Skip to content

Commit 9f5657f

Browse files
authored
Merge pull request Azure#1049 from msewaweru/guid-remediation
GUID remediation
2 parents 91f3c3e + e151207 commit 9f5657f

File tree

60 files changed

+88
-90
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

60 files changed

+88
-90
lines changed

azureadps-1.0/MSOnline/Add-MsolGroupMember.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ The new members can be either users or other security groups.
2727

2828
### Example 1: Add a user to a security group
2929
```
30-
PS C:\> Add-MsolGroupMember -GroupObjectId 62f684d7-9ab1-4abc-a543-2257e085bdc6 -GroupMemberType User -GroupMemberObjectId bbb55777-d5aa-499d-abbf-353d4523049f
30+
PS C:\> Add-MsolGroupMember -GroupObjectId aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb -GroupMemberType User -GroupMemberObjectId bbbbbbbb-1111-2222-3333-cccccccccccc
3131
```
3232

3333
This command adds a user to a security group.

azureadps-1.0/MSOnline/Add-MsolGroupMember.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ syntaxes:
1616
examples:
1717
- title: 'Example 1: Add a user to a security group'
1818
code: |-
19-
PS C:\> Add-MsolGroupMember -GroupObjectId 62f684d7-9ab1-4abc-a543-2257e085bdc6 -GroupMemberType User -GroupMemberObjectId bbb55777-d5aa-499d-abbf-353d4523049f
19+
PS C:\> Add-MsolGroupMember -GroupObjectId aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb -GroupMemberType User -GroupMemberObjectId bbbbbbbb-1111-2222-3333-cccccccccccc
2020
description: |-
2121
This command adds a user to a security group.
2222
summary: ""

azureadps-1.0/MSOnline/Get-MsolGroupMember.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ The members can be either users or groups.
3434

3535
### Example 1: Get all members of a group
3636
```
37-
PS C:\> Get-MsolGroupMember -GroupObjectId 74d7b44e-6811-4250-bffe-8292e3b0b689
37+
PS C:\> Get-MsolGroupMember -GroupObjectId aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb
3838
```
3939

4040
This command retrieves all members of the specified group.

azureadps-1.0/MSOnline/Get-MsolGroupMember.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ syntaxes:
3434
examples:
3535
- title: 'Example 1: Get all members of a group'
3636
code: |-
37-
PS C:\> Get-MsolGroupMember -GroupObjectId 74d7b44e-6811-4250-bffe-8292e3b0b689
37+
PS C:\> Get-MsolGroupMember -GroupObjectId aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb
3838
description: |-
3939
This command retrieves all members of the specified group.
4040
The members can be users or groups.

azureadps-1.0/MSOnline/Get-MsolServicePrincipal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ This is an exact match of the **appClass** portion of the service principal name
6161

6262
### Example 3: Get a service principal
6363
```
64-
PS C:\> Get-MsolServicePrincipal -AppPrincipalId 5e964d2f-e384-4292-ae55-dd24c89cc53b
64+
PS C:\> Get-MsolServicePrincipal -AppPrincipalId aaaaaaaa-bbbb-cccc-1111-222222222222
6565
```
6666

6767
This command gets a service principal that has a specific application principal ID.

azureadps-1.0/MSOnline/Get-MsolServicePrincipal.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ examples:
4343
summary: ""
4444
- title: 'Example 3: Get a service principal'
4545
code: |-
46-
PS C:\> Get-MsolServicePrincipal -AppPrincipalId 5e964d2f-e384-4292-ae55-dd24c89cc53b
46+
PS C:\> Get-MsolServicePrincipal -AppPrincipalId aaaaaaaa-bbbb-cccc-1111-222222222222
4747
description: |-
4848
This command gets a service principal that has a specific application principal ID.
4949
summary: ""

azureadps-2.0-preview/AzureAD/Add-AzureADMSFeatureRolloutPolicyDirectoryObject.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ with Seamless Single Sign-On or not, or whether Passthrough auth or not).
2626

2727
### Example 1: Adds a group to the cloud authentication roll-out policy in Azure AD.
2828
```
29-
PS C:\> Add-AzureADMSFeatureRolloutPolicyDirectoryObject -Id "a03b6d9e-6654-46e6-8d0a-8ed83c675ca9" -RefObjectId "0a1068c0-dbb6-4537-9db3-b48f3e31dd76"
29+
PS C:\> Add-AzureADMSFeatureRolloutPolicyDirectoryObject -Id "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" -RefObjectId "bbbbbbbb-1111-2222-3333-cccccccccccc"
3030
```
3131

3232
This command adds a group to the cloud authentication roll-out policy in Azure AD.

azureadps-2.0-preview/AzureAD/Add-AzureADMSFeatureRolloutPolicyDirectoryObject.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ syntaxes:
99
examples:
1010
- title: 'Example 1: Adds a group to the cloud authentication roll-out policy in Azure AD.'
1111
code: |-
12-
PS C:\> Add-AzureADMSFeatureRolloutPolicyDirectoryObject -Id "a03b6d9e-6654-46e6-8d0a-8ed83c675ca9" -RefObjectId "0a1068c0-dbb6-4537-9db3-b48f3e31dd76"
12+
PS C:\> Add-AzureADMSFeatureRolloutPolicyDirectoryObject -Id "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" -RefObjectId "bbbbbbbb-1111-2222-3333-cccccccccccc"
1313
description: |-
1414
This command adds a group to the cloud authentication roll-out policy in Azure AD.
1515
summary: ""

azureadps-2.0-preview/AzureAD/Add-AzureADMSServicePrincipalDelegatedPermissionClassification.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ The Add-AzureADMSServicePrincipalDelegatedPermissionClassification cmdlet create
2424

2525
### Example 1: Create Delegated Permission Classification
2626
```
27-
PS C:\> Add-AzureADMSServicePrincipalDelegatedPermissionClassification -ServicePrincipalId "95f56359-0165-4f80-bffb-c89d06cf2c6f" -PermissionId "205e70e5-aba6-4c52-a976-6d2d46c48043" -Classification Low -PermissionName "Sites.Read.All"
27+
PS C:\> Add-AzureADMSServicePrincipalDelegatedPermissionClassification -ServicePrincipalId "aaaaaaaa-bbbb-cccc-1111-222222222222" -PermissionId "205e70e5-aba6-4c52-a976-6d2d46c48043" -Classification Low -PermissionName "Sites.Read.All"
2828
2929
Classification : Low
3030
Id : 5XBeIKarUkypdm0tRsSAQwE

azureadps-2.0-preview/AzureAD/Add-AzureADMSServicePrincipalDelegatedPermissionClassification.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ syntaxes:
1414
examples:
1515
- title: 'Example 1: Create Delegated Permission Classification'
1616
code: |-
17-
PS C:\> Add-AzureADMSServicePrincipalDelegatedPermissionClassification -ServicePrincipalId "95f56359-0165-4f80-bffb-c89d06cf2c6f" -PermissionId "205e70e5-aba6-4c52-a976-6d2d46c48043" -Classification Low -PermissionName "Sites.Read.All"
17+
PS C:\> Add-AzureADMSServicePrincipalDelegatedPermissionClassification -ServicePrincipalId "aaaaaaaa-bbbb-cccc-1111-222222222222" -PermissionId "205e70e5-aba6-4c52-a976-6d2d46c48043" -Classification Low -PermissionName "Sites.Read.All"
1818
1919
Classification : Low
2020
Id : 5XBeIKarUkypdm0tRsSAQwE

azureadps-2.0-preview/AzureAD/Get-AzureADDirectoryRoleMember.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ The **Get-AzureADDirectoryRoleMember** cmdlet gets the members of a directory ro
2727

2828
### Example 1: Get members by role ID
2929
```
30-
PS C:\>Get-AzureADDirectoryRoleMember -ObjectId "67efd1ad-1046-4fb8-bb57-1d2e4f66c74e"
30+
PS C:\>Get-AzureADDirectoryRoleMember -ObjectId "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb"
3131
3232
ObjectId ObjectType
3333
-------- ----------

azureadps-2.0-preview/AzureAD/Get-AzureADDirectoryRoleMember.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ syntaxes:
1616
examples:
1717
- title: 'Example 1: Get members by role ID'
1818
code: |-
19-
PS C:\>Get-AzureADDirectoryRoleMember -ObjectId "67efd1ad-1046-4fb8-bb57-1d2e4f66c74e"
19+
PS C:\>Get-AzureADDirectoryRoleMember -ObjectId "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb"
2020
2121
ObjectId ObjectType
2222
-------- ----------

azureadps-2.0-preview/AzureAD/Get-AzureADMSRoleDefinition.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ RolePermissions : {class RolePermission {
6464
Condition:
6565
}
6666
}
67-
TemplateId : 332a8659-25b8-4b3e-b545-38b331c48b2b
67+
TemplateId : f2ef992c-3afb-46b9-b7cf-a126ee74c451
6868
Version :
6969
```
7070

@@ -85,7 +85,7 @@ RolePermissions : {class RolePermission {
8585
Condition:
8686
}
8787
}
88-
TemplateId : 332a8659-25b8-4b3e-b545-38b331c48b2b
88+
TemplateId : f2ef992c-3afb-46b9-b7cf-a126ee74c451
8989
Version :
9090
```
9191

@@ -119,7 +119,7 @@ RolePermissions : {class RolePermission {
119119
Condition:
120120
}
121121
}
122-
TemplateId : 332a8659-25b8-4b3e-b545-38b331c48b2b
122+
TemplateId : f2ef992c-3afb-46b9-b7cf-a126ee74c451
123123
Version :
124124
```
125125

azureadps-2.0-preview/AzureAD/Get-AzureADMSRoleDefinition.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ examples:
4646
Condition:
4747
}
4848
}
49-
TemplateId : 332a8659-25b8-4b3e-b545-38b331c48b2b
49+
TemplateId : f2ef992c-3afb-46b9-b7cf-a126ee74c451
5050
Version :
5151
description: ""
5252
summary: ""
@@ -67,7 +67,7 @@ examples:
6767
Condition:
6868
}
6969
}
70-
TemplateId : 332a8659-25b8-4b3e-b545-38b331c48b2b
70+
TemplateId : f2ef992c-3afb-46b9-b7cf-a126ee74c451
7171
Version :
7272
description: ""
7373
summary: ""
@@ -101,7 +101,7 @@ examples:
101101
Condition:
102102
}
103103
}
104-
TemplateId : 332a8659-25b8-4b3e-b545-38b331c48b2b
104+
TemplateId : f2ef992c-3afb-46b9-b7cf-a126ee74c451
105105
Version :
106106
description: ""
107107
summary: ""

azureadps-2.0-preview/AzureAD/Get-AzureADMSServicePrincipalDelegatedPermissionClassification.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ The Get-AzureADMSServicePrincipalDelegatedPermissionClassification cmdlet retrie
3131

3232
### Example 1: Get a list of delegated permission classifications
3333
```
34-
PS C:\> Get-AzureADMSServicePrincipalDelegatedPermissionClassification -ServicePrincipalId "95f56359-0165-4f80-bffb-c89d06cf2c6f"
34+
PS C:\> Get-AzureADMSServicePrincipalDelegatedPermissionClassification -ServicePrincipalId "aaaaaaaa-bbbb-cccc-1111-222222222222"
3535
3636
Classification : Low
3737
Id : 5XBeIKarUkypdm0tRsSAQwE
@@ -48,7 +48,7 @@ This command retrieves all delegated permission classifications from the service
4848

4949
### Example 2: Get a delegated permission classifications
5050
```
51-
PS C:\> Get-AzureADMSServicePrincipalDelegatedPermissionClassification -ServicePrincipalId "95f56359-0165-4f80-bffb-c89d06cf2c6f" -Id "5XBeIKarUkypdm0tRsSAQwE"
51+
PS C:\> Get-AzureADMSServicePrincipalDelegatedPermissionClassification -ServicePrincipalId "aaaaaaaa-bbbb-cccc-1111-222222222222" -Id "5XBeIKarUkypdm0tRsSAQwE"
5252
5353
Classification : Low
5454
Id : 5XBeIKarUkypdm0tRsSAQwE
@@ -60,7 +60,7 @@ This command retrieves the delegated permission classification by Id from the se
6060

6161
### Example 3: Get a delegated permission classification with filter
6262
```
63-
PS C:\> Get-AzureADMSServicePrincipalDelegatedPermissionClassification -ServicePrincipalId "95f56359-0165-4f80-bffb-c89d06cf2c6f" -Filter "PermissionName eq 'Sites.Read.All'"
63+
PS C:\> Get-AzureADMSServicePrincipalDelegatedPermissionClassification -ServicePrincipalId "aaaaaaaa-bbbb-cccc-1111-222222222222" -Filter "PermissionName eq 'Sites.Read.All'"
6464
6565
Classification : Low
6666
Id : 5XBeIKarUkypdm0tRsSAQwE

azureadps-2.0-preview/AzureAD/Get-AzureADMSServicePrincipalDelegatedPermissionClassification.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ syntaxes:
1818
examples:
1919
- title: 'Example 1: Get a list of delegated permission classifications'
2020
code: |-
21-
PS C:\> Get-AzureADMSServicePrincipalDelegatedPermissionClassification -ServicePrincipalId "95f56359-0165-4f80-bffb-c89d06cf2c6f"
21+
PS C:\> Get-AzureADMSServicePrincipalDelegatedPermissionClassification -ServicePrincipalId "aaaaaaaa-bbbb-cccc-1111-222222222222"
2222
2323
Classification : Low
2424
Id : 5XBeIKarUkypdm0tRsSAQwE
@@ -34,7 +34,7 @@ examples:
3434
summary: ""
3535
- title: 'Example 2: Get a delegated permission classifications'
3636
code: |-
37-
PS C:\> Get-AzureADMSServicePrincipalDelegatedPermissionClassification -ServicePrincipalId "95f56359-0165-4f80-bffb-c89d06cf2c6f" -Id "5XBeIKarUkypdm0tRsSAQwE"
37+
PS C:\> Get-AzureADMSServicePrincipalDelegatedPermissionClassification -ServicePrincipalId "aaaaaaaa-bbbb-cccc-1111-222222222222" -Id "5XBeIKarUkypdm0tRsSAQwE"
3838
3939
Classification : Low
4040
Id : 5XBeIKarUkypdm0tRsSAQwE
@@ -45,7 +45,7 @@ examples:
4545
summary: ""
4646
- title: 'Example 3: Get a delegated permission classification with filter'
4747
code: |-
48-
PS C:\> Get-AzureADMSServicePrincipalDelegatedPermissionClassification -ServicePrincipalId "95f56359-0165-4f80-bffb-c89d06cf2c6f" -Filter "PermissionName eq 'Sites.Read.All'"
48+
PS C:\> Get-AzureADMSServicePrincipalDelegatedPermissionClassification -ServicePrincipalId "aaaaaaaa-bbbb-cccc-1111-222222222222" -Filter "PermissionName eq 'Sites.Read.All'"
4949
5050
Classification : Low
5151
Id : 5XBeIKarUkypdm0tRsSAQwE

azureadps-2.0-preview/AzureAD/New-AzureADMSApplication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ PS C:\>New-AzureADMSApplication `
5959
-OptionalClaims @{ IdToken = [PSCustomObject]@{ Name = "claimName"; Source = "claimSource" } } `
6060
-ParentalControlSettings @{ LegalAgeGroupRule = "Block" } `
6161
-PublicClient @{ RedirectUris = "https://mynewapp.contoso.com/" } `
62-
-RequiredResourceAccess @{ ResourceAppId = "31111111-1111-1111-1111-111111111111"; ResourceAccess = [PSCustomObject]@{ Type = "Scope" } } `
62+
-RequiredResourceAccess @{ ResourceAppId = "00001111-aaaa-2222-bbbb-3333cccc4444"; ResourceAccess = [PSCustomObject]@{ Type = "Scope" } } `
6363
-SignInAudience AzureADandPersonalMicrosoftAccount `
6464
-Tags "mytag" `
6565
-TokenEncryptionKeyId "aaaaaaaa-0b0b-1c1c-2d2d-333333333333" `
@@ -144,7 +144,7 @@ PS C:\>New-AzureADMSApplication `
144144
145145
PublisherDomain :
146146
RequiredResourceAccess : {class RequiredResourceAccess {
147-
ResourceAppId: 31111111-1111-1111-1111-111111111111
147+
ResourceAppId: 00001111-aaaa-2222-bbbb-3333cccc4444
148148
ResourceAccess:
149149
System.Collections.Generic.List`1[Microsoft.Open.MSGraph.Model.ResourceAccess]
150150
}

azureadps-2.0-preview/AzureAD/New-AzureADMSApplication.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ examples:
9393
-OptionalClaims @{ IdToken = [PSCustomObject]@{ Name = "claimName"; Source = "claimSource" } } `
9494
-ParentalControlSettings @{ LegalAgeGroupRule = "Block" } `
9595
-PublicClient @{ RedirectUris = "https://mynewapp.contoso.com/" } `
96-
-RequiredResourceAccess @{ ResourceAppId = "31111111-1111-1111-1111-111111111111"; ResourceAccess = [PSCustomObject]@{ Type = "Scope" } } `
96+
-RequiredResourceAccess @{ ResourceAppId = "00001111-aaaa-2222-bbbb-3333cccc4444"; ResourceAccess = [PSCustomObject]@{ Type = "Scope" } } `
9797
-SignInAudience AzureADandPersonalMicrosoftAccount `
9898
-Tags "mytag" `
9999
-TokenEncryptionKeyId "aaaaaaaa-0b0b-1c1c-2d2d-333333333333" `
@@ -178,7 +178,7 @@ examples:
178178
179179
PublisherDomain :
180180
RequiredResourceAccess : {class RequiredResourceAccess {
181-
ResourceAppId: 31111111-1111-1111-1111-111111111111
181+
ResourceAppId: 00001111-aaaa-2222-bbbb-3333cccc4444
182182
ResourceAccess:
183183
System.Collections.Generic.List`1[Microsoft.Open.MSGraph.Model.ResourceAccess]
184184
}

azureadps-2.0-preview/AzureAD/New-AzureADMSRoleAssignment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ The New-AzureADMSRoleAssignment cmdlet creates an Azure Active Directory (Azure
2424

2525
### Example 1
2626
```powershell
27-
PS C:\> New-AzureADMSRoleAssignment -RoleDefinitionId 62e90356-69f5-4237-9190-012177145e10 -PrincipalId aaaaaaaa-bbbb-cccc-1111-222222222222 -ResourceScope '/'
27+
PS C:\> New-AzureADMSRoleAssignment -RoleDefinitionId f2ef992c-3afb-46b9-b7cf-a126ee74c451 -PrincipalId aaaaaaaa-bbbb-cccc-1111-222222222222 -ResourceScope '/'
2828
```
2929

3030
This command creates a new role assignment.

azureadps-2.0-preview/AzureAD/New-AzureADMSRoleAssignment.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ syntaxes:
1717
examples:
1818
- title: Example 1
1919
code: |-
20-
PS C:\> New-AzureADMSRoleAssignment -RoleDefinitionId 62e90356-69f5-4237-9190-012177145e10 -PrincipalId aaaaaaaa-bbbb-cccc-1111-222222222222 -ResourceScope '/'
20+
PS C:\> New-AzureADMSRoleAssignment -RoleDefinitionId f2ef992c-3afb-46b9-b7cf-a126ee74c451 -PrincipalId aaaaaaaa-bbbb-cccc-1111-222222222222 -ResourceScope '/'
2121
description: |-
2222
This command creates a new role assignment.
2323
summary: ""

azureadps-2.0-preview/AzureAD/New-AzureADMSRoleDefinition.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ RolePermissions : {class RolePermission {
5151
Condition:
5252
}
5353
}
54-
TemplateId : 4dd5aa9c-cf4d-4895-a993-740d342802b9
54+
TemplateId : f2ef992c-3afb-46b9-b7cf-a126ee74c451
5555
Version :
5656
```
5757

azureadps-2.0-preview/AzureAD/New-AzureADMSRoleDefinition.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ examples:
4646
Condition:
4747
}
4848
}
49-
TemplateId : 4dd5aa9c-cf4d-4895-a993-740d342802b9
49+
TemplateId : f2ef992c-3afb-46b9-b7cf-a126ee74c451
5050
Version :
5151
description: |-
5252
This command creates a new role definition in AzureAD.

azureadps-2.0-preview/AzureAD/Remove-AzureADMSFeatureRolloutPolicyDirectoryObject.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ federation).
2626

2727
### Example 1: Removes a group from the cloud authentication roll-out policy from Azure AD.
2828
```
29-
PS C:\> Remove-AzureADMSFeatureRolloutPolicyDirectoryObject -Id "a03b6d9e-6654-46e6-8d0a-8ed83c675ca9" -ObjectId "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb"
29+
PS C:\> Remove-AzureADMSFeatureRolloutPolicyDirectoryObject -Id "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" -ObjectId "bbbbbbbb-1111-2222-3333-cccccccccccc"
3030
```
3131

3232
This command removes a group from the cloud authentication roll-out policy from Azure AD.

azureadps-2.0-preview/AzureAD/Remove-AzureADMSFeatureRolloutPolicyDirectoryObject.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ syntaxes:
99
examples:
1010
- title: 'Example 1: Removes a group from the cloud authentication roll-out policy from Azure AD.'
1111
code: |-
12-
PS C:\> Remove-AzureADMSFeatureRolloutPolicyDirectoryObject -Id "a03b6d9e-6654-46e6-8d0a-8ed83c675ca9" -ObjectId "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb"
12+
PS C:\> Remove-AzureADMSFeatureRolloutPolicyDirectoryObject -Id "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" -ObjectId "bbbbbbbb-1111-2222-3333-cccccccccccc"
1313
description: |-
1414
This command removes a group from the cloud authentication roll-out policy from Azure AD.
1515
summary: ""

azureadps-2.0-preview/AzureAD/Remove-AzureADMSRoleDefinition.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ The Remove-AzureADMSRoleDefinition cmdlet removes a role definition from Azure A
2323

2424
### Example 1
2525
```powershell
26-
PS C:\> Remove-AzureADMSRoleDefinition -Id 62e90894-69f5-4237-9190-012177145e10
26+
PS C:\> Remove-AzureADMSRoleDefinition -Id f2ef992c-3afb-46b9-b7cf-a126ee74c451
2727
```
2828

2929
This command removes the specified role definition from AzureAD.

azureadps-2.0-preview/AzureAD/Remove-AzureADMSRoleDefinition.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ syntaxes:
1414
examples:
1515
- title: Example 1
1616
code: |-
17-
PS C:\> Remove-AzureADMSRoleDefinition -Id 62e90894-69f5-4237-9190-012177145e10
17+
PS C:\> Remove-AzureADMSRoleDefinition -Id f2ef992c-3afb-46b9-b7cf-a126ee74c451
1818
description: |-
1919
This command removes the specified role definition from AzureAD.
2020
summary: ""

azureadps-2.0-preview/AzureAD/Remove-AzureADMSServicePrincipalDelegatedPermissionClassification.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ The Remove-AzureADMSServicePrincipalDelegatedPermissionClassification cmdlet del
2424

2525
### Example 1: Remove a delegated permission classifications
2626
```
27-
PS C:\> Remove-AzureADMSServicePrincipalDelegatedPermissionClassification -ServicePrincipalId "95f56359-0165-4f80-bffb-c89d06cf2c6f" -Id "5XBeIKarUkypdm0tRsSAQwE"
27+
PS C:\> Remove-AzureADMSServicePrincipalDelegatedPermissionClassification -ServicePrincipalId "aaaaaaaa-bbbb-cccc-1111-222222222222" -Id "5XBeIKarUkypdm0tRsSAQwE"
2828
```
2929

3030
This command delete the delegated permission classification by Id from the service principal.

azureadps-2.0-preview/AzureAD/Remove-AzureADMSServicePrincipalDelegatedPermissionClassification.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ syntaxes:
1111
examples:
1212
- title: 'Example 1: Remove a delegated permission classifications'
1313
code: |-
14-
PS C:\> Remove-AzureADMSServicePrincipalDelegatedPermissionClassification -ServicePrincipalId "95f56359-0165-4f80-bffb-c89d06cf2c6f" -Id "5XBeIKarUkypdm0tRsSAQwE"
14+
PS C:\> Remove-AzureADMSServicePrincipalDelegatedPermissionClassification -ServicePrincipalId "aaaaaaaa-bbbb-cccc-1111-222222222222" -Id "5XBeIKarUkypdm0tRsSAQwE"
1515
description: |-
1616
This command delete the delegated permission classification by Id from the service principal.
1717
summary: ""

azureadps-2.0-preview/AzureAD/Set-AzureADMSApplication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ PS C:\>Set-AzureADMSApplication -ObjectId aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb `
4949
-OptionalClaims @{ IdToken = [PSCustomObject]@{ Name = "claimName"; Source = "claimSource" } } `
5050
-ParentalControlSettings @{ LegalAgeGroupRule = "Block" } `
5151
-PublicClient @{ RedirectUris = "https://mynewapp.contoso.com/" } `
52-
-RequiredResourceAccess @{ ResourceAppId = "31111111-1111-1111-1111-111111111111"; ResourceAccess = [PSCustomObject]@{ Type = "Scope" } } `
52+
-RequiredResourceAccess @{ ResourceAppId = "00001111-aaaa-2222-bbbb-3333cccc4444"; ResourceAccess = [PSCustomObject]@{ Type = "Scope" } } `
5353
-SignInAudience AzureADandPersonalMicrosoftAccount `
5454
-Tags "mytag" `
5555
-TokenEncryptionKeyId "aaaaaaaa-0b0b-1c1c-2d2d-333333333333" `

azureadps-2.0-preview/AzureAD/Set-AzureADMSApplication.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ examples:
8282
-OptionalClaims @{ IdToken = [PSCustomObject]@{ Name = "claimName"; Source = "claimSource" } } `
8383
-ParentalControlSettings @{ LegalAgeGroupRule = "Block" } `
8484
-PublicClient @{ RedirectUris = "https://mynewapp.contoso.com/" } `
85-
-RequiredResourceAccess @{ ResourceAppId = "31111111-1111-1111-1111-111111111111"; ResourceAccess = [PSCustomObject]@{ Type = "Scope" } } `
85+
-RequiredResourceAccess @{ ResourceAppId = "00001111-aaaa-2222-bbbb-3333cccc4444"; ResourceAccess = [PSCustomObject]@{ Type = "Scope" } } `
8686
-SignInAudience AzureADandPersonalMicrosoftAccount `
8787
-Tags "mytag" `
8888
-TokenEncryptionKeyId "aaaaaaaa-0b0b-1c1c-2d2d-333333333333" `

0 commit comments

Comments
 (0)