1.json @@ -20,7 +20,7 @@ "type": "array", "minItems": 1, "items": { - "required": ["name", "API"], + "required": ["name"], "properties": { "name": { "type": "string", @@ -32,16 +32,6 @@ "title": "Use Existing Info?", "default": false }, - "ExtractFields": { - "title": "Extract Fields", - "description": "Lists the attributes or fields to extract from the returned data.", - "type": "array", - "items": { - "type": "string" - }, - "minItems": 1 - }, - "FrontendFields": { "type": "array", "title": "Frontend Fields", @@ -111,8 +101,8 @@ } }, "then": { + "required": ["API", "StoreAs", "ExtractFields"], "properties": { - "required": "StoreAs", "where": { "title": "Where", "description": "A conditional filter to determine which data gets displayed or processed. Use PowerShell's Where-Object Filterscript format.", @@ -156,6 +146,15 @@ ], "default": "Graph", "description": "Defines the source or type of API to fetch the data." + }, + "ExtractFields": { + "title": "Extract Fields", + "description": "Lists the attributes or fields to extract from the returned data.", + "type": "array", + "items": { + "type": "string" + }, + "minItems": 1 } }, "allOf": [ From be63aeac1c9e78af0ee803f67d39503cc759b3cd Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Wed, 6 Sep 2023 18:14:00 +0200 Subject: [PATCH 030/158] tmp bpa fix --- src/views/tenant/standards/BestPracticeAnalyser.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/views/tenant/standards/BestPracticeAnalyser.js b/src/views/tenant/standards/BestPracticeAnalyser.js index 68356121e425..025095e1a48c 100644 --- a/src/views/tenant/standards/BestPracticeAnalyser.js +++ b/src/views/tenant/standards/BestPracticeAnalyser.js @@ -198,7 +198,7 @@ const BestPracticeAnalyser = () => { name: col.name, selector: (row) => getNestedValue(row, col.value), sortable: true, - exportSelector: col.value, + exportSelector: col.value.split('.').join('/'), cell: cellSelector, // Use the determined cell selector }) }) From 869fdf8f98f5a04b27dcb58786d625950d22f392 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Wed, 6 Sep 2023 18:35:02 +0200 Subject: [PATCH 031/158] fix spacing --- src/data/BPAField.uischema.v1.json | 2 +- src/views/tenant/standards/BPAReportBuilder.js | 4 +++- 2 files changed, 4 insertions(+), 2 deletions(-) diff --git a/src/data/BPAField.uischema.v1.json b/src/data/BPAField.uischema.v1.json index 4eeb72527109..5d88206bb0aa 100644 --- a/src/data/BPAField.uischema.v1.json +++ b/src/data/BPAField.uischema.v1.json @@ -20,7 +20,7 @@ "norender": false, "props": { "disabled": false, - "className": "btn btn-info" + "className": "btn mb-3 btn-primary" } } } diff --git a/src/views/tenant/standards/BPAReportBuilder.js b/src/views/tenant/standards/BPAReportBuilder.js index 384c78d9e24c..39015265c675 100644 --- a/src/views/tenant/standards/BPAReportBuilder.js +++ b/src/views/tenant/standards/BPAReportBuilder.js @@ -14,6 +14,7 @@ const CippTextWidget = (props) => { return ( props.onChange(event.target.value)} @@ -26,6 +27,7 @@ const CippSelectWidget = (props) => { props.onChange(event.target.value)} > {options.map(({ label, value }, idx) => ( @@ -46,7 +48,7 @@ const CippCheckboxWidget = (props) => { id={props.name} label={props.label} checked={props.value} - className="my-2" + className="mb-3" onChange={(event) => { props.onChange(event.target.checked) }} From 9979c91c09a6303458d3da18388d18cae3cb6e61 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Wed, 6 Sep 2023 20:57:22 +0200 Subject: [PATCH 032/158] theming of bpa --- package-lock.json | 293 +++++++++++++++++- package.json | 1 + src/data/BPAField.uischema.v1.json | 2 +- src/data/BPAReport.uischema.v1.json | 3 +- .../tenant/standards/BPAReportBuilder.js | 5 +- 5 files changed, 292 insertions(+), 12 deletions(-) diff --git a/package-lock.json b/package-lock.json index a7f3bc927e18..acf2cd561d02 100644 --- a/package-lock.json +++ b/package-lock.json @@ -22,6 +22,7 @@ "@monaco-editor/react": "^4.5.2", "@popperjs/core": "^2.10.2", "@reduxjs/toolkit": "^1.7.0", + "@rjsf/bootstrap-4": "^5.12.1", "@rjsf/core": "^5.12.1", "@rjsf/utils": "^5.12.1", "@rjsf/validator-ajv8": "^5.12.1", @@ -3175,13 +3176,22 @@ } }, "node_modules/@popperjs/core": { - "version": "2.11.2", - "license": "MIT", + "version": "2.11.8", + "resolved": "https://registry.npmjs.org/@popperjs/core/-/core-2.11.8.tgz", + "integrity": "sha512-P1st0aksCrn9sGZhp8GMYwBnQsbvAWsZAX44oXNNvLHGqAOcoVxmjZiohstwQ7SqKnbR47akdNi+uleWD8+g6A==", "funding": { "type": "opencollective", "url": "https://opencollective.com/popperjs" } }, + "node_modules/@react-icons/all-files": { + "version": "4.1.0", + "resolved": "https://registry.npmjs.org/@react-icons/all-files/-/all-files-4.1.0.tgz", + "integrity": "sha512-hxBI2UOuVaI3O/BhQfhtb4kcGn9ft12RWAFVMUeNjqqhLsHvFtzIkFaptBJpFDANTKoDfdVoHTKZDlwKCACbMQ==", + "peerDependencies": { + "react": "*" + } + }, "node_modules/@reduxjs/toolkit": { "version": "1.8.0", "license": "MIT", @@ -3211,6 +3221,44 @@ "@babel/runtime": "^7.9.2" } }, + "node_modules/@restart/context": { + "version": "2.1.4", + "resolved": "https://registry.npmjs.org/@restart/context/-/context-2.1.4.tgz", + "integrity": "sha512-INJYZQJP7g+IoDUh/475NlGiTeMfwTXUEr3tmRneckHIxNolGOW9CTq83S8cxq0CgJwwcMzMJFchxvlwe7Rk8Q==", + "peer": true, + "peerDependencies": { + "react": ">=16.3.2" + } + }, + "node_modules/@restart/hooks": { + "version": "0.4.11", + "resolved": "https://registry.npmjs.org/@restart/hooks/-/hooks-0.4.11.tgz", + "integrity": "sha512-Ft/ncTULZN6ldGHiF/k5qt72O8JyRMOeg0tApvCni8LkoiEahO+z3TNxfXIVGy890YtWVDvJAl662dVJSJXvMw==", + "peer": true, + "dependencies": { + "dequal": "^2.0.3" + }, + "peerDependencies": { + "react": ">=16.8.0" + } + }, + "node_modules/@rjsf/bootstrap-4": { + "version": "5.12.1", + "resolved": "https://registry.npmjs.org/@rjsf/bootstrap-4/-/bootstrap-4-5.12.1.tgz", + "integrity": "sha512-aUnijxIlYWza8klJ+GvgoYk4gFSaQQV97LLdujMQY096iLm12ryxWLEjyLyPPNOymyp4kdkNO4FCTiWMs2bh3Q==", + "dependencies": { + "@react-icons/all-files": "^4.1.0" + }, + "engines": { + "node": ">=14" + }, + "peerDependencies": { + "@rjsf/core": "^5.8.x", + "@rjsf/utils": "^5.8.x", + "react": "^16.14.0 || >=17", + "react-bootstrap": "^1.6.5" + } + }, "node_modules/@rjsf/core": { "version": "5.12.1", "resolved": "https://registry.npmjs.org/@rjsf/core/-/core-5.12.1.tgz", @@ -3767,6 +3815,12 @@ "@types/node": "*" } }, + "node_modules/@types/invariant": { + "version": "2.2.35", + "resolved": "https://registry.npmjs.org/@types/invariant/-/invariant-2.2.35.tgz", + "integrity": "sha512-DxX1V9P8zdJPYQat1gHyY0xj3efl8gnMVjiM9iCY6y27lj+PoQWkgjt8jDqmovPqULkKVpKRg8J36iQiA+EtEg==", + "peer": true + }, "node_modules/@types/istanbul-lib-coverage": { "version": "2.0.4", "dev": true, @@ -3946,6 +4000,12 @@ "version": "2.0.6", "license": "MIT" }, + "node_modules/@types/warning": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/@types/warning/-/warning-3.0.0.tgz", + "integrity": "sha512-t/Tvs5qR47OLOr+4E9ckN8AmP2Tf16gWq+/qA4iUGS/OOyHVO8wv2vjJuX8SNOUTJyWb+2t7wJm6cXILFnOROA==", + "peer": true + }, "node_modules/@types/ws": { "version": "8.5.2", "dev": true, @@ -6940,6 +7000,15 @@ "node": ">= 0.6" } }, + "node_modules/dequal": { + "version": "2.0.3", + "resolved": "https://registry.npmjs.org/dequal/-/dequal-2.0.3.tgz", + "integrity": "sha512-0je+qPKHEMohvfRTCEo3CrPG6cAzAYgmzKyxRiYSSDkS6eGJdyVJm7WaYA5ECaAD9wLB2T4EEeymA5aFVcYXCA==", + "peer": true, + "engines": { + "node": ">=6" + } + }, "node_modules/desandro-matches-selector": { "version": "2.0.2", "license": "MIT" @@ -9686,7 +9755,6 @@ }, "node_modules/invariant": { "version": "2.2.4", - "dev": true, "license": "MIT", "dependencies": { "loose-envify": "^1.0.0" @@ -14643,6 +14711,25 @@ "react-is": "^16.13.1" } }, + "node_modules/prop-types-extra": { + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/prop-types-extra/-/prop-types-extra-1.1.1.tgz", + "integrity": "sha512-59+AHNnHYCdiC+vMwY52WmvP5dM3QLeoumYuEyceQDi9aEhtwN9zIQ2ZNo25sMyXnbh32h+P1ezDsUpUH3JAew==", + "peer": true, + "dependencies": { + "react-is": "^16.3.2", + "warning": "^4.0.0" + }, + "peerDependencies": { + "react": ">=0.14.0" + } + }, + "node_modules/prop-types-extra/node_modules/react-is": { + "version": "16.13.1", + "resolved": "https://registry.npmjs.org/react-is/-/react-is-16.13.1.tgz", + "integrity": "sha512-24e6ynE2H+OKt4kqsOvNd8kBpV65zoxbA4BVsEOB3ARVWQki/DHzaUoC5KuON/BiccDaCCTZBuOcfZs70kR8bQ==", + "peer": true + }, "node_modules/prop-types/node_modules/react-is": { "version": "16.13.1", "license": "MIT" @@ -14839,6 +14926,35 @@ "node": ">=10" } }, + "node_modules/react-bootstrap": { + "version": "1.6.7", + "resolved": "https://registry.npmjs.org/react-bootstrap/-/react-bootstrap-1.6.7.tgz", + "integrity": "sha512-IzCYXuLSKDEjGFglbFWk0/iHmdhdcJzTmtS6lXxc0kaNFx2PFgrQf5jKnx5sarF2tiXh9Tgx3pSt3pdK7YwkMA==", + "peer": true, + "dependencies": { + "@babel/runtime": "^7.14.0", + "@restart/context": "^2.1.4", + "@restart/hooks": "^0.4.7", + "@types/invariant": "^2.2.33", + "@types/prop-types": "^15.7.3", + "@types/react": ">=16.14.8", + "@types/react-transition-group": "^4.4.1", + "@types/warning": "^3.0.0", + "classnames": "^2.3.1", + "dom-helpers": "^5.2.1", + "invariant": "^2.2.4", + "prop-types": "^15.7.2", + "prop-types-extra": "^1.1.0", + "react-overlays": "^5.1.2", + "react-transition-group": "^4.4.1", + "uncontrollable": "^7.2.1", + "warning": "^4.0.3" + }, + "peerDependencies": { + "react": ">=16.8.0", + "react-dom": ">=16.8.0" + } + }, "node_modules/react-copy-to-clipboard": { "version": "5.0.4", "license": "MIT", @@ -15073,6 +15189,12 @@ "version": "17.0.2", "license": "MIT" }, + "node_modules/react-lifecycles-compat": { + "version": "3.0.4", + "resolved": "https://registry.npmjs.org/react-lifecycles-compat/-/react-lifecycles-compat-3.0.4.tgz", + "integrity": "sha512-fBASbA6LnOU9dOU2eW7aQ8xmYBSXUIWr+UmF9b1efZBazGNO+rcXT/icdKnYm2pTwcRylVUYwW7H1PHfLekVzA==", + "peer": true + }, "node_modules/react-loading-skeleton": { "version": "3.1.0", "license": "MIT", @@ -15115,6 +15237,26 @@ "react-dom": "^15.5.x || ^16.x || ^17.x || ^18.x" } }, + "node_modules/react-overlays": { + "version": "5.2.1", + "resolved": "https://registry.npmjs.org/react-overlays/-/react-overlays-5.2.1.tgz", + "integrity": "sha512-GLLSOLWr21CqtJn8geSwQfoJufdt3mfdsnIiQswouuQ2MMPns+ihZklxvsTDKD3cR2tF8ELbi5xUsvqVhR6WvA==", + "peer": true, + "dependencies": { + "@babel/runtime": "^7.13.8", + "@popperjs/core": "^2.11.6", + "@restart/hooks": "^0.4.7", + "@types/warning": "^3.0.0", + "dom-helpers": "^5.2.0", + "prop-types": "^15.7.2", + "uncontrollable": "^7.2.1", + "warning": "^4.0.3" + }, + "peerDependencies": { + "react": ">=16.3.0", + "react-dom": ">=16.3.0" + } + }, "node_modules/react-papaparse": { "version": "3.18.2", "license": "MIT", @@ -17558,6 +17700,21 @@ "url": "https://github.com/sponsors/ljharb" } }, + "node_modules/uncontrollable": { + "version": "7.2.1", + "resolved": "https://registry.npmjs.org/uncontrollable/-/uncontrollable-7.2.1.tgz", + "integrity": "sha512-svtcfoTADIB0nT9nltgjujTi7BzVmwjZClOmskKu/E8FW9BXzg9os8OLr4f8Dlnk0rYWJIWr4wv9eKUXiQvQwQ==", + "peer": true, + "dependencies": { + "@babel/runtime": "^7.6.3", + "@types/react": ">=16.9.11", + "invariant": "^2.2.4", + "react-lifecycles-compat": "^3.0.4" + }, + "peerDependencies": { + "react": ">=15.0.0" + } + }, "node_modules/unicode-canonical-property-names-ecmascript": { "version": "2.0.0", "dev": true, @@ -20598,7 +20755,15 @@ } }, "@popperjs/core": { - "version": "2.11.2" + "version": "2.11.8", + "resolved": "https://registry.npmjs.org/@popperjs/core/-/core-2.11.8.tgz", + "integrity": "sha512-P1st0aksCrn9sGZhp8GMYwBnQsbvAWsZAX44oXNNvLHGqAOcoVxmjZiohstwQ7SqKnbR47akdNi+uleWD8+g6A==" + }, + "@react-icons/all-files": { + "version": "4.1.0", + "resolved": "https://registry.npmjs.org/@react-icons/all-files/-/all-files-4.1.0.tgz", + "integrity": "sha512-hxBI2UOuVaI3O/BhQfhtb4kcGn9ft12RWAFVMUeNjqqhLsHvFtzIkFaptBJpFDANTKoDfdVoHTKZDlwKCACbMQ==", + "requires": {} }, "@reduxjs/toolkit": { "version": "1.8.0", @@ -20617,6 +20782,30 @@ } } }, + "@restart/context": { + "version": "2.1.4", + "resolved": "https://registry.npmjs.org/@restart/context/-/context-2.1.4.tgz", + "integrity": "sha512-INJYZQJP7g+IoDUh/475NlGiTeMfwTXUEr3tmRneckHIxNolGOW9CTq83S8cxq0CgJwwcMzMJFchxvlwe7Rk8Q==", + "peer": true, + "requires": {} + }, + "@restart/hooks": { + "version": "0.4.11", + "resolved": "https://registry.npmjs.org/@restart/hooks/-/hooks-0.4.11.tgz", + "integrity": "sha512-Ft/ncTULZN6ldGHiF/k5qt72O8JyRMOeg0tApvCni8LkoiEahO+z3TNxfXIVGy890YtWVDvJAl662dVJSJXvMw==", + "peer": true, + "requires": { + "dequal": "^2.0.3" + } + }, + "@rjsf/bootstrap-4": { + "version": "5.12.1", + "resolved": "https://registry.npmjs.org/@rjsf/bootstrap-4/-/bootstrap-4-5.12.1.tgz", + "integrity": "sha512-aUnijxIlYWza8klJ+GvgoYk4gFSaQQV97LLdujMQY096iLm12ryxWLEjyLyPPNOymyp4kdkNO4FCTiWMs2bh3Q==", + "requires": { + "@react-icons/all-files": "^4.1.0" + } + }, "@rjsf/core": { "version": "5.12.1", "resolved": "https://registry.npmjs.org/@rjsf/core/-/core-5.12.1.tgz", @@ -20981,6 +21170,12 @@ "@types/node": "*" } }, + "@types/invariant": { + "version": "2.2.35", + "resolved": "https://registry.npmjs.org/@types/invariant/-/invariant-2.2.35.tgz", + "integrity": "sha512-DxX1V9P8zdJPYQat1gHyY0xj3efl8gnMVjiM9iCY6y27lj+PoQWkgjt8jDqmovPqULkKVpKRg8J36iQiA+EtEg==", + "peer": true + }, "@types/istanbul-lib-coverage": { "version": "2.0.4", "dev": true @@ -21130,6 +21325,12 @@ "@types/unist": { "version": "2.0.6" }, + "@types/warning": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/@types/warning/-/warning-3.0.0.tgz", + "integrity": "sha512-t/Tvs5qR47OLOr+4E9ckN8AmP2Tf16gWq+/qA4iUGS/OOyHVO8wv2vjJuX8SNOUTJyWb+2t7wJm6cXILFnOROA==", + "peer": true + }, "@types/ws": { "version": "8.5.2", "dev": true, @@ -22970,6 +23171,12 @@ "version": "1.1.2", "dev": true }, + "dequal": { + "version": "2.0.3", + "resolved": "https://registry.npmjs.org/dequal/-/dequal-2.0.3.tgz", + "integrity": "sha512-0je+qPKHEMohvfRTCEo3CrPG6cAzAYgmzKyxRiYSSDkS6eGJdyVJm7WaYA5ECaAD9wLB2T4EEeymA5aFVcYXCA==", + "peer": true + }, "desandro-matches-selector": { "version": "2.0.2" }, @@ -24714,7 +24921,6 @@ }, "invariant": { "version": "2.2.4", - "dev": true, "requires": { "loose-envify": "^1.0.0" } @@ -27707,6 +27913,24 @@ } } }, + "prop-types-extra": { + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/prop-types-extra/-/prop-types-extra-1.1.1.tgz", + "integrity": "sha512-59+AHNnHYCdiC+vMwY52WmvP5dM3QLeoumYuEyceQDi9aEhtwN9zIQ2ZNo25sMyXnbh32h+P1ezDsUpUH3JAew==", + "peer": true, + "requires": { + "react-is": "^16.3.2", + "warning": "^4.0.0" + }, + "dependencies": { + "react-is": { + "version": "16.13.1", + "resolved": "https://registry.npmjs.org/react-is/-/react-is-16.13.1.tgz", + "integrity": "sha512-24e6ynE2H+OKt4kqsOvNd8kBpV65zoxbA4BVsEOB3ARVWQki/DHzaUoC5KuON/BiccDaCCTZBuOcfZs70kR8bQ==", + "peer": true + } + } + }, "property-information": { "version": "5.6.0", "requires": { @@ -27823,6 +28047,31 @@ "whatwg-fetch": "^3.4.1" } }, + "react-bootstrap": { + "version": "1.6.7", + "resolved": "https://registry.npmjs.org/react-bootstrap/-/react-bootstrap-1.6.7.tgz", + "integrity": "sha512-IzCYXuLSKDEjGFglbFWk0/iHmdhdcJzTmtS6lXxc0kaNFx2PFgrQf5jKnx5sarF2tiXh9Tgx3pSt3pdK7YwkMA==", + "peer": true, + "requires": { + "@babel/runtime": "^7.14.0", + "@restart/context": "^2.1.4", + "@restart/hooks": "^0.4.7", + "@types/invariant": "^2.2.33", + "@types/prop-types": "^15.7.3", + "@types/react": ">=16.14.8", + "@types/react-transition-group": "^4.4.1", + "@types/warning": "^3.0.0", + "classnames": "^2.3.1", + "dom-helpers": "^5.2.1", + "invariant": "^2.2.4", + "prop-types": "^15.7.2", + "prop-types-extra": "^1.1.0", + "react-overlays": "^5.1.2", + "react-transition-group": "^4.4.1", + "uncontrollable": "^7.2.1", + "warning": "^4.0.3" + } + }, "react-copy-to-clipboard": { "version": "5.0.4", "requires": { @@ -27973,6 +28222,12 @@ "react-is": { "version": "17.0.2" }, + "react-lifecycles-compat": { + "version": "3.0.4", + "resolved": "https://registry.npmjs.org/react-lifecycles-compat/-/react-lifecycles-compat-3.0.4.tgz", + "integrity": "sha512-fBASbA6LnOU9dOU2eW7aQ8xmYBSXUIWr+UmF9b1efZBazGNO+rcXT/icdKnYm2pTwcRylVUYwW7H1PHfLekVzA==", + "peer": true + }, "react-loading-skeleton": { "version": "3.1.0", "requires": {} @@ -27998,6 +28253,22 @@ "integrity": "sha512-NMXGa223OnsrGVp5dJHkuKxQ4czdLmXSp5jSV9OqiCky9LOpPATn3vLldc+q5fK3gKbEHvr7J1u0yhBh/xYkpA==", "requires": {} }, + "react-overlays": { + "version": "5.2.1", + "resolved": "https://registry.npmjs.org/react-overlays/-/react-overlays-5.2.1.tgz", + "integrity": "sha512-GLLSOLWr21CqtJn8geSwQfoJufdt3mfdsnIiQswouuQ2MMPns+ihZklxvsTDKD3cR2tF8ELbi5xUsvqVhR6WvA==", + "peer": true, + "requires": { + "@babel/runtime": "^7.13.8", + "@popperjs/core": "^2.11.6", + "@restart/hooks": "^0.4.7", + "@types/warning": "^3.0.0", + "dom-helpers": "^5.2.0", + "prop-types": "^15.7.2", + "uncontrollable": "^7.2.1", + "warning": "^4.0.3" + } + }, "react-papaparse": { "version": "3.18.2", "requires": { @@ -29610,6 +29881,18 @@ "which-boxed-primitive": "^1.0.2" } }, + "uncontrollable": { + "version": "7.2.1", + "resolved": "https://registry.npmjs.org/uncontrollable/-/uncontrollable-7.2.1.tgz", + "integrity": "sha512-svtcfoTADIB0nT9nltgjujTi7BzVmwjZClOmskKu/E8FW9BXzg9os8OLr4f8Dlnk0rYWJIWr4wv9eKUXiQvQwQ==", + "peer": true, + "requires": { + "@babel/runtime": "^7.6.3", + "@types/react": ">=16.9.11", + "invariant": "^2.2.4", + "react-lifecycles-compat": "^3.0.4" + } + }, "unicode-canonical-property-names-ecmascript": { "version": "2.0.0", "dev": true diff --git a/package.json b/package.json index ccb4c6383316..88f3735fcc05 100644 --- a/package.json +++ b/package.json @@ -41,6 +41,7 @@ "@monaco-editor/react": "^4.5.2", "@popperjs/core": "^2.10.2", "@reduxjs/toolkit": "^1.7.0", + "@rjsf/bootstrap-4": "^5.12.1", "@rjsf/core": "^5.12.1", "@rjsf/utils": "^5.12.1", "@rjsf/validator-ajv8": "^5.12.1", diff --git a/src/data/BPAField.uischema.v1.json b/src/data/BPAField.uischema.v1.json index 5d88206bb0aa..bc36b81d44b2 100644 --- a/src/data/BPAField.uischema.v1.json +++ b/src/data/BPAField.uischema.v1.json @@ -20,7 +20,7 @@ "norender": false, "props": { "disabled": false, - "className": "btn mb-3 btn-primary" + "className": "btn btn-primary" } } } diff --git a/src/data/BPAReport.uischema.v1.json b/src/data/BPAReport.uischema.v1.json index f5d3db89270d..19e3c7d01237 100644 --- a/src/data/BPAReport.uischema.v1.json +++ b/src/data/BPAReport.uischema.v1.json @@ -20,8 +20,7 @@ ], "FrontendFields": { "ui:classNames": "card card-title p-4 my-4" - }, - "ui:classNames": "card card-title p-4 my-4" + } } }, "ui:submitButtonOptions": { diff --git a/src/views/tenant/standards/BPAReportBuilder.js b/src/views/tenant/standards/BPAReportBuilder.js index 39015265c675..a452eb1a6d4e 100644 --- a/src/views/tenant/standards/BPAReportBuilder.js +++ b/src/views/tenant/standards/BPAReportBuilder.js @@ -3,7 +3,7 @@ import { CippPage } from 'src/components/layout' import BPAReportSchema from 'src/data/BPAReport.schema.v1' import BPAReportUISchema from 'src/data/BPAReport.uischema.v1' import validator from '@rjsf/validator-ajv8' -import Form from '@rjsf/core' +import Form from '@rjsf/bootstrap-4' import { CippContentCard } from 'src/components/layout' import { CRow, CCol } from '@coreui/react' import Editor from '@monaco-editor/react' @@ -14,7 +14,6 @@ const CippTextWidget = (props) => { return ( props.onChange(event.target.value)} @@ -27,7 +26,6 @@ const CippSelectWidget = (props) => { props.onChange(event.target.value)} > {options.map(({ label, value }, idx) => ( @@ -48,7 +46,6 @@ const CippCheckboxWidget = (props) => { id={props.name} label={props.label} checked={props.value} - className="mb-3" onChange={(event) => { props.onChange(event.target.checked) }} From 7318fc36881122f63c2a58ca02040b7d3f2280c9 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Wed, 6 Sep 2023 23:48:23 +0200 Subject: [PATCH 033/158] added offcanvas and theming for code --- src/components/utilities/CippCodeOffcanvas.js | 60 +++++++++++++++++++ src/components/utilities/CippOffcanvas.js | 2 +- src/scss/_custom.scss | 8 ++- .../connectors/ListConnectorTemplates.js | 18 +++--- .../spamfilter/ListSpamfilterTemplates.js | 14 ++--- .../transport/ListTransportTemplates.js | 14 ++--- .../endpoint/intune/MEMListPolicyTemplates.js | 14 ++--- .../identity/administration/GroupTemplates.js | 14 ++--- .../tenant/conditional/ListCATemplates.js | 14 ++--- 9 files changed, 104 insertions(+), 54 deletions(-) create mode 100644 src/components/utilities/CippCodeOffcanvas.js diff --git a/src/components/utilities/CippCodeOffcanvas.js b/src/components/utilities/CippCodeOffcanvas.js new file mode 100644 index 000000000000..a36a23b8dae4 --- /dev/null +++ b/src/components/utilities/CippCodeOffcanvas.js @@ -0,0 +1,60 @@ +import React, { useState } from 'react' +import { CButton, CCallout, CCol, CRow, CSpinner } from '@coreui/react' +import { CippOffcanvas } from 'src/components/utilities' +import { useLazyGenericGetRequestQuery, useLazyGenericPostRequestQuery } from 'src/store/api/app' + +import { Editor } from '@monaco-editor/react' +import { useSelector } from 'react-redux' + +function CippCodeOffCanvas({ row, state, hideFunction, type }) { + const [SaveTemplate, templateDetails] = useLazyGenericPostRequestQuery() + const currentTheme = useSelector((state) => state.app.currentTheme) + const [templateData, setFormData] = useState(row) + function handleEditorChange(value, event) { + setFormData(JSON.parse(value)) + } + return ( + <> + + + + + + SaveTemplate({ + path: `/api/ExecEditTemplate?type=${type}`, + method: 'POST', + values: templateData, + }) + } + > + Save changes {templateDetails.isFetching && } + + + + {templateDetails.isSuccess && !templateDetails.isFetching && ( + {templateDetails.data.Results} + )} + + + ) +} + +export default CippCodeOffCanvas diff --git a/src/components/utilities/CippOffcanvas.js b/src/components/utilities/CippOffcanvas.js index 7a6590eb57d1..3148f5992ecb 100644 --- a/src/components/utilities/CippOffcanvas.js +++ b/src/components/utilities/CippOffcanvas.js @@ -8,7 +8,7 @@ export default function CippOffcanvas(props) { return ( { const tenant = useSelector((state) => state.app.currentTenant) - const [ExecuteGetRequest, getResults] = useLazyGenericGetRequestQuery() const Offcanvas = (row, rowIndex, formatExtraData) => { const [ocVisible, setOCVisible] = useState(false) @@ -44,15 +45,12 @@ const ConnectorListTemplates = () => { - setOCVisible(false)} - > - - + /> ) } diff --git a/src/views/email-exchange/spamfilter/ListSpamfilterTemplates.js b/src/views/email-exchange/spamfilter/ListSpamfilterTemplates.js index 13afb7fa99a4..076a7879c423 100644 --- a/src/views/email-exchange/spamfilter/ListSpamfilterTemplates.js +++ b/src/views/email-exchange/spamfilter/ListSpamfilterTemplates.js @@ -9,6 +9,7 @@ import { useLazyGenericGetRequestQuery } from 'src/store/api/app' import { CippPageList } from 'src/components/layout' import { ModalService } from 'src/components/utilities' import { TitleButton } from 'src/components/buttons' +import CippCodeOffCanvas from 'src/components/utilities/CippCodeOffcanvas' const SpamFilterListTemplates = () => { const tenant = useSelector((state) => state.app.currentTenant) @@ -44,15 +45,12 @@ const SpamFilterListTemplates = () => { - setOCVisible(false)} - > - - + /> ) } diff --git a/src/views/email-exchange/transport/ListTransportTemplates.js b/src/views/email-exchange/transport/ListTransportTemplates.js index 3a8cf38287bd..c0cfb1148979 100644 --- a/src/views/email-exchange/transport/ListTransportTemplates.js +++ b/src/views/email-exchange/transport/ListTransportTemplates.js @@ -9,6 +9,7 @@ import { useLazyGenericGetRequestQuery } from 'src/store/api/app' import { CippPageList } from 'src/components/layout' import { ModalService } from 'src/components/utilities' import { TitleButton } from 'src/components/buttons' +import CippCodeOffCanvas from 'src/components/utilities/CippCodeOffcanvas' const TransportListTemplates = () => { const tenant = useSelector((state) => state.app.currentTenant) @@ -44,15 +45,12 @@ const TransportListTemplates = () => { - setOCVisible(false)} - > - - + /> ) } diff --git a/src/views/endpoint/intune/MEMListPolicyTemplates.js b/src/views/endpoint/intune/MEMListPolicyTemplates.js index 73324c19b7f1..645744383d56 100644 --- a/src/views/endpoint/intune/MEMListPolicyTemplates.js +++ b/src/views/endpoint/intune/MEMListPolicyTemplates.js @@ -16,6 +16,7 @@ import { FontAwesomeIcon } from '@fortawesome/react-fontawesome' import { useLazyGenericGetRequestQuery } from 'src/store/api/app' import { CippPage } from 'src/components/layout' import { ModalService } from 'src/components/utilities' +import CippCodeOffCanvas from 'src/components/utilities/CippCodeOffcanvas' //todo: expandable with RAWJson property. @@ -52,15 +53,12 @@ const AutopilotListTemplates = () => { > - setOCVisible(false)} - > - - + /> ) } diff --git a/src/views/identity/administration/GroupTemplates.js b/src/views/identity/administration/GroupTemplates.js index 67ce049e327c..590bf91cd3eb 100644 --- a/src/views/identity/administration/GroupTemplates.js +++ b/src/views/identity/administration/GroupTemplates.js @@ -9,6 +9,7 @@ import { useLazyGenericGetRequestQuery } from 'src/store/api/app' import { CippPageList } from 'src/components/layout' import { ModalService } from 'src/components/utilities' import { TitleButton } from 'src/components/buttons' +import CippCodeOffCanvas from 'src/components/utilities/CippCodeOffcanvas' const GroupTemplates = () => { const tenant = useSelector((state) => state.app.currentTenant) @@ -43,15 +44,12 @@ const GroupTemplates = () => { > - setOCVisible(false)} - > - - + /> ) } diff --git a/src/views/tenant/conditional/ListCATemplates.js b/src/views/tenant/conditional/ListCATemplates.js index f19472d10587..835ed3fef2ff 100644 --- a/src/views/tenant/conditional/ListCATemplates.js +++ b/src/views/tenant/conditional/ListCATemplates.js @@ -17,6 +17,7 @@ import { useLazyGenericGetRequestQuery } from 'src/store/api/app' import { CippPage } from 'src/components/layout' import { ModalService } from 'src/components/utilities' import { CellTip } from 'src/components/tables' +import CippCodeOffCanvas from 'src/components/utilities/CippCodeOffcanvas' //todo: expandable with RAWJson property. @@ -53,15 +54,12 @@ const AutopilotListTemplates = () => { > - setOCVisible(false)} - > - - + /> ) } From 46c7a4bba77bdd01617210291b56319aae4940ec Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Thu, 7 Sep 2023 00:18:00 +0200 Subject: [PATCH 034/158] added invalid json do not send marker --- src/components/utilities/CippCodeOffcanvas.js | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/src/components/utilities/CippCodeOffcanvas.js b/src/components/utilities/CippCodeOffcanvas.js index a36a23b8dae4..c8cdbf175d35 100644 --- a/src/components/utilities/CippCodeOffcanvas.js +++ b/src/components/utilities/CippCodeOffcanvas.js @@ -10,8 +10,15 @@ function CippCodeOffCanvas({ row, state, hideFunction, type }) { const [SaveTemplate, templateDetails] = useLazyGenericPostRequestQuery() const currentTheme = useSelector((state) => state.app.currentTheme) const [templateData, setFormData] = useState(row) + const [invalidJSON, setInvalid] = useState(false) + function handleEditorChange(value, event) { - setFormData(JSON.parse(value)) + try { + setFormData(JSON.parse(value)) + setInvalid(false) + } catch { + setInvalid(true) + } } return ( <> @@ -37,6 +44,7 @@ function CippCodeOffCanvas({ row, state, hideFunction, type }) { SaveTemplate({ path: `/api/ExecEditTemplate?type=${type}`, From 5563827e337df6aa6c709110602f65672f9a43bc Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Thu, 7 Sep 2023 11:08:34 +0200 Subject: [PATCH 035/158] added multi select to offboarding wizard --- src/views/identity/administration/OffboardingWizard.js | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/src/views/identity/administration/OffboardingWizard.js b/src/views/identity/administration/OffboardingWizard.js index 4e6318addf9d..58c425a52b2d 100644 --- a/src/views/identity/administration/OffboardingWizard.js +++ b/src/views/identity/administration/OffboardingWizard.js @@ -45,9 +45,9 @@ const OffboardingWizard = () => { TenantFilter: tenantDomain, OOO: values.OOO ? values.OOO : '', forward: values.forward ? values.forward.value : '', - OnedriveAccess: values.OnedriveAccess ? values.OnedriveAccess.value : '', - AccessNoAutomap: values.AccessNoAutomap ? values.AccessNoAutomap.value : '', - AccessAutomap: values.AccessAutomap ? values.AccessAutomap.value : '', + OnedriveAccess: values.OnedriveAccess ? values.OnedriveAccess : '', + AccessNoAutomap: values.AccessNoAutomap ? values.AccessNoAutomap : '', + AccessAutomap: values.AccessAutomap ? values.AccessAutomap : '', ConvertToShared: values.ConvertToShared, HideFromGAL: values.HideFromGAL, DisableSignIn: values.DisableSignIn, @@ -130,6 +130,7 @@ const OffboardingWizard = () => { x.mail) .map((user) => ({ @@ -143,6 +144,7 @@ const OffboardingWizard = () => { x.mail) .map((user) => ({ @@ -156,6 +158,7 @@ const OffboardingWizard = () => { x.mail) .map((user) => ({ From afadd686684f78df717e66cadd88fdd850d44d67 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Thu, 7 Sep 2023 12:57:22 +0200 Subject: [PATCH 036/158] improved search for tenant selector. --- src/components/utilities/CippFuzzySearch.js | 26 +++++++++++++++++++++ src/components/utilities/TenantSelector.js | 7 +++--- 2 files changed, 30 insertions(+), 3 deletions(-) create mode 100644 src/components/utilities/CippFuzzySearch.js diff --git a/src/components/utilities/CippFuzzySearch.js b/src/components/utilities/CippFuzzySearch.js new file mode 100644 index 000000000000..f4db1f1473cb --- /dev/null +++ b/src/components/utilities/CippFuzzySearch.js @@ -0,0 +1,26 @@ +var _fuse = _interopRequireDefault(require('fuse.js')) + +function _interopRequireDefault(obj) { + return obj && obj.__esModule ? obj : { default: obj } +} + +function CippfuzzySearch(options) { + var fuse = new _fuse['default'](options, { + keys: ['name', 'groupName', 'items.name'], + threshold: 0.2, + location: 0, + ignoreLocation: true, + useExtendedSearch: true, + }) + return function (value) { + if (!value.length) { + return options + } + + return fuse.search(value).map((_ref) => { + let { item } = _ref + return item + }) + } +} +export default CippfuzzySearch diff --git a/src/components/utilities/TenantSelector.js b/src/components/utilities/TenantSelector.js index 686fdd0727e4..570f2f30c002 100644 --- a/src/components/utilities/TenantSelector.js +++ b/src/components/utilities/TenantSelector.js @@ -10,6 +10,7 @@ import { queryString } from 'src/helpers' import { faBuilding } from '@fortawesome/free-solid-svg-icons' import { FontAwesomeIcon } from '@fortawesome/react-fontawesome' import CippTenantOffcanvas from './CippTenantOffcanvas' +import CippfuzzySearch from './CippFuzzySearch' const TenantSelector = ({ action, showAllTenantSelector = true, NavSelector = false }) => { const currentTenant = useSelector((state) => state.app.currentTenant) @@ -95,13 +96,13 @@ const TenantSelector = ({ action, showAllTenantSelector = true, NavSelector = fa ({ value: customerId, - name: [displayName] + [` (${defaultDomainName})`], + name: `${displayName} (${defaultDomainName})`, }))} /> @@ -112,7 +113,7 @@ const TenantSelector = ({ action, showAllTenantSelector = true, NavSelector = fa Date: Thu, 7 Sep 2023 12:11:01 -0400 Subject: [PATCH 037/158] BPA Report Builder - Load/Publish - Add Load Existing Template - Add publish to GitHub button --- .../tenant/standards/BPAReportBuilder.js | 153 +++++++++++++++++- 1 file changed, 148 insertions(+), 5 deletions(-) diff --git a/src/views/tenant/standards/BPAReportBuilder.js b/src/views/tenant/standards/BPAReportBuilder.js index a452eb1a6d4e..52987e1dc3e5 100644 --- a/src/views/tenant/standards/BPAReportBuilder.js +++ b/src/views/tenant/standards/BPAReportBuilder.js @@ -1,14 +1,33 @@ -import React, { useState, useRef } from 'react' +import React, { useState, useEffect, useRef } from 'react' import { CippPage } from 'src/components/layout' import BPAReportSchema from 'src/data/BPAReport.schema.v1' import BPAReportUISchema from 'src/data/BPAReport.uischema.v1' import validator from '@rjsf/validator-ajv8' import Form from '@rjsf/bootstrap-4' import { CippContentCard } from 'src/components/layout' -import { CRow, CCol } from '@coreui/react' import Editor from '@monaco-editor/react' import { useSelector } from 'react-redux' -import { CFormInput, CFormSelect, CFormSwitch } from '@coreui/react' +import useQuery from 'src/hooks/useQuery' +import { + CFormInput, + CFormSelect, + CFormSwitch, + CRow, + CCol, + CCard, + CCardHeader, + CCardTitle, + CButton, + CCollapse, + CCardBody, + CForm, + CSpinner, + CFormLabel, + CTooltip, +} from '@coreui/react' +import { useGenericGetRequestQuery } from 'src/store/api/app' +import { FontAwesomeIcon } from '@fortawesome/react-fontawesome' +import CopyToClipboard from 'react-copy-to-clipboard' const CippTextWidget = (props) => { return ( @@ -38,8 +57,6 @@ const CippSelectWidget = (props) => { } const CippCheckboxWidget = (props) => { - // not working yet - console.log(props) return ( { + let query = useQuery() + const [refreshValue, setRefreshValue] = useState('') + const Report = query.get('Report') + const [filename, setFilename] = useState() + const [visibleA, setVisibleA] = useState(true) + const { data: templates = [], isLoading: templatesfetch } = useGenericGetRequestQuery({ + path: 'api/listBPATemplates?RawJson=true&Refresh=' + refreshValue, + }) const [formData, setFormData] = useState(null) const editorRef = useRef(null) const currentTheme = useSelector((state) => state.app.currentTheme) + + function handleRefresh() { + setRefreshValue((Math.random() + 1).toString(36).substring(7)) + } + function handleEditorChange(value, event) { try { setFormData(JSON.parse(value)) @@ -69,12 +99,125 @@ const BPAReportBuilder = () => { setFormData({}) } } + const handleSubmit = async (event) => { + event.preventDefault() + var reportTemplate = event.target.form[0].value + setVisibleA(false) + if (reportTemplate !== 'New') { + var template = templates.filter(function (tpl) { + return tpl.name == reportTemplate + }) + setFormData(template[0]) + } else { + setFormData({}) + } + } + useEffect(() => { + var reportName = formData?.name ? formData?.name?.replace(/[\W]/g, '') : 'NewReport' + var newfilename = reportName + '.BPATemplate.json' + setFilename(newfilename) + }, [filename, formData]) + + const handlePublish = async (event) => { + event.preventDefault() + const data = new FormData(event.target) + const ghuser = data.get('GitHubUser') + const reportfilename = data.get('ReportFilename') + const report = JSON.stringify(formData, null, 2) + const url = + 'https://github.com/' + ghuser + '/CIPP-API/new/master/Config?filename=' + reportfilename + window.open(url, '_blank') + } + const options = { wordWrap: true, } return ( + + + + + + Report Settings + setVisibleA(!visibleA)}> + + + + + + + + + + + + Load Existing Report + + + {templates.map((template, idx) => ( + + ))} + + + {templatesfetch && } + + + + + + Load Report + + + + + + + + + + + + + GitHub Username/Org Name + + Report Filename + + + + + + + + + + Publish + + + + + + + + + + + + + +
    From d9aa06d248e82b13bfc4e131d12c5d78e7927616 Mon Sep 17 00:00:00 2001 From: John Duprey Date: Thu, 7 Sep 2023 12:36:54 -0400 Subject: [PATCH 038/158] Update BPAReportBuilder.js --- src/views/tenant/standards/BPAReportBuilder.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/views/tenant/standards/BPAReportBuilder.js b/src/views/tenant/standards/BPAReportBuilder.js index 52987e1dc3e5..46a4766bd25c 100644 --- a/src/views/tenant/standards/BPAReportBuilder.js +++ b/src/views/tenant/standards/BPAReportBuilder.js @@ -174,7 +174,7 @@ const BPAReportBuilder = () => { - + Load Report From 71945e1fe7ca315e39f2383374a6e3e0f4da58d6 Mon Sep 17 00:00:00 2001 From: John Duprey Date: Thu, 7 Sep 2023 12:44:32 -0400 Subject: [PATCH 039/158] Add react-bootstrap --- package-lock.json | 310 +++++++++++++++++++++++++--------------------- package.json | 1 + 2 files changed, 173 insertions(+), 138 deletions(-) diff --git a/package-lock.json b/package-lock.json index acf2cd561d02..5af2243419af 100644 --- a/package-lock.json +++ b/package-lock.json @@ -42,6 +42,7 @@ "prop-types": "^15.7.2", "react": "^17.0.2", "react-app-polyfill": "^2.0.0", + "react-bootstrap": "^2.8.0", "react-copy-to-clipboard": "^5.0.4", "react-data-table-component": "^7.4.5", "react-datepicker": "^4.10.0", @@ -1776,10 +1777,11 @@ } }, "node_modules/@babel/runtime": { - "version": "7.17.2", - "license": "MIT", + "version": "7.22.15", + "resolved": "https://registry.npmjs.org/@babel/runtime/-/runtime-7.22.15.tgz", + "integrity": "sha512-T0O+aa+4w0u06iNmapipJXMV4HoUir03hpx3/YqXXhu9xim3w+dVphjFWl1OH8NbZHw5Lbm9k45drDkgq2VNNA==", "dependencies": { - "regenerator-runtime": "^0.13.4" + "regenerator-runtime": "^0.14.0" }, "engines": { "node": ">=6.9.0" @@ -1797,6 +1799,11 @@ "node": ">=6.9.0" } }, + "node_modules/@babel/runtime/node_modules/regenerator-runtime": { + "version": "0.14.0", + "resolved": "https://registry.npmjs.org/regenerator-runtime/-/regenerator-runtime-0.14.0.tgz", + "integrity": "sha512-srw17NI0TUWHuGa5CFGGmhfNIeja30WMBfbslPNhf6JrqQlLN5gcrvig1oqPxiVaXb0oW0XRKtH6Nngs5lKCIA==" + }, "node_modules/@babel/template": { "version": "7.16.7", "license": "MIT", @@ -3184,6 +3191,20 @@ "url": "https://opencollective.com/popperjs" } }, + "node_modules/@react-aria/ssr": { + "version": "3.7.1", + "resolved": "https://registry.npmjs.org/@react-aria/ssr/-/ssr-3.7.1.tgz", + "integrity": "sha512-ovVPSD1WlRpZHt7GI9DqJrWG3OIYS+NXQ9y5HIewMJpSe+jPQmMQfyRmgX4EnvmxSlp0u04Wg/7oItcoSIb/RA==", + "dependencies": { + "@swc/helpers": "^0.5.0" + }, + "engines": { + "node": ">= 12" + }, + "peerDependencies": { + "react": "^16.8.0 || ^17.0.0-rc.1 || ^18.0.0" + } + }, "node_modules/@react-icons/all-files": { "version": "4.1.0", "resolved": "https://registry.npmjs.org/@react-icons/all-files/-/all-files-4.1.0.tgz", @@ -3221,20 +3242,10 @@ "@babel/runtime": "^7.9.2" } }, - "node_modules/@restart/context": { - "version": "2.1.4", - "resolved": "https://registry.npmjs.org/@restart/context/-/context-2.1.4.tgz", - "integrity": "sha512-INJYZQJP7g+IoDUh/475NlGiTeMfwTXUEr3tmRneckHIxNolGOW9CTq83S8cxq0CgJwwcMzMJFchxvlwe7Rk8Q==", - "peer": true, - "peerDependencies": { - "react": ">=16.3.2" - } - }, "node_modules/@restart/hooks": { "version": "0.4.11", "resolved": "https://registry.npmjs.org/@restart/hooks/-/hooks-0.4.11.tgz", "integrity": "sha512-Ft/ncTULZN6ldGHiF/k5qt72O8JyRMOeg0tApvCni8LkoiEahO+z3TNxfXIVGy890YtWVDvJAl662dVJSJXvMw==", - "peer": true, "dependencies": { "dequal": "^2.0.3" }, @@ -3242,6 +3253,34 @@ "react": ">=16.8.0" } }, + "node_modules/@restart/ui": { + "version": "1.6.6", + "resolved": "https://registry.npmjs.org/@restart/ui/-/ui-1.6.6.tgz", + "integrity": "sha512-eC3puKuWE1SRYbojWHXnvCNHGgf3uzHCb6JOhnF4OXPibOIPEkR1sqDSkL643ydigxwh+ruCa1CmYHlzk7ikKA==", + "dependencies": { + "@babel/runtime": "^7.21.0", + "@popperjs/core": "^2.11.6", + "@react-aria/ssr": "^3.5.0", + "@restart/hooks": "^0.4.9", + "@types/warning": "^3.0.0", + "dequal": "^2.0.3", + "dom-helpers": "^5.2.0", + "uncontrollable": "^8.0.1", + "warning": "^4.0.3" + }, + "peerDependencies": { + "react": ">=16.14.0", + "react-dom": ">=16.14.0" + } + }, + "node_modules/@restart/ui/node_modules/uncontrollable": { + "version": "8.0.4", + "resolved": "https://registry.npmjs.org/uncontrollable/-/uncontrollable-8.0.4.tgz", + "integrity": "sha512-ulRWYWHvscPFc0QQXvyJjY6LIXU56f0h8pQFvhxiKk5V1fcI8gp9Ht9leVAhrVjzqMw0BgjspBINx9r6oyJUvQ==", + "peerDependencies": { + "react": ">=16.14.0" + } + }, "node_modules/@rjsf/bootstrap-4": { "version": "5.12.1", "resolved": "https://registry.npmjs.org/@rjsf/bootstrap-4/-/bootstrap-4-5.12.1.tgz", @@ -3651,6 +3690,14 @@ "url": "https://github.com/sponsors/gregberge" } }, + "node_modules/@swc/helpers": { + "version": "0.5.2", + "resolved": "https://registry.npmjs.org/@swc/helpers/-/helpers-0.5.2.tgz", + "integrity": "sha512-E4KcWTpoLHqwPHLxidpOqQbcrZVgi0rsmmZXUle1jXmJfuIf/UWpczUJ7MZZ5tlxytgJXyp0w4PGkkeLiuIdZw==", + "dependencies": { + "tslib": "^2.4.0" + } + }, "node_modules/@tootallnate/once": { "version": "1.1.2", "dev": true, @@ -3815,12 +3862,6 @@ "@types/node": "*" } }, - "node_modules/@types/invariant": { - "version": "2.2.35", - "resolved": "https://registry.npmjs.org/@types/invariant/-/invariant-2.2.35.tgz", - "integrity": "sha512-DxX1V9P8zdJPYQat1gHyY0xj3efl8gnMVjiM9iCY6y27lj+PoQWkgjt8jDqmovPqULkKVpKRg8J36iQiA+EtEg==", - "peer": true - }, "node_modules/@types/istanbul-lib-coverage": { "version": "2.0.4", "dev": true, @@ -3938,8 +3979,9 @@ } }, "node_modules/@types/react-transition-group": { - "version": "4.4.4", - "license": "MIT", + "version": "4.4.6", + "resolved": "https://registry.npmjs.org/@types/react-transition-group/-/react-transition-group-4.4.6.tgz", + "integrity": "sha512-VnCdSxfcm08KjsJVQcfBmhEQAPnLB8G08hAxn39azX1qYBQ/5RVQuoHuKIcfKOdncuaUvEpFKFzEvbtIMsfVew==", "dependencies": { "@types/react": "*" } @@ -4003,8 +4045,7 @@ "node_modules/@types/warning": { "version": "3.0.0", "resolved": "https://registry.npmjs.org/@types/warning/-/warning-3.0.0.tgz", - "integrity": "sha512-t/Tvs5qR47OLOr+4E9ckN8AmP2Tf16gWq+/qA4iUGS/OOyHVO8wv2vjJuX8SNOUTJyWb+2t7wJm6cXILFnOROA==", - "peer": true + "integrity": "sha512-t/Tvs5qR47OLOr+4E9ckN8AmP2Tf16gWq+/qA4iUGS/OOyHVO8wv2vjJuX8SNOUTJyWb+2t7wJm6cXILFnOROA==" }, "node_modules/@types/ws": { "version": "8.5.2", @@ -6069,8 +6110,9 @@ "license": "MIT" }, "node_modules/classnames": { - "version": "2.3.1", - "license": "MIT" + "version": "2.3.2", + "resolved": "https://registry.npmjs.org/classnames/-/classnames-2.3.2.tgz", + "integrity": "sha512-CSbhY4cFEJRe6/GQzIk5qXZ4Jeg5pcsP7b5peFSDpffpe1cqjASH/n9UTjBwOp6XpMSTwQ8Za2K5V02ueA7Tmw==" }, "node_modules/clean-css": { "version": "5.2.4", @@ -7004,7 +7046,6 @@ "version": "2.0.3", "resolved": "https://registry.npmjs.org/dequal/-/dequal-2.0.3.tgz", "integrity": "sha512-0je+qPKHEMohvfRTCEo3CrPG6cAzAYgmzKyxRiYSSDkS6eGJdyVJm7WaYA5ECaAD9wLB2T4EEeymA5aFVcYXCA==", - "peer": true, "engines": { "node": ">=6" } @@ -14715,7 +14756,6 @@ "version": "1.1.1", "resolved": "https://registry.npmjs.org/prop-types-extra/-/prop-types-extra-1.1.1.tgz", "integrity": "sha512-59+AHNnHYCdiC+vMwY52WmvP5dM3QLeoumYuEyceQDi9aEhtwN9zIQ2ZNo25sMyXnbh32h+P1ezDsUpUH3JAew==", - "peer": true, "dependencies": { "react-is": "^16.3.2", "warning": "^4.0.0" @@ -14727,8 +14767,7 @@ "node_modules/prop-types-extra/node_modules/react-is": { "version": "16.13.1", "resolved": "https://registry.npmjs.org/react-is/-/react-is-16.13.1.tgz", - "integrity": "sha512-24e6ynE2H+OKt4kqsOvNd8kBpV65zoxbA4BVsEOB3ARVWQki/DHzaUoC5KuON/BiccDaCCTZBuOcfZs70kR8bQ==", - "peer": true + "integrity": "sha512-24e6ynE2H+OKt4kqsOvNd8kBpV65zoxbA4BVsEOB3ARVWQki/DHzaUoC5KuON/BiccDaCCTZBuOcfZs70kR8bQ==" }, "node_modules/prop-types/node_modules/react-is": { "version": "16.13.1", @@ -14927,32 +14966,32 @@ } }, "node_modules/react-bootstrap": { - "version": "1.6.7", - "resolved": "https://registry.npmjs.org/react-bootstrap/-/react-bootstrap-1.6.7.tgz", - "integrity": "sha512-IzCYXuLSKDEjGFglbFWk0/iHmdhdcJzTmtS6lXxc0kaNFx2PFgrQf5jKnx5sarF2tiXh9Tgx3pSt3pdK7YwkMA==", - "peer": true, - "dependencies": { - "@babel/runtime": "^7.14.0", - "@restart/context": "^2.1.4", - "@restart/hooks": "^0.4.7", - "@types/invariant": "^2.2.33", - "@types/prop-types": "^15.7.3", - "@types/react": ">=16.14.8", - "@types/react-transition-group": "^4.4.1", - "@types/warning": "^3.0.0", - "classnames": "^2.3.1", + "version": "2.8.0", + "resolved": "https://registry.npmjs.org/react-bootstrap/-/react-bootstrap-2.8.0.tgz", + "integrity": "sha512-e/aNtxl0Z2ozrIaR82jr6Zz7ss9GSoaXpQaxmvtDUsTZIq/XalkduR/ZXP6vbQHz2T4syvjA+4FbtwELxxmpww==", + "dependencies": { + "@babel/runtime": "^7.21.0", + "@restart/hooks": "^0.4.9", + "@restart/ui": "^1.6.3", + "@types/react-transition-group": "^4.4.5", + "classnames": "^2.3.2", "dom-helpers": "^5.2.1", "invariant": "^2.2.4", - "prop-types": "^15.7.2", + "prop-types": "^15.8.1", "prop-types-extra": "^1.1.0", - "react-overlays": "^5.1.2", - "react-transition-group": "^4.4.1", + "react-transition-group": "^4.4.5", "uncontrollable": "^7.2.1", "warning": "^4.0.3" }, "peerDependencies": { - "react": ">=16.8.0", - "react-dom": ">=16.8.0" + "@types/react": ">=16.14.8", + "react": ">=16.14.0", + "react-dom": ">=16.14.0" + }, + "peerDependenciesMeta": { + "@types/react": { + "optional": true + } } }, "node_modules/react-copy-to-clipboard": { @@ -15192,8 +15231,7 @@ "node_modules/react-lifecycles-compat": { "version": "3.0.4", "resolved": "https://registry.npmjs.org/react-lifecycles-compat/-/react-lifecycles-compat-3.0.4.tgz", - "integrity": "sha512-fBASbA6LnOU9dOU2eW7aQ8xmYBSXUIWr+UmF9b1efZBazGNO+rcXT/icdKnYm2pTwcRylVUYwW7H1PHfLekVzA==", - "peer": true + "integrity": "sha512-fBASbA6LnOU9dOU2eW7aQ8xmYBSXUIWr+UmF9b1efZBazGNO+rcXT/icdKnYm2pTwcRylVUYwW7H1PHfLekVzA==" }, "node_modules/react-loading-skeleton": { "version": "3.1.0", @@ -15237,26 +15275,6 @@ "react-dom": "^15.5.x || ^16.x || ^17.x || ^18.x" } }, - "node_modules/react-overlays": { - "version": "5.2.1", - "resolved": "https://registry.npmjs.org/react-overlays/-/react-overlays-5.2.1.tgz", - "integrity": "sha512-GLLSOLWr21CqtJn8geSwQfoJufdt3mfdsnIiQswouuQ2MMPns+ihZklxvsTDKD3cR2tF8ELbi5xUsvqVhR6WvA==", - "peer": true, - "dependencies": { - "@babel/runtime": "^7.13.8", - "@popperjs/core": "^2.11.6", - "@restart/hooks": "^0.4.7", - "@types/warning": "^3.0.0", - "dom-helpers": "^5.2.0", - "prop-types": "^15.7.2", - "uncontrollable": "^7.2.1", - "warning": "^4.0.3" - }, - "peerDependencies": { - "react": ">=16.3.0", - "react-dom": ">=16.3.0" - } - }, "node_modules/react-papaparse": { "version": "3.18.2", "license": "MIT", @@ -15534,8 +15552,9 @@ "integrity": "sha512-rkpe71W0N0c0Xz6QD0eJETuWAJGnJ9afsl1srmwPrI+yBCkge5EycXXbYRyvL29zZVUWQCY7InPRCv3GDXuZNw==" }, "node_modules/react-transition-group": { - "version": "4.4.2", - "license": "BSD-3-Clause", + "version": "4.4.5", + "resolved": "https://registry.npmjs.org/react-transition-group/-/react-transition-group-4.4.5.tgz", + "integrity": "sha512-pZcd1MCJoiKiBR2NRxeCRg13uCXbydPnmB4EOeRrY7480qNWO8IIgQG6zlDkm6uRMsURXPuKq0GWtiM59a5Q6g==", "dependencies": { "@babel/runtime": "^7.5.5", "dom-helpers": "^5.0.1", @@ -17590,8 +17609,9 @@ } }, "node_modules/tslib": { - "version": "2.3.1", - "license": "0BSD" + "version": "2.6.2", + "resolved": "https://registry.npmjs.org/tslib/-/tslib-2.6.2.tgz", + "integrity": "sha512-AEYxH93jGFPn/a2iVAwW87VuUIkR1FVUKB77NwMF7nBTDkDrrT/Hpt/IrCJ0QXhW27jTBDcf5ZY7w6RiqTMw2Q==" }, "node_modules/tsutils": { "version": "3.21.0", @@ -17704,7 +17724,6 @@ "version": "7.2.1", "resolved": "https://registry.npmjs.org/uncontrollable/-/uncontrollable-7.2.1.tgz", "integrity": "sha512-svtcfoTADIB0nT9nltgjujTi7BzVmwjZClOmskKu/E8FW9BXzg9os8OLr4f8Dlnk0rYWJIWr4wv9eKUXiQvQwQ==", - "peer": true, "dependencies": { "@babel/runtime": "^7.6.3", "@types/react": ">=16.9.11", @@ -19860,9 +19879,18 @@ } }, "@babel/runtime": { - "version": "7.17.2", + "version": "7.22.15", + "resolved": "https://registry.npmjs.org/@babel/runtime/-/runtime-7.22.15.tgz", + "integrity": "sha512-T0O+aa+4w0u06iNmapipJXMV4HoUir03hpx3/YqXXhu9xim3w+dVphjFWl1OH8NbZHw5Lbm9k45drDkgq2VNNA==", "requires": { - "regenerator-runtime": "^0.13.4" + "regenerator-runtime": "^0.14.0" + }, + "dependencies": { + "regenerator-runtime": { + "version": "0.14.0", + "resolved": "https://registry.npmjs.org/regenerator-runtime/-/regenerator-runtime-0.14.0.tgz", + "integrity": "sha512-srw17NI0TUWHuGa5CFGGmhfNIeja30WMBfbslPNhf6JrqQlLN5gcrvig1oqPxiVaXb0oW0XRKtH6Nngs5lKCIA==" + } } }, "@babel/runtime-corejs3": { @@ -20759,6 +20787,14 @@ "resolved": "https://registry.npmjs.org/@popperjs/core/-/core-2.11.8.tgz", "integrity": "sha512-P1st0aksCrn9sGZhp8GMYwBnQsbvAWsZAX44oXNNvLHGqAOcoVxmjZiohstwQ7SqKnbR47akdNi+uleWD8+g6A==" }, + "@react-aria/ssr": { + "version": "3.7.1", + "resolved": "https://registry.npmjs.org/@react-aria/ssr/-/ssr-3.7.1.tgz", + "integrity": "sha512-ovVPSD1WlRpZHt7GI9DqJrWG3OIYS+NXQ9y5HIewMJpSe+jPQmMQfyRmgX4EnvmxSlp0u04Wg/7oItcoSIb/RA==", + "requires": { + "@swc/helpers": "^0.5.0" + } + }, "@react-icons/all-files": { "version": "4.1.0", "resolved": "https://registry.npmjs.org/@react-icons/all-files/-/all-files-4.1.0.tgz", @@ -20782,22 +20818,38 @@ } } }, - "@restart/context": { - "version": "2.1.4", - "resolved": "https://registry.npmjs.org/@restart/context/-/context-2.1.4.tgz", - "integrity": "sha512-INJYZQJP7g+IoDUh/475NlGiTeMfwTXUEr3tmRneckHIxNolGOW9CTq83S8cxq0CgJwwcMzMJFchxvlwe7Rk8Q==", - "peer": true, - "requires": {} - }, "@restart/hooks": { "version": "0.4.11", "resolved": "https://registry.npmjs.org/@restart/hooks/-/hooks-0.4.11.tgz", "integrity": "sha512-Ft/ncTULZN6ldGHiF/k5qt72O8JyRMOeg0tApvCni8LkoiEahO+z3TNxfXIVGy890YtWVDvJAl662dVJSJXvMw==", - "peer": true, "requires": { "dequal": "^2.0.3" } }, + "@restart/ui": { + "version": "1.6.6", + "resolved": "https://registry.npmjs.org/@restart/ui/-/ui-1.6.6.tgz", + "integrity": "sha512-eC3puKuWE1SRYbojWHXnvCNHGgf3uzHCb6JOhnF4OXPibOIPEkR1sqDSkL643ydigxwh+ruCa1CmYHlzk7ikKA==", + "requires": { + "@babel/runtime": "^7.21.0", + "@popperjs/core": "^2.11.6", + "@react-aria/ssr": "^3.5.0", + "@restart/hooks": "^0.4.9", + "@types/warning": "^3.0.0", + "dequal": "^2.0.3", + "dom-helpers": "^5.2.0", + "uncontrollable": "^8.0.1", + "warning": "^4.0.3" + }, + "dependencies": { + "uncontrollable": { + "version": "8.0.4", + "resolved": "https://registry.npmjs.org/uncontrollable/-/uncontrollable-8.0.4.tgz", + "integrity": "sha512-ulRWYWHvscPFc0QQXvyJjY6LIXU56f0h8pQFvhxiKk5V1fcI8gp9Ht9leVAhrVjzqMw0BgjspBINx9r6oyJUvQ==", + "requires": {} + } + } + }, "@rjsf/bootstrap-4": { "version": "5.12.1", "resolved": "https://registry.npmjs.org/@rjsf/bootstrap-4/-/bootstrap-4-5.12.1.tgz", @@ -21032,6 +21084,14 @@ "loader-utils": "^2.0.0" } }, + "@swc/helpers": { + "version": "0.5.2", + "resolved": "https://registry.npmjs.org/@swc/helpers/-/helpers-0.5.2.tgz", + "integrity": "sha512-E4KcWTpoLHqwPHLxidpOqQbcrZVgi0rsmmZXUle1jXmJfuIf/UWpczUJ7MZZ5tlxytgJXyp0w4PGkkeLiuIdZw==", + "requires": { + "tslib": "^2.4.0" + } + }, "@tootallnate/once": { "version": "1.1.2", "dev": true @@ -21170,12 +21230,6 @@ "@types/node": "*" } }, - "@types/invariant": { - "version": "2.2.35", - "resolved": "https://registry.npmjs.org/@types/invariant/-/invariant-2.2.35.tgz", - "integrity": "sha512-DxX1V9P8zdJPYQat1gHyY0xj3efl8gnMVjiM9iCY6y27lj+PoQWkgjt8jDqmovPqULkKVpKRg8J36iQiA+EtEg==", - "peer": true - }, "@types/istanbul-lib-coverage": { "version": "2.0.4", "dev": true @@ -21273,7 +21327,9 @@ } }, "@types/react-transition-group": { - "version": "4.4.4", + "version": "4.4.6", + "resolved": "https://registry.npmjs.org/@types/react-transition-group/-/react-transition-group-4.4.6.tgz", + "integrity": "sha512-VnCdSxfcm08KjsJVQcfBmhEQAPnLB8G08hAxn39azX1qYBQ/5RVQuoHuKIcfKOdncuaUvEpFKFzEvbtIMsfVew==", "requires": { "@types/react": "*" } @@ -21328,8 +21384,7 @@ "@types/warning": { "version": "3.0.0", "resolved": "https://registry.npmjs.org/@types/warning/-/warning-3.0.0.tgz", - "integrity": "sha512-t/Tvs5qR47OLOr+4E9ckN8AmP2Tf16gWq+/qA4iUGS/OOyHVO8wv2vjJuX8SNOUTJyWb+2t7wJm6cXILFnOROA==", - "peer": true + "integrity": "sha512-t/Tvs5qR47OLOr+4E9ckN8AmP2Tf16gWq+/qA4iUGS/OOyHVO8wv2vjJuX8SNOUTJyWb+2t7wJm6cXILFnOROA==" }, "@types/ws": { "version": "8.5.2", @@ -22584,7 +22639,9 @@ "dev": true }, "classnames": { - "version": "2.3.1" + "version": "2.3.2", + "resolved": "https://registry.npmjs.org/classnames/-/classnames-2.3.2.tgz", + "integrity": "sha512-CSbhY4cFEJRe6/GQzIk5qXZ4Jeg5pcsP7b5peFSDpffpe1cqjASH/n9UTjBwOp6XpMSTwQ8Za2K5V02ueA7Tmw==" }, "clean-css": { "version": "5.2.4", @@ -23174,8 +23231,7 @@ "dequal": { "version": "2.0.3", "resolved": "https://registry.npmjs.org/dequal/-/dequal-2.0.3.tgz", - "integrity": "sha512-0je+qPKHEMohvfRTCEo3CrPG6cAzAYgmzKyxRiYSSDkS6eGJdyVJm7WaYA5ECaAD9wLB2T4EEeymA5aFVcYXCA==", - "peer": true + "integrity": "sha512-0je+qPKHEMohvfRTCEo3CrPG6cAzAYgmzKyxRiYSSDkS6eGJdyVJm7WaYA5ECaAD9wLB2T4EEeymA5aFVcYXCA==" }, "desandro-matches-selector": { "version": "2.0.2" @@ -27917,7 +27973,6 @@ "version": "1.1.1", "resolved": "https://registry.npmjs.org/prop-types-extra/-/prop-types-extra-1.1.1.tgz", "integrity": "sha512-59+AHNnHYCdiC+vMwY52WmvP5dM3QLeoumYuEyceQDi9aEhtwN9zIQ2ZNo25sMyXnbh32h+P1ezDsUpUH3JAew==", - "peer": true, "requires": { "react-is": "^16.3.2", "warning": "^4.0.0" @@ -27926,8 +27981,7 @@ "react-is": { "version": "16.13.1", "resolved": "https://registry.npmjs.org/react-is/-/react-is-16.13.1.tgz", - "integrity": "sha512-24e6ynE2H+OKt4kqsOvNd8kBpV65zoxbA4BVsEOB3ARVWQki/DHzaUoC5KuON/BiccDaCCTZBuOcfZs70kR8bQ==", - "peer": true + "integrity": "sha512-24e6ynE2H+OKt4kqsOvNd8kBpV65zoxbA4BVsEOB3ARVWQki/DHzaUoC5KuON/BiccDaCCTZBuOcfZs70kR8bQ==" } } }, @@ -28048,26 +28102,20 @@ } }, "react-bootstrap": { - "version": "1.6.7", - "resolved": "https://registry.npmjs.org/react-bootstrap/-/react-bootstrap-1.6.7.tgz", - "integrity": "sha512-IzCYXuLSKDEjGFglbFWk0/iHmdhdcJzTmtS6lXxc0kaNFx2PFgrQf5jKnx5sarF2tiXh9Tgx3pSt3pdK7YwkMA==", - "peer": true, - "requires": { - "@babel/runtime": "^7.14.0", - "@restart/context": "^2.1.4", - "@restart/hooks": "^0.4.7", - "@types/invariant": "^2.2.33", - "@types/prop-types": "^15.7.3", - "@types/react": ">=16.14.8", - "@types/react-transition-group": "^4.4.1", - "@types/warning": "^3.0.0", - "classnames": "^2.3.1", + "version": "2.8.0", + "resolved": "https://registry.npmjs.org/react-bootstrap/-/react-bootstrap-2.8.0.tgz", + "integrity": "sha512-e/aNtxl0Z2ozrIaR82jr6Zz7ss9GSoaXpQaxmvtDUsTZIq/XalkduR/ZXP6vbQHz2T4syvjA+4FbtwELxxmpww==", + "requires": { + "@babel/runtime": "^7.21.0", + "@restart/hooks": "^0.4.9", + "@restart/ui": "^1.6.3", + "@types/react-transition-group": "^4.4.5", + "classnames": "^2.3.2", "dom-helpers": "^5.2.1", "invariant": "^2.2.4", - "prop-types": "^15.7.2", + "prop-types": "^15.8.1", "prop-types-extra": "^1.1.0", - "react-overlays": "^5.1.2", - "react-transition-group": "^4.4.1", + "react-transition-group": "^4.4.5", "uncontrollable": "^7.2.1", "warning": "^4.0.3" } @@ -28225,8 +28273,7 @@ "react-lifecycles-compat": { "version": "3.0.4", "resolved": "https://registry.npmjs.org/react-lifecycles-compat/-/react-lifecycles-compat-3.0.4.tgz", - "integrity": "sha512-fBASbA6LnOU9dOU2eW7aQ8xmYBSXUIWr+UmF9b1efZBazGNO+rcXT/icdKnYm2pTwcRylVUYwW7H1PHfLekVzA==", - "peer": true + "integrity": "sha512-fBASbA6LnOU9dOU2eW7aQ8xmYBSXUIWr+UmF9b1efZBazGNO+rcXT/icdKnYm2pTwcRylVUYwW7H1PHfLekVzA==" }, "react-loading-skeleton": { "version": "3.1.0", @@ -28253,22 +28300,6 @@ "integrity": "sha512-NMXGa223OnsrGVp5dJHkuKxQ4czdLmXSp5jSV9OqiCky9LOpPATn3vLldc+q5fK3gKbEHvr7J1u0yhBh/xYkpA==", "requires": {} }, - "react-overlays": { - "version": "5.2.1", - "resolved": "https://registry.npmjs.org/react-overlays/-/react-overlays-5.2.1.tgz", - "integrity": "sha512-GLLSOLWr21CqtJn8geSwQfoJufdt3mfdsnIiQswouuQ2MMPns+ihZklxvsTDKD3cR2tF8ELbi5xUsvqVhR6WvA==", - "peer": true, - "requires": { - "@babel/runtime": "^7.13.8", - "@popperjs/core": "^2.11.6", - "@restart/hooks": "^0.4.7", - "@types/warning": "^3.0.0", - "dom-helpers": "^5.2.0", - "prop-types": "^15.7.2", - "uncontrollable": "^7.2.1", - "warning": "^4.0.3" - } - }, "react-papaparse": { "version": "3.18.2", "requires": { @@ -28456,7 +28487,9 @@ } }, "react-transition-group": { - "version": "4.4.2", + "version": "4.4.5", + "resolved": "https://registry.npmjs.org/react-transition-group/-/react-transition-group-4.4.5.tgz", + "integrity": "sha512-pZcd1MCJoiKiBR2NRxeCRg13uCXbydPnmB4EOeRrY7480qNWO8IIgQG6zlDkm6uRMsURXPuKq0GWtiM59a5Q6g==", "requires": { "@babel/runtime": "^7.5.5", "dom-helpers": "^5.0.1", @@ -29817,7 +29850,9 @@ } }, "tslib": { - "version": "2.3.1" + "version": "2.6.2", + "resolved": "https://registry.npmjs.org/tslib/-/tslib-2.6.2.tgz", + "integrity": "sha512-AEYxH93jGFPn/a2iVAwW87VuUIkR1FVUKB77NwMF7nBTDkDrrT/Hpt/IrCJ0QXhW27jTBDcf5ZY7w6RiqTMw2Q==" }, "tsutils": { "version": "3.21.0", @@ -29885,7 +29920,6 @@ "version": "7.2.1", "resolved": "https://registry.npmjs.org/uncontrollable/-/uncontrollable-7.2.1.tgz", "integrity": "sha512-svtcfoTADIB0nT9nltgjujTi7BzVmwjZClOmskKu/E8FW9BXzg9os8OLr4f8Dlnk0rYWJIWr4wv9eKUXiQvQwQ==", - "peer": true, "requires": { "@babel/runtime": "^7.6.3", "@types/react": ">=16.9.11", diff --git a/package.json b/package.json index 88f3735fcc05..3a1b4acfb7c6 100644 --- a/package.json +++ b/package.json @@ -61,6 +61,7 @@ "prop-types": "^15.7.2", "react": "^17.0.2", "react-app-polyfill": "^2.0.0", + "react-bootstrap": "^2.8.0", "react-copy-to-clipboard": "^5.0.4", "react-data-table-component": "^7.4.5", "react-datepicker": "^4.10.0", From 3b067433e399d00cdb32f5d95c39a98fefdf585c Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Fri, 8 Sep 2023 01:06:37 +0200 Subject: [PATCH 040/158] sharepoint url stuff --- src/views/identity/administration/Users.js | 30 ++++++++++++++++++++++ 1 file changed, 30 insertions(+) diff --git a/src/views/identity/administration/Users.js b/src/views/identity/administration/Users.js index da5db287e270..415274ae6406 100644 --- a/src/views/identity/administration/Users.js +++ b/src/views/identity/administration/Users.js @@ -113,6 +113,21 @@ const Offcanvas = (row, rowIndex, formatExtraData) => { modalUrl: `/api/ExecConvertToSharedMailbox?TenantFilter=${tenant.defaultDomainName}&ID=${row.userPrincipalName}`, modalMessage: 'Are you sure you want to convert this user to a shared mailbox?', }, + { + label: 'Add OneDrive Shortcut', + color: 'info', + modal: true, + modalType: 'POST', + modalBody: { + username: row.userPrincipalName, + userid: row.id, + TenantFilter: tenant.defaultDomainName, + message: row.message, + }, + modalUrl: `/api/ExecOneDriveShortCut`, + modalInput: true, + modalMessage: 'Enter a SharePoint URL to create a OneDrive shortcut for', + }, { label: 'Enable Online Archive', color: 'info', @@ -416,6 +431,21 @@ const Users = (row) => { modalUrl: `/api/ExecRevokeSessions?Enable=true&TenantFilter=!Tenant&ID=!userPrincipalName`, modalMessage: 'Are you sure you want to revoke all sessions for these users?', }, + { + label: 'Create OneDrive Shortcut', + color: 'info', + modal: true, + modalType: 'POST', + modalBody: { + username: '!userPrincipalName', + userid: '!id', + TenantFilter: tenant.defaultDomainName, + }, + modalUrl: `/api/ExecOneDriveShortCut`, + modalInput: true, + modalMessage: + 'Enter a SharePoint URL to create a OneDrive shortcut for and press continue.', + }, { label: 'Set Out of Office', color: 'info', From b0bb32ff353d7c415d6ec275648be2ea3fb7d11f Mon Sep 17 00:00:00 2001 From: John Duprey Date: Thu, 7 Sep 2023 20:00:44 -0400 Subject: [PATCH 041/158] Add stretched-link to collapses --- src/views/cipp/AppApproval.js | 7 ++++++- src/views/cipp/Logs.js | 7 ++++++- src/views/email-exchange/reports/MessageTrace.js | 7 ++++++- src/views/identity/reports/SignIns.js | 7 ++++++- src/views/tenant/administration/GraphExplorer.js | 7 ++++++- src/views/tenant/standards/BPAReportBuilder.js | 9 +++++++-- src/views/tenant/standards/BestPracticeAnalyser.js | 7 ++++++- 7 files changed, 43 insertions(+), 8 deletions(-) diff --git a/src/views/cipp/AppApproval.js b/src/views/cipp/AppApproval.js index 9c957db0707b..4c2752163e6b 100644 --- a/src/views/cipp/AppApproval.js +++ b/src/views/cipp/AppApproval.js @@ -112,7 +112,12 @@ const GraphExplorer = () => { Approval Settings - setVisibleA(!visibleA)}> + setVisibleA(!visibleA)} + > diff --git a/src/views/cipp/Logs.js b/src/views/cipp/Logs.js index e7733a152fff..6371ffef2a45 100644 --- a/src/views/cipp/Logs.js +++ b/src/views/cipp/Logs.js @@ -126,7 +126,12 @@ const Logs = () => { Logbook Settings - setVisibleA(!visibleA)}> + setVisibleA(!visibleA)} + > diff --git a/src/views/email-exchange/reports/MessageTrace.js b/src/views/email-exchange/reports/MessageTrace.js index c3ef99d51d4f..6eab5824f3f6 100644 --- a/src/views/email-exchange/reports/MessageTrace.js +++ b/src/views/email-exchange/reports/MessageTrace.js @@ -95,7 +95,12 @@ const MessageTrace = () => { Message Trace Settings - setVisibleA(!visibleA)}> + setVisibleA(!visibleA)} + > diff --git a/src/views/identity/reports/SignIns.js b/src/views/identity/reports/SignIns.js index 7e6ec7fe2488..926fe7570c9c 100644 --- a/src/views/identity/reports/SignIns.js +++ b/src/views/identity/reports/SignIns.js @@ -129,7 +129,12 @@ const SignInsReport = () => { Sign In log Settings - setVisibleA(!visibleA)}> + setVisibleA(!visibleA)} + > diff --git a/src/views/tenant/administration/GraphExplorer.js b/src/views/tenant/administration/GraphExplorer.js index 55d6c11c7af4..9c02146e679a 100644 --- a/src/views/tenant/administration/GraphExplorer.js +++ b/src/views/tenant/administration/GraphExplorer.js @@ -109,7 +109,12 @@ const GraphExplorer = () => { Report Settings - setVisibleA(!visibleA)}> + setVisibleA(!visibleA)} + > diff --git a/src/views/tenant/standards/BPAReportBuilder.js b/src/views/tenant/standards/BPAReportBuilder.js index 46a4766bd25c..a16ac2ca7a3a 100644 --- a/src/views/tenant/standards/BPAReportBuilder.js +++ b/src/views/tenant/standards/BPAReportBuilder.js @@ -141,7 +141,12 @@ const BPAReportBuilder = () => { Report Settings - setVisibleA(!visibleA)}> + setVisibleA(!visibleA)} + > @@ -174,7 +179,7 @@ const BPAReportBuilder = () => { - + Load Report diff --git a/src/views/tenant/standards/BestPracticeAnalyser.js b/src/views/tenant/standards/BestPracticeAnalyser.js index 025095e1a48c..086e53f2e925 100644 --- a/src/views/tenant/standards/BestPracticeAnalyser.js +++ b/src/views/tenant/standards/BestPracticeAnalyser.js @@ -226,7 +226,12 @@ const BestPracticeAnalyser = () => { Report Settings - setVisibleA(!visibleA)}> + setVisibleA(!visibleA)} + > From 0be3128a13549441a81a3a037c2f66ea9bf8934d Mon Sep 17 00:00:00 2001 From: John Duprey Date: Thu, 7 Sep 2023 20:11:41 -0400 Subject: [PATCH 042/158] Update BPAReportBuilder.js --- src/views/tenant/standards/BPAReportBuilder.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/views/tenant/standards/BPAReportBuilder.js b/src/views/tenant/standards/BPAReportBuilder.js index a16ac2ca7a3a..e837cb8715ce 100644 --- a/src/views/tenant/standards/BPAReportBuilder.js +++ b/src/views/tenant/standards/BPAReportBuilder.js @@ -179,7 +179,7 @@ const BPAReportBuilder = () => { - + Load Report From e6602ed3ea4eb830179d75ea8bafaf1ee68fba90 Mon Sep 17 00:00:00 2001 From: John Duprey Date: Thu, 7 Sep 2023 20:34:06 -0400 Subject: [PATCH 043/158] Fix clickable areas --- src/views/cipp/AppApproval.js | 9 ++++++--- src/views/cipp/Logs.js | 9 ++++++--- src/views/email-exchange/reports/MessageTrace.js | 9 ++++++--- src/views/identity/reports/SignIns.js | 11 +++++++---- src/views/tenant/administration/GraphExplorer.js | 9 ++++++--- src/views/tenant/standards/BPAReportBuilder.js | 9 ++++++--- src/views/tenant/standards/BestPracticeAnalyser.js | 9 ++++++--- 7 files changed, 43 insertions(+), 22 deletions(-) diff --git a/src/views/cipp/AppApproval.js b/src/views/cipp/AppApproval.js index 4c2752163e6b..66d88991a92b 100644 --- a/src/views/cipp/AppApproval.js +++ b/src/views/cipp/AppApproval.js @@ -122,7 +122,10 @@ const GraphExplorer = () => { - + + + + { }} /> - - + +
    diff --git a/src/views/cipp/Logs.js b/src/views/cipp/Logs.js index 6371ffef2a45..b1e93e85d8c8 100644 --- a/src/views/cipp/Logs.js +++ b/src/views/cipp/Logs.js @@ -136,7 +136,10 @@ const Logs = () => {
    - + + + + { }} /> - - + +

    diff --git a/src/views/email-exchange/reports/MessageTrace.js b/src/views/email-exchange/reports/MessageTrace.js index 6eab5824f3f6..253aa6821beb 100644 --- a/src/views/email-exchange/reports/MessageTrace.js +++ b/src/views/email-exchange/reports/MessageTrace.js @@ -105,7 +105,10 @@ const MessageTrace = () => {
    - + + + + { }} /> - - + +

    diff --git a/src/views/identity/reports/SignIns.js b/src/views/identity/reports/SignIns.js index 926fe7570c9c..aea60797072b 100644 --- a/src/views/identity/reports/SignIns.js +++ b/src/views/identity/reports/SignIns.js @@ -125,7 +125,7 @@ const SignInsReport = () => { <> - + Sign In log Settings @@ -139,7 +139,10 @@ const SignInsReport = () => { - + + + + { }} /> - - + +
    diff --git a/src/views/tenant/administration/GraphExplorer.js b/src/views/tenant/administration/GraphExplorer.js index 9c02146e679a..4bb325b4f0ff 100644 --- a/src/views/tenant/administration/GraphExplorer.js +++ b/src/views/tenant/administration/GraphExplorer.js @@ -119,7 +119,10 @@ const GraphExplorer = () => { - + + + + { }} /> - - + +

    diff --git a/src/views/tenant/standards/BPAReportBuilder.js b/src/views/tenant/standards/BPAReportBuilder.js index e837cb8715ce..b649a86556d6 100644 --- a/src/views/tenant/standards/BPAReportBuilder.js +++ b/src/views/tenant/standards/BPAReportBuilder.js @@ -151,7 +151,10 @@ const BPAReportBuilder = () => { - + + + + @@ -218,8 +221,8 @@ const BPAReportBuilder = () => { - - + +
    diff --git a/src/views/tenant/standards/BestPracticeAnalyser.js b/src/views/tenant/standards/BestPracticeAnalyser.js index 086e53f2e925..a18f42909746 100644 --- a/src/views/tenant/standards/BestPracticeAnalyser.js +++ b/src/views/tenant/standards/BestPracticeAnalyser.js @@ -236,7 +236,10 @@ const BestPracticeAnalyser = () => { - + + + + { }} /> - - + +
    From 495193468e76ac482c8e9809f5f427a166752a5d Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Fri, 8 Sep 2023 15:41:58 +0200 Subject: [PATCH 044/158] added dropdown to OffCanvas buttons. --- .../utilities/CippActionsOffcanvas.js | 75 +++++++++++++++++-- src/views/identity/administration/Users.js | 8 +- 2 files changed, 76 insertions(+), 7 deletions(-) diff --git a/src/components/utilities/CippActionsOffcanvas.js b/src/components/utilities/CippActionsOffcanvas.js index 1bcf1773251f..371276f49375 100644 --- a/src/components/utilities/CippActionsOffcanvas.js +++ b/src/components/utilities/CippActionsOffcanvas.js @@ -8,6 +8,7 @@ import { CCardText, CCardTitle, CFormInput, + CFormSelect, CListGroup, CListGroupItem, COffcanvasTitle, @@ -20,17 +21,60 @@ import { useLazyGenericGetRequestQuery, useLazyGenericPostRequestQuery } from 's import { Link, useNavigate } from 'react-router-dom' import { stringCamelCase } from 'src/components/utilities/CippCamelCase' import ReactTimeAgo from 'react-time-ago' +import { useEffect } from 'react' +import { useState } from 'react' export default function CippActionsOffcanvas(props) { const inputRef = useRef('') const [genericGetRequest, getResults] = useLazyGenericGetRequestQuery() const [genericPostRequest, postResults] = useLazyGenericPostRequestQuery() + const [getDrowndownInfo, dropDownInfo] = useLazyGenericGetRequestQuery() + const [modalContent, setModalContent] = useState(null) + + useEffect(() => { + if (dropDownInfo.isFetching) { + handleModal( + , + modalContent.modalUrl, + modalContent.modalType, + modalContent.modalBody, + modalContent.modalInput, + modalContent.modalDropdown, + ) + } + if (dropDownInfo.isSuccess) { + handleModal( + modalContent.modalMessage, + modalContent.modalUrl, + modalContent.modalType, + modalContent.modalBody, + modalContent.modalInput, + modalContent.modalDropdown, + ) + } else if (dropDownInfo.isError) { + handleModal( + 'Error connecting to the API.', + modalContent.modalUrl, + modalContent.modalType, + modalContent.modalBody, + modalContent.modalInput, + modalContent.modalDropdown, + ) + } + }, [dropDownInfo]) const handleLink = useNavigate() const handleExternalLink = (link) => { window.open(link, '_blank') } - const handleModal = (modalMessage, modalUrl, modalType = 'GET', modalBody, modalInput) => { + const handleModal = ( + modalMessage, + modalUrl, + modalType = 'GET', + modalBody, + modalInput, + modalDropdown, + ) => { if (modalType === 'GET') { ModalService.confirm({ body: ( @@ -43,6 +87,7 @@ export default function CippActionsOffcanvas(props) { }) } else { ModalService.confirm({ + key: modalContent, body: (
    {modalInput && ( @@ -50,6 +95,19 @@ export default function CippActionsOffcanvas(props) {
    )} + {modalDropdown && ( +
    + {dropDownInfo.isSuccess && ( + ({ + value: data[modalDropdown.valueField], + label: data[modalDropdown.labelField], + }))} + /> + )} +
    + )}
    {modalMessage}
    ), @@ -72,6 +130,7 @@ export default function CippActionsOffcanvas(props) { modalType, modalBody, modalInput, + modalDropdown, ) => { if (link) { if (external) { @@ -80,7 +139,12 @@ export default function CippActionsOffcanvas(props) { handleLink(link) } } else if (modal) { - handleModal(modalMessage, modalUrl, modalType, modalBody, modalInput) + if (modalDropdown) { + getDrowndownInfo({ path: modalDropdown.url }) + } + setModalContent({ modalMessage, modalUrl, modalType, modalBody, modalInput, modalDropdown }) + + handleModal(modalMessage, modalUrl, modalType, modalBody, modalInput, modalDropdown) } } @@ -112,9 +176,7 @@ export default function CippActionsOffcanvas(props) { )) - } catch (error) { - console.error('An error occurred building OCanvas actions' + error.toString()) - } + } catch (error) {} const extendedInfoContent = let actionsContent @@ -134,6 +196,7 @@ export default function CippActionsOffcanvas(props) { action.modalType, action.modalBody, action.modalInput, + action.modalDropdown, ) } key={index} @@ -232,6 +295,7 @@ const CippActionsOffcanvasPropTypes = { modal: PropTypes.bool, modalUrl: PropTypes.string, modalBody: PropTypes.object, + modalDropdown: PropTypes.object, modalType: PropTypes.string, modalInput: PropTypes.bool, modalMessage: PropTypes.string, @@ -252,6 +316,7 @@ const CippActionsOffcanvasPropTypes = { modalType: PropTypes.string, modalInput: PropTypes.bool, modalMessage: PropTypes.string, + modalDropdown: PropTypes.object, external: PropTypes.bool, }), ), diff --git a/src/views/identity/administration/Users.js b/src/views/identity/administration/Users.js index 415274ae6406..4dac8d415cf2 100644 --- a/src/views/identity/administration/Users.js +++ b/src/views/identity/administration/Users.js @@ -125,8 +125,12 @@ const Offcanvas = (row, rowIndex, formatExtraData) => { message: row.message, }, modalUrl: `/api/ExecOneDriveShortCut`, - modalInput: true, - modalMessage: 'Enter a SharePoint URL to create a OneDrive shortcut for', + modalDropdown: { + url: `/api/listSites?TenantFilter=${tenant.defaultDomainName}&type=SharePointSiteUsage`, + labelField: 'URL', + valueField: 'URL', + }, + modalMessage: 'Select the sharepoint site to create a shortcut for', }, { label: 'Enable Online Archive', From 817eaf67d29028bb2fd5174f4542ffa267e2694f Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Fri, 8 Sep 2023 16:00:37 +0200 Subject: [PATCH 045/158] added dropdown to other locations too --- src/components/tables/CippTable.js | 210 ++++++++++++++------- src/views/identity/administration/Users.js | 8 +- 2 files changed, 146 insertions(+), 72 deletions(-) diff --git a/src/components/tables/CippTable.js b/src/components/tables/CippTable.js index 4cdad5b0c56f..fa11d257ea78 100644 --- a/src/components/tables/CippTable.js +++ b/src/components/tables/CippTable.js @@ -14,6 +14,7 @@ import { CModalBody, CModalTitle, CCallout, + CFormSelect, } from '@coreui/react' import DataTable, { createTheme } from 'react-data-table-component' import PropTypes from 'prop-types' @@ -24,6 +25,7 @@ import { cellGenericFormatter } from './CellGenericFormat' import { ModalService } from '../utilities' import { useLazyGenericGetRequestQuery, useLazyGenericPostRequestQuery } from 'src/store/api/app' import { ConfirmModal } from '../utilities/SharedModal' +import { useState } from 'react' const FilterComponent = ({ filterText, @@ -156,6 +158,40 @@ export default function CippTable({ const [selectedRows, setSelectedRows] = React.useState(false) const [genericGetRequest, getResults] = useLazyGenericGetRequestQuery() const [genericPostRequest, postResults] = useLazyGenericPostRequestQuery() + const [getDrowndownInfo, dropDownInfo] = useLazyGenericGetRequestQuery() + const [modalContent, setModalContent] = useState(null) + useEffect(() => { + if (dropDownInfo.isFetching) { + handleModal( + , + modalContent.item.modalUrl, + modalContent.item.modalType, + modalContent.item.modalBody, + modalContent.item.modalInput, + modalContent.item.modalDropdown, + ) + } + if (dropDownInfo.isSuccess) { + console.log(modalContent) + handleModal( + modalContent.item.modalMessage, + modalContent.item.modalUrl, + modalContent.item.modalType, + modalContent.item.modalBody, + modalContent.item.modalInput, + modalContent.item.modalDropdown, + ) + } else if (dropDownInfo.isError) { + handleModal( + 'Error connecting to the API.', + modalContent.item.modalUrl, + modalContent.item.modalType, + modalContent.item.modalBody, + modalContent.item.modalInput, + modalContent.item.modalDropdown, + ) + } + }, [dropDownInfo]) const handleSelectedChange = ({ selectedRows }) => { setSelectedRows(selectedRows) if (selectedRows.length < 1) { @@ -229,84 +265,118 @@ export default function CippTable({ }, }, } - const subHeaderComponentMemo = React.useMemo(() => { - const handleClear = () => { - if (filterText) { - setResetPaginationToggle(!resetPaginationToggle) - setFilterText('') - } - } - const handleModal = (modalMessage, modalUrl, modalType = 'GET', modalBody, modalInput) => { - if (modalType === 'GET') { - ModalService.confirm({ - body: ( -
    -
    {modalMessage}
    -
    - ), - title: 'Confirm', - onConfirm: async () => { - const resultsarr = [] - for (const row of selectedRows) { - setLoopRunning(true) - const urlParams = new URLSearchParams(modalUrl.split('?')[1]) - for (let [paramName, paramValue] of urlParams.entries()) { - if (paramValue.startsWith('!')) { - urlParams.set(paramName, row[paramValue.replace('!', '')]) - } + const handleModal = ( + modalMessage, + modalUrl, + modalType = 'GET', + modalBody, + modalInput, + modalDropdown, + ) => { + if (modalType === 'GET') { + ModalService.confirm({ + body: ( +
    +
    {modalMessage}
    +
    + ), + title: 'Confirm', + onConfirm: async () => { + const resultsarr = [] + for (const row of selectedRows) { + setLoopRunning(true) + const urlParams = new URLSearchParams(modalUrl.split('?')[1]) + for (let [paramName, paramValue] of urlParams.entries()) { + if (paramValue.startsWith('!')) { + urlParams.set(paramName, row[paramValue.replace('!', '')]) } - const NewModalUrl = `${modalUrl.split('?')[0]}?${urlParams.toString()}` - const results = await genericGetRequest({ path: NewModalUrl, refreshParam: row.id }) - resultsarr.push(results) - setMassResults(resultsarr) } - setLoopRunning(false) - }, - }) - } else { - ModalService.confirm({ - body: ( -
    - {modalInput && ( -
    - -
    - )} -
    {modalMessage}
    -
    - ), - title: 'Confirm', - onConfirm: async () => { - const resultsarr = [] - for (const row of selectedRows) { - setLoopRunning(true) - const urlParams = new URLSearchParams(modalUrl.split('?')[1]) - for (let [paramName, paramValue] of urlParams.entries()) { - if (paramValue.toString().startsWith('!')) { - urlParams.set(paramName, row[paramValue.replace('!', '')]) - } + const NewModalUrl = `${modalUrl.split('?')[0]}?${urlParams.toString()}` + const results = await genericGetRequest({ path: NewModalUrl, refreshParam: row.id }) + resultsarr.push(results) + setMassResults(resultsarr) + } + setLoopRunning(false) + }, + }) + } else { + ModalService.confirm({ + body: ( +
    + {modalInput && ( +
    + +
    + )} + {modalDropdown && ( +
    + {dropDownInfo.isSuccess && ( + ({ + value: data[modalDropdown.valueField], + label: data[modalDropdown.labelField], + }))} + /> + )} +
    + )} +
    {modalMessage}
    +
    + ), + title: 'Confirm', + onConfirm: async () => { + const resultsarr = [] + for (const row of selectedRows) { + setLoopRunning(true) + const urlParams = new URLSearchParams(modalUrl.split('?')[1]) + for (let [paramName, paramValue] of urlParams.entries()) { + if (paramValue.toString().startsWith('!')) { + urlParams.set(paramName, row[paramValue.replace('!', '')]) } - const newModalBody = {} - for (let [objName, objValue] of Object.entries(modalBody)) { - if (objValue.toString().startsWith('!')) { - newModalBody[objName] = row[objValue.replace('!', '')] - } + } + const newModalBody = {} + for (let [objName, objValue] of Object.entries(modalBody)) { + if (objValue.toString().startsWith('!')) { + newModalBody[objName] = row[objValue.replace('!', '')] } - const NewModalUrl = `${modalUrl.split('?')[0]}?${urlParams.toString()}` - const results = await genericPostRequest({ - path: NewModalUrl, - values: { ...modalBody, ...newModalBody, ...{ input: inputRef.current.value } }, - }) - resultsarr.push(results) - setMassResults(resultsarr) } - setLoopRunning(false) - }, - }) + const NewModalUrl = `${modalUrl.split('?')[0]}?${urlParams.toString()}` + const results = await genericPostRequest({ + path: NewModalUrl, + values: { ...modalBody, ...newModalBody, ...{ input: inputRef.current.value } }, + }) + resultsarr.push(results) + setMassResults(resultsarr) + } + setLoopRunning(false) + }, + }) + } + } + const subHeaderComponentMemo = React.useMemo(() => { + const handleClear = () => { + if (filterText) { + setResetPaginationToggle(!resetPaginationToggle) + setFilterText('') } } + const executeselectedAction = (item) => { - handleModal(item.modalMessage, item.modalUrl, item.modalType, item.modalBody, item.modalInput) + setModalContent({ + item, + }) + if (item.modalDropdown) { + getDrowndownInfo({ path: item.modalDropdown.url }) + } + handleModal( + item.modalMessage, + item.modalUrl, + item.modalType, + item.modalBody, + item.modalInput, + item.modalDropdown, + ) } const defaultActions = [] const dataKeys = () => { diff --git a/src/views/identity/administration/Users.js b/src/views/identity/administration/Users.js index 4dac8d415cf2..4f64168fa419 100644 --- a/src/views/identity/administration/Users.js +++ b/src/views/identity/administration/Users.js @@ -446,9 +446,13 @@ const Users = (row) => { TenantFilter: tenant.defaultDomainName, }, modalUrl: `/api/ExecOneDriveShortCut`, - modalInput: true, modalMessage: - 'Enter a SharePoint URL to create a OneDrive shortcut for and press continue.', + 'Select a SharePoint URL to create a OneDrive shortcut for and press continue.', + modalDropdown: { + url: `/api/listSites?TenantFilter=${tenant.defaultDomainName}&type=SharePointSiteUsage`, + labelField: 'URL', + valueField: 'URL', + }, }, { label: 'Set Out of Office', From 30a4fb3c33d61867a8e2e6af548960407caa7143 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Fri, 8 Sep 2023 16:52:36 +0200 Subject: [PATCH 046/158] latest release --- public/version_latest.txt | 2 +- version_latest.txt | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/public/version_latest.txt b/public/version_latest.txt index 99eba4de9311..ef8d7569d677 100644 --- a/public/version_latest.txt +++ b/public/version_latest.txt @@ -1 +1 @@ -4.1.0 \ No newline at end of file +4.2.0 \ No newline at end of file diff --git a/version_latest.txt b/version_latest.txt index 99eba4de9311..ef8d7569d677 100644 --- a/version_latest.txt +++ b/version_latest.txt @@ -1 +1 @@ -4.1.0 \ No newline at end of file +4.2.0 \ No newline at end of file From 5f3fc7461f5fee8abb6ebc046f6e025cde9890cf Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Fri, 8 Sep 2023 16:58:14 +0200 Subject: [PATCH 047/158] text changes --- src/views/tenant/administration/AlertWizard.js | 10 ++++++++-- src/views/tenant/administration/ListAlertsQueue.js | 5 +++++ 2 files changed, 13 insertions(+), 2 deletions(-) diff --git a/src/views/tenant/administration/AlertWizard.js b/src/views/tenant/administration/AlertWizard.js index 40a310af660d..b0d8a9dbdfbf 100644 --- a/src/views/tenant/administration/AlertWizard.js +++ b/src/views/tenant/administration/AlertWizard.js @@ -95,8 +95,8 @@ const AlertWizard = () => {

    - These alerts will be sent to the user or webhook configured in the CIPP notification - settings menu. + Alerts setup on this page will be sent to webhook configured in CIPPs settings, and be + delivered as messages

    { Microsoft sends them to CIPP. These alerts generate a ticket, email or webhook message per alert, with more information about the alert.

    + +

    + "Alerts setup on this page will be sent to the webhook configured in CIPPs settings, and + be delivered as raw json information. Warning: Teams, Slack, and Discord do not support + receiving raw json messages" +

    { const [ExecuteGetRequest, getResults] = useLazyGenericGetRequestQuery() @@ -75,24 +76,28 @@ const ListAlertsQueue = () => { selector: (row) => row['Expiration'], sortable: true, exportSelector: 'Expiration', + cell: (row) => CellTip(row['Expiration']), }, { name: 'Monitored Resource', selector: (row) => row['Resource'], sortable: true, exportSelector: 'Resource', + cell: (row) => CellTip(row['Resource']), }, { name: 'Monitored Actions', selector: (row) => row['Operations'], sortable: true, exportSelector: 'Operations', + cell: (row) => CellTip(row['Operations']), }, { name: 'Webhook URL', selector: (row) => row['WebhookNotificationUrl'], sortable: true, exportSelector: 'WebhookNotificationUrl', + cell: (row) => CellTip(row['WebhookNotificationUrl']), }, { name: 'Actions', From 81979afe45c1f91d33e7a46c3eef1239882a543d Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Fri, 8 Sep 2023 17:32:58 +0200 Subject: [PATCH 048/158] fixed package --- package-lock.json | 214 ++++++++++++++++++++-------------------------- package.json | 2 +- 2 files changed, 94 insertions(+), 122 deletions(-) diff --git a/package-lock.json b/package-lock.json index 5af2243419af..2db89fb7513f 100644 --- a/package-lock.json +++ b/package-lock.json @@ -42,7 +42,7 @@ "prop-types": "^15.7.2", "react": "^17.0.2", "react-app-polyfill": "^2.0.0", - "react-bootstrap": "^2.8.0", + "react-bootstrap": "^1.6.5", "react-copy-to-clipboard": "^5.0.4", "react-data-table-component": "^7.4.5", "react-datepicker": "^4.10.0", @@ -3191,20 +3191,6 @@ "url": "https://opencollective.com/popperjs" } }, - "node_modules/@react-aria/ssr": { - "version": "3.7.1", - "resolved": "https://registry.npmjs.org/@react-aria/ssr/-/ssr-3.7.1.tgz", - "integrity": "sha512-ovVPSD1WlRpZHt7GI9DqJrWG3OIYS+NXQ9y5HIewMJpSe+jPQmMQfyRmgX4EnvmxSlp0u04Wg/7oItcoSIb/RA==", - "dependencies": { - "@swc/helpers": "^0.5.0" - }, - "engines": { - "node": ">= 12" - }, - "peerDependencies": { - "react": "^16.8.0 || ^17.0.0-rc.1 || ^18.0.0" - } - }, "node_modules/@react-icons/all-files": { "version": "4.1.0", "resolved": "https://registry.npmjs.org/@react-icons/all-files/-/all-files-4.1.0.tgz", @@ -3242,6 +3228,14 @@ "@babel/runtime": "^7.9.2" } }, + "node_modules/@restart/context": { + "version": "2.1.4", + "resolved": "https://registry.npmjs.org/@restart/context/-/context-2.1.4.tgz", + "integrity": "sha512-INJYZQJP7g+IoDUh/475NlGiTeMfwTXUEr3tmRneckHIxNolGOW9CTq83S8cxq0CgJwwcMzMJFchxvlwe7Rk8Q==", + "peerDependencies": { + "react": ">=16.3.2" + } + }, "node_modules/@restart/hooks": { "version": "0.4.11", "resolved": "https://registry.npmjs.org/@restart/hooks/-/hooks-0.4.11.tgz", @@ -3253,34 +3247,6 @@ "react": ">=16.8.0" } }, - "node_modules/@restart/ui": { - "version": "1.6.6", - "resolved": "https://registry.npmjs.org/@restart/ui/-/ui-1.6.6.tgz", - "integrity": "sha512-eC3puKuWE1SRYbojWHXnvCNHGgf3uzHCb6JOhnF4OXPibOIPEkR1sqDSkL643ydigxwh+ruCa1CmYHlzk7ikKA==", - "dependencies": { - "@babel/runtime": "^7.21.0", - "@popperjs/core": "^2.11.6", - "@react-aria/ssr": "^3.5.0", - "@restart/hooks": "^0.4.9", - "@types/warning": "^3.0.0", - "dequal": "^2.0.3", - "dom-helpers": "^5.2.0", - "uncontrollable": "^8.0.1", - "warning": "^4.0.3" - }, - "peerDependencies": { - "react": ">=16.14.0", - "react-dom": ">=16.14.0" - } - }, - "node_modules/@restart/ui/node_modules/uncontrollable": { - "version": "8.0.4", - "resolved": "https://registry.npmjs.org/uncontrollable/-/uncontrollable-8.0.4.tgz", - "integrity": "sha512-ulRWYWHvscPFc0QQXvyJjY6LIXU56f0h8pQFvhxiKk5V1fcI8gp9Ht9leVAhrVjzqMw0BgjspBINx9r6oyJUvQ==", - "peerDependencies": { - "react": ">=16.14.0" - } - }, "node_modules/@rjsf/bootstrap-4": { "version": "5.12.1", "resolved": "https://registry.npmjs.org/@rjsf/bootstrap-4/-/bootstrap-4-5.12.1.tgz", @@ -3690,14 +3656,6 @@ "url": "https://github.com/sponsors/gregberge" } }, - "node_modules/@swc/helpers": { - "version": "0.5.2", - "resolved": "https://registry.npmjs.org/@swc/helpers/-/helpers-0.5.2.tgz", - "integrity": "sha512-E4KcWTpoLHqwPHLxidpOqQbcrZVgi0rsmmZXUle1jXmJfuIf/UWpczUJ7MZZ5tlxytgJXyp0w4PGkkeLiuIdZw==", - "dependencies": { - "tslib": "^2.4.0" - } - }, "node_modules/@tootallnate/once": { "version": "1.1.2", "dev": true, @@ -3862,6 +3820,11 @@ "@types/node": "*" } }, + "node_modules/@types/invariant": { + "version": "2.2.35", + "resolved": "https://registry.npmjs.org/@types/invariant/-/invariant-2.2.35.tgz", + "integrity": "sha512-DxX1V9P8zdJPYQat1gHyY0xj3efl8gnMVjiM9iCY6y27lj+PoQWkgjt8jDqmovPqULkKVpKRg8J36iQiA+EtEg==" + }, "node_modules/@types/istanbul-lib-coverage": { "version": "2.0.4", "dev": true, @@ -14966,32 +14929,31 @@ } }, "node_modules/react-bootstrap": { - "version": "2.8.0", - "resolved": "https://registry.npmjs.org/react-bootstrap/-/react-bootstrap-2.8.0.tgz", - "integrity": "sha512-e/aNtxl0Z2ozrIaR82jr6Zz7ss9GSoaXpQaxmvtDUsTZIq/XalkduR/ZXP6vbQHz2T4syvjA+4FbtwELxxmpww==", - "dependencies": { - "@babel/runtime": "^7.21.0", - "@restart/hooks": "^0.4.9", - "@restart/ui": "^1.6.3", - "@types/react-transition-group": "^4.4.5", - "classnames": "^2.3.2", + "version": "1.6.7", + "resolved": "https://registry.npmjs.org/react-bootstrap/-/react-bootstrap-1.6.7.tgz", + "integrity": "sha512-IzCYXuLSKDEjGFglbFWk0/iHmdhdcJzTmtS6lXxc0kaNFx2PFgrQf5jKnx5sarF2tiXh9Tgx3pSt3pdK7YwkMA==", + "dependencies": { + "@babel/runtime": "^7.14.0", + "@restart/context": "^2.1.4", + "@restart/hooks": "^0.4.7", + "@types/invariant": "^2.2.33", + "@types/prop-types": "^15.7.3", + "@types/react": ">=16.14.8", + "@types/react-transition-group": "^4.4.1", + "@types/warning": "^3.0.0", + "classnames": "^2.3.1", "dom-helpers": "^5.2.1", "invariant": "^2.2.4", - "prop-types": "^15.8.1", + "prop-types": "^15.7.2", "prop-types-extra": "^1.1.0", - "react-transition-group": "^4.4.5", + "react-overlays": "^5.1.2", + "react-transition-group": "^4.4.1", "uncontrollable": "^7.2.1", "warning": "^4.0.3" }, "peerDependencies": { - "@types/react": ">=16.14.8", - "react": ">=16.14.0", - "react-dom": ">=16.14.0" - }, - "peerDependenciesMeta": { - "@types/react": { - "optional": true - } + "react": ">=16.8.0", + "react-dom": ">=16.8.0" } }, "node_modules/react-copy-to-clipboard": { @@ -15275,6 +15237,25 @@ "react-dom": "^15.5.x || ^16.x || ^17.x || ^18.x" } }, + "node_modules/react-overlays": { + "version": "5.2.1", + "resolved": "https://registry.npmjs.org/react-overlays/-/react-overlays-5.2.1.tgz", + "integrity": "sha512-GLLSOLWr21CqtJn8geSwQfoJufdt3mfdsnIiQswouuQ2MMPns+ihZklxvsTDKD3cR2tF8ELbi5xUsvqVhR6WvA==", + "dependencies": { + "@babel/runtime": "^7.13.8", + "@popperjs/core": "^2.11.6", + "@restart/hooks": "^0.4.7", + "@types/warning": "^3.0.0", + "dom-helpers": "^5.2.0", + "prop-types": "^15.7.2", + "uncontrollable": "^7.2.1", + "warning": "^4.0.3" + }, + "peerDependencies": { + "react": ">=16.3.0", + "react-dom": ">=16.3.0" + } + }, "node_modules/react-papaparse": { "version": "3.18.2", "license": "MIT", @@ -20787,14 +20768,6 @@ "resolved": "https://registry.npmjs.org/@popperjs/core/-/core-2.11.8.tgz", "integrity": "sha512-P1st0aksCrn9sGZhp8GMYwBnQsbvAWsZAX44oXNNvLHGqAOcoVxmjZiohstwQ7SqKnbR47akdNi+uleWD8+g6A==" }, - "@react-aria/ssr": { - "version": "3.7.1", - "resolved": "https://registry.npmjs.org/@react-aria/ssr/-/ssr-3.7.1.tgz", - "integrity": "sha512-ovVPSD1WlRpZHt7GI9DqJrWG3OIYS+NXQ9y5HIewMJpSe+jPQmMQfyRmgX4EnvmxSlp0u04Wg/7oItcoSIb/RA==", - "requires": { - "@swc/helpers": "^0.5.0" - } - }, "@react-icons/all-files": { "version": "4.1.0", "resolved": "https://registry.npmjs.org/@react-icons/all-files/-/all-files-4.1.0.tgz", @@ -20818,6 +20791,12 @@ } } }, + "@restart/context": { + "version": "2.1.4", + "resolved": "https://registry.npmjs.org/@restart/context/-/context-2.1.4.tgz", + "integrity": "sha512-INJYZQJP7g+IoDUh/475NlGiTeMfwTXUEr3tmRneckHIxNolGOW9CTq83S8cxq0CgJwwcMzMJFchxvlwe7Rk8Q==", + "requires": {} + }, "@restart/hooks": { "version": "0.4.11", "resolved": "https://registry.npmjs.org/@restart/hooks/-/hooks-0.4.11.tgz", @@ -20826,30 +20805,6 @@ "dequal": "^2.0.3" } }, - "@restart/ui": { - "version": "1.6.6", - "resolved": "https://registry.npmjs.org/@restart/ui/-/ui-1.6.6.tgz", - "integrity": "sha512-eC3puKuWE1SRYbojWHXnvCNHGgf3uzHCb6JOhnF4OXPibOIPEkR1sqDSkL643ydigxwh+ruCa1CmYHlzk7ikKA==", - "requires": { - "@babel/runtime": "^7.21.0", - "@popperjs/core": "^2.11.6", - "@react-aria/ssr": "^3.5.0", - "@restart/hooks": "^0.4.9", - "@types/warning": "^3.0.0", - "dequal": "^2.0.3", - "dom-helpers": "^5.2.0", - "uncontrollable": "^8.0.1", - "warning": "^4.0.3" - }, - "dependencies": { - "uncontrollable": { - "version": "8.0.4", - "resolved": "https://registry.npmjs.org/uncontrollable/-/uncontrollable-8.0.4.tgz", - "integrity": "sha512-ulRWYWHvscPFc0QQXvyJjY6LIXU56f0h8pQFvhxiKk5V1fcI8gp9Ht9leVAhrVjzqMw0BgjspBINx9r6oyJUvQ==", - "requires": {} - } - } - }, "@rjsf/bootstrap-4": { "version": "5.12.1", "resolved": "https://registry.npmjs.org/@rjsf/bootstrap-4/-/bootstrap-4-5.12.1.tgz", @@ -21084,14 +21039,6 @@ "loader-utils": "^2.0.0" } }, - "@swc/helpers": { - "version": "0.5.2", - "resolved": "https://registry.npmjs.org/@swc/helpers/-/helpers-0.5.2.tgz", - "integrity": "sha512-E4KcWTpoLHqwPHLxidpOqQbcrZVgi0rsmmZXUle1jXmJfuIf/UWpczUJ7MZZ5tlxytgJXyp0w4PGkkeLiuIdZw==", - "requires": { - "tslib": "^2.4.0" - } - }, "@tootallnate/once": { "version": "1.1.2", "dev": true @@ -21230,6 +21177,11 @@ "@types/node": "*" } }, + "@types/invariant": { + "version": "2.2.35", + "resolved": "https://registry.npmjs.org/@types/invariant/-/invariant-2.2.35.tgz", + "integrity": "sha512-DxX1V9P8zdJPYQat1gHyY0xj3efl8gnMVjiM9iCY6y27lj+PoQWkgjt8jDqmovPqULkKVpKRg8J36iQiA+EtEg==" + }, "@types/istanbul-lib-coverage": { "version": "2.0.4", "dev": true @@ -28102,20 +28054,25 @@ } }, "react-bootstrap": { - "version": "2.8.0", - "resolved": "https://registry.npmjs.org/react-bootstrap/-/react-bootstrap-2.8.0.tgz", - "integrity": "sha512-e/aNtxl0Z2ozrIaR82jr6Zz7ss9GSoaXpQaxmvtDUsTZIq/XalkduR/ZXP6vbQHz2T4syvjA+4FbtwELxxmpww==", - "requires": { - "@babel/runtime": "^7.21.0", - "@restart/hooks": "^0.4.9", - "@restart/ui": "^1.6.3", - "@types/react-transition-group": "^4.4.5", - "classnames": "^2.3.2", + "version": "1.6.7", + "resolved": "https://registry.npmjs.org/react-bootstrap/-/react-bootstrap-1.6.7.tgz", + "integrity": "sha512-IzCYXuLSKDEjGFglbFWk0/iHmdhdcJzTmtS6lXxc0kaNFx2PFgrQf5jKnx5sarF2tiXh9Tgx3pSt3pdK7YwkMA==", + "requires": { + "@babel/runtime": "^7.14.0", + "@restart/context": "^2.1.4", + "@restart/hooks": "^0.4.7", + "@types/invariant": "^2.2.33", + "@types/prop-types": "^15.7.3", + "@types/react": ">=16.14.8", + "@types/react-transition-group": "^4.4.1", + "@types/warning": "^3.0.0", + "classnames": "^2.3.1", "dom-helpers": "^5.2.1", "invariant": "^2.2.4", - "prop-types": "^15.8.1", + "prop-types": "^15.7.2", "prop-types-extra": "^1.1.0", - "react-transition-group": "^4.4.5", + "react-overlays": "^5.1.2", + "react-transition-group": "^4.4.1", "uncontrollable": "^7.2.1", "warning": "^4.0.3" } @@ -28300,6 +28257,21 @@ "integrity": "sha512-NMXGa223OnsrGVp5dJHkuKxQ4czdLmXSp5jSV9OqiCky9LOpPATn3vLldc+q5fK3gKbEHvr7J1u0yhBh/xYkpA==", "requires": {} }, + "react-overlays": { + "version": "5.2.1", + "resolved": "https://registry.npmjs.org/react-overlays/-/react-overlays-5.2.1.tgz", + "integrity": "sha512-GLLSOLWr21CqtJn8geSwQfoJufdt3mfdsnIiQswouuQ2MMPns+ihZklxvsTDKD3cR2tF8ELbi5xUsvqVhR6WvA==", + "requires": { + "@babel/runtime": "^7.13.8", + "@popperjs/core": "^2.11.6", + "@restart/hooks": "^0.4.7", + "@types/warning": "^3.0.0", + "dom-helpers": "^5.2.0", + "prop-types": "^15.7.2", + "uncontrollable": "^7.2.1", + "warning": "^4.0.3" + } + }, "react-papaparse": { "version": "3.18.2", "requires": { diff --git a/package.json b/package.json index 3a1b4acfb7c6..9d1cc1f15d02 100644 --- a/package.json +++ b/package.json @@ -61,7 +61,7 @@ "prop-types": "^15.7.2", "react": "^17.0.2", "react-app-polyfill": "^2.0.0", - "react-bootstrap": "^2.8.0", + "react-bootstrap": "^1.6.5", "react-copy-to-clipboard": "^5.0.4", "react-data-table-component": "^7.4.5", "react-datepicker": "^4.10.0", From e897c6bc22888cf6c7f9a7b7524db2cfca3f39bb Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Fri, 8 Sep 2023 18:51:26 +0200 Subject: [PATCH 049/158] fix fuzzy search? --- src/components/utilities/CippFuzzySearch.js | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/src/components/utilities/CippFuzzySearch.js b/src/components/utilities/CippFuzzySearch.js index f4db1f1473cb..a97625dcd818 100644 --- a/src/components/utilities/CippFuzzySearch.js +++ b/src/components/utilities/CippFuzzySearch.js @@ -7,10 +7,13 @@ function _interopRequireDefault(obj) { function CippfuzzySearch(options) { var fuse = new _fuse['default'](options, { keys: ['name', 'groupName', 'items.name'], - threshold: 0.2, + threshold: 0.5, location: 0, ignoreLocation: true, useExtendedSearch: true, + includeMatches: true, + includeScore: true, + useExtendedSearch: true, }) return function (value) { if (!value.length) { From 98565c6504d3cbb88f9a11ae62f435871e7e6673 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Fri, 8 Sep 2023 18:55:14 +0200 Subject: [PATCH 050/158] fix weird bug --- public/version_latest.txt | 2 +- version_latest.txt | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/public/version_latest.txt b/public/version_latest.txt index ef8d7569d677..d87edbfc1069 100644 --- a/public/version_latest.txt +++ b/public/version_latest.txt @@ -1 +1 @@ -4.2.0 \ No newline at end of file +4.2.1 \ No newline at end of file diff --git a/version_latest.txt b/version_latest.txt index ef8d7569d677..d87edbfc1069 100644 --- a/version_latest.txt +++ b/version_latest.txt @@ -1 +1 @@ -4.2.0 \ No newline at end of file +4.2.1 \ No newline at end of file From 927cf00cc6f85f8ed3fc95c6a8b5417ff367e603 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Sat, 9 Sep 2023 00:41:45 +0200 Subject: [PATCH 051/158] remove duplicate --- src/components/utilities/CippFuzzySearch.js | 1 - 1 file changed, 1 deletion(-) diff --git a/src/components/utilities/CippFuzzySearch.js b/src/components/utilities/CippFuzzySearch.js index a97625dcd818..43021b80014e 100644 --- a/src/components/utilities/CippFuzzySearch.js +++ b/src/components/utilities/CippFuzzySearch.js @@ -13,7 +13,6 @@ function CippfuzzySearch(options) { useExtendedSearch: true, includeMatches: true, includeScore: true, - useExtendedSearch: true, }) return function (value) { if (!value.length) { From f529c982149ec35e0271b7f63f1709e4462b733a Mon Sep 17 00:00:00 2001 From: lwhitelock <79275328+lwhitelock@users.noreply.github.com> Date: Sat, 9 Sep 2023 10:07:17 +0100 Subject: [PATCH 052/158] Refactor to support new extensions in the future This refactors the frontend code to allow support for additional extension mappings in the future. --- src/views/cipp/CIPPSettings.js | 37 ++++++++++++++++++---------------- 1 file changed, 20 insertions(+), 17 deletions(-) diff --git a/src/views/cipp/CIPPSettings.js b/src/views/cipp/CIPPSettings.js index 09d06f708953..9f72a84401e9 100644 --- a/src/views/cipp/CIPPSettings.js +++ b/src/views/cipp/CIPPSettings.js @@ -1576,12 +1576,12 @@ const ExtensionsTab = () => { } const MappingsTab = () => { - const [listBackend, listBackendResult] = useLazyGenericGetRequestQuery() - const [setExtensionconfig, extensionConfigResult] = useLazyGenericPostRequestQuery() + const [listHaloBackend, listBackendHaloResult] = useLazyGenericGetRequestQuery() + const [setHaloExtensionconfig, extensionHaloConfigResult] = useLazyGenericPostRequestQuery() - const onSubmit = (values) => { - setExtensionconfig({ - path: 'api/ExecExtensionMapping?AddMapping=true', + const onHaloSubmit = (values) => { + setHaloExtensionconfig({ + path: 'api/ExecExtensionMapping?AddMapping=Halo', values: { mappings: values }, }) } @@ -1590,44 +1590,47 @@ const MappingsTab = () => { {listBackendResult.isUninitialized && listBackend({ path: 'api/ExecExtensionMapping?List=true' })} <> - + HaloPSA Mapping Table - {listBackendResult.isFetching ? ( + {listBackendHaloResult.isFetching ? ( ) : ( { return ( Use the table below to map your client to the correct PSA client - {listBackendResult.isSuccess && - listBackendResult.data.Tenants.map((tenant) => ( + {listBackendHaloResult.isSuccess && + listBackendHaloResult.data.Tenants.map((tenant) => ( ))} - {extensionConfigResult.isFetching && ( + {extensionHaloConfigResult.isFetching && ( )} Set Mappings - {(extensionConfigResult.isSuccess || extensionConfigResult.isError) && ( - - {extensionConfigResult.isSuccess - ? extensionConfigResult.data.Results + {(extensionHaloConfigResult.isSuccess || + extensionHaloConfigResult.isError) && ( + + {extensionHaloConfigResult.isSuccess + ? extensionHaloConfigResult.data.Results : 'Error'} )} From 2812f32d6cb317d31949b63268bcf0a5b194bf17 Mon Sep 17 00:00:00 2001 From: rvdwegen Date: Tue, 12 Sep 2023 23:48:26 +0200 Subject: [PATCH 053/158] Make user count cards on dashboard interactable --- src/views/home/Home.js | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) diff --git a/src/views/home/Home.js b/src/views/home/Home.js index e3025e587fda..10cf1a03c502 100644 --- a/src/views/home/Home.js +++ b/src/views/home/Home.js @@ -143,6 +143,10 @@ const Home = () => { +
    {issuccessUserCounts && !isFetchingUserCount ? dashboard?.Users : }
    @@ -150,6 +154,14 @@ const Home = () => {
    +
    {issuccessUserCounts && !isFetchingUserCount ? dashboard?.LicUsers : }
    @@ -157,6 +169,15 @@ const Home = () => {
    +
    {issuccessUserCounts && !isFetchingUserCount ? dashboard?.Gas : }
    @@ -164,6 +185,14 @@ const Home = () => {
    +
    {issuccessUserCounts && !isFetchingUserCount ? dashboard?.Guests : }
    From 53c9fd2ca068de94fbe0da92d48045256f3cea5e Mon Sep 17 00:00:00 2001 From: lwhitelock <79275328+lwhitelock@users.noreply.github.com> Date: Thu, 14 Sep 2023 08:06:55 +0100 Subject: [PATCH 054/158] Fix load Halo Backend Result Fixed renaming a function that was missed. --- src/views/cipp/CIPPSettings.js | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/views/cipp/CIPPSettings.js b/src/views/cipp/CIPPSettings.js index 9f72a84401e9..fe54e4805cc2 100644 --- a/src/views/cipp/CIPPSettings.js +++ b/src/views/cipp/CIPPSettings.js @@ -1587,8 +1587,8 @@ const MappingsTab = () => { } return (
    - {listBackendResult.isUninitialized && - listBackend({ path: 'api/ExecExtensionMapping?List=true' })} + {listBackendHaloResult.isUninitialized && + listHaloBackend({ path: 'api/ExecExtensionMapping?List=Halo' })} <> From 2c19f8cab209e755a9feee8571e87bde6d6ba5d2 Mon Sep 17 00:00:00 2001 From: BNWEIN Date: Wed, 20 Sep 2023 12:42:30 +0100 Subject: [PATCH 055/158] Added Username to top of the BEC page BEC Page did not show what user it was running on. Added that information --- src/views/identity/administration/Users.js | 2 +- src/views/identity/administration/ViewBEC.js | 5 +++-- 2 files changed, 4 insertions(+), 3 deletions(-) diff --git a/src/views/identity/administration/Users.js b/src/views/identity/administration/Users.js index 4f64168fa419..928853445e6a 100644 --- a/src/views/identity/administration/Users.js +++ b/src/views/identity/administration/Users.js @@ -77,7 +77,7 @@ const Offcanvas = (row, rowIndex, formatExtraData) => { }, { label: 'Research Compromised Account', - link: `/identity/administration/ViewBec?userId=${row.id}&tenantDomain=${tenant.defaultDomainName}`, + link: `/identity/administration/ViewBec?userId=${row.id}&tenantDomain=${tenant.defaultDomainName}&ID=${row.userPrincipalName}`, color: 'info', }, { diff --git a/src/views/identity/administration/ViewBEC.js b/src/views/identity/administration/ViewBEC.js index d97e5639ae5a..bfe147e850cb 100644 --- a/src/views/identity/administration/ViewBEC.js +++ b/src/views/identity/administration/ViewBEC.js @@ -1,5 +1,5 @@ import React, { useEffect } from 'react' -import { CButton, CCallout, CLink } from '@coreui/react' +import { CButton, CCallout, CLink, CCardTitle } from '@coreui/react' import { CCardBody, CSpinner } from '@coreui/react' import { FontAwesomeIcon } from '@fortawesome/react-fontawesome' import { @@ -27,6 +27,7 @@ import useConfirmModal from 'src/hooks/useConfirmModal' const ViewBec = () => { let query = useQuery() const userId = query.get('userId') + const userName = query.get('ID') const tenantDomain = query.get('tenantDomain') const [execBecRemediate, execRemediateResults] = useLazyGenericPostRequestQuery() const [execBecView, results] = useLazyExecBecCheckQuery() @@ -232,7 +233,7 @@ const ViewBec = () => { Business Email Compromise Overview - {userName}} button={ Date: Thu, 21 Sep 2023 20:38:57 +0200 Subject: [PATCH 056/158] Fixed action menu API calls --- src/views/identity/administration/Groups.js | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/src/views/identity/administration/Groups.js b/src/views/identity/administration/Groups.js index 49400c7206d9..5f29ef909853 100644 --- a/src/views/identity/administration/Groups.js +++ b/src/views/identity/administration/Groups.js @@ -161,7 +161,7 @@ const Groups = () => { label: 'Hide from Global Address List', color: 'info', modal: true, - modalUrl: `/api/ExecGroupsHideFromGAL?TenantFilter=${tenant.defaultDomainName}&ID=!mail&GroupType=!calculatedGroupType&HidefromGAL=true`, + modalUrl: `/api/ExecGroupsHideFromGAL?TenantFilter=${tenant.defaultDomainName}&ID=!id&GroupType=!calculatedGroupType&HidefromGAL=true`, modalMessage: 'Are you sure you want to hide this mailbox from the global address list? Remember this will not work if the group is AD Synched.', }, @@ -169,7 +169,7 @@ const Groups = () => { label: 'Unhide from Global Address List', color: 'info', modal: true, - modalUrl: `/api/ExecGroupsHideFromGAL?TenantFilter=${tenant.defaultDomainName}&ID=!mail&GroupType=!calculatedGroupType`, + modalUrl: `/api/ExecGroupsHideFromGAL?TenantFilter=${tenant.defaultDomainName}&ID=!id&GroupType=!calculatedGroupType`, modalMessage: 'Are you sure you want to unhide this mailbox from the global address list? Remember this will not work if the group is AD Synched.', }, @@ -177,7 +177,7 @@ const Groups = () => { label: 'Only allow messages from people inside the organisation', color: 'info', modal: true, - modalUrl: `/api/ExecGroupsDeliveryManagement?TenantFilter=${tenant.defaultDomainName}&ID=!mail&GroupType=!calculatedGroupType&OnlyAllowInternal=true`, + modalUrl: `/api/ExecGroupsDeliveryManagement?TenantFilter=${tenant.defaultDomainName}&ID=!id&GroupType=!calculatedGroupType&OnlyAllowInternal=true`, modalMessage: 'Are you sure you want to only allow messages from people inside the organisation? Remember this will not work if the group is AD Synched.', }, @@ -185,7 +185,7 @@ const Groups = () => { label: 'Allow messages from people inside and outside the organisation', color: 'info', modal: true, - modalUrl: `/api/ExecGroupsDeliveryManagement?TenantFilter=${tenant.defaultDomainName}&ID=!mail&GroupType=!calculatedGroupType`, + modalUrl: `/api/ExecGroupsDeliveryManagement?TenantFilter=${tenant.defaultDomainName}&ID=!id&GroupType=!calculatedGroupType`, modalMessage: 'Are you sure you want to allow messages from people inside and outside the organisation? Remember this will not work if the group is AD Synched.', }, @@ -193,7 +193,7 @@ const Groups = () => { label: 'Delete Group', color: 'warning', modal: true, - modalUrl: `/api/ExecGroupsDelete?TenantFilter=${tenant.defaultDomainName}&ID=!mail&GroupType=!calculatedGroupType&DisplayName=!displayName`, + modalUrl: `/api/ExecGroupsDelete?TenantFilter=${tenant.defaultDomainName}&ID=!id&GroupType=!calculatedGroupType&DisplayName=!displayName`, modalMessage: 'Are you sure you want to delete this group.', }, ], From e3c8737a53ddd746a674650d01f1730d4d442d3b Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Thu, 21 Sep 2023 20:51:49 +0200 Subject: [PATCH 057/158] added automatic help to each page --- src/components/layout/AppHeader.js | 15 +++++++++++++++ 1 file changed, 15 insertions(+) diff --git a/src/components/layout/AppHeader.js b/src/components/layout/AppHeader.js index bfda84ceee1b..0bc158732883 100644 --- a/src/components/layout/AppHeader.js +++ b/src/components/layout/AppHeader.js @@ -11,6 +11,7 @@ import { CHeaderToggler, CImage, CSidebarBrand, + CButton, } from '@coreui/react' import { AppHeaderDropdown, AppHeaderSearch } from 'src/components/header' import { TenantSelector } from '../utilities' @@ -22,8 +23,12 @@ import { faCaretSquareLeft, faCaretSquareRight } from '@fortawesome/free-solid-s import { toggleSidebarShow } from 'src/store/features/app' import { useMediaPredicate } from 'react-media-hook' import { useLoadAlertsDashQuery } from 'src/store/api/app' +import { Link } from 'react-router-dom' +import { useLocation } from 'react-router-dom' + const AppHeader = () => { const dispatch = useDispatch() + const location = useLocation() const sidebarShow = useSelector((state) => state.app.sidebarShow) const currentTheme = useSelector((state) => state.app.currentTheme) const preferredTheme = useMediaPredicate('(prefers-color-scheme: dark)') ? 'impact' : 'cyberdrain' @@ -57,6 +62,16 @@ const AppHeader = () => { + + + + + + + From 1aa388b8c649bc6ecf2f269fbe9bba05c73685e5 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Thu, 21 Sep 2023 22:52:56 +0200 Subject: [PATCH 058/158] fixed mailbox permissions overview --- .../administration/EditMailboxPermissions.js | 952 +++++++++--------- 1 file changed, 459 insertions(+), 493 deletions(-) diff --git a/src/views/email-exchange/administration/EditMailboxPermissions.js b/src/views/email-exchange/administration/EditMailboxPermissions.js index 2841cf1c4d41..b0649954994b 100644 --- a/src/views/email-exchange/administration/EditMailboxPermissions.js +++ b/src/views/email-exchange/administration/EditMailboxPermissions.js @@ -16,7 +16,6 @@ import { CSpinner, } from '@coreui/react' import useQuery from 'src/hooks/useQuery' -import { CippPage, CippPageList, CippMasonry, CippMasonryItem } from 'src/components/layout' import { useDispatch } from 'react-redux' import { Form, Field } from 'react-final-form' import { RFFSelectSearch, RFFCFormSelect, RFFCFormCheck, RFFCFormInput } from 'src/components/forms' @@ -38,38 +37,131 @@ const formatter = (cell, warning = false, reverse = false, colourless = false) = CellBoolean({ cell, warning, reverse, colourless }) const MailboxSettings = () => { + const dispatch = useDispatch() + let query = useQuery() + const userId = query.get('userId') + const tenantDomain = query.get('tenantDomain') const [active, setActive] = useState(1) + const { + data: usercal = {}, + isFetching: usercalIsFetching, + error: usercalError, + } = useListCalendarPermissionsQuery({ tenantDomain, userId }) + const columnsCal = [ + { + name: 'User', + selector: (row) => row['User'], + sortable: true, + wrap: true, + cell: (row) => row['User'], + exportSelector: 'User', + maxWidth: '150px', + }, + { + name: 'AccessRights', + selector: (row) => row['AccessRights'], + sortable: true, + wrap: true, + cell: (row) => row['AccessRights'], + exportSelector: 'AccessRights', + maxWidth: '150px', + }, + { + name: 'Identity', + selector: (row) => row['Identity'], + sortable: true, + wrap: true, + cell: (row) => row['Identity'], + exportSelector: 'Identity', + maxWidth: '150px', + }, + ] + const columns = [ + { + name: 'User', + selector: (row) => row.User, + sortable: true, + wrap: true, + exportSelector: 'User', + }, + { + name: 'Permissions', + selector: (row) => row['Permissions'], + sortable: true, + wrap: true, + exportSelector: 'Permissions', + }, + ] + + const { + data: user = {}, + isFetching: userIsFetching, + error: userError, + } = useListMailboxPermissionsQuery({ tenantDomain, userId }) + return ( - - - - - setActive(1)} href="#"> - Mailbox Permissions - - setActive(2)} href="#"> - Calendar Permissions - - setActive(3)} href="#"> - Mailbox Forwarding - - - - - - - - - - - - - - - - - - + + + + + + setActive(1)} href="#"> + Mailbox Permissions + + setActive(2)} href="#"> + Calendar Permissions + + setActive(3)} href="#"> + Mailbox Forwarding + + + + + + + + + + + + + + + + + + + + + + Account Information - {userId} + + + {active === 1 && ( + <> + {userIsFetching && } + {!userIsFetching && ( + + )} + + )} + {active === 2 && ( + <> + {usercalIsFetching && } + {!usercalIsFetching && ( + + )} + + )} + {active === 3 && ( + <> + + + )} + + + + ) } @@ -86,13 +178,6 @@ const MailboxPermissions = () => { //const [EditMailboxPermission, { error: EditMailboxPermissionError, isFetching: EditMailboxPermissionIsFetching }] = useEditMailboxPermissionMutation() const [genericPostRequest, postResults] = useLazyGenericPostRequestQuery() - const { - data: user = {}, - isFetching: userIsFetching, - error: userError, - refetch: refetchPermissions, - } = useListMailboxPermissionsQuery({ tenantDomain, userId }) - const { data: users = [], isFetching: usersIsFetching, @@ -100,9 +185,6 @@ const MailboxPermissions = () => { } = useListUsersQuery({ tenantDomain }) useEffect(() => { - if (postResults.isSuccess) { - refetchPermissions() - } if (!userId || !tenantDomain) { ModalService.open({ body: 'Error invalid request, could not load requested user.', @@ -112,7 +194,7 @@ const MailboxPermissions = () => { } else { setQueryError(false) } - }, [userId, tenantDomain, dispatch, postResults, refetchPermissions]) + }, [userId, tenantDomain, dispatch, postResults]) const onSubmit = (values) => { const shippedValues = { userid: userId, @@ -128,36 +210,16 @@ const MailboxPermissions = () => { //window.alert(JSON.stringify(shippedValues)) genericPostRequest({ path: '/api/ExecEditMailboxPermissions', values: shippedValues }) } - const initialState = { - ...user, - } - - const columns = [ - { - name: 'User', - selector: (row) => row.User, - sortable: true, - wrap: true, - exportSelector: 'User', - }, - { - name: 'Permissions', - selector: (row) => row['Permissions'], - sortable: true, - wrap: true, - exportSelector: 'Permissions', - }, - ] const formDisabled = queryError === true return ( - + <> {!queryError && ( <> {queryError && ( - + {/* @todo add more descriptive help message here */} Failed to load user @@ -166,203 +228,147 @@ const MailboxPermissions = () => { )} - - - - Account Details - {userId} - - - {usersIsFetching && } - {userError && Error loading user} - {!usersIsFetching && ( - { - return ( - - - - ({ - value: user.mail, - name: `${user.displayName} - ${user.mail} `, - }))} - placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} - name="RemoveFullAccess" - /> - {usersError && Failed to load list of users} - - - ({ - value: user.mail, - name: `${user.displayName} - ${user.mail} `, - }))} - placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} - name="AddFullAccess" - /> - {usersError && Failed to load list of users} - - - ({ - value: user.mail, - name: `${user.displayName} - ${user.mail} `, - }))} - placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} - name="AddFullAccessNoAutoMap" - /> - {usersError && Failed to load list of users} - - - ({ - value: user.mail, - name: `${user.displayName} - ${user.mail} `, - }))} - placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} - name="AddSendAs" - /> - {usersError && Failed to load list of users} - - - ({ - value: user.mail, - name: `${user.displayName} - ${user.mail} `, - }))} - placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} - name="RemoveSendAs" - /> - {usersError && Failed to load list of users} - - - ({ - value: user.mail, - name: `${user.displayName} - ${user.mail} `, - }))} - placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} - name="AddSendOnBehalf" - /> - {usersError && Failed to load list of users} - - - ({ - value: user.mail, - name: `${user.displayName} - ${user.mail} `, - }))} - placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} - name="RemoveSendOnBehalf" - /> - {usersError && Failed to load list of users} - - - - - - Edit User Permissions - {postResults.isFetching && ( - - )} - - - - {postResults.isSuccess && ( - - {postResults.data.Results.map((result, idx) => ( -
  • {result}
  • - ))} -
    + {usersIsFetching && } + {!usersIsFetching && ( + { + return ( + + + + ({ + value: user.mail, + name: `${user.displayName} - ${user.mail} `, + }))} + placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} + name="RemoveFullAccess" + /> + {usersError && Failed to load list of users} + + + ({ + value: user.mail, + name: `${user.displayName} - ${user.mail} `, + }))} + placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} + name="AddFullAccess" + /> + {usersError && Failed to load list of users} + + + ({ + value: user.mail, + name: `${user.displayName} - ${user.mail} `, + }))} + placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} + name="AddFullAccessNoAutoMap" + /> + {usersError && Failed to load list of users} + + + ({ + value: user.mail, + name: `${user.displayName} - ${user.mail} `, + }))} + placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} + name="AddSendAs" + /> + {usersError && Failed to load list of users} + + + ({ + value: user.mail, + name: `${user.displayName} - ${user.mail} `, + }))} + placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} + name="RemoveSendAs" + /> + {usersError && Failed to load list of users} + + + ({ + value: user.mail, + name: `${user.displayName} - ${user.mail} `, + }))} + placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} + name="AddSendOnBehalf" + /> + {usersError && Failed to load list of users} + + + ({ + value: user.mail, + name: `${user.displayName} - ${user.mail} `, + }))} + placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} + name="RemoveSendOnBehalf" + /> + {usersError && Failed to load list of users} + + + + + + Edit User Permissions + {postResults.isFetching && ( + )} - - ) - }} - /> - )} -
    -
    -
    - - - - Account Information - - - {userIsFetching && } - {!userIsFetching && ( - <> - - - )} - - - +
    + + + {postResults.isSuccess && ( + + {postResults.data.Results.map((result, idx) => ( +
  • {result}
  • + ))} +
    + )} + + ) + }} + /> + )} )} -
    + ) } -const columns = [ - { - name: 'User', - selector: (row) => row['User'], - sortable: true, - wrap: true, - cell: (row) => row['User'], - exportSelector: 'User', - maxWidth: '150px', - }, - { - name: 'AccessRights', - selector: (row) => row['AccessRights'], - sortable: true, - wrap: true, - cell: (row) => row['AccessRights'], - exportSelector: 'AccessRights', - maxWidth: '150px', - }, - { - name: 'Identity', - selector: (row) => row['Identity'], - sortable: true, - wrap: true, - cell: (row) => row['Identity'], - exportSelector: 'Identity', - maxWidth: '150px', - }, -] - const CalendarPermissions = () => { const dispatch = useDispatch() let query = useQuery() @@ -419,7 +425,7 @@ const CalendarPermissions = () => { UsersMapped.unshift({ value: 'Default', name: 'Default' }) return ( - + <> {!queryError && ( <> {postResults.isSuccess && ( @@ -436,109 +442,85 @@ const CalendarPermissions = () => { )} - - - - Account Details - - - {userIsFetching && } - {userError && Error loading user} - {!userIsFetching && ( - { - return ( - - - - - {usersError && Failed to load list of users} - - - - {usersError && Failed to load list of users} - - - + {userIsFetching && } + {userError && Error loading user} + {!userIsFetching && ( + { + return ( + + + + + {usersError && Failed to load list of users} + + + + {usersError && Failed to load list of users} + + + + {usersError && Failed to load list of users} + + + + + + Edit Permissions + {postResults.isFetching && ( + - {usersError && Failed to load list of users} - - - - - - Edit Permissions - {postResults.isFetching && ( - - )} - - - - {postResults.isSuccess && ( - {postResults.data?.Results} - )} - - ) - }} - /> - )} - - - - - - - Current Permissions - - - {userIsFetching && } - {!userIsFetching && ( - <> - {user.length > 0 && ( - - )} - - )} - - + )} + + + + {postResults.isSuccess && ( + {postResults.data?.Results} + )} + + ) + }} + /> + )} )} - + ) } @@ -557,7 +539,6 @@ const MailboxForwarding = () => { data: user = {}, isFetching: userIsFetching, error: userError, - refetch: refetchPermissions, } = useListMailboxPermissionsQuery({ tenantDomain, userId }) const { @@ -568,7 +549,6 @@ const MailboxForwarding = () => { useEffect(() => { if (postResults.isSuccess) { - refetchPermissions() } if (!userId || !tenantDomain) { ModalService.open({ @@ -579,7 +559,7 @@ const MailboxForwarding = () => { } else { setQueryError(false) } - }, [userId, tenantDomain, dispatch, postResults, refetchPermissions]) + }, [userId, tenantDomain, dispatch, postResults]) const onSubmit = (values) => { const shippedValues = { userid: userId, @@ -616,7 +596,7 @@ const MailboxForwarding = () => { const formDisabled = queryError === true return ( - + <> {!queryError && ( <> {queryError && ( @@ -630,139 +610,122 @@ const MailboxForwarding = () => { )} - - - - Account Details - {userId} - - - {usersIsFetching && } - {userError && Error loading user} - {!usersIsFetching && ( - { - return ( - - - -
    - -
    - {values.forwardOption === 'internalAddress' && ( - ({ - value: user.mail, - name: `${user.displayName} - ${user.mail} `, - }))} - placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} - name="ForwardInternal" - /> - )} - {usersError && Failed to load list of users} -
    -
    - - -
    - -
    - {values.forwardOption === 'ExternalAddress' && ( - - )} -
    -
    - - -
    - -
    -
    -
    - - - - - Edit Forwarding - {postResults.isFetching && ( - - )} - - - - {postResults.isSuccess && ( - - {postResults.data.Results.map((result, idx) => ( -
  • {result}
  • - ))} -
    + + {usersIsFetching && } + {userError && Error loading user} + {!usersIsFetching && ( + { + return ( + + + +
    + +
    + {values.forwardOption === 'internalAddress' && ( + ({ + value: user.mail, + name: `${user.displayName} - ${user.mail} `, + }))} + placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} + name="ForwardInternal" + /> )} -
    - ) - }} - /> - )} -
    -
    -
    - - - - Account Details - {userId} - - - - - + {usersError && Failed to load list of users} + +
    + + +
    + +
    + {values.forwardOption === 'ExternalAddress' && ( + + )} +
    +
    + + +
    + +
    +
    +
    + + + + + Edit Forwarding + {postResults.isFetching && ( + + )} + + + + {postResults.isSuccess && ( + + {postResults.data.Results.map((result, idx) => ( +
  • {result}
  • + ))} +
    + )} + + ) + }} + /> + )} )} -
    + ) } @@ -784,14 +747,17 @@ const ForwardingSettings = () => { return ( - - {content.map((item, index) => ( -
    -
    {item.heading}
    -

    {item.body}

    -
    - ))} -
    + {isFetching && } + {!isFetching && ( + + {content.map((item, index) => ( +
    +
    {item.heading}
    +

    {item.body}

    +
    + ))} +
    + )}
    ) } From 8849b22cc83a8253a5b120dc1f6613ff8682a2b3 Mon Sep 17 00:00:00 2001 From: John Duprey Date: Thu, 21 Sep 2023 17:23:19 -0400 Subject: [PATCH 059/158] Webhooks - Add Service Principal operations --- src/views/tenant/administration/AlertWizard.js | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/src/views/tenant/administration/AlertWizard.js b/src/views/tenant/administration/AlertWizard.js index b0d8a9dbdfbf..28bf204948d5 100644 --- a/src/views/tenant/administration/AlertWizard.js +++ b/src/views/tenant/administration/AlertWizard.js @@ -222,6 +222,14 @@ const AlertWizard = () => { value: 'UserLoggedIn', name: 'A user has logged in from any location', }, + { + value: 'Add service principal.', + name: 'Enterprise App Added', + }, + { + value: 'Remove service principal.', + name: 'Enterprise App Removed', + }, ]} /> From 8032a4b42f2144cd6033d0e0e2c53af0addc52a8 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Fri, 22 Sep 2023 13:35:25 +0200 Subject: [PATCH 060/158] added "see more" to home --- src/views/home/Home.js | 62 ++++++++++++++++++++++++++---------------- 1 file changed, 39 insertions(+), 23 deletions(-) diff --git a/src/views/home/Home.js b/src/views/home/Home.js index e3025e587fda..5429c137e258 100644 --- a/src/views/home/Home.js +++ b/src/views/home/Home.js @@ -1,4 +1,4 @@ -import React from 'react' +import React, { useState } from 'react' import { faBook, faCog, @@ -16,7 +16,7 @@ import { faUsers, faServer, } from '@fortawesome/free-solid-svg-icons' -import { CCol, CRow } from '@coreui/react' +import { CButton, CCol, CCollapse, CRow } from '@coreui/react' import { useGenericGetRequestQuery } from 'src/store/api/app' import { CippContentCard } from 'src/components/layout' import Skeleton from 'react-loading-skeleton' @@ -30,6 +30,8 @@ import Portals from 'src/data/portals' import { FontAwesomeIcon } from '@fortawesome/react-fontawesome' const Home = () => { + const [visible, setVisible] = useState(false) + const currentTenant = useSelector((state) => state.app.currentTenant) const { data: organization, @@ -62,7 +64,7 @@ const Home = () => { }) const { - data: standards, + data: standards = [], isLoading: isLoadingStandards, isSuccess: issuccessStandards, isFetching: isFetchingStandards, @@ -124,6 +126,21 @@ const Home = () => { icon: faUserFriends, }, ] + + const filteredStandards = standards + .filter( + (p) => p.displayName === 'AllTenants' || p.displayName === currentTenant.defaultDomainName, + ) + .flatMap((tenant) => { + return Object.keys(tenant.standards).map((standard) => { + const standardDisplayname = allStandardsList.filter((p) => p.name.includes(standard)) + return ( +
  • + {standardDisplayname[0]?.label} ({tenant.displayName}) +
  • + ) + }) + }) return ( <> @@ -261,26 +278,25 @@ const Home = () => {

    Applied Standards

    {(isLoadingStandards || isFetchingStandards) && } - {issuccessStandards && - !isFetchingStandards && - standards - .filter( - (p) => - p.displayName == 'AllTenants' || - p.displayName == currentTenant.defaultDomainName, - ) - .flatMap((tenant) => { - return Object.keys(tenant.standards).map((standard) => { - const standardDisplayname = allStandardsList.filter((p) => - p.name.includes(standard), - ) - return ( -
  • - {standardDisplayname[0]?.label} ({tenant.displayName}) -
  • - ) - }) - })} + + {issuccessStandards && !isFetchingStandards && ( + <> + {filteredStandards.slice(0, 5)} + + {filteredStandards.length > 5 && ( + <> + {filteredStandards.slice(5)} + setVisible(!visible)} + > + {visible ? 'See less' : 'See more...'} + + + )} + + )}

    Partner Relationships

    From b4e18a8cba0ae559980b07f3e1b761d8d398e6a0 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Sat, 23 Sep 2023 23:12:44 +0200 Subject: [PATCH 061/158] Fixed refresh issue --- src/views/cipp/CIPPSettings.js | 1 + 1 file changed, 1 insertion(+) diff --git a/src/views/cipp/CIPPSettings.js b/src/views/cipp/CIPPSettings.js index fe54e4805cc2..00deb2d85098 100644 --- a/src/views/cipp/CIPPSettings.js +++ b/src/views/cipp/CIPPSettings.js @@ -1069,6 +1069,7 @@ const NotificationsSettings = () => { true} initialValues={{ ...notificationListResult.data, logsToInclude: notificationListResult.data?.logsToInclude?.map((m) => ({ From 53100dbaf5d3b28cee798120ab700e548cbfe621 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Sat, 23 Sep 2023 23:12:57 +0200 Subject: [PATCH 062/158] add unix time handle --- src/components/tables/CellDate.js | 51 ++++++++++++++----------------- 1 file changed, 23 insertions(+), 28 deletions(-) diff --git a/src/components/tables/CellDate.js b/src/components/tables/CellDate.js index 9806f137c290..04f7bf9c5f3d 100644 --- a/src/components/tables/CellDate.js +++ b/src/components/tables/CellDate.js @@ -4,13 +4,6 @@ import PropTypes from 'prop-types' import { CTooltip } from '@coreui/react' import ReactTimeAgo from 'react-time-ago' -/** - * - * @param format ['short', 'long', 'relative'] - * @param value - * @returns {JSX.Element} - * @constructor - */ export const CellDate = ({ format = 'short', showTime = true, showDate = true, cell }) => { if (!cell || (!showTime && !showDate)) { return
    @@ -21,25 +14,29 @@ export const CellDate = ({ format = 'short', showTime = true, showDate = true, c locale = navigator.language } - // cheatsheet - // https://devhints.io/wip/intl-datetime - const dateTimeArgs = [ - [locale, 'default'], // add fallback option if locale doesn't load properly - ] + // Convert cell value to a number and check if it's a Unix timestamp + const possibleUnixTimestamp = Number(cell) + const isUnixTimestamp = !isNaN(possibleUnixTimestamp) && possibleUnixTimestamp > 1000000000 + let dateObject + + if (isUnixTimestamp) { + dateObject = moment.unix(possibleUnixTimestamp).toDate() + } else { + dateObject = moment(cell).toDate() + } + + const dateTimeArgs = [[locale, 'default']] const dateTimeFormatOptions = {} - if (format == 'relative') { + + if (format === 'relative') { try { - return ( - - - - ) + return } catch (error) { - console.error('Error formatting date, fallback to string value', { date: cell, error }) + console.error('Error formatting date, fallback to string value', { date: dateObject, error }) return ( - -
    {String(cell)}
    + +
    {String(dateObject)}
    ) } @@ -56,16 +53,14 @@ export const CellDate = ({ format = 'short', showTime = true, showDate = true, c let formatted try { - // lots of dates returned are unreliably parsable (e.g. non ISO8601 format) - // fallback using moment to parse into date object - formatted = new Intl.DateTimeFormat(...dateTimeArgs).format(moment(cell).toDate()) + formatted = new Intl.DateTimeFormat(...dateTimeArgs).format(dateObject) } catch (error) { - console.error('Error formatting date, fallback to string value', { date: cell, error }) - formatted = cell + console.error('Error formatting date, fallback to string value', { date: dateObject, error }) + formatted = dateObject.toString() } return ( - +
    {String(formatted)}
    ) @@ -74,7 +69,7 @@ export const CellDate = ({ format = 'short', showTime = true, showDate = true, c CellDate.propTypes = { format: PropTypes.oneOf(['short', 'medium', 'long', 'full', 'relative']), - cell: PropTypes.oneOfType([PropTypes.string, PropTypes.instanceOf(Date)]), + cell: PropTypes.oneOfType([PropTypes.string, PropTypes.number, PropTypes.instanceOf(Date)]), showTime: PropTypes.bool, showDate: PropTypes.bool, } From 4fcc8380e30f8e7b90af4927763ca4d169757284 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Sat, 23 Sep 2023 23:13:12 +0200 Subject: [PATCH 063/158] add text cases for badges --- src/components/tables/CellBadge.js | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) diff --git a/src/components/tables/CellBadge.js b/src/components/tables/CellBadge.js index 5234f65e2fca..26759c874f60 100644 --- a/src/components/tables/CellBadge.js +++ b/src/components/tables/CellBadge.js @@ -3,6 +3,24 @@ import React from 'react' import { CBadge } from '@coreui/react' export const CellBadge = ({ label = '', color = '', children, ...rest }) => { + //Create a case select, and return the color based on the label + switch (label.toLowerCase()) { + case 'planned': + color = 'info' + break + case 'failed': + color = 'danger' + break + case 'completed': + color = 'success' + break + case 'Banned': + color = 'danger' + break + default: + color = 'primary' + } + return ( {label} From 067057dbb9d4b1251097eea4c3e9e8acb1a96434 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Sat, 23 Sep 2023 23:14:20 +0200 Subject: [PATCH 064/158] fix stuff --- src/components/tables/CellBadge.js | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/components/tables/CellBadge.js b/src/components/tables/CellBadge.js index 26759c874f60..ae6b948ce83f 100644 --- a/src/components/tables/CellBadge.js +++ b/src/components/tables/CellBadge.js @@ -14,10 +14,10 @@ export const CellBadge = ({ label = '', color = '', children, ...rest }) => { case 'completed': color = 'success' break - case 'Banned': + case 'banned': color = 'danger' break - default: + case 'running': color = 'primary' } From 6ef5addd9713554e8424804cba41ef42f94e5193 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Sat, 23 Sep 2023 23:16:43 +0200 Subject: [PATCH 065/158] added scheduler --- src/_nav.js | 5 + src/adminRoutes.js | 3 + src/components/utilities/CippCodeOffcanvas.js | 37 +- src/views/cipp/Scheduler.js | 337 ++++++++++++++++++ 4 files changed, 368 insertions(+), 14 deletions(-) create mode 100644 src/views/cipp/Scheduler.js diff --git a/src/_nav.js b/src/_nav.js index 2f8d05e25f85..c243b18c4e12 100644 --- a/src/_nav.js +++ b/src/_nav.js @@ -663,6 +663,11 @@ const _nav = [ name: 'Settings', to: '/cipp/settings', }, + { + component: CNavItem, + name: 'Scheduler', + to: '/cipp/scheduler', + }, { component: CNavItem, name: 'SAM Setup Wizard', diff --git a/src/adminRoutes.js b/src/adminRoutes.js index b57360064384..8b10173655ab 100644 --- a/src/adminRoutes.js +++ b/src/adminRoutes.js @@ -11,12 +11,15 @@ const GDAPRelationships = React.lazy(() => import('./views/tenant/administration/ListGDAPRelationships'), ) const appapproval = React.lazy(() => import('src/views/cipp/AppApproval')) +const Scheduler = React.lazy(() => import('src/views/cipp/Scheduler')) const adminRoutes = [ { path: '/cipp', name: 'CIPP' }, { path: '/cipp/cipp', name: 'CIPP' }, { path: '/cipp/settings', name: 'Settings', component: CIPPSettings }, { path: '/cipp/setup', name: 'Setup', component: Setup }, + { path: '/cipp/scheduler', name: 'Scheduler', component: Scheduler }, + { path: '/tenant/administration/gdap', name: 'GDAP Wizard', component: GDAP }, { path: '/tenant/administration/gdap-invite', name: 'GDAP Invite Wizard', component: GDAPInvite }, { diff --git a/src/components/utilities/CippCodeOffcanvas.js b/src/components/utilities/CippCodeOffcanvas.js index c8cdbf175d35..38a23b81663f 100644 --- a/src/components/utilities/CippCodeOffcanvas.js +++ b/src/components/utilities/CippCodeOffcanvas.js @@ -6,7 +6,14 @@ import { useLazyGenericGetRequestQuery, useLazyGenericPostRequestQuery } from 's import { Editor } from '@monaco-editor/react' import { useSelector } from 'react-redux' -function CippCodeOffCanvas({ row, state, hideFunction, type }) { +function CippCodeOffCanvas({ + row, + state, + hideFunction, + type, + title = 'Template JSON', + hideButton = false, +}) { const [SaveTemplate, templateDetails] = useLazyGenericPostRequestQuery() const currentTheme = useSelector((state) => state.app.currentTheme) const [templateData, setFormData] = useState(row) @@ -23,7 +30,7 @@ function CippCodeOffCanvas({ row, state, hideFunction, type }) { return ( <> - - SaveTemplate({ - path: `/api/ExecEditTemplate?type=${type}`, - method: 'POST', - values: templateData, - }) - } - > - Save changes {templateDetails.isFetching && } - + {!hideButton && ( + + SaveTemplate({ + path: `/api/ExecEditTemplate?type=${type}`, + method: 'POST', + values: templateData, + }) + } + > + Save changes {templateDetails.isFetching && } + + )} {templateDetails.isSuccess && !templateDetails.isFetching && ( diff --git a/src/views/cipp/Scheduler.js b/src/views/cipp/Scheduler.js new file mode 100644 index 000000000000..e0af97bcb8c8 --- /dev/null +++ b/src/views/cipp/Scheduler.js @@ -0,0 +1,337 @@ +import React, { useEffect, useState } from 'react' +import { CButton, CCallout, CCol, CForm, CFormLabel, CRow, CSpinner, CTooltip } from '@coreui/react' +import useQuery from 'src/hooks/useQuery' +import { useDispatch, useSelector } from 'react-redux' +import { Field, Form } from 'react-final-form' +import { + Condition, + RFFCFormCheck, + RFFCFormInput, + RFFCFormSwitch, + RFFCFormTextarea, + RFFSelectSearch, +} from 'src/components/forms' +import countryList from 'src/data/countryList' + +import { useLazyGenericGetRequestQuery, useLazyGenericPostRequestQuery } from 'src/store/api/app' +import { FontAwesomeIcon } from '@fortawesome/react-fontawesome' +import { faCircleNotch, faEdit, faEye } from '@fortawesome/free-solid-svg-icons' +import { CippContentCard, CippPage, CippPageList } from 'src/components/layout' +import { password } from 'src/validators' +import { + CellDate, + CellDelegatedPrivilege, + cellBadgeFormatter, + cellBooleanFormatter, + cellDateFormatter, +} from 'src/components/tables' +import { CellTip, cellGenericFormatter } from 'src/components/tables/CellGenericFormat' +import DatePicker from 'react-datepicker' +import 'react-datepicker/dist/react-datepicker.css' +import TenantListSelector from 'src/components/utilities/TenantListSelector' +import { ModalService, TenantSelector } from 'src/components/utilities' +import CippCodeOffCanvas from 'src/components/utilities/CippCodeOffcanvas' + +const Offcanvas = (row, rowIndex, formatExtraData) => { + const [ExecuteGetRequest, getResults] = useLazyGenericGetRequestQuery() + const [ocVisible, setOCVisible] = useState(false) + + const handleDeleteSchedule = (apiurl, message) => { + ModalService.confirm({ + title: 'Confirm', + body:
    {message}
    , + onConfirm: () => ExecuteGetRequest({ path: apiurl }), + confirmLabel: 'Continue', + cancelLabel: 'Cancel', + }) + } + let jsonResults + try { + jsonResults = JSON.parse(row.Results) + } catch (error) { + jsonResults = row.Results + } + + return ( + <> + + setOCVisible(true)}> + + + + + + handleDeleteSchedule( + `/api/RemoveScheduledItem?&ID=${row.RowKey}`, + 'Do you want to delete this job?', + ) + } + size="sm" + variant="ghost" + color="danger" + > + + + + setOCVisible(false)} + /> + + ) +} + +const Scheduler = () => { + const currentDate = new Date() + const [startDate, setStartDate] = useState(currentDate) + const tenantDomain = useSelector((state) => state.app.currentTenant.defaultDomainName) + const [refreshState, setRefreshState] = useState(false) + const taskName = `Scheduled Task ${currentDate.toLocaleString()}` + + const [genericPostRequest, postResults] = useLazyGenericPostRequestQuery() + const onSubmit = (values) => { + const unixTime = Math.floor(startDate.getTime() / 1000) + const shippedValues = { + TenantFilter: tenantDomain, + Name: values.taskName, + Command: values.command, + Parameters: values.parameters, + ScheduledTime: unixTime, + Recurrence: values.Recurrence, + PostExecution: { + Webhook: values.webhook, + Email: values.email, + PSA: values.psa, + }, + } + genericPostRequest({ path: '/api/AddScheduledItem', values: shippedValues }).then((res) => { + setRefreshState(res.requestId) + console.log(res.requestId) + }) + } + + const columns = [ + { + name: 'Name', + selector: (row) => row['Name'], + sortable: true, + cell: (row) => CellTip(row['Name']), + exportSelector: 'Name', + }, + { + name: 'Tenant', + selector: (row) => row['Tenant'], + sortable: true, + cell: (row) => CellTip(row['Tenant']), + exportSelector: 'Tenant', + }, + { + name: 'Task State', + selector: (row) => row['TaskState'], + sortable: true, + cell: cellBadgeFormatter(), + exportSelector: 'TaskState', + }, + { + name: 'Command', + selector: (row) => row['Command'], + sortable: true, + cell: (row) => CellTip(row['Command']), + exportSelector: 'Command', + }, + { + name: 'Parameters', + selector: (row) => row['Parameters'], + sortable: true, + cell: (row) => CellTip(row['Parameters']), + exportSelector: 'Parameters', + }, + { + name: 'Scheduled Time', + selector: (row) => row['ScheduledTime'], + sortable: true, + cell: cellDateFormatter({ format: 'relative' }), + exportSelector: 'ScheduledTime', + }, + { + name: 'Last executed time', + selector: (row) => row['ExecutedTime'], + sortable: true, + cell: cellDateFormatter({ format: 'relative' }), + exportSelector: 'ExecutedTime', + }, + { + name: 'Recurrence', + selector: (row) => row['Recurrence'], + sortable: true, + cell: (row) => CellTip(row['Recurrence']), + exportSelector: 'Recurrence', + }, + { + name: 'Sending to', + selector: (row) => row['PostExecution'], + sortable: true, + cell: (row) => CellTip(row['PostExecution']), + exportSelector: 'PostExecution', + }, + { + name: 'Actions', + cell: Offcanvas, + maxWidth: '80px', + }, + ] + return ( + + <> + + + + true} + render={({ handleSubmit, submitting, values }) => { + return ( + + + + + {(props) => } + + + + + + + + + + + setStartDate(date)} + /> + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Add Schedule + {postResults.isFetching && ( + + )} + + + + {postResults.isSuccess && ( + +
  • {postResults.data.Results}
  • +
    + )} +
    + ) + }} + /> +
    +
    + + + +
    + +
    + ) +} + +export default Scheduler From 5ea3937738e255c9872c5758893be18630efb57d Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Sun, 24 Sep 2023 02:50:26 +0200 Subject: [PATCH 066/158] added allow initial value for checkboxes so we always send what we need. --- src/components/forms/RFFComponents.js | 3 +- src/views/cipp/Scheduler.js | 73 ++++++++++++++++++++++----- 2 files changed, 61 insertions(+), 15 deletions(-) diff --git a/src/components/forms/RFFComponents.js b/src/components/forms/RFFComponents.js index a360ec2fc49e..9aef7ca81c35 100644 --- a/src/components/forms/RFFComponents.js +++ b/src/components/forms/RFFComponents.js @@ -88,9 +88,10 @@ export const RFFCFormSwitch = ({ className = 'mb-3', validate, disabled = false, + initialValue, }) => { return ( - + {({ meta, input }) => ( { const tenantDomain = useSelector((state) => state.app.currentTenant.defaultDomainName) const [refreshState, setRefreshState] = useState(false) const taskName = `Scheduled Task ${currentDate.toLocaleString()}` - + const { data: availableCommands = [], isLoading: isLoadingcmd } = useGenericGetRequestQuery({ + path: 'api/ListFunctionParameters?Module=CIPPCore', + }) const [genericPostRequest, postResults] = useLazyGenericPostRequestQuery() const onSubmit = (values) => { const unixTime = Math.floor(startDate.getTime() / 1000) @@ -111,7 +118,6 @@ const Scheduler = () => { } genericPostRequest({ path: '/api/AddScheduledItem', values: shippedValues }).then((res) => { setRefreshState(res.requestId) - console.log(res.requestId) }) } @@ -247,22 +253,61 @@ const Scheduler = () => { ({ + value: cmd.Function, + name: cmd.Function, + }))} name="command" - placeholder="Select a command or report to execute." + placeholder={ + isLoadingcmd ? ( + + ) : ( + 'Select a command or report to execute.' + ) + } label="Command to execute" /> - - - + + {(props) => { + const selectedCommand = availableCommands.find( + (cmd) => cmd.Function === props.values.command?.value, + ) + let paramblock = null + if (selectedCommand) { + //if the command parameter type is boolean we use else . + const parameters = selectedCommand.Parameters + if (parameters.length > 0) { + paramblock = parameters.map((param, idx) => ( + + + {param.Type === 'System.Boolean' ? ( + <> + + + + ) : ( + + )} + + + )) + } + } + return paramblock + }} + From d9be03c6642a082013f92496325cdc99b889ede7 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Sun, 24 Sep 2023 17:53:04 +0200 Subject: [PATCH 067/158] add advanced filtering. --- src/components/tables/CippTable.js | 59 ++++++++++++++++++++++++++++-- 1 file changed, 56 insertions(+), 3 deletions(-) diff --git a/src/components/tables/CippTable.js b/src/components/tables/CippTable.js index fa11d257ea78..949bfb167989 100644 --- a/src/components/tables/CippTable.js +++ b/src/components/tables/CippTable.js @@ -199,11 +199,64 @@ export default function CippTable({ } } const [resetPaginationToggle, setResetPaginationToggle] = React.useState(false) - const filteredItems = Array.isArray(data) - ? data.filter( + // Helper function to escape special characters in a string for regex + function escapeRegExp(string) { + return string.replace(/[.*+?^${}()|[\]\\]/g, '\\$&') + } + + const filterData = (data, filterText) => { + if (filterText.startsWith('Complex:')) { + const conditions = filterText.slice(9).split(';') + + return conditions.reduce((filteredData, condition) => { + const match = condition.trim().match(/(\w+)\s*(eq|ne|like|notlike|gt|lt)\s*(.+)/) + + if (!match) { + return filteredData // Keep the current filtered data as is + } + + let [property, operator, value] = match.slice(1) + value = escapeRegExp(value) // Escape special characters + + return filteredData.filter((item) => { + // Find the actual key in the item that matches the property (case insensitive) + const actualKey = Object.keys(item).find( + (key) => key.toLowerCase() === property.toLowerCase(), + ) + + if (!actualKey) { + //set the error message so the user understands the key is not found. + console.error(`FilterError: Property "${property}" not found.`) + return false // Keep the item if the property is not found + } else { + } + + switch (operator) { + case 'eq': + return String(item[actualKey]).toLowerCase() === value.toLowerCase() + case 'ne': + return String(item[actualKey]).toLowerCase() !== value.toLowerCase() + case 'like': + return String(item[actualKey]).toLowerCase().includes(value.toLowerCase()) + case 'notlike': + return !String(item[actualKey]).toLowerCase().includes(value.toLowerCase()) + case 'gt': + return parseFloat(item[actualKey]) > parseFloat(value) + case 'lt': + return parseFloat(item[actualKey]) < parseFloat(value) + default: + return true + } + }) + }, data) + } else { + return data.filter( (item) => JSON.stringify(item).toLowerCase().indexOf(filterText.toLowerCase()) !== -1, ) - : [] + } + } + + const filteredItems = Array.isArray(data) ? filterData(data, filterText) : [] const applyFilter = (e) => { setFilterText(e.target.value) From 56bdd1580c014009f3f513976122163f922dcda4 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Sun, 24 Sep 2023 22:20:57 +0200 Subject: [PATCH 068/158] added exclude onmicrosoft --- src/views/tenant/standards/DomainsAnalyser.js | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/src/views/tenant/standards/DomainsAnalyser.js b/src/views/tenant/standards/DomainsAnalyser.js index 6b8bd505d756..a92501851bec 100644 --- a/src/views/tenant/standards/DomainsAnalyser.js +++ b/src/views/tenant/standards/DomainsAnalyser.js @@ -274,6 +274,12 @@ const DomainsAnalyser = () => { tenantSelector={true} showAllTenantSelector={true} datatable={{ + filterlist: [ + { + filterName: 'Exclude onmicrosoft domains', + filter: 'Complex: domain notlike onmicrosoft', + }, + ], path: `/api/DomainAnalyser_List`, params: { tenantFilter: currentTenant.defaultDomainName }, columns, From 303c3b77a493a1244e3d159682647857b63d6cef Mon Sep 17 00:00:00 2001 From: John Duprey Date: Sun, 24 Sep 2023 18:25:16 -0400 Subject: [PATCH 069/158] Scheduler: Update text and filters --- src/views/cipp/Scheduler.js | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/src/views/cipp/Scheduler.js b/src/views/cipp/Scheduler.js index 6b209b06d58d..8483c2c477b2 100644 --- a/src/views/cipp/Scheduler.js +++ b/src/views/cipp/Scheduler.js @@ -358,17 +358,19 @@ const Scheduler = () => { label: 'Delete task', modal: true, modalUrl: `/api/RemoveScheduledItem?&ID=!RowKey`, - modalMessage: 'Are you sure you want to exclude these tenants?', + modalMessage: 'Do you want to delete this job?', }, ], }, filterlist: [ - { filterName: 'Excluded Tenants', filter: '"Excluded":true' }, - { filterName: 'Included Tenants', filter: '"Excluded":false' }, + { filterName: 'Planned Jobs', filter: 'Complex: TaskState eq Planned' }, + { filterName: 'Completed Jobs', filter: 'Complex: TaskState eq Completed' }, + { filterName: 'Recurring Jobs', filter: 'Complex: Recurrence gt 0' }, + { filterName: 'One-time Jobs', filter: 'Complex: Recurrence eq 0' }, ], keyField: 'id', columns, - reportName: `Tenants-List`, + reportName: `Scheduled-Jobs`, path: `/api/ListScheduledItems?RefreshGuid=${refreshState}`, }} /> From 6924f35956162140f8d19c80187958052ccbba13 Mon Sep 17 00:00:00 2001 From: John Duprey Date: Sun, 24 Sep 2023 22:25:37 -0400 Subject: [PATCH 070/158] CippTable - Graph filter rewrite - Remove graphFilter property from filter lists - Add debounce handler for delayed input changes - Update preset graph filters to new format - Move errors to CCallout and continue to render table --- src/components/tables/CippTable.js | 173 ++++++++---------- src/views/identity/administration/Users.js | 6 +- .../administration/ListEnterpriseApps.js | 8 +- .../administration/ListGDAPRelationships.js | 2 +- 4 files changed, 84 insertions(+), 105 deletions(-) diff --git a/src/components/tables/CippTable.js b/src/components/tables/CippTable.js index 949bfb167989..3bc66a7a0547 100644 --- a/src/components/tables/CippTable.js +++ b/src/components/tables/CippTable.js @@ -1,4 +1,4 @@ -import React, { useRef } from 'react' +import React, { useRef, useMemo, useState } from 'react' import { useSelector } from 'react-redux' import { ExportCsvButton, ExportPDFButton } from 'src/components/buttons' import { @@ -25,16 +25,9 @@ import { cellGenericFormatter } from './CellGenericFormat' import { ModalService } from '../utilities' import { useLazyGenericGetRequestQuery, useLazyGenericPostRequestQuery } from 'src/store/api/app' import { ConfirmModal } from '../utilities/SharedModal' -import { useState } from 'react' +import { debounce } from 'lodash' -const FilterComponent = ({ - filterText, - onFilter, - onClear, - filterlist, - onFilterPreset, - onFilterGraph, -}) => ( +const FilterComponent = ({ filterText, onFilter, onClear, filterlist, onFilterPreset }) => ( <> @@ -50,26 +43,17 @@ const FilterComponent = ({ { onFilterPreset('') - onFilterGraph('') }} > Clear Filter {filterlist && filterlist.map((item, idx) => { - if (item.hasOwnProperty('graphFilter') && item.graphFilter == true) { - return ( - onFilterGraph(item.filter)}> - {item.filterName} - - ) - } else { - return ( - onFilterPreset(item.filter)}> - {item.filterName} - - ) - } + return ( + onFilterPreset(item.filter)}> + {item.filterName} + + ) })} @@ -93,7 +77,6 @@ FilterComponent.propTypes = { onClear: PropTypes.func, filterlist: PropTypes.arrayOf(PropTypes.object), onFilterPreset: PropTypes.func, - onFilterGraph: PropTypes.func, } const customSort = (rows, selector, direction) => { @@ -204,8 +187,23 @@ export default function CippTable({ return string.replace(/[.*+?^${}()|[\]\\]/g, '\\$&') } + const setGraphFilter = (e) => { + if (graphFilterFunction) { + graphFilterFunction(e) + console.log(e) + } + } + + const debounceSetGraphFilter = useMemo(() => { + return debounce(setGraphFilter, 1000) + }, []) + const filterData = (data, filterText) => { - if (filterText.startsWith('Complex:')) { + if (filterText.startsWith('Graph:')) { + var query = filterText.slice(6).trim() + debounceSetGraphFilter(query) + return data + } else if (filterText.startsWith('Complex:')) { const conditions = filterText.slice(9).split(';') return conditions.reduce((filteredData, condition) => { @@ -262,12 +260,6 @@ export default function CippTable({ setFilterText(e.target.value) } - const setGraphFilter = (e) => { - if (graphFilterFunction) { - graphFilterFunction(e) - } - } - useEffect(() => { if (columns !== updatedColumns) { setUpdatedColumns(columns) @@ -592,11 +584,6 @@ export default function CippTable({ onFilter={(e) => setFilterText(e.target.value)} onFilterPreset={(e) => { setFilterText(e) - setGraphFilter('') - }} - onFilterGraph={(e) => { - setFilterText('') - setGraphFilter(e) }} onClear={handleClear} filterText={filterText} @@ -620,65 +607,61 @@ export default function CippTable({ const tablePageSize = useSelector((state) => state.app.tablePageSize) return (
    - {!isFetching && error && Error loading data} - {!error && ( -
    - {(columns.length === updatedColumns.length || !dynamicColumns) && ( - <> - {(massResults.length >= 1 || loopRunning) && ( - - {massResults.map((message, idx) => { - const results = message.data?.Results - const displayResults = Array.isArray(results) ? results.join(', ') : results + {!isFetching && error && Error loading data} +
    + {(columns.length === updatedColumns.length || !dynamicColumns) && ( + <> + {(massResults.length >= 1 || loopRunning) && ( + + {massResults.map((message, idx) => { + const results = message.data?.Results + const displayResults = Array.isArray(results) ? results.join(', ') : results - return
  • {displayResults}
  • - })} - {loopRunning && ( -
  • - -
  • - )} -
    - )} - } - paginationRowsPerPageOptions={[25, 50, 100, 200, 500]} - {...rest} - /> - {selectedRows.length >= 1 && ( - Selected {selectedRows.length} items - )} - - )} -
    - )} + return
  • {displayResults}
  • + })} + {loopRunning && ( +
  • + +
  • + )} +
    + )} + } + paginationRowsPerPageOptions={[25, 50, 100, 200, 500]} + {...rest} + /> + {selectedRows.length >= 1 && Selected {selectedRows.length} items} + + )} +
    ) } diff --git a/src/views/identity/administration/Users.js b/src/views/identity/administration/Users.js index 928853445e6a..bd3df44d1aa4 100644 --- a/src/views/identity/administration/Users.js +++ b/src/views/identity/administration/Users.js @@ -356,13 +356,11 @@ const Users = (row) => { { filterName: 'Users without a license', filter: '"assignedLicenses":[]' }, { filterName: 'Users with a license (Graph)', - filter: 'assignedLicenses/$count ne 0', - graphFilter: true, + filter: 'Graph: assignedLicenses/$count ne 0', }, { filterName: 'Users with a license & Enabled (Graph)', - filter: 'assignedLicenses/$count ne 0 and accountEnabled eq true', - graphFilter: true, + filter: 'Graph: assignedLicenses/$count ne 0 and accountEnabled eq true', }, ], columns, diff --git a/src/views/tenant/administration/ListEnterpriseApps.js b/src/views/tenant/administration/ListEnterpriseApps.js index 8e1a3bfa9b01..d6ae08d59059 100644 --- a/src/views/tenant/administration/ListEnterpriseApps.js +++ b/src/views/tenant/administration/ListEnterpriseApps.js @@ -75,7 +75,6 @@ const EnterpriseApplications = () => { selector: (row) => row.homepage, sortable: true, exportSelector: 'homepage', - cell: cellDateFormatter({ format: 'short' }), }, ] return ( @@ -88,13 +87,12 @@ const EnterpriseApplications = () => { filterlist: [ { filterName: 'All Enterprise Apps', - filter: "tags/any(t:t eq 'WindowsAzureActiveDirectoryIntegratedApp')", - graphFilter: true, + filter: "Graph: tags/any(t:t eq 'WindowsAzureActiveDirectoryIntegratedApp')", }, { filterName: 'Enterprise Apps (SAML)', - filter: "tags/any(t:t eq 'WindowsAzureActiveDirectoryGalleryApplicationPrimaryV1')", - graphFilter: true, + filter: + "Graph: tags/any(t:t eq 'WindowsAzureActiveDirectoryGalleryApplicationPrimaryV1')", }, ], tableProps: { diff --git a/src/views/tenant/administration/ListGDAPRelationships.js b/src/views/tenant/administration/ListGDAPRelationships.js index 8efe4f6795ee..a5703bd84b22 100644 --- a/src/views/tenant/administration/ListGDAPRelationships.js +++ b/src/views/tenant/administration/ListGDAPRelationships.js @@ -68,7 +68,7 @@ const Actions = (row, rowIndex, formatExtraData) => { }) const tenant = useSelector((state) => state.app.currentTenant) - row?.accessDetails.unifiedRoles.map((role) => { + row?.accessDetails?.unifiedRoles?.map((role) => { for (var x = 0; x < GDAPRoles.length; x++) { if (GDAPRoles[x].ObjectId == role.roleDefinitionId) { extendedInfo.push({ From 8fd42f373d638c909f703fdd1ad3ec77aa7900b9 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Mon, 25 Sep 2023 12:31:19 +0200 Subject: [PATCH 071/158] text fix --- src/views/email-exchange/spamfilter/DeploySpamfilter.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/views/email-exchange/spamfilter/DeploySpamfilter.js b/src/views/email-exchange/spamfilter/DeploySpamfilter.js index 8c3a470efb20..f798ebf48003 100644 --- a/src/views/email-exchange/spamfilter/DeploySpamfilter.js +++ b/src/views/email-exchange/spamfilter/DeploySpamfilter.js @@ -140,7 +140,7 @@ const SpamFilterAdd = () => { Date: Mon, 25 Sep 2023 13:34:19 +0200 Subject: [PATCH 072/158] added TableFilter option via url --- src/components/tables/CippTable.js | 24 +++++++++++++++++++++++- 1 file changed, 23 insertions(+), 1 deletion(-) diff --git a/src/components/tables/CippTable.js b/src/components/tables/CippTable.js index 3bc66a7a0547..fc09031e33be 100644 --- a/src/components/tables/CippTable.js +++ b/src/components/tables/CippTable.js @@ -1,4 +1,4 @@ -import React, { useRef, useMemo, useState } from 'react' +import React, { useRef, useMemo, useState, useCallback } from 'react' import { useSelector } from 'react-redux' import { ExportCsvButton, ExportPDFButton } from 'src/components/buttons' import { @@ -26,6 +26,7 @@ import { ModalService } from '../utilities' import { useLazyGenericGetRequestQuery, useLazyGenericPostRequestQuery } from 'src/store/api/app' import { ConfirmModal } from '../utilities/SharedModal' import { debounce } from 'lodash' +import { useSearchParams } from 'react-router-dom' const FilterComponent = ({ filterText, onFilter, onClear, filterlist, onFilterPreset }) => ( <> @@ -137,12 +138,20 @@ export default function CippTable({ const [loopRunning, setLoopRunning] = React.useState(false) const [massResults, setMassResults] = React.useState([]) const [filterText, setFilterText] = React.useState('') + const [filterviaURL, setFilterviaURL] = React.useState(false) const [updatedColumns, setUpdatedColumns] = React.useState(columns) const [selectedRows, setSelectedRows] = React.useState(false) const [genericGetRequest, getResults] = useLazyGenericGetRequestQuery() const [genericPostRequest, postResults] = useLazyGenericPostRequestQuery() const [getDrowndownInfo, dropDownInfo] = useLazyGenericGetRequestQuery() const [modalContent, setModalContent] = useState(null) + //get the search params called "tableFilter" and set the filter to that. + const [searchParams, setSearchParams] = useSearchParams() + if (searchParams.get('tableFilter') && !filterviaURL) { + setFilterText(searchParams.get('tableFilter')) + setFilterviaURL(true) + } + useEffect(() => { if (dropDownInfo.isFetching) { handleModal( @@ -198,7 +207,20 @@ export default function CippTable({ return debounce(setGraphFilter, 1000) }, []) + const debounceSetSearchParams = useCallback(() => { + const currentUrl = new URL(window.location.href) + if (filterText !== '') { + currentUrl.searchParams.set('tableFilter', filterText) + window.history.replaceState({}, '', currentUrl.toString()) + } else { + currentUrl.searchParams.delete('tableFilter') + window.history.replaceState({}, '', currentUrl.toString()) + } + }, [filterText]) + const filterData = (data, filterText) => { + const debouncedSetSearchParams = debounce(debounceSetSearchParams, 1000) + debouncedSetSearchParams() if (filterText.startsWith('Graph:')) { var query = filterText.slice(6).trim() debounceSetGraphFilter(query) From 48b9ab63f1fe76a26b17ebf5df4939e98c1915bb Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Mon, 25 Sep 2023 13:41:22 +0200 Subject: [PATCH 073/158] added tableFilter Urls --- src/views/home/Home.js | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/views/home/Home.js b/src/views/home/Home.js index d1334e1372c9..04fdd9d5cefa 100644 --- a/src/views/home/Home.js +++ b/src/views/home/Home.js @@ -175,7 +175,7 @@ const Home = () => { href={ '/identity/administration/users?customerId=' + currentTenant.customerId + - '&filterName=Users with a license' + '&tableFilter=Graph%3A+assignedLicenses%2F%24count+ne+0' } class="stretched-link" > @@ -206,7 +206,7 @@ const Home = () => { href={ '/identity/administration/users?customerId=' + currentTenant.customerId + - '&filterName=Guest users' + '&tableFilter=Graph%3A+usertype+eq+%27guest%27' } class="stretched-link" > From d7c7c545544389ec19b8f96dfaf8fd840b260a90 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Mon, 25 Sep 2023 14:01:00 +0200 Subject: [PATCH 074/158] use links instead of a's for internal routing --- src/views/home/Home.js | 33 +++++++++++++++++---------------- 1 file changed, 17 insertions(+), 16 deletions(-) diff --git a/src/views/home/Home.js b/src/views/home/Home.js index 04fdd9d5cefa..1473119811aa 100644 --- a/src/views/home/Home.js +++ b/src/views/home/Home.js @@ -28,6 +28,7 @@ import ReactTimeAgo from 'react-time-ago' import { CellDelegatedPrivilege } from 'src/components/tables/CellDelegatedPrivilege' import Portals from 'src/data/portals' import { FontAwesomeIcon } from '@fortawesome/react-fontawesome' +import { Link } from 'react-router-dom' const Home = () => { const [visible, setVisible] = useState(false) @@ -160,10 +161,10 @@ const Home = () => { - +
    {issuccessUserCounts && !isFetchingUserCount ? dashboard?.Users : }
    @@ -171,14 +172,14 @@ const Home = () => {
    - + className="stretched-link" + />
    {issuccessUserCounts && !isFetchingUserCount ? dashboard?.LicUsers : }
    @@ -186,15 +187,15 @@ const Home = () => {
    - + />
    {issuccessUserCounts && !isFetchingUserCount ? dashboard?.Gas : }
    @@ -202,14 +203,14 @@ const Home = () => {
    - + className="stretched-link" + />
    {issuccessUserCounts && !isFetchingUserCount ? dashboard?.Guests : }
    From e93d8159643d8daaed3fa2a6ff97d9eef5b65ae1 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Mon, 25 Sep 2023 15:50:33 +0200 Subject: [PATCH 075/158] version up --- public/version_latest.txt | 2 +- version_latest.txt | 1 - 2 files changed, 1 insertion(+), 2 deletions(-) delete mode 100644 version_latest.txt diff --git a/public/version_latest.txt b/public/version_latest.txt index d87edbfc1069..81911389142b 100644 --- a/public/version_latest.txt +++ b/public/version_latest.txt @@ -1 +1 @@ -4.2.1 \ No newline at end of file +4.3.0 \ No newline at end of file diff --git a/version_latest.txt b/version_latest.txt deleted file mode 100644 index d87edbfc1069..000000000000 --- a/version_latest.txt +++ /dev/null @@ -1 +0,0 @@ -4.2.1 \ No newline at end of file From 0997ef73177cb05bdd544da0a4b93d58c1c85642 Mon Sep 17 00:00:00 2001 From: Roel van der Wegen Date: Mon, 25 Sep 2023 16:11:22 +0100 Subject: [PATCH 076/158] Wording --- src/data/Extensions.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/data/Extensions.json b/src/data/Extensions.json index cb15aa1043e8..3c1a1e7f1cd8 100644 --- a/src/data/Extensions.json +++ b/src/data/Extensions.json @@ -4,7 +4,7 @@ "type": "CIPP-API", "cat": "API", "forceSyncButton": false, - "helpText": "This integration allows you to use to enable API access outside of CIPP usage. Requires Global Administrator permissions inside your tenant for activation of the API. These credentials will only be shown once.", + "helpText": "This integration allows you to enable CIPP-API access outside of CIPP. Requires Global Administrator permissions inside your tenant for activation of the API. The API credentials will only be shown once.", "SettingOptions": [ { "type": "checkbox", From ff7450360418717a490987cb794e47cf94cded1b Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Tue, 26 Sep 2023 02:00:16 +0200 Subject: [PATCH 077/158] fixed issue with mass deletes webhooks --- src/views/tenant/administration/ListAlertsQueue.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/views/tenant/administration/ListAlertsQueue.js b/src/views/tenant/administration/ListAlertsQueue.js index d1da4bb53479..720e55a2fcc3 100644 --- a/src/views/tenant/administration/ListAlertsQueue.js +++ b/src/views/tenant/administration/ListAlertsQueue.js @@ -286,7 +286,7 @@ const ListAlertsQueue = () => { label: 'Delete webhook', color: 'info', modal: true, - modalUrl: `/api/RemoveWebhookAlert?CIPPID=!CIPPID&tenantfilter=!tenantName`, + modalUrl: `/api/RemoveWebhookAlert?CIPPID=!RowKey&tenantfilter=!PartitionKey`, modalMessage: 'Are you sure you want to delete this webhook alert?', }, ], From dc29bfcdac246b10f3583349bfe6b4132c82d4f1 Mon Sep 17 00:00:00 2001 From: John Duprey Date: Mon, 25 Sep 2023 22:10:43 -0400 Subject: [PATCH 078/158] Prevent table re-render on queued results --- src/components/tables/CippDatatable.js | 31 ++++++++------------------ 1 file changed, 9 insertions(+), 22 deletions(-) diff --git a/src/components/tables/CippDatatable.js b/src/components/tables/CippDatatable.js index d41dc8e342ed..3c75376985f5 100644 --- a/src/components/tables/CippDatatable.js +++ b/src/components/tables/CippDatatable.js @@ -15,28 +15,15 @@ export default function CippDatatable({ path, params, ...rest }) { } = useListDatatableQuery({ path, params: { refreshGuid, $filter: graphFilter, ...params } }) return ( <> - {data[0]?.Queued ? ( - <> - {data[0]?.QueueMessage} - - - ) : ( - - )} + {data[0]?.Queued && {data[0]?.QueueMessage}} + ) } From e40eea1b8f054ae3142089d70c5346143c005420 Mon Sep 17 00:00:00 2001 From: John Duprey Date: Mon, 25 Sep 2023 23:55:05 -0400 Subject: [PATCH 079/158] CippTable tweaks - Add defaultFilterText - Set initial graph filter from CippDatatable to default filter text - Add isModal - disable search param update --- src/components/tables/CippDatatable.js | 7 +++++++ src/components/tables/CippTable.js | 12 ++++++++---- src/components/utilities/SharedModal.js | 2 +- 3 files changed, 16 insertions(+), 5 deletions(-) diff --git a/src/components/tables/CippDatatable.js b/src/components/tables/CippDatatable.js index 3c75376985f5..335af6f33541 100644 --- a/src/components/tables/CippDatatable.js +++ b/src/components/tables/CippDatatable.js @@ -13,6 +13,12 @@ export default function CippDatatable({ path, params, ...rest }) { isFetching, error, } = useListDatatableQuery({ path, params: { refreshGuid, $filter: graphFilter, ...params } }) + + var defaultFilterText = '' + if (params?.Parameters?.$filter) { + defaultFilterText = 'Graph: ' + params?.Parameters?.$filter + console.log(defaultFilterText) + } return ( <> {data[0]?.Queued && {data[0]?.QueueMessage}} @@ -21,6 +27,7 @@ export default function CippDatatable({ path, params, ...rest }) { data={data[0]?.Queued ? [] : data} isFetching={isFetching} error={error} + defaultFilterText={defaultFilterText} refreshFunction={setRefreshGuid} graphFilterFunction={setGraphFilter} /> diff --git a/src/components/tables/CippTable.js b/src/components/tables/CippTable.js index fc09031e33be..288685f43f1a 100644 --- a/src/components/tables/CippTable.js +++ b/src/components/tables/CippTable.js @@ -111,6 +111,8 @@ export default function CippTable({ graphFilterFunction = null, columns = [], dynamicColumns = true, + defaultFilterText = '', + isModal = false, filterlist, tableProps: { keyField = 'id', @@ -137,7 +139,7 @@ export default function CippTable({ const inputRef = useRef('') const [loopRunning, setLoopRunning] = React.useState(false) const [massResults, setMassResults] = React.useState([]) - const [filterText, setFilterText] = React.useState('') + const [filterText, setFilterText] = React.useState(defaultFilterText) const [filterviaURL, setFilterviaURL] = React.useState(false) const [updatedColumns, setUpdatedColumns] = React.useState(columns) const [selectedRows, setSelectedRows] = React.useState(false) @@ -147,7 +149,7 @@ export default function CippTable({ const [modalContent, setModalContent] = useState(null) //get the search params called "tableFilter" and set the filter to that. const [searchParams, setSearchParams] = useSearchParams() - if (searchParams.get('tableFilter') && !filterviaURL) { + if (searchParams.get('tableFilter') && !filterviaURL && !isModal) { setFilterText(searchParams.get('tableFilter')) setFilterviaURL(true) } @@ -219,8 +221,10 @@ export default function CippTable({ }, [filterText]) const filterData = (data, filterText) => { - const debouncedSetSearchParams = debounce(debounceSetSearchParams, 1000) - debouncedSetSearchParams() + if (!isModal) { + const debouncedSetSearchParams = debounce(debounceSetSearchParams, 1000) + debouncedSetSearchParams() + } if (filterText.startsWith('Graph:')) { var query = filterText.slice(6).trim() debounceSetGraphFilter(query) diff --git a/src/components/utilities/SharedModal.js b/src/components/utilities/SharedModal.js index 47fb57f2f547..4975c0cc17f6 100644 --- a/src/components/utilities/SharedModal.js +++ b/src/components/utilities/SharedModal.js @@ -13,7 +13,7 @@ import { CippTable } from 'src/components/tables' function mapBodyComponent({ componentType, data, componentProps }) { switch (componentType) { case 'table': - return + return case 'list': return
    {Array.isArray(data) && data.map((el, idx) =>
    {el}
    )}
    case 'text': From 3d053b13a84d131a0b612dc565230dd7502467af Mon Sep 17 00:00:00 2001 From: John Duprey Date: Mon, 25 Sep 2023 23:56:20 -0400 Subject: [PATCH 080/158] Update CippDatatable.js --- src/components/tables/CippDatatable.js | 1 - 1 file changed, 1 deletion(-) diff --git a/src/components/tables/CippDatatable.js b/src/components/tables/CippDatatable.js index 335af6f33541..e36befb3dea3 100644 --- a/src/components/tables/CippDatatable.js +++ b/src/components/tables/CippDatatable.js @@ -17,7 +17,6 @@ export default function CippDatatable({ path, params, ...rest }) { var defaultFilterText = '' if (params?.Parameters?.$filter) { defaultFilterText = 'Graph: ' + params?.Parameters?.$filter - console.log(defaultFilterText) } return ( <> From ab8bb402f0230b00e28438df1f8dc920244c286d Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Tue, 26 Sep 2023 13:07:51 +0200 Subject: [PATCH 081/158] hotfix --- public/version_latest.txt | 2 +- version_latest.txt | 1 + 2 files changed, 2 insertions(+), 1 deletion(-) create mode 100644 version_latest.txt diff --git a/public/version_latest.txt b/public/version_latest.txt index 81911389142b..ecedc98d1d5a 100644 --- a/public/version_latest.txt +++ b/public/version_latest.txt @@ -1 +1 @@ -4.3.0 \ No newline at end of file +4.3.1 \ No newline at end of file diff --git a/version_latest.txt b/version_latest.txt new file mode 100644 index 000000000000..ecedc98d1d5a --- /dev/null +++ b/version_latest.txt @@ -0,0 +1 @@ +4.3.1 \ No newline at end of file From a28bc053a994bf1986c46ce6d7e52add2d332da1 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Tue, 26 Sep 2023 18:16:59 +0200 Subject: [PATCH 082/158] fixes data not available bug --- src/views/cipp/CIPPSettings.js | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/views/cipp/CIPPSettings.js b/src/views/cipp/CIPPSettings.js index 00deb2d85098..7ba3cb285ad7 100644 --- a/src/views/cipp/CIPPSettings.js +++ b/src/views/cipp/CIPPSettings.js @@ -1577,8 +1577,8 @@ const ExtensionsTab = () => { } const MappingsTab = () => { - const [listHaloBackend, listBackendHaloResult] = useLazyGenericGetRequestQuery() - const [setHaloExtensionconfig, extensionHaloConfigResult] = useLazyGenericPostRequestQuery() + const [listHaloBackend, listBackendHaloResult = []] = useLazyGenericGetRequestQuery() + const [setHaloExtensionconfig, extensionHaloConfigResult = []] = useLazyGenericPostRequestQuery() const onHaloSubmit = (values) => { setHaloExtensionconfig({ @@ -1608,7 +1608,7 @@ const MappingsTab = () => { Use the table below to map your client to the correct PSA client {listBackendHaloResult.isSuccess && - listBackendHaloResult.data.Tenants.map((tenant) => ( + listBackendHaloResult.data.Tenants?.map((tenant) => ( Date: Tue, 26 Sep 2023 18:24:02 +0200 Subject: [PATCH 083/158] add refresh to groups --- src/views/identity/administration/EditGroup.js | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-) diff --git a/src/views/identity/administration/EditGroup.js b/src/views/identity/administration/EditGroup.js index 9ea8160b396a..1c9e2d44d187 100644 --- a/src/views/identity/administration/EditGroup.js +++ b/src/views/identity/administration/EditGroup.js @@ -32,9 +32,8 @@ const EditGroup = () => { let query = useQuery() const groupId = query.get('groupId') const tenantDomain = query.get('tenantDomain') - const [queryError, setQueryError] = useState(false) - + const [refreshToken, setRefresh] = useState('') const { data: group = {}, isFetching, @@ -47,14 +46,14 @@ const EditGroup = () => { isFetching: membersisFetching, error: membersError, isSuccess: membersIsSuccess, - } = useListGroupMembersQuery({ tenantDomain, groupId }) + } = useListGroupMembersQuery({ tenantDomain, groupId, refreshToken }) const { data: owners = [], isFetching: ownersisFetching, error: ownersError, isSuccess: ownersIsSuccess, - } = useListGroupOwnersQuery({ tenantDomain, groupId }) + } = useListGroupOwnersQuery({ tenantDomain, groupId, refreshToken }) const { data: users = [], isFetching: usersIsFetching, @@ -66,6 +65,7 @@ const EditGroup = () => { isFetching: contactsIsFetching, error: contactsError, } = useListContactsQuery({ tenantDomain }) + const [genericPostRequest, postResults] = useLazyGenericPostRequestQuery() const [roleInfo, setroleInfo] = React.useState([]) useEffect(() => { @@ -86,7 +86,7 @@ const EditGroup = () => { }) setroleInfo(ownerWithRole.concat(memberwithRole)) } - }, [owners, members, ownersIsSuccess, membersIsSuccess]) + }, [owners, members, ownersIsSuccess, membersIsSuccess, postResults]) useEffect(() => { if (!groupId || !tenantDomain) { @@ -97,7 +97,6 @@ const EditGroup = () => { setQueryError(true) } }, [groupId, tenantDomain, dispatch]) - const [genericPostRequest, postResults] = useLazyGenericPostRequestQuery() const onSubmit = (values) => { const shippedValues = { tenantID: tenantDomain, @@ -114,7 +113,9 @@ const EditGroup = () => { mail: group[0].mail, } //window.alert(JSON.stringify(shippedValues)) - genericPostRequest({ path: '/api/EditGroup', values: shippedValues }) + genericPostRequest({ path: '/api/EditGroup', values: shippedValues }).then((res) => { + setRefresh(postResults.requestId) + }) } const tableColumns = [ { From 72be80f363dd0260366df1edbefe576d8729285d Mon Sep 17 00:00:00 2001 From: Jr7468 <126574444+Jr7468@users.noreply.github.com> Date: Wed, 27 Sep 2023 11:50:33 +0100 Subject: [PATCH 084/158] Shipped groupName --- src/views/identity/administration/EditGroup.js | 1 + 1 file changed, 1 insertion(+) diff --git a/src/views/identity/administration/EditGroup.js b/src/views/identity/administration/EditGroup.js index 1c9e2d44d187..928962af5b83 100644 --- a/src/views/identity/administration/EditGroup.js +++ b/src/views/identity/administration/EditGroup.js @@ -111,6 +111,7 @@ const EditGroup = () => { allowExternal: values.allowExternal, sendCopies: values.sendCopies, mail: group[0].mail, + groupName: group[0].DisplayName, } //window.alert(JSON.stringify(shippedValues)) genericPostRequest({ path: '/api/EditGroup', values: shippedValues }).then((res) => { From 8ad810204032521eb27ca9419dbdda62189ddf0d Mon Sep 17 00:00:00 2001 From: Jr7468 Date: Wed, 27 Sep 2023 18:25:03 +0100 Subject: [PATCH 085/158] Changed MFARergister OC to point to the Entra page --- src/views/identity/administration/Users.js | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/src/views/identity/administration/Users.js b/src/views/identity/administration/Users.js index bd3df44d1aa4..60262c606bd6 100644 --- a/src/views/identity/administration/Users.js +++ b/src/views/identity/administration/Users.js @@ -17,6 +17,7 @@ const Offcanvas = (row, rowIndex, formatExtraData) => { const viewLink = `/identity/administration/users/view?userId=${row.id}&tenantDomain=${tenant.defaultDomainName}&userEmail=${row.userPrincipalName}` const editLink = `/identity/administration/users/edit?userId=${row.id}&tenantDomain=${tenant.defaultDomainName}` const OffboardLink = `/identity/administration/offboarding-wizard?userId=${row.id}&tenantDomain=${tenant.defaultDomainName}` + const userEntraLink = `https://entra.microsoft.com/${tenant.defaultDomainName}/#view/Microsoft_AAD_UsersAndTenants/UserProfileMenuBlade/~/overview/userId/${row.id}//hidePreviewBanner~/true` let licenses = [] row.assignedLicenses?.map((licenseAssignment, idx) => { @@ -94,10 +95,8 @@ const Offcanvas = (row, rowIndex, formatExtraData) => { }, { label: 'Rerequire MFA registration', - color: 'info', - modal: true, - modalUrl: `/api/ExecResetMFA?TenantFilter=${tenant.defaultDomainName}&ID=${row.id}`, - modalMessage: 'Are you sure you want to enable MFA for this user?', + link: userEntraLink, + color: `info`, }, { label: 'Send MFA Push', From f876f70ba7c52689d86d55556460a4ce88e13e4f Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Thu, 28 Sep 2023 01:12:33 +0200 Subject: [PATCH 086/158] new profile --- src/_nav.js | 17 +- src/components/layout/AppHeader.js | 40 +++- src/components/utilities/CippProfile.js | 1 - src/components/utilities/PageSizeSwitcher.js | 11 +- src/components/utilities/ReportImage.js | 34 ++-- .../utilities/TenantListSelector.js | 14 +- src/components/utilities/ThemeSwitcher.js | 11 +- src/components/utilities/UsageLocation.js | 8 +- src/routes.js | 4 + src/scss/_custom.scss | 12 ++ src/views/cipp/UserSettings.js | 177 ++++++++++++++++++ 11 files changed, 282 insertions(+), 47 deletions(-) create mode 100644 src/views/cipp/UserSettings.js diff --git a/src/_nav.js b/src/_nav.js index c243b18c4e12..683cd830fdaa 100644 --- a/src/_nav.js +++ b/src/_nav.js @@ -660,9 +660,14 @@ const _nav = [ items: [ { component: CNavItem, - name: 'Settings', + name: 'Application Settings', to: '/cipp/settings', }, + { + component: CNavItem, + name: 'User Settings', + to: '/cipp/user-settings', + }, { component: CNavItem, name: 'Scheduler', @@ -670,14 +675,14 @@ const _nav = [ }, { component: CNavItem, - name: 'SAM Setup Wizard', - to: '/cipp/setup', + name: 'Logbook', + to: '/cipp/logs', }, + { component: CNavItem, - name: 'Documentation', - href: 'https://cipp.app', - target: '_blank', + name: 'SAM Setup Wizard', + to: '/cipp/setup', }, ], }, diff --git a/src/components/layout/AppHeader.js b/src/components/layout/AppHeader.js index 0bc158732883..10f0ea74dc3c 100644 --- a/src/components/layout/AppHeader.js +++ b/src/components/layout/AppHeader.js @@ -12,6 +12,7 @@ import { CImage, CSidebarBrand, CButton, + CFormSwitch, } from '@coreui/react' import { AppHeaderDropdown, AppHeaderSearch } from 'src/components/header' import { TenantSelector } from '../utilities' @@ -20,11 +21,12 @@ import cyberdrainlogodark from 'src/assets/images/CIPP_Dark.png' import { FontAwesomeIcon } from '@fortawesome/react-fontawesome' import { faCaretSquareLeft, faCaretSquareRight } from '@fortawesome/free-solid-svg-icons' -import { toggleSidebarShow } from 'src/store/features/app' +import { setCurrentTheme, toggleSidebarShow } from 'src/store/features/app' import { useMediaPredicate } from 'react-media-hook' import { useLoadAlertsDashQuery } from 'src/store/api/app' import { Link } from 'react-router-dom' import { useLocation } from 'react-router-dom' +import { RFFCFormCheck } from '../forms' const AppHeader = () => { const dispatch = useDispatch() @@ -33,6 +35,19 @@ const AppHeader = () => { const currentTheme = useSelector((state) => state.app.currentTheme) const preferredTheme = useMediaPredicate('(prefers-color-scheme: dark)') ? 'impact' : 'cyberdrain' const { data: dashboard } = useLoadAlertsDashQuery() + const SwitchTheme = () => { + let targetTheme = preferredTheme + if (currentTheme === 'impact') { + targetTheme = 'cyberdrain' + } else { + targetTheme = 'impact' + } + document.body.classList = [] + document.body.classList.add(`theme-${targetTheme}`) + document.body.dataset.theme = targetTheme + + dispatch(setCurrentTheme({ theme: targetTheme })) + } return ( <> @@ -76,7 +91,28 @@ const AppHeader = () => { - +
    + + {currentTheme === 'impact' ? ( + + ) : ( + + )} +
    diff --git a/src/components/utilities/CippProfile.js b/src/components/utilities/CippProfile.js index e033bc568df9..7b559bc08289 100644 --- a/src/components/utilities/CippProfile.js +++ b/src/components/utilities/CippProfile.js @@ -16,7 +16,6 @@ import TenantListSelector from './TenantListSelector' const CippProfile = () => { const { data: profile, isFetching, isLoading } = useLoadClientPrincipalQuery() - return ( <> diff --git a/src/components/utilities/PageSizeSwitcher.js b/src/components/utilities/PageSizeSwitcher.js index f3d10641e81b..acef59d16ab6 100644 --- a/src/components/utilities/PageSizeSwitcher.js +++ b/src/components/utilities/PageSizeSwitcher.js @@ -13,21 +13,22 @@ const PageSizeSwitcher = () => { } return ( - - Select Default Page Size + <> +

    + Default page size +

    {pageSizes.map((tablePageSize, index) => ( SwitchPageSize(tablePageSize)} - active={tablePageSize === currentTablePageSize ? true : false} - color="secondary" + color={tablePageSize === currentTablePageSize ? 'primary' : 'secondary'} key={index} > {tablePageSize} ))} -
    + ) } diff --git a/src/components/utilities/ReportImage.js b/src/components/utilities/ReportImage.js index d5aead2b9069..800110e22930 100644 --- a/src/components/utilities/ReportImage.js +++ b/src/components/utilities/ReportImage.js @@ -19,9 +19,8 @@ const ReportImage = () => { } return ( - - Upload a default report image - +
    +
    { id="contained-button-file" onChange={(e) => Switchusage(e)} /> -
    - Suggested image size: 120x100. This is a per user setting.

    - inputRef.current.click()} - className="me-2" - > - Upload File - -

    - -
    - - +

    Select a report image. This image has a size of 120x100 and can be up to 64KB.

    + inputRef.current.click()} + className="me-2" + > + Upload new image + +
    +
    + +
    +
    ) } diff --git a/src/components/utilities/TenantListSelector.js b/src/components/utilities/TenantListSelector.js index 94eba4c0bfdc..d5a247ea1b7d 100644 --- a/src/components/utilities/TenantListSelector.js +++ b/src/components/utilities/TenantListSelector.js @@ -12,25 +12,25 @@ const TenantListSelector = () => { } return ( - - Select default Tenant List + <> +

    + Tenant overview page +

    SwitchPageSize(true)} - active={TenantListSelector ? true : false} - color="secondary" + color={TenantListSelector ? 'primary' : 'secondary'} > Compressed SwitchPageSize(false)} - active={TenantListSelector ? false : true} - color="secondary" + color={TenantListSelector ? 'secondary' : 'primary'} > Full list -
    + ) } diff --git a/src/components/utilities/ThemeSwitcher.js b/src/components/utilities/ThemeSwitcher.js index baf69b76c362..012694f0ed8a 100644 --- a/src/components/utilities/ThemeSwitcher.js +++ b/src/components/utilities/ThemeSwitcher.js @@ -43,14 +43,15 @@ const ThemeSwitcher = () => { } return ( - - Select Theme + <> +

    + Theme +

    {themes.map((theme, index) => ( SwitchTheme(theme)} - active={theme === currentTheme ? true : false} - color="secondary" + color={theme === currentTheme ? 'primary' : 'secondary'} key={index} title={themeInfo(theme).description} > @@ -58,7 +59,7 @@ const ThemeSwitcher = () => { ))} -
    + ) } diff --git a/src/components/utilities/UsageLocation.js b/src/components/utilities/UsageLocation.js index 10ac692681ec..7996611baea1 100644 --- a/src/components/utilities/UsageLocation.js +++ b/src/components/utilities/UsageLocation.js @@ -13,8 +13,10 @@ const UsageLocation = () => { } return ( - - Select default usage location + <> +

    + Default Usage Location +

    { id="contained-button-file" onChange={(e) => Switchusage(e)} /> -

    Select a report image. This image has a size of 120x100 and can be up to 64KB.

    - inputRef.current.click()} - className="me-2" - > - Upload new image - -
    -
    -
    ) diff --git a/src/components/utilities/TenantListSelector.js b/src/components/utilities/TenantListSelector.js index d5a247ea1b7d..5fc6e4f088e8 100644 --- a/src/components/utilities/TenantListSelector.js +++ b/src/components/utilities/TenantListSelector.js @@ -14,7 +14,7 @@ const TenantListSelector = () => { return ( <>

    - Tenant overview page +

    Tenant overview page

    { return ( <>

    - Theme +

    Theme

    {themes.map((theme, index) => ( diff --git a/src/components/utilities/UsageLocation.js b/src/components/utilities/UsageLocation.js index 7996611baea1..c3f4e9947a13 100644 --- a/src/components/utilities/UsageLocation.js +++ b/src/components/utilities/UsageLocation.js @@ -15,7 +15,7 @@ const UsageLocation = () => { return ( <>

    - Default Usage Location +

    Default Usage Location

    Switchusage(e)} - /> - - + <> + + + + + + + inputRef.current.click()}> + Report +
    +
    Click to Change
    +
    + Switchusage(e)} + /> +
    +
    + ) } diff --git a/src/components/utilities/TenantListSelector.js b/src/components/utilities/TenantListSelector.js index 5fc6e4f088e8..f9c23e1a0330 100644 --- a/src/components/utilities/TenantListSelector.js +++ b/src/components/utilities/TenantListSelector.js @@ -1,5 +1,5 @@ import React from 'react' -import { CButtonGroup, CButton, CCard, CCardHeader } from '@coreui/react' +import { CFormSwitch, CRow, CCol } from '@coreui/react' import { useDispatch, useSelector } from 'react-redux' import { setTenantList } from 'src/store/features/app' @@ -12,25 +12,16 @@ const TenantListSelector = () => { } return ( - <> -

    -

    Tenant overview page
    -

    - - SwitchPageSize(true)} - color={TenantListSelector ? 'primary' : 'secondary'} - > - Compressed - - SwitchPageSize(false)} - color={TenantListSelector ? 'secondary' : 'primary'} - > - Full list - - - + + + SwitchPageSize(e.target.checked)} + initialValue={TenantListSelector} + name="TenantListSelector" + label="Show compressed tenant list" + /> + + ) } diff --git a/src/components/utilities/ThemeSwitcher.js b/src/components/utilities/ThemeSwitcher.js index 62953550c701..13071b9f77b6 100644 --- a/src/components/utilities/ThemeSwitcher.js +++ b/src/components/utilities/ThemeSwitcher.js @@ -1,20 +1,21 @@ import React from 'react' -import { CButtonGroup, CButton, CCard, CCardHeader } from '@coreui/react' +import { CButton, CCol, CRow } from '@coreui/react' import { useDispatch, useSelector } from 'react-redux' import { setCurrentTheme } from 'src/store/features/app' import { useMediaPredicate } from 'react-media-hook' +import { FontAwesomeIcon } from '@fortawesome/react-fontawesome' function themeInfo(theme) { switch (theme) { case 'impact': return { name: 'Impact', - description: "Impact is CIPP's dark theme.", + description: 'Dark Theme', } case 'cyberdrain': return { name: 'CyberDrain', - description: "CyberDrain is CIPP's light theme.", + description: 'Light Theme', } default: return { @@ -29,6 +30,7 @@ const ThemeSwitcher = () => { const currentTheme = useSelector((state) => state.app.currentTheme) const themes = useSelector((state) => state.app.themes) const preferredTheme = useMediaPredicate('(prefers-color-scheme: dark)') ? 'impact' : 'cyberdrain' + const SwitchTheme = (inputTheme) => { var targetTheme if (inputTheme === 'default') { @@ -44,21 +46,25 @@ const ThemeSwitcher = () => { return ( <> -

    -

    Theme
    -

    - - {themes.map((theme, index) => ( - SwitchTheme(theme)} - color={theme === currentTheme ? 'primary' : 'secondary'} - key={index} - title={themeInfo(theme).description} - > - {themeInfo(theme).name} - - ))} - + + + + + + {themes.map((theme, index) => ( + SwitchTheme(theme)} + className={`circular-button ${theme} ${theme === currentTheme ? 'round-focus' : ''}`} + key={index} + title={themeInfo(theme).description} + > + {theme === 'default' && 'D'} + {theme === 'cyberdrain' && } + {theme === 'impact' && } + + ))} + + ) } diff --git a/src/scss/_custom.scss b/src/scss/_custom.scss index f3d67afc5e08..8fccbc31607b 100644 --- a/src/scss/_custom.scss +++ b/src/scss/_custom.scss @@ -3,6 +3,92 @@ position: relative; display: inline-block; } +.image-upload-container { + position: relative; + width: 100px; /* Adjusted to match the image */ + height: 120px; /* Adjusted to match the image */ + cursor: pointer; + display: flex; + align-items: center; + justify-content: center; +} + +.upload-image { + width: 100%; + height: 100%; + border-radius: 8px; + object-fit: cover; /* Ensures the image covers the area without stretching */ +} + +.image-upload-overlay { + position: absolute; + top: 0; + bottom: 0; + left: 0; + right: 0; + opacity: 0; + transition: 0.5s ease; + background-color: var(--cyberdrain-secondary); + border-radius: 8px; + display: flex; + align-items: center; + justify-content: center; + z-index: 2; +} + +.image-upload-container:hover .image-upload-overlay { + opacity: 0.8; +} + +.overlay-text { + color: white; + font-size: 20px; +} + +.circular-button { + border-radius: 50% !important; + width: 35px; + height: 35px; + display: inline-flex; + align-items: center; + justify-content: center; + font-weight: bold; + margin-right: 1rem; +} + +.round-focus { + box-shadow: inset 0 1px 0 rgba(255, 255, 255, 0.15), 0 1px 1px rgba(0, 0, 21, 0.075), + 0 0 0 0.25rem var(--cui-btn-shadow); +} + +.circular-button.active { + background-color: #4caf50; + color: #ffffff; +} +.circular-button.default { + background-color: var(--cui-primary); + color: var(--text-primary); +} + +.circular-button.cyberdrain { + background-color: var(--cyberdrain-accent-beige); + color: var(--text-primary); +} + +.circular-button.impact { + background-color: var(--cyberdrain-secondary); + color: var(--text-primary); +} + +h3.underline:after { + background: none repeat scroll 0 0 var(--cipp-table-context-bg); + bottom: -13px; + content: ''; + display: block; + height: 5px; + position: relative; + width: 2.5rem; +} .switch-icon { position: absolute; diff --git a/src/store/features/app.js b/src/store/features/app.js index 8fcfea652c71..285ef9623269 100644 --- a/src/store/features/app.js +++ b/src/store/features/app.js @@ -44,6 +44,15 @@ export const appSlice = createSlice({ setTenantList: (state, action) => { state.TenantListSelector = action.payload?.TenantListSelector }, + setOffboardingDefaults: (state, action) => { + state.offboardingDefaults = action.payload?.offboardingDefaults + }, + setUserSettings: (state, action) => { + //foreach key in the userSettings, set the state key to the value of that setting + Object.keys(action.payload?.userSettings).forEach((key) => { + state[key] = action.payload?.userSettings[key] + }) + }, }, }) @@ -57,6 +66,8 @@ export const { setSidebarVisible, setDefaultusageLocation, setReportImage, + setOffboardingDefaults, + setUserSettings, } = appSlice.actions export default persistReducer( diff --git a/src/views/cipp/UserSettings.js b/src/views/cipp/UserSettings.js index 63a766a35da6..01ad712a1c75 100644 --- a/src/views/cipp/UserSettings.js +++ b/src/views/cipp/UserSettings.js @@ -8,10 +8,15 @@ import { CCardHeader, CCardTitle, CCol, + CDropdown, + CDropdownItem, + CDropdownMenu, + CDropdownToggle, CForm, CFormLabel, CListGroup, CListGroupItem, + CProgress, CRow, CSpinner, CTooltip, @@ -60,6 +65,7 @@ import { import CippCodeOffCanvas from 'src/components/utilities/CippCodeOffcanvas' import ReportImage from 'src/components/utilities/ReportImage' import { useLoadClientPrincipalQuery } from 'src/store/api/auth' +import { setOffboardingDefaults } from 'src/store/features/app' const Offcanvas = (row, rowIndex, formatExtraData) => { const [ExecuteGetRequest, getResults] = useLazyGenericGetRequestQuery() @@ -118,9 +124,17 @@ const Offcanvas = (row, rowIndex, formatExtraData) => { const UserSettings = () => { const [genericPostRequest, postResults] = useLazyGenericPostRequestQuery() const { data: profile, isFetching, isLoading } = useLoadClientPrincipalQuery() + const dispatch = useDispatch() + const currentSettings = useSelector((state) => state.app) const onSubmit = (values) => { - genericPostRequest({ path: '/api/AddScheduledItem', values: shippedValues }).then((res) => {}) + dispatch(setOffboardingDefaults({ offboardingDefaults: values })) + const shippedvalues = { + user: values.user, + currentSettings: currentSettings, + } + + genericPostRequest({ path: '/api/ExecUserSettings', values: shippedvalues }).then((res) => {}) } return ( @@ -129,47 +143,98 @@ const UserSettings = () => { - User Settings + + User Settings - {profile.clientPrincipal.userDetails} -{' '} + {profile.clientPrincipal.userRoles + .filter((role) => role !== 'anonymous' && role !== 'authenticated') + .join(', ')} + - - -
    -
    Username
    -
    - - {profile.clientPrincipal.userDetails} - -
    - -
    -
    Roles
    -
    - {profile.clientPrincipal.userRoles - .filter((role) => role !== 'anonymous' && role !== 'authenticated') - .map((r, index) => ( - - {r} - - ))} -
    - - - - - - - - - - - - + { + return ( + +

    General

    + + + + + + + +

    Appearance

    + + + + + + + +
    + +

    Offboarding Defaults

    + + + + + + + + + + + + - - - -
    + +
    +
    + + + { + form.change('user', profile.clientPrincipal.userDetails) + }} + className="me-3" + name="singleuser" + type="submit" + > + Save Settings {submitting && } + + { + //if the role contains admin, show the all user button. // + profile.clientPrincipal.userRoles.includes('admin') && ( + { + form.change('user', 'allUsers') + }} + className="me-3" + name="allUsers" + type="submit" + > + Save for all users + {submitting && } + + ) + } + + +
    + ) + }} + />
    diff --git a/src/views/identity/administration/OffboardingWizard.js b/src/views/identity/administration/OffboardingWizard.js index 58c425a52b2d..a5bf2288504a 100644 --- a/src/views/identity/administration/OffboardingWizard.js +++ b/src/views/identity/administration/OffboardingWizard.js @@ -37,7 +37,7 @@ const OffboardingWizard = () => { isFetching: usersIsFetching, error: usersError, } = useListUsersQuery({ tenantDomain }) - + const currentSettings = useSelector((state) => state.app) const [genericPostRequest, postResults] = useLazyGenericPostRequestQuery() const handleSubmit = async (values) => { @@ -67,11 +67,16 @@ const OffboardingWizard = () => { } return ( - + + {console.log(currentSettings.offboardingDefaults)}

    Step 1

    Choose a tenant
    @@ -103,90 +108,90 @@ const OffboardingWizard = () => {
    - +

    Step 3

    Choose offboarding options

    - - - - - - - - - - - - - - x.mail) - .map((user) => ({ - value: user.mail, - name: `${user.displayName} <${user.mail}>`, - }))} - placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} - name="AccessNoAutomap" - /> - - - x.mail) - .map((user) => ({ - value: user.mail, - name: `${user.displayName} <${user.mail}>`, - }))} - placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} - name="AccessAutomap" - /> - - - x.mail) - .map((user) => ({ - value: user.mail, - name: `${user.displayName} <${user.mail}>`, - }))} - placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} - name="OnedriveAccess" - /> - - - x.mail) - .map((user) => ({ - value: user.mail, - name: `${user.displayName} <${user.mail}>`, - }))} - placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} - name="forward" - /> - - - + + + + + + + + + + + + + + + + x.mail) + .map((user) => ({ + value: user.mail, + name: `${user.displayName} <${user.mail}>`, + }))} + placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} + name="AccessNoAutomap" + /> + x.mail) + .map((user) => ({ + value: user.mail, + name: `${user.displayName} <${user.mail}>`, + }))} + placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} + name="AccessAutomap" + /> + x.mail) + .map((user) => ({ + value: user.mail, + name: `${user.displayName} <${user.mail}>`, + }))} + placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} + name="OnedriveAccess" + /> + x.mail) + .map((user) => ({ + value: user.mail, + name: `${user.displayName} <${user.mail}>`, + }))} + placeholder={!usersIsFetching ? 'Select user' : 'Loading...'} + name="forward" + /> + + +

    From 5a1387cfe68ccdf2a2cfd8ab72708f9568894b2d Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Mon, 9 Oct 2023 00:19:29 +0200 Subject: [PATCH 095/158] fixes #1792 --- src/adminRoutes.js | 2 -- src/routes.js | 2 ++ 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/src/adminRoutes.js b/src/adminRoutes.js index 8b10173655ab..ceabcd1b7e57 100644 --- a/src/adminRoutes.js +++ b/src/adminRoutes.js @@ -11,14 +11,12 @@ const GDAPRelationships = React.lazy(() => import('./views/tenant/administration/ListGDAPRelationships'), ) const appapproval = React.lazy(() => import('src/views/cipp/AppApproval')) -const Scheduler = React.lazy(() => import('src/views/cipp/Scheduler')) const adminRoutes = [ { path: '/cipp', name: 'CIPP' }, { path: '/cipp/cipp', name: 'CIPP' }, { path: '/cipp/settings', name: 'Settings', component: CIPPSettings }, { path: '/cipp/setup', name: 'Setup', component: Setup }, - { path: '/cipp/scheduler', name: 'Scheduler', component: Scheduler }, { path: '/tenant/administration/gdap', name: 'GDAP Wizard', component: GDAP }, { path: '/tenant/administration/gdap-invite', name: 'GDAP Invite Wizard', component: GDAPInvite }, diff --git a/src/routes.js b/src/routes.js index e2813a3f363d..d305063a4109 100644 --- a/src/routes.js +++ b/src/routes.js @@ -2,6 +2,7 @@ import React from 'react' const Home = React.lazy(() => import('src/views/home/Home')) const Logs = React.lazy(() => import('src/views/cipp/Logs')) +const Scheduler = React.lazy(() => import('src/views/cipp/Scheduler')) const Users = React.lazy(() => import('src/views/identity/administration/Users')) const DeletedItems = React.lazy(() => import('src/views/identity/administration/Deleted')) const ViewBEC = React.lazy(() => import('src/views/identity/administration/ViewBEC')) @@ -229,6 +230,7 @@ const routes = [ // { path: '/', exact: true, name: 'Home' }, { path: '/home', name: 'Home', component: Home }, { path: '/cipp/logs', name: 'Logs', component: Logs }, + { path: '/cipp/scheduler', name: 'Scheduler', component: Scheduler }, { path: '/cipp/404', name: 'Error', component: Page404 }, { path: '/cipp/403', name: 'Error', component: Page403 }, From ce9d35323150be223d235b97ec7e257364e7f1fe Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Mon, 9 Oct 2023 01:21:12 +0200 Subject: [PATCH 096/158] add new tenant functionality --- src/views/tenant/administration/AlertWizard.js | 1 + src/views/tenant/administration/ListAlertsQueue.js | 7 +++++++ 2 files changed, 8 insertions(+) diff --git a/src/views/tenant/administration/AlertWizard.js b/src/views/tenant/administration/AlertWizard.js index 28bf204948d5..8e02a21f6bd0 100644 --- a/src/views/tenant/administration/AlertWizard.js +++ b/src/views/tenant/administration/AlertWizard.js @@ -148,6 +148,7 @@ const AlertWizard = () => { name="SecDefaultsUpsell" label="Alert on Security Defaults automatic enablement" /> + diff --git a/src/views/tenant/administration/ListAlertsQueue.js b/src/views/tenant/administration/ListAlertsQueue.js index 720e55a2fcc3..469128e37247 100644 --- a/src/views/tenant/administration/ListAlertsQueue.js +++ b/src/views/tenant/administration/ListAlertsQueue.js @@ -217,6 +217,13 @@ const ListAlertsQueue = () => { exportSelector: 'SharepointQuota', cell: cellBooleanFormatter(), }, + { + name: 'New Tenant', + selector: (row) => row['NewTenant'], + sortable: true, + exportSelector: 'NewTenant', + cell: cellBooleanFormatter(), + }, { name: 'Expiring Licenses', selector: (row) => row['ExpiringLicenses'], From c9a322d270963f2d0791630f2303325544dae9c5 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Mon, 9 Oct 2023 01:29:41 +0200 Subject: [PATCH 097/158] better adding of new alert --- src/views/cipp/CIPPSettings.js | 1 + src/views/tenant/administration/ListAlertsQueue.js | 7 ------- 2 files changed, 1 insertion(+), 7 deletions(-) diff --git a/src/views/cipp/CIPPSettings.js b/src/views/cipp/CIPPSettings.js index 7ba3cb285ad7..7e73bb45bd07 100644 --- a/src/views/cipp/CIPPSettings.js +++ b/src/views/cipp/CIPPSettings.js @@ -1128,6 +1128,7 @@ const NotificationsSettings = () => { { value: 'AddMSPApp', name: 'Adding an MSP app' }, { value: 'AddUser', name: 'Adding a user' }, { value: 'AddGroup', name: 'Adding a group' }, + { value: 'NewTenant', name: 'Adding a tenant' }, { value: 'ExecOffboardUser', name: 'Executing the offboard wizard' }, ]} /> diff --git a/src/views/tenant/administration/ListAlertsQueue.js b/src/views/tenant/administration/ListAlertsQueue.js index 469128e37247..720e55a2fcc3 100644 --- a/src/views/tenant/administration/ListAlertsQueue.js +++ b/src/views/tenant/administration/ListAlertsQueue.js @@ -217,13 +217,6 @@ const ListAlertsQueue = () => { exportSelector: 'SharepointQuota', cell: cellBooleanFormatter(), }, - { - name: 'New Tenant', - selector: (row) => row['NewTenant'], - sortable: true, - exportSelector: 'NewTenant', - cell: cellBooleanFormatter(), - }, { name: 'Expiring Licenses', selector: (row) => row['ExpiringLicenses'], From b54b8d24fd4747449c93e17f5dc68e84abb1edbc Mon Sep 17 00:00:00 2001 From: Yoshify Date: Mon, 9 Oct 2023 09:58:56 +1000 Subject: [PATCH 098/158] Add switch to optionally enable tenantId inclusion in Alerts --- src/store/api/app.js | 2 ++ src/views/cipp/CIPPSettings.js | 7 +++++++ 2 files changed, 9 insertions(+) diff --git a/src/store/api/app.js b/src/store/api/app.js index 06089d3113bd..3eaa06328f84 100644 --- a/src/store/api/app.js +++ b/src/store/api/app.js @@ -55,6 +55,7 @@ export const appApi = baseApi.injectEndpoints({ addChocoApp, onePerTenant, sendtoIntegration, + includeTenantId, logsToInclude, Severity, }) => ({ @@ -73,6 +74,7 @@ export const appApi = baseApi.injectEndpoints({ logsToInclude: logsToInclude, Severity: Severity, sendtoIntegration: sendtoIntegration, + includeTenantId: includeTenantId, }, method: 'post', }), diff --git a/src/views/cipp/CIPPSettings.js b/src/views/cipp/CIPPSettings.js index 7e73bb45bd07..1716df3abee3 100644 --- a/src/views/cipp/CIPPSettings.js +++ b/src/views/cipp/CIPPSettings.js @@ -1161,6 +1161,13 @@ const NotificationsSettings = () => { value={false} /> + + + Set Notification Settings From 6e3aa3ac088c36395fde138b1ae9deee18b37455 Mon Sep 17 00:00:00 2001 From: Yoshify Date: Mon, 9 Oct 2023 09:59:18 +1000 Subject: [PATCH 099/158] Add TenantID column in Logbook with handling for null values. --- src/views/cipp/Logs.js | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/src/views/cipp/Logs.js b/src/views/cipp/Logs.js index b1e93e85d8c8..dc128d9a9721 100644 --- a/src/views/cipp/Logs.js +++ b/src/views/cipp/Logs.js @@ -55,6 +55,15 @@ const columns = [ minWidth: '145px', maxWidth: '145px', }, + { + name: 'Tenant ID', + selector: (row) => row['TenantID'], + sortable: true, + cell: (row) => CellTip(row['TenantID'] ?? 'None'), + exportSelector: 'TenantID', + minWidth: '145px', + maxWidth: '145px', + }, { name: 'User', selector: (row) => row['User'], From d0a3ac952f1d680dfc6916bacdd9780696ed5e65 Mon Sep 17 00:00:00 2001 From: BNWEIN Date: Mon, 9 Oct 2023 13:08:43 +0100 Subject: [PATCH 100/158] Create azure-static-web-apps-proud-smoke-0849e8603.yml --- ...-static-web-apps-proud-smoke-0849e8603.yml | 46 +++++++++++++++++++ 1 file changed, 46 insertions(+) create mode 100644 .github/workflows/azure-static-web-apps-proud-smoke-0849e8603.yml diff --git a/.github/workflows/azure-static-web-apps-proud-smoke-0849e8603.yml b/.github/workflows/azure-static-web-apps-proud-smoke-0849e8603.yml new file mode 100644 index 000000000000..dbcc4eb90308 --- /dev/null +++ b/.github/workflows/azure-static-web-apps-proud-smoke-0849e8603.yml @@ -0,0 +1,46 @@ +name: Azure Static Web Apps CI/CD + +on: + push: + branches: + - dev + pull_request: + types: [opened, synchronize, reopened, closed] + branches: + - dev + +jobs: + build_and_deploy_job: + if: github.event_name == 'push' || (github.event_name == 'pull_request' && github.event.action != 'closed') + runs-on: ubuntu-latest + name: Build and Deploy Job + steps: + - uses: actions/checkout@v3 + with: + submodules: true + lfs: false + - name: Build And Deploy + id: builddeploy + uses: Azure/static-web-apps-deploy@v1 + with: + azure_static_web_apps_api_token: ${{ secrets.AZURE_STATIC_WEB_APPS_API_TOKEN_PROUD_SMOKE_0849E8603 }} + repo_token: ${{ secrets.GITHUB_TOKEN }} # Used for Github integrations (i.e. PR comments) + action: "upload" + ###### Repository/Build Configurations - These values can be configured to match your app requirements. ###### + # For more information regarding Static Web App workflow configurations, please visit: https://aka.ms/swaworkflowconfig + app_location: "/" # App source code path + api_location: "" # Api source code path - optional + output_location: "" # Built app content directory - optional + ###### End of Repository/Build Configurations ###### + + close_pull_request_job: + if: github.event_name == 'pull_request' && github.event.action == 'closed' + runs-on: ubuntu-latest + name: Close Pull Request Job + steps: + - name: Close Pull Request + id: closepullrequest + uses: Azure/static-web-apps-deploy@v1 + with: + azure_static_web_apps_api_token: ${{ secrets.AZURE_STATIC_WEB_APPS_API_TOKEN_PROUD_SMOKE_0849E8603 }} + action: "close" From d20311929d8892e6e35ae3524266e02f5f4e144a Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Tue, 10 Oct 2023 01:18:40 +0200 Subject: [PATCH 101/158] Permissions and app approval base --- public/PermissionsList.json | 7973 +++++++++++++++++++++++++++++++++ src/views/cipp/AppApproval.js | 387 +- 2 files changed, 8170 insertions(+), 190 deletions(-) create mode 100644 public/PermissionsList.json diff --git a/public/PermissionsList.json b/public/PermissionsList.json new file mode 100644 index 000000000000..c91c29126036 --- /dev/null +++ b/public/PermissionsList.json @@ -0,0 +1,7973 @@ +[ + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read access reviews, reviewers, decisions and settings in the organization, without a signed-in user.", + "displayName": "Read all access reviews", + "id": "d07a8cc0-3d51-4b77-b3b0-32704d1f69fa", + "isEnabled": true, + "origin": "Application", + "value": "AccessReview.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read, update, delete and perform actions on access reviews, reviewers, decisions and settings in the organization, without a signed-in user.", + "displayName": "Manage all access reviews", + "id": "ef5f7d5c-338f-44b0-86c3-351f46c8bb5f", + "isEnabled": true, + "origin": "Application", + "value": "AccessReview.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read, update, delete and perform actions on access reviews, reviewers, decisions and settings in the organization for group and app memberships, without a signed-in user.", + "displayName": "Manage access reviews for group and app memberships", + "id": "18228521-a591-40f1-b215-5fad4488c117", + "isEnabled": true, + "origin": "Application", + "value": "AccessReview.ReadWrite.Membership" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows an app to read all acronyms without a signed-in user.", + "displayName": "Read all acronyms", + "id": "8c0aed2c-0c61-433d-b63c-6370ddc73248", + "isEnabled": true, + "origin": "Application", + "value": "Acronym.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read administrative units and administrative unit membership without a signed-in user.", + "displayName": "Read all administrative units", + "id": "134fd756-38ce-4afd-ba33-e9623dbe66c2", + "isEnabled": true, + "origin": "Application", + "value": "AdministrativeUnit.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create, read, update, and delete administrative units and manage administrative unit membership without a signed-in user.", + "displayName": "Read and write all administrative units", + "id": "5eb59dd3-1da2-4329-8733-9dabdc435916", + "isEnabled": true, + "origin": "Application", + "value": "AdministrativeUnit.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read terms of use agreements, without a signed in user.", + "displayName": "Read all terms of use agreements", + "id": "2f3e6f8c-093b-4c57-a58b-ba5ce494a169", + "isEnabled": true, + "origin": "Application", + "value": "Agreement.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write terms of use agreements, without a signed in user.", + "displayName": "Read and write all terms of use agreements", + "id": "c9090d00-6101-42f0-a729-c41074260d47", + "isEnabled": true, + "origin": "Application", + "value": "Agreement.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read terms of use acceptance statuses, without a signed in user.", + "displayName": "Read all terms of use acceptance statuses", + "id": "d8e4ec18-f6c0-4620-8122-c8b1f2bf400e", + "isEnabled": true, + "origin": "Application", + "value": "AgreementAcceptance.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the API connectors used in user authentication flows, without a signed-in user.", + "displayName": "Read API connectors for authentication flows", + "id": "b86848a7-d5b1-41eb-a9b4-54a4e6306e97", + "isEnabled": true, + "origin": "Application", + "value": "APIConnectors.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read, create and manage the API connectors used in user authentication flows, without a signed-in user.", + "displayName": "Read and write API connectors for authentication flows", + "id": "1dfe531a-24a6-4f1b-80f4-7a0dc5a0a171", + "isEnabled": true, + "origin": "Application", + "value": "APIConnectors.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read apps in the app catalogs without a signed-in user.", + "displayName": "Read all app catalogs", + "id": "e12dae10-5a57-4817-b79d-dfbec5348930", + "isEnabled": true, + "origin": "Application", + "value": "AppCatalog.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create, read, update, and delete apps in the app catalogs without a signed-in user.", + "displayName": "Read and write to all app catalogs", + "id": "dc149144-f292-421e-b185-5953f2e98d7f", + "isEnabled": true, + "origin": "Application", + "value": "AppCatalog.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write the remote desktop security configuration for all apps in your organization, without a signed-in user.", + "displayName": "Read and write the remote desktop security configuration for all apps", + "id": "3be0012a-cc4e-426b-895b-f9c836bf6381", + "isEnabled": true, + "origin": "Application", + "value": "Application-RemoteDesktopConfig.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all applications and service principals without a signed-in user.", + "displayName": "Read all applications", + "id": "9a5d68dd-52b0-4cc2-bd40-abcf44ac3a30", + "isEnabled": true, + "origin": "Application", + "value": "Application.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create, read, update and delete applications and service principals without a signed-in user. Does not allow management of consent grants.", + "displayName": "Read and write all applications", + "id": "1bfefb4e-e0b5-418b-a88f-73c46d2cc8e9", + "isEnabled": true, + "origin": "Application", + "value": "Application.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create other applications, and fully manage those applications (read, update, update application secrets and delete), without a signed-in user.  It cannot update any apps that it is not an owner of.", + "displayName": "Manage apps that this app creates or owns", + "id": "18a4783c-866b-4cc7-a460-3d5e5662c884", + "isEnabled": true, + "origin": "Application", + "value": "Application.ReadWrite.OwnedBy" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to manage permission grants for application permissions to any API (including Microsoft Graph) and application assignments for any app, without a signed-in user.", + "displayName": "Manage app permission grants and app role assignments", + "id": "06b708a9-e830-4db3-a914-8e69da51d44f", + "isEnabled": true, + "origin": "Application", + "value": "AppRoleAssignment.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read attack simulation and training data for an organization without a signed-in user.", + "displayName": "Read attack simulation data of an organization", + "id": "93283d0a-6322-4fa8-966b-8c121624760d", + "isEnabled": true, + "origin": "Application", + "value": "AttackSimulation.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read, create, and update attack simulation and training data for an organization without a signed-in user.", + "displayName": "Read, create, and update all attack simulation data of an organization", + "id": "e125258e-8c8a-42a8-8f55-ab502afa52f3", + "isEnabled": true, + "origin": "Application", + "value": "AttackSimulation.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and query your audit log activities, without a signed-in user.", + "displayName": "Read all audit log data", + "id": "b0afded3-3588-46d8-8b3d-9842eff778da", + "isEnabled": true, + "origin": "Application", + "value": "AuditLog.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the authentication context information in your organization without a signed-in user.", + "displayName": "Read all authentication context information", + "id": "381f742f-e1f8-4309-b4ab-e3d91ae4c5c1", + "isEnabled": true, + "origin": "Application", + "value": "AuthenticationContext.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and update the authentication context information in your organization without a signed-in user.", + "displayName": "Read and write all authentication context information", + "id": "a88eef72-fed0-4bf7-a2a9-f19df33f8b83", + "isEnabled": true, + "origin": "Application", + "value": "AuthenticationContext.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write the billing configuration on all applications without a signed-in user. ", + "displayName": "Read and write application billing configuration", + "id": "9e8be751-7eee-4c09-bcfd-d64f6b087fd8", + "isEnabled": true, + "origin": "Application", + "value": "BillingConfiguration.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows an app to read Bookings appointments, businesses, customers, services, and staff without a signed-in user. ", + "displayName": "Read all Bookings related resources.", + "id": "6e98f277-b046-4193-a4f2-6bf6a78cd491", + "isEnabled": true, + "origin": "Application", + "value": "Bookings.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows an app to read and write Bookings appointments and customers, and additionally allows reading businesses, services, and staff without a signed-in user. ", + "displayName": "Read and write all Bookings related resources.", + "id": "9769393e-5a9f-4302-9e3d-7e018ecb64a7", + "isEnabled": true, + "origin": "Application", + "value": "BookingsAppointment.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows an app to read all bookmarks without a signed-in user.", + "displayName": "Read all bookmarks", + "id": "be95e614-8ef3-49eb-8464-1c9503433b86", + "isEnabled": true, + "origin": "Application", + "value": "Bookmark.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows an app to read all browser site lists configured for your organization, without a signed-in user.", + "displayName": "Read all browser site lists for your organization", + "id": "c5ee1f21-fc7f-4937-9af0-c91648ff9597", + "isEnabled": true, + "origin": "Application", + "value": "BrowserSiteLists.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows an app to read and write all browser site lists configured for your organization, without a signed-in user.", + "displayName": "Read and write all browser site lists for your organization", + "id": "8349ca94-3061-44d5-9bfb-33774ea5e4f9", + "isEnabled": true, + "origin": "Application", + "value": "BrowserSiteLists.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the configurations of business scenarios it owns, without a signed-in user.", + "displayName": "Read all business scenario configurations this app creates or owns", + "id": "acc0fc4d-2cd6-4194-8700-1768d8423d86", + "isEnabled": true, + "origin": "Application", + "value": "BusinessScenarioConfig.Read.OwnedBy" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create new business scenarios and fully manage the configurations of scenarios it owns, without a signed-in user.", + "displayName": "Read and write all business scenario configurations this app creates or owns", + "id": "bbea195a-4c47-4a4f-bff2-cba399e11698", + "isEnabled": true, + "origin": "Application", + "value": "BusinessScenarioConfig.ReadWrite.OwnedBy" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the data associated with the business scenarios it owns, without a signed-in user.", + "displayName": "Read data for all business scenarios this app creates or owns", + "id": "6c0257fd-cffe-415b-8239-2d0d70fdaa9c", + "isEnabled": true, + "origin": "Application", + "value": "BusinessScenarioData.Read.OwnedBy" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to fully manage the data associated with the business scenarios it owns, without a signed-in user.", + "displayName": "Read and write data for all business scenarios this app creates or owns", + "id": "f2d21f22-5d80-499e-91cc-0a8a4ce16f54", + "isEnabled": true, + "origin": "Application", + "value": "BusinessScenarioData.ReadWrite.OwnedBy" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read events of all calendars without a signed-in user.", + "displayName": "Read calendars in all mailboxes", + "id": "798ee544-9d2d-430c-a058-570e29e34338", + "isEnabled": true, + "origin": "Application", + "value": "Calendars.Read" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read events of all calendars, except for properties such as body, attachments, and extensions, without a signed-in user.", + "displayName": "Read basic details of calendars in all mailboxes ", + "id": "8ba4a692-bc31-4128-9094-475872af8a53", + "isEnabled": true, + "origin": "Application", + "value": "Calendars.ReadBasic.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create, read, update, and delete events of all calendars without a signed-in user.", + "displayName": "Read and write calendars in all mailboxes", + "id": "ef54d2bf-783f-4e0f-bca1-3210c0444d99", + "isEnabled": true, + "origin": "Application", + "value": "Calendars.ReadWrite" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read call event information for all users in your organizatio, without a signed-in user.", + "displayName": "Read all call events", + "id": "1abb026f-7572-49f6-9ddd-ad61cbba181e", + "isEnabled": true, + "origin": "Application", + "value": "CallEvents.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all PSTN and direct routing call log data without a signed-in user.", + "displayName": "Read PSTN and direct routing call log data", + "id": "a2611786-80b3-417e-adaa-707d4261a5f0", + "isEnabled": true, + "origin": "Application", + "value": "CallRecord-PstnCalls.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read call records for all calls and online meetings without a signed-in user.", + "displayName": "Read all call records", + "id": "45bbb07e-7321-4fd7-a8f6-3ff27e6a81c8", + "isEnabled": true, + "origin": "Application", + "value": "CallRecords.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to get direct access to media streams in a call, without a signed-in user.", + "displayName": "Access media streams in a call as an app", + "id": "a7a681dc-756e-4909-b988-f160edc6655f", + "isEnabled": true, + "origin": "Application", + "value": "Calls.AccessMedia.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to place outbound calls to a single user and transfer calls to users in your organization’s directory, without a signed-in user.", + "displayName": "Initiate outgoing 1 to 1 calls from the app", + "id": "284383ee-7f6e-4e40-a2a8-e85dcb029101", + "isEnabled": true, + "origin": "Application", + "value": "Calls.Initiate.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to place outbound calls to multiple users and add participants to meetings in your organization, without a signed-in user.", + "displayName": "Initiate outgoing group calls from the app", + "id": "4c277553-8a09-487b-8023-29ee378d8324", + "isEnabled": true, + "origin": "Application", + "value": "Calls.InitiateGroupCall.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to join group calls and scheduled meetings in your organization, without a signed-in user.  The app will be joined with the privileges of a directory user to meetings in your organization.", + "displayName": "Join group calls and meetings as an app", + "id": "f6b49018-60ab-4f81-83bd-22caeabfed2d", + "isEnabled": true, + "origin": "Application", + "value": "Calls.JoinGroupCall.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to anonymously join group calls and scheduled meetings in your organization, without a signed-in user.  The app will be joined as a guest to meetings in your organization.", + "displayName": "Join group calls and meetings as a guest", + "id": "fd7ccf6b-3d28-418b-9701-cd10f5cd2fd4", + "isEnabled": true, + "origin": "Application", + "value": "Calls.JoinGroupCallAsGuest.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Create channels in any team, without a signed-in user.", + "displayName": "Create channels", + "id": "f3a65bd4-b703-46df-8f7e-0174fea562aa", + "isEnabled": true, + "origin": "Application", + "value": "Channel.Create" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Delete channels in any team, without a signed-in user.", + "displayName": "Delete channels", + "id": "6a118a39-1227-45d4-af0c-ea7b40d210bc", + "isEnabled": true, + "origin": "Application", + "value": "Channel.Delete.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Read all channel names and channel descriptions, without a signed-in user.", + "displayName": "Read the names and descriptions of all channels", + "id": "59a6b24b-4225-4393-8165-ebaec5f55d7a", + "isEnabled": true, + "origin": "Application", + "value": "Channel.ReadBasic.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Read the members of all channels, without a signed-in user.", + "displayName": "Read the members of all channels", + "id": "3b55498e-47ec-484f-8136-9013221c06a9", + "isEnabled": true, + "origin": "Application", + "value": "ChannelMember.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Add and remove members from all channels, without a signed-in user. Also allows changing a member's role, for example from owner to non-owner.", + "displayName": "Add and remove members from all channels", + "id": "35930dcf-aceb-4bd1-b99a-8ffed403c974", + "isEnabled": true, + "origin": "Application", + "value": "ChannelMember.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all channel messages in Microsoft Teams", + "displayName": "Read all channel messages", + "id": "7b2449af-6ccd-4f4d-9f78-e550c193f0d1", + "isEnabled": true, + "origin": "Application", + "value": "ChannelMessage.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to update Microsoft Teams channel messages by patching a set of Data Loss Prevention (DLP) policy violation properties to handle the output of DLP processing.", + "displayName": "Flag channel messages for violating policy", + "id": "4d02b0cc-d90b-441f-8d82-4fb55c34d6bb", + "isEnabled": true, + "origin": "Application", + "value": "ChannelMessage.UpdatePolicyViolation.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Read all channel names, channel descriptions, and channel settings, without a signed-in user.", + "displayName": "Read the names, descriptions, and settings of all channels", + "id": "c97b873f-f59f-49aa-8a0e-52b32d762124", + "isEnabled": true, + "origin": "Application", + "value": "ChannelSettings.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Read and write the names, descriptions, and settings of all channels, without a signed-in user.", + "displayName": "Read and write the names, descriptions, and settings of all channels", + "id": "243cded2-bd16-4fd6-a953-ff8177894c3d", + "isEnabled": true, + "origin": "Application", + "value": "ChannelSettings.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create chats without a signed-in user. ", + "displayName": "Create chats", + "id": "d9c48af6-9ad9-47ad-82c3-63757137b9af", + "isEnabled": true, + "origin": "Application", + "value": "Chat.Create" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to delete and recover deleted chats, without a signed-in user.", + "displayName": "Delete and recover deleted chats", + "id": "9c7abde0-eacd-4319-bf9e-35994b1a1717", + "isEnabled": true, + "origin": "Application", + "value": "Chat.ManageDeletion.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all 1-to-1 or group chat messages in Microsoft Teams.", + "displayName": "Read all chat messages", + "id": "6b7d71aa-70aa-4810-a8d9-5d9fb2830017", + "isEnabled": true, + "origin": "Application", + "value": "Chat.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all one-to-one or group chat messages in Microsoft Teams for chats where the associated Teams application is installed, without a signed-in user.", + "displayName": "Read all chat messages for chats where the associated Teams application is installed.", + "id": "1c1b4c8e-3cc7-4c58-8470-9b92c9d5848b", + "isEnabled": true, + "origin": "Application", + "value": "Chat.Read.WhereInstalled" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Read names and members of all one-to-one and group chats in Microsoft Teams, without a signed-in user.", + "displayName": "Read names and members of all chat threads", + "id": "b2e060da-3baf-4687-9611-f4ebc0f0cbde", + "isEnabled": true, + "origin": "Application", + "value": "Chat.ReadBasic.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read names and members of all one-to-one and group chats in Microsoft Teams where the associated Teams application is installed, without a signed-in user.", + "displayName": "Read names and members of all chat threads where the associated Teams application is installed.", + "id": "818ba5bd-5b3e-4fe0-bbe6-aa4686669073", + "isEnabled": true, + "origin": "Application", + "value": "Chat.ReadBasic.WhereInstalled" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows an app to read and write all chat messages in Microsoft Teams, without a signed-in user.", + "displayName": "Read and write all chat messages", + "id": "294ce7c9-31ba-490a-ad7d-97a7d075e4ed", + "isEnabled": true, + "origin": "Application", + "value": "Chat.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write all chat messages in Microsoft Teams for chats where the associated Teams application is installed, without a signed-in user.", + "displayName": "Read and write all chat messages for chats where the associated Teams application is installed.", + "id": "ad73ce80-f3cd-40ce-b325-df12c33df713", + "isEnabled": true, + "origin": "Application", + "value": "Chat.ReadWrite.WhereInstalled" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to update Microsoft Teams 1-to-1 or group chat messages by patching a set of Data Loss Prevention (DLP) policy violation properties to handle the output of DLP processing.", + "displayName": "Flag chat messages for violating policy", + "id": "7e847308-e030-4183-9899-5235d7270f58", + "isEnabled": true, + "origin": "Application", + "value": "Chat.UpdatePolicyViolation.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Read the members of all chats, without a signed-in user.", + "displayName": "Read the members of all chats", + "id": "a3410be2-8e48-4f32-8454-c29a7465209d", + "isEnabled": true, + "origin": "Application", + "value": "ChatMember.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the members of all chats where the associated Teams application is installed, without a signed-in user.", + "displayName": "Read the members of all chats where the associated Teams application is installed.", + "id": "93e7c9e4-54c5-4a41-b796-f2a5adaacda7", + "isEnabled": true, + "origin": "Application", + "value": "ChatMember.Read.WhereInstalled" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Add and remove members from all chats, without a signed-in user.", + "displayName": "Add and remove members from all chats", + "id": "57257249-34ce-4810-a8a2-a03adf0c5693", + "isEnabled": true, + "origin": "Application", + "value": "ChatMember.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to add and remove members from all chats where the associated Teams application is installed, without a signed-in user.", + "displayName": "Add and remove members from all chats where the associated Teams application is installed.", + "id": "e32c2cd9-0124-4e44-88fc-772cd98afbdb", + "isEnabled": true, + "origin": "Application", + "value": "ChatMember.ReadWrite.WhereInstalled" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all one-to-one and group chats messages in Microsoft Teams, without a signed-in user.", + "displayName": "Read all chat messages", + "id": "b9bb2381-47a4-46cd-aafb-00cb12f68504", + "isEnabled": true, + "origin": "Application", + "value": "ChatMessage.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all details of discovered cloud apps in the organization, without a signed-in user.", + "displayName": "Read all discovered cloud applications data", + "id": "64a59178-dad3-4673-89db-84fdcd622fec", + "isEnabled": true, + "origin": "Application", + "value": "CloudApp-Discovery.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the properties of Cloud PCs, without a signed-in user.", + "displayName": "Read Cloud PCs", + "id": "a9e09520-8ed4-4cde-838e-4fdea192c227", + "isEnabled": true, + "origin": "Application", + "value": "CloudPC.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write the properties of Cloud PCs, without a signed-in user.", + "displayName": "Read and write Cloud PCs", + "id": "3b4349e1-8cf5-45a3-95b7-69d1751d3e6a", + "isEnabled": true, + "origin": "Application", + "value": "CloudPC.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read consent requests and approvals without a signed-in user.", + "displayName": "Read all consent requests", + "id": "1260ad83-98fb-4785-abbb-d6cc1806fd41", + "isEnabled": true, + "origin": "Application", + "value": "ConsentRequest.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read app consent requests and approvals, and deny or approve those requests without a signed-in user.", + "displayName": "Read and write all consent requests", + "id": "9f1b81a7-0223-4428-bfa4-0bcb5535f27d", + "isEnabled": true, + "origin": "Application", + "value": "ConsentRequest.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all contacts in all mailboxes without a signed-in user.", + "displayName": "Read contacts in all mailboxes", + "id": "089fe4d0-434a-44c5-8827-41ba8a0b17f5", + "isEnabled": true, + "origin": "Application", + "value": "Contacts.Read" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create, read, update, and delete all contacts in all mailboxes without a signed-in user.", + "displayName": "Read and write contacts in all mailboxes", + "id": "6918b873-d17a-4dc1-b314-35f528134491", + "isEnabled": true, + "origin": "Application", + "value": "Contacts.ReadWrite" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to obtain basic tenant information about another target tenant within the Azure AD ecosystem without a signed-in user.", + "displayName": "Read cross-tenant basic information", + "id": "cac88765-0581-4025-9725-5ebc13f729ee", + "isEnabled": true, + "origin": "Application", + "value": "CrossTenantInformation.ReadBasic.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to list and query any shared user profile information associated with the current tenant without a signed-in user.  It also permits the application to export external user data (e.g. customer content or system-generated logs), for any user associated with the current tenant without a signed-in user.", + "displayName": "Read all shared cross-tenant user profiles and export their data", + "id": "8b919d44-6192-4f3d-8a3b-f86f8069ae3c", + "isEnabled": true, + "origin": "Application", + "value": "CrossTenantUserProfileSharing.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to list and query any shared user profile information associated with the current tenant without a signed-in user.  It also permits the application to export and remove external user data (e.g. customer content or system-generated logs), for any user associated with the current tenant without a signed-in user.", + "displayName": "Read all shared cross-tenant user profiles and export or delete their data", + "id": "306785c5-c09b-4ba0-a4ee-023f3da165cb", + "isEnabled": true, + "origin": "Application", + "value": "CrossTenantUserProfileSharing.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read your organization's custom authentication extensions without a signed-in user.", + "displayName": "Read all custom authentication extensions", + "id": "88bb2658-5d9e-454f-aacd-a3933e079526", + "isEnabled": true, + "origin": "Application", + "value": "CustomAuthenticationExtension.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read or write your organization's custom authentication extensions without a signed-in user.", + "displayName": "Read and write all custom authentication extensions", + "id": "c2667967-7050-4e7e-b059-4cbbb3811d03", + "isEnabled": true, + "origin": "Application", + "value": "CustomAuthenticationExtension.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows custom authentication extensions associated with the app to receive HTTP requests triggered by an authentication event. The request can include information about a user, client and resource service principals, and other information about the authentication.", + "displayName": "Receive custom authentication extension HTTP requests", + "id": "214e810f-fda8-4fd7-a475-29461495eb00", + "isEnabled": true, + "origin": "Application", + "value": "CustomAuthenticationExtension.Receive.Payload" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read custom security attribute assignments for all principals in the tenant without a signed in user.", + "displayName": "Read custom security attribute assignments", + "id": "3b37c5a4-1226-493d-bec3-5d6c6b866f3f", + "isEnabled": true, + "origin": "Application", + "value": "CustomSecAttributeAssignment.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write custom security attribute assignments for all principals in the tenant without a signed in user.", + "displayName": "Read and write custom security attribute assignments", + "id": "de89b5e4-5b8f-48eb-8925-29c2b33bd8bd", + "isEnabled": true, + "origin": "Application", + "value": "CustomSecAttributeAssignment.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all audit logs for events that contain information about custom security attributes, without a signed-in user.", + "displayName": "Read all custom security attribute audit logs", + "id": "2a4f026d-e829-4e84-bdbf-d981a2703059", + "isEnabled": true, + "origin": "Application", + "value": "CustomSecAttributeAuditLogs.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read custom security attribute definitions for the tenant without a signed in user.", + "displayName": "Read custom security attribute definitions", + "id": "b185aa14-d8d2-42c1-a685-0f5596613624", + "isEnabled": true, + "origin": "Application", + "value": "CustomSecAttributeDefinition.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write custom security attribute definitions for the tenant without a signed in user.", + "displayName": "Read and write custom security attribute definitions", + "id": "12338004-21f4-4896-bf5e-b75dfaf1016d", + "isEnabled": true, + "origin": "Application", + "value": "CustomSecAttributeDefinition.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read details of delegated admin relationships with customers like access details (that includes roles) and the duration as well as specific role assignments to security groups without a signed-in user.", + "displayName": "Read Delegated Admin relationships with customers", + "id": "f6e9e124-4586-492f-adc0-c6f96e4823fd", + "isEnabled": true, + "origin": "Application", + "value": "DelegatedAdminRelationship.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to manage (create-update-terminate) Delegated Admin relationships with customers and role assignments to security groups for active Delegated Admin relationships without a signed-in user.", + "displayName": "Manage Delegated Admin relationships with customers", + "id": "cc13eba4-8cd8-44c6-b4d4-f93237adce58", + "isEnabled": true, + "origin": "Application", + "value": "DelegatedAdminRelationship.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all delegated permission grants, without a signed-in user.", + "displayName": "Read all delegated permission grants", + "id": "81b4724a-58aa-41c1-8a55-84ef97466587", + "isEnabled": true, + "origin": "Application", + "value": "DelegatedPermissionGrant.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to manage permission grants for delegated permissions exposed by any API (including Microsoft Graph), without a signed-in user.", + "displayName": "Manage all delegated permission grants", + "id": "8e8e4742-1d95-4f68-9d56-6ee75648c72a", + "isEnabled": true, + "origin": "Application", + "value": "DelegatedPermissionGrant.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read your organization's devices' configuration information without a signed-in user.", + "displayName": "Read all devices", + "id": "7438b122-aefc-4978-80ed-43db9fcc7715", + "isEnabled": true, + "origin": "Application", + "value": "Device.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write all device properties without a signed in user. Does not allow device creation, device deletion or update of device alternative security identifiers.", + "displayName": "Read and write devices", + "id": "1138cb37-bd11-4084-a2b7-9f71582aeddb", + "isEnabled": true, + "origin": "Application", + "value": "Device.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read device local credential properties including passwords, without a signed-in user.", + "displayName": "Read device local credential passwords", + "id": "884b599e-4d48-43a5-ba94-15c414d00588", + "isEnabled": true, + "origin": "Application", + "value": "DeviceLocalCredential.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read device local credential properties excluding passwords, without a signed-in user.", + "displayName": "Read device local credential properties", + "id": "db51be59-e728-414b-b800-e0f010df1a79", + "isEnabled": true, + "origin": "Application", + "value": "DeviceLocalCredential.ReadBasic.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the properties, group assignments and status of apps, app configurations and app protection policies managed by Microsoft Intune, without a signed-in user.", + "displayName": "Read Microsoft Intune apps", + "id": "7a6ee1e7-141e-4cec-ae74-d9db155731ff", + "isEnabled": true, + "origin": "Application", + "value": "DeviceManagementApps.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write the properties, group assignments and status of apps, app configurations and app protection policies managed by Microsoft Intune, without a signed-in user.", + "displayName": "Read and write Microsoft Intune apps", + "id": "78145de6-330d-4800-a6ce-494ff2d33d07", + "isEnabled": true, + "origin": "Application", + "value": "DeviceManagementApps.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read properties of Microsoft Intune-managed device configuration and device compliance policies and their assignment to groups, without a signed-in user.", + "displayName": "Read Microsoft Intune device configuration and policies", + "id": "dc377aa6-52d8-4e23-b271-2a7ae04cedf3", + "isEnabled": true, + "origin": "Application", + "value": "DeviceManagementConfiguration.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write properties of Microsoft Intune-managed device configuration and device compliance policies and their assignment to groups, without a signed-in user.", + "displayName": "Read and write Microsoft Intune device configuration and policies", + "id": "9241abd9-d0e6-425a-bd4f-47ba86e767a4", + "isEnabled": true, + "origin": "Application", + "value": "DeviceManagementConfiguration.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to perform remote high impact actions such as wiping the device or resetting the passcode on devices managed by Microsoft Intune, without a signed-in user.", + "displayName": "Perform user-impacting remote actions on Microsoft Intune devices", + "id": "5b07b0dd-2377-4e44-a38d-703f09a0dc3c", + "isEnabled": true, + "origin": "Application", + "value": "DeviceManagementManagedDevices.PrivilegedOperations.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the properties of devices managed by Microsoft Intune, without a signed-in user.", + "displayName": "Read Microsoft Intune devices", + "id": "2f51be20-0bb4-4fed-bf7b-db946066c75e", + "isEnabled": true, + "origin": "Application", + "value": "DeviceManagementManagedDevices.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write the properties of devices managed by Microsoft Intune, without a signed-in user. Does not allow high impact operations such as remote wipe and password reset on the device’s owner", + "displayName": "Read and write Microsoft Intune devices", + "id": "243333ab-4d21-40cb-a475-36241daa0842", + "isEnabled": true, + "origin": "Application", + "value": "DeviceManagementManagedDevices.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the properties relating to the Microsoft Intune Role-Based Access Control (RBAC) settings, without a signed-in user.", + "displayName": "Read Microsoft Intune RBAC settings", + "id": "58ca0d9a-1575-47e1-a3cb-007ef2e4583b", + "isEnabled": true, + "origin": "Application", + "value": "DeviceManagementRBAC.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write the properties relating to the Microsoft Intune Role-Based Access Control (RBAC) settings, without a signed-in user.", + "displayName": "Read and write Microsoft Intune RBAC settings", + "id": "e330c4f0-4170-414e-a55a-2f022ec2b57b", + "isEnabled": true, + "origin": "Application", + "value": "DeviceManagementRBAC.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read Microsoft Intune service properties including device enrollment and third party service connection configuration, without a signed-in user.", + "displayName": "Read Microsoft Intune configuration", + "id": "06a5fe6d-c49d-46a7-b082-56b1b14103c7", + "isEnabled": true, + "origin": "Application", + "value": "DeviceManagementServiceConfig.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write Microsoft Intune service properties including device enrollment and third party service connection configuration, without a signed-in user.", + "displayName": "Read and write Microsoft Intune configuration", + "id": "5ac13192-7ace-4fcf-b828-1a26f28068ee", + "isEnabled": true, + "origin": "Application", + "value": "DeviceManagementServiceConfig.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read data in your organization's directory, such as users, groups and apps, without a signed-in user.", + "displayName": "Read directory data", + "id": "7ab1d382-f21e-4acd-a863-ba3e13f7da61", + "isEnabled": true, + "origin": "Application", + "value": "Directory.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write data in your organization's directory, such as users, and groups, without a signed-in user. Does not allow user or group deletion.", + "displayName": "Read and write directory data", + "id": "19dbc75e-c2e2-444c-a770-ec69d8559fc7", + "isEnabled": true, + "origin": "Application", + "value": "Directory.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to manage restricted resources based on the other permissions granted to the app, without a signed-in user.", + "displayName": "Manage restricted resources in the directory", + "id": "f20584af-9290-4153-9280-ff8bb2c0ea7f", + "isEnabled": true, + "origin": "Application", + "value": "Directory.Write.Restricted" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all Azure AD recommendations, without a signed-in user. ", + "displayName": "Read all Azure AD recommendations", + "id": "ae73097b-cb2a-4447-b064-5d80f6093921", + "isEnabled": true, + "origin": "Application", + "value": "DirectoryRecommendations.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and update all Azure AD recommendations, without a signed-in user. ", + "displayName": "Read and update all Azure AD recommendations", + "id": "0e9eea12-4f01-45f6-9b8d-3ea4c8144158", + "isEnabled": true, + "origin": "Application", + "value": "DirectoryRecommendations.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all domain properties without a signed-in user.", + "displayName": "Read domains", + "id": "dbb9058a-0e50-45d7-ae91-66909b5d4664", + "isEnabled": true, + "origin": "Application", + "value": "Domain.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write all domain properties without a signed in user.  Also allows the app to add,  verify and remove domains.", + "displayName": "Read and write domains", + "id": "7e05723c-0bb0-42da-be95-ae9f08a6e53c", + "isEnabled": true, + "origin": "Application", + "value": "Domain.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read eDiscovery objects such as cases, custodians, review sets and other related objects without a signed-in user.", + "displayName": "Read all eDiscovery objects", + "id": "50180013-6191-4d1e-a373-e590ff4e66af", + "isEnabled": true, + "origin": "Application", + "value": "eDiscovery.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write eDiscovery objects such as cases, custodians, review sets and other related objects without a signed-in user.", + "displayName": "Read and write all eDiscovery objects", + "id": "b2620db1-3bf7-4c5b-9cb9-576d29eac736", + "isEnabled": true, + "origin": "Application", + "value": "eDiscovery.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Read the state and settings of all Microsoft education apps.", + "displayName": "Read Education app settings", + "id": "7c9db06a-ec2d-4e7b-a592-5a1e30992566", + "isEnabled": true, + "origin": "Application", + "value": "EduAdministration.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Manage the state and settings of all Microsoft education apps.", + "displayName": "Manage education app settings", + "id": "9bc431c3-b8bc-4a8d-a219-40f10f92eff6", + "isEnabled": true, + "origin": "Application", + "value": "EduAdministration.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all class assignments with grades for all users without a signed-in user.", + "displayName": "Read all class assignments with grades", + "id": "4c37e1b6-35a1-43bf-926a-6f30f2cdf585", + "isEnabled": true, + "origin": "Application", + "value": "EduAssignments.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all class assignments without grades for all users without a signed-in user.", + "displayName": "Read all class assignments without grades", + "id": "6e0a958b-b7fc-4348-b7c4-a6ab9fd3dd0e", + "isEnabled": true, + "origin": "Application", + "value": "EduAssignments.ReadBasic.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create, read, update and delete all class assignments with grades for all users without a signed-in user.", + "displayName": "Create, read, update and delete all class assignments with grades", + "id": "0d22204b-6cad-4dd0-8362-3e3f2ae699d9", + "isEnabled": true, + "origin": "Application", + "value": "EduAssignments.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create, read, update and delete all class assignments without grades for all users without a signed-in user.", + "displayName": "Create, read, update and delete all class assignments without grades", + "id": "f431cc63-a2de-48c4-8054-a34bc093af84", + "isEnabled": true, + "origin": "Application", + "value": "EduAssignments.ReadWriteBasic.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all modules and resources, without a signed-in user.", + "displayName": "Read all class modules and resources", + "id": "6cdb464c-3a03-40f8-900b-4cb7ea1da9c0", + "isEnabled": true, + "origin": "Application", + "value": "EduCurricula.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write all modules and resources, without a signed-in user.", + "displayName": "Read and write all class modules and resources", + "id": "6a0c2318-d59d-4c7d-bf2e-5f3902dc2593", + "isEnabled": true, + "origin": "Application", + "value": "EduCurricula.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the structure of schools and classes in the organization's roster and education-specific information about all users to be read.", + "displayName": "Read the organization's roster", + "id": "e0ac9e1b-cb65-4fc5-87c5-1a8bc181f648", + "isEnabled": true, + "origin": "Application", + "value": "EduRoster.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read a limited subset of properties from both the structure of schools and classes in the organization's roster and education-specific information about all users. Includes name, status, role, email address and photo.", + "displayName": "Read a limited subset of the organization's roster", + "id": "0d412a8c-a06c-439f-b3ec-8abcf54d2f96", + "isEnabled": true, + "origin": "Application", + "value": "EduRoster.ReadBasic.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write the structure of schools and classes in the organization's roster and education-specific information about all users to be read and written.", + "displayName": "Read and write the organization's roster", + "id": "d1808e82-ce13-47af-ae0d-f9b254e6d58a", + "isEnabled": true, + "origin": "Application", + "value": "EduRoster.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read access packages and related entitlement management resources without a signed-in user.", + "displayName": "Read all entitlement management resources", + "id": "c74fd47d-ed3c-45c3-9a9e-b8676de685d2", + "isEnabled": true, + "origin": "Application", + "value": "EntitlementManagement.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write access packages and related entitlement management resources without a signed-in user.", + "displayName": "Read and write all entitlement management resources", + "id": "9acd699f-1e81-4958-b001-93b1d2506e19", + "isEnabled": true, + "origin": "Application", + "value": "EntitlementManagement.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read your organization's authentication event listeners without a signed-in user.", + "displayName": "Read all authentication event listeners", + "id": "b7f6385c-6ce6-4639-a480-e23c42ed9784", + "isEnabled": true, + "origin": "Application", + "value": "EventListener.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read or write your organization's authentication event listeners without a signed-in user.", + "displayName": "Read and write all authentication event listeners", + "id": "0edf5e9e-4ce8-468a-8432-d08631d18c43", + "isEnabled": true, + "origin": "Application", + "value": "EventListener.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all external connections without a signed-in user.", + "displayName": "Read all external connections", + "id": "1914711b-a1cb-4793-b019-c2ce0ed21b8c", + "isEnabled": true, + "origin": "Application", + "value": "ExternalConnection.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write all external connections without a signed-in user.", + "displayName": "Read and write all external connections", + "id": "34c37bc0-2b40-4d5e-85e1-2365cd256d79", + "isEnabled": true, + "origin": "Application", + "value": "ExternalConnection.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write external connections without a signed-in user. The app can only read and write external connections that it is authorized to, or it can create new external connections. ", + "displayName": "Read and write external connections", + "id": "f431331c-49a6-499f-be1c-62af19c34a9d", + "isEnabled": true, + "origin": "Application", + "value": "ExternalConnection.ReadWrite.OwnedBy" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all external items without a signed-in user.", + "displayName": "Read all external items", + "id": "7a7cffad-37d2-4f48-afa4-c6ab129adcc2", + "isEnabled": true, + "origin": "Application", + "value": "ExternalItem.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allow the app to read or write items in all external datasets that the app is authorized to access", + "displayName": "Read and write items in external datasets", + "id": "38c3d6ee-69ee-422f-b954-e17819665354", + "isEnabled": true, + "origin": "Application", + "value": "ExternalItem.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write external items without a signed-in user. The app can only read external items of the connection that it is authorized to.", + "displayName": "Read and write external items", + "id": "8116ae0f-55c2-452d-9944-d18420f5b2c8", + "isEnabled": true, + "origin": "Application", + "value": "ExternalItem.ReadWrite.OwnedBy" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all files in all site collections without a signed in user.", + "displayName": "Read files in all site collections", + "id": "01d4889c-1287-42c6-ac1f-5d1e02578ef6", + "isEnabled": true, + "origin": "Application", + "value": "Files.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read, create, update and delete all files in all site collections without a signed in user. ", + "displayName": "Read and write files in all site collections", + "id": "75359482-378d-4052-8f01-80520e7db3cd", + "isEnabled": true, + "origin": "Application", + "value": "Files.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create groups without a signed-in user.", + "displayName": "Create groups", + "id": "bf7b1a76-6e77-406b-b258-bf5c7720e98f", + "isEnabled": true, + "origin": "Application", + "value": "Group.Create" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read group properties and memberships, and read conversations for all groups, without a signed-in user.", + "displayName": "Read all groups", + "id": "5b567255-7703-4780-807c-7be8301ae99b", + "isEnabled": true, + "origin": "Application", + "value": "Group.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create groups, read all group properties and memberships, update group properties and memberships, and delete groups. Also allows the app to read and write conversations. All of these operations can be performed by the app without a signed-in user.", + "displayName": "Read and write all groups", + "id": "62a82d76-70ea-41e2-9197-370581804d09", + "isEnabled": true, + "origin": "Application", + "value": "Group.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read memberships and basic group properties for all groups without a signed-in user.", + "displayName": "Read all group memberships", + "id": "98830695-27a2-44f7-8c18-0c3ebc9698f6", + "isEnabled": true, + "origin": "Application", + "value": "GroupMember.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to list groups, read basic properties, read and update the membership of the groups this app has access to without a signed-in user. Group properties and owners cannot be updated and groups cannot be deleted.", + "displayName": "Read and write all group memberships", + "id": "dbaae8cf-10b5-4b86-a4a1-f871c94c6695", + "isEnabled": true, + "origin": "Application", + "value": "GroupMember.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read your organization’s identity (authentication) providers’ properties without a signed in user.", + "displayName": "Read identity providers", + "id": "e321f0bb-e7f7-481e-bb28-e3b0b32d4bd0", + "isEnabled": true, + "origin": "Application", + "value": "IdentityProvider.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write your organization’s identity (authentication) providers’ properties without a signed in user.", + "displayName": "Read and write identity providers", + "id": "90db2b9a-d928-4d33-a4dd-8442ae3d41e4", + "isEnabled": true, + "origin": "Application", + "value": "IdentityProvider.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the identity risk event information for your organization without a signed in user.", + "displayName": "Read all identity risk event information", + "id": "6e472fd1-ad78-48da-a0f0-97ab2c6b769e", + "isEnabled": true, + "origin": "Application", + "value": "IdentityRiskEvent.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and update identity risk detection information for your organization without a signed-in user. Update operations include confirming risk event detections. ", + "displayName": "Read and write all risk detection information", + "id": "db06fb33-1953-4b7b-a2ac-f1e2c854f7ae", + "isEnabled": true, + "origin": "Application", + "value": "IdentityRiskEvent.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all risky service principal information for your organization, without a signed-in user.", + "displayName": "Read all identity risky service principal information", + "id": "607c7344-0eed-41e5-823a-9695ebe1b7b0", + "isEnabled": true, + "origin": "Application", + "value": "IdentityRiskyServicePrincipal.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and update identity risky service principal for your organization, without a signed-in user.", + "displayName": "Read and write all identity risky service principal information", + "id": "cb8d6980-6bcb-4507-afec-ed6de3a2d798", + "isEnabled": true, + "origin": "Application", + "value": "IdentityRiskyServicePrincipal.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the identity risky user information for your organization without a signed in user.", + "displayName": "Read all identity risky user information", + "id": "dc5007c0-2d7d-4c42-879c-2dab87571379", + "isEnabled": true, + "origin": "Application", + "value": "IdentityRiskyUser.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and update identity risky user information for your organization without a signed-in user.  Update operations include dismissing risky users.", + "displayName": "Read and write all risky user information", + "id": "656f6061-f9fe-4807-9708-6a2e0934df76", + "isEnabled": true, + "origin": "Application", + "value": "IdentityRiskyUser.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read your organization's user flows, without a signed-in user.", + "displayName": "Read all identity user flows", + "id": "1b0c317f-dd31-4305-9932-259a8b6e8099", + "isEnabled": true, + "origin": "Application", + "value": "IdentityUserFlow.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read or write your organization's user flows, without a signed-in user.", + "displayName": "Read and write all identity user flows", + "id": "65319a09-a2be-469d-8782-f6b07debf789", + "isEnabled": true, + "origin": "Application", + "value": "IdentityUserFlow.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read data connectors without a signed-in user.", + "displayName": "View data connector definitions", + "id": "7ab52c2f-a2ee-4d98-9ebc-725e3934aae2", + "isEnabled": true, + "origin": "Application", + "value": "IndustryData-DataConnector.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write data connectors without a signed-in user.", + "displayName": "Manage data connector definitions", + "id": "eda0971c-482e-4345-b28f-69c309cb8a34", + "isEnabled": true, + "origin": "Application", + "value": "IndustryData-DataConnector.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to upload data files to a data connector without a signed-in user.", + "displayName": "Upload files to a data connector", + "id": "9334c44b-a7c6-4350-8036-6bf8e02b4c1f", + "isEnabled": true, + "origin": "Application", + "value": "IndustryData-DataConnector.Upload" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read inbound data flows without a signed-in user.", + "displayName": "View inbound flow definitions", + "id": "305f6ba2-049a-4b1b-88bb-fe7e08758a00", + "isEnabled": true, + "origin": "Application", + "value": "IndustryData-InboundFlow.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write inbound data flows without a signed-in user.", + "displayName": "Manage inbound flow definitions", + "id": "e688c61f-d4c6-4d64-a197-3bcf6ba1d6ad", + "isEnabled": true, + "origin": "Application", + "value": "IndustryData-InboundFlow.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read reference definitions without a signed-in user.", + "displayName": "View reference definitions", + "id": "6ee891c3-74a4-4148-8463-0c834375dfaf", + "isEnabled": true, + "origin": "Application", + "value": "IndustryData-ReferenceDefinition.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read current and previous IndustryData runs without a signed-in user.", + "displayName": "View current and previous runs", + "id": "f6f5d10b-3024-4d1d-b674-aae4df4a1a73", + "isEnabled": true, + "origin": "Application", + "value": "IndustryData-Run.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read source system definitions without a signed-in user.", + "displayName": "View source system definitions", + "id": "bc167a60-39fe-4865-8b44-78400fc6ed03", + "isEnabled": true, + "origin": "Application", + "value": "IndustryData-SourceSystem.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write source system definitions without a signed-in user.", + "displayName": "Manage source system definitions", + "id": "7d866958-e06e-4dd6-91c6-a086b3f5cfeb", + "isEnabled": true, + "origin": "Application", + "value": "IndustryData-SourceSystem.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read time period definitions without a signed-in user.", + "displayName": "Read time period definitions", + "id": "7c55c952-b095-4c23-a522-022bce4cc1e3", + "isEnabled": true, + "origin": "Application", + "value": "IndustryData-TimePeriod.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write time period definitions without a signed-in user.", + "displayName": "Manage time period definitions", + "id": "7afa7744-a782-4a32-b8c2-e3db637e8de7", + "isEnabled": true, + "origin": "Application", + "value": "IndustryData-TimePeriod.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read basic service and resource information without a signed-in user.", + "displayName": "View basic service and resource information", + "id": "4f5ac95f-62fd-472c-b60f-125d24ca0bc5", + "isEnabled": true, + "origin": "Application", + "value": "IndustryData.ReadBasic.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all configurations applicable to users for protecting organizational data, without a signed-in user.", + "displayName": "Read all configurations for protecting organizational data applicable to users", + "id": "14f49b9f-4bf2-4d24-b80e-b27ec58409bd", + "isEnabled": true, + "origin": "Application", + "value": "InformationProtectionConfig.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows an app to sign digests for data without a signed-in user.", + "displayName": "Sign digests for data", + "id": "cbe6c7e4-09aa-4b8d-b3c3-2dbb59af4b54", + "isEnabled": true, + "origin": "Application", + "value": "InformationProtectionContent.Sign.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create protected content without a signed-in user. ", + "displayName": "Create protected content", + "id": "287bd98c-e865-4e8c-bade-1a85523195b9", + "isEnabled": true, + "origin": "Application", + "value": "InformationProtectionContent.Write.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows an app to read published sensitivity labels and label policy settings for the entire organization or a specific user, without a signed in user.", + "displayName": "Read all published labels and label policies for an organization.", + "id": "19da66cb-0fb0-4390-b071-ebc76a349482", + "isEnabled": true, + "origin": "Application", + "value": "InformationProtectionPolicy.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all insights related to guest activity, without a signed-in user.", + "displayName": "Read all insights related to guest activity", + "id": "e93bd8c0-c267-45ea-9722-9d3376a7e302", + "isEnabled": true, + "origin": "Application", + "value": "Insights-GuestActivity.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write all insights related to guest activity, without a signed-in user.", + "displayName": "Read and write all insights related to guest activity", + "id": "681ded65-ad9c-4d3d-8f7d-962f84cc13d8", + "isEnabled": true, + "origin": "Application", + "value": "Insights-GuestActivity.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read data for all assignments in the organization's directory, without a signed-in user.", + "displayName": "Read all assignments", + "id": "535e6066-2894-49ef-ab33-e2c6d064bb81", + "isEnabled": true, + "origin": "Application", + "value": "LearningAssignedCourse.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create, update, read and delete all assignments in the organization's directory, without a signed-in user.", + "displayName": "Read and write all assignments", + "id": "236c1cbd-1187-427f-b0f5-b1852454973b", + "isEnabled": true, + "origin": "Application", + "value": "LearningAssignedCourse.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all learning content in the organization's directory, without a signed-in user.", + "displayName": "Read all learning content", + "id": "8740813e-d8aa-4204-860e-2a0f8f84dbc8", + "isEnabled": true, + "origin": "Application", + "value": "LearningContent.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to manage all learning content in the organization's directory, without a signed-in user.", + "displayName": "Manage all learning content", + "id": "444d6fcb-b738-41e5-b103-ac4f2a2628a3", + "isEnabled": true, + "origin": "Application", + "value": "LearningContent.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read data for all self-initiated courses in the organization's directory, without a signed-in user.", + "displayName": "Read all self-initiated courses", + "id": "467524fc-ed22-4356-a910-af61191e3503", + "isEnabled": true, + "origin": "Application", + "value": "LearningSelfInitiatedCourse.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create, update, read and delete all self-initiated courses in the organization's directory, without a signed-in user.", + "displayName": "Read and write all self-initiated courses", + "id": "7654ed61-8965-4025-846a-0856ec02b5b0", + "isEnabled": true, + "origin": "Application", + "value": "LearningSelfInitiatedCourse.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows an app to manage license assignments for users and groups, without a signed-in user.", + "displayName": "Manage all license assignments", + "id": "5facf0c1-8979-4e95-abcf-ff3d079771c0", + "isEnabled": true, + "origin": "Application", + "value": "LicenseAssignment.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to list and read all workflows, tasks and related lifecycle workflows resources without a signed-in user.", + "displayName": "Read all lifecycle workflows resources", + "id": "7c67316a-232a-4b84-be22-cea2c0906404", + "isEnabled": true, + "origin": "Application", + "value": "LifecycleWorkflows.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create, update, list, read and delete all workflows, tasks and related lifecycle workflows resources without a signed-in user.", + "displayName": "Read and write all lifecycle workflows resources", + "id": "5c505cf4-8424-4b8e-aa14-ee06e3bb23e3", + "isEnabled": true, + "origin": "Application", + "value": "LifecycleWorkflows.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read mail in all mailboxes without a signed-in user.", + "displayName": "Read mail in all mailboxes", + "id": "810c84a8-4a9e-49e6-bf7d-12d183f40d01", + "isEnabled": true, + "origin": "Application", + "value": "Mail.Read" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read basic mail properties in all mailboxes without a signed-in user. Includes all properties except body, previewBody, attachments and any extended properties.", + "displayName": "Read basic mail in all mailboxes", + "id": "6be147d2-ea4f-4b5a-a3fa-3eab6f3c140a", + "isEnabled": true, + "origin": "Application", + "value": "Mail.ReadBasic" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read basic mail properties in all mailboxes without a signed-in user. Includes all properties except body, previewBody, attachments and any extended properties.", + "displayName": "Read basic mail in all mailboxes", + "id": "693c5e45-0940-467d-9b8a-1022fb9d42ef", + "isEnabled": true, + "origin": "Application", + "value": "Mail.ReadBasic.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create, read, update, and delete mail in all mailboxes without a signed-in user. Does not include permission to send mail.", + "displayName": "Read and write mail in all mailboxes", + "id": "e2a3a72e-5f79-4c64-b1b1-878b674786c9", + "isEnabled": true, + "origin": "Application", + "value": "Mail.ReadWrite" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to send mail as any user without a signed-in user.", + "displayName": "Send mail as any user", + "id": "b633e1c5-b582-4048-a93e-9f11b44c7e96", + "isEnabled": true, + "origin": "Application", + "value": "Mail.Send" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read user's mailbox settings without a signed-in user. Does not include permission to send mail.", + "displayName": "Read all user mailbox settings", + "id": "40f97065-369a-49f4-947c-6a255697ae91", + "isEnabled": true, + "origin": "Application", + "value": "MailboxSettings.Read" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create, read, update, and delete user's mailbox settings without a signed-in user. Does not include permission to send mail.", + "displayName": "Read and write all user mailbox settings", + "id": "6931bccd-447a-43d1-b442-00a195474933", + "isEnabled": true, + "origin": "Application", + "value": "MailboxSettings.ReadWrite" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the memberships of hidden groups and administrative units without a signed-in user.", + "displayName": "Read all hidden memberships", + "id": "658aa5d8-239f-45c4-aa12-864f4fc7e490", + "isEnabled": true, + "origin": "Application", + "value": "Member.Read.Hidden" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all multi-tenant organization details and tenants, without a signed-in user.", + "displayName": "Read all multi-tenant organization details and tenants", + "id": "4f994bc0-31bb-44bb-b480-7a7c1be8c02e", + "isEnabled": true, + "origin": "Application", + "value": "MultiTenantOrganization.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read multi-tenant organization basic details and active tenants, without a signed-in user.", + "displayName": "Read multi-tenant organization basic details and active tenants", + "id": "f9c2b2a7-3895-4b2e-80f6-c924b456e50b", + "isEnabled": true, + "origin": "Application", + "value": "MultiTenantOrganization.ReadBasic.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write all multi-tenant organization details and tenants, without a signed-in user.", + "displayName": "Read and write all multi-tenant organization details and tenants", + "id": "920def01-ca61-4d2d-b3df-105b46046a70", + "isEnabled": true, + "origin": "Application", + "value": "MultiTenantOrganization.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read your organization's network access braches, without a signed-in user.", + "displayName": "Read properties of all branches for network access", + "id": "39ae4a24-1ef0-49e8-9d63-2a66f5c39edd", + "isEnabled": true, + "origin": "Application", + "value": "NetworkAccessBranch.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write your organization's network access braches, without a signed-in user.", + "displayName": "Read and write properties of all branches for network access", + "id": "8137102d-ec16-4191-aaf8-7aeda8026183", + "isEnabled": true, + "origin": "Application", + "value": "NetworkAccessBranch.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read your organization's network access policies, without a signed-in user.", + "displayName": "Read all security and routing policies for network access", + "id": "8a3d36bf-cb46-4bcc-bec9-8d92829dab84", + "isEnabled": true, + "origin": "Application", + "value": "NetworkAccessPolicy.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write your organization's network access policies, without a signed-in user.", + "displayName": "Read and write all security and routing policies for network access", + "id": "f0c341be-8348-4989-8e43-660324294538", + "isEnabled": true, + "origin": "Application", + "value": "NetworkAccessPolicy.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all the OneNote notebooks in your organization, without a signed-in user.", + "displayName": "Read all OneNote notebooks", + "id": "3aeca27b-ee3a-4c2b-8ded-80376e2134a4", + "isEnabled": true, + "origin": "Application", + "value": "Notes.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all the OneNote notebooks in your organization, without a signed-in user.", + "displayName": "Read and write all OneNote notebooks", + "id": "0c458cef-11f3-48c2-a568-c66751c238c0", + "isEnabled": true, + "origin": "Application", + "value": "Notes.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read online meeting artifacts in your organization, without a signed-in user.", + "displayName": "Read online meeting artifacts", + "id": "df01ed3b-eb61-4eca-9965-6b3d789751b2", + "isEnabled": true, + "origin": "Application", + "value": "OnlineMeetingArtifact.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all recordings of all online meetings, without a signed-in user.", + "displayName": "Read all recordings of online meetings.", + "id": "a4a08342-c95d-476b-b943-97e100569c8d", + "isEnabled": true, + "origin": "Application", + "value": "OnlineMeetingRecording.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read online meeting details in your organization, without a signed-in user.", + "displayName": "Read online meeting details", + "id": "c1684f21-1984-47fa-9d61-2dc8c296bb70", + "isEnabled": true, + "origin": "Application", + "value": "OnlineMeetings.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and create online meetings as an application in your organization.", + "displayName": "Read and create online meetings", + "id": "b8bb2037-6e08-44ac-a4ea-4674e010e2a4", + "isEnabled": true, + "origin": "Application", + "value": "OnlineMeetings.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all transcripts of all online meetings, without a signed-in user.", + "displayName": "Read all transcripts of online meetings.", + "id": "a4a80d8d-d283-4bd8-8504-555ec3870630", + "isEnabled": true, + "origin": "Application", + "value": "OnlineMeetingTranscript.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all on-premises directory synchronization information for the organization, without a signed-in user.", + "displayName": "Read all on-premises directory synchronization information", + "id": "bb70e231-92dc-4729-aff5-697b3f04be95", + "isEnabled": true, + "origin": "Application", + "value": "OnPremDirectorySynchronization.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write all on-premises directory synchronization information for the organization, without a signed-in user.", + "displayName": "Read and write all on-premises directory synchronization information", + "id": "c22a92cc-79bf-4bb1-8b6c-e0a05d3d80ce", + "isEnabled": true, + "origin": "Application", + "value": "OnPremDirectorySynchronization.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create, view, update and delete on-premises published resources, on-premises agents and agent groups, as part of a hybrid identity configuration, without a signed in user.", + "displayName": "Manage on-premises published resources", + "id": "0b57845e-aa49-4e6f-8109-ce654fffa618", + "isEnabled": true, + "origin": "Application", + "value": "OnPremisesPublishingProfiles.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the organization and related resources, without a signed-in user. Related resources include things like subscribed skus and tenant branding information.", + "displayName": "Read organization information", + "id": "498476ce-e0fe-48b0-b801-37ba7e2685c6", + "isEnabled": true, + "origin": "Application", + "value": "Organization.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write the organization and related resources, without a signed-in user. Related resources include things like subscribed skus and tenant branding information.", + "displayName": "Read and write organization information", + "id": "292d869f-3427-49a8-9dab-8c70152b74e9", + "isEnabled": true, + "origin": "Application", + "value": "Organization.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all organizational contacts without a signed-in user. These contacts are managed by the organization and are different from a user's personal contacts.", + "displayName": "Read organizational contacts", + "id": "e1a88a34-94c4-4418-be12-c87b00e26bea", + "isEnabled": true, + "origin": "Application", + "value": "OrgContact.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read organization-wide apps and services settings, without a signed-in user.", + "displayName": "Read organization-wide apps and services settings", + "id": "56c84fa9-ea1f-4a15-90f2-90ef41ece2c9", + "isEnabled": true, + "origin": "Application", + "value": "OrgSettings-AppsAndServices.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write organization-wide apps and services settings, without a signed-in user.", + "displayName": "Read and write organization-wide apps and services settings", + "id": "4a8e4191-c1c8-45f8-b801-f9a1a5ee6ad3", + "isEnabled": true, + "origin": "Application", + "value": "OrgSettings-AppsAndServices.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read organization-wide Dynamics customer voice settings, without a signed-in user.", + "displayName": "Read organization-wide Dynamics customer voice settings", + "id": "c18ae2dc-d9f3-4495-a93f-18980a0e159f", + "isEnabled": true, + "origin": "Application", + "value": "OrgSettings-DynamicsVoice.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write organization-wide Dynamics customer voice settings, without a signed-in user.", + "displayName": "Read and write organization-wide Dynamics customer voice settings", + "id": "c3f1cc32-8bbd-4ab6-bd33-f270e0d9e041", + "isEnabled": true, + "origin": "Application", + "value": "OrgSettings-DynamicsVoice.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read organization-wide Microsoft Forms settings, without a signed-in user.", + "displayName": "Read organization-wide Microsoft Forms settings", + "id": "434d7c66-07c6-4b1f-ab21-417cf2cdaaca", + "isEnabled": true, + "origin": "Application", + "value": "OrgSettings-Forms.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write organization-wide Microsoft Forms settings, without a signed-in user.", + "displayName": "Read and write organization-wide Microsoft Forms settings", + "id": "2cb92fee-97a3-4034-8702-24a6f5d0d1e9", + "isEnabled": true, + "origin": "Application", + "value": "OrgSettings-Forms.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read organization-wide Microsoft 365 apps installation settings, without a signed-in user.", + "displayName": "Read organization-wide Microsoft 365 apps installation settings", + "id": "6cdf1fb1-b46f-424f-9493-07247caa22e2", + "isEnabled": true, + "origin": "Application", + "value": "OrgSettings-Microsoft365Install.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write organization-wide Microsoft 365 apps installation settings, without a signed-in user. ", + "displayName": "Read and write organization-wide Microsoft 365 apps installation settings", + "id": "83f7232f-763c-47b2-a097-e35d2cbe1da5", + "isEnabled": true, + "origin": "Application", + "value": "OrgSettings-Microsoft365Install.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read organization-wide Microsoft To Do settings, without a signed-in user.", + "displayName": "Read organization-wide Microsoft To Do settings", + "id": "e4d9cd09-d858-4363-9410-abb96737f0cf", + "isEnabled": true, + "origin": "Application", + "value": "OrgSettings-Todo.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write organization-wide Microsoft To Do settings, without a signed-in user.", + "displayName": "Read and write organization-wide Microsoft To Do settings", + "id": "5febc9da-e0d0-4576-bd13-ae70b2179a39", + "isEnabled": true, + "origin": "Application", + "value": "OrgSettings-Todo.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read any user's scored list of relevant people, without a signed-in user. The list can include local contacts, contacts from social networking, your organization's directory, and people from recent communications (such as email and Skype).", + "displayName": "Read all users' relevant people lists", + "id": "b528084d-ad10-4598-8b93-929746b4d7d6", + "isEnabled": true, + "origin": "Application", + "value": "People.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to read tenant-wide people settings without a signed-in user.", + "displayName": "Read all tenant-wide people settings", + "id": "ef02f2e7-e22d-4c77-8614-8f765683b86e", + "isEnabled": true, + "origin": "Application", + "value": "PeopleSettings.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to read and write tenant-wide people settings without a signed-in user.", + "displayName": "Read and write all tenant-wide people settings", + "id": "b6890674-9dd5-4e42-bb15-5af07f541ae1", + "isEnabled": true, + "origin": "Application", + "value": "PeopleSettings.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read company places (conference rooms and room lists) for calendar events and other applications, without a signed-in user.", + "displayName": "Read all company places", + "id": "913b9306-0ce1-42b8-9137-6a7df690a760", + "isEnabled": true, + "origin": "Application", + "value": "Place.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all your organization's policies without a signed in user.", + "displayName": "Read your organization's policies", + "id": "246dd0d5-5bd0-4def-940b-0421030a5b68", + "isEnabled": true, + "origin": "Application", + "value": "Policy.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read your organization's conditional access policies, without a signed-in user.", + "displayName": "Read your organization's conditional access policies", + "id": "37730810-e9ba-4e46-b07e-8ca78d182097", + "isEnabled": true, + "origin": "Application", + "value": "Policy.Read.ConditionalAccess" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read your organization’s identity protection policy without a signed-in user. ", + "displayName": "Read your organization’s identity protection policy", + "id": "b21b72f6-4e6a-4533-9112-47eea9f97b28", + "isEnabled": true, + "origin": "Application", + "value": "Policy.Read.IdentityProtection" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read policies related to consent and permission grants for applications, without a signed-in user.", + "displayName": "Read consent and permission grant policies", + "id": "9e640839-a198-48fb-8b9a-013fd6f6cbcd", + "isEnabled": true, + "origin": "Application", + "value": "Policy.Read.PermissionGrant" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write your organization's directory access review default policy without a signed-in user.", + "displayName": "Read and write your organization's directory access review default policy", + "id": "77c863fd-06c0-47ce-a7eb-49773e89d319", + "isEnabled": true, + "origin": "Application", + "value": "Policy.ReadWrite.AccessReview" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write your organization's application configuration policies, without a signed-in user. This includes policies such as activityBasedTimeoutPolicy, claimsMappingPolicy, homeRealmDiscoveryPolicy, tokenIssuancePolicy and tokenLifetimePolicy.", + "displayName": "Read and write your organization's application configuration policies", + "id": "be74164b-cff1-491c-8741-e671cb536e13", + "isEnabled": true, + "origin": "Application", + "value": "Policy.ReadWrite.ApplicationConfiguration" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write all authentication flow policies for the tenant, without a signed-in user.", + "displayName": "Read and write authentication flow policies", + "id": "25f85f3c-f66c-4205-8cd5-de92dd7f0cec", + "isEnabled": true, + "origin": "Application", + "value": "Policy.ReadWrite.AuthenticationFlows" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write all authentication method policies for the tenant, without a signed-in user. ", + "displayName": "Read and write all authentication method policies ", + "id": "29c18626-4985-4dcd-85c0-193eef327366", + "isEnabled": true, + "origin": "Application", + "value": "Policy.ReadWrite.AuthenticationMethod" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write your organization's authorization policy without a signed in user. For example, authorization policies can control some of the permissions that the out-of-the-box user role has by default.", + "displayName": "Read and write your organization's authorization policy", + "id": "fb221be6-99f2-473f-bd32-01c6a0e9ca3b", + "isEnabled": true, + "origin": "Application", + "value": "Policy.ReadWrite.Authorization" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write your organization's conditional access policies, without a signed-in user.", + "displayName": "Read and write your organization's conditional access policies", + "id": "01c0a623-fc9b-48e9-b794-0756f8e8f067", + "isEnabled": true, + "origin": "Application", + "value": "Policy.ReadWrite.ConditionalAccess" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write your organization's consent requests policy without a signed-in user.", + "displayName": "Read and write your organization's consent request policy", + "id": "999f8c63-0a38-4f1b-91fd-ed1947bdd1a9", + "isEnabled": true, + "origin": "Application", + "value": "Policy.ReadWrite.ConsentRequest" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write your organization's cross tenant access policies without a signed-in user.", + "displayName": "Read and write your organization's cross tenant access policies", + "id": "338163d7-f101-4c92-94ba-ca46fe52447c", + "isEnabled": true, + "origin": "Application", + "value": "Policy.ReadWrite.CrossTenantAccess" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to read and update the organization's external identities policy without a signed-in user. For example, external identities policy controls if users invited to access resources in your organization via B2B collaboration or B2B direct connect are allowed to self-service leave.", + "displayName": "Read and write your organization's external identities policy", + "id": "03cc4f92-788e-4ede-b93f-199424d144a5", + "isEnabled": true, + "origin": "Application", + "value": "Policy.ReadWrite.ExternalIdentities" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write feature rollout policies without a signed-in user. Includes abilities to assign and remove users and groups to rollout of a specific feature.", + "displayName": "Read and write feature rollout policies", + "id": "2044e4f1-e56c-435b-925c-44cd8f6ba89a", + "isEnabled": true, + "origin": "Application", + "value": "Policy.ReadWrite.FeatureRollout" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write your organization’s identity protection policy without a signed-in user.", + "displayName": "Read and write your organization’s identity protection policy ", + "id": "2dcf8603-09eb-4078-b1ec-d30a1a76b873", + "isEnabled": true, + "origin": "Application", + "value": "Policy.ReadWrite.IdentityProtection" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to manage policies related to consent and permission grants for applications, without a signed-in user.", + "displayName": "Manage consent and permission grant policies", + "id": "a402ca1c-2696-4531-972d-6e5ee4aa11ea", + "isEnabled": true, + "origin": "Application", + "value": "Policy.ReadWrite.PermissionGrant" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write your organization's security defaults policy, without a signed-in user.", + "displayName": "Read and write your organization's security defaults policy", + "id": "1c6e93a6-28e2-4cbb-9f64-1a46a821124d", + "isEnabled": true, + "origin": "Application", + "value": "Policy.ReadWrite.SecurityDefaults" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write your organization's trust framework policies without a signed in user.", + "displayName": "Read and write your organization's trust framework policies", + "id": "79a677f7-b79d-40d0-a36a-3e6f8688dd7a", + "isEnabled": true, + "origin": "Application", + "value": "Policy.ReadWrite.TrustFramework" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all presence information and write activity and availability of all users in the directory without a signed-in user. Presence information includes activity, availability, status note, calendar out-of-office message, time zone and location.", + "displayName": "Read and write presence information for all users", + "id": "83cded22-8297-4ff6-a7fa-e97e9545a259", + "isEnabled": true, + "origin": "Application", + "value": "Presence.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to read printers without a signed-in user. ", + "displayName": "Read printers", + "id": "9709bb33-4549-49d4-8ed9-a8f65e45bb0f", + "isEnabled": true, + "origin": "Application", + "value": "Printer.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to read and update printers without a signed-in user. Does not allow creating (registering) or deleting (unregistering) printers.", + "displayName": "Read and update printers", + "id": "f5b3f73d-6247-44df-a74c-866173fddab0", + "isEnabled": true, + "origin": "Application", + "value": "Printer.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to perform advanced operations like redirecting a print job to another printer without a signed-in user. Also allows the application to read and update the metadata of print jobs.", + "displayName": "Perform advanced operations on print jobs", + "id": "58a52f47-9e36-4b17-9ebe-ce4ef7f3e6c8", + "isEnabled": true, + "origin": "Application", + "value": "PrintJob.Manage.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to read the metadata and document content of print jobs without a signed-in user. ", + "displayName": "Read print jobs", + "id": "ac6f956c-edea-44e4-bd06-64b1b4b9aec9", + "isEnabled": true, + "origin": "Application", + "value": "PrintJob.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to read the metadata of print jobs without a signed-in user. Does not allow access to print job document content.", + "displayName": "Read basic information for print jobs", + "id": "fbf67eee-e074-4ef7-b965-ab5ce1c1f689", + "isEnabled": true, + "origin": "Application", + "value": "PrintJob.ReadBasic.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to read and update the metadata and document content of print jobs without a signed-in user.", + "displayName": "Read and write print jobs", + "id": "5114b07b-2898-4de7-a541-53b0004e2e13", + "isEnabled": true, + "origin": "Application", + "value": "PrintJob.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to read and update the metadata of print jobs without a signed-in user. Does not allow access to print job document content.", + "displayName": "Read and write basic information for print jobs", + "id": "57878358-37f4-4d3a-8c20-4816e0d457b1", + "isEnabled": true, + "origin": "Application", + "value": "PrintJob.ReadWriteBasic.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to read tenant-wide print settings without a signed-in user.", + "displayName": "Read tenant-wide print settings", + "id": "b5991872-94cf-4652-9765-29535087c6d8", + "isEnabled": true, + "origin": "Application", + "value": "PrintSettings.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to read and update print task definitions without a signed-in user. ", + "displayName": "Read, write and update print task definitions", + "id": "456b71a7-0ee0-4588-9842-c123fcc8f664", + "isEnabled": true, + "origin": "Application", + "value": "PrintTaskDefinition.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read time-based assignment and just-in-time elevation (including scheduled elevation) of Azure AD built-in and custom administrative roles in your organization, without a signed-in user.", + "displayName": "Read privileged access to Azure AD roles", + "id": "4cdc2547-9148-4295-8d11-be0db1391d6b", + "isEnabled": true, + "origin": "Application", + "value": "PrivilegedAccess.Read.AzureAD" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read time-based assignment and just-in-time elevation (including scheduled elevation) of Azure AD groups in your organization, without a signed-in user.", + "displayName": "Read privileged access to Azure AD groups", + "id": "01e37dc9-c035-40bd-b438-b2879c4870a6", + "isEnabled": true, + "origin": "Application", + "value": "PrivilegedAccess.Read.AzureADGroup" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read time-based assignment and just-in-time elevation of user privileges to audit Azure resources in your organization, without a signed-in user.", + "displayName": "Read privileged access to Azure resources", + "id": "5df6fe86-1be0-44eb-b916-7bd443a71236", + "isEnabled": true, + "origin": "Application", + "value": "PrivilegedAccess.Read.AzureResources" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to request and manage time-based assignment and just-in-time elevation (including scheduled elevation) of Azure AD built-in and custom administrative roles in your organization, without a signed-in user.", + "displayName": "Read and write privileged access to Azure AD roles", + "id": "854d9ab1-6657-4ec8-be45-823027bcd009", + "isEnabled": true, + "origin": "Application", + "value": "PrivilegedAccess.ReadWrite.AzureAD" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to request and manage time-based assignment and just-in-time elevation (including scheduled elevation) of Azure AD groups in your organization, without a signed-in user.", + "displayName": "Read and write privileged access to Azure AD groups", + "id": "2f6817f8-7b12-4f0f-bc18-eeaf60705a9e", + "isEnabled": true, + "origin": "Application", + "value": "PrivilegedAccess.ReadWrite.AzureADGroup" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to request and manage time-based assignment and just-in-time elevation of Azure resources (like your subscriptions, resource groups, storage, compute) in your organization, without a signed-in user.", + "displayName": "Read and write privileged access to Azure resources", + "id": "6f9d5abc-2db6-400b-a267-7de22a40fb87", + "isEnabled": true, + "origin": "Application", + "value": "PrivilegedAccess.ReadWrite.AzureResources" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read time-based assignment schedules for access to Azure AD groups, without a signed-in user.", + "displayName": "Read assignment schedules for access to Azure AD groups", + "id": "cd4161cb-f098-48f8-a884-1eda9a42434c", + "isEnabled": true, + "origin": "Application", + "value": "PrivilegedAssignmentSchedule.Read.AzureADGroup" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read, create, and delete time-based assignment schedules for access to Azure AD groups, without a signed-in user.", + "displayName": "Read, create, and delete assignment schedules for access to Azure AD groups", + "id": "41202f2c-f7ab-45be-b001-85c9728b9d69", + "isEnabled": true, + "origin": "Application", + "value": "PrivilegedAssignmentSchedule.ReadWrite.AzureADGroup" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read time-based eligibility schedules for access to Azure AD groups, without a signed-in user.", + "displayName": "Read eligibility schedules for access to Azure AD groups", + "id": "edb419d6-7edc-42a3-9345-509bfdf5d87c", + "isEnabled": true, + "origin": "Application", + "value": "PrivilegedEligibilitySchedule.Read.AzureADGroup" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read, create, and delete time-based eligibility schedules for access to Azure AD groups, without a signed-in user.", + "displayName": "Read, create, and delete eligibility schedules for access to Azure AD groups", + "id": "618b6020-bca8-4de6-99f6-ef445fa4d857", + "isEnabled": true, + "origin": "Application", + "value": "PrivilegedEligibilitySchedule.ReadWrite.AzureADGroup" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read programs and program controls in the organization, without a signed-in user.", + "displayName": "Read all programs", + "id": "eedb7fdd-7539-4345-a38b-4839e4a84cbd", + "isEnabled": true, + "origin": "Application", + "value": "ProgramControl.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read, update, delete and perform actions on programs and program controls in the organization, without a signed-in user.", + "displayName": "Manage all programs", + "id": "60a901ed-09f7-4aa5-a16e-7dd3d6f9de36", + "isEnabled": true, + "origin": "Application", + "value": "ProgramControl.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows an app to read all question and answers, without a signed-in user.", + "displayName": "Read all Question and Answers ", + "id": "ee49e170-1dd1-4030-b44c-61ad6e98f743", + "isEnabled": true, + "origin": "Application", + "value": "QnA.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to read any data from Records Management, such as configuration, labels, and policies without the signed in user.", + "displayName": "Read Records Management configuration, labels and policies", + "id": "ac3a2b8e-03a3-4da9-9ce0-cbe28bf1accd", + "isEnabled": true, + "origin": "Application", + "value": "RecordsManagement.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allow the application to create, update and delete any data from Records Management, such as configuration, labels, and policies without the signed in user.", + "displayName": "Read and write Records Management configuration, labels and policies", + "id": "eb158f57-df43-4751-8b21-b8932adb3d34", + "isEnabled": true, + "origin": "Application", + "value": "RecordsManagement.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows an app to read all service usage reports without a signed-in user. Services that provide usage reports include Office 365 and Azure Active Directory.", + "displayName": "Read all usage reports", + "id": "230c1aed-a721-4c5d-9cb4-a90514e508ef", + "isEnabled": true, + "origin": "Application", + "value": "Reports.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all admin report settings, such as whether to display concealed information in reports, without a signed-in user.", + "displayName": "Read all admin report settings", + "id": "ee353f83-55ef-4b78-82da-555bfa2b4b95", + "isEnabled": true, + "origin": "Application", + "value": "ReportSettings.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and update all admin report settings, such as whether to display concealed information in reports, without a signed-in user.", + "displayName": "Read and write all admin report settings", + "id": "2a60023f-3219-47ad-baa4-40e17cd02a1d", + "isEnabled": true, + "origin": "Application", + "value": "ReportSettings.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all resource specific permissions granted on user accounts, without a signed-in user.", + "displayName": "Read all resource specific permissions granted on user accounts", + "id": "acfca4d5-f49f-40ed-9648-84068b474c73", + "isEnabled": true, + "origin": "Application", + "value": "ResourceSpecificPermissionGrant.ReadForUser.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the active role-based access control (RBAC) assignments and schedules for your company's directory, without a signed-in user. This includes reading directory role templates, and directory roles.", + "displayName": "Read all active role assignments and role schedules for your company's directory", + "id": "d5fe8ce8-684c-4c83-a52c-46e882ce4be1", + "isEnabled": true, + "origin": "Application", + "value": "RoleAssignmentSchedule.Read.Directory" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read, update, and delete policies for privileged role-based access control (RBAC) assignments of your company's directory, without a signed-in user.", + "displayName": "Read, update, and delete all policies for privileged role assignments of your company's directory", + "id": "dd199f4a-f148-40a4-a2ec-f0069cc799ec", + "isEnabled": true, + "origin": "Application", + "value": "RoleAssignmentSchedule.ReadWrite.Directory" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the eligible role-based access control (RBAC) assignments and schedules for your company's directory, without a signed-in user. This includes reading directory role templates, and directory roles.", + "displayName": "Read all eligible role assignments and role schedules for your company's directory", + "id": "ff278e11-4a33-4d0c-83d2-d01dc58929a5", + "isEnabled": true, + "origin": "Application", + "value": "RoleEligibilitySchedule.Read.Directory" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and manage the eligible role-based access control (RBAC) assignments and schedules for your company's directory, without a signed-in user. This includes managing eligible directory role membership, and reading directory role templates, directory roles and eligible memberships.", + "displayName": "Read, update, and delete all eligible role assignments and schedules for your company's directory", + "id": "fee28b28-e1f3-4841-818e-2704dc62245f", + "isEnabled": true, + "origin": "Application", + "value": "RoleEligibilitySchedule.ReadWrite.Directory" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read role-based access control (RBAC) settings for all RBAC providers without a signed-in user. This includes reading role definitions and role assignments.", + "displayName": "Read role management data for all RBAC providers", + "id": "c7fbd983-d9aa-4fa7-84b8-17382c103bc4", + "isEnabled": true, + "origin": "Application", + "value": "RoleManagement.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the Cloud PC role-based access control (RBAC) settings, without a signed-in user.", + "displayName": "Read Cloud PC RBAC settings", + "id": "031a549a-bb80-49b6-8032-2068448c6a3c", + "isEnabled": true, + "origin": "Application", + "value": "RoleManagement.Read.CloudPC" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, without a signed-in user. This includes reading directory role templates, directory roles and memberships.", + "displayName": "Read all directory RBAC settings", + "id": "483bed4a-2ad3-4361-a73b-c83ccdbdc53c", + "isEnabled": true, + "origin": "Application", + "value": "RoleManagement.Read.Directory" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the role-based access control (RBAC) configuration for your organization's Exchange Online service, without a signed-in user. This includes reading Exchange management role definitions, role groups, role group membership, role assignments, management scopes, and role assignment policies.", + "displayName": "Read Exchange Online RBAC configuration", + "id": "c769435f-f061-4d0b-8ff1-3d39870e5f85", + "isEnabled": true, + "origin": "Application", + "value": "RoleManagement.Read.Exchange" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and manage the Cloud PC role-based access control (RBAC) settings, without a signed-in user. This includes reading and managing Cloud PC role definitions and memberships.", + "displayName": "Read and write all Cloud PC RBAC settings", + "id": "274d0592-d1b6-44bd-af1d-26d259bcb43a", + "isEnabled": true, + "origin": "Application", + "value": "RoleManagement.ReadWrite.CloudPC" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and manage the role-based access control (RBAC) settings for your company's directory, without a signed-in user. This includes instantiating directory roles and managing directory role membership, and reading directory role templates, directory roles and memberships.", + "displayName": "Read and write all directory RBAC settings", + "id": "9e3f62cf-ca93-4989-b6ce-bf83c28f9fe8", + "isEnabled": true, + "origin": "Application", + "value": "RoleManagement.ReadWrite.Directory" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and manage the role-based access control (RBAC) settings for your organization's Exchange Online service, without a signed-in user. This includes reading, creating, updating, and deleting Exchange management role definitions, role groups, role group membership, role assignments, management scopes, and role assignment policies.", + "displayName": "Read and write Exchange Online RBAC configuration", + "id": "025d3225-3f02-4882-b4c0-cd5b541a4e80", + "isEnabled": true, + "origin": "Application", + "value": "RoleManagement.ReadWrite.Exchange" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all role-based access control (RBAC) alerts for your company's directory, without a signed-in user. This includes reading alert statuses, alert definitions, alert configurations and incidents that lead to an alert.", + "displayName": "Read all alert data for your company's directory", + "id": "ef31918f-2d50-4755-8943-b8638c0a077e", + "isEnabled": true, + "origin": "Application", + "value": "RoleManagementAlert.Read.Directory" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and manage all role-based access control (RBAC) alerts for your company's directory, without a signed-in user. This includes managing alert settings, initiating alert scans, dimissing alerts, remediating alert incidents, and reading alert statuses, alert definitions, alert configurations and incidents that lead to an alert.", + "displayName": "Read all alert data, configure alerts, and take actions on all alerts for your company's directory", + "id": "11059518-d6a6-4851-98ed-509268489c4a", + "isEnabled": true, + "origin": "Application", + "value": "RoleManagementAlert.ReadWrite.Directory" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read policies in Privileged Identity Management for Groups, without a signed-in user.", + "displayName": "Read all policies in PIM for Groups", + "id": "69e67828-780e-47fd-b28c-7b27d14864e6", + "isEnabled": true, + "origin": "Application", + "value": "RoleManagementPolicy.Read.AzureADGroup" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read policies for privileged role-based access control (RBAC) assignments of your company's directory, without a signed-in user.", + "displayName": "Read all policies for privileged role assignments of your company's directory", + "id": "fdc4c997-9942-4479-bfcb-75a36d1138df", + "isEnabled": true, + "origin": "Application", + "value": "RoleManagementPolicy.Read.Directory" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read, update, and delete policies in Privileged Identity Management for Groups, without a signed-in user.", + "displayName": "Read, update, and delete all policies in PIM for Groups", + "id": "b38dcc4d-a239-4ed6-aa84-6c65b284f97c", + "isEnabled": true, + "origin": "Application", + "value": "RoleManagementPolicy.ReadWrite.AzureADGroup" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read, update, and delete policies for privileged role-based access control (RBAC) assignments of your company's directory, without a signed-in user.", + "displayName": "Read, update, and delete all policies for privileged role assignments of your company's directory", + "id": "31e08e0a-d3f7-4ca2-ac39-7343fb83e8ad", + "isEnabled": true, + "origin": "Application", + "value": "RoleManagementPolicy.ReadWrite.Directory" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all schedules, schedule groups, shifts and associated entities in the Teams or Shifts application without a signed-in user.", + "displayName": "Read all schedule items", + "id": "7b2ebf90-d836-437f-b90d-7b62722c4456", + "isEnabled": true, + "origin": "Application", + "value": "Schedule.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to manage all schedules, schedule groups, shifts and associated entities in the Teams or Shifts application without a signed-in user.", + "displayName": "Read and write all schedule items", + "id": "b7760610-0545-4e8a-9ec3-cce9e63db01c", + "isEnabled": true, + "origin": "Application", + "value": "Schedule.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read search configurations, without a signed-in user.", + "displayName": "Read your organization's search configuration", + "id": "ada977a5-b8b1-493b-9a91-66c206d76ecf", + "isEnabled": true, + "origin": "Application", + "value": "SearchConfiguration.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write search configurations, without a signed-in user.", + "displayName": "Read and write your organization's search configuration", + "id": "0e778b85-fefa-466d-9eec-750569d92122", + "isEnabled": true, + "origin": "Application", + "value": "SearchConfiguration.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read security actions, without a signed-in user.", + "displayName": "Read your organization's security actions", + "id": "5e0edab9-c148-49d0-b423-ac253e121825", + "isEnabled": true, + "origin": "Application", + "value": "SecurityActions.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read or update security actions, without a signed-in user.", + "displayName": "Read and update your organization's security actions", + "id": "f2bf083f-0179-402a-bedb-b2784de8a49b", + "isEnabled": true, + "origin": "Application", + "value": "SecurityActions.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all security alerts, without a signed-in user.", + "displayName": "Read all security alerts", + "id": "472e4a4d-bb4a-4026-98d1-0b0d74cb74a5", + "isEnabled": true, + "origin": "Application", + "value": "SecurityAlert.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write to all security alerts, without a signed-in user.", + "displayName": "Read and write to all security alerts", + "id": "ed4fca05-be46-441f-9803-1873825f8fdb", + "isEnabled": true, + "origin": "Application", + "value": "SecurityAlert.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Read email metadata and security detection details, without a signed-in user. ", + "displayName": "Read metadata and detection details for all emails in your organization", + "id": "b48f7ac2-044d-4281-b02f-75db744d6f5f", + "isEnabled": true, + "origin": "Application", + "value": "SecurityAnalyzedMessage.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Read email metadata and security detection details, and execute remediation actions like deleting an email, without a signed-in user.", + "displayName": "Read metadata, detection details, and execute remediation actions on all emails in your organization", + "id": "04c55753-2244-4c25-87fc-704ab82a4f69", + "isEnabled": true, + "origin": "Application", + "value": "SecurityAnalyzedMessage.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read your organization’s security events without a signed-in user.", + "displayName": "Read your organization’s security events", + "id": "bf394140-e372-4bf9-a898-299cfc7564e5", + "isEnabled": true, + "origin": "Application", + "value": "SecurityEvents.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read your organization’s security events without a signed-in user. Also allows the app to update editable properties in security events.", + "displayName": "Read and update your organization’s security events", + "id": "d903a879-88e0-4c09-b0c9-82f6a1333f84", + "isEnabled": true, + "origin": "Application", + "value": "SecurityEvents.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all security incidents, without a signed-in user.", + "displayName": "Read all security incidents", + "id": "45cc0394-e837-488b-a098-1918f48d186c", + "isEnabled": true, + "origin": "Application", + "value": "SecurityIncident.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write to all security incidents, without a signed-in user.", + "displayName": "Read and write to all security incidents", + "id": "34bf0e97-1971-4929-b999-9e2442d941d7", + "isEnabled": true, + "origin": "Application", + "value": "SecurityIncident.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read your tenant's service health information, without a signed-in user. Health information may include service issues or service health overviews.", + "displayName": "Read service health", + "id": "79c261e0-fe76-4144-aad5-bdc68fbe4037", + "isEnabled": true, + "origin": "Application", + "value": "ServiceHealth.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read your tenant's service announcement messages, without a signed-in user. Messages may include information about new or changed features.", + "displayName": "Read service messages", + "id": "1b620472-6534-4fe6-9df2-4680e8aa28ec", + "isEnabled": true, + "origin": "Application", + "value": "ServiceMessage.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read service principal endpoints", + "displayName": "Read service principal endpoints", + "id": "5256681e-b7f6-40c0-8447-2d9db68797a0", + "isEnabled": true, + "origin": "Application", + "value": "ServicePrincipalEndpoint.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to update service principal endpoints", + "displayName": "Read and update service principal endpoints", + "id": "89c8469c-83ad-45f7-8ff2-6e3d4285709e", + "isEnabled": true, + "origin": "Application", + "value": "ServicePrincipalEndpoint.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to read the tenant-level settings of SharePoint and OneDrive, without a signed-in user.", + "displayName": "Read SharePoint and OneDrive tenant settings", + "id": "83d4163d-a2d8-4d3b-9695-4ae3ca98f888", + "isEnabled": true, + "origin": "Application", + "value": "SharePointTenantSettings.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to read and change the tenant-level settings of SharePoint and OneDrive, without a signed-in user.", + "displayName": "Read and change SharePoint and OneDrive tenant settings", + "id": "19b94e34-907c-4f43-bde9-38b1909ed408", + "isEnabled": true, + "origin": "Application", + "value": "SharePointTenantSettings.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all the short notes without a signed-in user.", + "displayName": "Read all users' short notes", + "id": "0c7d31ec-31ca-4f58-b6ec-9950b6b0de69", + "isEnabled": true, + "origin": "Application", + "value": "ShortNotes.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read, create, edit, and delete all the short notes without a signed-in user.", + "displayName": "Read, create, edit, and delete all users' short notes", + "id": "842c284c-763d-4a97-838d-79787d129bab", + "isEnabled": true, + "origin": "Application", + "value": "ShortNotes.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to have full control of all site collections without a signed in user.", + "displayName": "Have full control of all site collections", + "id": "a82116e5-55eb-4c41-a434-62fe8a61c773", + "isEnabled": true, + "origin": "Application", + "value": "Sites.FullControl.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create or delete document libraries and lists in all site collections without a signed in user.", + "displayName": "Create, edit, and delete items and lists in all site collections", + "id": "0c0bf378-bf22-4481-8f81-9e89a9b4960a", + "isEnabled": true, + "origin": "Application", + "value": "Sites.Manage.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read documents and list items in all site collections without a signed in user.", + "displayName": "Read items in all site collections ", + "id": "332a536c-c7ef-4017-ab91-336970924f0d", + "isEnabled": true, + "origin": "Application", + "value": "Sites.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create, read, update, and delete documents and list items in all site collections without a signed in user.", + "displayName": "Read and write items in all site collections", + "id": "9492366f-7969-46a4-8d15-ed1a20078fff", + "isEnabled": true, + "origin": "Application", + "value": "Sites.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allow the application to access a subset of site collections without a signed in user.  The specific site collections and the permissions granted will be configured in SharePoint Online.", + "displayName": "Access selected site collections", + "id": "883ea226-0bf2-4a8f-9f9d-92c9162a727d", + "isEnabled": true, + "origin": "Application", + "value": "Sites.Selected" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read subject rights requests without a signed-in user.", + "displayName": "Read all subject rights requests", + "id": "ee1460f0-368b-4153-870a-4e1ca7e72c42", + "isEnabled": true, + "origin": "Application", + "value": "SubjectRightsRequest.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write subject rights requests without a signed in user.", + "displayName": "Read and write all subject rights requests", + "id": "8387eaa4-1a3c-41f5-b261-f888138e6041", + "isEnabled": true, + "origin": "Application", + "value": "SubjectRightsRequest.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to read Azure AD synchronization information, without a signed-in user.", + "displayName": "Read all Azure AD synchronization data. ", + "id": "5ba43d2f-fa88-4db2-bd1c-a67c5f0fb1ce", + "isEnabled": true, + "origin": "Application", + "value": "Synchronization.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to configure the Azure AD synchronization service, without a signed-in user.", + "displayName": "Read and write all Azure AD synchronization data. ", + "id": "9b50c33d-700f-43b1-b2eb-87e89b703581", + "isEnabled": true, + "origin": "Application", + "value": "Synchronization.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to upload bulk user data to the identity synchronization service, without a signed-in user.", + "displayName": "Upload user data to the identity synchronization service", + "id": "db31e92a-b9ea-4d87-bf6a-75a37a9ca35a", + "isEnabled": true, + "origin": "Application", + "value": "SynchronizationData-User.Upload" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all users’ tasks and task lists in your organization, without a signed-in user.", + "displayName": "Read all users’ tasks and tasklist", + "id": "f10e1f91-74ed-437f-a6fd-d6ae88e26c1f", + "isEnabled": true, + "origin": "Application", + "value": "Tasks.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create, read, update and delete all users’ tasks and task lists in your organization, without a signed-in user", + "displayName": "Read and write all users’ tasks and tasklists", + "id": "44e666d1-d276-445b-a5fc-8815eeb81d55", + "isEnabled": true, + "origin": "Application", + "value": "Tasks.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create teams without a signed-in user. ", + "displayName": "Create teams", + "id": "23fc2474-f741-46ce-8465-674744c5c361", + "isEnabled": true, + "origin": "Application", + "value": "Team.Create" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Get a list of all teams, without a signed-in user.", + "displayName": "Get a list of all teams", + "id": "2280dda6-0bfd-44ee-a2f4-cb867cfc4c1e", + "isEnabled": true, + "origin": "Application", + "value": "Team.ReadBasic.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Read the members of all teams, without a signed-in user.", + "displayName": "Read the members of all teams", + "id": "660b7406-55f1-41ca-a0ed-0b035e182f3e", + "isEnabled": true, + "origin": "Application", + "value": "TeamMember.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Add and remove members from all teams, without a signed-in user. Also allows changing a team member's role, for example from owner to non-owner.", + "displayName": "Add and remove members from all teams", + "id": "0121dc95-1b9f-4aed-8bac-58c5ac466691", + "isEnabled": true, + "origin": "Application", + "value": "TeamMember.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Add and remove members from all teams, without a signed-in user. Does not allow adding or removing a member with the owner role. Additionally, does not allow the app to elevate an existing member to the owner role.", + "displayName": "Add and remove members with non-owner role for all teams", + "id": "4437522e-9a86-4a41-a7da-e380edd4a97d", + "isEnabled": true, + "origin": "Application", + "value": "TeamMember.ReadWriteNonOwnerRole.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all users' teamwork activity feed, without a signed-in user.", + "displayName": "Read all users' teamwork activity feed", + "id": "70dec828-f620-4914-aa83-a29117306807", + "isEnabled": true, + "origin": "Application", + "value": "TeamsActivity.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create new notifications in users' teamwork activity feeds without a signed in user. These notifications may not be discoverable or be held or governed by compliance policies.", + "displayName": "Send a teamwork activity to any user", + "id": "a267235f-af13-44dc-8385-c1dc93023186", + "isEnabled": true, + "origin": "Application", + "value": "TeamsActivity.Send" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the Teams apps that are installed in any chat, without a signed-in user. Does not give the ability to read application-specific settings.", + "displayName": "Read installed Teams apps for all chats", + "id": "cc7e7635-2586-41d6-adaa-a8d3bcad5ee5", + "isEnabled": true, + "origin": "Application", + "value": "TeamsAppInstallation.ReadForChat.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the Teams apps that are installed in any team, without a signed-in user. Does not give the ability to read application-specific settings.", + "displayName": "Read installed Teams apps for all teams", + "id": "1f615aea-6bf9-4b05-84bd-46388e138537", + "isEnabled": true, + "origin": "Application", + "value": "TeamsAppInstallation.ReadForTeam.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the Teams apps that are installed for any user, without a signed-in user. Does not give the ability to read application-specific settings.", + "displayName": "Read installed Teams apps for all users", + "id": "9ce09611-f4f7-4abd-a629-a05450422a97", + "isEnabled": true, + "origin": "Application", + "value": "TeamsAppInstallation.ReadForUser.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read, install, upgrade, and uninstall Teams apps in any chat, without a signed-in user. Gives the ability to manage permission grants for accessing those specific chats' data.", + "displayName": "Manage installation and permission grants of Teams apps for all chats", + "id": "6e74eff9-4a21-45d6-bc03-3a20f61f8281", + "isEnabled": true, + "origin": "Application", + "value": "TeamsAppInstallation.ReadWriteAndConsentForChat.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read, install, upgrade, and uninstall Teams apps in any team, without a signed-in user. Gives the ability to manage permission grants for accessing those specific teams' data.", + "displayName": "Manage installation and permission grants of Teams apps for all teams", + "id": "b0c13be0-8e20-4bc5-8c55-963c23a39ce9", + "isEnabled": true, + "origin": "Application", + "value": "TeamsAppInstallation.ReadWriteAndConsentForTeam.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read, install, upgrade, and uninstall Teams apps in any user account, without a signed-in user. Gives the ability to manage permission grants for accessing those specific users' data.", + "displayName": "Manage installation and permission grants of Teams apps in a user account", + "id": "32ca478f-f89e-41d0-aaf8-101deb7da510", + "isEnabled": true, + "origin": "Application", + "value": "TeamsAppInstallation.ReadWriteAndConsentForUser.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows a Teams app to read, install, upgrade, and uninstall itself for any chat, without a signed-in user, and manage its permission grants for accessing those specific chats' data.", + "displayName": "Allow the Teams app to manage itself and its permission grants for all chats", + "id": "ba1ba90b-2d8f-487e-9f16-80728d85bb5c", + "isEnabled": true, + "origin": "Application", + "value": "TeamsAppInstallation.ReadWriteAndConsentSelfForChat.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows a Teams app to read, install, upgrade, and uninstall itself for any team, without a signed-in user, and manage its permission grants for accessing those specific teams' data.", + "displayName": "Allow the Teams app to manage itself and its permission grants for all teams", + "id": "1e4be56c-312e-42b8-a2c9-009600d732c0", + "isEnabled": true, + "origin": "Application", + "value": "TeamsAppInstallation.ReadWriteAndConsentSelfForTeam.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows a Teams app to read, install, upgrade, and uninstall itself for any user account, without a signed-in user, and manage its permission grants for accessing those specific users' data.", + "displayName": "Allow the Teams app to manage itself and its permission grants in all user accounts", + "id": "a87076cf-6abd-4e56-8559-4dbdf41bef96", + "isEnabled": true, + "origin": "Application", + "value": "TeamsAppInstallation.ReadWriteAndConsentSelfForUser.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read, install, upgrade, and uninstall Teams apps in any chat, without a signed-in user. Does not give the ability to read application-specific settings.", + "displayName": "Manage Teams apps for all chats", + "id": "9e19bae1-2623-4c4f-ab6e-2664615ff9a0", + "isEnabled": true, + "origin": "Application", + "value": "TeamsAppInstallation.ReadWriteForChat.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read, install, upgrade, and uninstall Teams apps in any team, without a signed-in user. Does not give the ability to read application-specific settings.", + "displayName": "Manage Teams apps for all teams", + "id": "5dad17ba-f6cc-4954-a5a2-a0dcc95154f0", + "isEnabled": true, + "origin": "Application", + "value": "TeamsAppInstallation.ReadWriteForTeam.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read, install, upgrade, and uninstall Teams apps for any user, without a signed-in user. Does not give the ability to read application-specific settings.", + "displayName": "Manage Teams apps for all users", + "id": "74ef0291-ca83-4d02-8c7e-d2391e6a444f", + "isEnabled": true, + "origin": "Application", + "value": "TeamsAppInstallation.ReadWriteForUser.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows a Teams app to read, install, upgrade, and uninstall itself for any chat, without a signed-in user.", + "displayName": "Allow the Teams app to manage itself for all chats", + "id": "73a45059-f39c-4baf-9182-4954ac0e55cf", + "isEnabled": true, + "origin": "Application", + "value": "TeamsAppInstallation.ReadWriteSelfForChat.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows a Teams app to read, install, upgrade, and uninstall itself in any team, without a signed-in user.", + "displayName": "Allow the Teams app to manage itself for all teams", + "id": "9f67436c-5415-4e7f-8ac1-3014a7132630", + "isEnabled": true, + "origin": "Application", + "value": "TeamsAppInstallation.ReadWriteSelfForTeam.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows a Teams app to read, install, upgrade, and uninstall itself to any user, without a signed-in user.", + "displayName": "Allow the app to manage itself for all users", + "id": "908de74d-f8b2-4d6b-a9ed-2a17b3b78179", + "isEnabled": true, + "origin": "Application", + "value": "TeamsAppInstallation.ReadWriteSelfForUser.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Read all team's settings, without a signed-in user.", + "displayName": "Read all teams' settings", + "id": "242607bd-1d2c-432c-82eb-bdb27baa23ab", + "isEnabled": true, + "origin": "Application", + "value": "TeamSettings.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Read and change all teams' settings, without a signed-in user.", + "displayName": "Read and change all teams' settings", + "id": "bdd80a03-d9bc-451d-b7c4-ce7c63fe3c8f", + "isEnabled": true, + "origin": "Application", + "value": "TeamSettings.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create tabs in any team in Microsoft Teams, without a signed-in user. This does not grant the ability to read, modify or delete tabs after they are created, or give access to the content inside the tabs.", + "displayName": "Create tabs in Microsoft Teams.", + "id": "49981c42-fd7b-4530-be03-e77b21aed25e", + "isEnabled": true, + "origin": "Application", + "value": "TeamsTab.Create" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Read the names and settings of tabs inside any team in Microsoft Teams, without a signed-in user. This does not give access to the content inside the tabs. ", + "displayName": "Read tabs in Microsoft Teams.", + "id": "46890524-499a-4bb2-ad64-1476b4f3e1cf", + "isEnabled": true, + "origin": "Application", + "value": "TeamsTab.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Read and write tabs in any team in Microsoft Teams, without a signed-in user. This does not give access to the content inside the tabs.", + "displayName": "Read and write tabs in Microsoft Teams.", + "id": "a96d855f-016b-47d7-b51c-1218a98d791c", + "isEnabled": true, + "origin": "Application", + "value": "TeamsTab.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows a Teams app to read, install, upgrade, and uninstall all tabs for any chat, without a signed-in user.", + "displayName": "Allow the Teams app to manage all tabs for all chats", + "id": "fd9ce730-a250-40dc-bd44-8dc8d20f39ea", + "isEnabled": true, + "origin": "Application", + "value": "TeamsTab.ReadWriteForChat.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows a Teams app to read, install, upgrade, and uninstall all tabs in any team, without a signed-in user.", + "displayName": "Allow the Teams app to manage all tabs for all teams", + "id": "6163d4f4-fbf8-43da-a7b4-060fe85ed148", + "isEnabled": true, + "origin": "Application", + "value": "TeamsTab.ReadWriteForTeam.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows a Teams app to read, install, upgrade, and uninstall all tabs for any user, without a signed-in user.", + "displayName": "Allow the app to manage all tabs for all users", + "id": "425b4b59-d5af-45c8-832f-bb0b7402348a", + "isEnabled": true, + "origin": "Application", + "value": "TeamsTab.ReadWriteForUser.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows a Teams app to read, install, upgrade, and uninstall its own tabs for any chat, without a signed-in user.", + "displayName": "Allow the Teams app to manage only its own tabs for all chats", + "id": "9f62e4a2-a2d6-4350-b28b-d244728c4f86", + "isEnabled": true, + "origin": "Application", + "value": "TeamsTab.ReadWriteSelfForChat.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows a Teams app to read, install, upgrade, and uninstall its own tabs in any team, without a signed-in user.", + "displayName": "Allow the Teams app to manage only its own tabs for all teams", + "id": "91c32b81-0ef0-453f-a5c7-4ce2e562f449", + "isEnabled": true, + "origin": "Application", + "value": "TeamsTab.ReadWriteSelfForTeam.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows a Teams app to read, install, upgrade, and uninstall its own tabs for any user, without a signed-in user.", + "displayName": "Allow the Teams app to manage only its own tabs for all users", + "id": "3c42dec6-49e8-4a0a-b469-36cff0d9da93", + "isEnabled": true, + "origin": "Application", + "value": "TeamsTab.ReadWriteSelfForUser.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all available Teams Templates, without a signed-user.", + "displayName": "Read all available Teams Templates", + "id": "6323133e-1f6e-46d4-9372-ac33a0870636", + "isEnabled": true, + "origin": "Application", + "value": "TeamTemplates.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create chat and channel messages, without a signed in user. The app specifies which user appears as the sender, and can backdate the message to appear as if it was sent long ago. The messages can be sent to any chat or channel in the organization.", + "displayName": "Create chat and channel messages with anyone's identity and with any timestamp", + "id": "dfb0dd15-61de-45b2-be36-d6a69fba3c79", + "isEnabled": true, + "origin": "Application", + "value": "Teamwork.Migrate.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the Teams app settings without a signed-in user.", + "displayName": "Read Teams app settings", + "id": "475ebe88-f071-4bd7-af2b-642952bd4986", + "isEnabled": true, + "origin": "Application", + "value": "TeamworkAppSettings.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write the Teams app settings without a signed-in user.", + "displayName": "Read and write Teams app settings", + "id": "ab5b445e-8f10-45f4-9c79-dd3f8062cc4e", + "isEnabled": true, + "origin": "Application", + "value": "TeamworkAppSettings.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allow the app to read the management data for Teams devices, without a signed-in user.", + "displayName": "Read Teams devices", + "id": "0591bafd-7c1c-4c30-a2a5-2b9aacb1dfe8", + "isEnabled": true, + "origin": "Application", + "value": "TeamworkDevice.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allow the app to read and write the management data for Teams devices, without a signed-in user.", + "displayName": "Read and write Teams devices", + "id": "79c02f5b-bd4f-4713-bc2c-a8a4a66e127b", + "isEnabled": true, + "origin": "Application", + "value": "TeamworkDevice.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read tags in Teams without a signed-in user.", + "displayName": "Read tags in Teams", + "id": "b74fd6c4-4bde-488e-9695-eeb100e4907f", + "isEnabled": true, + "origin": "Application", + "value": "TeamworkTag.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write tags in Teams without a signed-in user.", + "displayName": "Read and write tags in Teams", + "id": "a3371ca5-911d-46d6-901c-42c8c7a937d8", + "isEnabled": true, + "origin": "Application", + "value": "TeamworkTag.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all term store data, without a signed-in user. This includes all sets, groups and terms in the term store.", + "displayName": "Read all term store data", + "id": "ea047cc2-df29-4f3e-83a3-205de61501ca", + "isEnabled": true, + "origin": "Application", + "value": "TermStore.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read, edit or write all term store data, without a signed-in user. This includes all sets, groups and terms in the term store.", + "displayName": "Read and write all term store data", + "id": "f12eb8d6-28e3-46e6-b2c0-b7e4dc69fc95", + "isEnabled": true, + "origin": "Application", + "value": "TermStore.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows an app to read your organization's threat assessment requests, without a signed-in user.", + "displayName": "Read threat assessment requests", + "id": "f8f035bb-2cce-47fb-8bf5-7baf3ecbee48", + "isEnabled": true, + "origin": "Application", + "value": "ThreatAssessment.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to run hunting queries, without a signed-in user.", + "displayName": "Run hunting queries", + "id": "dd98c7f5-2d42-42d3-a0e4-633161547251", + "isEnabled": true, + "origin": "Application", + "value": "ThreatHunting.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all the indicators for your organization, without a signed-in user.", + "displayName": "Read all threat indicators", + "id": "197ee4e9-b993-4066-898f-d6aecc55125b", + "isEnabled": true, + "origin": "Application", + "value": "ThreatIndicators.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to create threat indicators, and fully manage those threat indicators (read, update and delete), without a signed-in user.  It cannot update any threat indicators it does not own.", + "displayName": "Manage threat indicators this app creates or owns", + "id": "21792b6c-c986-4ffc-85de-df9da54b52fa", + "isEnabled": true, + "origin": "Application", + "value": "ThreatIndicators.ReadWrite.OwnedBy" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read threat intellgence information, such as indicators, observations, and and articles, without a signed in user.", + "displayName": "Read all Threat Intelligence Information", + "id": "e0b77adb-e790-44a3-b0a0-257d06303687", + "isEnabled": true, + "origin": "Application", + "value": "ThreatIntelligence.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read your organization's threat submissions and to view threat submission policies without a signed-in user.", + "displayName": "Read all of the organization's threat submissions", + "id": "86632667-cd15-4845-ad89-48a88e8412e1", + "isEnabled": true, + "origin": "Application", + "value": "ThreatSubmission.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read your organization's threat submissions and threat submission policies without a signed-in user. Also allows the app to create new threat submissions without a signed-in user.", + "displayName": "Read and write all of the organization's threat submissions", + "id": "d72bdbf4-a59b-405c-8b04-5995895819ac", + "isEnabled": true, + "origin": "Application", + "value": "ThreatSubmission.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read your organization's threat submission policies without a signed-in user. Also allows the app to create new threat submission polices without a signed-in user.", + "displayName": "Read and write all of the organization's threat submission policies", + "id": "926a6798-b100-4a20-a22f-a4918f13951d", + "isEnabled": true, + "origin": "Application", + "value": "ThreatSubmissionPolicy.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read trust framework key set properties without a signed-in user.", + "displayName": "Read trust framework key sets", + "id": "fff194f1-7dce-4428-8301-1badb5518201", + "isEnabled": true, + "origin": "Application", + "value": "TrustFrameworkKeySet.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write trust framework key set properties without a signed-in user.", + "displayName": "Read and write trust framework key sets", + "id": "4a771c9a-1cf2-4609-b88e-3d3e02d539cd", + "isEnabled": true, + "origin": "Application", + "value": "TrustFrameworkKeySet.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read the lifecycle information like employeeLeaveDateTime of users in your organization, without a signed-in user.", + "displayName": "Read all users' lifecycle information", + "id": "8556a004-db57-4d7a-8b82-97a13428e96f", + "isEnabled": true, + "origin": "Application", + "value": "User-LifeCycleInfo.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write the lifecycle information like employeeLeaveDateTime of users in your organization, without a signed-in user.", + "displayName": "Read and write all users' lifecycle information", + "id": "925f1248-0f97-47b9-8ec8-538c54e01325", + "isEnabled": true, + "origin": "Application", + "value": "User-LifeCycleInfo.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to enable and disable users' accounts, without a signed-in user.", + "displayName": "Enable and disable user accounts", + "id": "3011c876-62b7-4ada-afa2-506cbbecc68c", + "isEnabled": true, + "origin": "Application", + "value": "User.EnableDisableAccount.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to export data (e.g. customer content or system-generated logs), associated with any user in your company, when the app is used by a privileged user (e.g. a Company Administrator).", + "displayName": "Export user's data", + "id": "405a51b5-8d8d-430b-9842-8be4b0e9f324", + "isEnabled": true, + "origin": "Application", + "value": "User.Export.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to invite guest users to the organization, without a signed-in user.", + "displayName": "Invite guest users to the organization", + "id": "09850681-111b-4a89-9bed-3f2cae46d706", + "isEnabled": true, + "origin": "Application", + "value": "User.Invite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read, update and delete identities that are associated with a user's account, without a signed in user. This controls the identities users can sign-in with.", + "displayName": "Manage all users' identities", + "id": "c529cfca-c91b-489c-af2b-d92990b66ce6", + "isEnabled": true, + "origin": "Application", + "value": "User.ManageIdentities.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read user profiles without a signed in user.", + "displayName": "Read all users' full profiles", + "id": "df021288-bdef-4463-88db-98f22de89214", + "isEnabled": true, + "origin": "Application", + "value": "User.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and update user profiles without a signed in user.", + "displayName": "Read and write all users' full profiles", + "id": "741f803b-c850-494e-b5df-cde7c675a1ca", + "isEnabled": true, + "origin": "Application", + "value": "User.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": " Allows the app to read authentication methods of all users in your organization, without a signed-in user. Authentication methods include things like a user’s phone numbers and Authenticator app settings. This does not allow the app to see secret information like passwords, or to sign-in or otherwise use the authentication methods.", + "displayName": " Read all users' authentication methods", + "id": "38d9df27-64da-44fd-b7c5-a6fbac20248f", + "isEnabled": true, + "origin": "Application", + "value": "UserAuthenticationMethod.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to read and write authentication methods of all users in your organization, without a signed-in user. Authentication methods include things like a user’s phone numbers and Authenticator app settings. This does not allow the app to see secret information like passwords, or to sign-in or otherwise use the authentication methods", + "displayName": "Read and write all users' authentication methods ", + "id": "50483e42-d915-4231-9639-7fdb7fd190e5", + "isEnabled": true, + "origin": "Application", + "value": "UserAuthenticationMethod.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to send, read, update and delete user’s notifications, without a signed-in user.", + "displayName": "Deliver and manage all user's notifications", + "id": "4e774092-a092-48d1-90bd-baad67c7eb47", + "isEnabled": true, + "origin": "Application", + "value": "UserNotification.ReadWrite.CreatedByApp" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all users' shift schedule preferences without a signed-in user.", + "displayName": "Read all user shift preferences", + "id": "de023814-96df-4f53-9376-1e2891ef5a18", + "isEnabled": true, + "origin": "Application", + "value": "UserShiftPreferences.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to manage all users' shift schedule preferences without a signed-in user.", + "displayName": "Read and write all user shift preferences", + "id": "d1eec298-80f3-49b0-9efb-d90e224798ac", + "isEnabled": true, + "origin": "Application", + "value": "UserShiftPreferences.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to read virtual appointments for all users, without a signed-in user. The app must also be authorized to access an individual user’s data by the online meetings application access policy.", + "displayName": "Read all virtual appointments for users, as authorized by online meetings application access policy", + "id": "d4f67ec2-59b5-4bdc-b4af-d78f6f9c1954", + "isEnabled": true, + "origin": "Application", + "value": "VirtualAppointment.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the application to read and write virtual appointments for all users, without a signed-in user. The app must also be authorized to access an individual user’s data by the online meetings application access policy.", + "displayName": "Read-write all virtual appointments for users, as authorized by online meetings app access policy", + "id": "bf46a256-f47d-448f-ab78-f226fff08d40", + "isEnabled": true, + "origin": "Application", + "value": "VirtualAppointment.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read all virtual events without a signed-in user.", + "displayName": "Read all users' virtual events", + "id": "1dccb351-c4e4-4e09-a8d1-7a9ecbf027cc", + "isEnabled": true, + "origin": "Application", + "value": "VirtualEvent.Read.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to read and write all Windows update deployment settings for the organization without a signed-in user.", + "displayName": "Read and write all Windows update deployment settings", + "id": "7dd1be58-6e76-4401-bf8d-31d1e8180d5b", + "isEnabled": true, + "origin": "Application", + "value": "WindowsUpdates.ReadWrite.All" + }, + { + "allowedMemberTypes": ["Application"], + "description": "Allows the app to manage workforce integrations to synchronize data from Microsoft Teams Shifts, without a signed-in user.", + "displayName": "Read and write workforce integrations", + "id": "202bf709-e8e6-478e-bcfd-5d63c50b68e3", + "isEnabled": true, + "origin": "Application", + "value": "WorkforceIntegration.ReadWrite.All" + }, + { + "description": "Allows the app to read access reviews, reviewers, decisions and settings that the signed-in user has access to in the organization.", + "displayName": "Read all access reviews that user can access", + "id": "ebfcd32b-babb-40f4-a14b-42706e83bd28", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read information on access reviews, reviewers, decisions and settings that you have access to.", + "userConsentDisplayName": "Read access reviews that you can access", + "value": "AccessReview.Read.All" + }, + { + "description": "Allows the app to read, update, delete and perform actions on access reviews, reviewers, decisions and settings that the signed-in user has access to in the organization.", + "displayName": "Manage all access reviews that user can access", + "id": "e4aa47b9-9a69-4109-82ed-36ec70d85ff1", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, update and perform action on access reviews, reviewers, decisions and settings that you have access to.", + "userConsentDisplayName": "Manage access reviews that you can access", + "value": "AccessReview.ReadWrite.All" + }, + { + "description": "Allows the app to read, update, delete and perform actions on access reviews, reviewers, decisions and settings for group and app memberships that the signed-in user has access to in the organization.", + "displayName": "Manage access reviews for group and app memberships", + "id": "5af8c3f5-baca-439a-97b0-ea58a435e269", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, update and perform action on access reviews, reviewers, decisions and settings that you have access to.", + "userConsentDisplayName": "Manage access reviews for group and app memberships", + "value": "AccessReview.ReadWrite.Membership" + }, + { + "description": "Allows an app to read all acronyms that the signed-in user can access.", + "displayName": "Read all acronyms that the user can access", + "id": "9084c10f-a2d6-4713-8732-348def50fe02", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read all acronyms you can access.", + "userConsentDisplayName": "Read all acronyms that you have access to", + "value": "Acronym.Read.All" + }, + { + "description": "Allows the app to read administrative units and administrative unit membership on behalf of the signed-in user.", + "displayName": "Read administrative units", + "id": "3361d15d-be43-4de6-b441-3c746d05163d", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read administrative units and administrative unit membership on your behalf.", + "userConsentDisplayName": "Read administrative units", + "value": "AdministrativeUnit.Read.All" + }, + { + "description": "Allows the app to create, read, update, and delete administrative units and manage administrative unit membership on behalf of the signed-in user.", + "displayName": "Read and write administrative units", + "id": "7b8a2d34-6b3f-4542-a343-54651608ad81", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to create, read, update, and delete administrative units and manage administrative unit membership on your behalf.", + "userConsentDisplayName": "Read and write administrative units", + "value": "AdministrativeUnit.ReadWrite.All" + }, + { + "description": "Allows the app to read terms of use agreements on behalf of the signed-in user.", + "displayName": "Read all terms of use agreements", + "id": "af2819c9-df71-4dd3-ade7-4d7c9dc653b7", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read terms of use agreements on your behalf.", + "userConsentDisplayName": "Read all terms of use agreements", + "value": "Agreement.Read.All" + }, + { + "description": "Allows the app to read and write terms of use agreements on behalf of the signed-in user.", + "displayName": "Read and write all terms of use agreements", + "id": "ef4b5d93-3104-4664-9053-a5c49ab44218", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write terms of use agreements on your behalf.", + "userConsentDisplayName": "Read and write all terms of use agreements", + "value": "Agreement.ReadWrite.All" + }, + { + "description": "Allows the app to read terms of use acceptance statuses on behalf of the signed-in user.", + "displayName": "Read user terms of use acceptance statuses", + "id": "0b7643bb-5336-476f-80b5-18fbfbc91806", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your terms of use acceptance statuses.", + "userConsentDisplayName": "Read your terms of use acceptance statuses", + "value": "AgreementAcceptance.Read" + }, + { + "description": "Allows the app to read terms of use acceptance statuses on behalf of the signed-in user.", + "displayName": "Read terms of use acceptance statuses that user can access", + "id": "a66a5341-e66e-4897-9d52-c2df58c2bfb9", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read terms of use acceptance statuses on your behalf.", + "userConsentDisplayName": "Read all terms of use acceptance statuses", + "value": "AgreementAcceptance.Read.All" + }, + { + "description": "Allows the app to read the signed-in user's activity statistics, such as how much time the user has spent on emails, in meetings, or in chat sessions.", + "displayName": "Read user activity statistics", + "id": "e03cf23f-8056-446a-8994-7d93dfc8b50e", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your activity statistics, such as how much time you've spent on emails, in meetings, or in chat sessions.", + "userConsentDisplayName": "Read your activity statistics", + "value": "Analytics.Read" + }, + { + "description": "Allows the app to read the API connectors used in user authentication flows, on behalf of the signed-in user.", + "displayName": "Read API connectors for authentication flows", + "id": "1b6ff35f-31df-4332-8571-d31ea5a4893f", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the API connectors used in user authentication flows, on your behalf.", + "userConsentDisplayName": "Read API connectors for authentication flows", + "value": "APIConnectors.Read.All" + }, + { + "description": "Allows the app to read, create and manage the API connectors used in user authentication flows, on behalf of the signed-in user.", + "displayName": "Read and write API connectors for authentication flows", + "id": "c67b52c5-7c69-48b6-9d48-7b3af3ded914", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, create and manage the API connectors used in user authentication flows, on your behalf.", + "userConsentDisplayName": "Read and write API connectors for authentication flows", + "value": "APIConnectors.ReadWrite.All" + }, + { + "description": "Allows the app to read the apps in the app catalogs.", + "displayName": "Read all app catalogs", + "id": "88e58d74-d3df-44f3-ad47-e89edf4472e4", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read apps in the app catalogs.", + "userConsentDisplayName": "Read all app catalogs", + "value": "AppCatalog.Read.All" + }, + { + "description": "Allows the app to create, read, update, and delete apps in the app catalogs.", + "displayName": "Read and write to all app catalogs", + "id": "1ca167d5-1655-44a1-8adf-1414072e1ef9", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to create, read, update, and delete apps in the app catalogs.", + "userConsentDisplayName": "Read and write to all app catalogs", + "value": "AppCatalog.ReadWrite.All" + }, + { + "description": "Allows the app to submit application packages to the catalog and cancel submissions that are pending review on behalf of the signed-in user.", + "displayName": "Submit application packages to the catalog and cancel pending submissions", + "id": "3db89e36-7fa6-4012-b281-85f3d9d9fd2e", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to submit application packages to the catalog and cancel submissions that are pending review on your behalf.", + "userConsentDisplayName": "Submit application packages to your organization's catalog and cancel pending submissions", + "value": "AppCatalog.Submit" + }, + { + "description": "Allows the app to read the trusted certificate authority configuration which can be used to restrict application certificates based on their issuing authority, on behalf of the signed-in user.", + "displayName": "Read the trusted certificate authority configuration for applications", + "id": "af281d3a-030d-4122-886e-146fb30a0413", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the trusted certificate authority configuration which can be used to restrict application certificates based on their issuing authority, on your behalf.", + "userConsentDisplayName": "Read the trusted certificate authority configuration for applications", + "value": "AppCertTrustConfiguration.Read.All" + }, + { + "description": "Allows the app to create, read, update and delete the trusted certificate authority configuration which can be used to restrict application certificates based on their issuing authority, on behalf of the signed-in user.", + "displayName": "Read and write the trusted certificate authority configuration for applications", + "id": "4bae2ed4-473e-4841-a493-9829cfd51d48", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to to create, read, update and delete the trusted certificate authority configuration which can be used to restrict application certificates based on their issuing authority, on your behalf.", + "userConsentDisplayName": "Read and write the trusted certificate authority configuration for applications", + "value": "AppCertTrustConfiguration.ReadWrite.All" + }, + { + "description": "Allows the app to read and write other apps' remote desktop security configuration, on behalf of the signed-in user.", + "displayName": "Read and write the remote desktop security configuration for apps", + "id": "ffa91d43-2ad8-45cc-b592-09caddeb24bb", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write other apps' remote desktop security configuration, on your behalf.", + "userConsentDisplayName": "Read and write the remote desktop security configuration for apps", + "value": "Application-RemoteDesktopConfig.ReadWrite.All" + }, + { + "description": "Allows the app to read applications and service principals on behalf of the signed-in user.", + "displayName": "Read applications", + "id": "c79f8feb-a9db-4090-85f9-90d820caa0eb", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read applications and service principals on your behalf.", + "userConsentDisplayName": "Read applications", + "value": "Application.Read.All" + }, + { + "description": "Allows the app to create, read, update and delete applications and service principals on behalf of the signed-in user. Does not allow management of consent grants.", + "displayName": "Read and write all applications", + "id": "bdfbf15f-ee85-4955-8675-146e8e5296b5", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to create, read, update and delete applications and service principals on your behalf. Does not allow management of consent grants.", + "userConsentDisplayName": "Read and write applications", + "value": "Application.ReadWrite.All" + }, + { + "description": "Allows the app to manage permission grants for application permissions to any API (including Microsoft Graph) and application assignments for any app, on behalf of the signed-in user.", + "displayName": "Manage app permission grants and app role assignments", + "id": "84bccea3-f856-4a8a-967b-dbe0a3d53a64", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to manage permission grants for application permissions to any API (including Microsoft Graph) and application assignments for any app, on your behalf.", + "userConsentDisplayName": "Manage app permission grants and app role assignments", + "value": "AppRoleAssignment.ReadWrite.All" + }, + { + "description": "Allows the app to read attack simulation and training data for an organization for the signed-in user.", + "displayName": "Read attack simulation data of an organization", + "id": "104a7a4b-ca76-4677-b7e7-2f4bc482f381", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read attack simulation and training data for an organization on your behalf.", + "userConsentDisplayName": "Read attack simulation data of an organization", + "value": "AttackSimulation.Read.All" + }, + { + "description": "Allows the app to read, create, and update attack simulation and training data for an organization for the signed-in user.", + "displayName": "Read, create, and update attack simulation data of an organization", + "id": "27608d7c-2c66-4cad-a657-951d575f5a60", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, create, and update attack simulation and training data for an organization on your behalf.", + "userConsentDisplayName": "Read, create, and update attack simulation data of an organization", + "value": "AttackSimulation.ReadWrite.All" + }, + { + "description": "Allows the app to read and query your audit log activities, on behalf of the signed-in user.", + "displayName": "Read audit log data", + "id": "e4c9e354-4dc5-45b8-9e7c-e1393b0b1a20", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and query your audit log activities, on your behalf.", + "userConsentDisplayName": "Read audit log data", + "value": "AuditLog.Read.All" + }, + { + "description": "Allows the app to read all authentication context information in your organization on behalf of the signed-in user.", + "displayName": "Read all authentication context information", + "id": "57b030f1-8c35-469c-b0d9-e4a077debe70", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read all authentication context information in your organization on your behalf.", + "userConsentDisplayName": "Read all authentication context information", + "value": "AuthenticationContext.Read.All" + }, + { + "description": "Allows the app to read and update all authentication context information in your organization on behalf of the signed-in user.", + "displayName": "Read and write all authentication context information", + "id": "ba6d575a-1344-4516-b777-1404f5593057", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and update all authentication context information in your organization on your behalf.", + "userConsentDisplayName": "Read and write all authentication context information", + "value": "AuthenticationContext.ReadWrite.All" + }, + { + "description": "Allows the app to read and write the billing configuration on all applications on behalf of the signed-in user. ", + "displayName": "Read and write application billing configuration", + "id": "2bf6d319-dfca-4c22-9879-f88dcfaee6be", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write the billing configuration on all applications on your behalf", + "userConsentDisplayName": "Read and write application billing configuration", + "value": "BillingConfiguration.ReadWrite.All" + }, + { + "description": "Allows the app to read BitLocker keys on behalf of the signed-in user, for their owned devices. Allows read of the recovery key.", + "displayName": "Read BitLocker keys", + "id": "b27a61ec-b99c-4d6a-b126-c4375d08ae30", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read BitLocker keys for your owned devices. Allows read of the recovery key.", + "userConsentDisplayName": "Read your BitLocker keys", + "value": "BitlockerKey.Read.All" + }, + { + "description": "Allows the app to read basic BitLocker key properties on behalf of the signed-in user, for their owned devices. Does not allow read of the recovery key itself.", + "displayName": "Read BitLocker keys basic information", + "id": "5a107bfc-4f00-4e1a-b67e-66451267bc68", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read basic BitLocker key properties for your owned devices. Does not allow read of the recovery key itself.", + "userConsentDisplayName": "Read your BitLocker keys basic information", + "value": "BitlockerKey.ReadBasic.All" + }, + { + "description": "Allows an app to read, write and manage bookings appointments, businesses, customers, services, and staff on behalf of the signed-in user.", + "displayName": "Manage bookings information", + "id": "7f36b48e-542f-4d3b-9bcb-8406f0ab9fdb", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows an app to read, write and manage bookings appointments, businesses, customers, services, and staff on your behalf.", + "userConsentDisplayName": "Manage bookings information", + "value": "Bookings.Manage.All" + }, + { + "description": "Allows an app to read bookings appointments, businesses, customers, services, and staff on behalf of the signed-in user.", + "displayName": "Read bookings information", + "id": "33b1df99-4b29-4548-9339-7a7b83eaeebc", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows an app to read bookings appointments, businesses, customers, services, and staff on your behalf.", + "userConsentDisplayName": "Read bookings information", + "value": "Bookings.Read.All" + }, + { + "description": "Allows an app to read and write bookings appointments, businesses, customers, services, and staff on behalf of the signed-in user. Does not allow create, delete and publish of booking businesses.", + "displayName": "Read and write bookings information", + "id": "948eb538-f19d-4ec5-9ccc-f059e1ea4c72", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows an app to read and write Bookings appointments, businesses, customers, services, and staff on your behalf. Does not allow create, delete and publish of booking businesses.", + "userConsentDisplayName": "Read and write bookings information", + "value": "Bookings.ReadWrite.All" + }, + { + "description": "Allows an app to read and write bookings appointments and customers, and additionally allows read businesses information, services, and staff on behalf of the signed-in user.", + "displayName": "Read and write booking appointments", + "id": "02a5a114-36a6-46ff-a102-954d89d9ab02", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows an app to read and write bookings appointments and customers, and additionally allows read businesses information, services, and staff on your behalf.", + "userConsentDisplayName": "Read and write booking appointments", + "value": "BookingsAppointment.ReadWrite.All" + }, + { + "description": "Allows an app to read all bookmarks that the signed-in user can access.", + "displayName": "Read all bookmarks that the user can access", + "id": "98b17b35-f3b1-4849-a85f-9f13733002f0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read all bookmarks you can access.", + "userConsentDisplayName": "Read all bookmarks that you have access to", + "value": "Bookmark.Read.All" + }, + { + "description": "Allows an app to read the browser site lists configured for your organization, on behalf of the signed-in user.", + "displayName": "Read browser site lists for your organization", + "id": "fb9be2b7-a7fc-4182-aec1-eda4597c43d5", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows an app to read the browser site lists configured for your organization, on your behalf.", + "userConsentDisplayName": "Read browser site lists for your organization", + "value": "BrowserSiteLists.Read.All" + }, + { + "description": "Allows an app to read and write the browser site lists configured for your organization, on behalf of the signed-in user.", + "displayName": "Read and write browser site lists for your organization", + "id": "83b34c85-95bf-497b-a04e-b58eca9d49d0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows an app to read and write the browser site lists configured for your organization, on your behalf.", + "userConsentDisplayName": "Read and write browser site lists for your organization", + "value": "BrowserSiteLists.ReadWrite.All" + }, + { + "description": "Allows the app to read the configurations of your organization's business scenarios, on behalf of the signed-in user.", + "displayName": "Read business scenario configurations", + "id": "d16480b2-e469-4118-846b-d3d177327bee", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the configurations of your organization's business scenarios, on your behalf.", + "userConsentDisplayName": "Read business scenario configurations", + "value": "BusinessScenarioConfig.Read.All" + }, + { + "description": "Allows the app to read the configurations of business scenarios it owns, on behalf of the signed-in user.", + "displayName": "Read business scenario configurations this app creates or owns", + "id": "c47e7b6e-d6f1-4be9-9ffd-1e00f3e32892", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the configurations of business scenarios it owns, on your behalf.", + "userConsentDisplayName": "Read business scenario configurations this app creates or owns", + "value": "BusinessScenarioConfig.Read.OwnedBy" + }, + { + "description": "Allows the app to read and write the configurations of your organization's business scenarios, on behalf of the signed-in user.", + "displayName": "Read and write business scenario configurations", + "id": "755e785b-b658-446f-bb22-5a46abd029ea", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write the configurations of your organization's business scenarios, on your behalf.", + "userConsentDisplayName": "Read and write business scenario configurations", + "value": "BusinessScenarioConfig.ReadWrite.All" + }, + { + "description": "Allows the app to create new business scenarios and fully manage the configurations of scenarios it owns, on behalf of the signed-in user.", + "displayName": "Read and write business scenario configurations this app creates or owns", + "id": "b3b7fcff-b4d4-4230-bf6f-90bd91285395", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to create new business scenarios and fully manage the configurations of scenarios it owns, on your behalf.", + "userConsentDisplayName": "Read and write business scenario configurations this app creates or owns", + "value": "BusinessScenarioConfig.ReadWrite.OwnedBy" + }, + { + "description": "Allows the app to read all data associated with the business scenarios it owns. Data access will be attributed to the signed-in user.", + "displayName": "Read all data for business scenarios this app creates or owns", + "id": "25b265c4-5d34-4e44-952d-b567f6d3b96d", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read all data associated with the business scenarios it owns. Data access will be attributed to you.", + "userConsentDisplayName": "Read data for business scenarios this app creates or owns", + "value": "BusinessScenarioData.Read.OwnedBy" + }, + { + "description": "Allows the app to fully manage all data associated with the business scenarios it owns. Data access and changes will be attributed to the signed-in user.", + "displayName": "Read and write all data for business scenarios this app creates or owns", + "id": "19932d57-2952-4c60-8634-3655c79fc527", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to fully manage all data associated with the business scenarios it owns. These changes will be attributed to you.", + "userConsentDisplayName": "Read and write data for business scenarios this app creates or owns", + "value": "BusinessScenarioData.ReadWrite.OwnedBy" + }, + { + "description": "Allows the app to read events in user calendars . ", + "displayName": "Read user calendars ", + "id": "465a38f9-76ea-45b9-9f34-9e8b0d4b0b42", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read events in your calendars. ", + "userConsentDisplayName": "Read your calendars ", + "value": "Calendars.Read" + }, + { + "description": "Allows the app to read events in all calendars that the user can access, including delegate and shared calendars.", + "displayName": "Read user and shared calendars", + "id": "2b9c4092-424d-4249-948d-b43879977640", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read events in all calendars that you can access, including delegate and shared calendars. ", + "userConsentDisplayName": "Read calendars you can access", + "value": "Calendars.Read.Shared" + }, + { + "description": "Allows the app to read events in user calendars, except for properties such as body, attachments, and extensions.", + "displayName": "Read basic details of user calendars", + "id": "662d75ba-a364-42ad-adee-f5f880ea4878", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read events in your calendars, except for properties such as body, attachments, and extensions.", + "userConsentDisplayName": "Read basic details of your calendars", + "value": "Calendars.ReadBasic" + }, + { + "description": "Allows the app to create, read, update, and delete events in user calendars. ", + "displayName": "Have full access to user calendars ", + "id": "1ec239c2-d7c9-4623-a91a-a9775856bb36", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, update, create and delete events in your calendars. ", + "userConsentDisplayName": "Have full access to your calendars ", + "value": "Calendars.ReadWrite" + }, + { + "description": "Allows the app to create, read, update and delete events in all calendars in the organization user has permissions to access. This includes delegate and shared calendars.", + "displayName": "Read and write user and shared calendars", + "id": "12466101-c9b8-439a-8589-dd09ee67e8e9", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, update, create and delete events in all calendars in your organization you have permissions to access. This includes delegate and shared calendars.", + "userConsentDisplayName": "Read and write to your and shared calendars", + "value": "Calendars.ReadWrite.Shared" + }, + { + "description": "Create channels in any team, on behalf of the signed-in user.", + "displayName": "Create channels", + "id": "101147cf-4178-4455-9d58-02b5c164e759", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Create channels in any team, on your behalf.", + "userConsentDisplayName": "Create channels", + "value": "Channel.Create" + }, + { + "description": "Delete channels in any team, on behalf of the signed-in user.", + "displayName": "Delete channels", + "id": "cc83893a-e232-4723-b5af-bd0b01bcfe65", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Delete channels in any team, on your behalf.", + "userConsentDisplayName": "Delete channels", + "value": "Channel.Delete.All" + }, + { + "description": "Read channel names and channel descriptions, on behalf of the signed-in user.", + "displayName": "Read the names and descriptions of channels", + "id": "9d8982ae-4365-4f57-95e9-d6032a4c0b87", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Read channel names and channel descriptions, on your behalf.", + "userConsentDisplayName": "Read the names and descriptions of channels", + "value": "Channel.ReadBasic.All" + }, + { + "description": "Read the members of channels, on behalf of the signed-in user.", + "displayName": "Read the members of channels", + "id": "2eadaff8-0bce-4198-a6b9-2cfc35a30075", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Read the members of channels, on your behalf.", + "userConsentDisplayName": "Read the members of teams and channels", + "value": "ChannelMember.Read.All" + }, + { + "description": "Add and remove members from channels, on behalf of the signed-in user. Also allows changing a member's role, for example from owner to non-owner.", + "displayName": "Add and remove members from channels", + "id": "0c3e411a-ce45-4cd1-8f30-f99a3efa7b11", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Add and remove members from channels, on your behalf. Also allows changing a member's role, for example from owner to non-owner.", + "userConsentDisplayName": "Add and remove members from teams and channels", + "value": "ChannelMember.ReadWrite.All" + }, + { + "description": "Allows an app to edit channel messages in Microsoft Teams, on behalf of the signed-in user.", + "displayName": "Edit user's channel messages", + "id": "2b61aa8a-6d36-4b2f-ac7b-f29867937c53", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to edit channel messages in Microsoft Teams, on your behalf.", + "userConsentDisplayName": "Edit your channel messages", + "value": "ChannelMessage.Edit" + }, + { + "description": "Allows an app to read a channel's messages in Microsoft Teams, on behalf of the signed-in user.", + "displayName": "Read user channel messages", + "id": "767156cb-16ae-4d10-8f8b-41b657c8c8c8", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read a channel's messages in Microsoft Teams, on your behalf.", + "userConsentDisplayName": "Read your channel messages", + "value": "ChannelMessage.Read.All" + }, + { + "description": "Allows the app to read and write channel messages, on behalf of the signed-in user. This doesn't allow the app to edit the policyViolation of a channel message.", + "displayName": "Read and write user channel messages", + "id": "5922d31f-46c8-4404-9eaf-2117e390a8a4", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write channel messages, on your behalf. This doesn't allow the app to edit the policyViolation of a channel message.", + "userConsentDisplayName": "Read and write user channel messages", + "value": "ChannelMessage.ReadWrite" + }, + { + "description": "Allows an app to send channel messages in Microsoft Teams, on behalf of the signed-in user.", + "displayName": "Send channel messages", + "id": "ebf0f66e-9fb1-49e4-a278-222f76911cf4", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to send channel messages in Microsoft Teams, on your behalf.", + "userConsentDisplayName": "Send channel messages", + "value": "ChannelMessage.Send" + }, + { + "description": "Read all channel names, channel descriptions, and channel settings, on behalf of the signed-in user.", + "displayName": "Read the names, descriptions, and settings of channels", + "id": "233e0cf1-dd62-48bc-b65b-b38fe87fcf8e", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Read all channel names, channel descriptions, and channel settings, on your behalf.", + "userConsentDisplayName": "Read the names, descriptions, and settings of channels", + "value": "ChannelSettings.Read.All" + }, + { + "description": "Read and write the names, descriptions, and settings of all channels, on behalf of the signed-in user.", + "displayName": "Read and write the names, descriptions, and settings of channels", + "id": "d649fb7c-72b4-4eec-b2b4-b15acf79e378", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Read and write the names, descriptions, and settings of all channels, on your behalf.", + "userConsentDisplayName": "Read and write the names, descriptions, and settings of channels", + "value": "ChannelSettings.ReadWrite.All" + }, + { + "description": "Allows the app to create chats on behalf of the signed-in user.", + "displayName": "Create chats", + "id": "38826093-1258-4dea-98f0-00003be2b8d0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to create chats on your behalf. ", + "userConsentDisplayName": "Create chats", + "value": "Chat.Create" + }, + { + "description": "Allows the app to delete and recover deleted chats, on behalf of the signed-in user.", + "displayName": "Delete and recover deleted chats", + "id": "bb64e6fc-6b6d-4752-aea0-dd922dbba588", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to delete and recover deleted chats, on your behalf.", + "userConsentDisplayName": "Delete and recover deleted chats", + "value": "Chat.ManageDeletion.All" + }, + { + "description": "Allows an app to read 1 on 1 or group chats threads, on behalf of the signed-in user.", + "displayName": "Read user chat messages", + "id": "f501c180-9344-439a-bca0-6cbf209fd270", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows an app to read your 1 on 1 or group chat messages in Microsoft Teams, on your behalf.", + "userConsentDisplayName": "Read your chat messages", + "value": "Chat.Read" + }, + { + "description": "Allows an app to read the members and descriptions of one-to-one and group chat threads, on behalf of the signed-in user.", + "displayName": "Read names and members of user chat threads", + "id": "9547fcb5-d03f-419d-9948-5928bbf71b0f", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows an app to read the members and descriptions of one-to-one and group chat threads, on your behalf.", + "userConsentDisplayName": "Read names and members of your chat threads", + "value": "Chat.ReadBasic" + }, + { + "description": "Allows an app to read and write 1 on 1 or group chats threads, on behalf of the signed-in user.", + "displayName": "Read and write user chat messages", + "id": "9ff7295e-131b-4d94-90e1-69fde507ac11", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows an app to read and write your 1 on 1 or group chat messages in Microsoft Teams, on your behalf.", + "userConsentDisplayName": "Read and write your chat messages", + "value": "Chat.ReadWrite" + }, + { + "description": "Read the members of chats, on behalf of the signed-in user.", + "displayName": "Read the members of chats", + "id": "c5a9e2b1-faf6-41d4-8875-d381aa549b24", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Read the members of chats, on your behalf.", + "userConsentDisplayName": "Read the members of chats", + "value": "ChatMember.Read" + }, + { + "description": "Add and remove members from chats, on behalf of the signed-in user.", + "displayName": "Add and remove members from chats", + "id": "dea13482-7ea6-488f-8b98-eb5bbecf033d", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Add and remove members from chats, on your behalf.", + "userConsentDisplayName": "Add and remove members from chats", + "value": "ChatMember.ReadWrite" + }, + { + "description": "Allows an app to read one-to-one and group chat messages, on behalf of the signed-in user.", + "displayName": "Read user chat messages", + "id": "cdcdac3a-fd45-410d-83ef-554db620e5c7", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows an app to read one-to-one or group chat messages in Microsoft Teams, on your behalf.", + "userConsentDisplayName": "Read user chat messages", + "value": "ChatMessage.Read" + }, + { + "description": "Allows an app to send one-to-one and group chat messages in Microsoft Teams, on behalf of the signed-in user.", + "displayName": "Send user chat messages", + "id": "116b7235-7cc6-461e-b163-8e55691d839e", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows an app to send one-to-one and group chat messages in Microsoft Teams, on your behalf.", + "userConsentDisplayName": "Send chat messages", + "value": "ChatMessage.Send" + }, + { + "description": "Allows the app to read details of discovered cloud apps in the organization, on behalf of the signed in user.", + "displayName": "Read discovered cloud applications data", + "id": "ad46d60e-1027-4b75-af88-7c14ccf43a19", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read details of discovered cloud apps in the organization, on your behalf.", + "userConsentDisplayName": "Read discovered cloud application data", + "value": "CloudApp-Discovery.Read.All" + }, + { + "description": "Allows the app to read the properties of Cloud PCs on behalf of the signed-in user.", + "displayName": "Read Cloud PCs", + "id": "5252ec4e-fd40-4d92-8c68-89dd1d3c6110", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the properties of Cloud PCs, on your behalf.", + "userConsentDisplayName": "Read Cloud PCs", + "value": "CloudPC.Read.All" + }, + { + "description": "Allows the app to read and write the properties of Cloud PCs on behalf of the signed-in user.", + "displayName": "Read and write Cloud PCs", + "id": "9d77138f-f0e2-47ba-ab33-cd246c8b79d1", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write the properties of Cloud PCs, on your behalf.", + "userConsentDisplayName": "Read and write Cloud PCs", + "value": "CloudPC.ReadWrite.All" + }, + { + "description": "Allows the app to read consent requests and approvals on behalf of the signed-in user.", + "displayName": "Read consent requests", + "id": "f3bfad56-966e-4590-a536-82ecf548ac1e", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read consent requests and approvals, on your behalf.", + "userConsentDisplayName": "Read consent requests", + "value": "ConsentRequest.Read.All" + }, + { + "description": "Allows the app to read app consent requests and approvals, and deny or approve those requests on behalf of the signed-in user.", + "displayName": "Read and write consent requests", + "id": "497d9dfa-3bd1-481a-baab-90895e54568c", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read app consent requests for your approval, and deny or approve those request on your behalf.", + "userConsentDisplayName": "Read and write consent requests", + "value": "ConsentRequest.ReadWrite.All" + }, + { + "description": "Allows the app to read user contacts. ", + "displayName": "Read user contacts ", + "id": "ff74d97f-43af-4b68-9f2a-b77ee6968c5d", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read contacts in your contact folders. ", + "userConsentDisplayName": "Read your contacts ", + "value": "Contacts.Read" + }, + { + "description": "Allows the app to read contacts a user has permissions to access, including their own and shared contacts.", + "displayName": "Read user and shared contacts", + "id": "242b9d9e-ed24-4d09-9a52-f43769beb9d4", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read contacts you have permissions to access, including your own and shared contacts.", + "userConsentDisplayName": "Read your and shared contacts", + "value": "Contacts.Read.Shared" + }, + { + "description": "Allows the app to create, read, update, and delete user contacts. ", + "displayName": "Have full access to user contacts ", + "id": "d56682ec-c09e-4743-aaf4-1a3aac4caa21", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, update, create and delete contacts in your contact folders. ", + "userConsentDisplayName": "Have full access of your contacts ", + "value": "Contacts.ReadWrite" + }, + { + "description": "Allows the app to create, read, update, and delete contacts a user has permissions to, including their own and shared contacts.", + "displayName": "Read and write user and shared contacts", + "id": "afb6c84b-06be-49af-80bb-8f3f77004eab", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, update, create, and delete contacts you have permissions to access, including your own and shared contacts.", + "userConsentDisplayName": "Read and write to your and shared contacts", + "value": "Contacts.ReadWrite.Shared" + }, + { + "description": "Allows the application to obtain basic tenant information about another target tenant within the Azure AD ecosystem on behalf of the signed-in user.", + "displayName": "Read cross-tenant basic information", + "id": "81594d25-e88e-49cf-ac8c-fecbff49f994", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to obtain basic tenant information about another target tenant within the Azure AD ecosystem on your behalf.", + "userConsentDisplayName": "Read cross-tenant basic information", + "value": "CrossTenantInformation.ReadBasic.All" + }, + { + "description": "Allows the application to list and query user profile information associated with the current tenant on behalf of the signed-in user.  It also permits the application to export external user data (e.g. customer content or system-generated logs), associated with the current tenant on behalf of the signed-in user.", + "displayName": "Read shared cross-tenant user profile and export data", + "id": "cb1ba48f-d22b-4325-a07f-74135a62ee41", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to list and query shared user profile information associated with the current tenant on your behalf.  It also permits the application to export your external user data (e.g. customer content or system-generated logs), associated with the current tenant on your behalf.", + "userConsentDisplayName": "Read shared cross-tenant user profile and export data", + "value": "CrossTenantUserProfileSharing.Read" + }, + { + "description": "Allows the application to list and query any shared user profile information associated with the current tenant on behalf of the signed-in user.  It also permits the application to export external user data (e.g. customer content or system-generated logs), for any user associated with the current tenant on behalf of the signed-in user.", + "displayName": "Read all shared cross-tenant user profiles and export their data", + "id": "759dcd16-3c90-463c-937e-abf89f991c18", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to list and query any shared user profile information associated with the current tenant on your behalf.  It also permits the application to export external user data (e.g. customer content or system-generated logs), for any user associated with the current tenant on your behalf.", + "userConsentDisplayName": "Read any shared cross-tenant user profiles and export data", + "value": "CrossTenantUserProfileSharing.Read.All" + }, + { + "description": "Allows the application to list and query user profile information associated with the current tenant on behalf of the signed-in user.  It also permits the application to export and remove external user data (e.g. customer content or system-generated logs), associated with the current tenant on behalf of the signed-in user.", + "displayName": "Read shared cross-tenant user profile and export or delete data", + "id": "eed0129d-dc60-4f30-8641-daf337a39ffd", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to list and query shared user profile information associated with the current tenant on your behalf.  It also permits the application to export and remove your external user data (e.g. customer content or system-generated logs), associated with the current tenant on your behalf.", + "userConsentDisplayName": "Read shared cross-tenant user profile and export or delete data", + "value": "CrossTenantUserProfileSharing.ReadWrite" + }, + { + "description": "Allows the application to list and query any shared user profile information associated with the current tenant on behalf of the signed-in user.  It also permits the application to export and remove external user data (e.g. customer content or system-generated logs), for any user associated with the current tenant on behalf of the signed-in user.", + "displayName": "Read all shared cross-tenant user profiles and export or delete their data", + "id": "64dfa325-cbf8-48e3-938d-51224a0cac01", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to list and query any shared user profile information associated with the current tenant on your behalf.  It also permits the application to export and remove external user data (e.g. customer content or system-generated logs), for any user associated with the current tenant on your behalf.", + "userConsentDisplayName": "Read any shared cross-tenant user profiles and export or delete data", + "value": "CrossTenantUserProfileSharing.ReadWrite.All" + }, + { + "description": "Allows the app to read your organization's custom authentication extensions on behalf of the signed-in user.", + "displayName": "Read your oganization's custom authentication extensions", + "id": "b2052569-c98c-4f36-a5fb-43e5c111e6d0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your organization's custom authentication extensions on your behalf.", + "userConsentDisplayName": "Read your organization's custom authentication extensions", + "value": "CustomAuthenticationExtension.Read.All" + }, + { + "description": "Allows the app to read or write your organization's custom authentication extensions on behalf of the signed-in user.", + "displayName": "Read and write your organization's custom authentication extensions", + "id": "8dfcf82f-15d0-43b3-bc78-a958a13a5792", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read or write your organization's custom authentication extensions on your behalf.", + "userConsentDisplayName": "Read and write your organization's custom authentication extensions", + "value": "CustomAuthenticationExtension.ReadWrite.All" + }, + { + "description": "Allows the app to read custom security attribute assignments for all principals in the tenant on behalf of a signed in user.", + "displayName": "Read custom security attribute assignments", + "id": "b46ffa80-fe3d-4822-9a1a-c200932d54d0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read custom security attribute assignments for all principals in the tenant on your behalf.", + "userConsentDisplayName": "Read custom security attribute assignments", + "value": "CustomSecAttributeAssignment.Read.All" + }, + { + "description": "Allows the app to read and write custom security attribute assignments for all principals in the tenant on behalf of a signed in user.", + "displayName": "Read and write custom security attribute assignments", + "id": "ca46335e-8453-47cd-a001-8459884efeae", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write custom security attribute assignments for all principals in the tenant on your behalf.", + "userConsentDisplayName": "Read and write custom security attribute assignments", + "value": "CustomSecAttributeAssignment.ReadWrite.All" + }, + { + "description": "Allows the app to read audit logs for events that contain information about custom security attributes, on behalf of the signed-in user.", + "displayName": "Read custom security attribute audit logs", + "id": "1fcdeaab-b519-44dd-bffc-ed1fd15a24e0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read custom security attributes audit logs on your behalf.", + "userConsentDisplayName": "Read custom security attribute audit logs", + "value": "CustomSecAttributeAuditLogs.Read.All" + }, + { + "description": "Allows the app to read custom security attribute definitions for the tenant on behalf of a signed in user.", + "displayName": "Read custom security attribute definitions", + "id": "ce026878-a0ff-4745-a728-d4fedd086c07", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read custom security attribute definitions for the tenant on your behalf.", + "userConsentDisplayName": "Read custom security attribute definitions", + "value": "CustomSecAttributeDefinition.Read.All" + }, + { + "description": "Allows the app to read and write custom security attribute definitions for the tenant on behalf of a signed in user.", + "displayName": "Read and write custom security attribute definitions", + "id": "8b0160d4-5743-482b-bb27-efc0a485ca4a", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write custom security attribute definitions for the tenant on your behalf.", + "userConsentDisplayName": "Read and write custom security attribute definitions", + "value": "CustomSecAttributeDefinition.ReadWrite.All" + }, + { + "description": "Allows the app to read details of delegated admin relationships with customers like access details (that includes roles) and the duration as well as specific role assignments to security groups on behalf of the signed-in user.", + "displayName": "Read Delegated Admin relationships with customers", + "id": "0c0064ea-477b-4130-82a5-4c2cc4ff68aa", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read details of Delegated Admin relationships with customers like access details (that includes roles) and the duration as well as specific role assignments to security groups on your behalf.", + "userConsentDisplayName": "Read Delegated Admin relationships with customers", + "value": "DelegatedAdminRelationship.Read.All" + }, + { + "description": "Allows the app to manage (create-update-terminate) Delegated Admin relationships with customers as well as role assignments to security groups for active Delegated Admin relationships on behalf of the signed-in user.", + "displayName": "Manage Delegated Admin relationships with customers", + "id": "885f682f-a990-4bad-a642-36736a74b0c7", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to manage (create-update-terminate) Delegated Admin relationships with customers and role assignments to security groups for active Delegated Admin relationships on your behalf.", + "userConsentDisplayName": "Manage Delegated Admin relationships with customers", + "value": "DelegatedAdminRelationship.ReadWrite.All" + }, + { + "description": "Allows the app to read delegated permission grants, on behalf of the signed in user.", + "displayName": "Read delegated permission grants", + "id": "a197cdc4-a8e8-4d49-9d35-4ca7c83887b4", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read delegated permission grants, on your behalf.", + "userConsentDisplayName": "Read delegated permission grants", + "value": "DelegatedPermissionGrant.Read.All" + }, + { + "description": "Allows the app to manage permission grants for delegated permissions exposed by any API (including Microsoft Graph), on behalf of the signed in user.", + "displayName": "Manage all delegated permission grants", + "id": "41ce6ca6-6826-4807-84f1-1c82854f7ee5", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to manage permission grants for delegated permissions exposed by any API (including Microsoft Graph), on your behalf. ", + "userConsentDisplayName": "Manage all delegated permission grants", + "value": "DelegatedPermissionGrant.ReadWrite.All" + }, + { + "description": "Allows the app to launch another app or communicate with another app on a user's device on behalf of the signed-in user.", + "displayName": "Communicate with user devices", + "id": "bac3b9c2-b516-4ef4-bd3b-c2ef73d8d804", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to launch another app or communicate with another app on a device that you own.", + "userConsentDisplayName": "Communicate with your other devices", + "value": "Device.Command" + }, + { + "description": "Allows the app to read a user's list of devices on behalf of the signed-in user.", + "displayName": "Read user devices", + "id": "11d4cd79-5ba5-460f-803f-e22c8ab85ccd", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to see your list of devices.", + "userConsentDisplayName": "View your list of devices", + "value": "Device.Read" + }, + { + "description": "Allows the app to read your organization's devices' configuration information on behalf of the signed-in user.", + "displayName": "Read all devices", + "id": "951183d1-1a61-466f-a6d1-1fde911bfd95", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read devices' configuration information on your behalf.", + "userConsentDisplayName": "Read all devices", + "value": "Device.Read.All" + }, + { + "description": "Allows the app to read device local credential properties including passwords, on behalf of the signed-in user.", + "displayName": "Read device local credential passwords", + "id": "280b3b69-0437-44b1-bc20-3b2fca1ee3e9", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read device local credential properties including passwords, on your behalf.", + "userConsentDisplayName": "Read device local credential passwords", + "value": "DeviceLocalCredential.Read.All" + }, + { + "description": "Allows the app to read device local credential properties excluding passwords, on behalf of the signed-in user.", + "displayName": "Read device local credential properties", + "id": "9917900e-410b-4d15-846e-42a357488545", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read device local credential properties excluding passwords, on your behalf.", + "userConsentDisplayName": "Read device local credential properties", + "value": "DeviceLocalCredential.ReadBasic.All" + }, + { + "description": "Allows the app to read the properties, group assignments and status of apps, app configurations and app protection policies managed by Microsoft Intune.", + "displayName": "Read Microsoft Intune apps", + "id": "4edf5f54-4666-44af-9de9-0144fb4b6e8c", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the properties, group assignments and status of apps, app configurations and app protection policies managed by Microsoft Intune.", + "userConsentDisplayName": "Read Microsoft Intune apps", + "value": "DeviceManagementApps.Read.All" + }, + { + "description": "Allows the app to read and write the properties, group assignments and status of apps, app configurations and app protection policies managed by Microsoft Intune.", + "displayName": "Read and write Microsoft Intune apps", + "id": "7b3f05d5-f68c-4b8d-8c59-a2ecd12f24af", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write the properties, group assignments and status of apps, app configurations and app protection policies managed by Microsoft Intune.", + "userConsentDisplayName": "Read and write Microsoft Intune apps", + "value": "DeviceManagementApps.ReadWrite.All" + }, + { + "description": "Allows the app to read properties of Microsoft Intune-managed device configuration and device compliance policies and their assignment to groups.", + "displayName": "Read Microsoft Intune Device Configuration and Policies", + "id": "f1493658-876a-4c87-8fa7-edb559b3476a", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read properties of Microsoft Intune-managed device configuration and device compliance policies and their assignment to groups.", + "userConsentDisplayName": "Read Microsoft Intune Device Configuration and Policies", + "value": "DeviceManagementConfiguration.Read.All" + }, + { + "description": "Allows the app to read and write properties of Microsoft Intune-managed device configuration and device compliance policies and their assignment to groups.", + "displayName": "Read and write Microsoft Intune Device Configuration and Policies", + "id": "0883f392-0a7a-443d-8c76-16a6d39c7b63", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write properties of Microsoft Intune-managed device configuration and device compliance policies and their assignment to groups.", + "userConsentDisplayName": "Read and write Microsoft Intune Device Configuration and Policies", + "value": "DeviceManagementConfiguration.ReadWrite.All" + }, + { + "description": "Allows the app to perform remote high impact actions such as wiping the device or resetting the passcode on devices managed by Microsoft Intune.", + "displayName": "Perform user-impacting remote actions on Microsoft Intune devices", + "id": "3404d2bf-2b13-457e-a330-c24615765193", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to perform remote high impact actions such as wiping the device or resetting the passcode on devices managed by Microsoft Intune.", + "userConsentDisplayName": "Perform user-impacting remote actions on Microsoft Intune devices", + "value": "DeviceManagementManagedDevices.PrivilegedOperations.All" + }, + { + "description": "Allows the app to read the properties of devices managed by Microsoft Intune.", + "displayName": "Read Microsoft Intune devices", + "id": "314874da-47d6-4978-88dc-cf0d37f0bb82", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the properties of devices managed by Microsoft Intune.", + "userConsentDisplayName": "Read devices Microsoft Intune devices", + "value": "DeviceManagementManagedDevices.Read.All" + }, + { + "description": "Allows the app to read and write the properties of devices managed by Microsoft Intune. Does not allow high impact operations such as remote wipe and password reset on the device’s owner.", + "displayName": "Read and write Microsoft Intune devices", + "id": "44642bfe-8385-4adc-8fc6-fe3cb2c375c3", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write the properties of devices managed by Microsoft Intune. Does not allow high impact operations such as remote wipe and password reset on the device’s owner.", + "userConsentDisplayName": "Read and write Microsoft Intune devices", + "value": "DeviceManagementManagedDevices.ReadWrite.All" + }, + { + "description": "Allows the app to read the properties relating to the Microsoft Intune Role-Based Access Control (RBAC) settings.", + "displayName": "Read Microsoft Intune RBAC settings", + "id": "49f0cc30-024c-4dfd-ab3e-82e137ee5431", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the properties relating to the Microsoft Intune Role-Based Access Control (RBAC) settings.", + "userConsentDisplayName": "Read Microsoft Intune RBAC settings", + "value": "DeviceManagementRBAC.Read.All" + }, + { + "description": "Allows the app to read and write the properties relating to the Microsoft Intune Role-Based Access Control (RBAC) settings.", + "displayName": "Read and write Microsoft Intune RBAC settings", + "id": "0c5e8a55-87a6-4556-93ab-adc52c4d862d", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write the properties relating to the Microsoft Intune Role-Based Access Control (RBAC) settings.", + "userConsentDisplayName": "Read and write Microsoft Intune RBAC settings", + "value": "DeviceManagementRBAC.ReadWrite.All" + }, + { + "description": "Allows the app to read Microsoft Intune service properties including device enrollment and third party service connection configuration.", + "displayName": "Read Microsoft Intune configuration", + "id": "8696daa5-bce5-4b2e-83f9-51b6defc4e1e", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read Microsoft Intune service properties including device enrollment and third party service connection configuration.", + "userConsentDisplayName": "Read Microsoft Intune configuration", + "value": "DeviceManagementServiceConfig.Read.All" + }, + { + "description": "Allows the app to read and write Microsoft Intune service properties including device enrollment and third party service connection configuration.", + "displayName": "Read and write Microsoft Intune configuration", + "id": "662ed50a-ac44-4eef-ad86-62eed9be2a29", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write Microsoft Intune service properties including device enrollment and third party service connection configuration.", + "userConsentDisplayName": "Read and write Microsoft Intune configuration", + "value": "DeviceManagementServiceConfig.ReadWrite.All" + }, + { + "description": "Allows the app to have the same access to information in the directory as the signed-in user.", + "displayName": "Access directory as the signed in user", + "id": "0e263e50-5827-48a4-b97c-d940288653c7", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to have the same access to information in your work or school directory as you do.", + "userConsentDisplayName": "Access the directory as you", + "value": "Directory.AccessAsUser.All" + }, + { + "description": "Allows the app to read data in your organization's directory, such as users, groups and apps.", + "displayName": "Read directory data", + "id": "06da0dbc-49e2-44d2-8312-53f166ab848a", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read data in your organization's directory.", + "userConsentDisplayName": "Read directory data", + "value": "Directory.Read.All" + }, + { + "description": "Allows the app to read and write data in your organization's directory, such as users, and groups. It does not allow the app to delete users or groups, or reset user passwords.", + "displayName": "Read and write directory data", + "id": "c5366453-9fb0-48a5-a156-24f0c49a4b84", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write data in your organization's directory, such as other users, groups. It does not allow the app to delete users or groups, or reset user passwords.", + "userConsentDisplayName": "Read and write directory data", + "value": "Directory.ReadWrite.All" + }, + { + "description": "Allows the app to manage restricted resources based on the other permissions granted to the app, on behalf of the signed-in user.", + "displayName": "Manage restricted resources in the directory", + "id": "cba5390f-ed6a-4b7f-b657-0efc2210ed20", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to manage restricted resources based on the other permissions granted to the app, on your behalf.", + "userConsentDisplayName": "Manage restricted resources in the directory", + "value": "Directory.Write.Restricted" + }, + { + "description": "Allows the app to read Azure AD recommendations, on behalf of the signed-in user.", + "displayName": "Read Azure AD recommendations", + "id": "34d3bd24-f6a6-468c-b67c-0c365c1d6410", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read Azure AD recommendations, on your behalf.", + "userConsentDisplayName": "Read Azure AD recommendations", + "value": "DirectoryRecommendations.Read.All" + }, + { + "description": "Allows the app to read and update Azure AD recommendations, on behalf of the signed-in user. ", + "displayName": "Read and update Azure AD recommendations", + "id": "f37235e8-90a0-4189-93e2-e55b53867ccd", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and update Azure AD recommendations, on your behalf.", + "userConsentDisplayName": "Read and update Azure AD recommendations", + "value": "DirectoryRecommendations.ReadWrite.All" + }, + { + "description": "Allows the app to read all domain properties on behalf of the signed-in user.", + "displayName": "Read domains.", + "id": "2f9ee017-59c1-4f1d-9472-bd5529a7b311", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read all domain properties on your behalf.", + "userConsentDisplayName": "Read domains.", + "value": "Domain.Read.All" + }, + { + "description": "Allows the app to read and write all domain properties on behalf of the signed-in user. Also allows the app to add, verify and remove domains.", + "displayName": "Read and write domains", + "id": "0b5d694c-a244-4bde-86e6-eb5cd07730fe", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write all domain properties on your behalf. Also allows the app to add, verify and remove domains.", + "userConsentDisplayName": "Read and write domains", + "value": "Domain.ReadWrite.All" + }, + { + "description": "Allows the app to have the same access to mailboxes as the signed-in user via Exchange ActiveSync.", + "displayName": "Access mailboxes via Exchange ActiveSync", + "id": "ff91d191-45a0-43fd-b837-bd682c4a0b0f", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app full access to your mailboxes on your behalf.", + "userConsentDisplayName": "Access your mailboxes", + "value": "EAS.AccessAsUser.All" + }, + { + "description": "Allows the app to read eDiscovery objects such as cases, custodians, review sets and other related objects on behalf of the signed-in user.", + "displayName": "Read all eDiscovery objects", + "id": "99201db3-7652-4d5a-809a-bdb94f85fe3c", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read eDiscovery objects such as cases, custodians, review sets and other related objects on your behalf.", + "userConsentDisplayName": "Read all eDiscovery objects", + "value": "eDiscovery.Read.All" + }, + { + "description": "Allows the app to read and write eDiscovery objects such as cases, custodians, review sets and other related objects on behalf of the signed-in user.", + "displayName": "Read and write all eDiscovery objects", + "id": "acb8f680-0834-4146-b69e-4ab1b39745ad", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write eDiscovery objects such as cases, custodians, review sets and other related objects on your behalf.", + "userConsentDisplayName": "Read and write all eDiscovery objects", + "value": "eDiscovery.ReadWrite.All" + }, + { + "description": "Read the state and settings of all Microsoft education apps on behalf of the user.", + "displayName": "Read education app settings", + "id": "8523895c-6081-45bf-8a5d-f062a2f12c9f", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to view the state and settings of all Microsoft education apps on your behalf.", + "userConsentDisplayName": "View your education app settings", + "value": "EduAdministration.Read" + }, + { + "description": "Manage the state and settings of all Microsoft education apps on behalf of the user.", + "displayName": "Manage education app settings", + "id": "63589852-04e3-46b4-bae9-15d5b1050748", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to manage the state and settings of all Microsoft education apps on your behalf.", + "userConsentDisplayName": "Manage your education app settings", + "value": "EduAdministration.ReadWrite" + }, + { + "description": "Allows the app to read assignments and their grades on behalf of the user.", + "displayName": "Read users' class assignments and their grades", + "id": "091460c9-9c4a-49b2-81ef-1f3d852acce2", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to view your assignments on your behalf including grades.", + "userConsentDisplayName": "View your assignments and grades", + "value": "EduAssignments.Read" + }, + { + "description": "Allows the app to read assignments without grades on behalf of the user.", + "displayName": "Read users' class assignments without grades", + "id": "c0b0103b-c053-4b2e-9973-9f3a544ec9b8", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to view your assignments on your behalf without seeing grades.", + "userConsentDisplayName": "View your assignments without grades", + "value": "EduAssignments.ReadBasic" + }, + { + "description": "Allows the app to read and write assignments and their grades on behalf of the user.", + "displayName": "Read and write users' class assignments and their grades", + "id": "2f233e90-164b-4501-8bce-31af2559a2d3", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to view and modify your assignments on your behalf including  grades.", + "userConsentDisplayName": "View and modify your assignments and grades", + "value": "EduAssignments.ReadWrite" + }, + { + "description": "Allows the app to read and write assignments without grades on behalf of the user.", + "displayName": "Read and write users' class assignments without grades", + "id": "2ef770a1-622a-47c4-93ee-28d6adbed3a0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to view and modify your assignments on your behalf without seeing grades.", + "userConsentDisplayName": "View and modify your assignments without grades", + "value": "EduAssignments.ReadWriteBasic" + }, + { + "description": "Allows the app to read the user's modules and resources on behalf of the signed-in user.", + "displayName": "Read the user's class modules and resources", + "id": "484859e8-b9e2-4e92-b910-84db35dadd29", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read modules and resources on your behalf.", + "userConsentDisplayName": "Read your class modules and resources", + "value": "EduCurricula.Read" + }, + { + "description": "Allows the app to read and write user's modules and resources on behalf of the signed-in user.", + "displayName": "Read and write the user's class modules and resources", + "id": "4793c53b-df34-44fd-8d26-d15c517732f5", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write modules and resources on your behalf.", + "userConsentDisplayName": "Read and write your class modules and resources", + "value": "EduCurricula.ReadWrite" + }, + { + "description": "Allows the app to read the structure of schools and classes in an organization's roster and education-specific information about users to be read on behalf of the user.", + "displayName": "Read users' view of the roster", + "id": "a4389601-22d9-4096-ac18-36a927199112", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to view information about schools and classes in your organization and education-related information about you and other users on your behalf.", + "userConsentDisplayName": "View your school, class and user information", + "value": "EduRoster.Read" + }, + { + "description": "Allows the app to read a limited subset of the properties from the structure of schools and classes in an organization's roster and a limited subset of properties about users to be read on behalf of the user. Includes name, status, education role, email address and photo.", + "displayName": "Read a limited subset of users' view of the roster", + "id": "5d186531-d1bf-4f07-8cea-7c42119e1bd9", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to view minimal  information about both schools and classes in your organization and education-related information about you and other users on your behalf.", + "userConsentDisplayName": "View a limited subset of your school, class and user information", + "value": "EduRoster.ReadBasic" + }, + { + "description": "Allows the app to read and write the structure of schools and classes in an organization's roster and education-specific information about users to be read and written on behalf of the user.", + "displayName": "Read and write users' view of the roster", + "id": "359e19a6-e3fa-4d7f-bcab-d28ec592b51e", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to view and modify information about schools and classes in your organization and education-related information about you and other users on your behalf.", + "userConsentDisplayName": "View and modify your school, class and user information", + "value": "EduRoster.ReadWrite" + }, + { + "description": "Allows the app to read your users' primary email address", + "displayName": "View users' email address", + "id": "64a6cdd6-aab1-4aaf-94b8-3cc8405e90d0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your primary email address", + "userConsentDisplayName": "View your email address", + "value": "email" + }, + { + "description": "Allows the app to read access packages and related entitlement management resources on behalf of the signed-in user.", + "displayName": "Read all entitlement management resources", + "id": "5449aa12-1393-4ea2-a7c7-d0e06c1a56b2", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read access packages and related entitlement management resources that you have access to.", + "userConsentDisplayName": "Read all entitlement management resources", + "value": "EntitlementManagement.Read.All" + }, + { + "description": "Allows the app to request access to and management of access packages and related entitlement management resources on behalf of the signed-in user.", + "displayName": "Read and write entitlement management resources", + "id": "ae7a573d-81d7-432b-ad44-4ed5c9d89038", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to request access to and management of access packages and related entitlement management resources that you have access to.", + "userConsentDisplayName": "Read and write entitlement management resources", + "value": "EntitlementManagement.ReadWrite.All" + }, + { + "description": "Allows the app to manage self-service entitlement management resources on behalf of the signed-in user. This includes operations such as requesting access and approving access of others.", + "displayName": "Read and write entitlement management resources related to self-service operations", + "id": "e9fdcbbb-8807-410f-b9ec-8d5468c7c2ac", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to create and manage self-service entitlement management resources that you have access to. This includes operations such as requesting access and approving access for others.", + "userConsentDisplayName": "Read and write self-service entitlement management resources", + "value": "EntitlementMgmt-SubjectAccess.ReadWrite" + }, + { + "description": "Allows the app to read your organization's authentication event listeners on behalf of the signed-in user.", + "displayName": "Read your organization's authentication event listeners", + "id": "f7dd3bed-5eec-48da-bc73-1c0ef50bc9a1", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your organization's authentication event listeners on your behalf.", + "userConsentDisplayName": "Read your organization's authentication event listeners", + "value": "EventListener.Read.All" + }, + { + "description": "Allows the app to read or write your organization's authentication event listeners on behalf of the signed-in user.", + "displayName": "Read and write your organization's authentication event listeners", + "id": "d11625a6-fe21-4fc6-8d3d-063eba5525ad", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read or write your organization's authentication event listeners on your behalf.", + "userConsentDisplayName": "Read and write your organization's authentication event listeners", + "value": "EventListener.ReadWrite.All" + }, + { + "description": "Allows the app to have the same access to mailboxes as the signed-in user via Exchange Web Services.", + "displayName": "Access mailboxes as the signed-in user via Exchange Web Services", + "id": "9769c687-087d-48ac-9cb3-c37dde652038", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app full access to your mailboxes on your behalf.", + "userConsentDisplayName": "Access your mailboxes", + "value": "EWS.AccessAsUser.All" + }, + { + "description": "Allows the app to read all external connections on behalf of a signed-in user. The signed-in user must be an administrator.", + "displayName": "Read all external connections", + "id": "a38267a5-26b6-4d76-9493-935b7599116b", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read all external connections on your behalf. The signed-in user must be an administrator.", + "userConsentDisplayName": "Read all external connections", + "value": "ExternalConnection.Read.All" + }, + { + "description": "Allows the app to read and write all external connections on behalf of a signed-in user. The signed-in user must be an administrator.", + "displayName": "Read and write all external connections", + "id": "bbbbd9b3-3566-4931-ac37-2b2180d9e334", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write all external connections on your behalf. The signed-in user must be an administrator.", + "userConsentDisplayName": "Read and write all external connections", + "value": "ExternalConnection.ReadWrite.All" + }, + { + "description": "Allows the app to read and write settings of external connections on behalf of a signed-in user. The signed-in user must be an administrator. The app can only read and write settings of connections that it is authorized to.", + "displayName": "Read and write external connections", + "id": "4082ad95-c812-4f02-be92-780c4c4f1830", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write external connections on your behalf. The signed-in user must be an administrator. The app can only read and write external connections that it is authorized to, or it can create new external connections. ", + "userConsentDisplayName": "Read and write external connections", + "value": "ExternalConnection.ReadWrite.OwnedBy" + }, + { + "description": "Allow the app to read external datasets and content, on behalf of the signed-in user.", + "displayName": "Read items in external datasets", + "id": "922f9392-b1b7-483c-a4be-0089be7704fb", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read external datasets and content that you have access to.", + "userConsentDisplayName": "Read items in external datasets", + "value": "ExternalItem.Read.All" + }, + { + "description": "Allows the app to read and write all external items on behalf of a signed-in user. The signed-in user must be an administrator.", + "displayName": "Read and write all external items", + "id": "b02c54f8-eb48-4c50-a9f0-a149e5a2012f", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write all external items on your behalf. The signed-in user must be an administrator.", + "userConsentDisplayName": "Read and write all external items", + "value": "ExternalItem.ReadWrite.All" + }, + { + "description": "Allows the app to read and write external items on behalf of a signed-in user. The signed-in user must be an administrator. The app can only read external items of the connection that it is authorized to.", + "displayName": "Read and write external items", + "id": "4367b9d7-cee7-4995-853c-a0bdfe95c1f9", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write external items on your behalf. The signed-in user must be an administrator. The app can only read external items of the connection that it is authorized to.", + "userConsentDisplayName": "Read and write external items", + "value": "ExternalItem.ReadWrite.OwnedBy" + }, + { + "description": "Allows the app to read your family information, members and their basic profile.", + "displayName": "Read your family info", + "id": "3a1e4806-a744-4c70-80fc-223bf8582c46", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your family information, members and their basic profile.", + "userConsentDisplayName": "Read your family info", + "value": "Family.Read" + }, + { + "description": "Allows the app to read the signed-in user's files.", + "displayName": "Read user files", + "id": "10465720-29dd-4523-a11a-6a75c743c9d9", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your files.", + "userConsentDisplayName": "Read your files", + "value": "Files.Read" + }, + { + "description": "Allows the app to read all files the signed-in user can access.", + "displayName": "Read all files that user can access", + "id": "df85f4d6-205c-4ac5-a5ea-6bf408dba283", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read all files you can access.", + "userConsentDisplayName": "Read all files that you have access to", + "value": "Files.Read.All" + }, + { + "description": "(Preview) Allows the app to read files that the user selects. The app has access for several hours after the user selects a file.", + "displayName": "Read files that the user selects (preview)", + "id": "5447fe39-cb82-4c1a-b977-520e67e724eb", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "(Preview) Allows the app to read files that you select. After you select a file, the app has access to the file for several hours.", + "userConsentDisplayName": "Read selected files", + "value": "Files.Read.Selected" + }, + { + "description": "Allows the app to read, create, update and delete the signed-in user's files.", + "displayName": "Have full access to user files", + "id": "5c28f0bf-8a70-41f1-8ab2-9032436ddb65", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, create, update, and delete your files.", + "userConsentDisplayName": "Have full access to your files", + "value": "Files.ReadWrite" + }, + { + "description": "Allows the app to read, create, update and delete all files the signed-in user can access.", + "displayName": "Have full access to all files user can access", + "id": "863451e7-0667-486c-a5d6-d135439485f0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, create, update and delete all files that you can access.", + "userConsentDisplayName": "Have full access to all files you have access to", + "value": "Files.ReadWrite.All" + }, + { + "description": "(Preview) Allows the app to read, create, update and delete files in the application's folder.", + "displayName": "Have full access to the application's folder (preview)", + "id": "8019c312-3263-48e6-825e-2b833497195b", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "(Preview) Allows the app to read, create, update and delete files in the application's folder.", + "userConsentDisplayName": "Have full access to the application's folder", + "value": "Files.ReadWrite.AppFolder" + }, + { + "description": "(Preview) Allows the app to read and write files that the user selects. The app has access for several hours after the user selects a file.", + "displayName": "Read and write files that the user selects (preview)", + "id": "17dde5bd-8c17-420f-a486-969730c1b827", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "(Preview) Allows the app to read and write files that you select. After you select a file, the app has access to the file for several hours.", + "userConsentDisplayName": "Read and write selected files", + "value": "Files.ReadWrite.Selected" + }, + { + "description": "Allows the app to read and write financials data on behalf of the signed-in user.", + "displayName": "Read and write financials data", + "id": "f534bf13-55d4-45a9-8f3c-c92fe64d6131", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write financials data on your behalf.", + "userConsentDisplayName": "Read and write financials data", + "value": "Financials.ReadWrite.All" + }, + { + "description": "Allows the app to list groups, and to read their properties and all group memberships on behalf of the signed-in user. Also allows the app to read calendar, conversations, files, and other group content for all groups the signed-in user can access. ", + "displayName": "Read all groups", + "id": "5f8c59db-677d-491f-a6b8-5f174b11ec1d", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to list groups, and to read their properties and all group memberships on your behalf. Also allows the app to read calendar, conversations, files, and other group content for all groups you can access. ", + "userConsentDisplayName": "Read all groups", + "value": "Group.Read.All" + }, + { + "description": "Allows the app to create groups and read all group properties and memberships on behalf of the signed-in user. Additionally allows group owners to manage their groups and allows group members to update group content.", + "displayName": "Read and write all groups", + "id": "4e46008b-f24c-477d-8fff-7bb4ec7aafe0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to create groups and read all group properties and memberships on your behalf. Additionally allows the app to manage your groups and to update group content for groups you are a member of.", + "userConsentDisplayName": "Read and write all groups", + "value": "Group.ReadWrite.All" + }, + { + "description": "Allows the app to list groups, read basic group properties and read membership of all groups the signed-in user has access to.", + "displayName": "Read group memberships", + "id": "bc024368-1153-4739-b217-4326f2e966d0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to list groups, read basic group properties and read membership of all your groups.", + "userConsentDisplayName": "Read group memberships", + "value": "GroupMember.Read.All" + }, + { + "description": "Allows the app to list groups, read basic properties, read and update the membership of the groups the signed-in user has access to. Group properties and owners cannot be updated and groups cannot be deleted.", + "displayName": "Read and write group memberships", + "id": "f81125ac-d3b7-4573-a3b2-7099cc39df9e", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to list groups, read basic properties, read and update the membership of your groups. Group properties and owners cannot be updated and groups cannot be deleted.", + "userConsentDisplayName": "Read and write group memberships", + "value": "GroupMember.ReadWrite.All" + }, + { + "description": "Allows the app to read your organization’s identity (authentication) providers’ properties on behalf of the user.", + "displayName": "Read identity providers", + "id": "43781733-b5a7-4d1b-98f4-e8edff23e1a9", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your organization’s identity (authentication) providers’ properties on your behalf.", + "userConsentDisplayName": "Read identity providers", + "value": "IdentityProvider.Read.All" + }, + { + "description": "Allows the app to read and write your organization’s identity (authentication) providers’ properties on behalf of the user.", + "displayName": "Read and write identity providers", + "id": "f13ce604-1677-429f-90bd-8a10b9f01325", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write your organization’s identity (authentication) providers’ properties on your behalf.", + "userConsentDisplayName": "Read and write identity providers", + "value": "IdentityProvider.ReadWrite.All" + }, + { + "description": "Allows the app to read identity risk event information for all users in your organization on behalf of the signed-in user. ", + "displayName": "Read identity risk event information", + "id": "8f6a01e7-0391-4ee5-aa22-a3af122cef27", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read identity risk event information for all users in your organization on behalf of the signed-in user. ", + "userConsentDisplayName": "Read identity risk event information", + "value": "IdentityRiskEvent.Read.All" + }, + { + "description": "Allows the app to read and update identity risk event information for all users in your organization on behalf of the signed-in user. Update operations include confirming risk event detections. ", + "displayName": "Read and write risk event information", + "id": "9e4862a5-b68f-479e-848a-4e07e25c9916", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and update identity risk event information for all users in your organization on your behalf. Update operations include confirming risk event detections. ", + "userConsentDisplayName": "Read and write risk event information", + "value": "IdentityRiskEvent.ReadWrite.All" + }, + { + "description": "Allows the app to read all identity risky service principal information for your organization, on behalf of the signed-in user.", + "displayName": "Read all identity risky service principal information", + "id": "ea5c4ab0-5a73-4f35-8272-5d5337884e5d", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read all identity risky service principal information for your organization, on your behalf.", + "userConsentDisplayName": "Read all identity risky service principal information", + "value": "IdentityRiskyServicePrincipal.Read.All" + }, + { + "description": "Allows the app to read and update identity risky service principal information for all service principals in your organization, on behalf of the signed-in user. Update operations include dismissing risky service principals.", + "displayName": "Read and write all identity risky service principal information", + "id": "bb6f654c-d7fd-4ae3-85c3-fc380934f515", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and update identity risky service principal information for all service principals in your organization, on your behalf. Update operations include dismissing risky service principals.", + "userConsentDisplayName": "Read and write all identity risky service principal information", + "value": "IdentityRiskyServicePrincipal.ReadWrite.All" + }, + { + "description": "Allows the app to read identity risky user information for all users in your organization on behalf of the signed-in user.", + "displayName": "Read identity risky user information", + "id": "d04bb851-cb7c-4146-97c7-ca3e71baf56c", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read identity risky user information for all users in your organization on behalf of the signed-in user.", + "userConsentDisplayName": "Read identity risky user information", + "value": "IdentityRiskyUser.Read.All" + }, + { + "description": "Allows the app to read and update identity risky user information for all users in your organization on behalf of the signed-in user. Update operations include dismissing risky users.", + "displayName": "Read and write risky user information", + "id": "e0a7cdbb-08b0-4697-8264-0069786e9674", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and update identity risky user information for all users in your organization on your behalf. Update operations include dismissing risky users.", + "userConsentDisplayName": "Read and write identity risky user information", + "value": "IdentityRiskyUser.ReadWrite.All" + }, + { + "description": "Allows the app to read your organization's user flows, on behalf of the signed-in user.", + "displayName": "Read all identity user flows", + "id": "2903d63d-4611-4d43-99ce-a33f3f52e343", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your organization's user flows, on your behalf.", + "userConsentDisplayName": "Read all identity user flows", + "value": "IdentityUserFlow.Read.All" + }, + { + "description": "Allows the app to read or write your organization's user flows, on behalf of the signed-in user.", + "displayName": "Read and write all identity user flows", + "id": "281892cc-4dbf-4e3a-b6cc-b21029bb4e82", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read or write your organization's user flows, on your behalf.", + "userConsentDisplayName": "Read and write all identity user flows", + "value": "IdentityUserFlow.ReadWrite.All" + }, + { + "description": "Allows the app to have the same access to mailboxes as the signed-in user via IMAP protocol.", + "displayName": "Read and write access to mailboxes via IMAP.", + "id": "652390e4-393a-48de-9484-05f9b1212954", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, update, create and delete email in your mailbox. Does not include permission to send mail.", + "userConsentDisplayName": "Read and write access to your mail.", + "value": "IMAP.AccessAsUser.All" + }, + { + "description": "Allows the app to read data connectors on behalf of the signed-in user.", + "displayName": "View data connector definitions", + "id": "d19c0de5-7ecb-4aba-b090-da35ebcd5425", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read data connectors on your behalf.", + "userConsentDisplayName": "View data connector definitions", + "value": "IndustryData-DataConnector.Read.All" + }, + { + "description": "Allows the app to read and write data connectors on behalf of the signed-in user.", + "displayName": "Manage data connector definitions", + "id": "5ce933ac-3997-4280-aed0-cc072e5c062a", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write data connectors on your behalf.", + "userConsentDisplayName": "Manage data connector definitions", + "value": "IndustryData-DataConnector.ReadWrite.All" + }, + { + "description": "Allows the app to upload data files to a data connector on behalf of the signed-in user.", + "displayName": "Upload files to a data connector", + "id": "fc47391d-ab2c-410f-9059-5600f7af660d", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to upload data files to a data connector on your behalf.", + "userConsentDisplayName": "Upload files to a data connector", + "value": "IndustryData-DataConnector.Upload" + }, + { + "description": "Allows the app to read inbound data flows on behalf of the signed-in user.", + "displayName": "View inbound flow definitions", + "id": "cb0774da-a605-42af-959c-32f438fb38f4", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read inbound data flows on your behalf.", + "userConsentDisplayName": "View inbound flow definitions", + "value": "IndustryData-InboundFlow.Read.All" + }, + { + "description": "Allows the app to read and write inbound data flows on behalf of the signed-in user.", + "displayName": "Manage inbound flow definitions", + "id": "97044676-2cec-40ee-bd70-38df444c9e70", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write inbound data flows on your behalf.", + "userConsentDisplayName": "Manage inbound flow definitions", + "value": "IndustryData-InboundFlow.ReadWrite.All" + }, + { + "description": "Allows the app to read reference definitions on behalf of the signed-in user.", + "displayName": "View reference definitions", + "id": "a3f96ffe-cb84-40a8-ac85-582d7ef97c2a", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read reference definitions on your behalf.", + "userConsentDisplayName": "View reference definitions", + "value": "IndustryData-ReferenceDefinition.Read.All" + }, + { + "description": "Allows the app to read current and previous IndustryData runs on behalf of the signed-in user.", + "displayName": "View current and previous runs", + "id": "92685235-50c4-4702-b2c8-36043db6fa79", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read current and previous IndustryData runs on your behalf.", + "userConsentDisplayName": "View current and previous runs", + "value": "IndustryData-Run.Read.All" + }, + { + "description": "Allows the app to read source system definitions on behalf of the signed-in user.", + "displayName": "View source system definitions", + "id": "49b7016c-89ae-41e7-bd6f-b7170c5490bf", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read source system definitions on your behalf.", + "userConsentDisplayName": "View source system definitions", + "value": "IndustryData-SourceSystem.Read.All" + }, + { + "description": "Allows the app to read and write source system definitions on behalf of the signed-in user.", + "displayName": "Manage source system definitions", + "id": "9599f005-05d6-4ea7-b1b1-4929768af5d0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write source system definitions on your behalf.", + "userConsentDisplayName": "Manage source system definitions", + "value": "IndustryData-SourceSystem.ReadWrite.All" + }, + { + "description": "Allows the app to read time period definitions on behalf of the signed-in user.", + "displayName": "Read time period definitions", + "id": "c9d51f28-8ccd-42b2-a836-fd8fe9ebf2ae", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read time period definitions on your behalf.", + "userConsentDisplayName": "Read time period definitions", + "value": "IndustryData-TimePeriod.Read.All" + }, + { + "description": "Allows the app to read and write time period definitions on behalf of the signed-in user.", + "displayName": "Manage time period definitions", + "id": "b6d56528-3032-4f9d-830f-5a24a25e6661", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write time period definitions on your behalf.", + "userConsentDisplayName": "Manage time period definitions", + "value": "IndustryData-TimePeriod.ReadWrite.All" + }, + { + "description": "Allows the app to read basic Industry Data service and resource information on behalf of the signed-in user.", + "displayName": "Read basic Industry Data service and resource definitions", + "id": "60382b96-1f5e-46ea-a544-0407e489e588", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read Industry Data basic service and resource information on your behalf.", + "userConsentDisplayName": "Read basic Industry Data service and resource definitions", + "value": "IndustryData.ReadBasic.All" + }, + { + "description": "Allows the app to read the configurations applicable to the signed-in user for protecting organizational data, on behalf of the signed-in user.", + "displayName": "Read configurations for protecting organizational data applicable to the user", + "id": "12f4bffb-b598-413c-984b-db99728f8b54", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the configurations applicable to you for protecting organizational data, on your behalf.", + "userConsentDisplayName": "Read configurations for protecting organizational data applicable to you", + "value": "InformationProtectionConfig.Read" + }, + { + "description": "Allows an app to read information protection sensitivity labels and label policy settings, on behalf of the signed-in user.", + "displayName": "Read user sensitivity labels and label policies.", + "id": "4ad84827-5578-4e18-ad7a-86530b12f884", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows an app to read information protection sensitivity labels and label policy settings, on behalf of the signed-in user.", + "userConsentDisplayName": "Read user sensitivity labels and label policies.", + "value": "InformationProtectionPolicy.Read" + }, + { + "description": "Allows the app to read insights related to guest activity, on behalf of the signed-in user.", + "displayName": "Read insights related to guest activity", + "id": "bdd9425e-296d-4e4b-9c15-0a288b4b12e1", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read insights related to guest activity, on your behalf.", + "userConsentDisplayName": "Read insights related to guest activity", + "value": "Insights-GuestActivity.Read.All" + }, + { + "description": "Allows the app to read and write insights related to guest activity, on behalf of the signed-in user.", + "displayName": "Read and write insights related to guest activity", + "id": "7e23346e-6931-45b2-b04e-6332b3905b8a", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write insights related to guest activity, on your behalf.", + "userConsentDisplayName": "Read and write insights related to guest activity", + "value": "Insights-GuestActivity.ReadWrite.All" + }, + { + "description": "Allows the app to read data for the learner's assignments in the organization's directory, on behalf of the signed-in user.", + "displayName": "Read user's assignments", + "id": "ac08cdae-e845-41db-adf9-5899a0ec9ef6", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read data for your assignments in the organization's directory, on your behalf.", + "userConsentDisplayName": "Read your assignments", + "value": "LearningAssignedCourse.Read" + }, + { + "description": "Allows the app to read learning content in the organization's directory, on behalf of the signed-in user.", + "displayName": "Read learning content", + "id": "ea4c1fd9-6a9f-4432-8e5d-86e06cc0da77", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read learning content in the organization's directory, on your behalf.", + "userConsentDisplayName": "Read learning content", + "value": "LearningContent.Read.All" + }, + { + "description": "Allows the app to manage learning content in the organization's directory, on behalf of the signed-in user.", + "displayName": "Manage learning content", + "id": "53cec1c4-a65f-4981-9dc1-ad75dbf1c077", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to manage learning content in the organization's directory, on your behalf.", + "userConsentDisplayName": "Manage learning content", + "value": "LearningContent.ReadWrite.All" + }, + { + "description": "Allows the app to read data for the learning provider in the organization's directory, on behalf of the signed-in user.", + "displayName": "Read learning provider", + "id": "dd8ce36f-9245-45ea-a99e-8ac398c22861", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read data for the learning provider in the organization's directory, on your behalf.", + "userConsentDisplayName": "Read learning provider", + "value": "LearningProvider.Read" + }, + { + "description": "Allows the app to create, update, read, and delete data for the learning provider in the organization's directory, on behalf of the signed-in user.", + "displayName": "Manage learning provider", + "id": "40c2eb57-abaf-49f5-9331-e90fd01f7130", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to create, update, read, and delete data for the learning provider in the organization's directory, on your behalf.", + "userConsentDisplayName": "Manage learning provider", + "value": "LearningProvider.ReadWrite" + }, + { + "description": "Allows the app to read data for the learner's self-initiated courses in the organization's directory, on behalf of the signed-in user.", + "displayName": "Read user's self-initiated courses", + "id": "f6403ef7-4a96-47be-a190-69ba274c3f11", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read data for your self-initiated courses in the organization's directory, on your behalf.", + "userConsentDisplayName": "Read your self-initiated courses", + "value": "LearningSelfInitiatedCourse.Read" + }, + { + "description": "Allows an app to manage license assignments for users and groups, on behalf of the signed-in user.", + "displayName": "Manage all license assignments", + "id": "f55016cc-149c-447e-8f21-7cf3ec1d6350", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to manage all license assignments, on your behalf.", + "userConsentDisplayName": "Manage all license assignments", + "value": "LicenseAssignment.ReadWrite.All" + }, + { + "description": "Allows the app to list and read all workflows, tasks and related lifecycle workflows resources on behalf of the signed-in user.", + "displayName": "Read all lifecycle workflows resources", + "id": "9bcb9916-765a-42af-bf77-02282e26b01a", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to list and read all workflows, tasks and related lifecycle workflows resources on your behalf.", + "userConsentDisplayName": "Read all lifecycle workflows resources", + "value": "LifecycleWorkflows.Read.All" + }, + { + "description": "Allows the app to create, update, list, read and delete all workflows, tasks and related lifecycle workflows resources on behalf of the signed-in user.", + "displayName": "Read and write all lifecycle workflows resources", + "id": "84b9d731-7db8-4454-8c90-fd9e95350179", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to create, update, list, read and delete all workflows, tasks and related lifecycle workflows resources on your behalf.", + "userConsentDisplayName": "Read and write all lifecycle workflows resources", + "value": "LifecycleWorkflows.ReadWrite.All" + }, + { + "description": "Allows the app to read the signed-in user's mailbox.", + "displayName": "Read user mail ", + "id": "570282fd-fa5c-430d-a7fd-fc8dc98a9dca", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read email in your mailbox. ", + "userConsentDisplayName": "Read your mail ", + "value": "Mail.Read" + }, + { + "description": "Allows the app to read mail a user can access, including their own and shared mail.", + "displayName": "Read user and shared mail", + "id": "7b9103a5-4610-446b-9670-80643382c1fa", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read mail you can access, including shared mail.", + "userConsentDisplayName": "Read mail you can access", + "value": "Mail.Read.Shared" + }, + { + "description": "Allows the app to read email in the signed-in user's mailbox except body, previewBody, attachments and any extended properties.", + "displayName": "Read user basic mail", + "id": "a4b8392a-d8d1-4954-a029-8e668a39a170", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read email in the signed-in user's mailbox except body, previewBody, attachments and any extended properties.", + "userConsentDisplayName": "Read user basic mail", + "value": "Mail.ReadBasic" + }, + { + "description": "Allows the app to read mail the signed-in user can access, including their own and shared mail, except for body, bodyPreview, uniqueBody, attachments, extensions, and any extended properties.", + "displayName": "Read user and shared basic mail", + "id": "b11fa0e7-fdb7-4dc9-b1f1-59facd463480", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read mail you can access, including shared mail except body, previewBody, uniqueBody, attachments, extensions, and any extended properties. ", + "userConsentDisplayName": "Read basic mail you can access", + "value": "Mail.ReadBasic.Shared" + }, + { + "description": "Allows the app to create, read, update, and delete email in user mailboxes. Does not include permission to send mail. ", + "displayName": "Read and write access to user mail ", + "id": "024d486e-b451-40bb-833d-3e66d98c5c73", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, update, create and delete email in your mailbox. Does not include permission to send mail. ", + "userConsentDisplayName": "Read and write access to your mail ", + "value": "Mail.ReadWrite" + }, + { + "description": "Allows the app to create, read, update, and delete mail a user has permission to access, including their own and shared mail. Does not include permission to send mail.", + "displayName": "Read and write user and shared mail", + "id": "5df07973-7d5d-46ed-9847-1271055cbd51", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, update, create, and delete mail you have permission to access, including your own and shared mail. Does not allow the app to send mail on your behalf.", + "userConsentDisplayName": "Read and write mail you can access", + "value": "Mail.ReadWrite.Shared" + }, + { + "description": "Allows the app to send mail as users in the organization. ", + "displayName": "Send mail as a user ", + "id": "e383f46e-2787-4529-855e-0e479a3ffac0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to send mail as you. ", + "userConsentDisplayName": "Send mail as you ", + "value": "Mail.Send" + }, + { + "description": "Allows the app to send mail as the signed-in user, including sending on-behalf of others.", + "displayName": "Send mail on behalf of others", + "id": "a367ab51-6b49-43bf-a716-a1fb06d2a174", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to send mail as you or on-behalf of someone else.", + "userConsentDisplayName": "Send mail on behalf of others or yourself", + "value": "Mail.Send.Shared" + }, + { + "description": "Allows the app to the read user's mailbox settings. Does not include permission to send mail.", + "displayName": "Read user mailbox settings", + "id": "87f447af-9fa4-4c32-9dfa-4a57a73d18ce", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your mailbox settings.", + "userConsentDisplayName": "Read your mailbox settings", + "value": "MailboxSettings.Read" + }, + { + "description": "Allows the app to create, read, update, and delete user's mailbox settings. Does not include permission to send mail.", + "displayName": "Read and write user mailbox settings", + "id": "818c620a-27a9-40bd-a6a5-d96f7d610b4b", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, update, create, and delete your mailbox settings.", + "userConsentDisplayName": "Read and write to your mailbox settings", + "value": "MailboxSettings.ReadWrite" + }, + { + "description": "Allows the app to read all managed tenant information on behalf of the signed-in user.", + "displayName": "Read all managed tenant information", + "id": "dc34164e-6c4a-41a0-be89-3ae2fbad7cd3", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read all managed tenant information on your behalf.", + "userConsentDisplayName": "Read all managed tenant information", + "value": "ManagedTenants.Read.All" + }, + { + "description": "Allows the app to read and write all managed tenant information on behalf of the signed-in user.", + "displayName": "Read and write all managed tenant information", + "id": "b31fa710-c9b3-4d9e-8f5e-8036eecddab9", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write all managed tenant information on your behalf.", + "userConsentDisplayName": "Read and write all managed tenant information", + "value": "ManagedTenants.ReadWrite.All" + }, + { + "description": "Allows the app to read the memberships of hidden groups and administrative units on behalf of the signed-in user, for those hidden groups and administrative units that the signed-in user has access to.", + "displayName": "Read hidden memberships", + "id": "f6a3db3e-f7e8-4ed2-a414-557c8c9830be", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the memberships of hidden groups or administrative units on your behalf, for those hidden groups or adminstrative units that you have access to.", + "userConsentDisplayName": "Read your hidden memberships", + "value": "Member.Read.Hidden" + }, + { + "description": "Allows the app to read multi-tenant organization details and tenants on behalf of the signed-in user.", + "displayName": "Read multi-tenant organization details and tenants", + "id": "526aa72a-5878-49fe-bf4e-357973af9b06", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read multi-tenant organization details and tenants on your behalf.", + "userConsentDisplayName": "Read multi-tenant organization details and tenants", + "value": "MultiTenantOrganization.Read.All" + }, + { + "description": "Allows the app to read multi-tenant organization basic details and active tenants on behalf of the signed-in user.", + "displayName": "Read multi-tenant organization basic details and active tenants", + "id": "225db56b-15b2-4daa-acb3-0eec2bbe4849", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read multi-tenant organization basic details and active tenants on your behalf.", + "userConsentDisplayName": "Read multi-tenant organization basic details and active tenants", + "value": "MultiTenantOrganization.ReadBasic.All" + }, + { + "description": "Allows the app to read and write multi-tenant organization details and tenants on behalf of the signed-in user.", + "displayName": "Read and write multi-tenant organization details and tenants", + "id": "77af1528-84f3-4023-8d90-d219cd433108", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write multi-tenant organization details and tenants on your behalf.", + "userConsentDisplayName": "Read and write multi-tenant organization details and tenants", + "value": "MultiTenantOrganization.ReadWrite.All" + }, + { + "description": "Allows the app to read your organization's branches for network access on behalf of the signed-in user.", + "displayName": "Read properties of branches for network access", + "id": "4051c7fc-b429-4804-8d80-8f1f8c24a6f7", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your organization's branches for network access on your behalf.", + "userConsentDisplayName": "Read properties of branches for network access", + "value": "NetworkAccessBranch.Read.All" + }, + { + "description": "Allows the app to read and write your organization's branches for network access on behalf of the signed-in user.", + "displayName": "Read and write properties of branches for network access", + "id": "b8a36cc2-b810-461a-baa4-a7281e50bd5c", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write your organization's branches for network access on your behalf.", + "userConsentDisplayName": "Read and write properties of branches for network access", + "value": "NetworkAccessBranch.ReadWrite.All" + }, + { + "description": "Allows the app to read your organization's security and routing network access policies on behalf of the signed-in user.", + "displayName": "Read security and routing policies for network access", + "id": "ba22922b-752c-446f-89d7-a2d92398fceb", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your organization's security and routing network access policies on your behalf.", + "userConsentDisplayName": "Read security and routing policies for network access", + "value": "NetworkAccessPolicy.Read.All" + }, + { + "description": "Allows the app to read and write your organization's security and routing network access policies on behalf of the signed-in user.", + "displayName": "Read and write security and routing policies for network access", + "id": "b1fbad0f-ef6e-42ed-8676-bca7fa3e7291", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write your organization's security and routing network access policies on your behalf.", + "userConsentDisplayName": "Read and write security and routing policies for network access", + "value": "NetworkAccessPolicy.ReadWrite.All" + }, + { + "description": "Allows the app to read the titles of OneNote notebooks and sections and to create new pages, notebooks, and sections on behalf of the signed-in user.", + "displayName": "Create user OneNote notebooks", + "id": "9d822255-d64d-4b7a-afdb-833b9a97ed02", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to view the titles of your OneNote notebooks and sections and to create new pages, notebooks, and sections on your behalf.", + "userConsentDisplayName": "Create your OneNote notebooks", + "value": "Notes.Create" + }, + { + "description": "Allows the app to read OneNote notebooks on behalf of the signed-in user.", + "displayName": "Read user OneNote notebooks", + "id": "371361e4-b9e2-4a3f-8315-2a301a3b0a3d", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read OneNote notebooks on your behalf.", + "userConsentDisplayName": "Read your OneNote notebooks", + "value": "Notes.Read" + }, + { + "description": "Allows the app to read OneNote notebooks that the signed-in user has access to in the organization.", + "displayName": "Read all OneNote notebooks that user can access", + "id": "dfabfca6-ee36-4db2-8208-7a28381419b3", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read all the OneNote notebooks that you have access to.", + "userConsentDisplayName": "Read all OneNote notebooks that you can access", + "value": "Notes.Read.All" + }, + { + "description": "Allows the app to read, share, and modify OneNote notebooks on behalf of the signed-in user.", + "displayName": "Read and write user OneNote notebooks", + "id": "615e26af-c38a-4150-ae3e-c3b0d4cb1d6a", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, share, and modify OneNote notebooks on your behalf.", + "userConsentDisplayName": "Read and write your OneNote notebooks", + "value": "Notes.ReadWrite" + }, + { + "description": "Allows the app to read, share, and modify OneNote notebooks that the signed-in user has access to in the organization.", + "displayName": "Read and write all OneNote notebooks that user can access", + "id": "64ac0503-b4fa-45d9-b544-71a463f05da0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, share, and modify all the OneNote notebooks that you have access to.", + "userConsentDisplayName": "Read and write all OneNote notebooks that you can access", + "value": "Notes.ReadWrite.All" + }, + { + "description": "This is deprecated! Do not use! This permission no longer has any effect. You can safely consent to it. No additional privileges will be granted to the app.", + "displayName": "Limited notebook access (deprecated)", + "id": "ed68249d-017c-4df5-9113-e684c7f8760b", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "This permission no longer has any effect. You can safely consent to it. No additional privileges will be granted to the app.", + "userConsentDisplayName": "Limited access to your OneNote notebooks for this app (preview)", + "value": "Notes.ReadWrite.CreatedByApp" + }, + { + "description": "Allows the app to deliver its notifications on behalf of signed-in users. Also allows the app to read, update, and delete the user's notification items for this app.", + "displayName": "Deliver and manage user notifications for this app", + "id": "89497502-6e42-46a2-8cb2-427fd3df970a", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to deliver its notifications, on your behalf. Also allows the app to read, update, and delete your notification items for this app.", + "userConsentDisplayName": "Deliver and manage your notifications for this app", + "value": "Notifications.ReadWrite.CreatedByApp" + }, + { + "description": "Allows the app to see and update the data you gave it access to, even when users are not currently using the app. This does not give the app any additional permissions.", + "displayName": "Maintain access to data you have given it access to", + "id": "7427e0e9-2fba-42fe-b0c0-848c9e6a8182", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to see and update the data you gave it access to, even when you are not currently using the app. This does not give the app any additional permissions.", + "userConsentDisplayName": "Maintain access to data you have given it access to", + "value": "offline_access" + }, + { + "description": "Allows the app to read online meeting artifacts on behalf of the signed-in user.", + "displayName": "Read user's online meeting artifacts", + "id": "110e5abb-a10c-4b59-8b55-9b4daa4ef743", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read online meeting artifacts on your behalf.", + "userConsentDisplayName": "Read user's online meeting artifacts", + "value": "OnlineMeetingArtifact.Read.All" + }, + { + "description": "Allows the app to read all recordings of online meetings, on behalf of the signed-in user.", + "displayName": "Read all recordings of online meetings.", + "id": "190c2bb6-1fdd-4fec-9aa2-7d571b5e1fe3", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read all recordings of online meetings, on your behalf. ", + "userConsentDisplayName": "Read all recordings of online meetings. ", + "value": "OnlineMeetingRecording.Read.All" + }, + { + "description": "Allows the app to read online meeting details on behalf of the signed-in user.", + "displayName": "Read user's online meetings", + "id": "9be106e1-f4e3-4df5-bdff-e4bc531cbe43", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read online meeting details on your behalf.", + "userConsentDisplayName": "Read your online meetings", + "value": "OnlineMeetings.Read" + }, + { + "description": "Allows the app to read and create online meetings on behalf of the signed-in user.", + "displayName": "Read and create user's online meetings", + "id": "a65f2972-a4f8-4f5e-afd7-69ccb046d5dc", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and create online meetings on your behalf.", + "userConsentDisplayName": "Read and create your online meetings", + "value": "OnlineMeetings.ReadWrite" + }, + { + "description": "Allows the app to read all transcripts of online meetings, on behalf of the signed-in user.", + "displayName": "Read all transcripts of online meetings. ", + "id": "30b87d18-ebb1-45db-97f8-82ccb1f0190c", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read all transcripts of online meetings, on your behalf.", + "userConsentDisplayName": "Read all transcripts of online meetings.", + "value": "OnlineMeetingTranscript.Read.All" + }, + { + "description": "Allows the app to read all on-premises directory synchronization information for the organization, on behalf of the signed-in user.", + "displayName": "Read all on-premises directory synchronization information", + "id": "f6609722-4100-44eb-b747-e6ca0536989d", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read all on-premises directory synchronization information for the organization, on your behalf.", + "userConsentDisplayName": "Read all on-premises directory synchronization information", + "value": "OnPremDirectorySynchronization.Read.All" + }, + { + "description": "Allows the app to read and write all on-premises directory synchronization information for the organization, on behalf of the signed-in user.", + "displayName": "Read and write all on-premises directory synchronization information", + "id": "c2d95988-7604-4ba1-aaed-38a5f82a51c7", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write all on-premises directory synchronization information for the organization, on your behalf.", + "userConsentDisplayName": "Read and write all on-premises directory synchronization information", + "value": "OnPremDirectorySynchronization.ReadWrite.All" + }, + { + "description": "Allows the app to manage hybrid identity service configuration by creating, viewing, updating and deleting on-premises published resources, on-premises agents and agent groups, on behalf of the signed-in user.", + "displayName": "Manage on-premises published resources", + "id": "8c4d5184-71c2-4bf8-bb9d-bc3378c9ad42", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to manage hybrid identity service configuration by creating, viewing, updating and deleting on-premises published resources, on-premises agents and agent groups, on your behalf.", + "userConsentDisplayName": "Manage on-premises published resources", + "value": "OnPremisesPublishingProfiles.ReadWrite.All" + }, + { + "description": "Allows users to sign in to the app with their work or school accounts and allows the app to see basic user profile information.", + "displayName": "Sign users in", + "id": "37f7f235-527c-4136-accd-4a02d197296e", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows you to sign in to the app with your work or school account and allows the app to read your basic profile information.", + "userConsentDisplayName": "Sign in as you", + "value": "openid" + }, + { + "description": "Allows the app to read the organization and related resources, on behalf of the signed-in user. Related resources include things like subscribed skus and tenant branding information.", + "displayName": "Read organization information", + "id": "4908d5b9-3fb2-4b1e-9336-1888b7937185", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the organization and related resources, on your behalf. Related resources include things like subscribed skus and tenant branding information.", + "userConsentDisplayName": "Read organization information", + "value": "Organization.Read.All" + }, + { + "description": "Allows the app to read and write the organization and related resources, on behalf of the signed-in user. Related resources include things like subscribed skus and tenant branding information.", + "displayName": "Read and write organization information", + "id": "46ca0847-7e6b-426e-9775-ea810a948356", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write the organization and related resources, on your behalf. Related resources include things like subscribed skus and tenant branding information.", + "userConsentDisplayName": "Read and write organization information", + "value": "Organization.ReadWrite.All" + }, + { + "description": "Allows the app to read all organizational contacts on behalf of the signed-in user.  These contacts are managed by the organization and are different from a user's personal contacts.", + "displayName": "Read organizational contacts", + "id": "08432d1b-5911-483c-86df-7980af5cdee0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read all organizational contacts on your behalf.  These contacts are managed by the organization and are different from your personal contacts.", + "userConsentDisplayName": "Read organizational contacts", + "value": "OrgContact.Read.All" + }, + { + "description": "Allows the app to read organization-wide apps and services settings on behalf of the signed-in user.", + "displayName": "Read organization-wide apps and services settings", + "id": "1e9b7a7e-4d64-44ff-acf5-2e9651c1519f", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read organization-wide apps and services settings on your behalf.", + "userConsentDisplayName": "Read organization-wide apps and services settings", + "value": "OrgSettings-AppsAndServices.Read.All" + }, + { + "description": "Allows the app to read and write organization-wide apps and services settings on behalf of the signed-in user.", + "displayName": "Read and write organization-wide apps and services settings", + "id": "c167b0e7-47c0-48e8-9eee-9892f58018fa", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write organization-wide apps and services settings on your behalf.", + "userConsentDisplayName": "Read and write organization-wide apps and services settings", + "value": "OrgSettings-AppsAndServices.ReadWrite.All" + }, + { + "description": "Allows the app to read organization-wide Dynamics customer voice settings on behalf of the signed-in user.", + "displayName": "Read organization-wide Dynamics customer voice settings", + "id": "9862d930-5aec-4a98-8d4f-7277a8db9bcb", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read organization-wide Dynamics customer voice settings on your behalf.", + "userConsentDisplayName": "Read organization-wide dynamics customer voice settings", + "value": "OrgSettings-DynamicsVoice.Read.All" + }, + { + "description": "Allows the app to read and write organization-wide Dynamics customer voice settings on behalf of the signed-in user.", + "displayName": "Read and write organization-wide Dynamics customer voice settings", + "id": "4cea26fb-6967-4234-82c4-c044414743f8", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write organization-wide Dynamics customer voice settings on your behalf.", + "userConsentDisplayName": "Read and write organization-wide Dynamics customer voice settings", + "value": "OrgSettings-DynamicsVoice.ReadWrite.All" + }, + { + "description": "Allows the app to read organization-wide Microsoft Forms settings on behalf of the signed-in user.", + "displayName": "Read organization-wide Microsoft Forms settings", + "id": "210051a0-1ffc-435c-ae76-02d226d05752", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read organization-wide Microsoft Forms settings on your behalf.", + "userConsentDisplayName": "Read organization-wide Microsoft Forms settings", + "value": "OrgSettings-Forms.Read.All" + }, + { + "description": "Allows the app to read and write organization-wide Microsoft Forms settings on behalf of the signed-in user.", + "displayName": "Read and write organization-wide Microsoft Forms settings", + "id": "346c19ff-3fb2-4e81-87a0-bac9e33990c1", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write organization-wide Microsoft Forms settings on your behalf.", + "userConsentDisplayName": "Read and write organization-wide Microsoft Forms settings", + "value": "OrgSettings-Forms.ReadWrite.All" + }, + { + "description": "Allows the app to read organization-wide Microsoft 365 apps installation settings on behalf of the signed-in user.", + "displayName": "Read organization-wide Microsoft 365 apps installation settings", + "id": "8cbdb9f6-9c2e-451a-814d-ec606e5d0212", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read organization-wide Microsoft 365 apps installation settings on your behalf.", + "userConsentDisplayName": "Read organization-wide Microsoft 365 apps installation settings", + "value": "OrgSettings-Microsoft365Install.Read.All" + }, + { + "description": "Allows the app to read and write organization-wide Microsoft 365 apps installation settings on behalf of the signed-in user.", + "displayName": "Read and write organization-wide Microsoft 365 apps installation settings", + "id": "1ff35e91-19eb-42d8-aa2d-cc9891127ae5", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write organization-wide Microsoft 365 apps installation settings on your behalf.", + "userConsentDisplayName": "Read and write organization-wide Microsoft 365 apps installation settings", + "value": "OrgSettings-Microsoft365Install.ReadWrite.All" + }, + { + "description": "Allows the app to read organization-wide Microsoft To Do settings on behalf of the signed-in user.", + "displayName": "Read organization-wide Microsoft To Do settings", + "id": "7ff96f41-f022-45ba-acd8-ef3f03063d6b", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read organization-wide Microsoft To Do settings on your behalf.", + "userConsentDisplayName": "Read organization-wide Microsoft To Do settings", + "value": "OrgSettings-Todo.Read.All" + }, + { + "description": "Allows the app to read and write organization-wide Microsoft To Do settings on behalf of the signed-in user.", + "displayName": "Read and write organization-wide Microsoft To Do settings", + "id": "087502c2-5263-433e-abe3-8f77231a0627", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write organization-wide Microsoft To Do settings on your behalf.", + "userConsentDisplayName": "Read and write organization-wide Microsoft To Do settings", + "value": "OrgSettings-Todo.ReadWrite.All" + }, + { + "description": "Allows the app to read a ranked list of relevant people of the signed-in user. The list includes local contacts, contacts from social networking, your organization's directory, and people from recent communications (such as email and Skype).", + "displayName": "Read users' relevant people lists", + "id": "ba47897c-39ec-4d83-8086-ee8256fa737d", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read a list of people in the order that's most relevant to you. This includes your local contacts, your contacts from social networking, people listed in your organization's directory, and people from recent communications.", + "userConsentDisplayName": "Read your relevant people list", + "value": "People.Read" + }, + { + "description": "Allows the app to read a scored list of relevant people of the signed-in user or other users in the signed-in user's organization. The list can include local contacts, contacts from social networking, your organization's directory, and people from recent communications (such as email and Skype).", + "displayName": "Read all users' relevant people lists", + "id": "b89f9189-71a5-4e70-b041-9887f0bc7e4a", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read a list of people in the order that is most relevant to you. Allows the app to read a list of people in the order that is most relevant to another user in your organization. These can include local contacts, contacts from social networking, people listed in your organization’s directory, and people from recent communications.", + "userConsentDisplayName": "Read all users’ relevant people lists", + "value": "People.Read.All" + }, + { + "description": "Allows the application to read tenant-wide people settings on behalf of the signed-in user.", + "displayName": "Read tenant-wide people settings", + "id": "ec762c5f-388b-4b16-8693-ac1efbc611bc", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read tenant-wide people settings on your behalf.", + "userConsentDisplayName": "Read tenant-wide people settings", + "value": "PeopleSettings.Read.All" + }, + { + "description": "Allows the application to read and write tenant-wide people settings on behalf of the signed-in user.", + "displayName": "Read and write tenant-wide people settings", + "id": "e67e6727-c080-415e-b521-e3f35d5248e9", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read and write tenant-wide people settings on your behalf.", + "userConsentDisplayName": "Read and write tenant-wide people settings", + "value": "PeopleSettings.ReadWrite.All" + }, + { + "description": "Allows the app to read your company's places (conference rooms and room lists) for calendar events and other applications, on behalf of the signed-in user.", + "displayName": "Read all company places", + "id": "cb8f45a0-5c2e-4ea1-b803-84b870a7d7ec", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your company's places (conference rooms and room lists) for calendar events and other applications, on your behalf.", + "userConsentDisplayName": "Read all company places", + "value": "Place.Read.All" + }, + { + "description": "Allows the app to manage organization places (conference rooms and room lists) for calendar events and other applications, on behalf of the signed-in user.", + "displayName": "Read and write organization places", + "id": "4c06a06a-098a-4063-868e-5dfee3827264", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to manage organization places (conference rooms and room lists) for calendar events and other applications, on your behalf.", + "userConsentDisplayName": "Read and write organization places", + "value": "Place.ReadWrite.All" + }, + { + "description": "Allows the app to read your organization's policies on behalf of the signed-in user.", + "displayName": "Read your organization's policies", + "id": "572fea84-0151-49b2-9301-11cb16974376", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your organization's policies on your behalf.", + "userConsentDisplayName": "Read your organization's policies", + "value": "Policy.Read.All" + }, + { + "description": "Allows the app to read your organization's conditional access policies on behalf of the signed-in user.", + "displayName": "Read your organization's conditional access policies", + "id": "633e0fce-8c58-4cfb-9495-12bbd5a24f7c", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your organization's conditional access policies on your behalf.", + "userConsentDisplayName": "Read your organization's conditional access policies", + "value": "Policy.Read.ConditionalAccess" + }, + { + "description": "Allows the app to read your organization’s identity protection policy on behalf of the signed-in user. ", + "displayName": "Read your organization’s identity protection policy", + "id": "d146432f-b803-4ed4-8d42-ba74193a6ede", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your organization’s identity protection policy on your behalf.", + "userConsentDisplayName": "Read your organization’s identity protection policy", + "value": "Policy.Read.IdentityProtection" + }, + { + "description": "Allows the app to read policies related to consent and permission grants for applications, on behalf of the signed-in user.", + "displayName": "Read consent and permission grant policies", + "id": "414de6ea-2d92-462f-b120-6e2a809a6d01", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read policies related to consent and permission grants for applications, on your behalf.", + "userConsentDisplayName": "Read consent and permission grant policies", + "value": "Policy.Read.PermissionGrant" + }, + { + "description": "Allows the app to read and write your organization's directory access review default policy on behalf of the signed-in user.", + "displayName": "Read and write your organization's directory access review default policy", + "id": "4f5bc9c8-ea54-4772-973a-9ca119cb0409", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write your organization's directory access review default policy on your behalf.", + "userConsentDisplayName": "Read and write your organization's directory access review default policy", + "value": "Policy.ReadWrite.AccessReview" + }, + { + "description": "Allows the app to read and write your organization's application configuration policies on behalf of the signed-in user. This includes policies such as activityBasedTimeoutPolicy, claimsMappingPolicy, homeRealmDiscoveryPolicy, tokenIssuancePolicy and tokenLifetimePolicy.", + "displayName": "Read and write your organization's application configuration policies", + "id": "b27add92-efb2-4f16-84f5-8108ba77985c", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write your organization's application configuration policies on your behalf. This includes policies such as activityBasedTimeoutPolicy, claimsMappingPolicy, homeRealmDiscoveryPolicy, tokenIssuancePolicy and tokenLifetimePolicy.", + "userConsentDisplayName": "Read and write your organization's application configuration policies", + "value": "Policy.ReadWrite.ApplicationConfiguration" + }, + { + "description": "Allows the app to read and write the authentication flow policies, on behalf of the signed-in user. ", + "displayName": "Read and write authentication flow policies", + "id": "edb72de9-4252-4d03-a925-451deef99db7", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write the authentication flow policies for your tenant, on your behalf.", + "userConsentDisplayName": "Read and write your authentication flow policies", + "value": "Policy.ReadWrite.AuthenticationFlows" + }, + { + "description": "Allows the app to read and write the authentication method policies, on behalf of the signed-in user. ", + "displayName": "Read and write authentication method policies", + "id": "7e823077-d88e-468f-a337-e18f1f0e6c7c", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write the authentication method policies for your tenant, on your behalf.", + "userConsentDisplayName": "Read and write your authentication method policies ", + "value": "Policy.ReadWrite.AuthenticationMethod" + }, + { + "description": "Allows the app to read and write your organization's authorization policy on behalf of the signed-in user. For example, authorization policies can control some of the permissions that the out-of-the-box user role has by default.", + "displayName": "Read and write your organization's authorization policy", + "id": "edd3c878-b384-41fd-95ad-e7407dd775be", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write your organization's authorization policy on your behalf. For example, authorization policies can control some of the permissions that the out-of-the-box user role has by default.", + "userConsentDisplayName": "Read and write your organization's authorization policy", + "value": "Policy.ReadWrite.Authorization" + }, + { + "description": "Allows the app to read and write your organization's conditional access policies on behalf of the signed-in user.", + "displayName": "Read and write your organization's conditional access policies", + "id": "ad902697-1014-4ef5-81ef-2b4301988e8c", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write your organization's conditional access policies on your behalf.", + "userConsentDisplayName": "Read and write your organization's conditional access policies", + "value": "Policy.ReadWrite.ConditionalAccess" + }, + { + "description": "Allows the app to read and write your organization's consent requests policy on behalf of the signed-in user.", + "displayName": "Read and write consent request policy", + "id": "4d135e65-66b8-41a8-9f8b-081452c91774", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write your organization's consent request policy on your behalf.", + "userConsentDisplayName": "Read and write consent request policy", + "value": "Policy.ReadWrite.ConsentRequest" + }, + { + "description": "Allows the app to read and write your organization's cross tenant access policies on behalf of the signed-in user.", + "displayName": "Read and write your organization's cross tenant access policies", + "id": "014b43d0-6ed4-4fc6-84dc-4b6f7bae7d85", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write your organization's cross tenant access policies on your behalf.", + "userConsentDisplayName": "Read and write your organization's cross tenant access policies", + "value": "Policy.ReadWrite.CrossTenantAccess" + }, + { + "description": "Allows the app to read and write your organization's device configuration policies on behalf of the signed-in user. For example, device registration policy can limit initial provisioning controls using quota restrictions, additional authentication and authorization checks.", + "displayName": "Read and write your organization's device configuration policies", + "id": "40b534c3-9552-4550-901b-23879c90bcf9", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write your organization's device configuration policies on your behalf. For example, device registration policy can limit initial provisioning controls using quota restrictions, additional authentication and authorization checks.", + "userConsentDisplayName": "Read and write your organization's device configuration policies", + "value": "Policy.ReadWrite.DeviceConfiguration" + }, + { + "description": "Allows the application to read and update the organization's external identities policy on behalf of the signed-in user. For example, external identities policy controls if users invited to access resources in your organization via B2B collaboration or B2B direct connect are allowed to self-service leave.", + "displayName": "Read and write your organization's external identities policy", + "id": "b5219784-1215-45b5-b3f1-88fe1081f9c0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read and update the organization's external identities policy on your behalf. For example, external identities policy controls if users invited to access resources in your organization via B2B collaboration or B2B direct connect are allowed to self-service leave.", + "userConsentDisplayName": "Read and write your organization's external identities policy", + "value": "Policy.ReadWrite.ExternalIdentities" + }, + { + "description": "Allows the app to read and write your organization's feature rollout policies on behalf of the signed-in user. Includes abilities to assign and remove users and groups to rollout of a specific feature.", + "displayName": "Read and write your organization's feature rollout policies", + "id": "92a38652-f13b-4875-bc77-6e1dbb63e1b2", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write your organization's feature rollout policies on your behalf. Includes abilities to assign and remove users and groups to rollout of a specific feature.", + "userConsentDisplayName": "Read and write your organization's feature rollout policies", + "value": "Policy.ReadWrite.FeatureRollout" + }, + { + "description": "Allows the app to read and write your organization’s identity protection policy on behalf of the signed-in user.", + "displayName": "Read and write your organization’s identity protection policy ", + "id": "7256e131-3efb-4323-9854-cf41c6021770", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write your organization’s identity protection policy on your behalf.", + "userConsentDisplayName": "Read and write your organization’s identity protection policy.", + "value": "Policy.ReadWrite.IdentityProtection" + }, + { + "description": "Allows the app to read and write your organization's mobility management policies on behalf of the signed-in user. For example, a mobility management policy can set the enrollment scope for a given mobility management application.", + "displayName": "Read and write your organization's mobility management policies", + "id": "a8ead177-1889-4546-9387-f25e658e2a79", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write your organization's mobility management policies on your behalf. For example, a mobility management policy can set the enrollment scope for a given mobility management application.", + "userConsentDisplayName": "Read and write your organization's mobility management policies", + "value": "Policy.ReadWrite.MobilityManagement" + }, + { + "description": "Allows the app to manage policies related to consent and permission grants for applications, on behalf of the signed-in user.", + "displayName": "Manage consent and permission grant policies", + "id": "2672f8bb-fd5e-42e0-85e1-ec764dd2614e", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to manage policies related to consent and permission grants for applications, on behalf of the signed-in user.", + "userConsentDisplayName": "Manage consent and permission grant policies", + "value": "Policy.ReadWrite.PermissionGrant" + }, + { + "description": "Allows the app to read and write your organization's security defaults policy on behalf of the signed-in user.", + "displayName": "Read and write your organization's security defaults policy", + "id": "0b2a744c-2abf-4f1e-ad7e-17a087e2be99", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write your organization's security defaults policy on your behalf.", + "userConsentDisplayName": "Read and write your organization's security defaults policy", + "value": "Policy.ReadWrite.SecurityDefaults" + }, + { + "description": "Allows the app to read and write your organization's trust framework policies on behalf of the signed-in user.", + "displayName": "Read and write your organization's trust framework policies", + "id": "cefba324-1a70-4a6e-9c1d-fd670b7ae392", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write your organization's trust framework policies on your behalf.", + "userConsentDisplayName": "Read and write trust framework policies", + "value": "Policy.ReadWrite.TrustFramework" + }, + { + "description": "Allows the app to have the same access to mailboxes as the signed-in user via POP protocol.", + "displayName": "Read and write access to mailboxes via POP.", + "id": "d7b7f2d9-0f45-4ea1-9d42-e50810c06991", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, update, create and delete email in your mailbox. Does not include permission to send mail.", + "userConsentDisplayName": "Read and write access to your mail.", + "value": "POP.AccessAsUser.All" + }, + { + "description": "Allows the app to read presence information on behalf of the signed-in user. Presence information includes activity, availability, status note, calendar out-of-office message, timezone and location.", + "displayName": "Read user's presence information", + "id": "76bc735e-aecd-4a1d-8b4c-2b915deabb79", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your presence information on your behalf. Presence information includes activity, availability, status note, calendar out-of-office message, timezone and location.", + "userConsentDisplayName": "Read your presence information", + "value": "Presence.Read" + }, + { + "description": "Allows the app to read presence information of all users in the directory on behalf of the signed-in user. Presence information includes activity, availability, status note, calendar out-of-office message, timezone and location.", + "displayName": "Read presence information of all users in your organization", + "id": "9c7a330d-35b3-4aa1-963d-cb2b9f927841", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read presence information of all users in the directory on your behalf. Presence information includes activity, availability, status note, calendar out-of-office message, timezone and location.", + "userConsentDisplayName": "Read presence information of all users in your organization", + "value": "Presence.Read.All" + }, + { + "description": "Allows the app to read the presence information and write activity and availability on behalf of the signed-in user. Presence information includes activity, availability, status note, calendar out-of-office message, timezone and location.", + "displayName": "Read and write a user's presence information", + "id": "8d3c54a7-cf58-4773-bf81-c0cd6ad522bb", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the presence information and write activity and availability on your behalf. Presence information includes activity, availability, status note, calendar out-of-office message, timezone and location.", + "userConsentDisplayName": "Read and write your presence information", + "value": "Presence.ReadWrite" + }, + { + "description": "Allows the application to read print connectors on behalf of the signed-in user.", + "displayName": "Read print connectors", + "id": "d69c2d6d-4f72-4f99-a6b9-663e32f8cf68", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read print connectors on your behalf.", + "userConsentDisplayName": "Read print connectors", + "value": "PrintConnector.Read.All" + }, + { + "description": "Allows the application to read and write print connectors on behalf of the signed-in user. ", + "displayName": "Read and write print connectors", + "id": "79ef9967-7d59-4213-9c64-4b10687637d8", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read and write print connectors on your behalf.", + "userConsentDisplayName": "Read and write print connectors", + "value": "PrintConnector.ReadWrite.All" + }, + { + "description": "Allows the application to create (register) printers on behalf of the signed-in user. ", + "displayName": "Register printers  ", + "id": "90c30bed-6fd1-4279-bf39-714069619721", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to create (register) printers on your behalf. ", + "userConsentDisplayName": "Register printers  ", + "value": "Printer.Create" + }, + { + "description": "Allows the application to create (register), read, update, and delete (unregister) printers on behalf of the signed-in user. ", + "displayName": "Register, read, update, and unregister printers", + "id": "93dae4bd-43a1-4a23-9a1a-92957e1d9121", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to create (register), read, update, and delete (unregister) printers on your behalf.  ", + "userConsentDisplayName": "Register, read, update, and unregister printers", + "value": "Printer.FullControl.All" + }, + { + "description": "Allows the application to read printers on behalf of the signed-in user. ", + "displayName": "Read printers", + "id": "3a736c8a-018e-460a-b60c-863b2683e8bf", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read printers on your behalf. ", + "userConsentDisplayName": "Read printers", + "value": "Printer.Read.All" + }, + { + "description": "Allows the application to read and update printers on behalf of the signed-in user. Does not allow creating (registering) or deleting (unregistering) printers.", + "displayName": "Read and update printers", + "id": "89f66824-725f-4b8f-928e-e1c5258dc565", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read and update printers on your behalf. Does not allow creating (registering) or deleting (unregistering) printers.", + "userConsentDisplayName": "Read and update printers", + "value": "Printer.ReadWrite.All" + }, + { + "description": "Allows the application to read printer shares on behalf of the signed-in user. ", + "displayName": "Read printer shares", + "id": "ed11134d-2f3f-440d-a2e1-411efada2502", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read printer shares on your behalf. ", + "userConsentDisplayName": "Read printer shares", + "value": "PrinterShare.Read.All" + }, + { + "description": "Allows the application to read basic information about printer shares on behalf of the signed-in user. Does not allow reading access control information.", + "displayName": "Read basic information about printer shares", + "id": "5fa075e9-b951-4165-947b-c63396ff0a37", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read basic information about printer shares on your behalf.", + "userConsentDisplayName": "Read basic information about printer shares", + "value": "PrinterShare.ReadBasic.All" + }, + { + "description": "Allows the application to read and update printer shares on behalf of the signed-in user. ", + "displayName": "Read and write printer shares", + "id": "06ceea37-85e2-40d7-bec3-91337a46038f", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read and update printer shares on your behalf. ", + "userConsentDisplayName": "Read and update printer shares", + "value": "PrinterShare.ReadWrite.All" + }, + { + "description": "Allows the application to create print jobs on behalf of the signed-in user and upload document content to print jobs that the signed-in user created.", + "displayName": "Create print jobs", + "id": "21f0d9c0-9f13-48b3-94e0-b6b231c7d320", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to create print jobs on your behalf and upload document content to print jobs that you created.", + "userConsentDisplayName": "Create your print jobs", + "value": "PrintJob.Create" + }, + { + "description": "Allows the application to read the metadata and document content of print jobs that the signed-in user created.", + "displayName": "Read user's print jobs", + "id": "248f5528-65c0-4c88-8326-876c7236df5e", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read the metadata and document content of print jobs that you created.", + "userConsentDisplayName": "Read your print jobs", + "value": "PrintJob.Read" + }, + { + "description": "Allows the application to read the metadata and document content of print jobs on behalf of the signed-in user. ", + "displayName": "Read print jobs", + "id": "afdd6933-a0d8-40f7-bd1a-b5d778e8624b", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read the metadata and document content of print jobs on your behalf. ", + "userConsentDisplayName": "Read print jobs", + "value": "PrintJob.Read.All" + }, + { + "description": "Allows the application to read the metadata of print jobs that the signed-in user created. Does not allow access to print job document content.", + "displayName": "Read basic information of user's print jobs", + "id": "6a71a747-280f-4670-9ca0-a9cbf882b274", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read the metadata of print jobs that you created. Does not allow access to print job document content.", + "userConsentDisplayName": "Read basic information of your print jobs", + "value": "PrintJob.ReadBasic" + }, + { + "description": "Allows the application to read the metadata of print jobs on behalf of the signed-in user. Does not allow access to print job document content.", + "displayName": "Read basic information of print jobs", + "id": "04ce8d60-72ce-4867-85cf-6d82f36922f3", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read the metadata of print jobs on your behalf. Does not allow access to print job document content.", + "userConsentDisplayName": "Read basic information of print jobs", + "value": "PrintJob.ReadBasic.All" + }, + { + "description": "Allows the application to read and update the metadata and document content of print jobs that the signed-in user created.", + "displayName": "Read and write user's print jobs", + "id": "b81dd597-8abb-4b3f-a07a-820b0316ed04", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read and update the metadata and document content of print jobs that you created.", + "userConsentDisplayName": "Read and update your print jobs", + "value": "PrintJob.ReadWrite" + }, + { + "description": "Allows the application to read and update the metadata and document content of print jobs on behalf of the signed-in user. ", + "displayName": "Read and write print jobs", + "id": "036b9544-e8c5-46ef-900a-0646cc42b271", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read and update the metadata and document content of print jobs on your behalf. ", + "userConsentDisplayName": "Read and update print jobs", + "value": "PrintJob.ReadWrite.All" + }, + { + "description": "Allows the application to read and update the metadata of print jobs that the signed-in user created. Does not allow access to print job document content.", + "displayName": "Read and write basic information of user's print jobs", + "id": "6f2d22f2-1cb6-412c-a17c-3336817eaa82", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read and update the metadata of print jobs that you created. Does not allow access to print job document content.", + "userConsentDisplayName": "Read and write basic information of your print jobs", + "value": "PrintJob.ReadWriteBasic" + }, + { + "description": "Allows the application to read and update the metadata of print jobs on behalf of the signed-in user. Does not allow access to print job document content.", + "displayName": "Read and write basic information of print jobs", + "id": "3a0db2f6-0d2a-4c19-971b-49109b19ad3d", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read and update the metadata of print jobs on your behalf. Does not allow access to print job document content.", + "userConsentDisplayName": "Read and write basic information of print jobs", + "value": "PrintJob.ReadWriteBasic.All" + }, + { + "description": "Allows the application to read tenant-wide print settings on behalf of the signed-in user.", + "displayName": "Read tenant-wide print settings", + "id": "490f32fd-d90f-4dd7-a601-ff6cdc1a3f6c", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read tenant-wide print settings on your behalf.", + "userConsentDisplayName": "Read tenant-wide print settings", + "value": "PrintSettings.Read.All" + }, + { + "description": "Allows the application to read and write tenant-wide print settings on behalf of the signed-in user.", + "displayName": "Read and write tenant-wide print settings", + "id": "9ccc526a-c51c-4e5c-a1fd-74726ef50b8f", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read and write tenant-wide print settings on your behalf.", + "userConsentDisplayName": "Read and write tenant-wide print settings", + "value": "PrintSettings.ReadWrite.All" + }, + { + "description": "Allows the app to read time-based assignment and just-in-time elevation (including scheduled elevation) of Azure AD built-in and custom administrative roles, on behalf of the signed-in user.", + "displayName": "Read privileged access to Azure AD", + "id": "b3a539c9-59cb-4ad5-825a-041ddbdc2bdb", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read time-based assignment and just-in-time elevation (including scheduled elevation) of Azure AD built-in and custom administrative roles, on your behalf.", + "userConsentDisplayName": "Read privileged access to Azure AD", + "value": "PrivilegedAccess.Read.AzureAD" + }, + { + "description": "Allows the app to read time-based assignment and just-in-time elevation (including scheduled elevation) of Azure AD groups, on behalf of the signed-in user.", + "displayName": "Read privileged access to Azure AD groups", + "id": "d329c81c-20ad-4772-abf9-3f6fdb7e5988", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read time-based assignment and just-in-time elevation (including scheduled elevation) of Azure AD groups, on your behalf.", + "userConsentDisplayName": "Read privileged access to Azure AD groups", + "value": "PrivilegedAccess.Read.AzureADGroup" + }, + { + "description": "Allows the app to read time-based assignment and just-in-time elevation of Azure resources (like your subscriptions, resource groups, storage, compute) on behalf of the signed-in user.", + "displayName": "Read privileged access to Azure resources", + "id": "1d89d70c-dcac-4248-b214-903c457af83a", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read time-based assignment and just-in-time elevation of Azure resources (like your subscriptions, resource groups, storage, compute) on your behalf.", + "userConsentDisplayName": "Read privileged access to your Azure resources", + "value": "PrivilegedAccess.Read.AzureResources" + }, + { + "description": "Allows the app to request and manage just in time elevation (including scheduled elevation) of users to Azure AD built-in administrative roles, on behalf of signed-in users.", + "displayName": "Read and write privileged access to Azure AD", + "id": "3c3c74f5-cdaa-4a97-b7e0-4e788bfcfb37", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to request and manage just in time elevation (including scheduled elevation) of users to Azure AD built-in administrative roles, on your behalf.", + "userConsentDisplayName": "Read and write privileged access to Azure AD", + "value": "PrivilegedAccess.ReadWrite.AzureAD" + }, + { + "description": "Allows the app to request and manage time-based assignment and just-in-time elevation (including scheduled elevation) of Azure AD groups, on behalf of the signed-in user.", + "displayName": "Read and write privileged access to Azure AD groups", + "id": "32531c59-1f32-461f-b8df-6f8a3b89f73b", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to request and manage time-based assignment and just-in-time elevation (including scheduled elevation) of Azure AD groups, on your behalf.", + "userConsentDisplayName": "Read and write privileged access to Azure AD groups", + "value": "PrivilegedAccess.ReadWrite.AzureADGroup" + }, + { + "description": "Allows the app to request and manage time-based assignment and just-in-time elevation of user privileges to manage Azure resources (like subscriptions, resource groups, storage, compute) on behalf of the signed-in users.", + "displayName": "Read and write privileged access to Azure resources", + "id": "a84a9652-ffd3-496e-a991-22ba5529156a", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to request and manage time-based assignment and just-in-time elevation of user privileges to manage  your Azure resources (like your subscriptions, resource groups, storage, compute) on your behalf.", + "userConsentDisplayName": "Read and write privileged access to Azure resources", + "value": "PrivilegedAccess.ReadWrite.AzureResources" + }, + { + "description": "Allows the app to read time-based assignment schedules for access to Azure AD groups, on behalf of the signed-in user.", + "displayName": "Read assignment schedules for access to Azure AD groups", + "id": "02a32cc4-7ab5-4b58-879a-0586e0f7c495", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read time-based assignment schedules for access to Azure AD groups, on your behalf.", + "userConsentDisplayName": "Read assignment schedules for access to Azure AD groups", + "value": "PrivilegedAssignmentSchedule.Read.AzureADGroup" + }, + { + "description": "Allows the app to read, create, and delete time-based assignment schedules for access to Azure AD groups, on behalf of the signed-in user.", + "displayName": "Read, create, and delete assignment schedules for access to Azure AD groups", + "id": "06dbc45d-6708-4ef0-a797-f797ee68bf4b", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, create, and delete time-based assignment schedules for access to Azure AD groups, on your behalf.", + "userConsentDisplayName": "Read, create, and delete assignment schedules for access to Azure AD groups", + "value": "PrivilegedAssignmentSchedule.ReadWrite.AzureADGroup" + }, + { + "description": "Allows the app to read time-based eligibility schedules for access to Azure AD groups, on behalf of the signed-in user.", + "displayName": "Read eligibility schedules for access to Azure AD groups", + "id": "8f44f93d-ecef-46ae-a9bf-338508d44d6b", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read time-based eligibility schedules for access to Azure AD groups, on your behalf.", + "userConsentDisplayName": "Read eligibility schedules for access to Azure AD groups", + "value": "PrivilegedEligibilitySchedule.Read.AzureADGroup" + }, + { + "description": "Allows the app to read, create, and delete time-based eligibility schedules for access to Azure AD groups, on behalf of the signed-in user.", + "displayName": "Read, create, and delete eligibility schedules for access to Azure AD groups", + "id": "ba974594-d163-484e-ba39-c330d5897667", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, create, and delete time-based eligibility schedules for access to Azure AD groups, on your behalf.", + "userConsentDisplayName": "Read, create, and delete eligibility schedules for access to Azure AD groups", + "value": "PrivilegedEligibilitySchedule.ReadWrite.AzureADGroup" + }, + { + "description": "Allows the app to see your users' basic profile (e.g., name, picture, user name, email address)", + "displayName": "View users' basic profile", + "id": "14dad69e-099b-42c9-810b-d002981feec1", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to see your basic profile (e.g., name, picture, user name, email address)", + "userConsentDisplayName": "View your basic profile", + "value": "profile" + }, + { + "description": "Allows the app to read programs and program controls that the signed-in user has access to in the organization.", + "displayName": "Read all programs that user can access", + "id": "c492a2e1-2f8f-4caa-b076-99bbf6e40fe4", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read information on programs and program controls that you have access to.", + "userConsentDisplayName": "Read programs that you can access", + "value": "ProgramControl.Read.All" + }, + { + "description": "Allows the app to read, update, delete and perform actions on programs and program controls that the signed-in user has access to in the organization.", + "displayName": "Manage all programs that user can access", + "id": "50fd364f-9d93-4ae1-b170-300e87cccf84", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, update and perform action on programs and program controls that you have access to.", + "userConsentDisplayName": "Manage programs that you can access", + "value": "ProgramControl.ReadWrite.All" + }, + { + "description": "Allows an app to read all question and answer sets that the signed-in user can access.", + "displayName": "Read all Questions and Answers that the user can access.", + "id": "f73fa04f-b9a5-4df9-8843-993ce928925e", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read all question and answer sets that you can access.", + "userConsentDisplayName": "Read all Questions and Answers that you can access.", + "value": "QnA.Read.All" + }, + { + "description": "Allows the application to read any data from Records Management, such as configuration, labels, and policies on behalf of the signed-in user.", + "displayName": "Read Records Management configuration, labels, and policies", + "id": "07f995eb-fc67-4522-ad66-2b8ca8ea3efd", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read any data from Records Management, such as configuration, labels and policies on your behalf.", + "userConsentDisplayName": "Read Records Management configuration, labels, and policies", + "value": "RecordsManagement.Read.All" + }, + { + "description": "Allow the application to create, update and delete any data from Records Management, such as configuration, labels, and policies on behalf of the signed-in user.", + "displayName": "Read and write Records Management configuration, labels, and policies", + "id": "f2833d75-a4e6-40ab-86d4-6dfe73c97605", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allow the application to create, update and delete any data from Records Management, such as configuration, labels, and policies on your behalf.", + "userConsentDisplayName": "Read and write Records Management configuration, labels, and policies", + "value": "RecordsManagement.ReadWrite.All" + }, + { + "description": "Allows an app to read all service usage reports on behalf of the signed-in user. Services that provide usage reports include Office 365 and Azure Active Directory.", + "displayName": "Read all usage reports", + "id": "02e97553-ed7b-43d0-ab3c-f8bace0d040c", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows an app to read all service usage reports on your behalf. Services that provide usage reports include Office 365 and Azure Active Directory.", + "userConsentDisplayName": "Read all usage reports", + "value": "Reports.Read.All" + }, + { + "description": "Allows the app to read admin report settings, such as whether to display concealed information in reports, on behalf of the signed-in user", + "displayName": "Read admin report settings", + "id": "84fac5f4-33a9-4100-aa38-a20c6d29e5e7", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read admin report settings, such as whether to display concealed information in reports, on your behalf.", + "userConsentDisplayName": "Read admin report settings", + "value": "ReportSettings.Read.All" + }, + { + "description": "Allows the app to read and update admin report settings, such as whether to display concealed information in reports, on behalf of the signed-in user.", + "displayName": "Read and write admin report settings", + "id": "b955410e-7715-4a88-a940-dfd551018df3", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and update admin report settings, such as whether to display concealed information in reports, on your behalf.", + "userConsentDisplayName": "Read and write admin report settings", + "value": "ReportSettings.ReadWrite.All" + }, + { + "description": "Allows the app to read the resource specific permissions granted on a user account, on behalf of the signed-in user.", + "displayName": "Read resource specific permissions granted on a user account", + "id": "f1d91a8f-88e7-4774-8401-b668d5bca0c5", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the resource specific permission granted on your account, on your behalf.", + "userConsentDisplayName": "Read resource specific permissions granted on your user account", + "value": "ResourceSpecificPermissionGrant.ReadForUser" + }, + { + "description": "Allows the app to read the active role-based access control (RBAC) assignments for your company's directory, on behalf of the signed-in user. This includes reading directory role templates, and directory roles.", + "displayName": "Read all active role assignments for your company's directory", + "id": "344a729c-0285-42c6-9014-f12b9b8d6129", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the active role-based access control (RBAC) assignments for your company's directory, on your behalf. This includes reading directory role templates, and directory roles.", + "userConsentDisplayName": "Read all active role assignments for your company's directory", + "value": "RoleAssignmentSchedule.Read.Directory" + }, + { + "description": "Allows the app to read and manage the active role-based access control (RBAC) assignments for your company's directory, on behalf of the signed-in user. This includes managing active directory role membership, and reading directory role templates, directory roles and active memberships.", + "displayName": "Read, update, and delete all active role assignments for your company's directory", + "id": "8c026be3-8e26-4774-9372-8d5d6f21daff", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and manage the active role-based access control (RBAC) assignments for your company's directory, on your behalf. This includes managing active directory role membership, and reading directory role templates, directory roles and active memberships.", + "userConsentDisplayName": "Read, update, and delete all active role assignments for your company's directory", + "value": "RoleAssignmentSchedule.ReadWrite.Directory" + }, + { + "description": "Allows the app to read the eligible role-based access control (RBAC) assignments for your company's directory, on behalf of the signed-in user. This includes reading directory role templates, and directory roles.", + "displayName": "Read all eligible role assignments for your company's directory", + "id": "eb0788c2-6d4e-4658-8c9e-c0fb8053f03d", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the eligible role-based access control (RBAC) assignments for your company's directory, on your behalf. This includes reading directory role templates, and directory roles.", + "userConsentDisplayName": "Read all eligible role assignments for your company's directory", + "value": "RoleEligibilitySchedule.Read.Directory" + }, + { + "description": "Allows the app to read and manage the eligible role-based access control (RBAC) assignments for your company's directory, on behalf of the signed-in user. This includes managing eligible directory role membership, and reading directory role templates, directory roles and eligible memberships.", + "displayName": "Read, update, and delete all eligible role assignments for your company's directory", + "id": "62ade113-f8e0-4bf9-a6ba-5acb31db32fd", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and manage the eligible role-based access control (RBAC) assignments for your company's directory, on your behalf. This includes managing eligible directory role membership, and reading directory role templates, directory roles and eligible memberships.", + "userConsentDisplayName": "Read, update, and delete all eligible role assignments for your company's directory", + "value": "RoleEligibilitySchedule.ReadWrite.Directory" + }, + { + "description": "Allows the app to read the role-based access control (RBAC) settings for all RBAC providers, on behalf of the signed-in user. This includes reading role definitions and role assignments.", + "displayName": "Read role management data for all RBAC providers", + "id": "48fec646-b2ba-4019-8681-8eb31435aded", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the role-based access control (RBAC) settings for all RBAC providers, on your behalf. This includes reading role definitions and role assignments.", + "userConsentDisplayName": "Read role management data for all RBAC providers", + "value": "RoleManagement.Read.All" + }, + { + "description": "Allows the app to read the Cloud PC role-based access control (RBAC) settings, on behalf of the signed-in user.  This includes reading Cloud PC role definitions and role assignments.", + "displayName": "Read Cloud PC RBAC settings", + "id": "9619b88a-8a25-48a7-9571-d23be0337a79", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the Cloud PC role-based access control (RBAC) settings, on your behalf.  This includes reading Cloud PC role definitions and role assignments.", + "userConsentDisplayName": "Read Cloud PC RBAC settings", + "value": "RoleManagement.Read.CloudPC" + }, + { + "description": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, on behalf of the signed-in user. This includes reading directory role templates, directory roles and memberships.", + "displayName": "Read directory RBAC settings", + "id": "741c54c3-0c1e-44a1-818b-3f97ab4e8c83", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the role-based access control (RBAC) settings for your company's directory, on your behalf. This includes reading directory role templates, directory roles and memberships.", + "userConsentDisplayName": "Read directory RBAC settings", + "value": "RoleManagement.Read.Directory" + }, + { + "description": "Allows the app to read the role-based access control (RBAC) settings for your organization's Exchange Online service, on behalf of the signed-in user. This includes reading Exchange management role definitions, role groups, role group membership, role assignments, management scopes, and role assignment policies.", + "displayName": "Read Exchange Online RBAC configuration", + "id": "3bc15058-7858-4141-b24f-ae43b4e80b52", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the role-based access control (RBAC) settings for your organization's Exchange Online service, on your behalf. This includes reading Exchange management role definitions, role groups, role group membership, role assignments, management scopes, and role assignment policies.", + "userConsentDisplayName": "Read Exchange Online RBAC configuration", + "value": "RoleManagement.Read.Exchange" + }, + { + "description": "Allows the app to read and manage the Cloud PC role-based access control (RBAC) settings, on behalf of the signed-in user. This includes reading and managing Cloud PC role definitions and role assignments.", + "displayName": "Read and write Cloud PC RBAC settings", + "id": "501d06f8-07b8-4f18-b5c6-c191a4af7a82", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and manage the Cloud PC role-based access control (RBAC) settings, on your behalf. This includes reading and managing Cloud PC role definitions and memberships.", + "userConsentDisplayName": "Read and write Cloud PC RBAC settings", + "value": "RoleManagement.ReadWrite.CloudPC" + }, + { + "description": "Allows the app to read and manage the role-based access control (RBAC) settings for your company's directory, on behalf of the signed-in user. This includes instantiating directory roles and managing directory role membership, and reading directory role templates, directory roles and memberships.", + "displayName": "Read and write directory RBAC settings", + "id": "d01b97e9-cbc0-49fe-810a-750afd5527a3", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and manage the role-based access control (RBAC) settings for your company's directory, on your behalf. This includes instantiating directory roles and managing directory role membership, and reading directory role templates, directory roles and memberships.", + "userConsentDisplayName": "Read and write directory RBAC settings", + "value": "RoleManagement.ReadWrite.Directory" + }, + { + "description": "Allows the app to read and manage the role-based access control (RBAC) settings for your organization's Exchange Online service, on behalf of the signed-in user. This includes reading, creating, updating, and deleting Exchange management role definitions, role groups, role group membership, role assignments, management scopes, and role assignment policies.", + "displayName": "Read and write Exchange Online RBAC configuration", + "id": "c1499fe0-52b1-4b22-bed2-7a244e0e879f", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and manage the role-based access control (RBAC) settings for your organization's Exchange Online service, on your behalf. This includes reading, creating, updating, and deleting Exchange management role definitions, role groups, role group membership, role assignments, management scopes, and role assignment policies.", + "userConsentDisplayName": "Read and write Exchange Online RBAC configuration", + "value": "RoleManagement.ReadWrite.Exchange" + }, + { + "description": "Allows the app to read the role-based access control (RBAC) alerts for your company's directory, on behalf of the signed-in user. This includes reading alert statuses, alert definitions, alert configurations and incidents that lead to an alert.", + "displayName": "Read all alert data for your company's directory", + "id": "cce71173-f76d-446e-97ff-efb2d82e11b1", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the role-based access control (RBAC) alerts for your company's directory, on your behalf. This includes reading alert statuses, alert definitions, alert configurations and incidents that lead to an alert.", + "userConsentDisplayName": "Read all alert data for your company's directory", + "value": "RoleManagementAlert.Read.Directory" + }, + { + "description": "Allows the app to read and manage the role-based access control (RBAC) alerts for your company's directory, on behalf of the signed-in user. This includes managing alert settings, initiating alert scans, dimissing alerts, remediating alert incidents, and reading alert statuses, alert definitions, alert configurations and incidents that lead to an alert.", + "displayName": "Read all alert data, configure alerts, and take actions on all alerts for your company's directory", + "id": "435644c6-a5b1-40bf-8f52-fe8e5b53e19c", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and manage the role-based access control (RBAC) alerts for your company's directory, on your behalf. This includes managing alert settings, initiating alert scans, dimissing alerts, remediating alert incidents, and reading alert statuses, alert definitions, alert configurations and incidents that lead to an alert.", + "userConsentDisplayName": "Read all alert data, configure alerts, and take actions on all alerts for your company's directory", + "value": "RoleManagementAlert.ReadWrite.Directory" + }, + { + "description": "Allows the app to read policies in Privileged Identity Management for Groups, on behalf of the signed-in user.", + "displayName": "Read all policies in PIM for Groups", + "id": "7e26fdff-9cb1-4e56-bede-211fe0e420e8", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read policies in Privileged Identity Management for Groups, on your behalf.", + "userConsentDisplayName": "Read all policies in PIM for Groups", + "value": "RoleManagementPolicy.Read.AzureADGroup" + }, + { + "description": "Allows the app to read policies for privileged role-based access control (RBAC) assignments of your company's directory, on behalf of the signed-in user.", + "displayName": "Read all policies for privileged role assignments of your company's directory", + "id": "3de2cdbe-0ff5-47d5-bdee-7f45b4749ead", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read policies for privileged role-based access control (RBAC) assignments of your company's directory, on your behalf.", + "userConsentDisplayName": "Read all policies for privileged role assignments of your company's directory", + "value": "RoleManagementPolicy.Read.Directory" + }, + { + "description": "Allows the app to read, update, and delete policies in Privileged Identity Management for Groups, on behalf of the signed-in user.", + "displayName": "Read, update, and delete all policies in PIM for Groups", + "id": "0da165c7-3f15-4236-b733-c0b0f6abe41d", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, update, and delete policies in Privileged Identity Management for Groups, on your behalf.", + "userConsentDisplayName": "Read, update, and delete all policies in PIM for Groups", + "value": "RoleManagementPolicy.ReadWrite.AzureADGroup" + }, + { + "description": "Allows the app to read, update, and delete policies for privileged role-based access control (RBAC) assignments of your company's directory, on behalf of the signed-in user.", + "displayName": "Read, update, and delete all policies for privileged role assignments of your company's directory", + "id": "1ff1be21-34eb-448c-9ac9-ce1f506b2a68", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, update, and delete policies for privileged role-based access control (RBAC) assignments of your company's directory, on your behalf.", + "userConsentDisplayName": "Read, update, and delete all policies for privileged role assignments of your company's directory", + "value": "RoleManagementPolicy.ReadWrite.Directory" + }, + { + "description": "Allows the app to read schedule, schedule groups, shifts and associated entities in the Teams or Shifts application on behalf of the signed-in user.", + "displayName": "Read user schedule items", + "id": "fccf6dd8-5706-49fa-811f-69e2e1b585d0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read schedule, schedule groups, shifts and associated entities in the Teams or Shifts application on your behalf.", + "userConsentDisplayName": "Read your schedule items", + "value": "Schedule.Read.All" + }, + { + "description": "Allows the app to manage schedule, schedule groups, shifts and associated entities in the Teams or Shifts application on behalf of the signed-in user.", + "displayName": "Read and write user schedule items", + "id": "63f27281-c9d9-4f29-94dd-6942f7f1feb0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to manage schedule, schedule groups, shifts and associated entities in the Teams or Shifts application on your behalf.", + "userConsentDisplayName": "Read and write your schedule items", + "value": "Schedule.ReadWrite.All" + }, + { + "description": "Allows the app to read search configuration, on behalf of the signed-in user.", + "displayName": "Read your organization's search configuration", + "id": "7d307522-aa38-4cd0-bd60-90c6f0ac50bd", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read search configuration, on your behalf.", + "userConsentDisplayName": "Read your organization's search configuration", + "value": "SearchConfiguration.Read.All" + }, + { + "description": "Allows the app to read and write search configuration, on behalf of the signed-in user.", + "displayName": "Read and write your organization's search configuration", + "id": "b1a7d408-cab0-47d2-a2a5-a74a3733600d", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write search configuration, on your behalf.", + "userConsentDisplayName": "Read and write your organization's search configuration", + "value": "SearchConfiguration.ReadWrite.All" + }, + { + "description": "Allows the app to read security actions, on behalf of the signed-in user.", + "displayName": "Read your organization's security actions", + "id": "1638cddf-07a4-4de2-8645-69c96cacad73", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read security actions, on your behalf.", + "userConsentDisplayName": "Read your organization's security actions", + "value": "SecurityActions.Read.All" + }, + { + "description": "Allows the app to read or update security actions, on behalf of the signed-in user.", + "displayName": "Read and update your organization's security actions", + "id": "dc38509c-b87d-4da0-bd92-6bec988bac4a", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and update security actions, on your behalf.", + "userConsentDisplayName": "Read and update your organization's security actions", + "value": "SecurityActions.ReadWrite.All" + }, + { + "description": "Allows the app to read all security alerts, on behalf of the signed-in user.", + "displayName": "Read all security alerts", + "id": "bc257fb8-46b4-4b15-8713-01e91bfbe4ea", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read all security alerts that you have access to.", + "userConsentDisplayName": "Read all alerts", + "value": "SecurityAlert.Read.All" + }, + { + "description": "Allows the app to read and write to all security alerts, on behalf of the signed-in user.", + "displayName": "Read and write to all security alerts", + "id": "471f2a7f-2a42-4d45-a2bf-594d0838070d", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write all alerts that you have access to.", + "userConsentDisplayName": "Read and write all alerts", + "value": "SecurityAlert.ReadWrite.All" + }, + { + "description": "Read email metadata and security detection details on behalf of the signed in user.", + "displayName": "Read metadata and detection details for emails in your organization", + "id": "53e6783e-b127-4a35-ab3a-6a52d80a9077", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Read email metadata and security detection details on your behalf.", + "userConsentDisplayName": "Read metadata and detection details for emails in your organization", + "value": "SecurityAnalyzedMessage.Read.All" + }, + { + "description": "Read email metadata, security detection details, and execute remediation actions like deleting an email, on behalf of the signed in user.", + "displayName": "Read metadata, detection details, and execute remediation actions on emails in your organization", + "id": "48eb8c83-6e58-46e7-a6d3-8805822f5940", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Read email metadata, security detection details, and execute remediation actions like deleting an email, on your behalf.", + "userConsentDisplayName": "Read metadata, detection details, and execute remediation actions on emails in your organization", + "value": "SecurityAnalyzedMessage.ReadWrite.All" + }, + { + "description": "Allows the app to read your organization’s security events on behalf of the signed-in user.", + "displayName": "Read your organization’s security events", + "id": "64733abd-851e-478a-bffb-e47a14b18235", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your organization’s security events on your behalf.", + "userConsentDisplayName": "Read your organization’s security events", + "value": "SecurityEvents.Read.All" + }, + { + "description": "Allows the app to read your organization’s security events on behalf of the signed-in user. Also allows the app to update editable properties in security events on behalf of the signed-in user.", + "displayName": "Read and update your organization’s security events", + "id": "6aedf524-7e1c-45a7-bd76-ded8cab8d0fc", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your organization’s security events on your behalf. Also allows you to update editable properties in security events.", + "userConsentDisplayName": "Read and update your organization’s security events", + "value": "SecurityEvents.ReadWrite.All" + }, + { + "description": "Allows the app to read security incidents, on behalf of the signed-in user.", + "displayName": "Read incidents", + "id": "b9abcc4f-94fc-4457-9141-d20ce80ec952", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read all security incidents that you have access to.", + "userConsentDisplayName": "Read security incidents", + "value": "SecurityIncident.Read.All" + }, + { + "description": "Allows the app to read and write security incidents, on behalf of the signed-in user.", + "displayName": "Read and write to incidents", + "id": "128ca929-1a19-45e6-a3b8-435ec44a36ba", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write to all security incidents that you have access to.", + "userConsentDisplayName": "Read and write to security incidents", + "value": "SecurityIncident.ReadWrite.All" + }, + { + "description": "Allows the app to read your tenant's service health information on behalf of the signed-in user. Health information may include service issues or service health overviews.", + "displayName": "Read service health", + "id": "55896846-df78-47a7-aa94-8d3d4442ca7f", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your tenant's service health information on your behalf.Health information may include service issues or service health overviews.", + "userConsentDisplayName": "Read service health", + "value": "ServiceHealth.Read.All" + }, + { + "description": "Allows the app to read your tenant's service announcement messages on behalf of the signed-in user. Messages may include information about new or changed features.", + "displayName": "Read service announcement messages", + "id": "eda39fa6-f8cf-4c3c-a909-432c683e4c9b", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your tenant's service announcement messages on your behalf. Messages may include information about new or changed features.", + "userConsentDisplayName": "Read service messages", + "value": "ServiceMessage.Read.All" + }, + { + "description": "Allows the app to update service announcement messages' user status on behalf of the signed-in user. The message status can be marked as read, archive, or favorite.", + "displayName": "Update user status on service announcement messages", + "id": "636e1b0b-1cc2-4b1c-9aa9-4eeed9b9761b", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to update service announcement messages' status on your behalf. Your status for messages can be marked as read, archive, or favorite.", + "userConsentDisplayName": "Update your user status on service announcement messages", + "value": "ServiceMessageViewpoint.Write" + }, + { + "description": "Allows the app to read service principal endpoints", + "displayName": "Read service principal endpoints", + "id": "9f9ce928-e038-4e3b-8faf-7b59049a8ddc", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read service principal endpoints", + "userConsentDisplayName": "Read service principal endpoints", + "value": "ServicePrincipalEndpoint.Read.All" + }, + { + "description": "Allows the app to update service principal endpoints", + "displayName": "Read and update service principal endpoints", + "id": "7297d82c-9546-4aed-91df-3d4f0a9b3ff0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to update service principal endpoints", + "userConsentDisplayName": "Read and update service principal endpoints", + "value": "ServicePrincipalEndpoint.ReadWrite.All" + }, + { + "description": "Allows the application to read the tenant-level settings in SharePoint and OneDrive on behalf of the signed-in user.", + "displayName": "Read SharePoint and OneDrive tenant settings", + "id": "2ef70e10-5bfd-4ede-a5f6-67720500b258", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read the tenant-level settings in SharePoint and OneDrive on your behalf.", + "userConsentDisplayName": "Read SharePoint and OneDrive tenant settings", + "value": "SharePointTenantSettings.Read.All" + }, + { + "description": "Allows the application to read and change the tenant-level settings of SharePoint and OneDrive on behalf of the signed-in user.", + "displayName": "Read and change SharePoint and OneDrive tenant settings", + "id": "aa07f155-3612-49b8-a147-6c590df35536", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the application to read and change the tenant-level settings of SharePoint and OneDrive on your behalf.", + "userConsentDisplayName": "Read and change SharePoint and OneDrive tenant settings", + "value": "SharePointTenantSettings.ReadWrite.All" + }, + { + "description": "Allows the app to read all the short notes a sign-in user has access to.", + "displayName": "Read short notes of the signed-in user", + "id": "50f66e47-eb56-45b7-aaa2-75057d9afe08", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your short notes.", + "userConsentDisplayName": "Read your short notes", + "value": "ShortNotes.Read" + }, + { + "description": "Allows the app to read, create, edit, and delete short notes of a signed-in user.", + "displayName": "Read, create, edit, and delete short notes of the signed-in user", + "id": "328438b7-4c01-4c07-a840-e625a749bb89", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, create, edit, and delete your short notes.", + "userConsentDisplayName": "Read, create, edit, and delete your short notes", + "value": "ShortNotes.ReadWrite" + }, + { + "description": "Allows the application to have full control of all site collections on behalf of the signed-in user.", + "displayName": "Have full control of all site collections", + "id": "5a54b8b3-347c-476d-8f8e-42d5c7424d29", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allow the application to have full control of all site collections on your behalf.", + "userConsentDisplayName": "Have full control of all your site collections", + "value": "Sites.FullControl.All" + }, + { + "description": "Allows the application to create or delete document libraries and lists in all site collections on behalf of the signed-in user.", + "displayName": "Create, edit, and delete items and lists in all site collections", + "id": "65e50fdc-43b7-4915-933e-e8138f11f40a", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allow the application to create or delete document libraries and lists in all site collections on your behalf.", + "userConsentDisplayName": "Create, edit, and delete items and lists in all your site collections", + "value": "Sites.Manage.All" + }, + { + "description": "Allows the application to read documents and list items in all site collections on behalf of the signed-in user", + "displayName": "Read items in all site collections", + "id": "205e70e5-aba6-4c52-a976-6d2d46c48043", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allow the application to read documents and list items in all site collections on your behalf", + "userConsentDisplayName": "Read items in all site collections", + "value": "Sites.Read.All" + }, + { + "description": "Allows the application to edit or delete documents and list items in all site collections on behalf of the signed-in user.", + "displayName": "Edit or delete items in all site collections", + "id": "89fe6a52-be36-487e-b7d8-d061c450a026", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allow the application to edit or delete documents and list items in all site collections on your behalf.", + "userConsentDisplayName": "Edit or delete items in all site collections", + "value": "Sites.ReadWrite.All" + }, + { + "description": "Allows the app to be able to send emails from the user’s mailbox using the SMTP AUTH client submission protocol.", + "displayName": "Send emails from mailboxes using SMTP AUTH.", + "id": "258f6531-6087-4cc4-bb90-092c5fb3ed3f", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to send emails on your behalf from your mailbox.", + "userConsentDisplayName": "Access to sending emails from your mailbox.", + "value": "SMTP.Send" + }, + { + "description": "Allows the app to read subject rights requests on behalf of the signed-in user", + "displayName": "Read subject rights requests", + "id": "9c3af74c-fd0f-4db4-b17a-71939e2a9d77", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read subject rights requests on your behalf.", + "userConsentDisplayName": "Read data subject requests", + "value": "SubjectRightsRequest.Read.All" + }, + { + "description": "Allows the app to read and write subject rights requests on behalf of the signed-in user", + "displayName": "Read and write subject rights requests", + "id": "2b8fcc74-bce1-4ae3-a0e8-60c53739299d", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write subject rights requests on your behalf.", + "userConsentDisplayName": "Read and write data subject requests", + "value": "SubjectRightsRequest.ReadWrite.All" + }, + { + "description": "Allows the app to read all webhook subscriptions on behalf of the signed-in user.", + "displayName": "Read all webhook subscriptions ", + "id": "5f88184c-80bb-4d52-9ff2-757288b2e9b7", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read all webhook subscriptions on your behalf.", + "userConsentDisplayName": "Read all webhook subscriptions ", + "value": "Subscription.Read.All" + }, + { + "description": "Allows the app to read Azure AD synchronization information, on behalf of the signed-in user.", + "displayName": "Read all Azure AD synchronization data", + "id": "7aa02aeb-824f-4fbe-a3f7-611f751f5b55", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read Azure AD synchronization information, on your behalf.", + "userConsentDisplayName": "Read all Azure AD synchronization data", + "value": "Synchronization.Read.All" + }, + { + "description": "Allows the app to configure the Azure AD synchronization service, on behalf of the signed-in user.", + "displayName": "Read and write all Azure AD synchronization data", + "id": "7bb27fa3-ea8f-4d67-a916-87715b6188bd", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to configure the Azure AD synchronization service, on your behalf.", + "userConsentDisplayName": "Read and write all Azure AD synchronization data", + "value": "Synchronization.ReadWrite.All" + }, + { + "description": "Allows the app to upload bulk user data to the identity synchronization service, on behalf of the signed-in user.", + "displayName": "Upload user data to the identity synchronization service", + "id": "1a2e7420-4e92-4d2b-94cb-fb2952e9ddf7", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to upload bulk user data to the identity synchronization service, on your behalf.", + "userConsentDisplayName": "Bulk upload user data to identity synchronization service", + "value": "SynchronizationData-User.Upload" + }, + { + "description": "Allows the app to read the signed-in user’s tasks and task lists, including any shared with the user. Doesn't include permission to create, delete, or update anything.", + "displayName": "Read user's tasks and task lists", + "id": "f45671fb-e0fe-4b4b-be20-3d3ce43f1bcb", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your tasks and task lists, including any shared with you. Doesn't include permission to create, delete, or update anything.", + "userConsentDisplayName": "Read your tasks and task lists", + "value": "Tasks.Read" + }, + { + "description": "Allows the app to read tasks a user has permissions to access, including their own and shared tasks.", + "displayName": "Read user and shared tasks", + "id": "88d21fd4-8e5a-4c32-b5e2-4a1c95f34f72", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read tasks you have permissions to access, including your own and shared tasks.", + "userConsentDisplayName": "Read your and shared tasks", + "value": "Tasks.Read.Shared" + }, + { + "description": "Allows the app to create, read, update, and delete the signed-in user's tasks and task lists, including any shared with the user.", + "displayName": "Create, read, update, and delete user’s tasks and task lists", + "id": "2219042f-cab5-40cc-b0d2-16b1540b4c5f", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to create, read, update, and delete your tasks and task lists, including any shared with you.", + "userConsentDisplayName": "Create, read, update, and delete your tasks and task lists", + "value": "Tasks.ReadWrite" + }, + { + "description": "Allows the app to create, read, update, and delete tasks a user has permissions to, including their own and shared tasks.", + "displayName": "Read and write user and shared tasks", + "id": "c5ddf11b-c114-4886-8558-8a4e557cd52b", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, update, create, and delete tasks you have permissions to access, including your own and shared tasks.", + "userConsentDisplayName": "Read and write to your and shared tasks", + "value": "Tasks.ReadWrite.Shared" + }, + { + "description": "Allows the app to create teams on behalf of the signed-in user.", + "displayName": "Create teams", + "id": "7825d5d6-6049-4ce7-bdf6-3b8d53f4bcd0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to create teams on your behalf. ", + "userConsentDisplayName": "Create teams", + "value": "Team.Create" + }, + { + "description": "Read the names and descriptions of teams, on behalf of the signed-in user.", + "displayName": "Read the names and descriptions of teams", + "id": "485be79e-c497-4b35-9400-0e3fa7f2a5d4", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Read the names and descriptions of teams, on your behalf.", + "userConsentDisplayName": "Read the names and descriptions of teams", + "value": "Team.ReadBasic.All" + }, + { + "description": "Read the members of teams, on behalf of the signed-in user.", + "displayName": "Read the members of teams", + "id": "2497278c-d82d-46a2-b1ce-39d4cdde5570", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Read the members of teams, on your behalf.", + "userConsentDisplayName": "Read the members of teams", + "value": "TeamMember.Read.All" + }, + { + "description": "Add and remove members from teams, on behalf of the signed-in user. Also allows changing a member's role, for example from owner to non-owner.", + "displayName": "Add and remove members from teams", + "id": "4a06efd2-f825-4e34-813e-82a57b03d1ee", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Add and remove members from teams, on your behalf. Also allows changing a member's role, for example from owner to non-owner.", + "userConsentDisplayName": "Add and remove members from teams and channels", + "value": "TeamMember.ReadWrite.All" + }, + { + "description": "Add and remove members from all teams, on behalf of the signed-in user. Does not allow adding or removing a member with the owner role. Additionally, does not allow the app to elevate an existing member to the owner role.", + "displayName": "Add and remove members with non-owner role for all teams", + "id": "2104a4db-3a2f-4ea0-9dba-143d457dc666", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Add and remove members from all teams, on your behalf. Does not allow adding or removing a member with the owner role. Additionally, does not allow the app to elevate an existing member to the owner role.", + "userConsentDisplayName": "Add and remove members with non-owner role for all teams", + "value": "TeamMember.ReadWriteNonOwnerRole.All" + }, + { + "description": "Allows the app to read the signed-in user's teamwork activity feed.", + "displayName": "Read user's teamwork activity feed", + "id": "0e755559-83fb-4b44-91d0-4cc721b9323e", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your teamwork activity feed.", + "userConsentDisplayName": "Read your teamwork activity feed", + "value": "TeamsActivity.Read" + }, + { + "description": "Allows the app to create new notifications in users' teamwork activity feeds on behalf of the signed in user. These notifications may not be discoverable or be held or governed by compliance policies.", + "displayName": "Send a teamwork activity as the user", + "id": "7ab1d787-bae7-4d5d-8db6-37ea32df9186", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to create new activities in your teamwork activity feed, and send new activities to other users' activity feed, on your behalf.", + "userConsentDisplayName": "Send a teamwork activity", + "value": "TeamsActivity.Send" + }, + { + "description": "Allows the app to read the Teams apps that are installed in chats the signed-in user can access. Does not give the ability to read application-specific settings.", + "displayName": "Read installed Teams apps in chats", + "id": "bf3fbf03-f35f-4e93-963e-47e4d874c37a", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the Teams apps that are installed in chats that you can access. Does not give the ability to read application-specific settings.", + "userConsentDisplayName": "Read installed Teams apps in chats", + "value": "TeamsAppInstallation.ReadForChat" + }, + { + "description": "Allows the app to read the Teams apps that are installed in teams the signed-in user can access. Does not give the ability to read application-specific settings.", + "displayName": "Read installed Teams apps in teams", + "id": "5248dcb1-f83b-4ec3-9f4d-a4428a961a72", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the Teams apps that are installed in teams that you can access. Does not give the ability to read application-specific settings.", + "userConsentDisplayName": "Read installed Teams apps in teams", + "value": "TeamsAppInstallation.ReadForTeam" + }, + { + "description": "Allows the app to read the Teams apps that are installed for the signed-in user. Does not give the ability to read application-specific settings.", + "displayName": "Read user's installed Teams apps", + "id": "c395395c-ff9a-4dba-bc1f-8372ba9dca84", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the Teams apps that are installed for you. Does not give the ability to read application-specific settings.", + "userConsentDisplayName": "Read your installed Teams apps", + "value": "TeamsAppInstallation.ReadForUser" + }, + { + "description": "Allows the app to read, install, upgrade, and uninstall Teams apps in chats the signed-in user can access. Gives the ability to manage permission grants for accessing those specific chats' data.", + "displayName": "Manage installed Teams apps in chats", + "id": "e1408a66-8f82-451b-a2f3-3c3e38f7413f", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, install, upgrade, and uninstall Teams apps in chats the signed-in user can access. Gives the ability to manage permission grants for accessing those specific chats' data.", + "userConsentDisplayName": "Manage installation and permission grants of Teams apps in chats", + "value": "TeamsAppInstallation.ReadWriteAndConsentForChat" + }, + { + "description": "Allows the app to read, install, upgrade, and uninstall Teams apps in teams the signed-in user can access. Gives the ability to manage permission grants for accessing those specific teams' data.", + "displayName": "Manage installed Teams apps in teams", + "id": "946349d5-2a9d-4535-abc0-7beeacaedd1d", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, install, upgrade, and uninstall Teams apps in teams the signed-in user can access. Gives the ability to manage permission grants for accessing those specific teams' data.", + "userConsentDisplayName": "Manage installation and permission grants of Teams apps in teams", + "value": "TeamsAppInstallation.ReadWriteAndConsentForTeam" + }, + { + "description": "Allows the app to read, install, upgrade, and uninstall Teams apps in user accounts, on behalf of the signed-in user. Gives the ability to manage permission grants for accessing those specific users' data.", + "displayName": "Manage installation and permission grants of Teams apps in users' personal scope", + "id": "2da62c49-dfbd-40df-ba16-fef3529d391c", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, install, upgrade, and uninstall Teams apps for your account, on your behalf. Gives the ability to manage permission grants for accessing your data.", + "userConsentDisplayName": "Manage installation and permission grants of Teams apps on your user account", + "value": "TeamsAppInstallation.ReadWriteAndConsentForUser" + }, + { + "description": "Allows a Teams app to read, install, upgrade, and uninstall itself in chats the signed-in user can access, and manage its permission grants for accessing those specific chats' data.", + "displayName": "Allow the Teams app to manage itself and its permission grants in chats", + "id": "a0e0e18b-8fb2-458f-8130-da2d7cab9c75", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows a Teams app to read, install, upgrade, and uninstall itself in chats the signed-in user can access, and manage its permission grants for accessing those specific chats' data.", + "userConsentDisplayName": "Allow the Teams app to manage itself and its permission grants in chats", + "value": "TeamsAppInstallation.ReadWriteAndConsentSelfForChat" + }, + { + "description": "Allows a Teams app to read, install, upgrade, and uninstall itself in teams the signed-in user can access, and manage its permission grants for accessing those specific teams' data.", + "displayName": "Allow the Teams app to manage itself and its permission grants in teams", + "id": "4a6bbf29-a0e1-4a4d-a7d1-cef17f772975", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows a Teams app to read, install, upgrade, and uninstall itself in teams the signed-in user can access, and manage its permission grants for accessing those specific teams' data.", + "userConsentDisplayName": "Allow the Teams app to manage itself and its permission grants in teams", + "value": "TeamsAppInstallation.ReadWriteAndConsentSelfForTeam" + }, + { + "description": "Allows a Teams app to read, install, upgrade, and uninstall itself in user accounts, and manage its permission grants for accessing those specific users' data, on behalf of the signed-in user.", + "displayName": "Allow the Teams app to manage itself and its permission grants in user accounts", + "id": "7a349935-c54d-44ab-ab66-1b460d315be7", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows a Teams app to read, install, upgrade, and uninstall itself in your account, and manage its permission grants for accessing your data, on your behalf.", + "userConsentDisplayName": "Allow the Teams app to manage itself and its permission grants on your user account", + "value": "TeamsAppInstallation.ReadWriteAndConsentSelfForUser" + }, + { + "description": "Allows the app to read, install, upgrade, and uninstall Teams apps in chats the signed-in user can access. Does not give the ability to read application-specific settings.", + "displayName": "Manage installed Teams apps in chats", + "id": "aa85bf13-d771-4d5d-a9e6-bca04ce44edf", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, install, upgrade, and uninstall Teams apps in chats you can access. Does not give the ability to read application-specific settings.", + "userConsentDisplayName": "Manage installed Teams apps in chats", + "value": "TeamsAppInstallation.ReadWriteForChat" + }, + { + "description": "Allows the app to read, install, upgrade, and uninstall Teams apps in teams the signed-in user can access. Does not give the ability to read application-specific settings.", + "displayName": "Manage installed Teams apps in teams", + "id": "2e25a044-2580-450d-8859-42eeb6e996c0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, install, upgrade, and uninstall Teams apps in teams you can access. Does not give the ability to read application-specific settings.", + "userConsentDisplayName": "Manage installed Teams apps in teams", + "value": "TeamsAppInstallation.ReadWriteForTeam" + }, + { + "description": "Allows the app to read, install, upgrade, and uninstall Teams apps installed for the signed-in user. Does not give the ability to read application-specific settings.", + "displayName": "Manage user's installed Teams apps", + "id": "093f8818-d05f-49b8-95bc-9d2a73e9a43c", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, install, upgrade, and uninstall Teams apps installed for you. Does not give the ability to read application-specific settings.", + "userConsentDisplayName": "Manage your installed Teams apps", + "value": "TeamsAppInstallation.ReadWriteForUser" + }, + { + "description": "Allows a Teams app to read, install, upgrade, and uninstall itself in chats the signed-in user can access.", + "displayName": "Allow the Teams app to manage itself in chats", + "id": "0ce33576-30e8-43b7-99e5-62f8569a4002", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows a Teams app to read, install, upgrade, and uninstall itself in chats you can access.", + "userConsentDisplayName": "Allow the Teams app to manage itself in chats", + "value": "TeamsAppInstallation.ReadWriteSelfForChat" + }, + { + "description": "Allows a Teams app to read, install, upgrade, and uninstall itself to teams the signed-in user can access.", + "displayName": "Allow the app to manage itself in teams", + "id": "0f4595f7-64b1-4e13-81bc-11a249df07a9", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows a Teams app to read, install, upgrade, and uninstall itself to teams you can access.", + "userConsentDisplayName": "Allow the Teams app to manage itself in teams", + "value": "TeamsAppInstallation.ReadWriteSelfForTeam" + }, + { + "description": "Allows a Teams app to read, install, upgrade, and uninstall itself for the signed-in user.", + "displayName": "Allow the Teams app to manage itself for a user", + "id": "207e0cb1-3ce7-4922-b991-5a760c346ebc", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows a Teams app to read, install, upgrade, and uninstall itself for you.", + "userConsentDisplayName": "Allow the Teams app to manage itself for you", + "value": "TeamsAppInstallation.ReadWriteSelfForUser" + }, + { + "description": "Read all teams' settings, on behalf of the signed-in user.", + "displayName": "Read teams' settings", + "id": "48638b3c-ad68-4383-8ac4-e6880ee6ca57", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Read all teams' settings, on your behalf.", + "userConsentDisplayName": "Read teams' settings", + "value": "TeamSettings.Read.All" + }, + { + "description": "Read and change all teams' settings, on behalf of the signed-in user.", + "displayName": "Read and change teams' settings", + "id": "39d65650-9d3e-4223-80db-a335590d027e", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Read and change all teams' settings, on your behalf.", + "userConsentDisplayName": "Read and change teams' settings", + "value": "TeamSettings.ReadWrite.All" + }, + { + "description": "Allows the app to create tabs in any team in Microsoft Teams, on behalf of the signed-in user. This does not grant the ability to read, modify or delete tabs after they are created, or give access to the content inside the tabs.", + "displayName": "Create tabs in Microsoft Teams.", + "id": "a9ff19c2-f369-4a95-9a25-ba9d460efc8e", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to create tabs in any team in Microsoft Teams, on your behalf. This does not grant the ability to read, modify or delete tabs after they are created, or give access to the content inside the tabs.", + "userConsentDisplayName": "Create tabs in Microsoft Teams.", + "value": "TeamsTab.Create" + }, + { + "description": "Read the names and settings of tabs inside any team in Microsoft Teams, on behalf of the signed-in user. This does not give access to the content inside the tabs.", + "displayName": "Read tabs in Microsoft Teams.", + "id": "59dacb05-e88d-4c13-a684-59f1afc8cc98", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Read the names and settings of tabs inside any team in Microsoft Teams, on your behalf. This does not give access to the content inside the tabs.", + "userConsentDisplayName": "Read tabs in Microsoft Teams.", + "value": "TeamsTab.Read.All" + }, + { + "description": "Read and write tabs in any team in Microsoft Teams, on behalf of the signed-in user. This does not give access to the content inside the tabs.", + "displayName": "Read and write tabs in Microsoft Teams.", + "id": "b98bfd41-87c6-45cc-b104-e2de4f0dafb9", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Read and write tabs in any team in Microsoft Teams, on your behalf. This does not give access to the content inside the tabs.", + "userConsentDisplayName": "Read and write tabs in Microsoft Teams.", + "value": "TeamsTab.ReadWrite.All" + }, + { + "description": "Allows a Teams app to read, install, upgrade, and uninstall all tabs in chats the signed-in user can access.", + "displayName": "Allow the Teams app to manage all tabs in chats", + "id": "ee928332-e9c2-4747-b4a0-f8c164b68de6", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows a Teams app to read, install, upgrade, and uninstall all tabs in chats you can access.", + "userConsentDisplayName": "Allow the Teams app to manage all tabs in chats", + "value": "TeamsTab.ReadWriteForChat" + }, + { + "description": "Allows a Teams app to read, install, upgrade, and uninstall all tabs to teams the signed-in user can access.", + "displayName": "Allow the Teams app to manage all tabs in teams", + "id": "c975dd04-a06e-4fbb-9704-62daad77bb49", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows a Teams app to read, install, upgrade, and uninstall all tabs to teams you can access.", + "userConsentDisplayName": "Allow the app to manage all tabs in teams", + "value": "TeamsTab.ReadWriteForTeam" + }, + { + "description": "Allows a Teams app to read, install, upgrade, and uninstall all tabs for the signed-in user.", + "displayName": "Allow the Teams app to manage all tabs for a user", + "id": "c37c9b61-7762-4bff-a156-afc0005847a0", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows a Teams app to read, install, upgrade, and uninstall all tabs for you.", + "userConsentDisplayName": "Allow the Teams app to manage all tabs for you", + "value": "TeamsTab.ReadWriteForUser" + }, + { + "description": "Allows a Teams app to read, install, upgrade, and uninstall its own tabs in chats the signed-in user can access.", + "displayName": "Allow the Teams app to manage only its own tabs in chats", + "id": "0c219d04-3abf-47f7-912d-5cca239e90e6", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows a Teams app to read, install, upgrade, and uninstall its own tabs in chats you can access.", + "userConsentDisplayName": "Allow the Teams app to manage only its own tabs in chats", + "value": "TeamsTab.ReadWriteSelfForChat" + }, + { + "description": "Allows a Teams app to read, install, upgrade, and uninstall its own tabs to teams the signed-in user can access.", + "displayName": "Allow the Teams app to manage only its own tabs in teams", + "id": "f266662f-120a-4314-b26a-99b08617c7ef", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows a Teams app to read, install, upgrade, and uninstall its own tabs to teams you can access.", + "userConsentDisplayName": "Allow the Teams app to manage only its own tabs in teams", + "value": "TeamsTab.ReadWriteSelfForTeam" + }, + { + "description": "Allows a Teams app to read, install, upgrade, and uninstall its own tabs for the signed-in user.", + "displayName": "Allow the Teams app to manage only its own tabs for a user", + "id": "395dfec1-a0b9-465f-a783-8250a430cb8c", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows a Teams app to read, install, upgrade, and uninstall its own tabs for you.", + "userConsentDisplayName": "Allow the Teams app to manage only its own tabs for you", + "value": "TeamsTab.ReadWriteSelfForUser" + }, + { + "description": "Allows the app to read the available Teams templates, on behalf of the signed-in user.", + "displayName": "Read available Teams templates", + "id": "cd87405c-5792-4f15-92f7-debc0db6d1d6", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Read available Teams templates, on your behalf.", + "userConsentDisplayName": "Read available Teams templates", + "value": "TeamTemplates.Read" + }, + { + "description": "Allows the app to read the Teams app settings on behalf of the signed-in user.", + "displayName": "Read Teams app settings", + "id": "44e060c4-bbdc-4256-a0b9-dcc0396db368", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the Teams app settings on your behalf.", + "userConsentDisplayName": "Read Teams app settings", + "value": "TeamworkAppSettings.Read.All" + }, + { + "description": "Allows the app to read and write the Teams app settings on behalf of the signed-in user.", + "displayName": "Read and write Teams app settings", + "id": "87c556f0-2bd9-4eed-bd74-5dd8af6eaf7e", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write the Teams app settings on your behalf.", + "userConsentDisplayName": "Read and write Teams app settings", + "value": "TeamworkAppSettings.ReadWrite.All" + }, + { + "description": "Allow the app to read the management data for Teams devices on behalf of the signed-in user.", + "displayName": "Read Teams devices", + "id": "b659488b-9d28-4208-b2be-1c6652b3c970", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allow the app to read the management data for Teams devices on your behalf.", + "userConsentDisplayName": "Read Teams devices", + "value": "TeamworkDevice.Read.All" + }, + { + "description": "Allow the app to read and write the management data for Teams devices on behalf of the signed-in user.", + "displayName": "Read and write Teams devices", + "id": "ddd97ecb-5c31-43db-a235-0ee20e635c40", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allow the app to read and write the management data for Teams devices on your behalf.", + "userConsentDisplayName": "Read and write Teams devices", + "value": "TeamworkDevice.ReadWrite.All" + }, + { + "description": "Allows the app to read tags in Teams, on behalf of the signed-in user.", + "displayName": "Read tags in Teams", + "id": "57587d0b-8399-45be-b207-8050cec54575", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read tags in Teams, on your behalf.", + "userConsentDisplayName": "Read tags in Teams", + "value": "TeamworkTag.Read" + }, + { + "description": "Allows the app to read and write tags in Teams, on behalf of the signed-in user.", + "displayName": "Read and write tags in Teams", + "id": "539dabd7-b5b6-4117-b164-d60cd15a8671", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write tags in Teams, on your behalf.", + "userConsentDisplayName": "Read and write tags in Teams", + "value": "TeamworkTag.ReadWrite" + }, + { + "description": "Allows the app to read the term store data that the signed-in user has access to. This includes all sets, groups and terms in the term store.", + "displayName": "Read term store data", + "id": "297f747b-0005-475b-8fef-c890f5152b38", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the term store data that you have access to. This includes all sets, groups and terms in the term store.", + "userConsentDisplayName": "Read term store data", + "value": "TermStore.Read.All" + }, + { + "description": "Allows the app to read or modify data that the signed-in user has access to. This includes all sets, groups and terms in the term store.", + "displayName": "Read and write term store data", + "id": "6c37c71d-f50f-4bff-8fd3-8a41da390140", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read or modify data that you have access to. This includes all sets, groups and terms in the term store.", + "userConsentDisplayName": "Read and write term store data", + "value": "TermStore.ReadWrite.All" + }, + { + "description": "Allows an app to read your organization's threat assessment requests on behalf of the signed-in user. Also allows the app to create new requests to assess threats received by your organization on behalf of the signed-in user.", + "displayName": "Read and write threat assessment requests", + "id": "cac97e40-6730-457d-ad8d-4852fddab7ad", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows an app to read your organization's threat assessment requests on your behalf. Also allows the app to create new requests to assess threats received by your organization on your behalf.", + "userConsentDisplayName": "Read and write threat assessment requests", + "value": "ThreatAssessment.ReadWrite.All" + }, + { + "description": "Allows the app to run hunting queries, on behalf of the signed-in user.", + "displayName": "Run hunting queries", + "id": "b152eca8-ea73-4a48-8c98-1a6742673d99", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to run hunting queries that you can execute.", + "userConsentDisplayName": "Run hunting queries", + "value": "ThreatHunting.Read.All" + }, + { + "description": "Allows the app to read all the indicators for your organization, on behalf of the signed-in user.", + "displayName": "Read all threat indicators", + "id": "9cc427b4-2004-41c5-aa22-757b755e9796", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read all the indicators for your organization, on your behalf.", + "userConsentDisplayName": "Read all threat indicators", + "value": "ThreatIndicators.Read.All" + }, + { + "description": "Allows the app to create threat indicators, and fully manage those threat indicators (read, update and delete), on behalf of the signed-in user.  It cannot update any threat indicators it does not own.", + "displayName": "Manage threat indicators this app creates or owns", + "id": "91e7d36d-022a-490f-a748-f8e011357b42", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to create threat indicators, and fully manage those threat indicators (read, update and delete), on your behalf.  It cannot update any threat indicators that it is not an owner of.", + "userConsentDisplayName": "Manage threat indicators this app creates or owns", + "value": "ThreatIndicators.ReadWrite.OwnedBy" + }, + { + "description": "Allows the app to read threat intelligence information, such as indicators, observations, and articles, on behalf of the signed-in user.", + "displayName": "Read all threat intelligence information", + "id": "f266d9c0-ccb9-4fb8-a228-01ac0d8d6627", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read threat intelligence information, such as indicators, observations, and articles, on your behalf.", + "userConsentDisplayName": "Read threat intelligence Information", + "value": "ThreatIntelligence.Read.All" + }, + { + "description": "Allows the app to read the threat submissions and threat submission policies owned by the signed-in user.", + "displayName": "Read threat submissions", + "id": "fd5353c6-26dd-449f-a565-c4e16b9fce78", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the threat submissions and threat submission policies that you own on your behalf.", + "userConsentDisplayName": "Read threat submissions", + "value": "ThreatSubmission.Read" + }, + { + "description": "Allows the app to read your organization's threat submissions and threat submission policies on behalf of the signed-in user.", + "displayName": "Read all threat submissions", + "id": "7083913a-4966-44b6-9886-c5822a5fd910", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your organization's threat submissions and threat submission policies on your behalf.", + "userConsentDisplayName": "Read all threat submissions", + "value": "ThreatSubmission.Read.All" + }, + { + "description": "Allows the app to read the threat submissions and threat submission policies owned by the signed-in user. Also allows the app to create new threat submissions on behalf of the signed-in user.", + "displayName": "Read and write threat submissions", + "id": "68a3156e-46c9-443c-b85c-921397f082b5", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the threat submissions and threat submission policies that you own. Also allows the app to create new threat submissions on your behalf.", + "userConsentDisplayName": "Read and write threat submissions", + "value": "ThreatSubmission.ReadWrite" + }, + { + "description": "Allows the app to read your organization's threat submissions and threat submission policies on behalf of the signed-in user. Also allows the app to create new threat submissions on behalf of the signed-in user.", + "displayName": "Read and write all threat submissions", + "id": "8458e264-4eb9-4922-abe9-768d58f13c7f", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your organization's threat submissions and threat submission policies on your behalf. Also allows the app to create new threat submissions on your behalf.", + "userConsentDisplayName": "Read and write all threat submissions", + "value": "ThreatSubmission.ReadWrite.All" + }, + { + "description": "Allows the app to read your organization's threat submission policies on behalf of the signed-in user. Also allows the app to create new threat submission policies on behalf of the signed-in user.", + "displayName": "Read and write all threat submission policies", + "id": "059e5840-5353-4c68-b1da-666a033fc5e8", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your organization's threat submission policies on your behalf. Also allows the app to create new threat submission policies on your behalf.", + "userConsentDisplayName": "Read and write all threat submission policies", + "value": "ThreatSubmissionPolicy.ReadWrite.All" + }, + { + "description": "Allows the app to read trust framework key set properties on behalf of the signed-in user.", + "displayName": "Read trust framework key sets", + "id": "7ad34336-f5b1-44ce-8682-31d7dfcd9ab9", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read trust framework key sets, on your behalf.", + "userConsentDisplayName": "Read trust framework key sets", + "value": "TrustFrameworkKeySet.Read.All" + }, + { + "description": "Allows the app to read and write trust framework key set properties on behalf of the signed-in user.", + "displayName": "Read and write trust framework key sets", + "id": "39244520-1e7d-4b4a-aee0-57c65826e427", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read or write trust framework key sets, on your behalf.", + "userConsentDisplayName": "Read and write trust framework key sets", + "value": "TrustFrameworkKeySet.ReadWrite.All" + }, + { + "description": "Allows the app to read basic unified group properties, memberships and owners of the group the signed-in guest is a member of.", + "displayName": "Read unified group memberships as guest", + "id": "73e75199-7c3e-41bb-9357-167164dbb415", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read basic unified group properties, memberships and owners of the group you are a member of.", + "userConsentDisplayName": "Read unified group memberships as guest", + "value": "UnifiedGroupMember.Read.AsGuest" + }, + { + "description": "Allows the app to read the lifecycle information like employeeLeaveDateTime of users in your organization, on behalf of the signed-in user.", + "displayName": "Read all users' lifecycle information", + "id": "ed8d2a04-0374-41f1-aefe-da8ac87ccc87", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the lifecycle information like employeeLeaveDateTime of users in your organization, on behalf of the signed-in user.", + "userConsentDisplayName": "Read all users' lifecycle information", + "value": "User-LifeCycleInfo.Read.All" + }, + { + "description": "Allows the app to read and write the lifecycle information like employeeLeaveDateTime of users in your organization, on behalf of the signed-in user.", + "displayName": "Read and write all users' lifecycle information", + "id": "7ee7473e-bd4b-4c9f-987c-bd58481f5fa2", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write the lifecycle information like employeeLeaveDateTime of users in your organization, on behalf of the signed-in user.", + "userConsentDisplayName": "Read and write all users' lifecycle information", + "value": "User-LifeCycleInfo.ReadWrite.All" + }, + { + "description": "Allows the app to enable and disable users' accounts, on behalf of the signed-in user.", + "displayName": "Enable and disable user accounts", + "id": "f92e74e7-2563-467f-9dd0-902688cb5863", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to enable and disable users' accounts, on your behalf.", + "userConsentDisplayName": "Enable and disable user accounts", + "value": "User.EnableDisableAccount.All" + }, + { + "description": "Allows the app to export data (e.g. customer content or system-generated logs), associated with any user in your company, when the app is used by a privileged user (e.g. a Company Administrator).", + "displayName": "Export user's data", + "id": "405a51b5-8d8d-430b-9842-8be4b0e9f324", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to export data (e.g. customer content or system-generated logs), associated with any user in your company, when the app is used by a privileged user (e.g. a Company Administrator).", + "userConsentDisplayName": "Export user's data", + "value": "User.Export.All" + }, + { + "description": "Allows the app to invite guest users to the organization, on behalf of the signed-in user.", + "displayName": "Invite guest users to the organization", + "id": "63dd7cd9-b489-4adf-a28c-ac38b9a0f962", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to invite guest users to the organization, on your behalf.", + "userConsentDisplayName": "Invite guest users to the organization", + "value": "User.Invite.All" + }, + { + "description": "Allows the app to read, update and delete identities that are associated with a user's account that the signed-in user has access to. This controls the identities users can sign-in with.", + "displayName": "Manage user identities", + "id": "637d7bec-b31e-4deb-acc9-24275642a2c9", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read, update and delete identities that are associated with a user's account that you have access to. This controls the identities users can sign-in with.", + "userConsentDisplayName": "Manage user identities", + "value": "User.ManageIdentities.All" + }, + { + "description": "Allows users to sign-in to the app, and allows the app to read the profile of signed-in users. It also allows the app to read basic company information of signed-in users.", + "displayName": "Sign in and read user profile", + "id": "e1fe6dd8-ba31-4d61-89e7-88639da4683d", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows you to sign in to the app with your organizational account and let the app read your profile. It also allows the app to read basic company information.", + "userConsentDisplayName": "Sign you in and read your profile", + "value": "User.Read" + }, + { + "description": "Allows the app to read the full set of profile properties, reports, and managers of other users in your organization, on behalf of the signed-in user.", + "displayName": "Read all users' full profiles", + "id": "a154be20-db9c-4678-8ab7-66f6cc099a59", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read the full set of profile properties, reports, and managers of other users in your organization, on your behalf.", + "userConsentDisplayName": "Read all users' full profiles", + "value": "User.Read.All" + }, + { + "description": "Allows the app to read a basic set of profile properties of other users in your organization on behalf of the signed-in user. This includes display name, first and last name, email address and photo.", + "displayName": "Read all users' basic profiles", + "id": "b340eb25-3456-403f-be2f-af7a0d370277", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read a basic set of profile properties of other users in your organization on your behalf. Includes display name, first and last name, email address and photo.", + "userConsentDisplayName": "Read all users' basic profiles", + "value": "User.ReadBasic.All" + }, + { + "description": "Allows the app to read your profile. It also allows the app to update your profile information on your behalf.", + "displayName": "Read and write access to user profile", + "id": "b4e74841-8e56-480b-be8b-910348b18b4c", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your profile, and discover your group membership, reports and manager. It also allows the app to update your profile information on your behalf.", + "userConsentDisplayName": "Read and update your profile", + "value": "User.ReadWrite" + }, + { + "description": "Allows the app to read and write the full set of profile properties, reports, and managers of other users in your organization, on behalf of the signed-in user.", + "displayName": "Read and write all users' full profiles", + "id": "204e0828-b5ca-4ad8-b9f3-f32a958e7cc4", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write the full set of profile properties, reports, and managers of other users in your organization, on your behalf.", + "userConsentDisplayName": "Read and write all users' full profiles", + "value": "User.ReadWrite.All" + }, + { + "description": "Allows the app to read and report the signed-in user's activity in the app.", + "displayName": "Read and write app activity to users' activity feed", + "id": "47607519-5fb1-47d9-99c7-da4b48f369b1", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and report your activity in the app.", + "userConsentDisplayName": "Read and write app activity to your activity feed", + "value": "UserActivity.ReadWrite.CreatedByApp" + }, + { + "description": "Allows the app to read the signed-in user's authentication methods, including phone numbers and Authenticator app settings. This does not allow the app to see secret information like the signed-in user's passwords, or to sign-in or otherwise use the signed-in user's authentication methods.", + "displayName": "Read user authentication methods.", + "id": "1f6b61c5-2f65-4135-9c9f-31c0f8d32b52", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read your authentication methods, including phone numbers and Authenticator app settings. This does not allow the app to see secret information like your passwords, or to sign-in or otherwise use your authentication methods.", + "userConsentDisplayName": "Read your authentication methods.", + "value": "UserAuthenticationMethod.Read" + }, + { + "description": "Allows the app to read authentication methods of all users in your organization that the signed-in user has access to. Authentication methods include things like a user’s phone numbers and Authenticator app settings. This does not allow the app to see secret information like passwords, or to sign-in or otherwise use the authentication methods.", + "displayName": "Read all users' authentication methods", + "id": "aec28ec7-4d02-4e8c-b864-50163aea77eb", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read authentication methods of all users you have access to in your organization. Authentication methods include things like a user’s phone numbers and Authenticator app settings. This does not allow the app to see secret information like passwords, or to sign-in or otherwise use the authentication methods.", + "userConsentDisplayName": "Read all users' authentication methods", + "value": "UserAuthenticationMethod.Read.All" + }, + { + "description": "Allows the app to read and write the signed-in user's authentication methods, including phone numbers and Authenticator app settings. This does not allow the app to see secret information like the signed-in user's passwords, or to sign-in or otherwise use the signed-in user's authentication methods. ", + "displayName": "Read and write user authentication methods", + "id": "48971fc1-70d7-4245-af77-0beb29b53ee2", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write your authentication methods, including phone numbers and Authenticator app settings.This does not allow the app to see secret information like your passwords, or to sign-in or otherwise use your authentication methods.", + "userConsentDisplayName": "Read and write your authentication methods", + "value": "UserAuthenticationMethod.ReadWrite" + }, + { + "description": " Allows the app to read and write authentication methods of all users in your organization that the signed-in user has access to. Authentication methods include things like a user’s phone numbers and Authenticator app settings. This does not allow the app to see secret information like passwords, or to sign-in or otherwise use the authentication methods.", + "displayName": "Read and write all users' authentication methods.", + "id": "b7887744-6746-4312-813d-72daeaee7e2d", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write authentication methods of all users you have access to in your organization. Authentication methods include things like a user’s phone numbers and Authenticator app settings. This does not allow the app to see secret information like passwords, or to sign-in or otherwise use the authentication methods.", + "userConsentDisplayName": "Read and write all users' authentication methods", + "value": "UserAuthenticationMethod.ReadWrite.All" + }, + { + "description": "Allows the app to send, read, update and delete user’s notifications.", + "displayName": "Deliver and manage user's notifications", + "id": "26e2f3e8-b2a1-47fc-9620-89bb5b042024", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to send, read, update and delete your app-specific notifications.", + "userConsentDisplayName": "Deliver and manage your notifications", + "value": "UserNotification.ReadWrite.CreatedByApp" + }, + { + "description": "Allows the app to report the signed-in user's app activity information to Microsoft Timeline.", + "displayName": "Write app activity to users' timeline", + "id": "367492fc-594d-4972-a9b5-0d58c622c91c", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to report your app activity information to Microsoft Timeline.", + "userConsentDisplayName": "Write app activity to your timeline", + "value": "UserTimelineActivity.Write.CreatedByApp" + }, + { + "description": "Allows an application to read virtual appointments for the signed-in user. Only an organizer or participant user can read their virtual appointments.  ", + "displayName": "Read a user's virtual appointments", + "id": "27470298-d3b8-4b9c-aad4-6334312a3eac", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read virtual appointments on your behalf.  ", + "userConsentDisplayName": "Read your virtual appointments ", + "value": "VirtualAppointment.Read" + }, + { + "description": "Allows an application to read and write virtual appointments for the signed-in user. Only an organizer or participant user can read and write their virtual appointments. ", + "displayName": "Read and write a user's virtual appointments  ", + "id": "2ccc2926-a528-4b17-b8bb-860eed29d64c", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write virtual appointments on your behalf.  ", + "userConsentDisplayName": "Read and write your virtual appointments", + "value": "VirtualAppointment.ReadWrite" + }, + { + "description": "Allows the app to read virtual events created by the you", + "displayName": "Read your virtual events", + "id": "6b616635-ae58-433a-a918-8c45e4f304dc", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read virtual events created by the you", + "userConsentDisplayName": "Read your virtual events", + "value": "VirtualEvent.Read" + }, + { + "description": "Allows the app to read and write all Windows update deployment settings for the organization on behalf of the signed-in user.", + "displayName": "Read and write all Windows update deployment settings", + "id": "11776c0c-6138-4db3-a668-ee621bea2555", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read and write all Windows update deployment settings for the organization on your behalf.", + "userConsentDisplayName": "Read and write all Windows update deployment settings", + "value": "WindowsUpdates.ReadWrite.All" + }, + { + "description": "Allows the app to read workforce integrations, to synchronize data from Microsoft Teams Shifts, on behalf of the signed-in user.", + "displayName": "Read workforce integrations", + "id": "f1ccd5a7-6383-466a-8db8-1a656f7d06fa", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to read workforce integrations, to synchronize data from Microsoft Teams Shifts, on your behalf.", + "userConsentDisplayName": "Read workforce integrations", + "value": "WorkforceIntegration.Read.All" + }, + { + "description": "Allows the app to manage workforce integrations, to synchronize data from Microsoft Teams Shifts, on behalf of the signed-in user.", + "displayName": "Read and write workforce integrations", + "id": "08c4b377-0d23-4a8b-be2a-23c1c1d88545", + "isEnabled": true, + "origin": "Delegated", + "userConsentDescription": "Allows the app to manage workforce integrations, to synchronize data from Microsoft Teams Shifts, on your behalf.", + "userConsentDisplayName": "Read and write workforce integrations", + "value": "WorkforceIntegration.ReadWrite.All" + } +] diff --git a/src/views/cipp/AppApproval.js b/src/views/cipp/AppApproval.js index 66d88991a92b..0f420ea6c78e 100644 --- a/src/views/cipp/AppApproval.js +++ b/src/views/cipp/AppApproval.js @@ -1,204 +1,211 @@ -import React, { useEffect, useState } from 'react' -import { - CButton, - CCard, - CCardBody, - CCardHeader, - CCardTitle, - CCol, - CCollapse, - CForm, - CRow, -} from '@coreui/react' -import useQuery from 'src/hooks/useQuery' -import { Field, Form, FormSpy } from 'react-final-form' -import { RFFCFormInput, RFFCFormSelect } from 'src/components/forms' +import React from 'react' +import { CCol, CRow, CCallout, CSpinner } from '@coreui/react' +import { Field, FormSpy } from 'react-final-form' import { FontAwesomeIcon } from '@fortawesome/react-fontawesome' -import { faChevronRight, faChevronDown, faSearch, faCog } from '@fortawesome/free-solid-svg-icons' -import { CellTip, CippTable } from 'src/components/tables' -import { useSelector } from 'react-redux' -import { useNavigate } from 'react-router-dom' -import { CippPage } from 'src/components/layout/CippPage' -import { useLazyGenericGetRequestQuery } from 'src/store/api/app' -import { OnChange } from 'react-final-form-listeners' - -const GraphExplorer = () => { - let navigate = useNavigate() - const tenant = useSelector((state) => state.app.currentTenant) - let query = useQuery() - const applicationid = query.get('applicationid') - const SearchNow = query.get('SearchNow') - const [visibleA, setVisibleA] = useState(true) - const handleSubmit = async (values) => { - setVisibleA(false) - Object.keys(values).filter(function (x) { - if (values[x] === null) { - delete values[x] - } - return null - }) - const shippedValues = { - tenantFilter: tenant.defaultDomainName, - SearchNow: true, - ...values, +import { faExclamationTriangle } from '@fortawesome/free-solid-svg-icons' +import { CippWizard } from 'src/components/layout' +import { CippTable, WizardTableField } from 'src/components/tables' +import PropTypes from 'prop-types' +import { + Condition, + RFFCFormCheck, + RFFCFormInput, + RFFCFormSwitch, + RFFSelectSearch, +} from 'src/components/forms' +import { useLazyGenericPostRequestQuery } from 'src/store/api/app' +const Error = ({ name }) => ( + + touched && error ? ( + + + {error} + + ) : null } - var queryString = Object.keys(shippedValues) - .map((key) => key + '=' + shippedValues[key]) - .join('&') + /> +) - navigate(`?${queryString}`) - } - const [execGraphRequest, graphrequest] = useLazyGenericGetRequestQuery() +Error.propTypes = { + name: PropTypes.string.isRequired, +} - const columns = [ - { - name: 'Default Domain', - selector: (row) => row['defaultDomainName'], - sortable: true, - cell: (row) => CellTip(row['defaultDomainName']), - exportSelector: 'defaultDomainName', - minWidth: '200px', - }, - { - name: 'Approval link', - selector: (row) => row['link'], - center: true, - cell: (row) => ( - - - - ), - }, - ] +const requiredArray = (value) => (value && value.length !== 0 ? undefined : 'Required') +const AppApproval = () => { + const [genericPostRequest, postResults] = useLazyGenericPostRequestQuery() - if (graphrequest.isSuccess) { - if (graphrequest.data.length === 0) { - graphrequest.data = [{ data: 'No Data Found' }] - } + const handleSubmit = async (values) => { + genericPostRequest({ path: '/api/ExecAddMultiTenantApp', values: values }) } - useEffect(() => { - execGraphRequest({ - path: 'api/execAppApproval', - params: { applicationid }, - }) - }, [applicationid, execGraphRequest, tenant.defaultDomainName]) - - const WhenFieldChanges = ({ field, set }) => ( - - {( - // No subscription. We only use Field to get to the change function - { input: { onChange } }, - ) => ( - - {({ form }) => ( - - {(value) => { - let template = value - onChange(template) - }} - - )} - - )} - - ) + const formValues = { + TemplateType: 'Admin', + } return ( - <> - - - - - - Approval Settings - setVisibleA(!visibleA)} - > - - - - - - - - - - { - return ( - - - -

    - This tool helps you to retrieve the approval links required for each - tenant. This is required to use 'Application Permissions' within these - tenants when GDAP is deployed. -

    -

    - The approval URL might lead to an error page with the error "Admin - Role not found" or not load any page at all after clicking confirm - - This is expected behavior. -

    -
    -
    - - - - - - - - - - - Query - - - -
    - ) - }} + + +
    +

    Step 1

    +
    Choose tenants
    +
    +
    + + {(props) => ( + row['displayName'], + sortable: true, + exportselector: 'displayName', + }, + { + name: 'Default Domain Name', + selector: (row) => row['defaultDomainName'], + sortable: true, + exportselector: 'mail', + }, + ]} + fieldProps={props} + /> + )} + + +
    +
    + +
    +

    Step 2

    +
    Enter the information for this application
    +
    +
    + + + + + + + + + + + + + + + {(props) => ( + row['displayName'], + sortable: true, + exportselector: 'displayName', + }, + { + name: 'Value', + selector: (row) => row['value'], + sortable: true, + exportselector: 'value', + }, + { + name: 'Type', + selector: (row) => row['origin'], + sortable: true, + exportselector: 'origin', + }, + ]} + fieldProps={props} /> -
    -
    -
    -
    -
    -
    - - {!SearchNow && Execute a search to get started.} - {graphrequest.isSuccess && SearchNow && ( - - - Results - - - - - + )} +
    + + +
    +
    + +
    +

    Step 3

    +
    Confirm and apply
    +
    +
    + {!postResults.isSuccess && ( + + {(props) => { + return ( + <> + + + +
    Selected Tenants
    + + {props.values.selectedTenants.map((tenant, idx) => ( +
  • + {tenant.displayName}- {tenant.defaultDomainName} +
  • + ))} +
    +
    Application ID
    + {props.values.AppId} +
    Copy Permissions
    + + {props.values.CopyPermissions ? ( + Yes + ) : ( + No + )} + +
    Selected Permissions
    + + {props.values.permissions.map((tenant, idx) => ( +
  • + {tenant.displayName} - {tenant.origin} +
  • + ))} +
    +
    +
    + + ) + }} +
    + )} + {postResults.isFetching && ( + + Loading + + )} + {postResults.isSuccess && ( + + {postResults.data.Results.map((message, idx) => { + return
  • {message}
  • + })} +
    )} - - +
    +
    + ) } -export default GraphExplorer +export default AppApproval From 02f8b66b1e6a8bac9173d14835214fc123fbf68b Mon Sep 17 00:00:00 2001 From: John Duprey Date: Mon, 9 Oct 2023 21:27:06 -0400 Subject: [PATCH 102/158] CippDatatable.js - Add metadata/results support --- src/components/tables/CippDatatable.js | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/components/tables/CippDatatable.js b/src/components/tables/CippDatatable.js index e36befb3dea3..188c44542c82 100644 --- a/src/components/tables/CippDatatable.js +++ b/src/components/tables/CippDatatable.js @@ -20,10 +20,10 @@ export default function CippDatatable({ path, params, ...rest }) { } return ( <> - {data[0]?.Queued && {data[0]?.QueueMessage}} + {data?.Metadata?.Queued && {data?.Metadata?.QueueMessage}} Date: Mon, 9 Oct 2023 21:29:58 -0400 Subject: [PATCH 103/158] Update Home.js --- src/views/home/Home.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/views/home/Home.js b/src/views/home/Home.js index 1473119811aa..c802805552af 100644 --- a/src/views/home/Home.js +++ b/src/views/home/Home.js @@ -333,7 +333,7 @@ const Home = () => { {(isLoadingPartners || isFetchingPartners) && } {issuccessPartners && !isFetchingPartners && - partners.map((partner) => { + partners?.Results.map((partner) => { if (partner.TenantInfo) { return (
  • From 45a00aed7f04fa7606c60f0e961f6ab84a9f2235 Mon Sep 17 00:00:00 2001 From: John Duprey Date: Tue, 10 Oct 2023 07:16:02 -0400 Subject: [PATCH 104/158] Add switch parameter types --- src/views/cipp/Scheduler.js | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/src/views/cipp/Scheduler.js b/src/views/cipp/Scheduler.js index 8483c2c477b2..cdd8ed9474ef 100644 --- a/src/views/cipp/Scheduler.js +++ b/src/views/cipp/Scheduler.js @@ -283,7 +283,9 @@ const Scheduler = () => { paramblock = parameters.map((param, idx) => ( - {param.Type === 'System.Boolean' ? ( + {param.Type === 'System.Boolean' || + param.Type === + 'System.Management.Automation.SwitchParameter' ? ( <> Date: Tue, 10 Oct 2023 18:18:20 +0200 Subject: [PATCH 105/158] app approval and time --- src/views/cipp/AppApproval.js | 7 +++---- .../tenant/standards/ListAppliedStandards.js | 20 +++++++++++++++---- 2 files changed, 19 insertions(+), 8 deletions(-) diff --git a/src/views/cipp/AppApproval.js b/src/views/cipp/AppApproval.js index 0f420ea6c78e..265aa5bdab42 100644 --- a/src/views/cipp/AppApproval.js +++ b/src/views/cipp/AppApproval.js @@ -33,7 +33,6 @@ Error.propTypes = { name: PropTypes.string.isRequired, } -const requiredArray = (value) => (value && value.length !== 0 ? undefined : 'Required') const AppApproval = () => { const [genericPostRequest, postResults] = useLazyGenericPostRequestQuery() @@ -60,7 +59,7 @@ const AppApproval = () => {
    Choose tenants

  • - + {(props) => ( { - + {(props) => ( {
    Selected Permissions
    - {props.values.permissions.map((tenant, idx) => ( + {props.values.permissions?.map((tenant, idx) => (
  • {tenant.displayName} - {tenant.origin}
  • diff --git a/src/views/tenant/standards/ListAppliedStandards.js b/src/views/tenant/standards/ListAppliedStandards.js index 94bcc688001b..e3ae8cc96108 100644 --- a/src/views/tenant/standards/ListAppliedStandards.js +++ b/src/views/tenant/standards/ListAppliedStandards.js @@ -171,9 +171,22 @@ const ListAppliedStandards = () => { render={({ handleSubmit, submitting, values }) => { return ( -
    - {listStandardResults[0].appliedBy - ? `This standard has been applied at ${listStandardResults[0].appliedAt} by ${listStandardResults[0].appliedBy}` +
    {' '} + {listStandardResults[0]?.appliedBy + ? `This standard has been applied at ${new Date( + listStandardResults[0].appliedAt + 'Z', + ).toLocaleDateString(undefined, { + year: 'numeric', + month: 'long', + day: 'numeric', + })} ${new Date( + listStandardResults[0].appliedAt + 'Z', + ).toLocaleTimeString(undefined, { + hour: '2-digit', + minute: '2-digit', + second: '2-digit', + hour12: false, + })} by ${listStandardResults[0].appliedBy}` : 'This tenant does not yet have a standard applied'}
    Global Standards
    @@ -373,7 +386,6 @@ const ListAppliedStandards = () => { {postResults.isSuccess && ( {postResults.data.Results} )} -
    Templates

    From e9a34ac443b83b3fa81dc8713f398f05e0689169 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Wed, 11 Oct 2023 12:41:00 +0200 Subject: [PATCH 106/158] do not cancel requests when listing tenants and switching pages --- src/store/api/baseQuery.js | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/src/store/api/baseQuery.js b/src/store/api/baseQuery.js index dfdc52a859b5..b999c8b6b272 100644 --- a/src/store/api/baseQuery.js +++ b/src/store/api/baseQuery.js @@ -3,7 +3,7 @@ let newController = new AbortController() export const axiosQuery = async ({ path, method = 'get', params, data, hideToast }) => { try { const result = await axios({ - signal: newController.signal, + signal: path === '/api/ListTenants' ? undefined : newController.signal, method, baseURL: window.location.origin, url: path, @@ -23,6 +23,7 @@ export const axiosQuery = async ({ path, method = 'get', params, data, hideToast } } export function abortRequestSafe() { + console.log(newController) newController.abort() newController = new AbortController() } From cdff41d82eb5f310585855ac6970f474808c5091 Mon Sep 17 00:00:00 2001 From: Roel van der Wegen Date: Wed, 11 Oct 2023 18:10:58 +0200 Subject: [PATCH 107/158] Azure AD to Entra ID name change --- src/views/tenant/standards/ApplyStandard.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/views/tenant/standards/ApplyStandard.js b/src/views/tenant/standards/ApplyStandard.js index a01959cefcc3..64d9fbf0ffce 100644 --- a/src/views/tenant/standards/ApplyStandard.js +++ b/src/views/tenant/standards/ApplyStandard.js @@ -169,7 +169,7 @@ const ApplyStandard = () => {
    From 9e40e07a03be7e80386eebe4fb773436ad8abe25 Mon Sep 17 00:00:00 2001 From: Roel van der Wegen Date: Wed, 11 Oct 2023 18:11:38 +0200 Subject: [PATCH 108/158] Azure AD to Entra ID name change --- src/views/tenant/standards/ListAppliedStandards.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/views/tenant/standards/ListAppliedStandards.js b/src/views/tenant/standards/ListAppliedStandards.js index e3ae8cc96108..7f1382a5e149 100644 --- a/src/views/tenant/standards/ListAppliedStandards.js +++ b/src/views/tenant/standards/ListAppliedStandards.js @@ -228,7 +228,7 @@ const ListAppliedStandards = () => { ))}
    -
    Azure AD Standards
    +
    Entra ID Standards

    {allStandardsList From 016b0170d023e94d2570206dc90eea470e12b77c Mon Sep 17 00:00:00 2001 From: John Duprey Date: Wed, 11 Oct 2023 16:49:21 -0400 Subject: [PATCH 109/158] Company Administrator warnings --- src/views/tenant/administration/GDAPInviteWizard.js | 11 +++++++++++ src/views/tenant/administration/GDAPRoleWizard.js | 12 ++++++++++++ src/views/tenant/administration/GDAPWizard.js | 11 +++++++++++ 3 files changed, 34 insertions(+) diff --git a/src/views/tenant/administration/GDAPInviteWizard.js b/src/views/tenant/administration/GDAPInviteWizard.js index 9adb90081c62..1efdd36f7906 100644 --- a/src/views/tenant/administration/GDAPInviteWizard.js +++ b/src/views/tenant/administration/GDAPInviteWizard.js @@ -109,6 +109,17 @@ const GDAPInviteWizard = () => {
    Roles and group names
    + {props.values.gdapRoles.map((role, idx) => ( + <> + {role.RoleName == 'Company Administrator' && ( + + WARNING: The Company Administrator role will prevent GDAP + relationships from automatically extending. We recommend against using + this in any GDAP relationship. + + )} + + ))} {props.values.gdapRoles.map((role, idx) => (
  • diff --git a/src/views/tenant/administration/GDAPRoleWizard.js b/src/views/tenant/administration/GDAPRoleWizard.js index 26c56de51a4d..83830e976cab 100644 --- a/src/views/tenant/administration/GDAPRoleWizard.js +++ b/src/views/tenant/administration/GDAPRoleWizard.js @@ -121,6 +121,18 @@ const GDAPRoleWizard = () => {
    Roles and group names
    + {props.values.gdapRoles.map((role, idx) => ( + <> + {role.Name == 'Company Administrator' && ( + + WARNING: The Company Administrator role will prevent GDAP + relationships from automatically extending. We recommend against using + this in any GDAP relationship. + + )} + + ))} + {props.values.gdapRoles.map((role, idx) => (
  • diff --git a/src/views/tenant/administration/GDAPWizard.js b/src/views/tenant/administration/GDAPWizard.js index b8c110be6c9c..8722bde0b5f7 100644 --- a/src/views/tenant/administration/GDAPWizard.js +++ b/src/views/tenant/administration/GDAPWizard.js @@ -191,6 +191,17 @@ const GDAPWizard = () => { ))}
    Roles and group names
    + {props.values.gdapRoles.map((role, idx) => ( + <> + {role.RoleName == 'Company Administrator' && ( + + WARNING: The Company Administrator role will prevent GDAP + relationships from automatically extending. We recommend against using + this in any GDAP relationship. + + )} + + ))} {props.values.gdapRoles.map((role, idx) => (
  • From c1dc3b287bf8c28aa95e9efe25220558eb2531cf Mon Sep 17 00:00:00 2001 From: John Duprey Date: Wed, 11 Oct 2023 16:54:35 -0400 Subject: [PATCH 110/158] Scheduler Update - Add function synopsis - Add parameter descriptions as tooltips --- src/views/cipp/Scheduler.js | 59 +++++++++++++++++++++++++------------ 1 file changed, 40 insertions(+), 19 deletions(-) diff --git a/src/views/cipp/Scheduler.js b/src/views/cipp/Scheduler.js index cdd8ed9474ef..202009c5fd5d 100644 --- a/src/views/cipp/Scheduler.js +++ b/src/views/cipp/Scheduler.js @@ -269,6 +269,18 @@ const Scheduler = () => { /> + + {(props) => { + const selectedCommand = availableCommands.find( + (cmd) => cmd.Function === props.values.command?.value, + ) + return ( + + {selectedCommand?.Synopsis} + + ) + }} + {(props) => { @@ -282,27 +294,36 @@ const Scheduler = () => { if (parameters.length > 0) { paramblock = parameters.map((param, idx) => ( - - {param.Type === 'System.Boolean' || - param.Type === - 'System.Management.Automation.SwitchParameter' ? ( - <> - - + + {param.Type === 'System.Boolean' || + param.Type === + 'System.Management.Automation.SwitchParameter' ? ( + <> + + + + ) : ( + - - ) : ( - - )} - + )} + + )) } From c7d86d49f35b7015fce551f2e253d1babcaa5e76 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Thu, 12 Oct 2023 01:19:48 +0200 Subject: [PATCH 111/158] fix some classes stuff --- src/views/cipp/UserSettings.js | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/views/cipp/UserSettings.js b/src/views/cipp/UserSettings.js index 01ad712a1c75..bac284828d9f 100644 --- a/src/views/cipp/UserSettings.js +++ b/src/views/cipp/UserSettings.js @@ -202,12 +202,12 @@ const UserSettings = () => { - + { form.change('user', profile.clientPrincipal.userDetails) }} - className="me-3" + className="me-3 mb-3" name="singleuser" type="submit" > @@ -220,7 +220,7 @@ const UserSettings = () => { onClick={() => { form.change('user', 'allUsers') }} - className="me-3" + className="mb-3" name="allUsers" type="submit" > From 4c0aaaa0ff563f62edaa5f1fb19bf6c2245f9327 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Thu, 12 Oct 2023 01:43:30 +0200 Subject: [PATCH 112/158] improved extention --- src/data/Extensions.json | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/src/data/Extensions.json b/src/data/Extensions.json index 3c1a1e7f1cd8..7d7703f4d13a 100644 --- a/src/data/Extensions.json +++ b/src/data/Extensions.json @@ -77,7 +77,14 @@ "fieldtype": "input", "name": "HaloPSA.Tenant", "label": "HaloPSA Tenant", - "placeholder": "Enter your HaloPSA Tenant" + "placeholder": "Enter your HaloPSA Tenant (Leave blank if self-hosted" + }, + { + "type": "input", + "fieldtype": "input", + "name": "HaloPSA.TicketType", + "label": "HaloPSA Ticket Type ID", + "placeholder": "Enter your HaloPSA ticket type to use for CIPP Tickets. Leave blank for default." }, { "type": "input", From 926f32a8f09086e665b7f608b49d70b1f5d6b8b9 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Thu, 12 Oct 2023 15:31:20 +0200 Subject: [PATCH 113/158] exports now show filtered items --- src/components/tables/CippTable.js | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/src/components/tables/CippTable.js b/src/components/tables/CippTable.js index 55b6fd7b27ce..5fcb006c88be 100644 --- a/src/components/tables/CippTable.js +++ b/src/components/tables/CippTable.js @@ -481,10 +481,7 @@ export default function CippTable({ return null }) - var exportData = data - if (exportFiltered) { - exportData = filteredItems - } + var exportData = filteredItems var filtered = Array.isArray(exportData) && exportData.length > 0 From a5885aa195f58ad4741383b286e1e03e1121ffc8 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Thu, 12 Oct 2023 23:15:37 +0200 Subject: [PATCH 114/158] fixes interface bug --- src/views/cipp/AppApproval.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/views/cipp/AppApproval.js b/src/views/cipp/AppApproval.js index 265aa5bdab42..ab13d99f8c1d 100644 --- a/src/views/cipp/AppApproval.js +++ b/src/views/cipp/AppApproval.js @@ -171,7 +171,7 @@ const AppApproval = () => { {props.values.CopyPermissions ? ( Yes ) : ( - No + No )}
    Selected Permissions
    From f04e107546f9e9dfc8961179e73e68f3f4a8d755 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Fri, 13 Oct 2023 01:32:16 +0200 Subject: [PATCH 115/158] allow adding of custom attributes --- src/views/identity/administration/AddUser.js | 44 +++++++++++++++++++- 1 file changed, 43 insertions(+), 1 deletion(-) diff --git a/src/views/identity/administration/AddUser.js b/src/views/identity/administration/AddUser.js index 30a0aea33332..ba0e0b1d96a3 100644 --- a/src/views/identity/administration/AddUser.js +++ b/src/views/identity/administration/AddUser.js @@ -39,7 +39,7 @@ import { useNavigate } from 'react-router-dom' const AddUser = () => { let navigate = useNavigate() - + const [addedAttributes, setAddedAttribute] = React.useState(0) const tenant = useSelector((state) => state.app.currentTenant) const { defaultDomainName: tenantDomain } = tenant let query = useQuery() @@ -96,6 +96,7 @@ const AddUser = () => { Autopassword: !!values.Autopassword, MustChangePass: values.MustChangePass, tenantID: tenantDomain, + addedAttributes: values.addedAttributes, ...values.license, } //window.alert(JSON.stringify(shippedValues)) @@ -287,6 +288,47 @@ const AddUser = () => {
    + <> + {addedAttributes > 0 && + [...Array(addedAttributes)].map((e, i) => ( + + + + + + + + + ))} + + + + {addedAttributes > 0 && ( + setAddedAttribute(addedAttributes - 1)} + className={`circular-button`} + title={'-'} + > + + + )} + setAddedAttribute(addedAttributes + 1)} + className={`circular-button`} + title={'+'} + > + + + + Date: Thu, 12 Oct 2023 21:05:00 -0400 Subject: [PATCH 116/158] RFF ArrayFields - Add new component for ArrayFields - New react packages - Add Hashtable support for scheduler --- package-lock.json | 50 ++++++++++++++++++++++-- package.json | 2 + src/components/forms/RFFComponents.js | 56 +++++++++++++++++++++++++++ src/components/forms/index.js | 2 + src/views/cipp/Scheduler.js | 34 ++++++++++++---- 5 files changed, 134 insertions(+), 10 deletions(-) diff --git a/package-lock.json b/package-lock.json index 2db89fb7513f..7ecc83e4101a 100644 --- a/package-lock.json +++ b/package-lock.json @@ -34,6 +34,7 @@ "core-js": "^3.18.3", "enzyme": "^3.11.0", "final-form": "^4.20.4", + "final-form-arrays": "^3.1.0", "fuzzysort": "^1.1.4", "javascript-time-ago": "^2.5.9", "jspdf": "^2.4.0", @@ -48,6 +49,7 @@ "react-datepicker": "^4.10.0", "react-dom": "^17.0.2", "react-final-form": "^6.5.7", + "react-final-form-arrays": "^3.1.4", "react-final-form-listeners": "^1.0.3", "react-helmet": "^6.1.0", "react-hotkeys-hook": "^3.4.4", @@ -8510,16 +8512,28 @@ } }, "node_modules/final-form": { - "version": "4.20.6", - "license": "MIT", + "version": "4.20.10", + "resolved": "https://registry.npmjs.org/final-form/-/final-form-4.20.10.tgz", + "integrity": "sha512-TL48Pi1oNHeMOHrKv1bCJUrWZDcD3DIG6AGYVNOnyZPr7Bd/pStN0pL+lfzF5BNoj/FclaoiaLenk4XUIFVYng==", "dependencies": { "@babel/runtime": "^7.10.0" }, + "engines": { + "node": ">=8" + }, "funding": { "type": "opencollective", "url": "https://opencollective.com/final-form" } }, + "node_modules/final-form-arrays": { + "version": "3.1.0", + "resolved": "https://registry.npmjs.org/final-form-arrays/-/final-form-arrays-3.1.0.tgz", + "integrity": "sha512-TWBvun+AopgBLw9zfTFHBllnKMVNEwCEyDawphPuBGGqNsuhGzhT7yewHys64KFFwzIs6KEteGLpKOwvTQEscQ==", + "peerDependencies": { + "final-form": "^4.20.8" + } + }, "node_modules/finalhandler": { "version": "1.1.2", "dev": true, @@ -15149,6 +15163,20 @@ "react": "^16.8.0 || ^17.0.0" } }, + "node_modules/react-final-form-arrays": { + "version": "3.1.4", + "resolved": "https://registry.npmjs.org/react-final-form-arrays/-/react-final-form-arrays-3.1.4.tgz", + "integrity": "sha512-siVFAolUAe29rMR6u8VwepoysUcUdh6MLV2OWnCtKpsPRUdT9VUgECjAPaVMAH2GROZNiVB9On1H9MMrm9gdpg==", + "dependencies": { + "@babel/runtime": "^7.19.4" + }, + "peerDependencies": { + "final-form": "^4.15.0", + "final-form-arrays": ">=1.0.4", + "react": "^16.8.0 || ^17.0.0 || ^18.0.0", + "react-final-form": "^6.2.1" + } + }, "node_modules/react-final-form-listeners": { "version": "1.0.3", "license": "MIT", @@ -24179,11 +24207,19 @@ } }, "final-form": { - "version": "4.20.6", + "version": "4.20.10", + "resolved": "https://registry.npmjs.org/final-form/-/final-form-4.20.10.tgz", + "integrity": "sha512-TL48Pi1oNHeMOHrKv1bCJUrWZDcD3DIG6AGYVNOnyZPr7Bd/pStN0pL+lfzF5BNoj/FclaoiaLenk4XUIFVYng==", "requires": { "@babel/runtime": "^7.10.0" } }, + "final-form-arrays": { + "version": "3.1.0", + "resolved": "https://registry.npmjs.org/final-form-arrays/-/final-form-arrays-3.1.0.tgz", + "integrity": "sha512-TWBvun+AopgBLw9zfTFHBllnKMVNEwCEyDawphPuBGGqNsuhGzhT7yewHys64KFFwzIs6KEteGLpKOwvTQEscQ==", + "requires": {} + }, "finalhandler": { "version": "1.1.2", "dev": true, @@ -28203,6 +28239,14 @@ "@babel/runtime": "^7.15.4" } }, + "react-final-form-arrays": { + "version": "3.1.4", + "resolved": "https://registry.npmjs.org/react-final-form-arrays/-/react-final-form-arrays-3.1.4.tgz", + "integrity": "sha512-siVFAolUAe29rMR6u8VwepoysUcUdh6MLV2OWnCtKpsPRUdT9VUgECjAPaVMAH2GROZNiVB9On1H9MMrm9gdpg==", + "requires": { + "@babel/runtime": "^7.19.4" + } + }, "react-final-form-listeners": { "version": "1.0.3", "requires": { diff --git a/package.json b/package.json index 9d1cc1f15d02..5e277e8bc02b 100644 --- a/package.json +++ b/package.json @@ -53,6 +53,7 @@ "core-js": "^3.18.3", "enzyme": "^3.11.0", "final-form": "^4.20.4", + "final-form-arrays": "^3.1.0", "fuzzysort": "^1.1.4", "javascript-time-ago": "^2.5.9", "jspdf": "^2.4.0", @@ -67,6 +68,7 @@ "react-datepicker": "^4.10.0", "react-dom": "^17.0.2", "react-final-form": "^6.5.7", + "react-final-form-arrays": "^3.1.4", "react-final-form-listeners": "^1.0.3", "react-helmet": "^6.1.0", "react-hotkeys-hook": "^3.4.4", diff --git a/src/components/forms/RFFComponents.js b/src/components/forms/RFFComponents.js index 9aef7ca81c35..5365819e6623 100644 --- a/src/components/forms/RFFComponents.js +++ b/src/components/forms/RFFComponents.js @@ -1,4 +1,5 @@ import { + CButton, CFormCheck, CFormFeedback, CFormInput, @@ -12,9 +13,11 @@ import { import Select from 'react-select' import AsyncSelect from 'react-select/async' import { Field } from 'react-final-form' +import { FieldArray } from 'react-final-form-arrays' import React from 'react' import PropTypes from 'prop-types' import { useRef } from 'react' +import { FontAwesomeIcon } from '@fortawesome/react-fontawesome' /* wrapper classes for React Final Form with CoreUI @@ -167,6 +170,59 @@ RFFCFormInput.propTypes = { placeholder: PropTypes.string, } +export const RFFCFormInputArray = ({ name, label, className = 'mb-3' }) => { + return ( + <> + + {({ fields }) => ( +
    +
    + {label && ( + + {label} + + )} + fields.push({ Key: '', Value: '' })} + className="circular-button" + title={'+'} + > + + +
    + {fields.map((name, index) => ( +
    +
    + + {({ input, meta }) => { + return + }} + + + {({ input, meta }) => { + return + }} + +
    + fields.remove(index)} + className={`circular-button`} + title={'-'} + > + + +
    + ))} +
    + )} +
    + + ) +} +RFFCFormInputArray.propTypes = { + ...sharedPropTypes, +} + export const RFFCFormRadio = ({ name, label, diff --git a/src/components/forms/index.js b/src/components/forms/index.js index 47709152242b..616687f88a0f 100644 --- a/src/components/forms/index.js +++ b/src/components/forms/index.js @@ -8,6 +8,7 @@ import { RFFCFormTextarea, RFFCFormSelect, RFFSelectSearch, + RFFCFormInputArray, } from 'src/components/forms/RFFComponents' export { @@ -20,4 +21,5 @@ export { RFFCFormTextarea, RFFCFormSelect, RFFSelectSearch, + RFFCFormInputArray, } diff --git a/src/views/cipp/Scheduler.js b/src/views/cipp/Scheduler.js index 202009c5fd5d..af533a68b800 100644 --- a/src/views/cipp/Scheduler.js +++ b/src/views/cipp/Scheduler.js @@ -7,6 +7,7 @@ import { Condition, RFFCFormCheck, RFFCFormInput, + RFFCFormInputArray, RFFCFormRadio, RFFCFormSwitch, RFFCFormTextarea, @@ -36,6 +37,7 @@ import 'react-datepicker/dist/react-datepicker.css' import TenantListSelector from 'src/components/utilities/TenantListSelector' import { ModalService, TenantSelector } from 'src/components/utilities' import CippCodeOffCanvas from 'src/components/utilities/CippCodeOffcanvas' +import arrayMutators from 'final-form-arrays' const Offcanvas = (row, rowIndex, formatExtraData) => { const [ExecuteGetRequest, getResults] = useLazyGenericGetRequestQuery() @@ -110,6 +112,7 @@ const Scheduler = () => { Parameters: values.parameters, ScheduledTime: unixTime, Recurrence: values.Recurrence, + AdditionalProperties: values.additional, PostExecution: { Webhook: values.webhook, Email: values.email, @@ -199,6 +202,9 @@ const Scheduler = () => { true} render={({ handleSubmit, submitting, values }) => { @@ -315,12 +321,22 @@ const Scheduler = () => { /> ) : ( - + <> + {param.Type === 'System.Collections.Hashtable' ? ( + + ) : ( + + )} + )}
    @@ -332,7 +348,11 @@ const Scheduler = () => { }}
    - + + + + + From 78b818a4d2abb6757712184cee3992c5ad3be0be Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Fri, 13 Oct 2023 12:38:04 +0200 Subject: [PATCH 117/158] Fixes alert wizard --- src/views/tenant/administration/AlertWizard.js | 4 ---- 1 file changed, 4 deletions(-) diff --git a/src/views/tenant/administration/AlertWizard.js b/src/views/tenant/administration/AlertWizard.js index 8e02a21f6bd0..a8986663644a 100644 --- a/src/views/tenant/administration/AlertWizard.js +++ b/src/views/tenant/administration/AlertWizard.js @@ -219,10 +219,6 @@ const AlertWizard = () => { value: 'UserLoggedInFromUnknownLocation', name: 'A user has logged in from non-allowed location', }, - { - value: 'UserLoggedIn', - name: 'A user has logged in from any location', - }, { value: 'Add service principal.', name: 'Enterprise App Added', From f22161d7ee9d901bcace5a2b46223c6d0c572a5c Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Fri, 13 Oct 2023 12:38:50 +0200 Subject: [PATCH 118/158] upped version --- public/version_latest.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/public/version_latest.txt b/public/version_latest.txt index ecedc98d1d5a..64b5ae3938a0 100644 --- a/public/version_latest.txt +++ b/public/version_latest.txt @@ -1 +1 @@ -4.3.1 \ No newline at end of file +4.4.0 \ No newline at end of file From e5b39638946aca2309345622c73857fbe5c634cf Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Fri, 13 Oct 2023 12:44:59 +0200 Subject: [PATCH 119/158] uppev ersion --- version_latest.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/version_latest.txt b/version_latest.txt index ecedc98d1d5a..64b5ae3938a0 100644 --- a/version_latest.txt +++ b/version_latest.txt @@ -1 +1 @@ -4.3.1 \ No newline at end of file +4.4.0 \ No newline at end of file From 4f6b4eb9879537f7d9f1907024c190903bd6524b Mon Sep 17 00:00:00 2001 From: Jr7468 Date: Fri, 13 Oct 2023 13:27:47 +0100 Subject: [PATCH 120/158] Add Advanced Out of Office Tool --- .../administration/EditMailboxPermissions.js | 243 +++++++++++++++++- src/views/identity/administration/Users.js | 3 +- 2 files changed, 244 insertions(+), 2 deletions(-) diff --git a/src/views/email-exchange/administration/EditMailboxPermissions.js b/src/views/email-exchange/administration/EditMailboxPermissions.js index b0649954994b..20b0ec147405 100644 --- a/src/views/email-exchange/administration/EditMailboxPermissions.js +++ b/src/views/email-exchange/administration/EditMailboxPermissions.js @@ -21,7 +21,11 @@ import { Form, Field } from 'react-final-form' import { RFFSelectSearch, RFFCFormSelect, RFFCFormCheck, RFFCFormInput } from 'src/components/forms' import { useListUsersQuery } from 'src/store/api/users' import { ModalService } from 'src/components/utilities' -import { useLazyGenericPostRequestQuery, useLazyGenericGetRequestQuery } from 'src/store/api/app' +import { + useLazyGenericPostRequestQuery, + useLazyGenericGetRequestQuery, + useGenericGetRequestQuery, +} from 'src/store/api/app' import { FontAwesomeIcon } from '@fortawesome/react-fontawesome' import { faCircleNotch } from '@fortawesome/free-solid-svg-icons' import { @@ -32,6 +36,9 @@ import { import { CippTable } from 'src/components/tables' import { useListMailboxDetailsQuery } from 'src/store/api/mailbox' import { CellBoolean } from 'src/components/tables' +import DatePicker from 'react-datepicker' +import 'react-datepicker/dist/react-datepicker.css' +import { RFFCFormSwitch } from 'src/components/forms' const formatter = (cell, warning = false, reverse = false, colourless = false) => CellBoolean({ cell, warning, reverse, colourless }) @@ -114,6 +121,9 @@ const MailboxSettings = () => { setActive(3)} href="#"> Mailbox Forwarding + setActive(4)} href="#"> + Out Of Office + @@ -127,6 +137,9 @@ const MailboxSettings = () => { + + + @@ -158,6 +171,11 @@ const MailboxSettings = () => { )} + {active === 4 && ( + <> + + + )} @@ -761,3 +779,226 @@ const ForwardingSettings = () => { ) } + +const OutOfOffice = () => { + const dispatch = useDispatch() + let query = useQuery() + const userId = query.get('userId') + const tenantDomain = query.get('tenantDomain') + const [queryError, setQueryError] = useState(false) + const [genericPostRequest, postResults] = useLazyGenericPostRequestQuery() + const [startDate, setStartDate] = useState(new Date()) + const [endDate, setEndDate] = useState(new Date()) + const { + data: user = {}, + isFetching: userIsFetching, + error: userError, + } = useListMailboxPermissionsQuery({ tenantDomain, userId }) + + const { + data: users = [], + isFetching: usersIsFetching, + error: usersError, + } = useListUsersQuery({ tenantDomain }) + + useEffect(() => { + if (postResults.isSuccess) { + } + if (!userId || !tenantDomain) { + ModalService.open({ + body: 'Error invalid request, could not load requested user.', + title: 'Invalid Request', + }) + setQueryError(true) + } else { + setQueryError(false) + } + }, [userId, tenantDomain, dispatch, postResults]) + const onSubmit = (values) => { + const shippedValues = { + user: userId, + tenantFilter: tenantDomain, + AutoReplyState: values.AutoReplyState ? 'Scheduled' : 'Disabled', + StartTime: startDate.toLocaleString(), + EndTime: endDate.toLocaleString(), + InternalMessage: values.InternalMessage ? values.InternalMessage : '', + ExternalMessage: values.ExternalMessage ? values.ExternalMessage : '', + } + //window.alert(JSON.stringify(shippedValues)) + genericPostRequest({ path: '/api/ExecSetOoO', values: shippedValues }) + } + const initialState = { + ...user, + } + + const formDisabled = queryError === true + + return ( + <> + {!queryError && ( + <> + {queryError && ( + + + + {/* @todo add more descriptive help message here */} + Failed to load user + + + + )} + + + {usersIsFetching && } + {userError && Error loading user} + {!usersIsFetching && ( + { + return ( + + + + + + + + + + setStartDate(date)} + showTimeSelect + /> + + + + + + setEndDate(date)} + showTimeSelect + /> + + + + + + + + + + + + + + + + Edit Out of Office + {postResults.isFetching && ( + + )} + + + + {postResults.isSuccess && ( + + {postResults.data.Results.map((result, idx) => ( +
  • {result}
  • + ))} +
    + )} + + ) + }} + /> + )} +
    +
    + + )} + + ) +} + +const OutOfOfficeSettings = () => { + const query = useQuery() + const userId = query.get('userId') + const tenantDomain = query.get('tenantDomain') + const tenantFilter = tenantDomain + const { + data: details, + isFetching, + error, + } = useGenericGetRequestQuery({ + path: '/api/ListOoO', + params: { userId, tenantFilter }, + }) + const content = [ + { + heading: 'Auto Reply State', + body: formatter(details?.AutoReplyState, false, false, true), + }, + { + heading: 'Start Date/Time', + body: details?.StartTime ? details?.StartTime : 'N/A', + }, + { + heading: 'End Date/Time', + body: details?.EndTime ? details?.EndTime : 'N/A', + }, + { + heading: 'Internal Message', + body: details?.InternalMessage ? details?.InternalMessage : 'N/A', + }, + { + heading: 'External Message', + body: details?.ExternalMessage ? details?.ExternalMessage : 'N/A', + }, + ] + return ( + + {isFetching && ( + + Loading + + )} + {!isFetching && ( + + {content.map((item, index) => ( +
    +
    {item.heading}
    +

    {item.body}

    +
    + ))} +
    + )} + {error && Could not connect to API: {error.message}} +
    + ) +} diff --git a/src/views/identity/administration/Users.js b/src/views/identity/administration/Users.js index 69796c07b423..40bf15590a8e 100644 --- a/src/views/identity/administration/Users.js +++ b/src/views/identity/administration/Users.js @@ -149,6 +149,7 @@ const Offcanvas = (row, rowIndex, formatExtraData) => { user: row.userPrincipalName, TenantFilter: tenant.defaultDomainName, message: row.message, + AutoReplyState: 'Enabled', }, modalUrl: `/api/ExecSetOoO`, modalInput: true, @@ -163,7 +164,7 @@ const Offcanvas = (row, rowIndex, formatExtraData) => { modalBody: { user: row.userPrincipalName, TenantFilter: tenant.defaultDomainName, - Disable: true, + AutoReplyState: 'Disabled', }, modalUrl: `/api/ExecSetOoO`, modalMessage: 'Are you sure you want to disable the out of office?', From 749b17b9f020dd1912e0540ff6c20c4715bbac9a Mon Sep 17 00:00:00 2001 From: BNWEIN Date: Sun, 15 Oct 2023 08:09:54 +0100 Subject: [PATCH 121/158] Delete .github/workflows/azure-static-web-apps-proud-smoke-0849e8603.yml --- ...-static-web-apps-proud-smoke-0849e8603.yml | 46 ------------------- 1 file changed, 46 deletions(-) delete mode 100644 .github/workflows/azure-static-web-apps-proud-smoke-0849e8603.yml diff --git a/.github/workflows/azure-static-web-apps-proud-smoke-0849e8603.yml b/.github/workflows/azure-static-web-apps-proud-smoke-0849e8603.yml deleted file mode 100644 index dbcc4eb90308..000000000000 --- a/.github/workflows/azure-static-web-apps-proud-smoke-0849e8603.yml +++ /dev/null @@ -1,46 +0,0 @@ -name: Azure Static Web Apps CI/CD - -on: - push: - branches: - - dev - pull_request: - types: [opened, synchronize, reopened, closed] - branches: - - dev - -jobs: - build_and_deploy_job: - if: github.event_name == 'push' || (github.event_name == 'pull_request' && github.event.action != 'closed') - runs-on: ubuntu-latest - name: Build and Deploy Job - steps: - - uses: actions/checkout@v3 - with: - submodules: true - lfs: false - - name: Build And Deploy - id: builddeploy - uses: Azure/static-web-apps-deploy@v1 - with: - azure_static_web_apps_api_token: ${{ secrets.AZURE_STATIC_WEB_APPS_API_TOKEN_PROUD_SMOKE_0849E8603 }} - repo_token: ${{ secrets.GITHUB_TOKEN }} # Used for Github integrations (i.e. PR comments) - action: "upload" - ###### Repository/Build Configurations - These values can be configured to match your app requirements. ###### - # For more information regarding Static Web App workflow configurations, please visit: https://aka.ms/swaworkflowconfig - app_location: "/" # App source code path - api_location: "" # Api source code path - optional - output_location: "" # Built app content directory - optional - ###### End of Repository/Build Configurations ###### - - close_pull_request_job: - if: github.event_name == 'pull_request' && github.event.action == 'closed' - runs-on: ubuntu-latest - name: Close Pull Request Job - steps: - - name: Close Pull Request - id: closepullrequest - uses: Azure/static-web-apps-deploy@v1 - with: - azure_static_web_apps_api_token: ${{ secrets.AZURE_STATIC_WEB_APPS_API_TOKEN_PROUD_SMOKE_0849E8603 }} - action: "close" From 2fc7853bc2276c6a715676a0c4e944b9a1f6ced8 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Mon, 16 Oct 2023 10:13:20 +0200 Subject: [PATCH 122/158] fixes sort --- src/components/tables/CippTable.js | 26 +++++++++++--------------- 1 file changed, 11 insertions(+), 15 deletions(-) diff --git a/src/components/tables/CippTable.js b/src/components/tables/CippTable.js index 5fcb006c88be..72b3247f2218 100644 --- a/src/components/tables/CippTable.js +++ b/src/components/tables/CippTable.js @@ -79,27 +79,23 @@ FilterComponent.propTypes = { filterlist: PropTypes.arrayOf(PropTypes.object), onFilterPreset: PropTypes.func, } +const compareValues = (a, b) => { + if (a === null) return 1 + if (b === null) return -1 + if (typeof a === 'number' && typeof b === 'number') return a - b + if (typeof a === 'boolean' && typeof b === 'boolean') return a === b ? 0 : a ? -1 : 1 + return String(a).localeCompare(String(b), 'en', { numeric: true }) +} const customSort = (rows, selector, direction) => { return rows.sort((a, b) => { - // use the selector to resolve your field names by passing the sort comparitors - let aField - let bField - - aField = selector(a) - bField = selector(b) - - let comparison = 0 - - if (aField?.toString().localeCompare(bField, 'en', { numeric: true }) > 0) { - comparison = 1 - } else if (aField?.toString().localeCompare(bField, 'en', { numeric: true }) < 0) { - comparison = -1 - } - + let aField = selector(a) + let bField = selector(b) + let comparison = compareValues(aField, bField) return direction === 'desc' ? comparison * -1 : comparison }) } + export default function CippTable({ data, isFetching = false, From 7f4c8dffb91ca400c70ced232a5192e8daa35945 Mon Sep 17 00:00:00 2001 From: Jr7468 Date: Tue, 17 Oct 2023 17:41:28 +0100 Subject: [PATCH 123/158] Fixed spacing --- .../email-exchange/administration/EditMailboxPermissions.js | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/views/email-exchange/administration/EditMailboxPermissions.js b/src/views/email-exchange/administration/EditMailboxPermissions.js index 20b0ec147405..87525d9d6cc8 100644 --- a/src/views/email-exchange/administration/EditMailboxPermissions.js +++ b/src/views/email-exchange/administration/EditMailboxPermissions.js @@ -859,7 +859,7 @@ const OutOfOffice = () => { return ( - + @@ -888,7 +888,7 @@ const OutOfOffice = () => { - + { - + Date: Wed, 18 Oct 2023 09:47:30 +0100 Subject: [PATCH 124/158] Used regex to eliminate HTML elements in output --- .../email-exchange/administration/EditMailboxPermissions.js | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/src/views/email-exchange/administration/EditMailboxPermissions.js b/src/views/email-exchange/administration/EditMailboxPermissions.js index 87525d9d6cc8..fd41f5af70e1 100644 --- a/src/views/email-exchange/administration/EditMailboxPermissions.js +++ b/src/views/email-exchange/administration/EditMailboxPermissions.js @@ -959,6 +959,7 @@ const OutOfOfficeSettings = () => { path: '/api/ListOoO', params: { userId, tenantFilter }, }) + const combinedRegex = /(<([^>]+)>)|| /gi const content = [ { heading: 'Auto Reply State', @@ -974,11 +975,11 @@ const OutOfOfficeSettings = () => { }, { heading: 'Internal Message', - body: details?.InternalMessage ? details?.InternalMessage : 'N/A', + body: details?.InternalMessage ? details?.InternalMessage.replace(combinedRegex, '') : 'N/A', }, { heading: 'External Message', - body: details?.ExternalMessage ? details?.ExternalMessage : 'N/A', + body: details?.ExternalMessage ? details?.ExternalMessage.replace(combinedRegex, '') : 'N/A', }, ] return ( From 807b90dc1a3b686fee986c99fb78b4364897b48a Mon Sep 17 00:00:00 2001 From: John Duprey Date: Wed, 18 Oct 2023 20:12:19 -0400 Subject: [PATCH 125/158] Permission Checks - Add TableModalButton component - Update permission check to include GDAP info and Role/Group memberships --- src/components/buttons/TableModalButton.js | 40 ++++++++++++++++++++++ src/components/buttons/index.js | 3 +- src/views/cipp/CIPPSettings.js | 38 +++++++++++++++++++- 3 files changed, 79 insertions(+), 2 deletions(-) create mode 100644 src/components/buttons/TableModalButton.js diff --git a/src/components/buttons/TableModalButton.js b/src/components/buttons/TableModalButton.js new file mode 100644 index 000000000000..725405e7629e --- /dev/null +++ b/src/components/buttons/TableModalButton.js @@ -0,0 +1,40 @@ +import React from 'react' +import { CButton } from '@coreui/react' +import { ModalService } from '../utilities' +import { FontAwesomeIcon } from '@fortawesome/react-fontawesome' +import { faCheckCircle } from '@fortawesome/free-solid-svg-icons' +import { cellGenericFormatter } from '../tables/CellGenericFormat' + +export default function TableModalButton({ data, title, className }) { + const handleTable = (data) => { + const QueryColumns = [] + const columns = Object.keys(data[0]).map((key) => { + QueryColumns.push({ + name: key, + selector: (row) => row[key], // Accessing the property using the key + sortable: true, + exportSelector: key, + cell: cellGenericFormatter(), + }) + }) + ModalService.open({ + data: data, + componentType: 'table', + componentProps: { + columns: QueryColumns, + keyField: 'id', + }, + title: title, + size: 'lg', + }) + } + const buttonClass = 'btn ' + className + + return ( + handleTable(data)}> + <> + {title} ({data.length}) + + + ) +} diff --git a/src/components/buttons/index.js b/src/components/buttons/index.js index e0c639073418..c87617eb1456 100644 --- a/src/components/buttons/index.js +++ b/src/components/buttons/index.js @@ -1,5 +1,6 @@ import ExportCsvButton from 'src/components/buttons/CsvButton' import ExportPDFButton from 'src/components/buttons/PdfButton' import TitleButton from 'src/components/buttons/TitleButton' +import TableModalButton from 'src/components/buttons/TableModalButton' -export { ExportCsvButton, ExportPDFButton, TitleButton } +export { ExportCsvButton, ExportPDFButton, TitleButton, TableModalButton } diff --git a/src/views/cipp/CIPPSettings.js b/src/views/cipp/CIPPSettings.js index 1716df3abee3..3fb453caa594 100644 --- a/src/views/cipp/CIPPSettings.js +++ b/src/views/cipp/CIPPSettings.js @@ -82,6 +82,7 @@ import Skeleton from 'react-loading-skeleton' import { Buffer } from 'buffer' import Extensions from 'src/data/Extensions.json' import { CellDelegatedPrivilege } from 'src/components/tables/CellDelegatedPrivilege' +import { TableModalButton } from 'src/components/buttons' const CIPPSettings = () => { const [active, setActive] = useState(1) @@ -387,10 +388,28 @@ const GeneralSettings = () => { )} + {permissionsResult.data.Results?.MissingGroups.length > 0 && ( + <> + Your SAM User is missing the following group memberships. + + {permissionsResult.data.Results?.MissingGroups?.map((r, index) => ( + {r} + ))} + + + )} + {permissionsResult.data.Results?.CIPPGroupCount == 0 && ( + <> + NOTE: M365 GDAP groups were not set up by CIPP, review the SAM user groups + below. + + )} {permissionsResult.data.Results?.AccessTokenDetails?.Name !== '' && ( <> - setTokenOffcanvasVisible(true)}>Details + setTokenOffcanvasVisible(true)}> + Details + { /> )} + {permissionsResult.data.Results?.Memberships !== '' && ( + <> + p['@odata.type'] == '#microsoft.graph.group', + )} + title="Groups" + /> + p['@odata.type'] == '#microsoft.graph.directoryRole', + )} + title="Roles" + /> + + )} )} From 06db64e01740281fea86af75313635a7200ddb56 Mon Sep 17 00:00:00 2001 From: John Duprey Date: Wed, 18 Oct 2023 20:22:25 -0400 Subject: [PATCH 126/158] spacing --- src/views/cipp/CIPPSettings.js | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/views/cipp/CIPPSettings.js b/src/views/cipp/CIPPSettings.js index 3fb453caa594..9c75630f2c65 100644 --- a/src/views/cipp/CIPPSettings.js +++ b/src/views/cipp/CIPPSettings.js @@ -407,7 +407,7 @@ const GeneralSettings = () => { {permissionsResult.data.Results?.AccessTokenDetails?.Name !== '' && ( <> - setTokenOffcanvasVisible(true)}> + setTokenOffcanvasVisible(true)}> Details { {permissionsResult.data.Results?.Memberships !== '' && ( <> p['@odata.type'] == '#microsoft.graph.group', )} From 7b36891435703744525efb68e0c0e65f26a80545 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Thu, 19 Oct 2023 18:09:44 +0200 Subject: [PATCH 127/158] changed text a little. --- src/views/cipp/CIPPSettings.js | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/src/views/cipp/CIPPSettings.js b/src/views/cipp/CIPPSettings.js index 9c75630f2c65..b46e9165e005 100644 --- a/src/views/cipp/CIPPSettings.js +++ b/src/views/cipp/CIPPSettings.js @@ -400,8 +400,9 @@ const GeneralSettings = () => { )} {permissionsResult.data.Results?.CIPPGroupCount == 0 && ( <> - NOTE: M365 GDAP groups were not set up by CIPP, review the SAM user groups - below. + NOTE: Your M365 GDAP groups were not set up by CIPP. Please check the groups + below to see if you have the correct GDAP permissions, or execute an access + check. )} From 09a4052fda311920389178b0ac085f33f5d2e331 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Thu, 19 Oct 2023 21:45:38 +0200 Subject: [PATCH 128/158] changed nav --- src/_nav.js | 90 ++++++++++++++++++++++++++++------------------------- 1 file changed, 47 insertions(+), 43 deletions(-) diff --git a/src/_nav.js b/src/_nav.js index 683cd830fdaa..4933192c1a26 100644 --- a/src/_nav.js +++ b/src/_nav.js @@ -246,6 +246,51 @@ const _nav = [ }, ], }, + { + component: CNavGroup, + name: 'GDAP Management', + section: 'Settings', + to: '/cipp/gdap', + icon: , + items: [ + { + component: CNavItem, + name: 'Role Wizard', + to: '/tenant/administration/gdap-role-wizard', + }, + { + component: CNavItem, + name: 'GDAP Roles', + to: '/tenant/administration/gdap-roles', + }, + /*{ + component: CNavItem, + name: 'Migration Wizard', + to: '/tenant/administration/gdap', + }, + { + component: CNavItem, + name: 'GDAP Migration Status', + to: '/tenant/administration/gdap-status', + },*/ + { + component: CNavItem, + name: 'Invite Wizard', + to: '/tenant/administration/gdap-invite', + }, + { + component: CNavItem, + name: 'GDAP Relationships', + to: '/tenant/administration/gdap-relationships', + }, + { + component: CNavItem, + name: 'Documentation', + href: 'https://cipp.app/docs/user/usingcipp/GDAP/migration', + target: '_blank', + }, + ], + }, { component: CNavGroup, name: 'Reports', @@ -678,56 +723,15 @@ const _nav = [ name: 'Logbook', to: '/cipp/logs', }, - { component: CNavItem, name: 'SAM Setup Wizard', to: '/cipp/setup', }, - ], - }, - { - component: CNavGroup, - name: 'GDAP Migration', - section: 'Settings', - to: '/cipp/gdap', - icon: , - items: [ - { - component: CNavItem, - name: 'Role Wizard', - to: '/tenant/administration/gdap-role-wizard', - }, - { - component: CNavItem, - name: 'GDAP Roles', - to: '/tenant/administration/gdap-roles', - }, - { - component: CNavItem, - name: 'Migration Wizard', - to: '/tenant/administration/gdap', - }, { component: CNavItem, - name: 'GDAP Migration Status', - to: '/tenant/administration/gdap-status', - }, - { - component: CNavItem, - name: 'Invite Wizard', - to: '/tenant/administration/gdap-invite', - }, - { - component: CNavItem, - name: 'GDAP Relationships', - to: '/tenant/administration/gdap-relationships', - }, - { - component: CNavItem, - name: 'Documentation', - href: 'https://cipp.app/docs/user/usingcipp/GDAP/migration', - target: '_blank', + name: 'Log Out', + to: '/logout', }, ], }, From a8f7ddc3d70229c8e52939e9b57bfa8fd303cd62 Mon Sep 17 00:00:00 2001 From: BNWEIN Date: Fri, 20 Oct 2023 08:35:18 +0100 Subject: [PATCH 129/158] Fixed Link on Transport Rules Page Finally fixed the link on the transport rules page to deploy a new rule. --- src/views/email-exchange/transport/TransportRules.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/views/email-exchange/transport/TransportRules.js b/src/views/email-exchange/transport/TransportRules.js index ecb39e6d9af6..77f26875c406 100644 --- a/src/views/email-exchange/transport/TransportRules.js +++ b/src/views/email-exchange/transport/TransportRules.js @@ -122,7 +122,7 @@ const TransportRulesList = () => { tenantSelector={true} titleButton={ <> - + } datatable={{ From 8dcfb905766617a281cc098188be0af2c266fff2 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Kristian=20Kj=C3=A6rg=C3=A5rd?= Date: Fri, 20 Oct 2023 18:03:55 +0200 Subject: [PATCH 130/158] Add an Edit Mailbox Permissions button when viewing a user --- src/views/identity/administration/UserActions.js | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/src/views/identity/administration/UserActions.js b/src/views/identity/administration/UserActions.js index 78ca9e360fe8..2a96415e0b15 100644 --- a/src/views/identity/administration/UserActions.js +++ b/src/views/identity/administration/UserActions.js @@ -9,6 +9,7 @@ import { faUserTimes, faEllipsisH, faEnvelope, + faEdit, } from '@fortawesome/free-solid-svg-icons' import { ActionContentCard } from 'src/components/contentcards' import { useLazyGenericGetRequestQuery } from 'src/store/api/app' @@ -30,6 +31,7 @@ export default function UserActions({ tenantDomain, userId, userEmail, className } const editLink = `/identity/administration/users/edit?tenantDomain=${tenantDomain}&userId=${userId}` + const editMailboxLink = `/email/administration/edit-mailbox-permissions?tenantDomain=${tenantDomain}&userId=${userId}` const actions = [ { @@ -37,6 +39,11 @@ export default function UserActions({ tenantDomain, userId, userEmail, className link: editLink, icon: faCog, }, + { + label: 'Edit Mailbox Permissions', + link: editMailboxLink, + icon: faEdit, + }, { label: 'Send MFA Push', link: '#', From 0a1abb102089565ad6cf2bbd73c44b98a47a3de7 Mon Sep 17 00:00:00 2001 From: John Duprey Date: Fri, 20 Oct 2023 21:39:47 -0400 Subject: [PATCH 131/158] Tenant Access Check - Add cellTableFormatter - Increase column size --- src/views/cipp/CIPPSettings.js | 19 +++++++++++++++++-- 1 file changed, 17 insertions(+), 2 deletions(-) diff --git a/src/views/cipp/CIPPSettings.js b/src/views/cipp/CIPPSettings.js index b46e9165e005..985dc4af7251 100644 --- a/src/views/cipp/CIPPSettings.js +++ b/src/views/cipp/CIPPSettings.js @@ -83,6 +83,8 @@ import { Buffer } from 'buffer' import Extensions from 'src/data/Extensions.json' import { CellDelegatedPrivilege } from 'src/components/tables/CellDelegatedPrivilege' import { TableModalButton } from 'src/components/buttons' +import { cellTableFormatter } from 'src/components/tables/CellTable' +import { cellGenericFormatter } from 'src/components/tables/CellGenericFormat' const CIPPSettings = () => { const [active, setActive] = useState(1) @@ -151,16 +153,29 @@ const checkAccessColumns = [ name: 'Tenant Domain', selector: (row) => row['TenantName'], grow: 0, + cell: cellGenericFormatter(), }, { name: 'Result', selector: (row) => row['Status'], minWidth: '380px', maxWidth: '380px', + cell: cellGenericFormatter(), }, { name: 'Missing GDAP Roles', - selector: (row) => row['GDAP'], + selector: (row) => row?.MissingRoles, + cell: cellTableFormatter('MissingRoles'), + }, + { + name: 'Tenant Roles', + selector: (row) => row?.GDAPRoles, + cell: cellTableFormatter('GDAPRoles'), + }, + { + name: 'SAM User Roles', + selector: (row) => row?.SAMUserRoles, + cell: cellTableFormatter('SAMUserRoles'), }, ] @@ -482,7 +497,7 @@ const GeneralSettings = () => { - + Tenant Access Check From 8631d8bde3ac7ac88bdfe58c2a84ae371a8353ba Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Sun, 22 Oct 2023 16:44:19 +0200 Subject: [PATCH 132/158] improvements to table looks --- src/components/tables/CellTable.js | 38 ++++-- src/views/cipp/CIPPSettings.js | 190 +++++++++++++---------------- 2 files changed, 118 insertions(+), 110 deletions(-) diff --git a/src/components/tables/CellTable.js b/src/components/tables/CellTable.js index 004cdb715c48..c874a6854920 100644 --- a/src/components/tables/CellTable.js +++ b/src/components/tables/CellTable.js @@ -3,16 +3,22 @@ import { CButton } from '@coreui/react' import { ModalService } from '../utilities' import { CBadge } from '@coreui/react' import { FontAwesomeIcon } from '@fortawesome/react-fontawesome' -import { faCheckCircle } from '@fortawesome/free-solid-svg-icons' +import { faCheckCircle, faTimesCircle } from '@fortawesome/free-solid-svg-icons' // 1. Import the required FontAwesome icon import { cellGenericFormatter } from './CellGenericFormat' -export default function cellTable(row, column, propertyName) { +export default function cellTable( + row, + column, + propertyName, + checkWhenZero = false, + crossWhenZero = false, +) { const handleTable = ({ row }) => { const QueryColumns = [] const columns = Object.keys(row[propertyName][0]).map((key) => { QueryColumns.push({ name: key, - selector: (row) => row[key], // Accessing the property using the key + selector: (row) => row[key], sortable: true, exportSelector: key, cell: cellGenericFormatter(), @@ -29,8 +35,24 @@ export default function cellTable(row, column, propertyName) { size: 'lg', }) } + //if the row propertyName is a bool, then return a check or cross + if (typeof row[propertyName] === 'boolean') { + if (row[propertyName]) { + return + } + return + } - if (!row[propertyName] || !Array.isArray(row[propertyName]) || row.length === 0) { + if (!row[propertyName] || !Array.isArray(row[propertyName]) || row[propertyName].length === 0) { + if (row[propertyName] === undefined) { + return + } + if (checkWhenZero) { + return + } + if (crossWhenZero) { + return + } return } @@ -41,6 +63,8 @@ export default function cellTable(row, column, propertyName) { ) } -export const cellTableFormatter = (propertyName) => (row, index, column, id) => { - return cellTable(row, column, propertyName) -} +export const cellTableFormatter = + (propertyName, checkWhenZero = false, crossWhenZero = false) => + (row, index, column, id) => { + return cellTable(row, column, propertyName, checkWhenZero, crossWhenZero) + } diff --git a/src/views/cipp/CIPPSettings.js b/src/views/cipp/CIPPSettings.js index 985dc4af7251..f4e300e0c215 100644 --- a/src/views/cipp/CIPPSettings.js +++ b/src/views/cipp/CIPPSettings.js @@ -85,6 +85,7 @@ import { CellDelegatedPrivilege } from 'src/components/tables/CellDelegatedPrivi import { TableModalButton } from 'src/components/buttons' import { cellTableFormatter } from 'src/components/tables/CellTable' import { cellGenericFormatter } from 'src/components/tables/CellGenericFormat' +import { check } from 'prettier' const CIPPSettings = () => { const [active, setActive] = useState(1) @@ -165,17 +166,17 @@ const checkAccessColumns = [ { name: 'Missing GDAP Roles', selector: (row) => row?.MissingRoles, - cell: cellTableFormatter('MissingRoles'), + cell: cellTableFormatter('MissingRoles', true, false), }, { - name: 'Tenant Roles', + name: 'Roles available', selector: (row) => row?.GDAPRoles, - cell: cellTableFormatter('GDAPRoles'), + cell: cellTableFormatter('GDAPRoles', false, true), }, { name: 'SAM User Roles', selector: (row) => row?.SAMUserRoles, - cell: cellTableFormatter('SAMUserRoles'), + cell: cellTableFormatter('SAMUserRoles', false, true), }, ] @@ -189,8 +190,6 @@ const GeneralSettings = () => { const [selectedTenants, setSelectedTenants] = useState([]) const [showMaxSelected, setShowMaxSelected] = useState(false) const [tokenOffcanvasVisible, setTokenOffcanvasVisible] = useState(false) - const [runBackup, RunBackupResult] = useLazyGenericGetRequestQuery() - const [restoreBackup, restoreBackupResult] = useLazyGenericPostRequestQuery() const maxSelected = 2 const tenantSelectorRef = useRef(null) @@ -560,68 +559,6 @@ const GeneralSettings = () => { - - - - - Run Backup - - - Click the button below to start a backup of all Settings - runBackup({ path: '/api/ExecRunBackup' })} - disabled={RunBackupResult.isFetching} - className="me-3 mt-3" - > - {RunBackupResult.isFetching && ( - - )} - Run backup - - handleChange(e)} - /> - inputRef.current.click()} - disabled={restoreBackupResult.isFetching} - className="me-3 mt-3" - > - {restoreBackupResult.isFetching && ( - - )} - Restore backup - - {restoreBackupResult.isSuccess && ( - <> - {restoreBackupResult.data.Results} - - )} - {RunBackupResult.isSuccess && ( - <> - - downloadTxtFile(RunBackupResult.data.backup)} - className="m-1" - > - Download Backup - - - - )} - - - - - - - ) } @@ -1371,46 +1308,40 @@ const PasswordSettings = () => { <> {getPasswordConfigResult.isUninitialized && getPasswordConfig({ path: '/api/ExecPasswordConfig?list=true' })} - - - Password Generation - - - Select a password style for generated passwords. - - {resolvers.map((r, index) => ( - switchResolver(r)} - color={ - r === getPasswordConfigResult.data?.Results?.passwordType - ? 'primary' - : 'secondary' - } - key={index} - > - {r} - - ))} - - {(editPasswordConfigResult.isSuccess || editPasswordConfigResult.isError) && ( - - {editPasswordConfigResult.isSuccess - ? editPasswordConfigResult.data.Results - : 'Error setting password style'} - - )} - - +

    Password Style

    + + {resolvers.map((r, index) => ( + switchResolver(r)} + color={ + r === getPasswordConfigResult.data?.Results?.passwordType ? 'primary' : 'secondary' + } + key={index} + > + {r} + + ))} + + {(editPasswordConfigResult.isSuccess || editPasswordConfigResult.isError) && ( + + {editPasswordConfigResult.isSuccess + ? editPasswordConfigResult.data.Results + : 'Error setting password style'} + + )} ) } const DNSSettings = () => { + const [runBackup, RunBackupResult] = useLazyGenericGetRequestQuery() + const [restoreBackup, restoreBackupResult] = useLazyGenericPostRequestQuery() const [getDnsConfig, getDnsConfigResult] = useLazyGetDnsConfigQuery() const [editDnsConfig, editDnsConfigResult] = useLazyEditDnsConfigQuery() + const inputRef = useRef(null) const [alertVisible, setAlertVisible] = useState(false) @@ -1431,10 +1362,10 @@ const DNSSettings = () => { {getDnsConfigResult.isSuccess && ( - DNS Resolver + Application Settings - Select a DNS resolver to use for Domain Analysis. +

    DNS resolver

    {resolvers.map((r, index) => ( { : 'Error setting resolver'} )} + + + + +

    Settings Backup

    + runBackup({ path: '/api/ExecRunBackup' })} + disabled={RunBackupResult.isFetching} + className="me-3 mt-3" + > + {RunBackupResult.isFetching && ( + + )} + Run backup + + handleChange(e)} + /> + inputRef.current.click()} + disabled={restoreBackupResult.isFetching} + className="me-3 mt-3" + > + {restoreBackupResult.isFetching && ( + + )} + Restore backup + + {restoreBackupResult.isSuccess && ( + <> + {restoreBackupResult.data.Results} + + )} + {RunBackupResult.isSuccess && ( + <> + + downloadTxtFile(RunBackupResult.data.backup)} + className="m-1" + > + Download Backup + + + + )} +
    )} From 9c0b574feda2267d3d05fd863a65863cde15f79b Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Sun, 22 Oct 2023 21:36:48 +0200 Subject: [PATCH 133/158] caps --- src/views/cipp/CIPPSettings.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/views/cipp/CIPPSettings.js b/src/views/cipp/CIPPSettings.js index f4e300e0c215..2ccf00c60bb5 100644 --- a/src/views/cipp/CIPPSettings.js +++ b/src/views/cipp/CIPPSettings.js @@ -1365,7 +1365,7 @@ const DNSSettings = () => { Application Settings -

    DNS resolver

    +

    DNS Resolver

    {resolvers.map((r, index) => ( Date: Mon, 23 Oct 2023 09:39:08 +0200 Subject: [PATCH 134/158] add requireMFAadd requireMFA --- src/data/standards.json | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/src/data/standards.json b/src/data/standards.json index 255449b17c3a..292fafc41ac4 100644 --- a/src/data/standards.json +++ b/src/data/standards.json @@ -415,6 +415,12 @@ }, "label": "Set inactive device retirement days" }, + { + "name": "standards.intuneRequireMFA", + "cat": "Intune", + "helpText": "", + "label": "Require Multifactor Authentication to register or join devices with Microsoft Entra" + }, { "name": "standards.sharingCapability.Enabled", "cat": "SharePoint", From eda41a1eda1eb5211cac73e349e5bc6fe2d9df34 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Mon, 23 Oct 2023 11:08:48 +0200 Subject: [PATCH 135/158] Remove mailbox permissions --- src/views/identity/administration/OffboardingWizard.js | 2 ++ 1 file changed, 2 insertions(+) diff --git a/src/views/identity/administration/OffboardingWizard.js b/src/views/identity/administration/OffboardingWizard.js index a5bf2288504a..052495dfabb8 100644 --- a/src/views/identity/administration/OffboardingWizard.js +++ b/src/views/identity/administration/OffboardingWizard.js @@ -60,6 +60,7 @@ const OffboardingWizard = () => { removeRules: values.RemoveRules, removeMobile: values.RemoveMobile, keepCopy: values.keepCopy, + removePermissions: values.removePermissions, } //alert(JSON.stringify(values, null, 2)) @@ -125,6 +126,7 @@ const OffboardingWizard = () => { + From 5a863dcc81d9df8298f3153d4047088f3da4069b Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Mon, 23 Oct 2023 11:14:40 +0200 Subject: [PATCH 136/158] prettification --- src/views/identity/administration/OffboardingWizard.js | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/src/views/identity/administration/OffboardingWizard.js b/src/views/identity/administration/OffboardingWizard.js index 052495dfabb8..71e886944b03 100644 --- a/src/views/identity/administration/OffboardingWizard.js +++ b/src/views/identity/administration/OffboardingWizard.js @@ -262,6 +262,14 @@ const OffboardingWizard = () => { icon={props.values.RemoveRules ? faCheck : faTimes} /> + + Remove all mailbox permissions + + Remove Licenses Date: Mon, 23 Oct 2023 18:20:17 +0200 Subject: [PATCH 137/158] Fix small label error to make labels consistent with the ones found in ApplyStandard.js --- src/views/tenant/standards/ListAppliedStandards.js | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/views/tenant/standards/ListAppliedStandards.js b/src/views/tenant/standards/ListAppliedStandards.js index 7f1382a5e149..84d168b995f3 100644 --- a/src/views/tenant/standards/ListAppliedStandards.js +++ b/src/views/tenant/standards/ListAppliedStandards.js @@ -451,7 +451,7 @@ const ListAppliedStandards = () => { name: template.displayName, }))} placeholder="Select a template" - label="Choose your intune templates to apply" + label="Choose your Conditional Access templates to apply" /> )} @@ -473,7 +473,7 @@ const ListAppliedStandards = () => { name: template.name, }))} placeholder="Select a template" - label="Choose your intune templates to apply" + label="Choose your Transport Rule templates to apply" /> )} @@ -494,7 +494,7 @@ const ListAppliedStandards = () => { name: template.Displayname, }))} placeholder="Select a template" - label="Choose your group templates to apply" + label="Choose your Group templates to apply" /> )} From 8716e5544bad646b26beaaa06d5e79286b07e7cf Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Kristian=20Kj=C3=A6rg=C3=A5rd?= Date: Mon, 23 Oct 2023 18:21:48 +0200 Subject: [PATCH 138/158] Whoops --- src/views/tenant/standards/ListAppliedStandards.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/views/tenant/standards/ListAppliedStandards.js b/src/views/tenant/standards/ListAppliedStandards.js index 84d168b995f3..a6e6ce55749a 100644 --- a/src/views/tenant/standards/ListAppliedStandards.js +++ b/src/views/tenant/standards/ListAppliedStandards.js @@ -407,7 +407,7 @@ const ListAppliedStandards = () => { name: template.Displayname, }))} placeholder="Select a template" - label="Choose your intune templates to apply" + label="Choose your Intune templates to apply" /> )} From fa5ab4850eadee99c048b0d3887b63e6344b5517 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Kristian=20Kj=C3=A6rg=C3=A5rd?= Date: Mon, 23 Oct 2023 19:36:30 +0200 Subject: [PATCH 139/158] Move timeout to global standards --- src/data/standards.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/data/standards.json b/src/data/standards.json index 292fafc41ac4..0fd0665c1aeb 100644 --- a/src/data/standards.json +++ b/src/data/standards.json @@ -332,7 +332,7 @@ }, { "name": "standards.ActivityBasedTimeout", - "cat": "SharePoint", + "cat": "Global", "helpText": "", "addedComponent": null, "label": "Enable 1 hour Activity based Timeout" From 4fc2843f8d777e28c38b1dfcbe8c8d60d9eec4ff Mon Sep 17 00:00:00 2001 From: John Duprey Date: Mon, 23 Oct 2023 21:28:56 -0400 Subject: [PATCH 140/158] CippTable / Access Check Tweaks - Add support for hiding filter in subheader - Add omit property to extended info - Add CFormSwitch toggle to hide or show role details --- src/components/tables/CippTable.js | 29 ++++++----- src/views/cipp/CIPPSettings.js | 81 ++++++++++++++++++------------ 2 files changed, 65 insertions(+), 45 deletions(-) diff --git a/src/components/tables/CippTable.js b/src/components/tables/CippTable.js index 72b3247f2218..75106ab21de4 100644 --- a/src/components/tables/CippTable.js +++ b/src/components/tables/CippTable.js @@ -111,6 +111,7 @@ export default function CippTable({ isModal = false, exportFiltered = false, filterlist, + showFilter = true, tableProps: { keyField = 'id', theme = 'cyberdrain', @@ -468,6 +469,10 @@ export default function CippTable({ ]) } + actions.forEach((action) => { + defaultActions.push(action) + }) + if (!disablePDFExport || !disableCSVExport) { const keys = [] const exportFormatter = {} @@ -578,9 +583,7 @@ export default function CippTable({ , ]) } - actions.forEach((action) => { - defaultActions.push(action) - }) + defaultActions.push([
    - setFilterText(e.target.value)} - onFilterPreset={(e) => { - setFilterText(e) - }} - onClear={handleClear} - filterText={filterText} - filterlist={filterlist} - /> + {showFilter && ( + setFilterText(e.target.value)} + onFilterPreset={(e) => { + setFilterText(e) + }} + onClear={handleClear} + filterText={filterText} + filterlist={filterlist} + /> + )} {defaultActions}
    diff --git a/src/views/cipp/CIPPSettings.js b/src/views/cipp/CIPPSettings.js index 2ccf00c60bb5..8c46d827521f 100644 --- a/src/views/cipp/CIPPSettings.js +++ b/src/views/cipp/CIPPSettings.js @@ -21,6 +21,7 @@ import { CSpinner, CCardText, CTooltip, + CFormSwitch, } from '@coreui/react' import { useGenericGetRequestQuery, @@ -149,40 +150,8 @@ const CIPPSettings = () => { export default CIPPSettings -const checkAccessColumns = [ - { - name: 'Tenant Domain', - selector: (row) => row['TenantName'], - grow: 0, - cell: cellGenericFormatter(), - }, - { - name: 'Result', - selector: (row) => row['Status'], - minWidth: '380px', - maxWidth: '380px', - cell: cellGenericFormatter(), - }, - { - name: 'Missing GDAP Roles', - selector: (row) => row?.MissingRoles, - cell: cellTableFormatter('MissingRoles', true, false), - }, - { - name: 'Roles available', - selector: (row) => row?.GDAPRoles, - cell: cellTableFormatter('GDAPRoles', false, true), - }, - { - name: 'SAM User Roles', - selector: (row) => row?.SAMUserRoles, - cell: cellTableFormatter('SAMUserRoles', false, true), - }, -] - const GeneralSettings = () => { const { data: versions, isSuccess: isSuccessVersion } = useLoadVersionsQuery() - const { data: tenants = [] } = useListTenantsQuery({ AllTenantSelector: false }) const [checkPermissions, permissionsResult] = useLazyExecPermissionsAccessCheckQuery() const [clearCache, clearCacheResult] = useLazyExecClearCacheQuery() @@ -190,6 +159,7 @@ const GeneralSettings = () => { const [selectedTenants, setSelectedTenants] = useState([]) const [showMaxSelected, setShowMaxSelected] = useState(false) const [tokenOffcanvasVisible, setTokenOffcanvasVisible] = useState(false) + const [showExtendedInfo, setShowExtendedInfo] = useState(true) const maxSelected = 2 const tenantSelectorRef = useRef(null) @@ -204,6 +174,39 @@ const GeneralSettings = () => { } } + const checkAccessColumns = [ + { + name: 'Tenant Domain', + selector: (row) => row['TenantName'], + grow: 0, + cell: cellGenericFormatter(), + }, + { + name: 'Result', + selector: (row) => row['Status'], + minWidth: '380px', + maxWidth: '380px', + cell: cellGenericFormatter(), + }, + { + name: 'Missing GDAP Roles', + selector: (row) => row?.MissingRoles, + cell: cellTableFormatter('MissingRoles', true, false), + }, + { + name: 'Roles available', + selector: (row) => row?.GDAPRoles, + cell: cellTableFormatter('GDAPRoles', false, true), + omit: showExtendedInfo, + }, + { + name: 'SAM User Roles', + selector: (row) => row?.SAMUserRoles, + cell: cellTableFormatter('SAMUserRoles', false, true), + omit: showExtendedInfo, + }, + ] + const handleCheckAccess = () => { const mapped = tenants.reduce( (current, { customerId, ...rest }) => ({ @@ -301,7 +304,16 @@ const GeneralSettings = () => { const tableProps = { pagination: false, - subheader: false, + actions: [ + { + console.log(e) + setShowExtendedInfo(!e.target.checked) + }} + />, + ], } const downloadTxtFile = (data) => { const txtdata = [JSON.stringify(RunBackupResult.data.backup)] @@ -544,6 +556,9 @@ const GeneralSettings = () => { {accessCheckResult.isSuccess && ( Date: Tue, 24 Oct 2023 11:25:01 +0200 Subject: [PATCH 141/158] external link for GA --- src/views/home/Home.js | 8 ++------ 1 file changed, 2 insertions(+), 6 deletions(-) diff --git a/src/views/home/Home.js b/src/views/home/Home.js index c802805552af..761be7b0d35d 100644 --- a/src/views/home/Home.js +++ b/src/views/home/Home.js @@ -187,12 +187,8 @@ const Home = () => { - From c9f6c9074db6e3b6f5741a73be60d60d4b6f9de1 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Kristian=20Kj=C3=A6rg=C3=A5rd?= Date: Tue, 24 Oct 2023 18:39:00 +0200 Subject: [PATCH 142/158] Make Universal search remember the user you clicked on --- src/components/utilities/UniversalSearch.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/components/utilities/UniversalSearch.js b/src/components/utilities/UniversalSearch.js index 0dadbe464659..74f2efeb7cd2 100644 --- a/src/components/utilities/UniversalSearch.js +++ b/src/components/utilities/UniversalSearch.js @@ -80,7 +80,7 @@ const ResultsRow = ({ match }) => { const handleClick = () => { dispatch(hideSwitcher()) - navigate(`/identity/administration/users?customerId=${match._tenantId}`) + navigate(`/identity/administration/users?customerId=${match._tenantId}&tableFilter=${match.userPrincipalName}`) } return ( From bc60b6127edd15c83a6d5fa2c12f86ff61a87d09 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Tue, 24 Oct 2023 19:44:40 +0200 Subject: [PATCH 143/158] fix spacing --- src/components/utilities/UniversalSearch.js | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/src/components/utilities/UniversalSearch.js b/src/components/utilities/UniversalSearch.js index 74f2efeb7cd2..0893132265d9 100644 --- a/src/components/utilities/UniversalSearch.js +++ b/src/components/utilities/UniversalSearch.js @@ -17,7 +17,7 @@ export const UniversalSearch = React.forwardRef( const handleKeyDown = (event) => { if (event.key === 'Enter') { - // on enter key, start the search + // on enter key, start the searchs getSearchItems({ path: `/api/ExecUniversalSearch?name=${searchValue}` }) } } @@ -80,7 +80,9 @@ const ResultsRow = ({ match }) => { const handleClick = () => { dispatch(hideSwitcher()) - navigate(`/identity/administration/users?customerId=${match._tenantId}&tableFilter=${match.userPrincipalName}`) + navigate( + `/identity/administration/users?customerId=${match._tenantId}&tableFilter=${match.userPrincipalName}`, + ) } return ( From 9055f2858824559255fb44a033bd43dd903960f3 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Thu, 26 Oct 2023 11:57:31 +0200 Subject: [PATCH 144/158] case sensitivity issue --- src/views/endpoint/intune/MEMListPolicyTemplates.js | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/views/endpoint/intune/MEMListPolicyTemplates.js b/src/views/endpoint/intune/MEMListPolicyTemplates.js index 645744383d56..851c6731bedd 100644 --- a/src/views/endpoint/intune/MEMListPolicyTemplates.js +++ b/src/views/endpoint/intune/MEMListPolicyTemplates.js @@ -69,7 +69,7 @@ const AutopilotListTemplates = () => { selector: (row) => row['displayName'], sortable: true, cell: (row) => CellTip(row['displayName']), - exportSelector: 'Displayname', + exportSelector: 'displayName', minWidth: '400px', maxWidth: '400px', }, @@ -78,7 +78,7 @@ const AutopilotListTemplates = () => { selector: (row) => row['description'], sortable: true, cell: (row) => CellTip(row['description']), - exportSelector: 'Description', + exportSelector: 'description', minWidth: '400px', maxWidth: '400px', }, From 13c1736f92ba3cd23a47a49f11a57226047fab50 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Thu, 26 Oct 2023 12:29:02 +0200 Subject: [PATCH 145/158] improvements to cipp-sam --- src/views/cipp/Setup.js | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/src/views/cipp/Setup.js b/src/views/cipp/Setup.js index 603e2a07a0e2..82da760206e7 100644 --- a/src/views/cipp/Setup.js +++ b/src/views/cipp/Setup.js @@ -48,7 +48,10 @@ Error.propTypes = { const Setup = () => { const [setupDone, setSetupdone] = useState(false) - const valbutton = (value) => (setupDone ? undefined : 'You must finish the wizard.') + const valbutton = (value) => + getResults.data?.step < 5 + ? undefined + : `You must finish the setup process. you are currently at step ${getResults.data?.step} of 5.` const [genericPostRequest, postResults] = useLazyGenericPostRequestQuery() const [genericGetRequest, getResults] = useLazyGenericGetRequestQuery() const onSubmit = (values) => { From b557a239d012761786ddb6a86b093d6a1b46c6aa Mon Sep 17 00:00:00 2001 From: BNWEIN Date: Thu, 26 Oct 2023 11:42:16 +0100 Subject: [PATCH 146/158] Update ListAppliedStandards.js Removed Duplicated Success Message --- src/views/tenant/standards/ListAppliedStandards.js | 3 --- 1 file changed, 3 deletions(-) diff --git a/src/views/tenant/standards/ListAppliedStandards.js b/src/views/tenant/standards/ListAppliedStandards.js index a6e6ce55749a..bf56b10ffbe2 100644 --- a/src/views/tenant/standards/ListAppliedStandards.js +++ b/src/views/tenant/standards/ListAppliedStandards.js @@ -383,9 +383,6 @@ const ListAppliedStandards = () => { ))} - {postResults.isSuccess && ( - {postResults.data.Results} - )}
    Templates

    From 0752d4b01b646a73b1b900e776e6aa7c72ac728b Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Thu, 26 Oct 2023 19:41:04 +0200 Subject: [PATCH 147/158] added complex filter licenses --- src/views/identity/reports/MFAReport.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/views/identity/reports/MFAReport.js b/src/views/identity/reports/MFAReport.js index da29c7e33b87..5dbae89bb4ad 100644 --- a/src/views/identity/reports/MFAReport.js +++ b/src/views/identity/reports/MFAReport.js @@ -134,7 +134,7 @@ const MFAList = () => { datatable={{ filterlist: [ { filterName: 'Enabled users', filter: '"accountEnabled":true' }, - { filterName: 'Licensed users', filter: '"isLicensed":"true"' }, + { filterName: 'Licensed users', filter: 'Complex: IsLicensed eq true' }, ], columns: tenant.defaultDomainName === 'AllTenants' ? Altcolumns : columns, path: '/api/ListMFAUsers', From c9e06094c8272b14d256aa546718c95379f4216d Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Thu, 26 Oct 2023 20:42:41 +0200 Subject: [PATCH 148/158] add standard --- src/data/standards.json | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/src/data/standards.json b/src/data/standards.json index 0fd0665c1aeb..328a668fdc85 100644 --- a/src/data/standards.json +++ b/src/data/standards.json @@ -267,6 +267,13 @@ }, "label": "Set Outbound Spam Alert e-mail" }, + { + "name": "standards.SafeSendersDisable", + "cat": "Exchange", + "helpText": "", + "addedComponent": null, + "label": "Remove Safe Senders to prevent SPF bypass" + }, { "name": "standards.DisableSharedMailbox", "cat": "Exchange", From 073e0336cc068a4102746446306ccffbeac180a0 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Thu, 26 Oct 2023 21:12:46 +0200 Subject: [PATCH 149/158] Fix bug with showing logs --- src/views/cipp/Logs.js | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/src/views/cipp/Logs.js b/src/views/cipp/Logs.js index dc128d9a9721..22862da55ea2 100644 --- a/src/views/cipp/Logs.js +++ b/src/views/cipp/Logs.js @@ -107,7 +107,7 @@ const Logs = () => { const DateFilter = query.get('DateFilter') //const [genericPostRequest, postResults] = useLazyGenericPostRequestQuery() const [visibleA, setVisibleA] = useState(false) - const [startDate, setStartDate] = useState(new Date()) + const [startDate, setStartDate] = useState(DateFilter ? new Date(DateFilter) : new Date()) const handleSubmit = async (values) => { Object.keys(values).filter(function (x) { if (values[x] === null) { @@ -115,11 +115,13 @@ const Logs = () => { } return null }) + console.log(startDate) const shippedValues = { SearchNow: true, - DateFilter: startDate.toLocaleDateString('en-GB').split('/').reverse().join(''), + DateFilter: startDate.toISOString().split('T')[0].replace(/-/g, ''), ...values, } + console.log(shippedValues) var queryString = Object.keys(shippedValues) .map((key) => key + '=' + shippedValues[key]) .join('&') @@ -154,7 +156,7 @@ const Logs = () => { initialValues={{ Severity: severity, user: user, - DateFilter: DateFilter, + DateFilter: startDate.toISOString().split('T')[0].replace(/-/g, ''), }} onSubmit={handleSubmit} render={({ handleSubmit, submitting, values }) => { From 406355acc57961c0d241cebcdce808fe3538f81f Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Thu, 26 Oct 2023 21:22:03 +0200 Subject: [PATCH 150/158] removed console.logs --- src/views/cipp/Logs.js | 2 -- 1 file changed, 2 deletions(-) diff --git a/src/views/cipp/Logs.js b/src/views/cipp/Logs.js index 22862da55ea2..0d339880d1ff 100644 --- a/src/views/cipp/Logs.js +++ b/src/views/cipp/Logs.js @@ -115,13 +115,11 @@ const Logs = () => { } return null }) - console.log(startDate) const shippedValues = { SearchNow: true, DateFilter: startDate.toISOString().split('T')[0].replace(/-/g, ''), ...values, } - console.log(shippedValues) var queryString = Object.keys(shippedValues) .map((key) => key + '=' + shippedValues[key]) .join('&') From 9573b96cf9a57cbfbc0f115b80272a87bb648c29 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Fri, 27 Oct 2023 00:26:49 +0200 Subject: [PATCH 151/158] Add custom group support for apps --- .../applications/ApplicationsAddChocoApp.js | 17 ++++++++++++++++- .../endpoint/applications/ApplicationsAddRMM.js | 15 +++++++++++++++ .../applications/ApplicationsAddWinGet.js | 16 ++++++++++++++++ 3 files changed, 47 insertions(+), 1 deletion(-) diff --git a/src/views/endpoint/applications/ApplicationsAddChocoApp.js b/src/views/endpoint/applications/ApplicationsAddChocoApp.js index 4b46dcec0efa..6f518d6f5d07 100644 --- a/src/views/endpoint/applications/ApplicationsAddChocoApp.js +++ b/src/views/endpoint/applications/ApplicationsAddChocoApp.js @@ -18,6 +18,7 @@ import { CippWizard } from 'src/components/layout' import { WizardTableField } from 'src/components/tables' import PropTypes from 'prop-types' import { + Condition, RFFCFormCheck, RFFCFormInput, RFFCFormRadio, @@ -57,6 +58,9 @@ const ApplyStandard = () => { values.selectedTenants.map( (tenant) => (values[`Select_${tenant.defaultDomainName}`] = tenant.defaultDomainName), ) + if (values.AssignTo === 'customGroup') { + values.AssignTo = values.customGroup + } genericPostRequest({ path: '/api/AddChocoApp', values: values }) } const handleSearch = async ({ searchString, customRepo }) => { @@ -87,7 +91,6 @@ const ApplyStandard = () => { console.log(value) return obj.packagename === value }) - console.log(template[0]) onChange(template[0][set]) }} @@ -246,6 +249,18 @@ const ApplyStandard = () => { name="AssignTo" label="Assign to all users and devices" > + + + +

    diff --git a/src/views/endpoint/applications/ApplicationsAddRMM.js b/src/views/endpoint/applications/ApplicationsAddRMM.js index 5d994c7dbbca..da43bbca5a29 100644 --- a/src/views/endpoint/applications/ApplicationsAddRMM.js +++ b/src/views/endpoint/applications/ApplicationsAddRMM.js @@ -37,6 +37,9 @@ const AddRMM = () => { values.selectedTenants.map( (tenant) => (values[`Select_${tenant.defaultDomainName}`] = tenant.defaultDomainName), ) + if (values.AssignTo === 'customGroup') { + values.AssignTo = values.customGroup + } genericPostRequest({ path: '/api/AddMSPApp', values: values }) } @@ -312,6 +315,18 @@ const AddRMM = () => { name="AssignTo" label="Assign to all users and devices" > + + + +
    diff --git a/src/views/endpoint/applications/ApplicationsAddWinGet.js b/src/views/endpoint/applications/ApplicationsAddWinGet.js index 14424f1390a9..72a1dc7937f4 100644 --- a/src/views/endpoint/applications/ApplicationsAddWinGet.js +++ b/src/views/endpoint/applications/ApplicationsAddWinGet.js @@ -18,6 +18,7 @@ import { CippWizard } from 'src/components/layout' import { WizardTableField } from 'src/components/tables' import PropTypes from 'prop-types' import { + Condition, RFFCFormCheck, RFFCFormInput, RFFCFormRadio, @@ -54,6 +55,9 @@ const AddWinGet = () => { const [searchPostRequest, foundPackages] = useLazyGenericPostRequestQuery() const handleSubmit = async (values) => { + if (values.AssignTo === 'customGroup') { + values.AssignTo = values.customGroup + } values.selectedTenants.map( (tenant) => (values[`Select_${tenant.defaultDomainName}`] = tenant.defaultDomainName), ) @@ -240,6 +244,18 @@ const AddWinGet = () => { name="AssignTo" label="Assign to all users and devices" > + + + + From 060509e2185b7dc78ff2dc8051b0a71dbac2f834 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Fri, 27 Oct 2023 00:42:01 +0200 Subject: [PATCH 152/158] add removal of standards from table --- .../tenant/standards/ListAppliedStandards.js | 48 +++++++++++++++++++ 1 file changed, 48 insertions(+) diff --git a/src/views/tenant/standards/ListAppliedStandards.js b/src/views/tenant/standards/ListAppliedStandards.js index bf56b10ffbe2..d22f03d05862 100644 --- a/src/views/tenant/standards/ListAppliedStandards.js +++ b/src/views/tenant/standards/ListAppliedStandards.js @@ -21,6 +21,8 @@ import { FontAwesomeIcon } from '@fortawesome/react-fontawesome' import Skeleton from 'react-loading-skeleton' import { CippTable } from 'src/components/tables' import allStandardsList from 'src/data/standards' +import { useState } from 'react' +import CippCodeOffCanvas from 'src/components/utilities/CippCodeOffcanvas' const RefreshAction = () => { const [execStandards, execStandardsResults] = useLazyGenericGetRequestQuery() @@ -80,6 +82,43 @@ const DeleteAction = () => { ) } const ListAppliedStandards = () => { + const [ExecuteGetRequest, getResults] = useLazyGenericGetRequestQuery() + + const Offcanvas = (row, rowIndex, formatExtraData) => { + const [ocVisible, setOCVisible] = useState(false) + const handleDeleteIntuneTemplate = (apiurl, message) => { + ModalService.confirm({ + title: 'Confirm', + body:
    {message}
    , + onConfirm: () => ExecuteGetRequest({ path: apiurl }), + confirmLabel: 'Continue', + cancelLabel: 'Cancel', + }) + } + return ( + <> + + handleDeleteIntuneTemplate( + `api/RemoveStandard?ID=${row.displayName}`, + 'Do you want to delete this standard?', + ) + } + > + + + setOCVisible(false)} + /> + + ) + } const tenantDomain = useSelector((state) => state.app.currentTenant.defaultDomainName) const [genericPostRequest, postResults] = useLazyGenericPostRequestQuery() @@ -124,6 +163,11 @@ const ListAppliedStandards = () => { sortable: true, exportSelector: 'StandardsExport', }, + { + name: 'Actions', + cell: Offcanvas, + maxWidth: '80px', + }, ] const [intuneGetRequest, intuneTemplates] = useLazyGenericGetRequestQuery() const [transportGetRequest, transportTemplates] = useLazyGenericGetRequestQuery() @@ -530,6 +574,10 @@ const ListAppliedStandards = () => { {listStandardsAllTenants && ( + {getResults.isLoading && } + {getResults.isSuccess && ( + {getResults.data?.Results} + )} Date: Fri, 27 Oct 2023 01:20:00 +0200 Subject: [PATCH 153/158] added custom groups for intune --- src/views/endpoint/intune/MEMAddPolicy.js | 15 +++++++++++++++ 1 file changed, 15 insertions(+) diff --git a/src/views/endpoint/intune/MEMAddPolicy.js b/src/views/endpoint/intune/MEMAddPolicy.js index 327954c91f40..f87f6b87dd2a 100644 --- a/src/views/endpoint/intune/MEMAddPolicy.js +++ b/src/views/endpoint/intune/MEMAddPolicy.js @@ -45,6 +45,9 @@ const AddPolicy = () => { (tenant) => (values[`Select_${tenant.defaultDomainName}`] = tenant.defaultDomainName), ) values.TemplateType = values.Type + if (values.AssignTo === 'customGroup') { + values.AssignTo = values.customGroup + } genericPostRequest({ path: '/api/AddPolicy', values: values }) } const [matchMap, setMatchMap] = useState([]) @@ -234,6 +237,18 @@ const AddPolicy = () => { name="AssignTo" label="Assign to all users and devices" > + + + +
    From c59af15c1f321999f50c0d9ccde66881fa375f37 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Fri, 27 Oct 2023 01:41:31 +0200 Subject: [PATCH 154/158] add autoextend button --- .../administration/ListGDAPRelationships.js | 24 +++++++++++++++++-- 1 file changed, 22 insertions(+), 2 deletions(-) diff --git a/src/views/tenant/administration/ListGDAPRelationships.js b/src/views/tenant/administration/ListGDAPRelationships.js index a5703bd84b22..ee162af21975 100644 --- a/src/views/tenant/administration/ListGDAPRelationships.js +++ b/src/views/tenant/administration/ListGDAPRelationships.js @@ -34,7 +34,7 @@ const RefreshAction = () => { {isLoading && } {error && } {isSuccess && } - Map GDAP Groups + Map recently approved relationships ) } @@ -89,6 +89,13 @@ const Actions = (row, rowIndex, formatExtraData) => { title={'GDAP - ' + row?.customer?.displayName} extendedInfo={extendedInfo} actions={[ + { + label: 'Enable automatic extension', + color: 'info', + modal: true, + modalUrl: `/api/ExecAutoExtendGDAP?ID=${row.id}`, + modalMessage: 'Are you sure you want to enable auto-extend for this relationship', + }, { label: 'Terminate Relationship', color: 'danger', @@ -149,6 +156,13 @@ const GDAPRelationships = () => { exportSelector: 'endDateTime', cell: cellDateFormatter({ format: 'short' }), }, + { + name: 'Auto Extend', + selector: (row) => row['autoExtendDuration'], + sortable: true, + exportSelector: 'endDateTime', + cell: (row) => (row['autoExtendDuration'] === 'PT0S' ? 'No' : 'Yes'), + }, { name: 'Actions', cell: Actions, @@ -158,6 +172,7 @@ const GDAPRelationships = () => { return (
    } capabilities={{ allTenants: true, helpContext: 'https://google.com' }} title="GDAP Relationship List" tenantSelector={false} @@ -176,8 +191,13 @@ const GDAPRelationships = () => { modalUrl: `/api/ExecDeleteGDAPRelationship?&GDAPID=!id`, modalMessage: 'Are you sure you want to terminate these relationships?', }, + { + label: 'Auto Extend Relationship', + modal: true, + modalUrl: `/api/ExecAutoExtendGDAP&ID=!id`, + modalMessage: 'Are you sure you want to enable automatic extension?', + }, ], - actions: [], }, keyField: 'id', columns, From f34fe8f5c99b6acb0e1ecf4add98335861ee6f4e Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Fri, 27 Oct 2023 01:43:02 +0200 Subject: [PATCH 155/158] fix bulk extend --- src/views/tenant/administration/ListGDAPRelationships.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/views/tenant/administration/ListGDAPRelationships.js b/src/views/tenant/administration/ListGDAPRelationships.js index ee162af21975..dcba0648a907 100644 --- a/src/views/tenant/administration/ListGDAPRelationships.js +++ b/src/views/tenant/administration/ListGDAPRelationships.js @@ -194,7 +194,7 @@ const GDAPRelationships = () => { { label: 'Auto Extend Relationship', modal: true, - modalUrl: `/api/ExecAutoExtendGDAP&ID=!id`, + modalUrl: `/api/ExecAutoExtendGDAP?ID=!id`, modalMessage: 'Are you sure you want to enable automatic extension?', }, ], From ca4ad83aeee510b792bd819b11db0722a3ecae38 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Fri, 27 Oct 2023 13:38:06 +0200 Subject: [PATCH 156/158] uncomment migration tool becasue extra month --- src/_nav.js | 10 ++-------- 1 file changed, 2 insertions(+), 8 deletions(-) diff --git a/src/_nav.js b/src/_nav.js index 4933192c1a26..623201a42809 100644 --- a/src/_nav.js +++ b/src/_nav.js @@ -263,7 +263,7 @@ const _nav = [ name: 'GDAP Roles', to: '/tenant/administration/gdap-roles', }, - /*{ + { component: CNavItem, name: 'Migration Wizard', to: '/tenant/administration/gdap', @@ -272,7 +272,7 @@ const _nav = [ component: CNavItem, name: 'GDAP Migration Status', to: '/tenant/administration/gdap-status', - },*/ + }, { component: CNavItem, name: 'Invite Wizard', @@ -283,12 +283,6 @@ const _nav = [ name: 'GDAP Relationships', to: '/tenant/administration/gdap-relationships', }, - { - component: CNavItem, - name: 'Documentation', - href: 'https://cipp.app/docs/user/usingcipp/GDAP/migration', - target: '_blank', - }, ], }, { From 12872b8cb81e400730195dc973ee7b0c64234977 Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Fri, 27 Oct 2023 14:04:12 +0200 Subject: [PATCH 157/158] old content --- src/_nav.js | 9 --------- 1 file changed, 9 deletions(-) diff --git a/src/_nav.js b/src/_nav.js index 623201a42809..852e4334d8cb 100644 --- a/src/_nav.js +++ b/src/_nav.js @@ -332,15 +332,6 @@ const _nav = [ }, ], }, - // Coming in another branch (heads up) - //{ - //component: CNavGroup, - //name: 'Vulnerabilities', - //section: 'Security & Compliance', - //to: '/security/vulnerabilities', - //icon: , - //items: [], - //}, { component: CNavGroup, name: 'Defender', From 34a8a1a0ef3f9b02c06d254cd9354048379a783e Mon Sep 17 00:00:00 2001 From: KelvinTegelaar Date: Fri, 27 Oct 2023 14:17:17 +0200 Subject: [PATCH 158/158] upped version --- public/version_latest.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/public/version_latest.txt b/public/version_latest.txt index 64b5ae3938a0..ae153944ee8b 100644 --- a/public/version_latest.txt +++ b/public/version_latest.txt @@ -1 +1 @@ -4.4.0 \ No newline at end of file +4.5.0 \ No newline at end of file