From 71262d675ac67a7f738fe595eea9dbdfc679ca29 Mon Sep 17 00:00:00 2001 From: Microsoft Graph DevX Tooling Date: Thu, 19 Oct 2023 13:00:17 +0000 Subject: [PATCH] Update generated files with build 127164 --- .../CallRecords/Model/ClientUserAgent.php | 4 +- .../CallRecords/Model/DirectRoutingLogRow.php | 8 +- .../Model/PstnBlockedUsersLogRow.php | 8 +- .../CallRecords/Model/PstnCallLogRow.php | 8 +- .../Model/PstnOnlineMeetingDialoutReport.php | 8 +- .../Graph/CallRecords/Model/SmsLogRow.php | 8 +- .../Model/CustomTaskExtension.php | 8 +- .../Model/TaskProcessingResult.php | 4 +- .../Model/Workflow.php | 4 +- .../Model/AggregatedInboundStatistics.php | 8 +- .../Model/InboundActivityResults.php | 8 +- .../Model/UserMatchingSetting.php | 4 +- .../Model/AggregatedPolicyCompliance.php | 4 +- .../Graph/ManagedTenants/Model/AuditEvent.php | 4 +- .../Model/CloudPcConnection.php | 4 +- .../ManagedTenants/Model/CloudPcDevice.php | 4 +- .../CredentialUserRegistrationsSummary.php | 4 +- ...iceCompliancePolicySettingStateSummary.php | 4 +- .../Model/ManagedDeviceCompliance.php | 4 +- .../Model/ManagedDeviceComplianceTrend.php | 4 +- .../Model/ManagedTenantOperationError.php | 4 +- ...ManagementActionTenantDeploymentStatus.php | 4 +- .../Graph/ManagedTenants/Model/MyRole.php | 4 +- .../Graph/ManagedTenants/Model/Tenant.php | 4 +- .../Model/TenantCustomizedInformation.php | 4 +- .../Model/TenantDetailedInformation.php | 4 +- .../Graph/ManagedTenants/Model/TenantInfo.php | 4 +- .../Model/WindowsDeviceMalwareState.php | 4 +- .../Model/WindowsProtectionState.php | 4 +- .../Graph/Model/AadUserConversationMember.php | 4 +- .../Model/AadUserConversationMemberResult.php | 4 +- .../Model/AadUserNotificationRecipient.php | 4 +- .../Model/AccessPackageAssignmentPolicy.php | 12 +- .../Graph/Model/AccessPackageResource.php | 8 +- .../AccessPackageResourceEnvironment.php | 4 +- .../Model/AccessReviewScheduleSettings.php | 4 +- .../Microsoft/Graph/Model/AccessReviewSet.php | 4 +- .../Graph/Model/AccessReviewStage.php | 4 +- .../Graph/Model/AccessReviewStageSettings.php | 8 +- .../Graph/Model/AdministrativeUnit.php | 4 +- src/Beta/Microsoft/Graph/Model/Agreement.php | 4 +- .../Graph/Model/AgreementFileLocalization.php | 4 +- src/Beta/Microsoft/Graph/Model/Alert.php | 4 +- .../Graph/Model/AllAccountsWithAccess.php | 11 ++ .../Microsoft/Graph/Model/AllInboundPorts.php | 11 ++ .../Microsoft/Graph/Model/ApiApplication.php | 4 +- .../Microsoft/Graph/Model/AppIdentity.php | 8 +- .../Microsoft/Graph/Model/Application.php | 44 ++--- .../Model/AssignedComputeInstanceDetails.php | 86 +++++++++ .../Graph/Model/AttackSimulationUser.php | 4 +- .../Graph/Model/AuditUserIdentity.php | 4 +- .../Microsoft/Graph/Model/Authentication.php | 28 +++ ...thenticationMethodFeatureConfiguration.php | 4 +- .../Model/AuthenticationMethodPlatform.php | 39 ++++ ...henticationMethodsRegistrationCampaign.php | 32 ++- ...thodsRegistrationCampaignIncludeTarget.php | 4 +- .../Model/AuthenticationRequirementPolicy.php | 4 +- .../Model/AuthenticationStrengthPolicy.php | 4 +- .../Graph/Model/AuthorizationInfo.php | 4 +- .../Graph/Model/AuthorizationPolicy.php | 4 +- .../Graph/Model/AuthorizationSystemInfo.php | 31 +++ .../Graph/Model/AuthorizationSystemType.php | 36 ++++ .../Microsoft/Graph/Model/AwsAccessKey.php | 58 ++++++ .../Microsoft/Graph/Model/AwsAccessType.php | 37 ++++ .../Microsoft/Graph/Model/AwsEc2Instance.php | 58 ++++++ .../Model/AwsExternalSystemAccessFinding.php | 174 +++++++++++++++++ .../AwsExternalSystemAccessRoleFinding.php | 116 +++++++++++ src/Beta/Microsoft/Graph/Model/AwsGroup.php | 27 +++ ...sIdentityAccessManagementKeyAgeFinding.php | 182 ++++++++++++++++++ ...dentityAccessManagementKeyUsageFinding.php | 182 ++++++++++++++++++ src/Beta/Microsoft/Graph/Model/AwsLambda.php | 58 ++++++ .../AwsSecretInformationAccessFinding.php | 151 +++++++++++++++ .../Model/AwsSecretInformationWebServices.php | 37 ++++ .../AwsSecurityToolAdministrationFinding.php | 151 +++++++++++++++ .../Model/AwsSecurityToolWebServices.php | 40 ++++ .../Microsoft/Graph/Model/AzureAccessType.php | 35 ++++ .../Model/AzureActiveDirectoryTenant.php | 8 +- .../Model/AzureAdTokenAuthentication.php | 4 +- .../Microsoft/Graph/Model/AzureEncryption.php | 36 ++++ src/Beta/Microsoft/Graph/Model/AzureGroup.php | 27 +++ .../Graph/Model/AzureServerlessFunction.php | 58 ++++++ .../Graph/Model/BitlockerRecoveryKey.php | 4 +- src/Beta/Microsoft/Graph/Model/Channel.php | 4 +- src/Beta/Microsoft/Graph/Model/CloudPC.php | 4 +- .../Graph/Model/CloudPcAuditActor.php | 8 +- .../Graph/Model/CloudPcAuditEvent.php | 4 +- .../Model/CloudPcDomainJoinConfiguration.php | 12 +- .../Model/CloudPcOnPremisesConnection.php | 4 +- .../Model/CloudPcOrganizationSettings.php | 4 +- .../Graph/Model/CloudPcProvisioningPolicy.php | 12 +- .../Graph/Model/CloudPcUserSetting.php | 4 +- .../Graph/Model/ConditionalAccessFilter.php | 4 +- .../ConditionalAccessSessionControls.php | 4 +- .../CrossCloudAzureActiveDirectoryTenant.php | 8 +- .../Graph/Model/CrossTenantAccessPolicy.php | 8 +- ...TenantAccessPolicyConfigurationDefault.php | 20 +- ...TenantAccessPolicyConfigurationPartner.php | 20 +- .../CrossTenantAccessPolicyInboundTrust.php | 12 +- .../CrossTenantIdentitySyncPolicyPartner.php | 8 +- .../Graph/Model/CustomCalloutExtension.php | 4 +- .../CustomExtensionCallbackConfiguration.php | 4 +- .../CustomExtensionClientConfiguration.php | 8 +- .../Model/DelegatedAdminAccessContainer.php | 4 +- .../Graph/Model/DelegatedAdminCustomer.php | 8 +- ...edAdminRelationshipCustomerParticipant.php | 8 +- src/Beta/Microsoft/Graph/Model/Device.php | 12 +- ...ationChoiceSettingCollectionDefinition.php | 8 +- ...ntConfigurationChoiceSettingDefinition.php | 8 +- ...onfigurationReferredSettingInformation.php | 4 +- ...ementConfigurationSettingApplicability.php | 4 +- ...entConfigurationSettingGroupDefinition.php | 4 +- ...ationSimpleSettingCollectionDefinition.php | 8 +- ...figurationStringSettingValueDefinition.php | 12 +- .../EncryptedAwsStorageBucketFinding.php | 89 +++++++++ .../EncryptedAzureStorageAccountFinding.php | 89 +++++++++ .../EncryptedGcpStorageBucketFinding.php | 120 ++++++++++++ .../Model/EnumeratedAccountsWithAccess.php | 11 ++ .../Graph/Model/EnumeratedInboundPorts.php | 11 ++ .../Model/ExternalSystemAccessMethods.php | 35 ++++ ...nallyAccessibleAwsStorageBucketFinding.php | 120 ++++++++++++ ...llyAccessibleAzureBlobContainerFinding.php | 120 ++++++++++++ ...nallyAccessibleGcpStorageBucketFinding.php | 120 ++++++++++++ src/Beta/Microsoft/Graph/Model/Finding.php | 58 ++++++ .../Microsoft/Graph/Model/GcpAccessType.php | 36 ++++ .../Graph/Model/GcpCloudFunction.php | 58 ++++++ .../Microsoft/Graph/Model/GcpEncryption.php | 35 ++++ src/Beta/Microsoft/Graph/Model/GcpGroup.php | 27 +++ src/Beta/Microsoft/Graph/Model/Group.php | 24 +-- .../Microsoft/Graph/Model/GroupMembers.php | 8 +- .../Model/GroupWritebackConfiguration.php | 4 +- src/Beta/Microsoft/Graph/Model/IamStatus.php | 36 ++++ .../Graph/Model/IdentityContainer.php | 4 +- .../Microsoft/Graph/Model/IdentityFinding.php | 151 +++++++++++++++ .../Graph/Model/IdentityGovernance.php | 31 +++ .../Graph/Model/IdentityProtectionRoot.php | 16 +- ...ntitySecurityDefaultsEnforcementPolicy.php | 4 +- .../Microsoft/Graph/Model/IdentitySet.php | 12 +- .../Graph/Model/ImpactedResource.php | 16 +- .../Model/InactiveAwsResourceFinding.php | 27 +++ .../Graph/Model/InactiveAwsRoleFinding.php | 27 +++ .../InactiveAzureServicePrincipalFinding.php | 27 +++ .../InactiveGcpServiceAccountFinding.php | 27 +++ .../Graph/Model/InactiveGroupFinding.php | 120 ++++++++++++ .../InactiveServerlessFunctionFinding.php | 27 +++ .../Graph/Model/InactiveUserFinding.php | 27 +++ .../InactiveUsersByApplicationMetricBase.php | 27 +++ .../Graph/Model/InsightsSettings.php | 4 +- .../Graph/Model/InternalDomainFederation.php | 16 +- .../Model/InvalidLicenseAlertIncident.php | 4 +- src/Beta/Microsoft/Graph/Model/KeyValue.php | 8 +- ...MicrosoftApplicationDataAccessSettings.php | 8 +- .../Graph/Model/MobilityManagementPolicy.php | 4 +- ...ltiTenantOrganizationJoinRequestRecord.php | 4 +- .../Model/MultiTenantOrganizationMember.php | 4 +- ...ganizationPartnerConfigurationTemplate.php | 16 +- .../NoMfaOnRoleActivationAlertIncident.php | 4 +- .../Microsoft/Graph/Model/ObjectIdentity.php | 4 +- ...remisesDirectorySynchronizationFeature.php | 12 +- .../Graph/Model/OnPremisesPublishing.php | 8 +- .../Model/OnPremisesPublishingProfile.php | 4 +- .../Model/OpenAwsSecurityGroupFinding.php | 144 ++++++++++++++ .../Model/OpenIdConnectIdentityProvider.php | 4 +- .../Graph/Model/OpenIdConnectProvider.php | 4 +- .../OpenNetworkAzureSecurityGroupFinding.php | 117 +++++++++++ .../OrganizationalBrandingProperties.php | 8 +- .../Graph/Model/OrganizerMeetingInfo.php | 4 +- .../Graph/Model/OutboundSharedUserProfile.php | 4 +- .../OverprovisionedAwsResourceFinding.php | 27 +++ .../Model/OverprovisionedAwsRoleFinding.php | 27 +++ ...rovisionedAzureServicePrincipalFinding.php | 27 +++ ...verprovisionedGcpServiceAccountFinding.php | 27 +++ ...erprovisionedServerlessFunctionFinding.php | 27 +++ .../Model/OverprovisionedUserFinding.php | 27 +++ .../Graph/Model/PasswordCredential.php | 4 +- .../Model/PermissionGrantConditionSet.php | 4 +- .../Graph/Model/PermissionsAnalytics.php | 83 ++++++++ .../Model/PermissionsAnalyticsAggregation.php | 120 ++++++++++++ .../PermissionsCreepIndexDistribution.php | 182 ++++++++++++++++++ ...PlatformCredentialAuthenticationMethod.php | 178 +++++++++++++++++ src/Beta/Microsoft/Graph/Model/PolicyRoot.php | 32 +-- .../Graph/Model/PrivateLinkDetails.php | 8 +- .../Graph/Model/PrivilegeEscalation.php | 137 +++++++++++++ .../PrivilegeEscalationAwsResourceFinding.php | 27 +++ .../PrivilegeEscalationAwsRoleFinding.php | 27 +++ .../Model/PrivilegeEscalationFinding.php | 148 ++++++++++++++ ...legeEscalationGcpServiceAccountFinding.php | 27 +++ .../Model/PrivilegeEscalationUserFinding.php | 27 +++ ...retInformationAccessAwsResourceFinding.php | 27 +++ .../SecretInformationAccessAwsRoleFinding.php | 27 +++ ...tionAccessAwsServerlessFunctionFinding.php | 27 +++ .../SecretInformationAccessAwsUserFinding.php | 27 +++ ...ityToolAwsResourceAdministratorFinding.php | 27 +++ ...ecurityToolAwsRoleAdministratorFinding.php | 27 +++ ...ServerlessFunctionAdministratorFinding.php | 27 +++ ...ecurityToolAwsUserAdministratorFinding.php | 27 +++ .../Model/ServiceLevelAgreementAttainment.php | 4 +- .../Graph/Model/ServiceLevelAgreementRoot.php | 4 +- .../Graph/Model/ServicePrincipal.php | 40 ++-- src/Beta/Microsoft/Graph/Model/SignIn.php | 60 +++--- .../Microsoft/Graph/Model/SignInActivity.php | 8 +- src/Beta/Microsoft/Graph/Model/SingleUser.php | 8 +- ...SkypeForBusinessUserConversationMember.php | 4 +- .../Model/SmsAuthenticationMethodTarget.php | 4 +- .../Graph/Model/StringKeyLongValuePair.php | 4 +- .../Graph/Model/SuperAwsResourceFinding.php | 27 +++ .../Graph/Model/SuperAwsRoleFinding.php | 27 +++ .../SuperAzureServicePrincipalFinding.php | 27 +++ .../Model/SuperGcpServiceAccountFinding.php | 27 +++ .../Model/SuperServerlessFunctionFinding.php | 27 +++ .../Graph/Model/SuperUserFinding.php | 27 +++ .../Graph/Model/SynchronizationJobSubject.php | 8 +- .../Model/SystemCredentialPreferences.php | 4 +- src/Beta/Microsoft/Graph/Model/Team.php | 4 +- src/Beta/Microsoft/Graph/Model/TeamInfo.php | 4 +- .../Graph/Model/TenantInformation.php | 16 +- .../Microsoft/Graph/Model/TenantReference.php | 4 +- .../Graph/Model/TenantRelationship.php | 4 +- .../Graph/Model/TermsOfUseContainer.php | 4 +- .../Microsoft/Graph/Model/TiIndicator.php | 4 +- .../Model/UnenforcedMfaAwsUserFinding.php | 27 +++ ...chineWithAwsStorageBucketAccessFinding.php | 178 +++++++++++++++++ .../WindowsAppXAppAssignmentSettings.php | 4 +- .../Networkaccess/Model/EntitiesSummary.php | 4 +- .../SecurityNamespace/Model/Incident.php | 4 +- .../SecurityNamespace/Model/UserAccount.php | 12 +- 225 files changed, 5633 insertions(+), 518 deletions(-) create mode 100644 src/Beta/Microsoft/Graph/Model/AssignedComputeInstanceDetails.php create mode 100644 src/Beta/Microsoft/Graph/Model/AuthenticationMethodPlatform.php create mode 100644 src/Beta/Microsoft/Graph/Model/AuthorizationSystemType.php create mode 100644 src/Beta/Microsoft/Graph/Model/AwsAccessKey.php create mode 100644 src/Beta/Microsoft/Graph/Model/AwsAccessType.php create mode 100644 src/Beta/Microsoft/Graph/Model/AwsEc2Instance.php create mode 100644 src/Beta/Microsoft/Graph/Model/AwsExternalSystemAccessFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/AwsExternalSystemAccessRoleFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/AwsGroup.php create mode 100644 src/Beta/Microsoft/Graph/Model/AwsIdentityAccessManagementKeyAgeFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/AwsIdentityAccessManagementKeyUsageFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/AwsLambda.php create mode 100644 src/Beta/Microsoft/Graph/Model/AwsSecretInformationAccessFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/AwsSecretInformationWebServices.php create mode 100644 src/Beta/Microsoft/Graph/Model/AwsSecurityToolAdministrationFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/AwsSecurityToolWebServices.php create mode 100644 src/Beta/Microsoft/Graph/Model/AzureAccessType.php create mode 100644 src/Beta/Microsoft/Graph/Model/AzureEncryption.php create mode 100644 src/Beta/Microsoft/Graph/Model/AzureGroup.php create mode 100644 src/Beta/Microsoft/Graph/Model/AzureServerlessFunction.php create mode 100644 src/Beta/Microsoft/Graph/Model/EncryptedAwsStorageBucketFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/EncryptedAzureStorageAccountFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/EncryptedGcpStorageBucketFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/ExternalSystemAccessMethods.php create mode 100644 src/Beta/Microsoft/Graph/Model/ExternallyAccessibleAwsStorageBucketFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/ExternallyAccessibleAzureBlobContainerFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/ExternallyAccessibleGcpStorageBucketFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/Finding.php create mode 100644 src/Beta/Microsoft/Graph/Model/GcpAccessType.php create mode 100644 src/Beta/Microsoft/Graph/Model/GcpCloudFunction.php create mode 100644 src/Beta/Microsoft/Graph/Model/GcpEncryption.php create mode 100644 src/Beta/Microsoft/Graph/Model/GcpGroup.php create mode 100644 src/Beta/Microsoft/Graph/Model/IamStatus.php create mode 100644 src/Beta/Microsoft/Graph/Model/IdentityFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/InactiveAwsResourceFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/InactiveAwsRoleFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/InactiveAzureServicePrincipalFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/InactiveGcpServiceAccountFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/InactiveGroupFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/InactiveServerlessFunctionFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/InactiveUserFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/OpenAwsSecurityGroupFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/OpenNetworkAzureSecurityGroupFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/OverprovisionedAwsResourceFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/OverprovisionedAwsRoleFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/OverprovisionedAzureServicePrincipalFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/OverprovisionedGcpServiceAccountFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/OverprovisionedServerlessFunctionFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/OverprovisionedUserFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/PermissionsAnalytics.php create mode 100644 src/Beta/Microsoft/Graph/Model/PermissionsAnalyticsAggregation.php create mode 100644 src/Beta/Microsoft/Graph/Model/PermissionsCreepIndexDistribution.php create mode 100644 src/Beta/Microsoft/Graph/Model/PlatformCredentialAuthenticationMethod.php create mode 100644 src/Beta/Microsoft/Graph/Model/PrivilegeEscalation.php create mode 100644 src/Beta/Microsoft/Graph/Model/PrivilegeEscalationAwsResourceFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/PrivilegeEscalationAwsRoleFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/PrivilegeEscalationFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/PrivilegeEscalationGcpServiceAccountFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/PrivilegeEscalationUserFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/SecretInformationAccessAwsResourceFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/SecretInformationAccessAwsRoleFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/SecretInformationAccessAwsServerlessFunctionFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/SecretInformationAccessAwsUserFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/SecurityToolAwsResourceAdministratorFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/SecurityToolAwsRoleAdministratorFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/SecurityToolAwsServerlessFunctionAdministratorFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/SecurityToolAwsUserAdministratorFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/SuperAwsResourceFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/SuperAwsRoleFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/SuperAzureServicePrincipalFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/SuperGcpServiceAccountFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/SuperServerlessFunctionFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/SuperUserFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/UnenforcedMfaAwsUserFinding.php create mode 100644 src/Beta/Microsoft/Graph/Model/VirtualMachineWithAwsStorageBucketAccessFinding.php diff --git a/src/Beta/Microsoft/Graph/CallRecords/Model/ClientUserAgent.php b/src/Beta/Microsoft/Graph/CallRecords/Model/ClientUserAgent.php index 55117b81c8e..863032810c6 100644 --- a/src/Beta/Microsoft/Graph/CallRecords/Model/ClientUserAgent.php +++ b/src/Beta/Microsoft/Graph/CallRecords/Model/ClientUserAgent.php @@ -25,7 +25,7 @@ class ClientUserAgent extends UserAgent { /** * Gets the azureADAppId - * The unique identifier of the Azure AD application used by this endpoint. + * The unique identifier of the Microsoft Entra application used by this endpoint. * * @return string|null The azureADAppId */ @@ -40,7 +40,7 @@ public function getAzureADAppId() /** * Sets the azureADAppId - * The unique identifier of the Azure AD application used by this endpoint. + * The unique identifier of the Microsoft Entra application used by this endpoint. * * @param string $val The value of the azureADAppId * diff --git a/src/Beta/Microsoft/Graph/CallRecords/Model/DirectRoutingLogRow.php b/src/Beta/Microsoft/Graph/CallRecords/Model/DirectRoutingLogRow.php index 0fd961e6b51..4f04e0f59fb 100644 --- a/src/Beta/Microsoft/Graph/CallRecords/Model/DirectRoutingLogRow.php +++ b/src/Beta/Microsoft/Graph/CallRecords/Model/DirectRoutingLogRow.php @@ -633,7 +633,7 @@ public function setUserDisplayName($val) } /** * Gets the userId - * The unique identifier (GUID) of the user in Azure Active Directory. This and other user info is null/empty for bot call types. + * The unique identifier (GUID) of the user in Microsoft Entra ID. This and other user info is null/empty for bot call types. * * @return string|null The userId */ @@ -648,7 +648,7 @@ public function getUserId() /** * Sets the userId - * The unique identifier (GUID) of the user in Azure Active Directory. This and other user info is null/empty for bot call types. + * The unique identifier (GUID) of the user in Microsoft Entra ID. This and other user info is null/empty for bot call types. * * @param string $val The value of the userId * @@ -661,7 +661,7 @@ public function setUserId($val) } /** * Gets the userPrincipalName - * The user principal name (sign-in name) in Azure Active Directory, is usually the same as the user's SIP address, and can be same as the user's e-mail address. + * The user principal name (sign-in name) in Microsoft Entra ID, is usually the same as the user's SIP address, and can be same as the user's e-mail address. * * @return string|null The userPrincipalName */ @@ -676,7 +676,7 @@ public function getUserPrincipalName() /** * Sets the userPrincipalName - * The user principal name (sign-in name) in Azure Active Directory, is usually the same as the user's SIP address, and can be same as the user's e-mail address. + * The user principal name (sign-in name) in Microsoft Entra ID, is usually the same as the user's SIP address, and can be same as the user's e-mail address. * * @param string $val The value of the userPrincipalName * diff --git a/src/Beta/Microsoft/Graph/CallRecords/Model/PstnBlockedUsersLogRow.php b/src/Beta/Microsoft/Graph/CallRecords/Model/PstnBlockedUsersLogRow.php index 5fd1f7e4400..2d15c15acc5 100644 --- a/src/Beta/Microsoft/Graph/CallRecords/Model/PstnBlockedUsersLogRow.php +++ b/src/Beta/Microsoft/Graph/CallRecords/Model/PstnBlockedUsersLogRow.php @@ -175,7 +175,7 @@ public function setUserDisplayName($val) } /** * Gets the userId - * The unique identifier (GUID) of the user in Azure Active Directory. + * The unique identifier (GUID) of the user in Microsoft Entra ID. * * @return string|null The userId */ @@ -190,7 +190,7 @@ public function getUserId() /** * Sets the userId - * The unique identifier (GUID) of the user in Azure Active Directory. + * The unique identifier (GUID) of the user in Microsoft Entra ID. * * @param string $val The value of the userId * @@ -203,7 +203,7 @@ public function setUserId($val) } /** * Gets the userPrincipalName - * The user principal name (sign-in name) in Azure Active Directory. This is usually the same as the user's SIP address, and can be same as the user's e-mail address. + * The user principal name (sign-in name) in Microsoft Entra ID. This is usually the same as the user's SIP address, and can be same as the user's e-mail address. * * @return string|null The userPrincipalName */ @@ -218,7 +218,7 @@ public function getUserPrincipalName() /** * Sets the userPrincipalName - * The user principal name (sign-in name) in Azure Active Directory. This is usually the same as the user's SIP address, and can be same as the user's e-mail address. + * The user principal name (sign-in name) in Microsoft Entra ID. This is usually the same as the user's SIP address, and can be same as the user's e-mail address. * * @param string $val The value of the userPrincipalName * diff --git a/src/Beta/Microsoft/Graph/CallRecords/Model/PstnCallLogRow.php b/src/Beta/Microsoft/Graph/CallRecords/Model/PstnCallLogRow.php index a4b2d95b0e2..89abcb34475 100644 --- a/src/Beta/Microsoft/Graph/CallRecords/Model/PstnCallLogRow.php +++ b/src/Beta/Microsoft/Graph/CallRecords/Model/PstnCallLogRow.php @@ -778,7 +778,7 @@ public function setUserDisplayName($val) } /** * Gets the userId - * The unique identifier (GUID) of the user in Azure Active Directory. This and other user info will be null/empty for bot call types (ucapin, ucapout). + * The unique identifier (GUID) of the user in Microsoft Entra ID. This and other user info will be null/empty for bot call types (ucapin, ucapout). * * @return string|null The userId */ @@ -793,7 +793,7 @@ public function getUserId() /** * Sets the userId - * The unique identifier (GUID) of the user in Azure Active Directory. This and other user info will be null/empty for bot call types (ucapin, ucapout). + * The unique identifier (GUID) of the user in Microsoft Entra ID. This and other user info will be null/empty for bot call types (ucapin, ucapout). * * @param string $val The value of the userId * @@ -806,7 +806,7 @@ public function setUserId($val) } /** * Gets the userPrincipalName - * The user principal name (sign-in name) in Azure Active Directory. This is usually the same as the user's SIP address, and can be same as the user's e-mail address. + * The user principal name (sign-in name) in Microsoft Entra ID. This is usually the same as the user's SIP address, and can be same as the user's e-mail address. * * @return string|null The userPrincipalName */ @@ -821,7 +821,7 @@ public function getUserPrincipalName() /** * Sets the userPrincipalName - * The user principal name (sign-in name) in Azure Active Directory. This is usually the same as the user's SIP address, and can be same as the user's e-mail address. + * The user principal name (sign-in name) in Microsoft Entra ID. This is usually the same as the user's SIP address, and can be same as the user's e-mail address. * * @param string $val The value of the userPrincipalName * diff --git a/src/Beta/Microsoft/Graph/CallRecords/Model/PstnOnlineMeetingDialoutReport.php b/src/Beta/Microsoft/Graph/CallRecords/Model/PstnOnlineMeetingDialoutReport.php index 5965d89926d..56feb7be0ef 100644 --- a/src/Beta/Microsoft/Graph/CallRecords/Model/PstnOnlineMeetingDialoutReport.php +++ b/src/Beta/Microsoft/Graph/CallRecords/Model/PstnOnlineMeetingDialoutReport.php @@ -226,7 +226,7 @@ public function setUserDisplayName($val) } /** * Gets the userId - * The unique identifier (GUID) of the user in Azure Active Directory. + * The unique identifier (GUID) of the user in Microsoft Entra ID. * * @return string|null The userId */ @@ -241,7 +241,7 @@ public function getUserId() /** * Sets the userId - * The unique identifier (GUID) of the user in Azure Active Directory. + * The unique identifier (GUID) of the user in Microsoft Entra ID. * * @param string $val The value of the userId * @@ -254,7 +254,7 @@ public function setUserId($val) } /** * Gets the userPrincipalName - * The user principal name (sign-in name) in Azure Active Directory. This is usually the same as the user's SIP address, and can be same as the user's e-mail address. + * The user principal name (sign-in name) in Microsoft Entra ID. This is usually the same as the user's SIP address, and can be same as the user's e-mail address. * * @return string|null The userPrincipalName */ @@ -269,7 +269,7 @@ public function getUserPrincipalName() /** * Sets the userPrincipalName - * The user principal name (sign-in name) in Azure Active Directory. This is usually the same as the user's SIP address, and can be same as the user's e-mail address. + * The user principal name (sign-in name) in Microsoft Entra ID. This is usually the same as the user's SIP address, and can be same as the user's e-mail address. * * @param string $val The value of the userPrincipalName * diff --git a/src/Beta/Microsoft/Graph/CallRecords/Model/SmsLogRow.php b/src/Beta/Microsoft/Graph/CallRecords/Model/SmsLogRow.php index d8c805f4f92..db8b4033d4a 100644 --- a/src/Beta/Microsoft/Graph/CallRecords/Model/SmsLogRow.php +++ b/src/Beta/Microsoft/Graph/CallRecords/Model/SmsLogRow.php @@ -483,7 +483,7 @@ public function setUserDisplayName($val) } /** * Gets the userId - * The unique identifier (GUID) of the user in Azure Active Directory. + * The unique identifier (GUID) of the user in Microsoft Entra ID. * * @return string|null The userId */ @@ -498,7 +498,7 @@ public function getUserId() /** * Sets the userId - * The unique identifier (GUID) of the user in Azure Active Directory. + * The unique identifier (GUID) of the user in Microsoft Entra ID. * * @param string $val The value of the userId * @@ -511,7 +511,7 @@ public function setUserId($val) } /** * Gets the userPrincipalName - * The user principal name (sign-in name) in Azure Active Directory. This is usually the same as the user's SIP address, and can be same as the user's e-mail address. + * The user principal name (sign-in name) in Microsoft Entra ID. This is usually the same as the user's SIP address, and can be same as the user's e-mail address. * * @return string|null The userPrincipalName */ @@ -526,7 +526,7 @@ public function getUserPrincipalName() /** * Sets the userPrincipalName - * The user principal name (sign-in name) in Azure Active Directory. This is usually the same as the user's SIP address, and can be same as the user's e-mail address. + * The user principal name (sign-in name) in Microsoft Entra ID. This is usually the same as the user's SIP address, and can be same as the user's e-mail address. * * @param string $val The value of the userPrincipalName * diff --git a/src/Beta/Microsoft/Graph/IdentityGovernanceNamespace/Model/CustomTaskExtension.php b/src/Beta/Microsoft/Graph/IdentityGovernanceNamespace/Model/CustomTaskExtension.php index 7e45cfd8b9d..1e30af5546c 100644 --- a/src/Beta/Microsoft/Graph/IdentityGovernanceNamespace/Model/CustomTaskExtension.php +++ b/src/Beta/Microsoft/Graph/IdentityGovernanceNamespace/Model/CustomTaskExtension.php @@ -125,7 +125,7 @@ public function setLastModifiedDateTime($val) /** * Gets the createdBy - * The unique identifier of the Azure AD user that created the custom task extension.Supports $filter(eq, ne) and $expand. + * The unique identifier of the Microsoft Entra user that created the custom task extension.Supports $filter(eq, ne) and $expand. * * @return \Beta\Microsoft\Graph\Model\User|null The createdBy */ @@ -144,7 +144,7 @@ public function getCreatedBy() /** * Sets the createdBy - * The unique identifier of the Azure AD user that created the custom task extension.Supports $filter(eq, ne) and $expand. + * The unique identifier of the Microsoft Entra user that created the custom task extension.Supports $filter(eq, ne) and $expand. * * @param \Beta\Microsoft\Graph\Model\User $val The createdBy * @@ -158,7 +158,7 @@ public function setCreatedBy($val) /** * Gets the lastModifiedBy - * The unique identifier of the Azure AD user that modified the custom task extension last.Supports $filter(eq, ne) and $expand. + * The unique identifier of the Microsoft Entra user that modified the custom task extension last.Supports $filter(eq, ne) and $expand. * * @return \Beta\Microsoft\Graph\Model\User|null The lastModifiedBy */ @@ -177,7 +177,7 @@ public function getLastModifiedBy() /** * Sets the lastModifiedBy - * The unique identifier of the Azure AD user that modified the custom task extension last.Supports $filter(eq, ne) and $expand. + * The unique identifier of the Microsoft Entra user that modified the custom task extension last.Supports $filter(eq, ne) and $expand. * * @param \Beta\Microsoft\Graph\Model\User $val The lastModifiedBy * diff --git a/src/Beta/Microsoft/Graph/IdentityGovernanceNamespace/Model/TaskProcessingResult.php b/src/Beta/Microsoft/Graph/IdentityGovernanceNamespace/Model/TaskProcessingResult.php index db6559f4052..cc401e59187 100644 --- a/src/Beta/Microsoft/Graph/IdentityGovernanceNamespace/Model/TaskProcessingResult.php +++ b/src/Beta/Microsoft/Graph/IdentityGovernanceNamespace/Model/TaskProcessingResult.php @@ -187,7 +187,7 @@ public function setStartedDateTime($val) /** * Gets the subject - * The unique identifier of the Azure AD user targeted for the task execution.Supports $filter(eq, ne) and $expand. + * The unique identifier of the Microsoft Entra user targeted for the task execution.Supports $filter(eq, ne) and $expand. * * @return \Beta\Microsoft\Graph\Model\User|null The subject */ @@ -206,7 +206,7 @@ public function getSubject() /** * Sets the subject - * The unique identifier of the Azure AD user targeted for the task execution.Supports $filter(eq, ne) and $expand. + * The unique identifier of the Microsoft Entra user targeted for the task execution.Supports $filter(eq, ne) and $expand. * * @param \Beta\Microsoft\Graph\Model\User $val The subject * diff --git a/src/Beta/Microsoft/Graph/IdentityGovernanceNamespace/Model/Workflow.php b/src/Beta/Microsoft/Graph/IdentityGovernanceNamespace/Model/Workflow.php index 7f03fada48f..52780a25657 100644 --- a/src/Beta/Microsoft/Graph/IdentityGovernanceNamespace/Model/Workflow.php +++ b/src/Beta/Microsoft/Graph/IdentityGovernanceNamespace/Model/Workflow.php @@ -151,7 +151,7 @@ public function setVersion($val) /** * Gets the executionScope - * The unique identifier of the Azure AD identity that last modified the workflow object. + * The unique identifier of the Microsoft Entra identity that last modified the workflow object. * * @return array|null The executionScope */ @@ -166,7 +166,7 @@ public function getExecutionScope() /** * Sets the executionScope - * The unique identifier of the Azure AD identity that last modified the workflow object. + * The unique identifier of the Microsoft Entra identity that last modified the workflow object. * * @param UserProcessingResult[] $val The executionScope * diff --git a/src/Beta/Microsoft/Graph/IndustryData/Model/AggregatedInboundStatistics.php b/src/Beta/Microsoft/Graph/IndustryData/Model/AggregatedInboundStatistics.php index 67bf339ef6e..869f54267d2 100644 --- a/src/Beta/Microsoft/Graph/IndustryData/Model/AggregatedInboundStatistics.php +++ b/src/Beta/Microsoft/Graph/IndustryData/Model/AggregatedInboundStatistics.php @@ -82,7 +82,7 @@ public function setGroups($val) /** * Gets the matchedPeopleByRole - * The aggregate count of active people matched to an Azure Active Directory user, by role. + * The aggregate count of active people matched to a Microsoft Entra user, by role. * * @return IndustryDataRunRoleCountMetric|null The matchedPeopleByRole */ @@ -101,7 +101,7 @@ public function getMatchedPeopleByRole() /** * Sets the matchedPeopleByRole - * The aggregate count of active people matched to an Azure Active Directory user, by role. + * The aggregate count of active people matched to a Microsoft Entra user, by role. * * @param IndustryDataRunRoleCountMetric $val The value to assign to the matchedPeopleByRole * @@ -199,7 +199,7 @@ public function setPeople($val) /** * Gets the unmatchedPeopleByRole - * The aggregate count of active people not matched to an Azure Active Directory user, by role. + * The aggregate count of active people not matched to a Microsoft Entra user, by role. * * @return IndustryDataRunRoleCountMetric|null The unmatchedPeopleByRole */ @@ -218,7 +218,7 @@ public function getUnmatchedPeopleByRole() /** * Sets the unmatchedPeopleByRole - * The aggregate count of active people not matched to an Azure Active Directory user, by role. + * The aggregate count of active people not matched to a Microsoft Entra user, by role. * * @param IndustryDataRunRoleCountMetric $val The value to assign to the unmatchedPeopleByRole * diff --git a/src/Beta/Microsoft/Graph/IndustryData/Model/InboundActivityResults.php b/src/Beta/Microsoft/Graph/IndustryData/Model/InboundActivityResults.php index 3e73f83325d..c47b510e8f9 100644 --- a/src/Beta/Microsoft/Graph/IndustryData/Model/InboundActivityResults.php +++ b/src/Beta/Microsoft/Graph/IndustryData/Model/InboundActivityResults.php @@ -87,7 +87,7 @@ public function setGroups($val) /** * Gets the matchedPeopleByRole - * Number of people matched to an Azure Active Directory user, by role. + * Number of people matched to a Microsoft Entra user, by role. * * @return IndustryDataRunRoleCountMetric|null The matchedPeopleByRole */ @@ -106,7 +106,7 @@ public function getMatchedPeopleByRole() /** * Sets the matchedPeopleByRole - * Number of people matched to an Azure Active Directory user, by role. + * Number of people matched to a Microsoft Entra user, by role. * * @param IndustryDataRunRoleCountMetric $val The value to assign to the matchedPeopleByRole * @@ -219,7 +219,7 @@ public function setPeople($val) /** * Gets the unmatchedPeopleByRole - * Number of people not matched to an Azure Active Directory user, by role. + * Number of people not matched to a Microsoft Entra user, by role. * * @return IndustryDataRunRoleCountMetric|null The unmatchedPeopleByRole */ @@ -238,7 +238,7 @@ public function getUnmatchedPeopleByRole() /** * Sets the unmatchedPeopleByRole - * Number of people not matched to an Azure Active Directory user, by role. + * Number of people not matched to a Microsoft Entra user, by role. * * @param IndustryDataRunRoleCountMetric $val The value to assign to the unmatchedPeopleByRole * diff --git a/src/Beta/Microsoft/Graph/IndustryData/Model/UserMatchingSetting.php b/src/Beta/Microsoft/Graph/IndustryData/Model/UserMatchingSetting.php index 95852077a73..bdbada0dd63 100644 --- a/src/Beta/Microsoft/Graph/IndustryData/Model/UserMatchingSetting.php +++ b/src/Beta/Microsoft/Graph/IndustryData/Model/UserMatchingSetting.php @@ -26,7 +26,7 @@ class UserMatchingSetting extends \Beta\Microsoft\Graph\Model\Entity /** * Gets the matchTarget - * The RefUserMatchTarget for matching a user from the source with an Azure Active Directory user object. + * The RefUserMatchTarget for matching a user from the source with a Microsoft Entra user object. * * @return UserMatchTargetReferenceValue|null The matchTarget */ @@ -45,7 +45,7 @@ public function getMatchTarget() /** * Sets the matchTarget - * The RefUserMatchTarget for matching a user from the source with an Azure Active Directory user object. + * The RefUserMatchTarget for matching a user from the source with a Microsoft Entra user object. * * @param UserMatchTargetReferenceValue $val The value to assign to the matchTarget * diff --git a/src/Beta/Microsoft/Graph/ManagedTenants/Model/AggregatedPolicyCompliance.php b/src/Beta/Microsoft/Graph/ManagedTenants/Model/AggregatedPolicyCompliance.php index 8e524344180..5ba124f3cb2 100644 --- a/src/Beta/Microsoft/Graph/ManagedTenants/Model/AggregatedPolicyCompliance.php +++ b/src/Beta/Microsoft/Graph/ManagedTenants/Model/AggregatedPolicyCompliance.php @@ -324,7 +324,7 @@ public function setTenantDisplayName($val) /** * Gets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Optional. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Optional. Read-only. * * @return string|null The tenantId */ @@ -339,7 +339,7 @@ public function getTenantId() /** * Sets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Optional. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Optional. Read-only. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/ManagedTenants/Model/AuditEvent.php b/src/Beta/Microsoft/Graph/ManagedTenants/Model/AuditEvent.php index 91b1050f03b..9a82d1bae1c 100644 --- a/src/Beta/Microsoft/Graph/ManagedTenants/Model/AuditEvent.php +++ b/src/Beta/Microsoft/Graph/ManagedTenants/Model/AuditEvent.php @@ -349,7 +349,7 @@ public function setRequestUrl($val) /** * Gets the tenantIds - * The collection of Azure Active Directory tenant identifiers for the managed tenants that were affected by a change, and is formatted as a list of comma-separated values. Required. Read-only. + * The collection of Microsoft Entra tenant identifiers for the managed tenants that were affected by a change, and is formatted as a list of comma-separated values. Required. Read-only. * * @return string|null The tenantIds */ @@ -364,7 +364,7 @@ public function getTenantIds() /** * Sets the tenantIds - * The collection of Azure Active Directory tenant identifiers for the managed tenants that were affected by a change, and is formatted as a list of comma-separated values. Required. Read-only. + * The collection of Microsoft Entra tenant identifiers for the managed tenants that were affected by a change, and is formatted as a list of comma-separated values. Required. Read-only. * * @param string $val The tenantIds * diff --git a/src/Beta/Microsoft/Graph/ManagedTenants/Model/CloudPcConnection.php b/src/Beta/Microsoft/Graph/ManagedTenants/Model/CloudPcConnection.php index a52c5a62b57..841c9d345a9 100644 --- a/src/Beta/Microsoft/Graph/ManagedTenants/Model/CloudPcConnection.php +++ b/src/Beta/Microsoft/Graph/ManagedTenants/Model/CloudPcConnection.php @@ -146,7 +146,7 @@ public function setTenantDisplayName($val) /** * Gets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Required. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Required. Read-only. * * @return string|null The tenantId */ @@ -161,7 +161,7 @@ public function getTenantId() /** * Sets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Required. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Required. Read-only. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/ManagedTenants/Model/CloudPcDevice.php b/src/Beta/Microsoft/Graph/ManagedTenants/Model/CloudPcDevice.php index d1e2d8e948b..adb85688a74 100644 --- a/src/Beta/Microsoft/Graph/ManagedTenants/Model/CloudPcDevice.php +++ b/src/Beta/Microsoft/Graph/ManagedTenants/Model/CloudPcDevice.php @@ -320,7 +320,7 @@ public function setTenantDisplayName($val) /** * Gets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Required. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Required. Read-only. * * @return string|null The tenantId */ @@ -335,7 +335,7 @@ public function getTenantId() /** * Sets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Required. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Required. Read-only. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/ManagedTenants/Model/CredentialUserRegistrationsSummary.php b/src/Beta/Microsoft/Graph/ManagedTenants/Model/CredentialUserRegistrationsSummary.php index 69d871fe930..0b95bf96987 100644 --- a/src/Beta/Microsoft/Graph/ManagedTenants/Model/CredentialUserRegistrationsSummary.php +++ b/src/Beta/Microsoft/Graph/ManagedTenants/Model/CredentialUserRegistrationsSummary.php @@ -291,7 +291,7 @@ public function setTenantDisplayName($val) /** * Gets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Required. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Required. Read-only. * * @return string|null The tenantId */ @@ -306,7 +306,7 @@ public function getTenantId() /** * Sets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Required. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Required. Read-only. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/ManagedTenants/Model/DeviceCompliancePolicySettingStateSummary.php b/src/Beta/Microsoft/Graph/ManagedTenants/Model/DeviceCompliancePolicySettingStateSummary.php index 6dd17ffbc96..0bbcabf06c1 100644 --- a/src/Beta/Microsoft/Graph/ManagedTenants/Model/DeviceCompliancePolicySettingStateSummary.php +++ b/src/Beta/Microsoft/Graph/ManagedTenants/Model/DeviceCompliancePolicySettingStateSummary.php @@ -378,7 +378,7 @@ public function setTenantDisplayName($val) /** * Gets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Required. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Required. Read-only. * * @return string|null The tenantId */ @@ -393,7 +393,7 @@ public function getTenantId() /** * Sets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Required. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Required. Read-only. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/ManagedTenants/Model/ManagedDeviceCompliance.php b/src/Beta/Microsoft/Graph/ManagedTenants/Model/ManagedDeviceCompliance.php index 77887f60246..427d79b4948 100644 --- a/src/Beta/Microsoft/Graph/ManagedTenants/Model/ManagedDeviceCompliance.php +++ b/src/Beta/Microsoft/Graph/ManagedTenants/Model/ManagedDeviceCompliance.php @@ -415,7 +415,7 @@ public function setTenantDisplayName($val) /** * Gets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Optional. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Optional. Read-only. * * @return string|null The tenantId */ @@ -430,7 +430,7 @@ public function getTenantId() /** * Sets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Optional. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Optional. Read-only. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/ManagedTenants/Model/ManagedDeviceComplianceTrend.php b/src/Beta/Microsoft/Graph/ManagedTenants/Model/ManagedDeviceComplianceTrend.php index 8a97a321948..bc4bb6a72ed 100644 --- a/src/Beta/Microsoft/Graph/ManagedTenants/Model/ManagedDeviceComplianceTrend.php +++ b/src/Beta/Microsoft/Graph/ManagedTenants/Model/ManagedDeviceComplianceTrend.php @@ -229,7 +229,7 @@ public function setTenantDisplayName($val) /** * Gets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Optional. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Optional. Read-only. * * @return string|null The tenantId */ @@ -244,7 +244,7 @@ public function getTenantId() /** * Sets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Optional. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Optional. Read-only. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/ManagedTenants/Model/ManagedTenantOperationError.php b/src/Beta/Microsoft/Graph/ManagedTenants/Model/ManagedTenantOperationError.php index 3ded00c390b..f26e96f891b 100644 --- a/src/Beta/Microsoft/Graph/ManagedTenants/Model/ManagedTenantOperationError.php +++ b/src/Beta/Microsoft/Graph/ManagedTenants/Model/ManagedTenantOperationError.php @@ -53,7 +53,7 @@ public function setError($val) } /** * Gets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. + * The Microsoft Entra tenant identifier for the managed tenant. * * @return string|null The tenantId */ @@ -68,7 +68,7 @@ public function getTenantId() /** * Sets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. + * The Microsoft Entra tenant identifier for the managed tenant. * * @param string $val The value of the tenantId * diff --git a/src/Beta/Microsoft/Graph/ManagedTenants/Model/ManagementActionTenantDeploymentStatus.php b/src/Beta/Microsoft/Graph/ManagedTenants/Model/ManagementActionTenantDeploymentStatus.php index 565195e203f..8c114671f9f 100644 --- a/src/Beta/Microsoft/Graph/ManagedTenants/Model/ManagementActionTenantDeploymentStatus.php +++ b/src/Beta/Microsoft/Graph/ManagedTenants/Model/ManagementActionTenantDeploymentStatus.php @@ -85,7 +85,7 @@ public function setTenantGroupId($val) /** * Gets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Required. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Required. Read-only. * * @return string|null The tenantId */ @@ -100,7 +100,7 @@ public function getTenantId() /** * Sets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Required. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Required. Read-only. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/ManagedTenants/Model/MyRole.php b/src/Beta/Microsoft/Graph/ManagedTenants/Model/MyRole.php index 74d975343c5..4d63eaa0b3a 100644 --- a/src/Beta/Microsoft/Graph/ManagedTenants/Model/MyRole.php +++ b/src/Beta/Microsoft/Graph/ManagedTenants/Model/MyRole.php @@ -87,7 +87,7 @@ public function setAssignments($val) /** * Gets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Optional. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Optional. Read-only. * * @return string|null The tenantId */ @@ -102,7 +102,7 @@ public function getTenantId() /** * Sets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Optional. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Optional. Read-only. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/ManagedTenants/Model/Tenant.php b/src/Beta/Microsoft/Graph/ManagedTenants/Model/Tenant.php index 84f2a560617..6691d243354 100644 --- a/src/Beta/Microsoft/Graph/ManagedTenants/Model/Tenant.php +++ b/src/Beta/Microsoft/Graph/ManagedTenants/Model/Tenant.php @@ -154,7 +154,7 @@ public function setLastUpdatedDateTime($val) /** * Gets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Optional. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Optional. Read-only. * * @return string|null The tenantId */ @@ -169,7 +169,7 @@ public function getTenantId() /** * Sets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Optional. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Optional. Read-only. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/ManagedTenants/Model/TenantCustomizedInformation.php b/src/Beta/Microsoft/Graph/ManagedTenants/Model/TenantCustomizedInformation.php index 482acdae935..9e03783cc71 100644 --- a/src/Beta/Microsoft/Graph/ManagedTenants/Model/TenantCustomizedInformation.php +++ b/src/Beta/Microsoft/Graph/ManagedTenants/Model/TenantCustomizedInformation.php @@ -85,7 +85,7 @@ public function setDisplayName($val) /** * Gets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Optional. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Optional. Read-only. * * @return string|null The tenantId */ @@ -100,7 +100,7 @@ public function getTenantId() /** * Sets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Optional. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Optional. Read-only. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/ManagedTenants/Model/TenantDetailedInformation.php b/src/Beta/Microsoft/Graph/ManagedTenants/Model/TenantDetailedInformation.php index 21f840085f2..aba4ad7a47a 100644 --- a/src/Beta/Microsoft/Graph/ManagedTenants/Model/TenantDetailedInformation.php +++ b/src/Beta/Microsoft/Graph/ManagedTenants/Model/TenantDetailedInformation.php @@ -258,7 +258,7 @@ public function setSegmentName($val) /** * Gets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. + * The Microsoft Entra tenant identifier for the managed tenant. * * @return string|null The tenantId */ @@ -273,7 +273,7 @@ public function getTenantId() /** * Sets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. + * The Microsoft Entra tenant identifier for the managed tenant. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/ManagedTenants/Model/TenantInfo.php b/src/Beta/Microsoft/Graph/ManagedTenants/Model/TenantInfo.php index 063a262c861..b9f7778ea39 100644 --- a/src/Beta/Microsoft/Graph/ManagedTenants/Model/TenantInfo.php +++ b/src/Beta/Microsoft/Graph/ManagedTenants/Model/TenantInfo.php @@ -25,7 +25,7 @@ class TenantInfo extends \Beta\Microsoft\Graph\Model\Entity { /** * Gets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Optional. + * The Microsoft Entra tenant identifier for the managed tenant. Optional. * * @return string|null The tenantId */ @@ -40,7 +40,7 @@ public function getTenantId() /** * Sets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Optional. + * The Microsoft Entra tenant identifier for the managed tenant. Optional. * * @param string $val The value of the tenantId * diff --git a/src/Beta/Microsoft/Graph/ManagedTenants/Model/WindowsDeviceMalwareState.php b/src/Beta/Microsoft/Graph/ManagedTenants/Model/WindowsDeviceMalwareState.php index 37d71771fba..ed3fc1864b9 100644 --- a/src/Beta/Microsoft/Graph/ManagedTenants/Model/WindowsDeviceMalwareState.php +++ b/src/Beta/Microsoft/Graph/ManagedTenants/Model/WindowsDeviceMalwareState.php @@ -473,7 +473,7 @@ public function setTenantDisplayName($val) /** * Gets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Optional. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Optional. Read-only. * * @return string|null The tenantId */ @@ -488,7 +488,7 @@ public function getTenantId() /** * Sets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Optional. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Optional. Read-only. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/ManagedTenants/Model/WindowsProtectionState.php b/src/Beta/Microsoft/Graph/ManagedTenants/Model/WindowsProtectionState.php index 67bfe262b89..a2c2323e562 100644 --- a/src/Beta/Microsoft/Graph/ManagedTenants/Model/WindowsProtectionState.php +++ b/src/Beta/Microsoft/Graph/ManagedTenants/Model/WindowsProtectionState.php @@ -742,7 +742,7 @@ public function setTenantDisplayName($val) /** * Gets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Optional. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Optional. Read-only. * * @return string|null The tenantId */ @@ -757,7 +757,7 @@ public function getTenantId() /** * Sets the tenantId - * The Azure Active Directory tenant identifier for the managed tenant. Optional. Read-only. + * The Microsoft Entra tenant identifier for the managed tenant. Optional. Read-only. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/Model/AadUserConversationMember.php b/src/Beta/Microsoft/Graph/Model/AadUserConversationMember.php index c4ed5819c2f..10afcc7ec70 100644 --- a/src/Beta/Microsoft/Graph/Model/AadUserConversationMember.php +++ b/src/Beta/Microsoft/Graph/Model/AadUserConversationMember.php @@ -55,7 +55,7 @@ public function setEmail($val) /** * Gets the tenantId - * TenantId which the Azure AD user belongs to. + * TenantId which the Microsoft Entra user belongs to. * * @return string|null The tenantId */ @@ -70,7 +70,7 @@ public function getTenantId() /** * Sets the tenantId - * TenantId which the Azure AD user belongs to. + * TenantId which the Microsoft Entra user belongs to. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/Model/AadUserConversationMemberResult.php b/src/Beta/Microsoft/Graph/Model/AadUserConversationMemberResult.php index c0c4c982ce2..0205eb813ad 100644 --- a/src/Beta/Microsoft/Graph/Model/AadUserConversationMemberResult.php +++ b/src/Beta/Microsoft/Graph/Model/AadUserConversationMemberResult.php @@ -25,7 +25,7 @@ class AadUserConversationMemberResult extends ActionResultPart { /** * Gets the userId - * The user object ID of the Azure AD user that was being added as part of the bulk operation. + * The user object ID of the Microsoft Entra user that was being added as part of the bulk operation. * * @return string|null The userId */ @@ -40,7 +40,7 @@ public function getUserId() /** * Sets the userId - * The user object ID of the Azure AD user that was being added as part of the bulk operation. + * The user object ID of the Microsoft Entra user that was being added as part of the bulk operation. * * @param string $val The value of the userId * diff --git a/src/Beta/Microsoft/Graph/Model/AadUserNotificationRecipient.php b/src/Beta/Microsoft/Graph/Model/AadUserNotificationRecipient.php index 6e9b61d1ede..47ef9f058c6 100644 --- a/src/Beta/Microsoft/Graph/Model/AadUserNotificationRecipient.php +++ b/src/Beta/Microsoft/Graph/Model/AadUserNotificationRecipient.php @@ -25,7 +25,7 @@ class AadUserNotificationRecipient extends TeamworkNotificationRecipient { /** * Gets the userId - * Azure AD user identifier. Use the List users method to get this ID. + * Microsoft Entra user identifier. Use the List users method to get this ID. * * @return string|null The userId */ @@ -40,7 +40,7 @@ public function getUserId() /** * Sets the userId - * Azure AD user identifier. Use the List users method to get this ID. + * Microsoft Entra user identifier. Use the List users method to get this ID. * * @param string $val The value of the userId * diff --git a/src/Beta/Microsoft/Graph/Model/AccessPackageAssignmentPolicy.php b/src/Beta/Microsoft/Graph/Model/AccessPackageAssignmentPolicy.php index e4cd261e7e5..a0db351c935 100644 --- a/src/Beta/Microsoft/Graph/Model/AccessPackageAssignmentPolicy.php +++ b/src/Beta/Microsoft/Graph/Model/AccessPackageAssignmentPolicy.php @@ -55,7 +55,7 @@ public function setAccessPackageId($val) /** * Gets the accessReviewSettings - * Who must review, and how often, the assignments to the access package from this policy. This property is null if reviews are not required. + * Who must review, and how often, the assignments to the access package from this policy. This property is null if reviews aren't required. * * @return AssignmentReviewSettings|null The accessReviewSettings */ @@ -74,7 +74,7 @@ public function getAccessReviewSettings() /** * Sets the accessReviewSettings - * Who must review, and how often, the assignments to the access package from this policy. This property is null if reviews are not required. + * Who must review, and how often, the assignments to the access package from this policy. This property is null if reviews aren't required. * * @param AssignmentReviewSettings $val The accessReviewSettings * @@ -235,7 +235,7 @@ public function setDisplayName($val) /** * Gets the durationInDays - * The number of days in which assignments from this policy last until they are expired. + * The number of days in which assignments from this policy last until they're expired. * * @return int|null The durationInDays */ @@ -250,7 +250,7 @@ public function getDurationInDays() /** * Sets the durationInDays - * The number of days in which assignments from this policy last until they are expired. + * The number of days in which assignments from this policy last until they're expired. * * @param int $val The durationInDays * @@ -453,7 +453,7 @@ public function setRequestorSettings($val) /** * Gets the verifiableCredentialSettings - * Settings for verifiable credentials set up through the Azure AD Verified ID service. These settings represent the verifiable credentials that a requestor of an access package in this policy can present to be assigned the access package. + * Settings for verifiable credentials set up through the Microsoft Entra Verified I D service. These settings represent the verifiable credentials that a requestor of an access package in this policy can present to be assigned the access package. * * @return VerifiableCredentialSettings|null The verifiableCredentialSettings */ @@ -472,7 +472,7 @@ public function getVerifiableCredentialSettings() /** * Sets the verifiableCredentialSettings - * Settings for verifiable credentials set up through the Azure AD Verified ID service. These settings represent the verifiable credentials that a requestor of an access package in this policy can present to be assigned the access package. + * Settings for verifiable credentials set up through the Microsoft Entra Verified I D service. These settings represent the verifiable credentials that a requestor of an access package in this policy can present to be assigned the access package. * * @param VerifiableCredentialSettings $val The verifiableCredentialSettings * diff --git a/src/Beta/Microsoft/Graph/Model/AccessPackageResource.php b/src/Beta/Microsoft/Graph/Model/AccessPackageResource.php index cec482744cd..9e5a9f3bfbf 100644 --- a/src/Beta/Microsoft/Graph/Model/AccessPackageResource.php +++ b/src/Beta/Microsoft/Graph/Model/AccessPackageResource.php @@ -205,7 +205,7 @@ public function setIsPendingOnboarding($val) /** * Gets the originId - * The unique identifier of the resource in the origin system. In the case of an Azure AD group, this is the identifier of the group. + * The unique identifier of the resource in the origin system. In the case of a Microsoft Entra group, this is the identifier of the group. * * @return string|null The originId */ @@ -220,7 +220,7 @@ public function getOriginId() /** * Sets the originId - * The unique identifier of the resource in the origin system. In the case of an Azure AD group, this is the identifier of the group. + * The unique identifier of the resource in the origin system. In the case of a Microsoft Entra group, this is the identifier of the group. * * @param string $val The originId * @@ -263,7 +263,7 @@ public function setOriginSystem($val) /** * Gets the resourceType - * The type of the resource, such as Application if it is an Azure AD connected application, or SharePoint Online Site for a SharePoint Online site. + * The type of the resource, such as Application if it is a Microsoft Entra connected application, or SharePoint Online Site for a SharePoint Online site. * * @return string|null The resourceType */ @@ -278,7 +278,7 @@ public function getResourceType() /** * Sets the resourceType - * The type of the resource, such as Application if it is an Azure AD connected application, or SharePoint Online Site for a SharePoint Online site. + * The type of the resource, such as Application if it is a Microsoft Entra connected application, or SharePoint Online Site for a SharePoint Online site. * * @param string $val The resourceType * diff --git a/src/Beta/Microsoft/Graph/Model/AccessPackageResourceEnvironment.php b/src/Beta/Microsoft/Graph/Model/AccessPackageResourceEnvironment.php index 6fcbe026098..3cbac1de494 100644 --- a/src/Beta/Microsoft/Graph/Model/AccessPackageResourceEnvironment.php +++ b/src/Beta/Microsoft/Graph/Model/AccessPackageResourceEnvironment.php @@ -179,7 +179,7 @@ public function setDisplayName($val) /** * Gets the isDefaultEnvironment - * Determines whether this is default environment or not. It is set to true for all static origin systems, such as Azure AD groups and Azure AD Applications. + * Determines whether this is default environment or not. It is set to true for all static origin systems, such as Microsoft Entra groups and Microsoft Entra Applications. * * @return bool|null The isDefaultEnvironment */ @@ -194,7 +194,7 @@ public function getIsDefaultEnvironment() /** * Sets the isDefaultEnvironment - * Determines whether this is default environment or not. It is set to true for all static origin systems, such as Azure AD groups and Azure AD Applications. + * Determines whether this is default environment or not. It is set to true for all static origin systems, such as Microsoft Entra groups and Microsoft Entra Applications. * * @param bool $val The isDefaultEnvironment * diff --git a/src/Beta/Microsoft/Graph/Model/AccessReviewScheduleSettings.php b/src/Beta/Microsoft/Graph/Model/AccessReviewScheduleSettings.php index f03f3e3b8b0..5358d258937 100644 --- a/src/Beta/Microsoft/Graph/Model/AccessReviewScheduleSettings.php +++ b/src/Beta/Microsoft/Graph/Model/AccessReviewScheduleSettings.php @@ -288,7 +288,7 @@ public function setRecommendationInsightSettings($val) /** * Gets the recommendationLookBackDuration - * Optional field. Indicates the period of inactivity (with respect to the start date of the review instance) that recommendations will be configured from. The recommendation will be to deny if the user is inactive during the look-back duration. For reviews of groups and Azure AD roles, any duration is accepted. For reviews of applications, 30 days is the maximum duration. If not specified, the duration is 30 days. NOTE: If the stageSettings of the accessReviewScheduleDefinition object is defined, its recommendationLookBackDuration setting will be used instead of the value of this property. + * Optional field. Indicates the period of inactivity (with respect to the start date of the review instance) that recommendations will be configured from. The recommendation will be to deny if the user is inactive during the look-back duration. For reviews of groups and Microsoft Entra roles, any duration is accepted. For reviews of applications, 30 days is the maximum duration. If not specified, the duration is 30 days. NOTE: If the stageSettings of the accessReviewScheduleDefinition object is defined, its recommendationLookBackDuration setting will be used instead of the value of this property. * * @return \DateInterval|null The recommendationLookBackDuration */ @@ -307,7 +307,7 @@ public function getRecommendationLookBackDuration() /** * Sets the recommendationLookBackDuration - * Optional field. Indicates the period of inactivity (with respect to the start date of the review instance) that recommendations will be configured from. The recommendation will be to deny if the user is inactive during the look-back duration. For reviews of groups and Azure AD roles, any duration is accepted. For reviews of applications, 30 days is the maximum duration. If not specified, the duration is 30 days. NOTE: If the stageSettings of the accessReviewScheduleDefinition object is defined, its recommendationLookBackDuration setting will be used instead of the value of this property. + * Optional field. Indicates the period of inactivity (with respect to the start date of the review instance) that recommendations will be configured from. The recommendation will be to deny if the user is inactive during the look-back duration. For reviews of groups and Microsoft Entra roles, any duration is accepted. For reviews of applications, 30 days is the maximum duration. If not specified, the duration is 30 days. NOTE: If the stageSettings of the accessReviewScheduleDefinition object is defined, its recommendationLookBackDuration setting will be used instead of the value of this property. * * @param \DateInterval $val The value to assign to the recommendationLookBackDuration * diff --git a/src/Beta/Microsoft/Graph/Model/AccessReviewSet.php b/src/Beta/Microsoft/Graph/Model/AccessReviewSet.php index 7beb2fc3042..de31dabbfd0 100644 --- a/src/Beta/Microsoft/Graph/Model/AccessReviewSet.php +++ b/src/Beta/Microsoft/Graph/Model/AccessReviewSet.php @@ -27,7 +27,7 @@ class AccessReviewSet extends Entity /** * Gets the decisions - * Represents an Azure AD access review decision on an instance of a review. + * Represents a Microsoft Entra access review decision on an instance of a review. * * @return array|null The decisions */ @@ -42,7 +42,7 @@ public function getDecisions() /** * Sets the decisions - * Represents an Azure AD access review decision on an instance of a review. + * Represents a Microsoft Entra access review decision on an instance of a review. * * @param AccessReviewInstanceDecisionItem[] $val The decisions * diff --git a/src/Beta/Microsoft/Graph/Model/AccessReviewStage.php b/src/Beta/Microsoft/Graph/Model/AccessReviewStage.php index c684ed784fe..06b742e1eb3 100644 --- a/src/Beta/Microsoft/Graph/Model/AccessReviewStage.php +++ b/src/Beta/Microsoft/Graph/Model/AccessReviewStage.php @@ -60,7 +60,7 @@ public function setEndDateTime($val) /** * Gets the fallbackReviewers - * This collection of reviewer scopes is used to define the list of fallback reviewers. These fallback reviewers will be notified to take action if no users are found from the list of reviewers specified. This could occur when either the group owner is specified as the reviewer but the group owner does not exist, or manager is specified as reviewer but a user's manager does not exist. + * This collection of reviewer scopes is used to define the list of fallback reviewers. These fallback reviewers are notified to take action if no users are found from the list of reviewers specified. This can occur when either the group owner is specified as the reviewer but the group owner does not exist, or manager is specified as reviewer but a user's manager does not exist. * * @return array|null The fallbackReviewers */ @@ -75,7 +75,7 @@ public function getFallbackReviewers() /** * Sets the fallbackReviewers - * This collection of reviewer scopes is used to define the list of fallback reviewers. These fallback reviewers will be notified to take action if no users are found from the list of reviewers specified. This could occur when either the group owner is specified as the reviewer but the group owner does not exist, or manager is specified as reviewer but a user's manager does not exist. + * This collection of reviewer scopes is used to define the list of fallback reviewers. These fallback reviewers are notified to take action if no users are found from the list of reviewers specified. This can occur when either the group owner is specified as the reviewer but the group owner does not exist, or manager is specified as reviewer but a user's manager does not exist. * * @param AccessReviewReviewerScope[] $val The fallbackReviewers * diff --git a/src/Beta/Microsoft/Graph/Model/AccessReviewStageSettings.php b/src/Beta/Microsoft/Graph/Model/AccessReviewStageSettings.php index d4ddb0c9f52..9a6383b4406 100644 --- a/src/Beta/Microsoft/Graph/Model/AccessReviewStageSettings.php +++ b/src/Beta/Microsoft/Graph/Model/AccessReviewStageSettings.php @@ -110,7 +110,7 @@ public function setDurationInDays($val) /** * Gets the fallbackReviewers - * If provided, the fallback reviewers are asked to complete a review if the primary reviewers don't exist. For example, if managers are selected as reviewers and a principal under review doesn't have a manager in Azure AD, the fallback reviewers are asked to review that principal. NOTE: The value of this property overrides the corresponding setting on the accessReviewScheduleDefinition object. + * If provided, the fallback reviewers are asked to complete a review if the primary reviewers don't exist. For example, if managers are selected as reviewers and a principal under review doesn't have a manager in Microsoft Entra ID, the fallback reviewers are asked to review that principal. NOTE: The value of this property overrides the corresponding setting on the accessReviewScheduleDefinition object. * * @return AccessReviewReviewerScope|null The fallbackReviewers */ @@ -129,7 +129,7 @@ public function getFallbackReviewers() /** * Sets the fallbackReviewers - * If provided, the fallback reviewers are asked to complete a review if the primary reviewers don't exist. For example, if managers are selected as reviewers and a principal under review doesn't have a manager in Azure AD, the fallback reviewers are asked to review that principal. NOTE: The value of this property overrides the corresponding setting on the accessReviewScheduleDefinition object. + * If provided, the fallback reviewers are asked to complete a review if the primary reviewers don't exist. For example, if managers are selected as reviewers and a principal under review doesn't have a manager in Microsoft Entra ID, the fallback reviewers are asked to review that principal. NOTE: The value of this property overrides the corresponding setting on the accessReviewScheduleDefinition object. * * @param AccessReviewReviewerScope $val The value to assign to the fallbackReviewers * @@ -174,7 +174,7 @@ public function setRecommendationInsightSettings($val) /** * Gets the recommendationLookBackDuration - * Optional field. Indicates the time period of inactivity (with respect to the start date of the review instance) from which that recommendations will be configured. The recommendation is to deny if the user is inactive during the look back duration. For reviews of groups and Azure AD roles, any duration is accepted. For reviews of applications, 30 days is the maximum duration. If not specified, the duration is 30 days. NOTE: The value of this property overrides the corresponding setting on the accessReviewScheduleDefinition object. + * Optional field. Indicates the time period of inactivity (with respect to the start date of the review instance) from which that recommendations will be configured. The recommendation is to deny if the user is inactive during the look back duration. For reviews of groups and Microsoft Entra roles, any duration is accepted. For reviews of applications, 30 days is the maximum duration. If not specified, the duration is 30 days. NOTE: The value of this property overrides the corresponding setting on the accessReviewScheduleDefinition object. * * @return \DateInterval|null The recommendationLookBackDuration */ @@ -193,7 +193,7 @@ public function getRecommendationLookBackDuration() /** * Sets the recommendationLookBackDuration - * Optional field. Indicates the time period of inactivity (with respect to the start date of the review instance) from which that recommendations will be configured. The recommendation is to deny if the user is inactive during the look back duration. For reviews of groups and Azure AD roles, any duration is accepted. For reviews of applications, 30 days is the maximum duration. If not specified, the duration is 30 days. NOTE: The value of this property overrides the corresponding setting on the accessReviewScheduleDefinition object. + * Optional field. Indicates the time period of inactivity (with respect to the start date of the review instance) from which that recommendations will be configured. The recommendation is to deny if the user is inactive during the look back duration. For reviews of groups and Microsoft Entra roles, any duration is accepted. For reviews of applications, 30 days is the maximum duration. If not specified, the duration is 30 days. NOTE: The value of this property overrides the corresponding setting on the accessReviewScheduleDefinition object. * * @param \DateInterval $val The value to assign to the recommendationLookBackDuration * diff --git a/src/Beta/Microsoft/Graph/Model/AdministrativeUnit.php b/src/Beta/Microsoft/Graph/Model/AdministrativeUnit.php index 3c7d3139165..9eea0fdb3da 100644 --- a/src/Beta/Microsoft/Graph/Model/AdministrativeUnit.php +++ b/src/Beta/Microsoft/Graph/Model/AdministrativeUnit.php @@ -84,7 +84,7 @@ public function setDisplayName($val) /** * Gets the isMemberManagementRestricted - * true if members of this administrative unit should be treated as sensitive, which requires specific permissions to manage. Default value is false. Use this property to define administrative units whose roles don't inherit from tenant-level administrators, and management of individual member objects is limited to administrators scoped to a restricted management administrative unit. Immutable, so can't be changed later. For more information about working with restricted management administrative units, see Restricted management administrative units in Azure Active Directory. + * true if members of this administrative unit should be treated as sensitive, which requires specific permissions to manage. Default value is false. Use this property to define administrative units whose roles don't inherit from tenant-level administrators, and management of individual member objects is limited to administrators scoped to a restricted management administrative unit. Immutable, so can't be changed later. For more information about working with restricted management administrative units, see Restricted management administrative units in Microsoft Entra ID. * * @return bool|null The isMemberManagementRestricted */ @@ -99,7 +99,7 @@ public function getIsMemberManagementRestricted() /** * Sets the isMemberManagementRestricted - * true if members of this administrative unit should be treated as sensitive, which requires specific permissions to manage. Default value is false. Use this property to define administrative units whose roles don't inherit from tenant-level administrators, and management of individual member objects is limited to administrators scoped to a restricted management administrative unit. Immutable, so can't be changed later. For more information about working with restricted management administrative units, see Restricted management administrative units in Azure Active Directory. + * true if members of this administrative unit should be treated as sensitive, which requires specific permissions to manage. Default value is false. Use this property to define administrative units whose roles don't inherit from tenant-level administrators, and management of individual member objects is limited to administrators scoped to a restricted management administrative unit. Immutable, so can't be changed later. For more information about working with restricted management administrative units, see Restricted management administrative units in Microsoft Entra ID. * * @param bool $val The isMemberManagementRestricted * diff --git a/src/Beta/Microsoft/Graph/Model/Agreement.php b/src/Beta/Microsoft/Graph/Model/Agreement.php index 3154f861653..be0faa6b28a 100644 --- a/src/Beta/Microsoft/Graph/Model/Agreement.php +++ b/src/Beta/Microsoft/Graph/Model/Agreement.php @@ -55,7 +55,7 @@ public function setDisplayName($val) /** * Gets the isPerDeviceAcceptanceRequired - * This setting enables you to require end users to accept this agreement on every device that they are accessing it from. The end user will be required to register their device in Azure AD, if they haven't already done so. Supports $filter (eq). + * This setting enables you to require end users to accept this agreement on every device that they are accessing it from. The end user will be required to register their device in Microsoft Entra ID, if they haven't already done so. Supports $filter (eq). * * @return bool|null The isPerDeviceAcceptanceRequired */ @@ -70,7 +70,7 @@ public function getIsPerDeviceAcceptanceRequired() /** * Sets the isPerDeviceAcceptanceRequired - * This setting enables you to require end users to accept this agreement on every device that they are accessing it from. The end user will be required to register their device in Azure AD, if they haven't already done so. Supports $filter (eq). + * This setting enables you to require end users to accept this agreement on every device that they are accessing it from. The end user will be required to register their device in Microsoft Entra ID, if they haven't already done so. Supports $filter (eq). * * @param bool $val The isPerDeviceAcceptanceRequired * diff --git a/src/Beta/Microsoft/Graph/Model/AgreementFileLocalization.php b/src/Beta/Microsoft/Graph/Model/AgreementFileLocalization.php index 694838ce6a0..40aa8caaad0 100644 --- a/src/Beta/Microsoft/Graph/Model/AgreementFileLocalization.php +++ b/src/Beta/Microsoft/Graph/Model/AgreementFileLocalization.php @@ -27,7 +27,7 @@ class AgreementFileLocalization extends AgreementFileProperties /** * Gets the versions - * Read-only. Customized versions of the terms of use agreement in the Azure AD tenant. + * Read-only. Customized versions of the terms of use agreement in the Microsoft Entra tenant. * * @return array|null The versions */ @@ -42,7 +42,7 @@ public function getVersions() /** * Sets the versions - * Read-only. Customized versions of the terms of use agreement in the Azure AD tenant. + * Read-only. Customized versions of the terms of use agreement in the Microsoft Entra tenant. * * @param AgreementFileVersion[] $val The versions * diff --git a/src/Beta/Microsoft/Graph/Model/Alert.php b/src/Beta/Microsoft/Graph/Model/Alert.php index cbb2445738e..02c3595018c 100644 --- a/src/Beta/Microsoft/Graph/Model/Alert.php +++ b/src/Beta/Microsoft/Graph/Model/Alert.php @@ -141,7 +141,7 @@ public function setAzureSubscriptionId($val) /** * Gets the azureTenantId - * Azure Active Directory tenant ID. Required. + * Microsoft Entra tenant ID. Required. * * @return string|null The azureTenantId */ @@ -156,7 +156,7 @@ public function getAzureTenantId() /** * Sets the azureTenantId - * Azure Active Directory tenant ID. Required. + * Microsoft Entra tenant ID. Required. * * @param string $val The azureTenantId * diff --git a/src/Beta/Microsoft/Graph/Model/AllAccountsWithAccess.php b/src/Beta/Microsoft/Graph/Model/AllAccountsWithAccess.php index a1bbf6ad4cf..12d9d486a3f 100644 --- a/src/Beta/Microsoft/Graph/Model/AllAccountsWithAccess.php +++ b/src/Beta/Microsoft/Graph/Model/AllAccountsWithAccess.php @@ -23,4 +23,15 @@ */ class AllAccountsWithAccess extends AccountsWithAccess { + /** + * Set the @odata.type since this type is immediately descended from an abstract + * type that is referenced as the type in an entity. + * @param array $propDict The property dictionary + */ + public function __construct($propDict = array()) + { + parent::__construct($propDict); + $this->setODataType("#microsoft.graph.allAccountsWithAccess"); + } + } diff --git a/src/Beta/Microsoft/Graph/Model/AllInboundPorts.php b/src/Beta/Microsoft/Graph/Model/AllInboundPorts.php index 33cdbdb8173..5a317a13c2d 100644 --- a/src/Beta/Microsoft/Graph/Model/AllInboundPorts.php +++ b/src/Beta/Microsoft/Graph/Model/AllInboundPorts.php @@ -23,4 +23,15 @@ */ class AllInboundPorts extends InboundPorts { + /** + * Set the @odata.type since this type is immediately descended from an abstract + * type that is referenced as the type in an entity. + * @param array $propDict The property dictionary + */ + public function __construct($propDict = array()) + { + parent::__construct($propDict); + $this->setODataType("#microsoft.graph.allInboundPorts"); + } + } diff --git a/src/Beta/Microsoft/Graph/Model/ApiApplication.php b/src/Beta/Microsoft/Graph/Model/ApiApplication.php index dcb3e57c701..f339d9a297b 100644 --- a/src/Beta/Microsoft/Graph/Model/ApiApplication.php +++ b/src/Beta/Microsoft/Graph/Model/ApiApplication.php @@ -53,7 +53,7 @@ public function setAcceptMappedClaims($val) } /** * Gets the knownClientApplications - * Used for bundling consent if you have a solution that contains two parts: a client app and a custom web API app. If you set the appID of the client app to this value, the user only consents once to the client app. Azure AD knows that consenting to the client means implicitly consenting to the web API and automatically provisions service principals for both APIs at the same time. Both the client and the web API app must be registered in the same tenant. + * Used for bundling consent if you have a solution that contains two parts: a client app and a custom web API app. If you set the appID of the client app to this value, the user only consents once to the client app. Microsoft Entra ID knows that consenting to the client means implicitly consenting to the web API and automatically provisions service principals for both APIs at the same time. Both the client and the web API app must be registered in the same tenant. * * @return string|null The knownClientApplications */ @@ -68,7 +68,7 @@ public function getKnownClientApplications() /** * Sets the knownClientApplications - * Used for bundling consent if you have a solution that contains two parts: a client app and a custom web API app. If you set the appID of the client app to this value, the user only consents once to the client app. Azure AD knows that consenting to the client means implicitly consenting to the web API and automatically provisions service principals for both APIs at the same time. Both the client and the web API app must be registered in the same tenant. + * Used for bundling consent if you have a solution that contains two parts: a client app and a custom web API app. If you set the appID of the client app to this value, the user only consents once to the client app. Microsoft Entra ID knows that consenting to the client means implicitly consenting to the web API and automatically provisions service principals for both APIs at the same time. Both the client and the web API app must be registered in the same tenant. * * @param string $val The value of the knownClientApplications * diff --git a/src/Beta/Microsoft/Graph/Model/AppIdentity.php b/src/Beta/Microsoft/Graph/Model/AppIdentity.php index 3620b5c8cbc..61d32a001c5 100644 --- a/src/Beta/Microsoft/Graph/Model/AppIdentity.php +++ b/src/Beta/Microsoft/Graph/Model/AppIdentity.php @@ -25,7 +25,7 @@ class AppIdentity extends Entity { /** * Gets the appId - * Refers to the unique identifier representing Application Id in the Azure Active Directory. + * Refers to the unique identifier representing Application Id in the Microsoft Entra ID. * * @return string|null The appId */ @@ -40,7 +40,7 @@ public function getAppId() /** * Sets the appId - * Refers to the unique identifier representing Application Id in the Azure Active Directory. + * Refers to the unique identifier representing Application Id in the Microsoft Entra ID. * * @param string $val The value of the appId * @@ -81,7 +81,7 @@ public function setDisplayName($val) } /** * Gets the servicePrincipalId - * Refers to the unique identifier indicating Service Principal Id in Azure Active Directory for the corresponding App. + * Refers to the unique identifier indicating Service Principal Id in Microsoft Entra ID for the corresponding App. * * @return string|null The servicePrincipalId */ @@ -96,7 +96,7 @@ public function getServicePrincipalId() /** * Sets the servicePrincipalId - * Refers to the unique identifier indicating Service Principal Id in Azure Active Directory for the corresponding App. + * Refers to the unique identifier indicating Service Principal Id in Microsoft Entra ID for the corresponding App. * * @param string $val The value of the servicePrincipalId * diff --git a/src/Beta/Microsoft/Graph/Model/Application.php b/src/Beta/Microsoft/Graph/Model/Application.php index 1fcb4bec693..b05d853da89 100644 --- a/src/Beta/Microsoft/Graph/Model/Application.php +++ b/src/Beta/Microsoft/Graph/Model/Application.php @@ -59,7 +59,7 @@ public function setApi($val) /** * Gets the appId - * The unique identifier for the application that is assigned by Azure AD. Not nullable. Read-only. Alternate key. Supports $filter (eq). + * The unique identifier for the application that is assigned by Microsoft Entra ID. Not nullable. Read-only. Alternate key. Supports $filter (eq). * * @return string|null The appId */ @@ -74,7 +74,7 @@ public function getAppId() /** * Sets the appId - * The unique identifier for the application that is assigned by Azure AD. Not nullable. Read-only. Alternate key. Supports $filter (eq). + * The unique identifier for the application that is assigned by Microsoft Entra ID. Not nullable. Read-only. Alternate key. Supports $filter (eq). * * @param string $val The appId * @@ -217,7 +217,7 @@ public function setCreatedDateTime($val) /** * Gets the defaultRedirectUri - * The default redirect URI. If specified and there is no explicit redirect URI in the sign-in request for SAML and OIDC flows, Azure AD sends the token to this redirect URI. Azure AD also sends the token to this default URI in SAML IdP-initiated single sign-on. The value must match one of the configured redirect URIs for the application. + * The default redirect URI. If specified and there is no explicit redirect URI in the sign-in request for SAML and OIDC flows, Microsoft Entra ID sends the token to this redirect URI. Microsoft Entra ID also sends the token to this default URI in SAML IdP-initiated single sign-on. The value must match one of the configured redirect URIs for the application. * * @return string|null The defaultRedirectUri */ @@ -232,7 +232,7 @@ public function getDefaultRedirectUri() /** * Sets the defaultRedirectUri - * The default redirect URI. If specified and there is no explicit redirect URI in the sign-in request for SAML and OIDC flows, Azure AD sends the token to this redirect URI. Azure AD also sends the token to this default URI in SAML IdP-initiated single sign-on. The value must match one of the configured redirect URIs for the application. + * The default redirect URI. If specified and there is no explicit redirect URI in the sign-in request for SAML and OIDC flows, Microsoft Entra ID sends the token to this redirect URI. Microsoft Entra ID also sends the token to this default URI in SAML IdP-initiated single sign-on. The value must match one of the configured redirect URIs for the application. * * @param string $val The defaultRedirectUri * @@ -333,7 +333,7 @@ public function setDisplayName($val) /** * Gets the groupMembershipClaims - * Configures the groups claim issued in a user or OAuth 2.0 access token that the application expects. To set this attribute, use one of the following string values: None, SecurityGroup (for security groups and Azure AD roles), All (this gets all security groups, distribution groups, and Azure AD directory roles that the signed-in user is a member of). + * Configures the groups claim issued in a user or OAuth 2.0 access token that the application expects. To set this attribute, use one of the following string values: None, SecurityGroup (for security groups and Microsoft Entra roles), All (this gets all security groups, distribution groups, and Microsoft Entra directory roles that the signed-in user is a member of). * * @return string|null The groupMembershipClaims */ @@ -348,7 +348,7 @@ public function getGroupMembershipClaims() /** * Sets the groupMembershipClaims - * Configures the groups claim issued in a user or OAuth 2.0 access token that the application expects. To set this attribute, use one of the following string values: None, SecurityGroup (for security groups and Azure AD roles), All (this gets all security groups, distribution groups, and Azure AD directory roles that the signed-in user is a member of). + * Configures the groups claim issued in a user or OAuth 2.0 access token that the application expects. To set this attribute, use one of the following string values: None, SecurityGroup (for security groups and Microsoft Entra roles), All (this gets all security groups, distribution groups, and Microsoft Entra directory roles that the signed-in user is a member of). * * @param string $val The groupMembershipClaims * @@ -362,7 +362,7 @@ public function setGroupMembershipClaims($val) /** * Gets the identifierUris - * Also known as App ID URI, this value is set when an application is used as a resource app. The identifierUris acts as the prefix for the scopes you'll reference in your API's code, and it must be globally unique. You can use the default value provided, which is in the form api://<application-client-id>, or specify a more readable URI like https://contoso.com/api. For more information on valid identifierUris patterns and best practices, see Azure AD application registration security best practices. Not nullable. Supports $filter (eq, ne, ge, le, startsWith). + * Also known as App ID URI, this value is set when an application is used as a resource app. The identifierUris acts as the prefix for the scopes you'll reference in your API's code, and it must be globally unique. You can use the default value provided, which is in the form api://<application-client-id>, or specify a more readable URI like https://contoso.com/api. For more information on valid identifierUris patterns and best practices, see Microsoft Entra application registration security best practices. Not nullable. Supports $filter (eq, ne, ge, le, startsWith). * * @return array|null The identifierUris */ @@ -377,7 +377,7 @@ public function getIdentifierUris() /** * Sets the identifierUris - * Also known as App ID URI, this value is set when an application is used as a resource app. The identifierUris acts as the prefix for the scopes you'll reference in your API's code, and it must be globally unique. You can use the default value provided, which is in the form api://<application-client-id>, or specify a more readable URI like https://contoso.com/api. For more information on valid identifierUris patterns and best practices, see Azure AD application registration security best practices. Not nullable. Supports $filter (eq, ne, ge, le, startsWith). + * Also known as App ID URI, this value is set when an application is used as a resource app. The identifierUris acts as the prefix for the scopes you'll reference in your API's code, and it must be globally unique. You can use the default value provided, which is in the form api://<application-client-id>, or specify a more readable URI like https://contoso.com/api. For more information on valid identifierUris patterns and best practices, see Microsoft Entra application registration security best practices. Not nullable. Supports $filter (eq, ne, ge, le, startsWith). * * @param string[] $val The identifierUris * @@ -391,7 +391,7 @@ public function setIdentifierUris($val) /** * Gets the info - * Basic profile information of the application, such as it's marketing, support, terms of service, and privacy statement URLs. The terms of service and privacy statement are surfaced to users through the user consent experience. For more information, see How to: Add Terms of service and privacy statement for registered Azure AD apps. Supports $filter (eq, ne, not, ge, le, and eq on null values). + * Basic profile information of the application, such as it's marketing, support, terms of service, and privacy statement URLs. The terms of service and privacy statement are surfaced to users through the user consent experience. For more information, see How to: Add Terms of service and privacy statement for registered Microsoft Entra apps. Supports $filter (eq, ne, not, ge, le, and eq on null values). * * @return InformationalUrl|null The info */ @@ -410,7 +410,7 @@ public function getInfo() /** * Sets the info - * Basic profile information of the application, such as it's marketing, support, terms of service, and privacy statement URLs. The terms of service and privacy statement are surfaced to users through the user consent experience. For more information, see How to: Add Terms of service and privacy statement for registered Azure AD apps. Supports $filter (eq, ne, not, ge, le, and eq on null values). + * Basic profile information of the application, such as it's marketing, support, terms of service, and privacy statement URLs. The terms of service and privacy statement are surfaced to users through the user consent experience. For more information, see How to: Add Terms of service and privacy statement for registered Microsoft Entra apps. Supports $filter (eq, ne, not, ge, le, and eq on null values). * * @param InformationalUrl $val The info * @@ -453,7 +453,7 @@ public function setIsDeviceOnlyAuthSupported($val) /** * Gets the isFallbackPublicClient - * Specifies the fallback application type as public client, such as an installed application running on a mobile device. The default value is false which means the fallback application type is confidential client such as a web app. There are certain scenarios where Azure AD cannot determine the client application type. For example, the ROPC flow where the application is configured without specifying a redirect URI. In those cases Azure AD interprets the application type based on the value of this property. + * Specifies the fallback application type as public client, such as an installed application running on a mobile device. The default value is false which means the fallback application type is confidential client such as a web app. There are certain scenarios where Microsoft Entra ID cannot determine the client application type. For example, the ROPC flow where the application is configured without specifying a redirect URI. In those cases Microsoft Entra ID interprets the application type based on the value of this property. * * @return bool|null The isFallbackPublicClient */ @@ -468,7 +468,7 @@ public function getIsFallbackPublicClient() /** * Sets the isFallbackPublicClient - * Specifies the fallback application type as public client, such as an installed application running on a mobile device. The default value is false which means the fallback application type is confidential client such as a web app. There are certain scenarios where Azure AD cannot determine the client application type. For example, the ROPC flow where the application is configured without specifying a redirect URI. In those cases Azure AD interprets the application type based on the value of this property. + * Specifies the fallback application type as public client, such as an installed application running on a mobile device. The default value is false which means the fallback application type is confidential client such as a web app. There are certain scenarios where Microsoft Entra ID cannot determine the client application type. For example, the ROPC flow where the application is configured without specifying a redirect URI. In those cases Microsoft Entra ID interprets the application type based on the value of this property. * * @param bool $val The isFallbackPublicClient * @@ -574,7 +574,7 @@ public function setNotes($val) /** * Gets the optionalClaims - * Application developers can configure optional claims in their Azure AD applications to specify the claims that are sent to their application by the Microsoft security token service. For more information, see How to: Provide optional claims to your app. + * Application developers can configure optional claims in their Microsoft Entra applications to specify the claims that are sent to their application by the Microsoft security token service. For more information, see How to: Provide optional claims to your app. * * @return OptionalClaims|null The optionalClaims */ @@ -593,7 +593,7 @@ public function getOptionalClaims() /** * Sets the optionalClaims - * Application developers can configure optional claims in their Azure AD applications to specify the claims that are sent to their application by the Microsoft security token service. For more information, see How to: Provide optional claims to your app. + * Application developers can configure optional claims in their Microsoft Entra applications to specify the claims that are sent to their application by the Microsoft security token service. For more information, see How to: Provide optional claims to your app. * * @param OptionalClaims $val The optionalClaims * @@ -732,7 +732,7 @@ public function setPublisherDomain($val) /** * Gets the requestSignatureVerification - * Specifies whether this application requires Azure AD to verify the signed authentication requests. + * Specifies whether this application requires Microsoft Entra ID to verify the signed authentication requests. * * @return RequestSignatureVerification|null The requestSignatureVerification */ @@ -751,7 +751,7 @@ public function getRequestSignatureVerification() /** * Sets the requestSignatureVerification - * Specifies whether this application requires Azure AD to verify the signed authentication requests. + * Specifies whether this application requires Microsoft Entra ID to verify the signed authentication requests. * * @param RequestSignatureVerification $val The requestSignatureVerification * @@ -977,7 +977,7 @@ public function setTags($val) /** * Gets the tokenEncryptionKeyId - * Specifies the keyId of a public key from the keyCredentials collection. When configured, Azure AD encrypts all the tokens it emits by using the key this property points to. The application code that receives the encrypted token must use the matching private key to decrypt the token before it can be used for the signed-in user. + * Specifies the keyId of a public key from the keyCredentials collection. When configured, Microsoft Entra ID encrypts all the tokens it emits by using the key this property points to. The application code that receives the encrypted token must use the matching private key to decrypt the token before it can be used for the signed-in user. * * @return string|null The tokenEncryptionKeyId */ @@ -992,7 +992,7 @@ public function getTokenEncryptionKeyId() /** * Sets the tokenEncryptionKeyId - * Specifies the keyId of a public key from the keyCredentials collection. When configured, Azure AD encrypts all the tokens it emits by using the key this property points to. The application code that receives the encrypted token must use the matching private key to decrypt the token before it can be used for the signed-in user. + * Specifies the keyId of a public key from the keyCredentials collection. When configured, Microsoft Entra ID encrypts all the tokens it emits by using the key this property points to. The application code that receives the encrypted token must use the matching private key to decrypt the token before it can be used for the signed-in user. * * @param string $val The tokenEncryptionKeyId * @@ -1406,7 +1406,7 @@ public function setTokenLifetimePolicies($val) /** * Gets the connectorGroup - * The connectorGroup the application is using with Azure AD Application Proxy. Nullable. + * The connectorGroup the application is using with Microsoft Entra application proxy. Nullable. * * @return ConnectorGroup|null The connectorGroup */ @@ -1425,7 +1425,7 @@ public function getConnectorGroup() /** * Sets the connectorGroup - * The connectorGroup the application is using with Azure AD Application Proxy. Nullable. + * The connectorGroup the application is using with Microsoft Entra application proxy. Nullable. * * @param ConnectorGroup $val The connectorGroup * @@ -1439,7 +1439,7 @@ public function setConnectorGroup($val) /** * Gets the synchronization - * Represents the capability for Azure Active Directory (Azure AD) identity synchronization through the Microsoft Graph API. + * Represents the capability for Microsoft Entra identity synchronization through the Microsoft Graph API. * * @return Synchronization|null The synchronization */ @@ -1458,7 +1458,7 @@ public function getSynchronization() /** * Sets the synchronization - * Represents the capability for Azure Active Directory (Azure AD) identity synchronization through the Microsoft Graph API. + * Represents the capability for Microsoft Entra identity synchronization through the Microsoft Graph API. * * @param Synchronization $val The synchronization * diff --git a/src/Beta/Microsoft/Graph/Model/AssignedComputeInstanceDetails.php b/src/Beta/Microsoft/Graph/Model/AssignedComputeInstanceDetails.php new file mode 100644 index 00000000000..ef9b56785a2 --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/AssignedComputeInstanceDetails.php @@ -0,0 +1,86 @@ +_propDict)) { + return $this->_propDict["accessedStorageBuckets"]; + } else { + return null; + } + } + + /** + * Sets the accessedStorageBuckets + * + * @param AuthorizationSystemResource[] $val The accessedStorageBuckets + * + * @return AssignedComputeInstanceDetails + */ + public function setAccessedStorageBuckets($val) + { + $this->_propDict["accessedStorageBuckets"] = $val; + return $this; + } + + /** + * Gets the assignedComputeInstance + * + * @return AuthorizationSystemResource|null The assignedComputeInstance + */ + public function getAssignedComputeInstance() + { + if (array_key_exists("assignedComputeInstance", $this->_propDict)) { + if (is_a($this->_propDict["assignedComputeInstance"], "\Beta\Microsoft\Graph\Model\AuthorizationSystemResource") || is_null($this->_propDict["assignedComputeInstance"])) { + return $this->_propDict["assignedComputeInstance"]; + } else { + $this->_propDict["assignedComputeInstance"] = new AuthorizationSystemResource($this->_propDict["assignedComputeInstance"]); + return $this->_propDict["assignedComputeInstance"]; + } + } + return null; + } + + /** + * Sets the assignedComputeInstance + * + * @param AuthorizationSystemResource $val The assignedComputeInstance + * + * @return AssignedComputeInstanceDetails + */ + public function setAssignedComputeInstance($val) + { + $this->_propDict["assignedComputeInstance"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/AttackSimulationUser.php b/src/Beta/Microsoft/Graph/Model/AttackSimulationUser.php index c8f677a40cd..619a06bd892 100644 --- a/src/Beta/Microsoft/Graph/Model/AttackSimulationUser.php +++ b/src/Beta/Microsoft/Graph/Model/AttackSimulationUser.php @@ -109,7 +109,7 @@ public function setOutOfOfficeDays($val) } /** * Gets the userId - * The id property value of the user resource that represents the user in the Azure Active Directory tenant. + * The id property value of the user resource that represents the user in the Microsoft Entra tenant. * * @return string|null The userId */ @@ -124,7 +124,7 @@ public function getUserId() /** * Sets the userId - * The id property value of the user resource that represents the user in the Azure Active Directory tenant. + * The id property value of the user resource that represents the user in the Microsoft Entra tenant. * * @param string $val The value of the userId * diff --git a/src/Beta/Microsoft/Graph/Model/AuditUserIdentity.php b/src/Beta/Microsoft/Graph/Model/AuditUserIdentity.php index c8a83c87694..447b73d3765 100644 --- a/src/Beta/Microsoft/Graph/Model/AuditUserIdentity.php +++ b/src/Beta/Microsoft/Graph/Model/AuditUserIdentity.php @@ -53,7 +53,7 @@ public function setHomeTenantId($val) } /** * Gets the homeTenantName - * For user sign ins, the name of the tenant that the user is a member of. Only populated in cases where the home tenant has provided affirmative consent to Azure AD to show the tenant content. + * For user sign ins, the name of the tenant that the user is a member of. Only populated in cases where the home tenant has provided affirmative consent to Microsoft Entra ID to show the tenant content. * * @return string|null The homeTenantName */ @@ -68,7 +68,7 @@ public function getHomeTenantName() /** * Sets the homeTenantName - * For user sign ins, the name of the tenant that the user is a member of. Only populated in cases where the home tenant has provided affirmative consent to Azure AD to show the tenant content. + * For user sign ins, the name of the tenant that the user is a member of. Only populated in cases where the home tenant has provided affirmative consent to Microsoft Entra ID to show the tenant content. * * @param string $val The value of the homeTenantName * diff --git a/src/Beta/Microsoft/Graph/Model/Authentication.php b/src/Beta/Microsoft/Graph/Model/Authentication.php index c267adb22c5..d851a09e563 100644 --- a/src/Beta/Microsoft/Graph/Model/Authentication.php +++ b/src/Beta/Microsoft/Graph/Model/Authentication.php @@ -296,6 +296,34 @@ public function setPhoneMethods($val) } + /** + * Gets the platformCredentialMethods + * + * @return array|null The platformCredentialMethods + */ + public function getPlatformCredentialMethods() + { + if (array_key_exists("platformCredentialMethods", $this->_propDict)) { + return $this->_propDict["platformCredentialMethods"]; + } else { + return null; + } + } + + /** + * Sets the platformCredentialMethods + * + * @param PlatformCredentialAuthenticationMethod[] $val The platformCredentialMethods + * + * @return Authentication + */ + public function setPlatformCredentialMethods($val) + { + $this->_propDict["platformCredentialMethods"] = $val; + return $this; + } + + /** * Gets the softwareOathMethods * diff --git a/src/Beta/Microsoft/Graph/Model/AuthenticationMethodFeatureConfiguration.php b/src/Beta/Microsoft/Graph/Model/AuthenticationMethodFeatureConfiguration.php index 8dd8bfc3c4c..aa1115fab64 100644 --- a/src/Beta/Microsoft/Graph/Model/AuthenticationMethodFeatureConfiguration.php +++ b/src/Beta/Microsoft/Graph/Model/AuthenticationMethodFeatureConfiguration.php @@ -92,7 +92,7 @@ public function setIncludeTarget($val) /** * Gets the state - * Enable or disable the feature. Possible values are: default, enabled, disabled, unknownFutureValue. The default value is used when the configuration hasn't been explicitly set and uses the default behavior of Azure AD for the setting. The default value is disabled. + * Enable or disable the feature. Possible values are: default, enabled, disabled, unknownFutureValue. The default value is used when the configuration hasn't been explicitly set and uses the default behavior of Microsoft Entra ID for the setting. The default value is disabled. * * @return AdvancedConfigState|null The state */ @@ -111,7 +111,7 @@ public function getState() /** * Sets the state - * Enable or disable the feature. Possible values are: default, enabled, disabled, unknownFutureValue. The default value is used when the configuration hasn't been explicitly set and uses the default behavior of Azure AD for the setting. The default value is disabled. + * Enable or disable the feature. Possible values are: default, enabled, disabled, unknownFutureValue. The default value is used when the configuration hasn't been explicitly set and uses the default behavior of Microsoft Entra ID for the setting. The default value is disabled. * * @param AdvancedConfigState $val The value to assign to the state * diff --git a/src/Beta/Microsoft/Graph/Model/AuthenticationMethodPlatform.php b/src/Beta/Microsoft/Graph/Model/AuthenticationMethodPlatform.php new file mode 100644 index 00000000000..6a03158a90b --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/AuthenticationMethodPlatform.php @@ -0,0 +1,39 @@ +_propDict)) { + return $this->_propDict["enforceRegistrationAfterAllowedSnoozes"]; + } else { + return null; + } + } + + /** + * Sets the enforceRegistrationAfterAllowedSnoozes + * Specifies whether a user is required to perform registration after snoozing 3 times. If true, the user is required to register after 3 snoozes. If false, the user can snooze indefinitely. The default value is true. + * + * @param bool $val The value of the enforceRegistrationAfterAllowedSnoozes + * + * @return AuthenticationMethodsRegistrationCampaign + */ + public function setEnforceRegistrationAfterAllowedSnoozes($val) + { + $this->_propDict["enforceRegistrationAfterAllowedSnoozes"] = $val; + return $this; + } /** * Gets the excludeTargets @@ -120,7 +148,7 @@ public function setSnoozeDurationInDays($val) /** * Gets the state - * Enable or disable the feature. Possible values are: default, enabled, disabled, unknownFutureValue. The default value is used when the configuration hasn't been explicitly set and uses the default behavior of Azure AD for the setting. The default value is disabled. + * Enable or disable the feature. Possible values are: default, enabled, disabled, unknownFutureValue. The default value is used when the configuration hasn't been explicitly set and uses the default behavior of Microsoft Entra ID for the setting. The default value is disabled. * * @return AdvancedConfigState|null The state */ @@ -139,7 +167,7 @@ public function getState() /** * Sets the state - * Enable or disable the feature. Possible values are: default, enabled, disabled, unknownFutureValue. The default value is used when the configuration hasn't been explicitly set and uses the default behavior of Azure AD for the setting. The default value is disabled. + * Enable or disable the feature. Possible values are: default, enabled, disabled, unknownFutureValue. The default value is used when the configuration hasn't been explicitly set and uses the default behavior of Microsoft Entra ID for the setting. The default value is disabled. * * @param AdvancedConfigState $val The value to assign to the state * diff --git a/src/Beta/Microsoft/Graph/Model/AuthenticationMethodsRegistrationCampaignIncludeTarget.php b/src/Beta/Microsoft/Graph/Model/AuthenticationMethodsRegistrationCampaignIncludeTarget.php index c566b39736e..332249e7b74 100644 --- a/src/Beta/Microsoft/Graph/Model/AuthenticationMethodsRegistrationCampaignIncludeTarget.php +++ b/src/Beta/Microsoft/Graph/Model/AuthenticationMethodsRegistrationCampaignIncludeTarget.php @@ -25,7 +25,7 @@ class AuthenticationMethodsRegistrationCampaignIncludeTarget extends Entity { /** * Gets the id - * The object identifier of an Azure AD user or group. + * The object identifier of a Microsoft Entra user or group. * * @return string|null The id */ @@ -40,7 +40,7 @@ public function getId() /** * Sets the id - * The object identifier of an Azure AD user or group. + * The object identifier of a Microsoft Entra user or group. * * @param string $val The value of the id * diff --git a/src/Beta/Microsoft/Graph/Model/AuthenticationRequirementPolicy.php b/src/Beta/Microsoft/Graph/Model/AuthenticationRequirementPolicy.php index 0d0ed6650cc..edcac35c3fb 100644 --- a/src/Beta/Microsoft/Graph/Model/AuthenticationRequirementPolicy.php +++ b/src/Beta/Microsoft/Graph/Model/AuthenticationRequirementPolicy.php @@ -54,7 +54,7 @@ public function setDetail($val) /** * Gets the requirementProvider - * Identifies what Azure AD feature requires MFA in this policy. Possible values are: user, request, servicePrincipal, v1ConditionalAccess, multiConditionalAccess, tenantSessionRiskPolicy, accountCompromisePolicies, v1ConditionalAccessDependency, v1ConditionalAccessPolicyIdRequested, mfaRegistrationRequiredByIdentityProtectionPolicy, baselineProtection, mfaRegistrationRequiredByBaselineProtection, mfaRegistrationRequiredByMultiConditionalAccess, enforcedForCspAdmins, securityDefaults, mfaRegistrationRequiredBySecurityDefaults, proofUpCodeRequest, crossTenantOutboundRule, gpsLocationCondition, riskBasedPolicy, unknownFutureValue. + * Identifies what Microsoft Entra feature requires MFA in this policy. Possible values are: user, request, servicePrincipal, v1ConditionalAccess, multiConditionalAccess, tenantSessionRiskPolicy, accountCompromisePolicies, v1ConditionalAccessDependency, v1ConditionalAccessPolicyIdRequested, mfaRegistrationRequiredByIdentityProtectionPolicy, baselineProtection, mfaRegistrationRequiredByBaselineProtection, mfaRegistrationRequiredByMultiConditionalAccess, enforcedForCspAdmins, securityDefaults, mfaRegistrationRequiredBySecurityDefaults, proofUpCodeRequest, crossTenantOutboundRule, gpsLocationCondition, riskBasedPolicy, unknownFutureValue. * * @return RequirementProvider|null The requirementProvider */ @@ -73,7 +73,7 @@ public function getRequirementProvider() /** * Sets the requirementProvider - * Identifies what Azure AD feature requires MFA in this policy. Possible values are: user, request, servicePrincipal, v1ConditionalAccess, multiConditionalAccess, tenantSessionRiskPolicy, accountCompromisePolicies, v1ConditionalAccessDependency, v1ConditionalAccessPolicyIdRequested, mfaRegistrationRequiredByIdentityProtectionPolicy, baselineProtection, mfaRegistrationRequiredByBaselineProtection, mfaRegistrationRequiredByMultiConditionalAccess, enforcedForCspAdmins, securityDefaults, mfaRegistrationRequiredBySecurityDefaults, proofUpCodeRequest, crossTenantOutboundRule, gpsLocationCondition, riskBasedPolicy, unknownFutureValue. + * Identifies what Microsoft Entra feature requires MFA in this policy. Possible values are: user, request, servicePrincipal, v1ConditionalAccess, multiConditionalAccess, tenantSessionRiskPolicy, accountCompromisePolicies, v1ConditionalAccessDependency, v1ConditionalAccessPolicyIdRequested, mfaRegistrationRequiredByIdentityProtectionPolicy, baselineProtection, mfaRegistrationRequiredByBaselineProtection, mfaRegistrationRequiredByMultiConditionalAccess, enforcedForCspAdmins, securityDefaults, mfaRegistrationRequiredBySecurityDefaults, proofUpCodeRequest, crossTenantOutboundRule, gpsLocationCondition, riskBasedPolicy, unknownFutureValue. * * @param RequirementProvider $val The value to assign to the requirementProvider * diff --git a/src/Beta/Microsoft/Graph/Model/AuthenticationStrengthPolicy.php b/src/Beta/Microsoft/Graph/Model/AuthenticationStrengthPolicy.php index e4740a0c455..e495da3c968 100644 --- a/src/Beta/Microsoft/Graph/Model/AuthenticationStrengthPolicy.php +++ b/src/Beta/Microsoft/Graph/Model/AuthenticationStrengthPolicy.php @@ -180,7 +180,7 @@ public function setModifiedDateTime($val) /** * Gets the policyType - * A descriptor of whether this policy is built into Azure AD or created by an admin for the tenant. The possible values are: builtIn, custom, unknownFutureValue. Supports $filter (eq, ne, not , and in). + * A descriptor of whether this policy is built into Microsoft Entra Conditional Access or created by an admin for the tenant. The possible values are: builtIn, custom, unknownFutureValue. Supports $filter (eq, ne, not , and in). * * @return AuthenticationStrengthPolicyType|null The policyType */ @@ -199,7 +199,7 @@ public function getPolicyType() /** * Sets the policyType - * A descriptor of whether this policy is built into Azure AD or created by an admin for the tenant. The possible values are: builtIn, custom, unknownFutureValue. Supports $filter (eq, ne, not , and in). + * A descriptor of whether this policy is built into Microsoft Entra Conditional Access or created by an admin for the tenant. The possible values are: builtIn, custom, unknownFutureValue. Supports $filter (eq, ne, not , and in). * * @param AuthenticationStrengthPolicyType $val The policyType * diff --git a/src/Beta/Microsoft/Graph/Model/AuthorizationInfo.php b/src/Beta/Microsoft/Graph/Model/AuthorizationInfo.php index 947fda4405e..3f7062cf399 100644 --- a/src/Beta/Microsoft/Graph/Model/AuthorizationInfo.php +++ b/src/Beta/Microsoft/Graph/Model/AuthorizationInfo.php @@ -25,7 +25,7 @@ class AuthorizationInfo extends Entity { /** * Gets the certificateUserIds - * The collection of unique identifiers that can be associated with a user and can be used to bind the Azure AD user to a certificate for authentication and authorization into non-Azure AD environments. The identifiers must be unique in the tenant. + * The collection of unique identifiers that can be associated with a user and can be used to bind the Microsoft Entra user to a certificate for authentication and authorization into non-Azure AD environments. The identifiers must be unique in the tenant. * * @return string|null The certificateUserIds */ @@ -40,7 +40,7 @@ public function getCertificateUserIds() /** * Sets the certificateUserIds - * The collection of unique identifiers that can be associated with a user and can be used to bind the Azure AD user to a certificate for authentication and authorization into non-Azure AD environments. The identifiers must be unique in the tenant. + * The collection of unique identifiers that can be associated with a user and can be used to bind the Microsoft Entra user to a certificate for authentication and authorization into non-Azure AD environments. The identifiers must be unique in the tenant. * * @param string $val The value of the certificateUserIds * diff --git a/src/Beta/Microsoft/Graph/Model/AuthorizationPolicy.php b/src/Beta/Microsoft/Graph/Model/AuthorizationPolicy.php index f117db6d9f9..13070b99a6e 100644 --- a/src/Beta/Microsoft/Graph/Model/AuthorizationPolicy.php +++ b/src/Beta/Microsoft/Graph/Model/AuthorizationPolicy.php @@ -175,7 +175,7 @@ public function setAllowUserConsentForRiskyApps($val) /** * Gets the blockMsolPowerShell - * To disable the use of the MSOnline PowerShell module set this property to true. This will also disable user-based access to the legacy service endpoint used by the MSOnline PowerShell module. This doesn't affect Azure AD Connect or Microsoft Graph. + * To disable the use of the MSOnline PowerShell module set this property to true. This will also disable user-based access to the legacy service endpoint used by the MSOnline PowerShell module. This doesn't affect Microsoft Entra Connect or Microsoft Graph. * * @return bool|null The blockMsolPowerShell */ @@ -190,7 +190,7 @@ public function getBlockMsolPowerShell() /** * Sets the blockMsolPowerShell - * To disable the use of the MSOnline PowerShell module set this property to true. This will also disable user-based access to the legacy service endpoint used by the MSOnline PowerShell module. This doesn't affect Azure AD Connect or Microsoft Graph. + * To disable the use of the MSOnline PowerShell module set this property to true. This will also disable user-based access to the legacy service endpoint used by the MSOnline PowerShell module. This doesn't affect Microsoft Entra Connect or Microsoft Graph. * * @param bool $val The blockMsolPowerShell * diff --git a/src/Beta/Microsoft/Graph/Model/AuthorizationSystemInfo.php b/src/Beta/Microsoft/Graph/Model/AuthorizationSystemInfo.php index d4a620764ec..415190fd8fe 100644 --- a/src/Beta/Microsoft/Graph/Model/AuthorizationSystemInfo.php +++ b/src/Beta/Microsoft/Graph/Model/AuthorizationSystemInfo.php @@ -23,6 +23,37 @@ */ class AuthorizationSystemInfo extends Entity { + + /** + * Gets the authorizationSystemType + * + * @return AuthorizationSystemType|null The authorizationSystemType + */ + public function getAuthorizationSystemType() + { + if (array_key_exists("authorizationSystemType", $this->_propDict)) { + if (is_a($this->_propDict["authorizationSystemType"], "\Beta\Microsoft\Graph\Model\AuthorizationSystemType") || is_null($this->_propDict["authorizationSystemType"])) { + return $this->_propDict["authorizationSystemType"]; + } else { + $this->_propDict["authorizationSystemType"] = new AuthorizationSystemType($this->_propDict["authorizationSystemType"]); + return $this->_propDict["authorizationSystemType"]; + } + } + return null; + } + + /** + * Sets the authorizationSystemType + * + * @param AuthorizationSystemType $val The value to assign to the authorizationSystemType + * + * @return AuthorizationSystemInfo The AuthorizationSystemInfo + */ + public function setAuthorizationSystemType($val) + { + $this->_propDict["authorizationSystemType"] = $val; + return $this; + } /** * Gets the displayName * diff --git a/src/Beta/Microsoft/Graph/Model/AuthorizationSystemType.php b/src/Beta/Microsoft/Graph/Model/AuthorizationSystemType.php new file mode 100644 index 00000000000..b201cf2b2c0 --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/AuthorizationSystemType.php @@ -0,0 +1,36 @@ +_propDict)) { + if (is_a($this->_propDict["owner"], "\Beta\Microsoft\Graph\Model\AwsUser") || is_null($this->_propDict["owner"])) { + return $this->_propDict["owner"]; + } else { + $this->_propDict["owner"] = new AwsUser($this->_propDict["owner"]); + return $this->_propDict["owner"]; + } + } + return null; + } + + /** + * Sets the owner + * + * @param AwsUser $val The owner + * + * @return AwsAccessKey + */ + public function setOwner($val) + { + $this->_propDict["owner"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/AwsAccessType.php b/src/Beta/Microsoft/Graph/Model/AwsAccessType.php new file mode 100644 index 00000000000..9799c606d99 --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/AwsAccessType.php @@ -0,0 +1,37 @@ +_propDict)) { + if (is_a($this->_propDict["resource"], "\Beta\Microsoft\Graph\Model\AwsAuthorizationSystemResource") || is_null($this->_propDict["resource"])) { + return $this->_propDict["resource"]; + } else { + $this->_propDict["resource"] = new AwsAuthorizationSystemResource($this->_propDict["resource"]); + return $this->_propDict["resource"]; + } + } + return null; + } + + /** + * Sets the resource + * + * @param AwsAuthorizationSystemResource $val The resource + * + * @return AwsEc2Instance + */ + public function setResource($val) + { + $this->_propDict["resource"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/AwsExternalSystemAccessFinding.php b/src/Beta/Microsoft/Graph/Model/AwsExternalSystemAccessFinding.php new file mode 100644 index 00000000000..5e9cb940afe --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/AwsExternalSystemAccessFinding.php @@ -0,0 +1,174 @@ +_propDict)) { + if (is_a($this->_propDict["accessMethods"], "\Beta\Microsoft\Graph\Model\ExternalSystemAccessMethods") || is_null($this->_propDict["accessMethods"])) { + return $this->_propDict["accessMethods"]; + } else { + $this->_propDict["accessMethods"] = new ExternalSystemAccessMethods($this->_propDict["accessMethods"]); + return $this->_propDict["accessMethods"]; + } + } + return null; + } + + /** + * Sets the accessMethods + * + * @param ExternalSystemAccessMethods $val The accessMethods + * + * @return AwsExternalSystemAccessFinding + */ + public function setAccessMethods($val) + { + $this->_propDict["accessMethods"] = $val; + return $this; + } + + /** + * Gets the systemWithAccess + * + * @return AuthorizationSystemInfo|null The systemWithAccess + */ + public function getSystemWithAccess() + { + if (array_key_exists("systemWithAccess", $this->_propDict)) { + if (is_a($this->_propDict["systemWithAccess"], "\Beta\Microsoft\Graph\Model\AuthorizationSystemInfo") || is_null($this->_propDict["systemWithAccess"])) { + return $this->_propDict["systemWithAccess"]; + } else { + $this->_propDict["systemWithAccess"] = new AuthorizationSystemInfo($this->_propDict["systemWithAccess"]); + return $this->_propDict["systemWithAccess"]; + } + } + return null; + } + + /** + * Sets the systemWithAccess + * + * @param AuthorizationSystemInfo $val The systemWithAccess + * + * @return AwsExternalSystemAccessFinding + */ + public function setSystemWithAccess($val) + { + $this->_propDict["systemWithAccess"] = $val; + return $this; + } + + /** + * Gets the trustedIdentityCount + * + * @return int|null The trustedIdentityCount + */ + public function getTrustedIdentityCount() + { + if (array_key_exists("trustedIdentityCount", $this->_propDict)) { + return $this->_propDict["trustedIdentityCount"]; + } else { + return null; + } + } + + /** + * Sets the trustedIdentityCount + * + * @param int $val The trustedIdentityCount + * + * @return AwsExternalSystemAccessFinding + */ + public function setTrustedIdentityCount($val) + { + $this->_propDict["trustedIdentityCount"] = intval($val); + return $this; + } + + /** + * Gets the trustsAllIdentities + * + * @return bool|null The trustsAllIdentities + */ + public function getTrustsAllIdentities() + { + if (array_key_exists("trustsAllIdentities", $this->_propDict)) { + return $this->_propDict["trustsAllIdentities"]; + } else { + return null; + } + } + + /** + * Sets the trustsAllIdentities + * + * @param bool $val The trustsAllIdentities + * + * @return AwsExternalSystemAccessFinding + */ + public function setTrustsAllIdentities($val) + { + $this->_propDict["trustsAllIdentities"] = boolval($val); + return $this; + } + + /** + * Gets the affectedSystem + * + * @return AuthorizationSystem|null The affectedSystem + */ + public function getAffectedSystem() + { + if (array_key_exists("affectedSystem", $this->_propDict)) { + if (is_a($this->_propDict["affectedSystem"], "\Beta\Microsoft\Graph\Model\AuthorizationSystem") || is_null($this->_propDict["affectedSystem"])) { + return $this->_propDict["affectedSystem"]; + } else { + $this->_propDict["affectedSystem"] = new AuthorizationSystem($this->_propDict["affectedSystem"]); + return $this->_propDict["affectedSystem"]; + } + } + return null; + } + + /** + * Sets the affectedSystem + * + * @param AuthorizationSystem $val The affectedSystem + * + * @return AwsExternalSystemAccessFinding + */ + public function setAffectedSystem($val) + { + $this->_propDict["affectedSystem"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/AwsExternalSystemAccessRoleFinding.php b/src/Beta/Microsoft/Graph/Model/AwsExternalSystemAccessRoleFinding.php new file mode 100644 index 00000000000..245b59e125d --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/AwsExternalSystemAccessRoleFinding.php @@ -0,0 +1,116 @@ +_propDict)) { + return $this->_propDict["accessibleSystemIds"]; + } else { + return null; + } + } + + /** + * Sets the accessibleSystemIds + * + * @param string[] $val The accessibleSystemIds + * + * @return AwsExternalSystemAccessRoleFinding + */ + public function setAccessibleSystemIds($val) + { + $this->_propDict["accessibleSystemIds"] = $val; + return $this; + } + + /** + * Gets the permissionsCreepIndex + * + * @return PermissionsCreepIndex|null The permissionsCreepIndex + */ + public function getPermissionsCreepIndex() + { + if (array_key_exists("permissionsCreepIndex", $this->_propDict)) { + if (is_a($this->_propDict["permissionsCreepIndex"], "\Beta\Microsoft\Graph\Model\PermissionsCreepIndex") || is_null($this->_propDict["permissionsCreepIndex"])) { + return $this->_propDict["permissionsCreepIndex"]; + } else { + $this->_propDict["permissionsCreepIndex"] = new PermissionsCreepIndex($this->_propDict["permissionsCreepIndex"]); + return $this->_propDict["permissionsCreepIndex"]; + } + } + return null; + } + + /** + * Sets the permissionsCreepIndex + * + * @param PermissionsCreepIndex $val The permissionsCreepIndex + * + * @return AwsExternalSystemAccessRoleFinding + */ + public function setPermissionsCreepIndex($val) + { + $this->_propDict["permissionsCreepIndex"] = $val; + return $this; + } + + /** + * Gets the role + * + * @return AwsRole|null The role + */ + public function getRole() + { + if (array_key_exists("role", $this->_propDict)) { + if (is_a($this->_propDict["role"], "\Beta\Microsoft\Graph\Model\AwsRole") || is_null($this->_propDict["role"])) { + return $this->_propDict["role"]; + } else { + $this->_propDict["role"] = new AwsRole($this->_propDict["role"]); + return $this->_propDict["role"]; + } + } + return null; + } + + /** + * Sets the role + * + * @param AwsRole $val The role + * + * @return AwsExternalSystemAccessRoleFinding + */ + public function setRole($val) + { + $this->_propDict["role"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/AwsGroup.php b/src/Beta/Microsoft/Graph/Model/AwsGroup.php new file mode 100644 index 00000000000..674fb4d5d2f --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/AwsGroup.php @@ -0,0 +1,27 @@ +_propDict)) { + if (is_a($this->_propDict["actionSummary"], "\Beta\Microsoft\Graph\Model\ActionSummary") || is_null($this->_propDict["actionSummary"])) { + return $this->_propDict["actionSummary"]; + } else { + $this->_propDict["actionSummary"] = new ActionSummary($this->_propDict["actionSummary"]); + return $this->_propDict["actionSummary"]; + } + } + return null; + } + + /** + * Sets the actionSummary + * + * @param ActionSummary $val The actionSummary + * + * @return AwsIdentityAccessManagementKeyAgeFinding + */ + public function setActionSummary($val) + { + $this->_propDict["actionSummary"] = $val; + return $this; + } + + /** + * Gets the awsAccessKeyDetails + * + * @return AwsAccessKeyDetails|null The awsAccessKeyDetails + */ + public function getAwsAccessKeyDetails() + { + if (array_key_exists("awsAccessKeyDetails", $this->_propDict)) { + if (is_a($this->_propDict["awsAccessKeyDetails"], "\Beta\Microsoft\Graph\Model\AwsAccessKeyDetails") || is_null($this->_propDict["awsAccessKeyDetails"])) { + return $this->_propDict["awsAccessKeyDetails"]; + } else { + $this->_propDict["awsAccessKeyDetails"] = new AwsAccessKeyDetails($this->_propDict["awsAccessKeyDetails"]); + return $this->_propDict["awsAccessKeyDetails"]; + } + } + return null; + } + + /** + * Sets the awsAccessKeyDetails + * + * @param AwsAccessKeyDetails $val The awsAccessKeyDetails + * + * @return AwsIdentityAccessManagementKeyAgeFinding + */ + public function setAwsAccessKeyDetails($val) + { + $this->_propDict["awsAccessKeyDetails"] = $val; + return $this; + } + + /** + * Gets the permissionsCreepIndex + * + * @return PermissionsCreepIndex|null The permissionsCreepIndex + */ + public function getPermissionsCreepIndex() + { + if (array_key_exists("permissionsCreepIndex", $this->_propDict)) { + if (is_a($this->_propDict["permissionsCreepIndex"], "\Beta\Microsoft\Graph\Model\PermissionsCreepIndex") || is_null($this->_propDict["permissionsCreepIndex"])) { + return $this->_propDict["permissionsCreepIndex"]; + } else { + $this->_propDict["permissionsCreepIndex"] = new PermissionsCreepIndex($this->_propDict["permissionsCreepIndex"]); + return $this->_propDict["permissionsCreepIndex"]; + } + } + return null; + } + + /** + * Sets the permissionsCreepIndex + * + * @param PermissionsCreepIndex $val The permissionsCreepIndex + * + * @return AwsIdentityAccessManagementKeyAgeFinding + */ + public function setPermissionsCreepIndex($val) + { + $this->_propDict["permissionsCreepIndex"] = $val; + return $this; + } + + /** + * Gets the status + * + * @return IamStatus|null The status + */ + public function getStatus() + { + if (array_key_exists("status", $this->_propDict)) { + if (is_a($this->_propDict["status"], "\Beta\Microsoft\Graph\Model\IamStatus") || is_null($this->_propDict["status"])) { + return $this->_propDict["status"]; + } else { + $this->_propDict["status"] = new IamStatus($this->_propDict["status"]); + return $this->_propDict["status"]; + } + } + return null; + } + + /** + * Sets the status + * + * @param IamStatus $val The status + * + * @return AwsIdentityAccessManagementKeyAgeFinding + */ + public function setStatus($val) + { + $this->_propDict["status"] = $val; + return $this; + } + + /** + * Gets the accessKey + * + * @return AwsAccessKey|null The accessKey + */ + public function getAccessKey() + { + if (array_key_exists("accessKey", $this->_propDict)) { + if (is_a($this->_propDict["accessKey"], "\Beta\Microsoft\Graph\Model\AwsAccessKey") || is_null($this->_propDict["accessKey"])) { + return $this->_propDict["accessKey"]; + } else { + $this->_propDict["accessKey"] = new AwsAccessKey($this->_propDict["accessKey"]); + return $this->_propDict["accessKey"]; + } + } + return null; + } + + /** + * Sets the accessKey + * + * @param AwsAccessKey $val The accessKey + * + * @return AwsIdentityAccessManagementKeyAgeFinding + */ + public function setAccessKey($val) + { + $this->_propDict["accessKey"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/AwsIdentityAccessManagementKeyUsageFinding.php b/src/Beta/Microsoft/Graph/Model/AwsIdentityAccessManagementKeyUsageFinding.php new file mode 100644 index 00000000000..de043e2e9a1 --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/AwsIdentityAccessManagementKeyUsageFinding.php @@ -0,0 +1,182 @@ +_propDict)) { + if (is_a($this->_propDict["actionSummary"], "\Beta\Microsoft\Graph\Model\ActionSummary") || is_null($this->_propDict["actionSummary"])) { + return $this->_propDict["actionSummary"]; + } else { + $this->_propDict["actionSummary"] = new ActionSummary($this->_propDict["actionSummary"]); + return $this->_propDict["actionSummary"]; + } + } + return null; + } + + /** + * Sets the actionSummary + * + * @param ActionSummary $val The actionSummary + * + * @return AwsIdentityAccessManagementKeyUsageFinding + */ + public function setActionSummary($val) + { + $this->_propDict["actionSummary"] = $val; + return $this; + } + + /** + * Gets the awsAccessKeyDetails + * + * @return AwsAccessKeyDetails|null The awsAccessKeyDetails + */ + public function getAwsAccessKeyDetails() + { + if (array_key_exists("awsAccessKeyDetails", $this->_propDict)) { + if (is_a($this->_propDict["awsAccessKeyDetails"], "\Beta\Microsoft\Graph\Model\AwsAccessKeyDetails") || is_null($this->_propDict["awsAccessKeyDetails"])) { + return $this->_propDict["awsAccessKeyDetails"]; + } else { + $this->_propDict["awsAccessKeyDetails"] = new AwsAccessKeyDetails($this->_propDict["awsAccessKeyDetails"]); + return $this->_propDict["awsAccessKeyDetails"]; + } + } + return null; + } + + /** + * Sets the awsAccessKeyDetails + * + * @param AwsAccessKeyDetails $val The awsAccessKeyDetails + * + * @return AwsIdentityAccessManagementKeyUsageFinding + */ + public function setAwsAccessKeyDetails($val) + { + $this->_propDict["awsAccessKeyDetails"] = $val; + return $this; + } + + /** + * Gets the permissionsCreepIndex + * + * @return PermissionsCreepIndex|null The permissionsCreepIndex + */ + public function getPermissionsCreepIndex() + { + if (array_key_exists("permissionsCreepIndex", $this->_propDict)) { + if (is_a($this->_propDict["permissionsCreepIndex"], "\Beta\Microsoft\Graph\Model\PermissionsCreepIndex") || is_null($this->_propDict["permissionsCreepIndex"])) { + return $this->_propDict["permissionsCreepIndex"]; + } else { + $this->_propDict["permissionsCreepIndex"] = new PermissionsCreepIndex($this->_propDict["permissionsCreepIndex"]); + return $this->_propDict["permissionsCreepIndex"]; + } + } + return null; + } + + /** + * Sets the permissionsCreepIndex + * + * @param PermissionsCreepIndex $val The permissionsCreepIndex + * + * @return AwsIdentityAccessManagementKeyUsageFinding + */ + public function setPermissionsCreepIndex($val) + { + $this->_propDict["permissionsCreepIndex"] = $val; + return $this; + } + + /** + * Gets the status + * + * @return IamStatus|null The status + */ + public function getStatus() + { + if (array_key_exists("status", $this->_propDict)) { + if (is_a($this->_propDict["status"], "\Beta\Microsoft\Graph\Model\IamStatus") || is_null($this->_propDict["status"])) { + return $this->_propDict["status"]; + } else { + $this->_propDict["status"] = new IamStatus($this->_propDict["status"]); + return $this->_propDict["status"]; + } + } + return null; + } + + /** + * Sets the status + * + * @param IamStatus $val The status + * + * @return AwsIdentityAccessManagementKeyUsageFinding + */ + public function setStatus($val) + { + $this->_propDict["status"] = $val; + return $this; + } + + /** + * Gets the accessKey + * + * @return AwsAccessKey|null The accessKey + */ + public function getAccessKey() + { + if (array_key_exists("accessKey", $this->_propDict)) { + if (is_a($this->_propDict["accessKey"], "\Beta\Microsoft\Graph\Model\AwsAccessKey") || is_null($this->_propDict["accessKey"])) { + return $this->_propDict["accessKey"]; + } else { + $this->_propDict["accessKey"] = new AwsAccessKey($this->_propDict["accessKey"]); + return $this->_propDict["accessKey"]; + } + } + return null; + } + + /** + * Sets the accessKey + * + * @param AwsAccessKey $val The accessKey + * + * @return AwsIdentityAccessManagementKeyUsageFinding + */ + public function setAccessKey($val) + { + $this->_propDict["accessKey"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/AwsLambda.php b/src/Beta/Microsoft/Graph/Model/AwsLambda.php new file mode 100644 index 00000000000..6659f10dfc2 --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/AwsLambda.php @@ -0,0 +1,58 @@ +_propDict)) { + if (is_a($this->_propDict["resource"], "\Beta\Microsoft\Graph\Model\AwsAuthorizationSystemResource") || is_null($this->_propDict["resource"])) { + return $this->_propDict["resource"]; + } else { + $this->_propDict["resource"] = new AwsAuthorizationSystemResource($this->_propDict["resource"]); + return $this->_propDict["resource"]; + } + } + return null; + } + + /** + * Sets the resource + * + * @param AwsAuthorizationSystemResource $val The resource + * + * @return AwsLambda + */ + public function setResource($val) + { + $this->_propDict["resource"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/AwsSecretInformationAccessFinding.php b/src/Beta/Microsoft/Graph/Model/AwsSecretInformationAccessFinding.php new file mode 100644 index 00000000000..48c7b0df59a --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/AwsSecretInformationAccessFinding.php @@ -0,0 +1,151 @@ +_propDict)) { + if (is_a($this->_propDict["identityDetails"], "\Beta\Microsoft\Graph\Model\IdentityDetails") || is_null($this->_propDict["identityDetails"])) { + return $this->_propDict["identityDetails"]; + } else { + $this->_propDict["identityDetails"] = new IdentityDetails($this->_propDict["identityDetails"]); + return $this->_propDict["identityDetails"]; + } + } + return null; + } + + /** + * Sets the identityDetails + * + * @param IdentityDetails $val The identityDetails + * + * @return AwsSecretInformationAccessFinding + */ + public function setIdentityDetails($val) + { + $this->_propDict["identityDetails"] = $val; + return $this; + } + + /** + * Gets the permissionsCreepIndex + * + * @return PermissionsCreepIndex|null The permissionsCreepIndex + */ + public function getPermissionsCreepIndex() + { + if (array_key_exists("permissionsCreepIndex", $this->_propDict)) { + if (is_a($this->_propDict["permissionsCreepIndex"], "\Beta\Microsoft\Graph\Model\PermissionsCreepIndex") || is_null($this->_propDict["permissionsCreepIndex"])) { + return $this->_propDict["permissionsCreepIndex"]; + } else { + $this->_propDict["permissionsCreepIndex"] = new PermissionsCreepIndex($this->_propDict["permissionsCreepIndex"]); + return $this->_propDict["permissionsCreepIndex"]; + } + } + return null; + } + + /** + * Sets the permissionsCreepIndex + * + * @param PermissionsCreepIndex $val The permissionsCreepIndex + * + * @return AwsSecretInformationAccessFinding + */ + public function setPermissionsCreepIndex($val) + { + $this->_propDict["permissionsCreepIndex"] = $val; + return $this; + } + + /** + * Gets the secretInformationWebServices + * + * @return AwsSecretInformationWebServices|null The secretInformationWebServices + */ + public function getSecretInformationWebServices() + { + if (array_key_exists("secretInformationWebServices", $this->_propDict)) { + if (is_a($this->_propDict["secretInformationWebServices"], "\Beta\Microsoft\Graph\Model\AwsSecretInformationWebServices") || is_null($this->_propDict["secretInformationWebServices"])) { + return $this->_propDict["secretInformationWebServices"]; + } else { + $this->_propDict["secretInformationWebServices"] = new AwsSecretInformationWebServices($this->_propDict["secretInformationWebServices"]); + return $this->_propDict["secretInformationWebServices"]; + } + } + return null; + } + + /** + * Sets the secretInformationWebServices + * + * @param AwsSecretInformationWebServices $val The secretInformationWebServices + * + * @return AwsSecretInformationAccessFinding + */ + public function setSecretInformationWebServices($val) + { + $this->_propDict["secretInformationWebServices"] = $val; + return $this; + } + + /** + * Gets the identity + * + * @return AuthorizationSystemIdentity|null The identity + */ + public function getIdentity() + { + if (array_key_exists("identity", $this->_propDict)) { + if (is_a($this->_propDict["identity"], "\Beta\Microsoft\Graph\Model\AuthorizationSystemIdentity") || is_null($this->_propDict["identity"])) { + return $this->_propDict["identity"]; + } else { + $this->_propDict["identity"] = new AuthorizationSystemIdentity($this->_propDict["identity"]); + return $this->_propDict["identity"]; + } + } + return null; + } + + /** + * Sets the identity + * + * @param AuthorizationSystemIdentity $val The identity + * + * @return AwsSecretInformationAccessFinding + */ + public function setIdentity($val) + { + $this->_propDict["identity"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/AwsSecretInformationWebServices.php b/src/Beta/Microsoft/Graph/Model/AwsSecretInformationWebServices.php new file mode 100644 index 00000000000..8c5f7053d17 --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/AwsSecretInformationWebServices.php @@ -0,0 +1,37 @@ +_propDict)) { + if (is_a($this->_propDict["identityDetails"], "\Beta\Microsoft\Graph\Model\IdentityDetails") || is_null($this->_propDict["identityDetails"])) { + return $this->_propDict["identityDetails"]; + } else { + $this->_propDict["identityDetails"] = new IdentityDetails($this->_propDict["identityDetails"]); + return $this->_propDict["identityDetails"]; + } + } + return null; + } + + /** + * Sets the identityDetails + * + * @param IdentityDetails $val The identityDetails + * + * @return AwsSecurityToolAdministrationFinding + */ + public function setIdentityDetails($val) + { + $this->_propDict["identityDetails"] = $val; + return $this; + } + + /** + * Gets the permissionsCreepIndex + * + * @return PermissionsCreepIndex|null The permissionsCreepIndex + */ + public function getPermissionsCreepIndex() + { + if (array_key_exists("permissionsCreepIndex", $this->_propDict)) { + if (is_a($this->_propDict["permissionsCreepIndex"], "\Beta\Microsoft\Graph\Model\PermissionsCreepIndex") || is_null($this->_propDict["permissionsCreepIndex"])) { + return $this->_propDict["permissionsCreepIndex"]; + } else { + $this->_propDict["permissionsCreepIndex"] = new PermissionsCreepIndex($this->_propDict["permissionsCreepIndex"]); + return $this->_propDict["permissionsCreepIndex"]; + } + } + return null; + } + + /** + * Sets the permissionsCreepIndex + * + * @param PermissionsCreepIndex $val The permissionsCreepIndex + * + * @return AwsSecurityToolAdministrationFinding + */ + public function setPermissionsCreepIndex($val) + { + $this->_propDict["permissionsCreepIndex"] = $val; + return $this; + } + + /** + * Gets the securityTools + * + * @return AwsSecurityToolWebServices|null The securityTools + */ + public function getSecurityTools() + { + if (array_key_exists("securityTools", $this->_propDict)) { + if (is_a($this->_propDict["securityTools"], "\Beta\Microsoft\Graph\Model\AwsSecurityToolWebServices") || is_null($this->_propDict["securityTools"])) { + return $this->_propDict["securityTools"]; + } else { + $this->_propDict["securityTools"] = new AwsSecurityToolWebServices($this->_propDict["securityTools"]); + return $this->_propDict["securityTools"]; + } + } + return null; + } + + /** + * Sets the securityTools + * + * @param AwsSecurityToolWebServices $val The securityTools + * + * @return AwsSecurityToolAdministrationFinding + */ + public function setSecurityTools($val) + { + $this->_propDict["securityTools"] = $val; + return $this; + } + + /** + * Gets the identity + * + * @return AuthorizationSystemIdentity|null The identity + */ + public function getIdentity() + { + if (array_key_exists("identity", $this->_propDict)) { + if (is_a($this->_propDict["identity"], "\Beta\Microsoft\Graph\Model\AuthorizationSystemIdentity") || is_null($this->_propDict["identity"])) { + return $this->_propDict["identity"]; + } else { + $this->_propDict["identity"] = new AuthorizationSystemIdentity($this->_propDict["identity"]); + return $this->_propDict["identity"]; + } + } + return null; + } + + /** + * Sets the identity + * + * @param AuthorizationSystemIdentity $val The identity + * + * @return AwsSecurityToolAdministrationFinding + */ + public function setIdentity($val) + { + $this->_propDict["identity"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/AwsSecurityToolWebServices.php b/src/Beta/Microsoft/Graph/Model/AwsSecurityToolWebServices.php new file mode 100644 index 00000000000..95f47f279bc --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/AwsSecurityToolWebServices.php @@ -0,0 +1,40 @@ +_propDict)) { + if (is_a($this->_propDict["resource"], "\Beta\Microsoft\Graph\Model\AzureAuthorizationSystemResource") || is_null($this->_propDict["resource"])) { + return $this->_propDict["resource"]; + } else { + $this->_propDict["resource"] = new AzureAuthorizationSystemResource($this->_propDict["resource"]); + return $this->_propDict["resource"]; + } + } + return null; + } + + /** + * Sets the resource + * + * @param AzureAuthorizationSystemResource $val The resource + * + * @return AzureServerlessFunction + */ + public function setResource($val) + { + $this->_propDict["resource"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/BitlockerRecoveryKey.php b/src/Beta/Microsoft/Graph/Model/BitlockerRecoveryKey.php index 3f0484cdd3e..004cca2cb6f 100644 --- a/src/Beta/Microsoft/Graph/Model/BitlockerRecoveryKey.php +++ b/src/Beta/Microsoft/Graph/Model/BitlockerRecoveryKey.php @@ -26,7 +26,7 @@ class BitlockerRecoveryKey extends Entity { /** * Gets the createdDateTime - * The date and time when the key was originally backed up to Azure Active Directory. + * The date and time when the key was originally backed up to Microsoft Entra ID. * * @return \DateTime|null The createdDateTime */ @@ -45,7 +45,7 @@ public function getCreatedDateTime() /** * Sets the createdDateTime - * The date and time when the key was originally backed up to Azure Active Directory. + * The date and time when the key was originally backed up to Microsoft Entra ID. * * @param \DateTime $val The createdDateTime * diff --git a/src/Beta/Microsoft/Graph/Model/Channel.php b/src/Beta/Microsoft/Graph/Model/Channel.php index 4a05aa522d6..77caf0772cc 100644 --- a/src/Beta/Microsoft/Graph/Model/Channel.php +++ b/src/Beta/Microsoft/Graph/Model/Channel.php @@ -274,7 +274,7 @@ public function setSummary($val) /** * Gets the tenantId - * The ID of the Azure Active Directory tenant. + * The ID of the Microsoft Entra tenant. * * @return string|null The tenantId */ @@ -289,7 +289,7 @@ public function getTenantId() /** * Sets the tenantId - * The ID of the Azure Active Directory tenant. + * The ID of the Microsoft Entra tenant. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/Model/CloudPC.php b/src/Beta/Microsoft/Graph/Model/CloudPC.php index 25b63c1acbd..c1307aa9e8d 100644 --- a/src/Beta/Microsoft/Graph/Model/CloudPC.php +++ b/src/Beta/Microsoft/Graph/Model/CloudPC.php @@ -26,7 +26,7 @@ class CloudPC extends Entity { /** * Gets the aadDeviceId - * The Azure Active Directory (Azure AD) device ID of the Cloud PC. + * The Microsoft Entra device ID of the Cloud PC. * * @return string|null The aadDeviceId */ @@ -41,7 +41,7 @@ public function getAadDeviceId() /** * Sets the aadDeviceId - * The Azure Active Directory (Azure AD) device ID of the Cloud PC. + * The Microsoft Entra device ID of the Cloud PC. * * @param string $val The aadDeviceId * diff --git a/src/Beta/Microsoft/Graph/Model/CloudPcAuditActor.php b/src/Beta/Microsoft/Graph/Model/CloudPcAuditActor.php index 0d9dc3eae53..d53ce37357b 100644 --- a/src/Beta/Microsoft/Graph/Model/CloudPcAuditActor.php +++ b/src/Beta/Microsoft/Graph/Model/CloudPcAuditActor.php @@ -53,7 +53,7 @@ public function setApplicationDisplayName($val) } /** * Gets the applicationId - * Azure AD application ID. + * Microsoft Entra application ID. * * @return string|null The applicationId */ @@ -68,7 +68,7 @@ public function getApplicationId() /** * Sets the applicationId - * Azure AD application ID. + * Microsoft Entra application ID. * * @param string $val The value of the applicationId * @@ -226,7 +226,7 @@ public function setType($val) } /** * Gets the userId - * Azure AD user ID. + * Microsoft Entra user ID. * * @return string|null The userId */ @@ -241,7 +241,7 @@ public function getUserId() /** * Sets the userId - * Azure AD user ID. + * Microsoft Entra user ID. * * @param string $val The value of the userId * diff --git a/src/Beta/Microsoft/Graph/Model/CloudPcAuditEvent.php b/src/Beta/Microsoft/Graph/Model/CloudPcAuditEvent.php index ebe9b07977a..0dcdf7a3b38 100644 --- a/src/Beta/Microsoft/Graph/Model/CloudPcAuditEvent.php +++ b/src/Beta/Microsoft/Graph/Model/CloudPcAuditEvent.php @@ -183,7 +183,7 @@ public function setActivityType($val) /** * Gets the actor - * Azure AD user and application associated with the audit event. Read-only. + * Microsoft Entra user and application associated with the audit event. Read-only. * * @return CloudPcAuditActor|null The actor */ @@ -202,7 +202,7 @@ public function getActor() /** * Sets the actor - * Azure AD user and application associated with the audit event. Read-only. + * Microsoft Entra user and application associated with the audit event. Read-only. * * @param CloudPcAuditActor $val The actor * diff --git a/src/Beta/Microsoft/Graph/Model/CloudPcDomainJoinConfiguration.php b/src/Beta/Microsoft/Graph/Model/CloudPcDomainJoinConfiguration.php index b45fb57cdcb..b674c7b6d5e 100644 --- a/src/Beta/Microsoft/Graph/Model/CloudPcDomainJoinConfiguration.php +++ b/src/Beta/Microsoft/Graph/Model/CloudPcDomainJoinConfiguration.php @@ -25,7 +25,7 @@ class CloudPcDomainJoinConfiguration extends Entity { /** * Gets the onPremisesConnectionId - * The Azure network connection ID that matches the virtual network IT admins want the provisioning policy to use when they create Cloud PCs. You can use this property in both domain join types: Azure AD joined or Hybrid Azure AD joined. If you enter an onPremisesConnectionId, leave regionName as empty. + * The Azure network connection ID that matches the virtual network IT admins want the provisioning policy to use when they create Cloud PCs. You can use this property in both domain join types: Azure AD joined or Hybrid Microsoft Entra joined. If you enter an onPremisesConnectionId, leave regionName as empty. * * @return string|null The onPremisesConnectionId */ @@ -40,7 +40,7 @@ public function getOnPremisesConnectionId() /** * Sets the onPremisesConnectionId - * The Azure network connection ID that matches the virtual network IT admins want the provisioning policy to use when they create Cloud PCs. You can use this property in both domain join types: Azure AD joined or Hybrid Azure AD joined. If you enter an onPremisesConnectionId, leave regionName as empty. + * The Azure network connection ID that matches the virtual network IT admins want the provisioning policy to use when they create Cloud PCs. You can use this property in both domain join types: Azure AD joined or Hybrid Microsoft Entra joined. If you enter an onPremisesConnectionId, leave regionName as empty. * * @param string $val The value of the onPremisesConnectionId * @@ -86,7 +86,7 @@ public function setRegionGroup($val) } /** * Gets the regionName - * The supported Azure region where the IT admin wants the provisioning policy to create Cloud PCs. The underlying virtual network will be created and managed by the Windows 365 service. This can only be entered if the IT admin chooses Azure AD joined as the domain join type. If you enter a regionName, leave onPremisesConnectionId as empty. + * The supported Azure region where the IT admin wants the provisioning policy to create Cloud PCs. The underlying virtual network will be created and managed by the Windows 365 service. This can only be entered if the IT admin chooses Microsoft Entra joined as the domain join type. If you enter a regionName, leave onPremisesConnectionId as empty. * * @return string|null The regionName */ @@ -101,7 +101,7 @@ public function getRegionName() /** * Sets the regionName - * The supported Azure region where the IT admin wants the provisioning policy to create Cloud PCs. The underlying virtual network will be created and managed by the Windows 365 service. This can only be entered if the IT admin chooses Azure AD joined as the domain join type. If you enter a regionName, leave onPremisesConnectionId as empty. + * The supported Azure region where the IT admin wants the provisioning policy to create Cloud PCs. The underlying virtual network will be created and managed by the Windows 365 service. This can only be entered if the IT admin chooses Microsoft Entra joined as the domain join type. If you enter a regionName, leave onPremisesConnectionId as empty. * * @param string $val The value of the regionName * @@ -115,7 +115,7 @@ public function setRegionName($val) /** * Gets the type - * Specifies how the provisioned Cloud PC will be joined to Azure AD. If you choose the hybridAzureADJoin type, only provide a value for the onPremisesConnectionId property and leave regionName as empty. If you choose the azureADJoin type, provide a value for either onPremisesConnectionId or regionName. The possible values are: azureADJoin, hybridAzureADJoin, unknownFutureValue. + * Specifies how the provisioned Cloud PC will be joined to Microsoft Entra ID. If you choose the hybridAzureADJoin type, only provide a value for the onPremisesConnectionId property and leave regionName as empty. If you choose the azureADJoin type, provide a value for either onPremisesConnectionId or regionName. The possible values are: azureADJoin, hybridAzureADJoin, unknownFutureValue. * * @return CloudPcDomainJoinType|null The type */ @@ -134,7 +134,7 @@ public function getType() /** * Sets the type - * Specifies how the provisioned Cloud PC will be joined to Azure AD. If you choose the hybridAzureADJoin type, only provide a value for the onPremisesConnectionId property and leave regionName as empty. If you choose the azureADJoin type, provide a value for either onPremisesConnectionId or regionName. The possible values are: azureADJoin, hybridAzureADJoin, unknownFutureValue. + * Specifies how the provisioned Cloud PC will be joined to Microsoft Entra ID. If you choose the hybridAzureADJoin type, only provide a value for the onPremisesConnectionId property and leave regionName as empty. If you choose the azureADJoin type, provide a value for either onPremisesConnectionId or regionName. The possible values are: azureADJoin, hybridAzureADJoin, unknownFutureValue. * * @param CloudPcDomainJoinType $val The value to assign to the type * diff --git a/src/Beta/Microsoft/Graph/Model/CloudPcOnPremisesConnection.php b/src/Beta/Microsoft/Graph/Model/CloudPcOnPremisesConnection.php index bd926c38a32..4e1f8aa39b0 100644 --- a/src/Beta/Microsoft/Graph/Model/CloudPcOnPremisesConnection.php +++ b/src/Beta/Microsoft/Graph/Model/CloudPcOnPremisesConnection.php @@ -444,7 +444,7 @@ public function setSubscriptionName($val) /** * Gets the type - * Specifies how the provisioned Cloud PC is joined to Azure Active Directory. Default value is hybridAzureADJoin. Possible values are: azureADJoin, hybridAzureADJoin, unknownFutureValue. + * Specifies how the provisioned Cloud PC is joined to Microsoft Entra ID. Default value is hybridAzureADJoin. Possible values are: azureADJoin, hybridAzureADJoin, unknownFutureValue. * * @return CloudPcOnPremisesConnectionType|null The type */ @@ -463,7 +463,7 @@ public function getType() /** * Sets the type - * Specifies how the provisioned Cloud PC is joined to Azure Active Directory. Default value is hybridAzureADJoin. Possible values are: azureADJoin, hybridAzureADJoin, unknownFutureValue. + * Specifies how the provisioned Cloud PC is joined to Microsoft Entra ID. Default value is hybridAzureADJoin. Possible values are: azureADJoin, hybridAzureADJoin, unknownFutureValue. * * @param CloudPcOnPremisesConnectionType $val The type * diff --git a/src/Beta/Microsoft/Graph/Model/CloudPcOrganizationSettings.php b/src/Beta/Microsoft/Graph/Model/CloudPcOrganizationSettings.php index 89c36c94a48..07bd1c8c4f2 100644 --- a/src/Beta/Microsoft/Graph/Model/CloudPcOrganizationSettings.php +++ b/src/Beta/Microsoft/Graph/Model/CloudPcOrganizationSettings.php @@ -55,7 +55,7 @@ public function setEnableMEMAutoEnroll($val) /** * Gets the enableSingleSignOn - * True if the provisioned Cloud PC can be accessed by single sign-on. False indicates that the provisioned Cloud PC doesn't support this feature. Default value is false. Windows 365 users can use single sign-on to authenticate to Azure Active Directory (Azure AD) with passwordless options (for example, FIDO keys) to access their Cloud PC. Optional. + * True if the provisioned Cloud PC can be accessed by single sign-on. False indicates that the provisioned Cloud PC doesn't support this feature. Default value is false. Windows 365 users can use single sign-on to authenticate to Microsoft Entra ID with passwordless options (for example, FIDO keys) to access their Cloud PC. Optional. * * @return bool|null The enableSingleSignOn */ @@ -70,7 +70,7 @@ public function getEnableSingleSignOn() /** * Sets the enableSingleSignOn - * True if the provisioned Cloud PC can be accessed by single sign-on. False indicates that the provisioned Cloud PC doesn't support this feature. Default value is false. Windows 365 users can use single sign-on to authenticate to Azure Active Directory (Azure AD) with passwordless options (for example, FIDO keys) to access their Cloud PC. Optional. + * True if the provisioned Cloud PC can be accessed by single sign-on. False indicates that the provisioned Cloud PC doesn't support this feature. Default value is false. Windows 365 users can use single sign-on to authenticate to Microsoft Entra ID with passwordless options (for example, FIDO keys) to access their Cloud PC. Optional. * * @param bool $val The enableSingleSignOn * diff --git a/src/Beta/Microsoft/Graph/Model/CloudPcProvisioningPolicy.php b/src/Beta/Microsoft/Graph/Model/CloudPcProvisioningPolicy.php index ba5ba95c3e8..04b31056617 100644 --- a/src/Beta/Microsoft/Graph/Model/CloudPcProvisioningPolicy.php +++ b/src/Beta/Microsoft/Graph/Model/CloudPcProvisioningPolicy.php @@ -171,7 +171,7 @@ public function setDisplayName($val) /** * Gets the domainJoinConfiguration - * Specifies how Cloud PCs will join Azure Active Directory. + * Specifies how Cloud PCs will join Microsoft Entra ID. * * @return CloudPcDomainJoinConfiguration|null The domainJoinConfiguration */ @@ -190,7 +190,7 @@ public function getDomainJoinConfiguration() /** * Sets the domainJoinConfiguration - * Specifies how Cloud PCs will join Azure Active Directory. + * Specifies how Cloud PCs will join Microsoft Entra ID. * * @param CloudPcDomainJoinConfiguration $val The domainJoinConfiguration * @@ -232,7 +232,7 @@ public function setDomainJoinConfigurations($val) /** * Gets the enableSingleSignOn - * True if the provisioned Cloud PC can be accessed by single sign-on. False indicates that the provisioned Cloud PC doesn't support this feature. Default value is false. Windows 365 users can use single sign-on to authenticate to Azure Active Directory (Azure AD) with passwordless options (for example, FIDO keys) to access their Cloud PC. Optional. + * True if the provisioned Cloud PC can be accessed by single sign-on. False indicates that the provisioned Cloud PC doesn't support this feature. Default value is false. Windows 365 users can use single sign-on to authenticate to Microsoft Entra ID with passwordless options (for example, FIDO keys) to access their Cloud PC. Optional. * * @return bool|null The enableSingleSignOn */ @@ -247,7 +247,7 @@ public function getEnableSingleSignOn() /** * Sets the enableSingleSignOn - * True if the provisioned Cloud PC can be accessed by single sign-on. False indicates that the provisioned Cloud PC doesn't support this feature. Default value is false. Windows 365 users can use single sign-on to authenticate to Azure Active Directory (Azure AD) with passwordless options (for example, FIDO keys) to access their Cloud PC. Optional. + * True if the provisioned Cloud PC can be accessed by single sign-on. False indicates that the provisioned Cloud PC doesn't support this feature. Default value is false. Windows 365 users can use single sign-on to authenticate to Microsoft Entra ID with passwordless options (for example, FIDO keys) to access their Cloud PC. Optional. * * @param bool $val The enableSingleSignOn * @@ -572,7 +572,7 @@ public function setWindowsSettings($val) /** * Gets the assignments - * A defined collection of provisioning policy assignments. Represents the set of Microsoft 365 groups and security groups in Azure AD that have provisioning policy assigned. Returned only on $expand. For an example about how to get the assignments relationship, see Get cloudPcProvisioningPolicy. + * A defined collection of provisioning policy assignments. Represents the set of Microsoft 365 groups and security groups in Microsoft Entra ID that have provisioning policy assigned. Returned only on $expand. For an example about how to get the assignments relationship, see Get cloudPcProvisioningPolicy. * * @return array|null The assignments */ @@ -587,7 +587,7 @@ public function getAssignments() /** * Sets the assignments - * A defined collection of provisioning policy assignments. Represents the set of Microsoft 365 groups and security groups in Azure AD that have provisioning policy assigned. Returned only on $expand. For an example about how to get the assignments relationship, see Get cloudPcProvisioningPolicy. + * A defined collection of provisioning policy assignments. Represents the set of Microsoft 365 groups and security groups in Microsoft Entra ID that have provisioning policy assigned. Returned only on $expand. For an example about how to get the assignments relationship, see Get cloudPcProvisioningPolicy. * * @param CloudPcProvisioningPolicyAssignment[] $val The assignments * diff --git a/src/Beta/Microsoft/Graph/Model/CloudPcUserSetting.php b/src/Beta/Microsoft/Graph/Model/CloudPcUserSetting.php index fc42357b6d0..98447b61469 100644 --- a/src/Beta/Microsoft/Graph/Model/CloudPcUserSetting.php +++ b/src/Beta/Microsoft/Graph/Model/CloudPcUserSetting.php @@ -242,7 +242,7 @@ public function setSelfServiceEnabled($val) /** * Gets the assignments - * Represents the set of Microsoft 365 groups and security groups in Azure Active Directory that have cloudPCUserSetting assigned. Returned only on $expand. For an example, see Get cloudPcUserSettingample. + * Represents the set of Microsoft 365 groups and security groups in Microsoft Entra ID that have cloudPCUserSetting assigned. Returned only on $expand. For an example, see Get cloudPcUserSettingample. * * @return array|null The assignments */ @@ -257,7 +257,7 @@ public function getAssignments() /** * Sets the assignments - * Represents the set of Microsoft 365 groups and security groups in Azure Active Directory that have cloudPCUserSetting assigned. Returned only on $expand. For an example, see Get cloudPcUserSettingample. + * Represents the set of Microsoft 365 groups and security groups in Microsoft Entra ID that have cloudPCUserSetting assigned. Returned only on $expand. For an example, see Get cloudPcUserSettingample. * * @param CloudPcUserSettingAssignment[] $val The assignments * diff --git a/src/Beta/Microsoft/Graph/Model/ConditionalAccessFilter.php b/src/Beta/Microsoft/Graph/Model/ConditionalAccessFilter.php index 67959568f85..cf0cbc23b5e 100644 --- a/src/Beta/Microsoft/Graph/Model/ConditionalAccessFilter.php +++ b/src/Beta/Microsoft/Graph/Model/ConditionalAccessFilter.php @@ -58,7 +58,7 @@ public function setMode($val) } /** * Gets the rule - * Rule syntax is similar to that used for membership rules for groups in Azure Active Directory. For details, see rules with multiple expressions + * Rule syntax is similar to that used for membership rules for groups in Microsoft Entra ID. For details, see rules with multiple expressions * * @return string|null The rule */ @@ -73,7 +73,7 @@ public function getRule() /** * Sets the rule - * Rule syntax is similar to that used for membership rules for groups in Azure Active Directory. For details, see rules with multiple expressions + * Rule syntax is similar to that used for membership rules for groups in Microsoft Entra ID. For details, see rules with multiple expressions * * @param string $val The value of the rule * diff --git a/src/Beta/Microsoft/Graph/Model/ConditionalAccessSessionControls.php b/src/Beta/Microsoft/Graph/Model/ConditionalAccessSessionControls.php index 6bd52f1e764..68177ab337c 100644 --- a/src/Beta/Microsoft/Graph/Model/ConditionalAccessSessionControls.php +++ b/src/Beta/Microsoft/Graph/Model/ConditionalAccessSessionControls.php @@ -124,7 +124,7 @@ public function setContinuousAccessEvaluation($val) } /** * Gets the disableResilienceDefaults - * Session control that determines whether it's acceptable for Azure AD to extend existing sessions based on information collected prior to an outage or not. + * Session control that determines whether it's acceptable for Microsoft Entra ID to extend existing sessions based on information collected prior to an outage or not. * * @return bool|null The disableResilienceDefaults */ @@ -139,7 +139,7 @@ public function getDisableResilienceDefaults() /** * Sets the disableResilienceDefaults - * Session control that determines whether it's acceptable for Azure AD to extend existing sessions based on information collected prior to an outage or not. + * Session control that determines whether it's acceptable for Microsoft Entra ID to extend existing sessions based on information collected prior to an outage or not. * * @param bool $val The value of the disableResilienceDefaults * diff --git a/src/Beta/Microsoft/Graph/Model/CrossCloudAzureActiveDirectoryTenant.php b/src/Beta/Microsoft/Graph/Model/CrossCloudAzureActiveDirectoryTenant.php index 5156073c2bc..b50ecf41f41 100644 --- a/src/Beta/Microsoft/Graph/Model/CrossCloudAzureActiveDirectoryTenant.php +++ b/src/Beta/Microsoft/Graph/Model/CrossCloudAzureActiveDirectoryTenant.php @@ -64,7 +64,7 @@ public function setCloudInstance($val) } /** * Gets the displayName - * The name of the Azure Active Directory tenant. Read only. + * The name of the Microsoft Entra tenant. Read only. * * @return string|null The displayName */ @@ -79,7 +79,7 @@ public function getDisplayName() /** * Sets the displayName - * The name of the Azure Active Directory tenant. Read only. + * The name of the Microsoft Entra tenant. Read only. * * @param string $val The value of the displayName * @@ -92,7 +92,7 @@ public function setDisplayName($val) } /** * Gets the tenantId - * The ID of the Azure Active Directory tenant. Read only. + * The ID of the Microsoft Entra tenant. Read only. * * @return string|null The tenantId */ @@ -107,7 +107,7 @@ public function getTenantId() /** * Sets the tenantId - * The ID of the Azure Active Directory tenant. Read only. + * The ID of the Microsoft Entra tenant. Read only. * * @param string $val The value of the tenantId * diff --git a/src/Beta/Microsoft/Graph/Model/CrossTenantAccessPolicy.php b/src/Beta/Microsoft/Graph/Model/CrossTenantAccessPolicy.php index 128cd644de1..edae05acfc2 100644 --- a/src/Beta/Microsoft/Graph/Model/CrossTenantAccessPolicy.php +++ b/src/Beta/Microsoft/Graph/Model/CrossTenantAccessPolicy.php @@ -55,7 +55,7 @@ public function setAllowedCloudEndpoints($val) /** * Gets the default - * Defines the default configuration for how your organization interacts with external Azure Active Directory organizations. + * Defines the default configuration for how your organization interacts with external Microsoft Entra organizations. * * @return CrossTenantAccessPolicyConfigurationDefault|null The default */ @@ -74,7 +74,7 @@ public function getDefault() /** * Sets the default - * Defines the default configuration for how your organization interacts with external Azure Active Directory organizations. + * Defines the default configuration for how your organization interacts with external Microsoft Entra organizations. * * @param CrossTenantAccessPolicyConfigurationDefault $val The default * @@ -89,7 +89,7 @@ public function setDefault($val) /** * Gets the partners - * Defines partner-specific configurations for external Azure Active Directory organizations. + * Defines partner-specific configurations for external Microsoft Entra organizations. * * @return array|null The partners */ @@ -104,7 +104,7 @@ public function getPartners() /** * Sets the partners - * Defines partner-specific configurations for external Azure Active Directory organizations. + * Defines partner-specific configurations for external Microsoft Entra organizations. * * @param CrossTenantAccessPolicyConfigurationPartner[] $val The partners * diff --git a/src/Beta/Microsoft/Graph/Model/CrossTenantAccessPolicyConfigurationDefault.php b/src/Beta/Microsoft/Graph/Model/CrossTenantAccessPolicyConfigurationDefault.php index 27dd2b20d7e..b6eff903911 100644 --- a/src/Beta/Microsoft/Graph/Model/CrossTenantAccessPolicyConfigurationDefault.php +++ b/src/Beta/Microsoft/Graph/Model/CrossTenantAccessPolicyConfigurationDefault.php @@ -59,7 +59,7 @@ public function setAutomaticUserConsentSettings($val) /** * Gets the b2bCollaborationInbound - * Defines your default configuration for users from other organizations accessing your resources via Azure AD B2B collaboration. + * Defines your default configuration for users from other organizations accessing your resources via Microsoft Entra B2B collaboration. * * @return CrossTenantAccessPolicyB2BSetting|null The b2bCollaborationInbound */ @@ -78,7 +78,7 @@ public function getB2bCollaborationInbound() /** * Sets the b2bCollaborationInbound - * Defines your default configuration for users from other organizations accessing your resources via Azure AD B2B collaboration. + * Defines your default configuration for users from other organizations accessing your resources via Microsoft Entra B2B collaboration. * * @param CrossTenantAccessPolicyB2BSetting $val The b2bCollaborationInbound * @@ -92,7 +92,7 @@ public function setB2bCollaborationInbound($val) /** * Gets the b2bCollaborationOutbound - * Defines your default configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B collaboration. + * Defines your default configuration for users in your organization going outbound to access resources in another organization via Microsoft Entra B2B collaboration. * * @return CrossTenantAccessPolicyB2BSetting|null The b2bCollaborationOutbound */ @@ -111,7 +111,7 @@ public function getB2bCollaborationOutbound() /** * Sets the b2bCollaborationOutbound - * Defines your default configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B collaboration. + * Defines your default configuration for users in your organization going outbound to access resources in another organization via Microsoft Entra B2B collaboration. * * @param CrossTenantAccessPolicyB2BSetting $val The b2bCollaborationOutbound * @@ -125,7 +125,7 @@ public function setB2bCollaborationOutbound($val) /** * Gets the b2bDirectConnectInbound - * Defines your default configuration for users from other organizations accessing your resources via Azure AD B2B direct connect. + * Defines your default configuration for users from other organizations accessing your resources via Microsoft Entra B2B direct connect. * * @return CrossTenantAccessPolicyB2BSetting|null The b2bDirectConnectInbound */ @@ -144,7 +144,7 @@ public function getB2bDirectConnectInbound() /** * Sets the b2bDirectConnectInbound - * Defines your default configuration for users from other organizations accessing your resources via Azure AD B2B direct connect. + * Defines your default configuration for users from other organizations accessing your resources via Microsoft Entra B2B direct connect. * * @param CrossTenantAccessPolicyB2BSetting $val The b2bDirectConnectInbound * @@ -158,7 +158,7 @@ public function setB2bDirectConnectInbound($val) /** * Gets the b2bDirectConnectOutbound - * Defines your default configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B direct connect. + * Defines your default configuration for users in your organization going outbound to access resources in another organization via Microsoft Entra B2B direct connect. * * @return CrossTenantAccessPolicyB2BSetting|null The b2bDirectConnectOutbound */ @@ -177,7 +177,7 @@ public function getB2bDirectConnectOutbound() /** * Sets the b2bDirectConnectOutbound - * Defines your default configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B direct connect. + * Defines your default configuration for users in your organization going outbound to access resources in another organization via Microsoft Entra B2B direct connect. * * @param CrossTenantAccessPolicyB2BSetting $val The b2bDirectConnectOutbound * @@ -191,7 +191,7 @@ public function setB2bDirectConnectOutbound($val) /** * Gets the inboundTrust - * Determines the default configuration for trusting other Conditional Access claims from external Azure AD organizations. + * Determines the default configuration for trusting other Conditional Access claims from external Microsoft Entra organizations. * * @return CrossTenantAccessPolicyInboundTrust|null The inboundTrust */ @@ -210,7 +210,7 @@ public function getInboundTrust() /** * Sets the inboundTrust - * Determines the default configuration for trusting other Conditional Access claims from external Azure AD organizations. + * Determines the default configuration for trusting other Conditional Access claims from external Microsoft Entra organizations. * * @param CrossTenantAccessPolicyInboundTrust $val The inboundTrust * diff --git a/src/Beta/Microsoft/Graph/Model/CrossTenantAccessPolicyConfigurationPartner.php b/src/Beta/Microsoft/Graph/Model/CrossTenantAccessPolicyConfigurationPartner.php index 40ba4807abd..3e7c1a426ca 100644 --- a/src/Beta/Microsoft/Graph/Model/CrossTenantAccessPolicyConfigurationPartner.php +++ b/src/Beta/Microsoft/Graph/Model/CrossTenantAccessPolicyConfigurationPartner.php @@ -90,7 +90,7 @@ public function setAutomaticUserConsentSettings($val) /** * Gets the b2bCollaborationInbound - * Defines your partner-specific configuration for users from other organizations accessing your resources via Azure AD B2B collaboration. + * Defines your partner-specific configuration for users from other organizations accessing your resources via Microsoft Entra B2B collaboration. * * @return CrossTenantAccessPolicyB2BSetting|null The b2bCollaborationInbound */ @@ -109,7 +109,7 @@ public function getB2bCollaborationInbound() /** * Sets the b2bCollaborationInbound - * Defines your partner-specific configuration for users from other organizations accessing your resources via Azure AD B2B collaboration. + * Defines your partner-specific configuration for users from other organizations accessing your resources via Microsoft Entra B2B collaboration. * * @param CrossTenantAccessPolicyB2BSetting $val The b2bCollaborationInbound * @@ -123,7 +123,7 @@ public function setB2bCollaborationInbound($val) /** * Gets the b2bCollaborationOutbound - * Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B collaboration. + * Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Microsoft Entra B2B collaboration. * * @return CrossTenantAccessPolicyB2BSetting|null The b2bCollaborationOutbound */ @@ -142,7 +142,7 @@ public function getB2bCollaborationOutbound() /** * Sets the b2bCollaborationOutbound - * Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B collaboration. + * Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Microsoft Entra B2B collaboration. * * @param CrossTenantAccessPolicyB2BSetting $val The b2bCollaborationOutbound * @@ -189,7 +189,7 @@ public function setB2bDirectConnectInbound($val) /** * Gets the b2bDirectConnectOutbound - * Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B direct connect. + * Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Microsoft Entra B2B direct connect. * * @return CrossTenantAccessPolicyB2BSetting|null The b2bDirectConnectOutbound */ @@ -208,7 +208,7 @@ public function getB2bDirectConnectOutbound() /** * Sets the b2bDirectConnectOutbound - * Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B direct connect. + * Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Microsoft Entra B2B direct connect. * * @param CrossTenantAccessPolicyB2BSetting $val The b2bDirectConnectOutbound * @@ -222,7 +222,7 @@ public function setB2bDirectConnectOutbound($val) /** * Gets the inboundTrust - * Determines the partner-specific configuration for trusting other Conditional Access claims from external Azure AD organizations. + * Determines the partner-specific configuration for trusting other Conditional Access claims from external Microsoft Entra organizations. * * @return CrossTenantAccessPolicyInboundTrust|null The inboundTrust */ @@ -241,7 +241,7 @@ public function getInboundTrust() /** * Sets the inboundTrust - * Determines the partner-specific configuration for trusting other Conditional Access claims from external Azure AD organizations. + * Determines the partner-specific configuration for trusting other Conditional Access claims from external Microsoft Entra organizations. * * @param CrossTenantAccessPolicyInboundTrust $val The inboundTrust * @@ -313,7 +313,7 @@ public function setIsServiceProvider($val) /** * Gets the tenantId - * The tenant identifier for the partner Azure AD organization. Read-only. Key. + * The tenant identifier for the partner Microsoft Entra organization. Read-only. Key. * * @return string|null The tenantId */ @@ -328,7 +328,7 @@ public function getTenantId() /** * Sets the tenantId - * The tenant identifier for the partner Azure AD organization. Read-only. Key. + * The tenant identifier for the partner Microsoft Entra organization. Read-only. Key. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/Model/CrossTenantAccessPolicyInboundTrust.php b/src/Beta/Microsoft/Graph/Model/CrossTenantAccessPolicyInboundTrust.php index 254df405c6d..8c10011e5ab 100644 --- a/src/Beta/Microsoft/Graph/Model/CrossTenantAccessPolicyInboundTrust.php +++ b/src/Beta/Microsoft/Graph/Model/CrossTenantAccessPolicyInboundTrust.php @@ -25,7 +25,7 @@ class CrossTenantAccessPolicyInboundTrust extends Entity { /** * Gets the isCompliantDeviceAccepted - * Specifies whether compliant devices from external Azure AD organizations are trusted. + * Specifies whether compliant devices from external Microsoft Entra organizations are trusted. * * @return bool|null The isCompliantDeviceAccepted */ @@ -40,7 +40,7 @@ public function getIsCompliantDeviceAccepted() /** * Sets the isCompliantDeviceAccepted - * Specifies whether compliant devices from external Azure AD organizations are trusted. + * Specifies whether compliant devices from external Microsoft Entra organizations are trusted. * * @param bool $val The value of the isCompliantDeviceAccepted * @@ -53,7 +53,7 @@ public function setIsCompliantDeviceAccepted($val) } /** * Gets the isHybridAzureADJoinedDeviceAccepted - * Specifies whether hybrid Azure AD joined devices from external Azure AD organizations are trusted. + * Specifies whether Microsoft Entra hybrid joined devices from external Microsoft Entra organizations are trusted. * * @return bool|null The isHybridAzureADJoinedDeviceAccepted */ @@ -68,7 +68,7 @@ public function getIsHybridAzureADJoinedDeviceAccepted() /** * Sets the isHybridAzureADJoinedDeviceAccepted - * Specifies whether hybrid Azure AD joined devices from external Azure AD organizations are trusted. + * Specifies whether Microsoft Entra hybrid joined devices from external Microsoft Entra organizations are trusted. * * @param bool $val The value of the isHybridAzureADJoinedDeviceAccepted * @@ -81,7 +81,7 @@ public function setIsHybridAzureADJoinedDeviceAccepted($val) } /** * Gets the isMfaAccepted - * Specifies whether MFA from external Azure AD organizations is trusted. + * Specifies whether MFA from external Microsoft Entra organizations is trusted. * * @return bool|null The isMfaAccepted */ @@ -96,7 +96,7 @@ public function getIsMfaAccepted() /** * Sets the isMfaAccepted - * Specifies whether MFA from external Azure AD organizations is trusted. + * Specifies whether MFA from external Microsoft Entra organizations is trusted. * * @param bool $val The value of the isMfaAccepted * diff --git a/src/Beta/Microsoft/Graph/Model/CrossTenantIdentitySyncPolicyPartner.php b/src/Beta/Microsoft/Graph/Model/CrossTenantIdentitySyncPolicyPartner.php index ec3bae62243..8b9cd15a222 100644 --- a/src/Beta/Microsoft/Graph/Model/CrossTenantIdentitySyncPolicyPartner.php +++ b/src/Beta/Microsoft/Graph/Model/CrossTenantIdentitySyncPolicyPartner.php @@ -57,7 +57,7 @@ public function getProperties() /** * Gets the displayName - * Display name for the cross-tenant user synchronization policy. Use the name of the partner Azure AD (Azure Active Directory) tenant to easily identify the policy. Optional. + * Display name for the cross-tenant user synchronization policy. Use the name of the partner Microsoft Entra tenant to easily identify the policy. Optional. * * @return string|null The displayName */ @@ -72,7 +72,7 @@ public function getDisplayName() /** * Sets the displayName - * Display name for the cross-tenant user synchronization policy. Use the name of the partner Azure AD (Azure Active Directory) tenant to easily identify the policy. Optional. + * Display name for the cross-tenant user synchronization policy. Use the name of the partner Microsoft Entra tenant to easily identify the policy. Optional. * * @param string $val The displayName * @@ -86,7 +86,7 @@ public function setDisplayName($val) /** * Gets the tenantId - * Tenant identifier for the partner Azure AD organization. Read-only. + * Tenant identifier for the partner Microsoft Entra organization. Read-only. * * @return string|null The tenantId */ @@ -101,7 +101,7 @@ public function getTenantId() /** * Sets the tenantId - * Tenant identifier for the partner Azure AD organization. Read-only. + * Tenant identifier for the partner Microsoft Entra organization. Read-only. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/Model/CustomCalloutExtension.php b/src/Beta/Microsoft/Graph/Model/CustomCalloutExtension.php index a54ac1985c2..d8441e4c45c 100644 --- a/src/Beta/Microsoft/Graph/Model/CustomCalloutExtension.php +++ b/src/Beta/Microsoft/Graph/Model/CustomCalloutExtension.php @@ -59,7 +59,7 @@ public function setAuthenticationConfiguration($val) /** * Gets the clientConfiguration - * HTTP connection settings that define how long Azure AD can wait for a connection to a logic app, how many times you can retry a timed-out connection and the exception scenarios when retries are allowed. + * HTTP connection settings that define how long Microsoft Entra ID can wait for a connection to a logic app, how many times you can retry a timed-out connection and the exception scenarios when retries are allowed. * * @return CustomExtensionClientConfiguration|null The clientConfiguration */ @@ -78,7 +78,7 @@ public function getClientConfiguration() /** * Sets the clientConfiguration - * HTTP connection settings that define how long Azure AD can wait for a connection to a logic app, how many times you can retry a timed-out connection and the exception scenarios when retries are allowed. + * HTTP connection settings that define how long Microsoft Entra ID can wait for a connection to a logic app, how many times you can retry a timed-out connection and the exception scenarios when retries are allowed. * * @param CustomExtensionClientConfiguration $val The clientConfiguration * diff --git a/src/Beta/Microsoft/Graph/Model/CustomExtensionCallbackConfiguration.php b/src/Beta/Microsoft/Graph/Model/CustomExtensionCallbackConfiguration.php index 20b0ff68939..3fe2f2b1264 100644 --- a/src/Beta/Microsoft/Graph/Model/CustomExtensionCallbackConfiguration.php +++ b/src/Beta/Microsoft/Graph/Model/CustomExtensionCallbackConfiguration.php @@ -26,7 +26,7 @@ class CustomExtensionCallbackConfiguration extends Entity /** * Gets the timeoutDuration - * The maximum duration in ISO 8601 format that Azure AD will wait for a resume action for the callout it sent to the logic app. The valid range for custom extensions in lifecycle workflows is five minutes to three hours. The valid range for custom extensions in entitlement management is between 5 minutes and 14 days. For example, PT3H refers to three hours, P3D refers to three days, PT10M refers to ten minutes. + * The maximum duration in ISO 8601 format that Microsoft Entra ID will wait for a resume action for the callout it sent to the logic app. The valid range for custom extensions in lifecycle workflows is five minutes to three hours. The valid range for custom extensions in entitlement management is between 5 minutes and 14 days. For example, PT3H refers to three hours, P3D refers to three days, PT10M refers to ten minutes. * * @return \DateInterval|null The timeoutDuration */ @@ -45,7 +45,7 @@ public function getTimeoutDuration() /** * Sets the timeoutDuration - * The maximum duration in ISO 8601 format that Azure AD will wait for a resume action for the callout it sent to the logic app. The valid range for custom extensions in lifecycle workflows is five minutes to three hours. The valid range for custom extensions in entitlement management is between 5 minutes and 14 days. For example, PT3H refers to three hours, P3D refers to three days, PT10M refers to ten minutes. + * The maximum duration in ISO 8601 format that Microsoft Entra ID will wait for a resume action for the callout it sent to the logic app. The valid range for custom extensions in lifecycle workflows is five minutes to three hours. The valid range for custom extensions in entitlement management is between 5 minutes and 14 days. For example, PT3H refers to three hours, P3D refers to three days, PT10M refers to ten minutes. * * @param \DateInterval $val The value to assign to the timeoutDuration * diff --git a/src/Beta/Microsoft/Graph/Model/CustomExtensionClientConfiguration.php b/src/Beta/Microsoft/Graph/Model/CustomExtensionClientConfiguration.php index fe4d7c00a8a..b76752a4b3f 100644 --- a/src/Beta/Microsoft/Graph/Model/CustomExtensionClientConfiguration.php +++ b/src/Beta/Microsoft/Graph/Model/CustomExtensionClientConfiguration.php @@ -25,7 +25,7 @@ class CustomExtensionClientConfiguration extends Entity { /** * Gets the maximumRetries - * The max number of retries that Azure AD makes to the external API. Values of 0 or 1 are supported. If null, the default for the service applies. + * The max number of retries that Microsoft Entra ID makes to the external API. Values of 0 or 1 are supported. If null, the default for the service applies. * * @return int|null The maximumRetries */ @@ -40,7 +40,7 @@ public function getMaximumRetries() /** * Sets the maximumRetries - * The max number of retries that Azure AD makes to the external API. Values of 0 or 1 are supported. If null, the default for the service applies. + * The max number of retries that Microsoft Entra ID makes to the external API. Values of 0 or 1 are supported. If null, the default for the service applies. * * @param int $val The value of the maximumRetries * @@ -53,7 +53,7 @@ public function setMaximumRetries($val) } /** * Gets the timeoutInMilliseconds - * The max duration in milliseconds that Azure AD waits for a response from the external app before it shuts down the connection. The valid range is between 200 and 2000 milliseconds. If null, the default for the service applies. + * The max duration in milliseconds that Microsoft Entra ID waits for a response from the external app before it shuts down the connection. The valid range is between 200 and 2000 milliseconds. If null, the default for the service applies. * * @return int|null The timeoutInMilliseconds */ @@ -68,7 +68,7 @@ public function getTimeoutInMilliseconds() /** * Sets the timeoutInMilliseconds - * The max duration in milliseconds that Azure AD waits for a response from the external app before it shuts down the connection. The valid range is between 200 and 2000 milliseconds. If null, the default for the service applies. + * The max duration in milliseconds that Microsoft Entra ID waits for a response from the external app before it shuts down the connection. The valid range is between 200 and 2000 milliseconds. If null, the default for the service applies. * * @param int $val The value of the timeoutInMilliseconds * diff --git a/src/Beta/Microsoft/Graph/Model/DelegatedAdminAccessContainer.php b/src/Beta/Microsoft/Graph/Model/DelegatedAdminAccessContainer.php index 8750d1df380..4c30ae88754 100644 --- a/src/Beta/Microsoft/Graph/Model/DelegatedAdminAccessContainer.php +++ b/src/Beta/Microsoft/Graph/Model/DelegatedAdminAccessContainer.php @@ -25,7 +25,7 @@ class DelegatedAdminAccessContainer extends Entity { /** * Gets the accessContainerId - * The identifier of the access container (for example, a security group). For 'securityGroup' access containers, this must be a valid ID of an Azure AD security group in the Microsoft partner's tenant. + * The identifier of the access container (for example, a security group). For 'securityGroup' access containers, this must be a valid ID of a Microsoft Entra security group in the Microsoft partner's tenant. * * @return string|null The accessContainerId */ @@ -40,7 +40,7 @@ public function getAccessContainerId() /** * Sets the accessContainerId - * The identifier of the access container (for example, a security group). For 'securityGroup' access containers, this must be a valid ID of an Azure AD security group in the Microsoft partner's tenant. + * The identifier of the access container (for example, a security group). For 'securityGroup' access containers, this must be a valid ID of a Microsoft Entra security group in the Microsoft partner's tenant. * * @param string $val The value of the accessContainerId * diff --git a/src/Beta/Microsoft/Graph/Model/DelegatedAdminCustomer.php b/src/Beta/Microsoft/Graph/Model/DelegatedAdminCustomer.php index d0621416f9b..8f8a9b1da27 100644 --- a/src/Beta/Microsoft/Graph/Model/DelegatedAdminCustomer.php +++ b/src/Beta/Microsoft/Graph/Model/DelegatedAdminCustomer.php @@ -26,7 +26,7 @@ class DelegatedAdminCustomer extends Entity { /** * Gets the displayName - * The Azure AD display name of the customer tenant. Read-only. Supports $orderby. + * The Microsoft Entra ID display name of the customer tenant. Read-only. Supports $orderby. * * @return string|null The displayName */ @@ -41,7 +41,7 @@ public function getDisplayName() /** * Sets the displayName - * The Azure AD display name of the customer tenant. Read-only. Supports $orderby. + * The Microsoft Entra ID display name of the customer tenant. Read-only. Supports $orderby. * * @param string $val The displayName * @@ -55,7 +55,7 @@ public function setDisplayName($val) /** * Gets the tenantId - * The Azure AD-assigned tenant ID of the customer. Read-only. + * The Microsoft Entra ID-assigned tenant ID of the customer. Read-only. * * @return string|null The tenantId */ @@ -70,7 +70,7 @@ public function getTenantId() /** * Sets the tenantId - * The Azure AD-assigned tenant ID of the customer. Read-only. + * The Microsoft Entra ID-assigned tenant ID of the customer. Read-only. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/Model/DelegatedAdminRelationshipCustomerParticipant.php b/src/Beta/Microsoft/Graph/Model/DelegatedAdminRelationshipCustomerParticipant.php index a323ef2390b..8616fddee39 100644 --- a/src/Beta/Microsoft/Graph/Model/DelegatedAdminRelationshipCustomerParticipant.php +++ b/src/Beta/Microsoft/Graph/Model/DelegatedAdminRelationshipCustomerParticipant.php @@ -25,7 +25,7 @@ class DelegatedAdminRelationshipCustomerParticipant extends Entity { /** * Gets the displayName - * The display name of the customer tenant as set by Azure AD. Read-only + * The display name of the customer tenant as set by Microsoft Entra ID. Read-only * * @return string|null The displayName */ @@ -40,7 +40,7 @@ public function getDisplayName() /** * Sets the displayName - * The display name of the customer tenant as set by Azure AD. Read-only + * The display name of the customer tenant as set by Microsoft Entra ID. Read-only * * @param string $val The value of the displayName * @@ -53,7 +53,7 @@ public function setDisplayName($val) } /** * Gets the tenantId - * The Azure AD-assigned tenant ID of the customer tenant. + * The Microsoft Entra ID-assigned tenant ID of the customer tenant. * * @return string|null The tenantId */ @@ -68,7 +68,7 @@ public function getTenantId() /** * Sets the tenantId - * The Azure AD-assigned tenant ID of the customer tenant. + * The Microsoft Entra ID-assigned tenant ID of the customer tenant. * * @param string $val The value of the tenantId * diff --git a/src/Beta/Microsoft/Graph/Model/Device.php b/src/Beta/Microsoft/Graph/Model/Device.php index 758a7f24238..51dab01e517 100644 --- a/src/Beta/Microsoft/Graph/Model/Device.php +++ b/src/Beta/Microsoft/Graph/Model/Device.php @@ -325,7 +325,7 @@ public function setDisplayName($val) /** * Gets the domainName - * The on-premises domain name of Hybrid Azure AD joined devices. This property is set by Intune. + * The on-premises domain name of Microsoft Entra hybrid joined devices. This property is set by Intune. * * @return string|null The domainName */ @@ -340,7 +340,7 @@ public function getDomainName() /** * Sets the domainName - * The on-premises domain name of Hybrid Azure AD joined devices. This property is set by Intune. + * The on-premises domain name of Microsoft Entra hybrid joined devices. This property is set by Intune. * * @param string $val The domainName * @@ -412,7 +412,7 @@ public function setEnrollmentType($val) /** * Gets the extensionAttributes - * Contains extension attributes 1-15 for the device. The individual extension attributes are not selectable. These properties are mastered in cloud and can be set during creation or update of a device object in Azure AD. Supports $filter (eq, not, startsWith, and eq on null values). + * Contains extension attributes 1-15 for the device. The individual extension attributes are not selectable. These properties are mastered in cloud and can be set during creation or update of a device object in Microsoft Entra ID. Supports $filter (eq, not, startsWith, and eq on null values). * * @return OnPremisesExtensionAttributes|null The extensionAttributes */ @@ -431,7 +431,7 @@ public function getExtensionAttributes() /** * Sets the extensionAttributes - * Contains extension attributes 1-15 for the device. The individual extension attributes are not selectable. These properties are mastered in cloud and can be set during creation or update of a device object in Azure AD. Supports $filter (eq, not, startsWith, and eq on null values). + * Contains extension attributes 1-15 for the device. The individual extension attributes are not selectable. These properties are mastered in cloud and can be set during creation or update of a device object in Microsoft Entra ID. Supports $filter (eq, not, startsWith, and eq on null values). * * @param OnPremisesExtensionAttributes $val The extensionAttributes * @@ -917,7 +917,7 @@ public function setSystemLabels($val) /** * Gets the trustType - * Type of trust for the joined device. Read-only. Possible values: Workplace (indicates bring your own personal devices), AzureAd (Cloud only joined devices), ServerAd (on-premises domain joined devices joined to Azure AD). For more details, see Introduction to device management in Azure Active Directory. + * Type of trust for the joined device. Read-only. Possible values: Workplace (indicates bring your own personal devices), AzureAd (Cloud only joined devices), ServerAd (on-premises domain joined devices joined to Microsoft Entra ID). For more details, see Introduction to device management in Microsoft Entra ID. * * @return string|null The trustType */ @@ -932,7 +932,7 @@ public function getTrustType() /** * Sets the trustType - * Type of trust for the joined device. Read-only. Possible values: Workplace (indicates bring your own personal devices), AzureAd (Cloud only joined devices), ServerAd (on-premises domain joined devices joined to Azure AD). For more details, see Introduction to device management in Azure Active Directory. + * Type of trust for the joined device. Read-only. Possible values: Workplace (indicates bring your own personal devices), AzureAd (Cloud only joined devices), ServerAd (on-premises domain joined devices joined to Microsoft Entra ID). For more details, see Introduction to device management in Microsoft Entra ID. * * @param string $val The trustType * diff --git a/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationChoiceSettingCollectionDefinition.php b/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationChoiceSettingCollectionDefinition.php index 1dd8ea6b20b..772f407516e 100644 --- a/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationChoiceSettingCollectionDefinition.php +++ b/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationChoiceSettingCollectionDefinition.php @@ -26,7 +26,7 @@ class DeviceManagementConfigurationChoiceSettingCollectionDefinition extends Dev { /** * Gets the maximumCount - * Maximum number of choices in the collection. Valid values 1 to 100 + * Maximum number of choices in the collection * * @return int|null The maximumCount */ @@ -41,7 +41,7 @@ public function getMaximumCount() /** * Sets the maximumCount - * Maximum number of choices in the collection. Valid values 1 to 100 + * Maximum number of choices in the collection * * @param int $val The maximumCount * @@ -55,7 +55,7 @@ public function setMaximumCount($val) /** * Gets the minimumCount - * Minimum number of choices in the collection. Valid values 1 to 100 + * Minimum number of choices in the collection * * @return int|null The minimumCount */ @@ -70,7 +70,7 @@ public function getMinimumCount() /** * Sets the minimumCount - * Minimum number of choices in the collection. Valid values 1 to 100 + * Minimum number of choices in the collection * * @param int $val The minimumCount * diff --git a/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationChoiceSettingDefinition.php b/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationChoiceSettingDefinition.php index 7e0e869c876..fec75f417bc 100644 --- a/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationChoiceSettingDefinition.php +++ b/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationChoiceSettingDefinition.php @@ -26,7 +26,7 @@ class DeviceManagementConfigurationChoiceSettingDefinition extends DeviceManagem { /** * Gets the defaultOptionId - * Default option for choice setting + * Default option for the choice setting. * * @return string|null The defaultOptionId */ @@ -41,7 +41,7 @@ public function getDefaultOptionId() /** * Sets the defaultOptionId - * Default option for choice setting + * Default option for the choice setting. * * @param string $val The defaultOptionId * @@ -56,7 +56,7 @@ public function setDefaultOptionId($val) /** * Gets the options - * Options for the setting that can be selected + * Options for the setting that can be selected. * * @return array|null The options */ @@ -71,7 +71,7 @@ public function getOptions() /** * Sets the options - * Options for the setting that can be selected + * Options for the setting that can be selected. * * @param DeviceManagementConfigurationOptionDefinition[] $val The options * diff --git a/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationReferredSettingInformation.php b/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationReferredSettingInformation.php index 62f8fe8d53d..7818161a161 100644 --- a/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationReferredSettingInformation.php +++ b/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationReferredSettingInformation.php @@ -25,7 +25,7 @@ class DeviceManagementConfigurationReferredSettingInformation extends Entity { /** * Gets the settingDefinitionId - * Setting definition id that is being referred to a setting. Applicable for reusable setting + * Setting definition id that is being referred to a setting. Applicable for reusable setting. * * @return string|null The settingDefinitionId */ @@ -40,7 +40,7 @@ public function getSettingDefinitionId() /** * Sets the settingDefinitionId - * Setting definition id that is being referred to a setting. Applicable for reusable setting + * Setting definition id that is being referred to a setting. Applicable for reusable setting. * * @param string $val The value of the settingDefinitionId * diff --git a/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationSettingApplicability.php b/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationSettingApplicability.php index 45dc217d3c7..6e68147cf20 100644 --- a/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationSettingApplicability.php +++ b/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationSettingApplicability.php @@ -120,7 +120,7 @@ public function setPlatform($val) /** * Gets the technologies - * Which technology channels this setting can be deployed through. Possible values are: none, mdm, windows10XManagement, configManager, appleRemoteManagement, microsoftSense, exchangeOnline, linuxMdm, enrollment, endpointPrivilegeManagement, unknownFutureValue. + * Which technology channels this setting can be deployed through. Possible values are: none, mdm, windows10XManagement, configManager, appleRemoteManagement, microsoftSense, exchangeOnline, linuxMdm, unknownFutureValue. * * @return DeviceManagementConfigurationTechnologies|null The technologies */ @@ -139,7 +139,7 @@ public function getTechnologies() /** * Sets the technologies - * Which technology channels this setting can be deployed through. Possible values are: none, mdm, windows10XManagement, configManager, appleRemoteManagement, microsoftSense, exchangeOnline, linuxMdm, enrollment, endpointPrivilegeManagement, unknownFutureValue. + * Which technology channels this setting can be deployed through. Possible values are: none, mdm, windows10XManagement, configManager, appleRemoteManagement, microsoftSense, exchangeOnline, linuxMdm, unknownFutureValue. * * @param DeviceManagementConfigurationTechnologies $val The value to assign to the technologies * diff --git a/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationSettingGroupDefinition.php b/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationSettingGroupDefinition.php index 9a6c46313c3..0563d36dd58 100644 --- a/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationSettingGroupDefinition.php +++ b/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationSettingGroupDefinition.php @@ -26,7 +26,7 @@ class DeviceManagementConfigurationSettingGroupDefinition extends DeviceManageme { /** * Gets the childIds - * Dependent child settings to this group of settings + * Dependent child settings to this group of settings. * * @return array|null The childIds */ @@ -41,7 +41,7 @@ public function getChildIds() /** * Sets the childIds - * Dependent child settings to this group of settings + * Dependent child settings to this group of settings. * * @param string[] $val The childIds * diff --git a/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationSimpleSettingCollectionDefinition.php b/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationSimpleSettingCollectionDefinition.php index 60995c914c7..68ed03d5cbc 100644 --- a/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationSimpleSettingCollectionDefinition.php +++ b/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationSimpleSettingCollectionDefinition.php @@ -26,7 +26,7 @@ class DeviceManagementConfigurationSimpleSettingCollectionDefinition extends Dev { /** * Gets the maximumCount - * Maximum number of simple settings in the collection. Valid values 1 to 100 + * Maximum number of simple settings in the collection * * @return int|null The maximumCount */ @@ -41,7 +41,7 @@ public function getMaximumCount() /** * Sets the maximumCount - * Maximum number of simple settings in the collection. Valid values 1 to 100 + * Maximum number of simple settings in the collection * * @param int $val The maximumCount * @@ -55,7 +55,7 @@ public function setMaximumCount($val) /** * Gets the minimumCount - * Minimum number of simple settings in the collection. Valid values 1 to 100 + * Minimum number of simple settings in the collection * * @return int|null The minimumCount */ @@ -70,7 +70,7 @@ public function getMinimumCount() /** * Sets the minimumCount - * Minimum number of simple settings in the collection. Valid values 1 to 100 + * Minimum number of simple settings in the collection * * @param int $val The minimumCount * diff --git a/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationStringSettingValueDefinition.php b/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationStringSettingValueDefinition.php index 4cbb970141f..323fd5206ff 100644 --- a/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationStringSettingValueDefinition.php +++ b/src/Beta/Microsoft/Graph/Model/DeviceManagementConfigurationStringSettingValueDefinition.php @@ -54,7 +54,7 @@ public function setFileTypes($val) /** * Gets the format - * Pre-defined format of the string. Possible values are: none, email, guid, ip, base64, url, version, xml, date, time, binary, regEx, json, dateTime, surfaceHub, bashScript, unknownFutureValue. + * Pre-defined format of the string. Possible values are: none, email, guid, ip, base64, url, version, xml, date, time, binary, regEx, json, dateTime, surfaceHub. * * @return DeviceManagementConfigurationStringFormat|null The format */ @@ -73,7 +73,7 @@ public function getFormat() /** * Sets the format - * Pre-defined format of the string. Possible values are: none, email, guid, ip, base64, url, version, xml, date, time, binary, regEx, json, dateTime, surfaceHub, bashScript, unknownFutureValue. + * Pre-defined format of the string. Possible values are: none, email, guid, ip, base64, url, version, xml, date, time, binary, regEx, json, dateTime, surfaceHub. * * @param DeviceManagementConfigurationStringFormat $val The value to assign to the format * @@ -142,7 +142,7 @@ public function setIsSecret($val) } /** * Gets the maximumLength - * Maximum length of string. Valid values 0 to 87516 + * Maximum length of string * * @return int|null The maximumLength */ @@ -157,7 +157,7 @@ public function getMaximumLength() /** * Sets the maximumLength - * Maximum length of string. Valid values 0 to 87516 + * Maximum length of string * * @param int $val The value of the maximumLength * @@ -170,7 +170,7 @@ public function setMaximumLength($val) } /** * Gets the minimumLength - * Minimum length of string. Valid values 0 to 87516 + * Minimum length of string * * @return int|null The minimumLength */ @@ -185,7 +185,7 @@ public function getMinimumLength() /** * Sets the minimumLength - * Minimum length of string. Valid values 0 to 87516 + * Minimum length of string * * @param int $val The value of the minimumLength * diff --git a/src/Beta/Microsoft/Graph/Model/EncryptedAwsStorageBucketFinding.php b/src/Beta/Microsoft/Graph/Model/EncryptedAwsStorageBucketFinding.php new file mode 100644 index 00000000000..693189f8338 --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/EncryptedAwsStorageBucketFinding.php @@ -0,0 +1,89 @@ +_propDict)) { + if (is_a($this->_propDict["accessibility"], "\Beta\Microsoft\Graph\Model\AwsAccessType") || is_null($this->_propDict["accessibility"])) { + return $this->_propDict["accessibility"]; + } else { + $this->_propDict["accessibility"] = new AwsAccessType($this->_propDict["accessibility"]); + return $this->_propDict["accessibility"]; + } + } + return null; + } + + /** + * Sets the accessibility + * + * @param AwsAccessType $val The accessibility + * + * @return EncryptedAwsStorageBucketFinding + */ + public function setAccessibility($val) + { + $this->_propDict["accessibility"] = $val; + return $this; + } + + /** + * Gets the storageBucket + * + * @return AuthorizationSystemResource|null The storageBucket + */ + public function getStorageBucket() + { + if (array_key_exists("storageBucket", $this->_propDict)) { + if (is_a($this->_propDict["storageBucket"], "\Beta\Microsoft\Graph\Model\AuthorizationSystemResource") || is_null($this->_propDict["storageBucket"])) { + return $this->_propDict["storageBucket"]; + } else { + $this->_propDict["storageBucket"] = new AuthorizationSystemResource($this->_propDict["storageBucket"]); + return $this->_propDict["storageBucket"]; + } + } + return null; + } + + /** + * Sets the storageBucket + * + * @param AuthorizationSystemResource $val The storageBucket + * + * @return EncryptedAwsStorageBucketFinding + */ + public function setStorageBucket($val) + { + $this->_propDict["storageBucket"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/EncryptedAzureStorageAccountFinding.php b/src/Beta/Microsoft/Graph/Model/EncryptedAzureStorageAccountFinding.php new file mode 100644 index 00000000000..927b13ceca9 --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/EncryptedAzureStorageAccountFinding.php @@ -0,0 +1,89 @@ +_propDict)) { + if (is_a($this->_propDict["encryptionManagedBy"], "\Beta\Microsoft\Graph\Model\AzureEncryption") || is_null($this->_propDict["encryptionManagedBy"])) { + return $this->_propDict["encryptionManagedBy"]; + } else { + $this->_propDict["encryptionManagedBy"] = new AzureEncryption($this->_propDict["encryptionManagedBy"]); + return $this->_propDict["encryptionManagedBy"]; + } + } + return null; + } + + /** + * Sets the encryptionManagedBy + * + * @param AzureEncryption $val The encryptionManagedBy + * + * @return EncryptedAzureStorageAccountFinding + */ + public function setEncryptionManagedBy($val) + { + $this->_propDict["encryptionManagedBy"] = $val; + return $this; + } + + /** + * Gets the storageAccount + * + * @return AuthorizationSystemResource|null The storageAccount + */ + public function getStorageAccount() + { + if (array_key_exists("storageAccount", $this->_propDict)) { + if (is_a($this->_propDict["storageAccount"], "\Beta\Microsoft\Graph\Model\AuthorizationSystemResource") || is_null($this->_propDict["storageAccount"])) { + return $this->_propDict["storageAccount"]; + } else { + $this->_propDict["storageAccount"] = new AuthorizationSystemResource($this->_propDict["storageAccount"]); + return $this->_propDict["storageAccount"]; + } + } + return null; + } + + /** + * Sets the storageAccount + * + * @param AuthorizationSystemResource $val The storageAccount + * + * @return EncryptedAzureStorageAccountFinding + */ + public function setStorageAccount($val) + { + $this->_propDict["storageAccount"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/EncryptedGcpStorageBucketFinding.php b/src/Beta/Microsoft/Graph/Model/EncryptedGcpStorageBucketFinding.php new file mode 100644 index 00000000000..d0b8d069327 --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/EncryptedGcpStorageBucketFinding.php @@ -0,0 +1,120 @@ +_propDict)) { + if (is_a($this->_propDict["accessibility"], "\Beta\Microsoft\Graph\Model\GcpAccessType") || is_null($this->_propDict["accessibility"])) { + return $this->_propDict["accessibility"]; + } else { + $this->_propDict["accessibility"] = new GcpAccessType($this->_propDict["accessibility"]); + return $this->_propDict["accessibility"]; + } + } + return null; + } + + /** + * Sets the accessibility + * + * @param GcpAccessType $val The accessibility + * + * @return EncryptedGcpStorageBucketFinding + */ + public function setAccessibility($val) + { + $this->_propDict["accessibility"] = $val; + return $this; + } + + /** + * Gets the encryptionManagedBy + * + * @return GcpEncryption|null The encryptionManagedBy + */ + public function getEncryptionManagedBy() + { + if (array_key_exists("encryptionManagedBy", $this->_propDict)) { + if (is_a($this->_propDict["encryptionManagedBy"], "\Beta\Microsoft\Graph\Model\GcpEncryption") || is_null($this->_propDict["encryptionManagedBy"])) { + return $this->_propDict["encryptionManagedBy"]; + } else { + $this->_propDict["encryptionManagedBy"] = new GcpEncryption($this->_propDict["encryptionManagedBy"]); + return $this->_propDict["encryptionManagedBy"]; + } + } + return null; + } + + /** + * Sets the encryptionManagedBy + * + * @param GcpEncryption $val The encryptionManagedBy + * + * @return EncryptedGcpStorageBucketFinding + */ + public function setEncryptionManagedBy($val) + { + $this->_propDict["encryptionManagedBy"] = $val; + return $this; + } + + /** + * Gets the storageBucket + * + * @return AuthorizationSystemResource|null The storageBucket + */ + public function getStorageBucket() + { + if (array_key_exists("storageBucket", $this->_propDict)) { + if (is_a($this->_propDict["storageBucket"], "\Beta\Microsoft\Graph\Model\AuthorizationSystemResource") || is_null($this->_propDict["storageBucket"])) { + return $this->_propDict["storageBucket"]; + } else { + $this->_propDict["storageBucket"] = new AuthorizationSystemResource($this->_propDict["storageBucket"]); + return $this->_propDict["storageBucket"]; + } + } + return null; + } + + /** + * Sets the storageBucket + * + * @param AuthorizationSystemResource $val The storageBucket + * + * @return EncryptedGcpStorageBucketFinding + */ + public function setStorageBucket($val) + { + $this->_propDict["storageBucket"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/EnumeratedAccountsWithAccess.php b/src/Beta/Microsoft/Graph/Model/EnumeratedAccountsWithAccess.php index 4701095855a..4117182886e 100644 --- a/src/Beta/Microsoft/Graph/Model/EnumeratedAccountsWithAccess.php +++ b/src/Beta/Microsoft/Graph/Model/EnumeratedAccountsWithAccess.php @@ -23,6 +23,17 @@ */ class EnumeratedAccountsWithAccess extends AccountsWithAccess { + /** + * Set the @odata.type since this type is immediately descended from an abstract + * type that is referenced as the type in an entity. + * @param array $propDict The property dictionary + */ + public function __construct($propDict = array()) + { + parent::__construct($propDict); + $this->setODataType("#microsoft.graph.enumeratedAccountsWithAccess"); + } + /** * Gets the accounts diff --git a/src/Beta/Microsoft/Graph/Model/EnumeratedInboundPorts.php b/src/Beta/Microsoft/Graph/Model/EnumeratedInboundPorts.php index 9df55319321..0c8ebcbb85d 100644 --- a/src/Beta/Microsoft/Graph/Model/EnumeratedInboundPorts.php +++ b/src/Beta/Microsoft/Graph/Model/EnumeratedInboundPorts.php @@ -23,6 +23,17 @@ */ class EnumeratedInboundPorts extends InboundPorts { + /** + * Set the @odata.type since this type is immediately descended from an abstract + * type that is referenced as the type in an entity. + * @param array $propDict The property dictionary + */ + public function __construct($propDict = array()) + { + parent::__construct($propDict); + $this->setODataType("#microsoft.graph.enumeratedInboundPorts"); + } + /** * Gets the ports * diff --git a/src/Beta/Microsoft/Graph/Model/ExternalSystemAccessMethods.php b/src/Beta/Microsoft/Graph/Model/ExternalSystemAccessMethods.php new file mode 100644 index 00000000000..44387bae36a --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/ExternalSystemAccessMethods.php @@ -0,0 +1,35 @@ +_propDict)) { + if (is_a($this->_propDict["accessibility"], "\Beta\Microsoft\Graph\Model\AwsAccessType") || is_null($this->_propDict["accessibility"])) { + return $this->_propDict["accessibility"]; + } else { + $this->_propDict["accessibility"] = new AwsAccessType($this->_propDict["accessibility"]); + return $this->_propDict["accessibility"]; + } + } + return null; + } + + /** + * Sets the accessibility + * + * @param AwsAccessType $val The accessibility + * + * @return ExternallyAccessibleAwsStorageBucketFinding + */ + public function setAccessibility($val) + { + $this->_propDict["accessibility"] = $val; + return $this; + } + + /** + * Gets the accountsWithAccess + * + * @return AccountsWithAccess|null The accountsWithAccess + */ + public function getAccountsWithAccess() + { + if (array_key_exists("accountsWithAccess", $this->_propDict)) { + if (is_a($this->_propDict["accountsWithAccess"], "\Beta\Microsoft\Graph\Model\AccountsWithAccess") || is_null($this->_propDict["accountsWithAccess"])) { + return $this->_propDict["accountsWithAccess"]; + } else { + $this->_propDict["accountsWithAccess"] = new AccountsWithAccess($this->_propDict["accountsWithAccess"]); + return $this->_propDict["accountsWithAccess"]; + } + } + return null; + } + + /** + * Sets the accountsWithAccess + * + * @param AccountsWithAccess $val The accountsWithAccess + * + * @return ExternallyAccessibleAwsStorageBucketFinding + */ + public function setAccountsWithAccess($val) + { + $this->_propDict["accountsWithAccess"] = $val; + return $this; + } + + /** + * Gets the storageBucket + * + * @return AuthorizationSystemResource|null The storageBucket + */ + public function getStorageBucket() + { + if (array_key_exists("storageBucket", $this->_propDict)) { + if (is_a($this->_propDict["storageBucket"], "\Beta\Microsoft\Graph\Model\AuthorizationSystemResource") || is_null($this->_propDict["storageBucket"])) { + return $this->_propDict["storageBucket"]; + } else { + $this->_propDict["storageBucket"] = new AuthorizationSystemResource($this->_propDict["storageBucket"]); + return $this->_propDict["storageBucket"]; + } + } + return null; + } + + /** + * Sets the storageBucket + * + * @param AuthorizationSystemResource $val The storageBucket + * + * @return ExternallyAccessibleAwsStorageBucketFinding + */ + public function setStorageBucket($val) + { + $this->_propDict["storageBucket"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/ExternallyAccessibleAzureBlobContainerFinding.php b/src/Beta/Microsoft/Graph/Model/ExternallyAccessibleAzureBlobContainerFinding.php new file mode 100644 index 00000000000..a9cc893a6c4 --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/ExternallyAccessibleAzureBlobContainerFinding.php @@ -0,0 +1,120 @@ +_propDict)) { + if (is_a($this->_propDict["accessibility"], "\Beta\Microsoft\Graph\Model\AzureAccessType") || is_null($this->_propDict["accessibility"])) { + return $this->_propDict["accessibility"]; + } else { + $this->_propDict["accessibility"] = new AzureAccessType($this->_propDict["accessibility"]); + return $this->_propDict["accessibility"]; + } + } + return null; + } + + /** + * Sets the accessibility + * + * @param AzureAccessType $val The accessibility + * + * @return ExternallyAccessibleAzureBlobContainerFinding + */ + public function setAccessibility($val) + { + $this->_propDict["accessibility"] = $val; + return $this; + } + + /** + * Gets the encryptionManagedBy + * + * @return AzureEncryption|null The encryptionManagedBy + */ + public function getEncryptionManagedBy() + { + if (array_key_exists("encryptionManagedBy", $this->_propDict)) { + if (is_a($this->_propDict["encryptionManagedBy"], "\Beta\Microsoft\Graph\Model\AzureEncryption") || is_null($this->_propDict["encryptionManagedBy"])) { + return $this->_propDict["encryptionManagedBy"]; + } else { + $this->_propDict["encryptionManagedBy"] = new AzureEncryption($this->_propDict["encryptionManagedBy"]); + return $this->_propDict["encryptionManagedBy"]; + } + } + return null; + } + + /** + * Sets the encryptionManagedBy + * + * @param AzureEncryption $val The encryptionManagedBy + * + * @return ExternallyAccessibleAzureBlobContainerFinding + */ + public function setEncryptionManagedBy($val) + { + $this->_propDict["encryptionManagedBy"] = $val; + return $this; + } + + /** + * Gets the storageAccount + * + * @return AuthorizationSystemResource|null The storageAccount + */ + public function getStorageAccount() + { + if (array_key_exists("storageAccount", $this->_propDict)) { + if (is_a($this->_propDict["storageAccount"], "\Beta\Microsoft\Graph\Model\AuthorizationSystemResource") || is_null($this->_propDict["storageAccount"])) { + return $this->_propDict["storageAccount"]; + } else { + $this->_propDict["storageAccount"] = new AuthorizationSystemResource($this->_propDict["storageAccount"]); + return $this->_propDict["storageAccount"]; + } + } + return null; + } + + /** + * Sets the storageAccount + * + * @param AuthorizationSystemResource $val The storageAccount + * + * @return ExternallyAccessibleAzureBlobContainerFinding + */ + public function setStorageAccount($val) + { + $this->_propDict["storageAccount"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/ExternallyAccessibleGcpStorageBucketFinding.php b/src/Beta/Microsoft/Graph/Model/ExternallyAccessibleGcpStorageBucketFinding.php new file mode 100644 index 00000000000..b5d7c36b926 --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/ExternallyAccessibleGcpStorageBucketFinding.php @@ -0,0 +1,120 @@ +_propDict)) { + if (is_a($this->_propDict["accessibility"], "\Beta\Microsoft\Graph\Model\GcpAccessType") || is_null($this->_propDict["accessibility"])) { + return $this->_propDict["accessibility"]; + } else { + $this->_propDict["accessibility"] = new GcpAccessType($this->_propDict["accessibility"]); + return $this->_propDict["accessibility"]; + } + } + return null; + } + + /** + * Sets the accessibility + * + * @param GcpAccessType $val The accessibility + * + * @return ExternallyAccessibleGcpStorageBucketFinding + */ + public function setAccessibility($val) + { + $this->_propDict["accessibility"] = $val; + return $this; + } + + /** + * Gets the encryptionManagedBy + * + * @return GcpEncryption|null The encryptionManagedBy + */ + public function getEncryptionManagedBy() + { + if (array_key_exists("encryptionManagedBy", $this->_propDict)) { + if (is_a($this->_propDict["encryptionManagedBy"], "\Beta\Microsoft\Graph\Model\GcpEncryption") || is_null($this->_propDict["encryptionManagedBy"])) { + return $this->_propDict["encryptionManagedBy"]; + } else { + $this->_propDict["encryptionManagedBy"] = new GcpEncryption($this->_propDict["encryptionManagedBy"]); + return $this->_propDict["encryptionManagedBy"]; + } + } + return null; + } + + /** + * Sets the encryptionManagedBy + * + * @param GcpEncryption $val The encryptionManagedBy + * + * @return ExternallyAccessibleGcpStorageBucketFinding + */ + public function setEncryptionManagedBy($val) + { + $this->_propDict["encryptionManagedBy"] = $val; + return $this; + } + + /** + * Gets the storageBucket + * + * @return AuthorizationSystemResource|null The storageBucket + */ + public function getStorageBucket() + { + if (array_key_exists("storageBucket", $this->_propDict)) { + if (is_a($this->_propDict["storageBucket"], "\Beta\Microsoft\Graph\Model\AuthorizationSystemResource") || is_null($this->_propDict["storageBucket"])) { + return $this->_propDict["storageBucket"]; + } else { + $this->_propDict["storageBucket"] = new AuthorizationSystemResource($this->_propDict["storageBucket"]); + return $this->_propDict["storageBucket"]; + } + } + return null; + } + + /** + * Sets the storageBucket + * + * @param AuthorizationSystemResource $val The storageBucket + * + * @return ExternallyAccessibleGcpStorageBucketFinding + */ + public function setStorageBucket($val) + { + $this->_propDict["storageBucket"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/Finding.php b/src/Beta/Microsoft/Graph/Model/Finding.php new file mode 100644 index 00000000000..c1f2248a382 --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/Finding.php @@ -0,0 +1,58 @@ +_propDict)) { + if (is_a($this->_propDict["createdDateTime"], "\DateTime") || is_null($this->_propDict["createdDateTime"])) { + return $this->_propDict["createdDateTime"]; + } else { + $this->_propDict["createdDateTime"] = new \DateTime($this->_propDict["createdDateTime"]); + return $this->_propDict["createdDateTime"]; + } + } + return null; + } + + /** + * Sets the createdDateTime + * + * @param \DateTime $val The createdDateTime + * + * @return Finding + */ + public function setCreatedDateTime($val) + { + $this->_propDict["createdDateTime"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/GcpAccessType.php b/src/Beta/Microsoft/Graph/Model/GcpAccessType.php new file mode 100644 index 00000000000..7c7465e4ded --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/GcpAccessType.php @@ -0,0 +1,36 @@ +_propDict)) { + if (is_a($this->_propDict["resource"], "\Beta\Microsoft\Graph\Model\GcpAuthorizationSystemResource") || is_null($this->_propDict["resource"])) { + return $this->_propDict["resource"]; + } else { + $this->_propDict["resource"] = new GcpAuthorizationSystemResource($this->_propDict["resource"]); + return $this->_propDict["resource"]; + } + } + return null; + } + + /** + * Sets the resource + * + * @param GcpAuthorizationSystemResource $val The resource + * + * @return GcpCloudFunction + */ + public function setResource($val) + { + $this->_propDict["resource"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/GcpEncryption.php b/src/Beta/Microsoft/Graph/Model/GcpEncryption.php new file mode 100644 index 00000000000..f8b075e6f6a --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/GcpEncryption.php @@ -0,0 +1,35 @@ +_propDict)) { + if (is_a($this->_propDict["actionSummary"], "\Beta\Microsoft\Graph\Model\ActionSummary") || is_null($this->_propDict["actionSummary"])) { + return $this->_propDict["actionSummary"]; + } else { + $this->_propDict["actionSummary"] = new ActionSummary($this->_propDict["actionSummary"]); + return $this->_propDict["actionSummary"]; + } + } + return null; + } + + /** + * Sets the actionSummary + * + * @param ActionSummary $val The actionSummary + * + * @return IdentityFinding + */ + public function setActionSummary($val) + { + $this->_propDict["actionSummary"] = $val; + return $this; + } + + /** + * Gets the identityDetails + * + * @return IdentityDetails|null The identityDetails + */ + public function getIdentityDetails() + { + if (array_key_exists("identityDetails", $this->_propDict)) { + if (is_a($this->_propDict["identityDetails"], "\Beta\Microsoft\Graph\Model\IdentityDetails") || is_null($this->_propDict["identityDetails"])) { + return $this->_propDict["identityDetails"]; + } else { + $this->_propDict["identityDetails"] = new IdentityDetails($this->_propDict["identityDetails"]); + return $this->_propDict["identityDetails"]; + } + } + return null; + } + + /** + * Sets the identityDetails + * + * @param IdentityDetails $val The identityDetails + * + * @return IdentityFinding + */ + public function setIdentityDetails($val) + { + $this->_propDict["identityDetails"] = $val; + return $this; + } + + /** + * Gets the permissionsCreepIndex + * + * @return PermissionsCreepIndex|null The permissionsCreepIndex + */ + public function getPermissionsCreepIndex() + { + if (array_key_exists("permissionsCreepIndex", $this->_propDict)) { + if (is_a($this->_propDict["permissionsCreepIndex"], "\Beta\Microsoft\Graph\Model\PermissionsCreepIndex") || is_null($this->_propDict["permissionsCreepIndex"])) { + return $this->_propDict["permissionsCreepIndex"]; + } else { + $this->_propDict["permissionsCreepIndex"] = new PermissionsCreepIndex($this->_propDict["permissionsCreepIndex"]); + return $this->_propDict["permissionsCreepIndex"]; + } + } + return null; + } + + /** + * Sets the permissionsCreepIndex + * + * @param PermissionsCreepIndex $val The permissionsCreepIndex + * + * @return IdentityFinding + */ + public function setPermissionsCreepIndex($val) + { + $this->_propDict["permissionsCreepIndex"] = $val; + return $this; + } + + /** + * Gets the identity + * + * @return AuthorizationSystemIdentity|null The identity + */ + public function getIdentity() + { + if (array_key_exists("identity", $this->_propDict)) { + if (is_a($this->_propDict["identity"], "\Beta\Microsoft\Graph\Model\AuthorizationSystemIdentity") || is_null($this->_propDict["identity"])) { + return $this->_propDict["identity"]; + } else { + $this->_propDict["identity"] = new AuthorizationSystemIdentity($this->_propDict["identity"]); + return $this->_propDict["identity"]; + } + } + return null; + } + + /** + * Sets the identity + * + * @param AuthorizationSystemIdentity $val The identity + * + * @return IdentityFinding + */ + public function setIdentity($val) + { + $this->_propDict["identity"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/IdentityGovernance.php b/src/Beta/Microsoft/Graph/Model/IdentityGovernance.php index 7e4071c2088..d0333f61eb6 100644 --- a/src/Beta/Microsoft/Graph/Model/IdentityGovernance.php +++ b/src/Beta/Microsoft/Graph/Model/IdentityGovernance.php @@ -210,6 +210,37 @@ public function setEntitlementManagement($val) return $this; } + /** + * Gets the permissionsAnalytics + * + * @return PermissionsAnalyticsAggregation|null The permissionsAnalytics + */ + public function getPermissionsAnalytics() + { + if (array_key_exists("permissionsAnalytics", $this->_propDict)) { + if (is_a($this->_propDict["permissionsAnalytics"], "\Beta\Microsoft\Graph\Model\PermissionsAnalyticsAggregation") || is_null($this->_propDict["permissionsAnalytics"])) { + return $this->_propDict["permissionsAnalytics"]; + } else { + $this->_propDict["permissionsAnalytics"] = new PermissionsAnalyticsAggregation($this->_propDict["permissionsAnalytics"]); + return $this->_propDict["permissionsAnalytics"]; + } + } + return null; + } + + /** + * Sets the permissionsAnalytics + * + * @param PermissionsAnalyticsAggregation $val The permissionsAnalytics + * + * @return IdentityGovernance + */ + public function setPermissionsAnalytics($val) + { + $this->_propDict["permissionsAnalytics"] = $val; + return $this; + } + /** * Gets the permissionsManagement * diff --git a/src/Beta/Microsoft/Graph/Model/IdentityProtectionRoot.php b/src/Beta/Microsoft/Graph/Model/IdentityProtectionRoot.php index 3bdc7d9c20c..a8bf548fb7d 100644 --- a/src/Beta/Microsoft/Graph/Model/IdentityProtectionRoot.php +++ b/src/Beta/Microsoft/Graph/Model/IdentityProtectionRoot.php @@ -58,7 +58,7 @@ public function getProperties() /** * Gets the riskDetections - * Risk detection in Azure AD Identity Protection and the associated information about the detection. + * Risk detection in Microsoft Entra ID Protection and the associated information about the detection. * * @return array|null The riskDetections */ @@ -73,7 +73,7 @@ public function getRiskDetections() /** * Sets the riskDetections - * Risk detection in Azure AD Identity Protection and the associated information about the detection. + * Risk detection in Microsoft Entra ID Protection and the associated information about the detection. * * @param RiskDetection[] $val The riskDetections * @@ -88,7 +88,7 @@ public function setRiskDetections($val) /** * Gets the riskyServicePrincipals - * Azure AD service principals that are at risk. + * Microsoft Entra service principals that are at risk. * * @return array|null The riskyServicePrincipals */ @@ -103,7 +103,7 @@ public function getRiskyServicePrincipals() /** * Sets the riskyServicePrincipals - * Azure AD service principals that are at risk. + * Microsoft Entra service principals that are at risk. * * @param RiskyServicePrincipal[] $val The riskyServicePrincipals * @@ -118,7 +118,7 @@ public function setRiskyServicePrincipals($val) /** * Gets the riskyUsers - * Users that are flagged as at-risk by Azure AD Identity Protection. + * Users that are flagged as at-risk by Microsoft Entra ID Protection. * * @return array|null The riskyUsers */ @@ -133,7 +133,7 @@ public function getRiskyUsers() /** * Sets the riskyUsers - * Users that are flagged as at-risk by Azure AD Identity Protection. + * Users that are flagged as at-risk by Microsoft Entra ID Protection. * * @param RiskyUser[] $val The riskyUsers * @@ -148,7 +148,7 @@ public function setRiskyUsers($val) /** * Gets the servicePrincipalRiskDetections - * Represents information about detected at-risk service principals in an Azure AD tenant. + * Represents information about detected at-risk service principals in a Microsoft Entra tenant. * * @return array|null The servicePrincipalRiskDetections */ @@ -163,7 +163,7 @@ public function getServicePrincipalRiskDetections() /** * Sets the servicePrincipalRiskDetections - * Represents information about detected at-risk service principals in an Azure AD tenant. + * Represents information about detected at-risk service principals in a Microsoft Entra tenant. * * @param ServicePrincipalRiskDetection[] $val The servicePrincipalRiskDetections * diff --git a/src/Beta/Microsoft/Graph/Model/IdentitySecurityDefaultsEnforcementPolicy.php b/src/Beta/Microsoft/Graph/Model/IdentitySecurityDefaultsEnforcementPolicy.php index 25b37f77ae7..9a7de61b64e 100644 --- a/src/Beta/Microsoft/Graph/Model/IdentitySecurityDefaultsEnforcementPolicy.php +++ b/src/Beta/Microsoft/Graph/Model/IdentitySecurityDefaultsEnforcementPolicy.php @@ -26,7 +26,7 @@ class IdentitySecurityDefaultsEnforcementPolicy extends PolicyBase { /** * Gets the isEnabled - * If set to true, Azure Active Directory security defaults are enabled for the tenant. + * If set to true, Microsoft Entra security defaults are enabled for the tenant. * * @return bool|null The isEnabled */ @@ -41,7 +41,7 @@ public function getIsEnabled() /** * Sets the isEnabled - * If set to true, Azure Active Directory security defaults are enabled for the tenant. + * If set to true, Microsoft Entra security defaults are enabled for the tenant. * * @param bool $val The isEnabled * diff --git a/src/Beta/Microsoft/Graph/Model/IdentitySet.php b/src/Beta/Microsoft/Graph/Model/IdentitySet.php index 2046ffd53d1..655759bfd9f 100644 --- a/src/Beta/Microsoft/Graph/Model/IdentitySet.php +++ b/src/Beta/Microsoft/Graph/Model/IdentitySet.php @@ -26,7 +26,7 @@ class IdentitySet extends Entity /** * Gets the application - * The Identity of the Application. This property is read-only. + * Optional. The application associated with this action. * * @return Identity|null The application */ @@ -45,7 +45,7 @@ public function getApplication() /** * Sets the application - * The Identity of the Application. This property is read-only. + * Optional. The application associated with this action. * * @param Identity $val The value to assign to the application * @@ -59,7 +59,7 @@ public function setApplication($val) /** * Gets the device - * The Identity of the Device. This property is read-only. + * Optional. The device associated with this action. * * @return Identity|null The device */ @@ -78,7 +78,7 @@ public function getDevice() /** * Sets the device - * The Identity of the Device. This property is read-only. + * Optional. The device associated with this action. * * @param Identity $val The value to assign to the device * @@ -92,7 +92,7 @@ public function setDevice($val) /** * Gets the user - * The Identity of the User. This property is read-only. + * Optional. The user associated with this action. * * @return Identity|null The user */ @@ -111,7 +111,7 @@ public function getUser() /** * Sets the user - * The Identity of the User. This property is read-only. + * Optional. The user associated with this action. * * @param Identity $val The value to assign to the user * diff --git a/src/Beta/Microsoft/Graph/Model/ImpactedResource.php b/src/Beta/Microsoft/Graph/Model/ImpactedResource.php index 9f62f005371..e08ec09be63 100644 --- a/src/Beta/Microsoft/Graph/Model/ImpactedResource.php +++ b/src/Beta/Microsoft/Graph/Model/ImpactedResource.php @@ -89,7 +89,7 @@ public function setAdditionalDetails($val) /** * Gets the apiUrl - * The URL link to the corresponding Azure AD resource. + * The URL link to the corresponding Microsoft Entra resource. * * @return string|null The apiUrl */ @@ -104,7 +104,7 @@ public function getApiUrl() /** * Sets the apiUrl - * The URL link to the corresponding Azure AD resource. + * The URL link to the corresponding Microsoft Entra resource. * * @param string $val The apiUrl * @@ -118,7 +118,7 @@ public function setApiUrl($val) /** * Gets the displayName - * Friendly name of the Azure AD resource. + * Friendly name of the Microsoft Entra resource. * * @return string|null The displayName */ @@ -133,7 +133,7 @@ public function getDisplayName() /** * Sets the displayName - * Friendly name of the Azure AD resource. + * Friendly name of the Microsoft Entra resource. * * @param string $val The displayName * @@ -234,7 +234,7 @@ public function setOwner($val) /** * Gets the portalUrl - * The URL link to the corresponding Azure AD portal page of the resource. + * The URL link to the corresponding Microsoft Entra admin center page of the resource. * * @return string|null The portalUrl */ @@ -249,7 +249,7 @@ public function getPortalUrl() /** * Sets the portalUrl - * The URL link to the corresponding Azure AD portal page of the resource. + * The URL link to the corresponding Microsoft Entra admin center page of the resource. * * @param string $val The portalUrl * @@ -354,7 +354,7 @@ public function setRecommendationId($val) /** * Gets the resourceType - * Indicates the type of Azure AD resource. Examples include user, application. + * Indicates the type of Microsoft Entra resource. Examples include user, application. * * @return string|null The resourceType */ @@ -369,7 +369,7 @@ public function getResourceType() /** * Sets the resourceType - * Indicates the type of Azure AD resource. Examples include user, application. + * Indicates the type of Microsoft Entra resource. Examples include user, application. * * @param string $val The resourceType * diff --git a/src/Beta/Microsoft/Graph/Model/InactiveAwsResourceFinding.php b/src/Beta/Microsoft/Graph/Model/InactiveAwsResourceFinding.php new file mode 100644 index 00000000000..dfdf75b8395 --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/InactiveAwsResourceFinding.php @@ -0,0 +1,27 @@ +_propDict)) { + if (is_a($this->_propDict["actionSummary"], "\Beta\Microsoft\Graph\Model\ActionSummary") || is_null($this->_propDict["actionSummary"])) { + return $this->_propDict["actionSummary"]; + } else { + $this->_propDict["actionSummary"] = new ActionSummary($this->_propDict["actionSummary"]); + return $this->_propDict["actionSummary"]; + } + } + return null; + } + + /** + * Sets the actionSummary + * + * @param ActionSummary $val The actionSummary + * + * @return InactiveGroupFinding + */ + public function setActionSummary($val) + { + $this->_propDict["actionSummary"] = $val; + return $this; + } + + /** + * Gets the permissionsCreepIndex + * + * @return PermissionsCreepIndex|null The permissionsCreepIndex + */ + public function getPermissionsCreepIndex() + { + if (array_key_exists("permissionsCreepIndex", $this->_propDict)) { + if (is_a($this->_propDict["permissionsCreepIndex"], "\Beta\Microsoft\Graph\Model\PermissionsCreepIndex") || is_null($this->_propDict["permissionsCreepIndex"])) { + return $this->_propDict["permissionsCreepIndex"]; + } else { + $this->_propDict["permissionsCreepIndex"] = new PermissionsCreepIndex($this->_propDict["permissionsCreepIndex"]); + return $this->_propDict["permissionsCreepIndex"]; + } + } + return null; + } + + /** + * Sets the permissionsCreepIndex + * + * @param PermissionsCreepIndex $val The permissionsCreepIndex + * + * @return InactiveGroupFinding + */ + public function setPermissionsCreepIndex($val) + { + $this->_propDict["permissionsCreepIndex"] = $val; + return $this; + } + + /** + * Gets the group + * + * @return AuthorizationSystemIdentity|null The group + */ + public function getGroup() + { + if (array_key_exists("group", $this->_propDict)) { + if (is_a($this->_propDict["group"], "\Beta\Microsoft\Graph\Model\AuthorizationSystemIdentity") || is_null($this->_propDict["group"])) { + return $this->_propDict["group"]; + } else { + $this->_propDict["group"] = new AuthorizationSystemIdentity($this->_propDict["group"]); + return $this->_propDict["group"]; + } + } + return null; + } + + /** + * Sets the group + * + * @param AuthorizationSystemIdentity $val The group + * + * @return InactiveGroupFinding + */ + public function setGroup($val) + { + $this->_propDict["group"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/InactiveServerlessFunctionFinding.php b/src/Beta/Microsoft/Graph/Model/InactiveServerlessFunctionFinding.php new file mode 100644 index 00000000000..1eec8237a9a --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/InactiveServerlessFunctionFinding.php @@ -0,0 +1,27 @@ +_propDict)) { + return $this->_propDict["appId"]; + } else { + return null; + } + } + + /** + * Sets the appId + * + * @param string $val The appId + * + * @return InactiveUsersByApplicationMetricBase + */ + public function setAppId($val) + { + $this->_propDict["appId"] = $val; + return $this; + } + /** * Gets the factDate * diff --git a/src/Beta/Microsoft/Graph/Model/InsightsSettings.php b/src/Beta/Microsoft/Graph/Model/InsightsSettings.php index 8938dbd8340..c5390180838 100644 --- a/src/Beta/Microsoft/Graph/Model/InsightsSettings.php +++ b/src/Beta/Microsoft/Graph/Model/InsightsSettings.php @@ -26,7 +26,7 @@ class InsightsSettings extends Entity { /** * Gets the disabledForGroup - * The ID of an Azure Active Directory group, of which the specified type of insights are disabled for its members. Default is empty. Optional. + * The ID of a Microsoft Entra group, of which the specified type of insights are disabled for its members. Default is empty. Optional. * * @return string|null The disabledForGroup */ @@ -41,7 +41,7 @@ public function getDisabledForGroup() /** * Sets the disabledForGroup - * The ID of an Azure Active Directory group, of which the specified type of insights are disabled for its members. Default is empty. Optional. + * The ID of a Microsoft Entra group, of which the specified type of insights are disabled for its members. Default is empty. Optional. * * @param string $val The disabledForGroup * diff --git a/src/Beta/Microsoft/Graph/Model/InternalDomainFederation.php b/src/Beta/Microsoft/Graph/Model/InternalDomainFederation.php index 7641c32482d..76aea7752de 100644 --- a/src/Beta/Microsoft/Graph/Model/InternalDomainFederation.php +++ b/src/Beta/Microsoft/Graph/Model/InternalDomainFederation.php @@ -26,7 +26,7 @@ class InternalDomainFederation extends SamlOrWsFedProvider { /** * Gets the activeSignInUri - * URL of the endpoint used by active clients when authenticating with federated domains set up for single sign-on in Azure Active Directory (Azure AD). Corresponds to the ActiveLogOnUri property of the Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet. + * URL of the endpoint used by active clients when authenticating with federated domains set up for single sign-on in Microsoft Entra ID. Corresponds to the ActiveLogOnUri property of the Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet. * * @return string|null The activeSignInUri */ @@ -41,7 +41,7 @@ public function getActiveSignInUri() /** * Sets the activeSignInUri - * URL of the endpoint used by active clients when authenticating with federated domains set up for single sign-on in Azure Active Directory (Azure AD). Corresponds to the ActiveLogOnUri property of the Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet. + * URL of the endpoint used by active clients when authenticating with federated domains set up for single sign-on in Microsoft Entra ID. Corresponds to the ActiveLogOnUri property of the Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet. * * @param string $val The activeSignInUri * @@ -55,7 +55,7 @@ public function setActiveSignInUri($val) /** * Gets the federatedIdpMfaBehavior - * Determines whether Azure AD accepts the MFA performed by the federated IdP when a federated user accesses an application that is governed by a conditional access policy that requires MFA. The possible values are: acceptIfMfaDoneByFederatedIdp, enforceMfaByFederatedIdp, rejectMfaByFederatedIdp, unknownFutureValue. For more information, see federatedIdpMfaBehavior values. + * Determines whether Microsoft Entra ID accepts the MFA performed by the federated IdP when a federated user accesses an application that is governed by a conditional access policy that requires MFA. The possible values are: acceptIfMfaDoneByFederatedIdp, enforceMfaByFederatedIdp, rejectMfaByFederatedIdp, unknownFutureValue. For more information, see federatedIdpMfaBehavior values. * * @return FederatedIdpMfaBehavior|null The federatedIdpMfaBehavior */ @@ -74,7 +74,7 @@ public function getFederatedIdpMfaBehavior() /** * Sets the federatedIdpMfaBehavior - * Determines whether Azure AD accepts the MFA performed by the federated IdP when a federated user accesses an application that is governed by a conditional access policy that requires MFA. The possible values are: acceptIfMfaDoneByFederatedIdp, enforceMfaByFederatedIdp, rejectMfaByFederatedIdp, unknownFutureValue. For more information, see federatedIdpMfaBehavior values. + * Determines whether Microsoft Entra ID accepts the MFA performed by the federated IdP when a federated user accesses an application that is governed by a conditional access policy that requires MFA. The possible values are: acceptIfMfaDoneByFederatedIdp, enforceMfaByFederatedIdp, rejectMfaByFederatedIdp, unknownFutureValue. For more information, see federatedIdpMfaBehavior values. * * @param FederatedIdpMfaBehavior $val The federatedIdpMfaBehavior * @@ -88,7 +88,7 @@ public function setFederatedIdpMfaBehavior($val) /** * Gets the isSignedAuthenticationRequestRequired - * If true, when SAML authentication requests are sent to the federated SAML IdP, Azure AD will sign those requests using the OrgID signing key. If false (default), the SAML authentication requests sent to the federated IdP aren't signed. + * If true, when SAML authentication requests are sent to the federated SAML IdP, Microsoft Entra ID will sign those requests using the OrgID signing key. If false (default), the SAML authentication requests sent to the federated IdP aren't signed. * * @return bool|null The isSignedAuthenticationRequestRequired */ @@ -103,7 +103,7 @@ public function getIsSignedAuthenticationRequestRequired() /** * Sets the isSignedAuthenticationRequestRequired - * If true, when SAML authentication requests are sent to the federated SAML IdP, Azure AD will sign those requests using the OrgID signing key. If false (default), the SAML authentication requests sent to the federated IdP aren't signed. + * If true, when SAML authentication requests are sent to the federated SAML IdP, Microsoft Entra ID will sign those requests using the OrgID signing key. If false (default), the SAML authentication requests sent to the federated IdP aren't signed. * * @param bool $val The isSignedAuthenticationRequestRequired * @@ -212,7 +212,7 @@ public function setSigningCertificateUpdateStatus($val) /** * Gets the signOutUri - * URI that clients are redirected to when they sign out of Azure AD services. Corresponds to the LogOffUri property of the Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet. + * URI that clients are redirected to when they sign out of Microsoft Entra services. Corresponds to the LogOffUri property of the Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet. * * @return string|null The signOutUri */ @@ -227,7 +227,7 @@ public function getSignOutUri() /** * Sets the signOutUri - * URI that clients are redirected to when they sign out of Azure AD services. Corresponds to the LogOffUri property of the Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet. + * URI that clients are redirected to when they sign out of Microsoft Entra services. Corresponds to the LogOffUri property of the Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet. * * @param string $val The signOutUri * diff --git a/src/Beta/Microsoft/Graph/Model/InvalidLicenseAlertIncident.php b/src/Beta/Microsoft/Graph/Model/InvalidLicenseAlertIncident.php index cb0f633dc0b..a74e71d76dc 100644 --- a/src/Beta/Microsoft/Graph/Model/InvalidLicenseAlertIncident.php +++ b/src/Beta/Microsoft/Graph/Model/InvalidLicenseAlertIncident.php @@ -26,7 +26,7 @@ class InvalidLicenseAlertIncident extends UnifiedRoleManagementAlertIncident { /** * Gets the tenantLicenseStatus - * Status of the tenant's Azure AD Premium P2 license. + * Status of the tenant's Microsoft Entra ID P2 license. * * @return string|null The tenantLicenseStatus */ @@ -41,7 +41,7 @@ public function getTenantLicenseStatus() /** * Sets the tenantLicenseStatus - * Status of the tenant's Azure AD Premium P2 license. + * Status of the tenant's Microsoft Entra ID P2 license. * * @param string $val The tenantLicenseStatus * diff --git a/src/Beta/Microsoft/Graph/Model/KeyValue.php b/src/Beta/Microsoft/Graph/Model/KeyValue.php index 9e797ef81ae..2dfdabba03a 100644 --- a/src/Beta/Microsoft/Graph/Model/KeyValue.php +++ b/src/Beta/Microsoft/Graph/Model/KeyValue.php @@ -25,7 +25,7 @@ class KeyValue extends Entity { /** * Gets the key - * Contains the name of the field that a value is associated with. + * Key. * * @return string|null The key */ @@ -40,7 +40,7 @@ public function getKey() /** * Sets the key - * Contains the name of the field that a value is associated with. + * Key. * * @param string $val The value of the key * @@ -53,7 +53,7 @@ public function setKey($val) } /** * Gets the value - * Contains the corresponding value for the specified key. + * Value. * * @return string|null The value */ @@ -68,7 +68,7 @@ public function getValue() /** * Sets the value - * Contains the corresponding value for the specified key. + * Value. * * @param string $val The value of the value * diff --git a/src/Beta/Microsoft/Graph/Model/MicrosoftApplicationDataAccessSettings.php b/src/Beta/Microsoft/Graph/Model/MicrosoftApplicationDataAccessSettings.php index c17a1f07e91..4e74e2f8b59 100644 --- a/src/Beta/Microsoft/Graph/Model/MicrosoftApplicationDataAccessSettings.php +++ b/src/Beta/Microsoft/Graph/Model/MicrosoftApplicationDataAccessSettings.php @@ -26,7 +26,7 @@ class MicrosoftApplicationDataAccessSettings extends Entity { /** * Gets the disabledForGroup - * The ID of an Azure Active Directory (Azure AD) security group for which the members are allowed to access Microsoft 365 data using only Microsoft 365 apps, but not other Microsoft apps such as Edge. This is only applicable if isEnabledForAllMicrosoftApplications is set to true. + * The ID of a Microsoft Entra security group for which the members are allowed to access Microsoft 365 data using only Microsoft 365 apps, but not other Microsoft apps such as Edge. This is only applicable if isEnabledForAllMicrosoftApplications is set to true. * * @return string|null The disabledForGroup */ @@ -41,7 +41,7 @@ public function getDisabledForGroup() /** * Sets the disabledForGroup - * The ID of an Azure Active Directory (Azure AD) security group for which the members are allowed to access Microsoft 365 data using only Microsoft 365 apps, but not other Microsoft apps such as Edge. This is only applicable if isEnabledForAllMicrosoftApplications is set to true. + * The ID of a Microsoft Entra security group for which the members are allowed to access Microsoft 365 data using only Microsoft 365 apps, but not other Microsoft apps such as Edge. This is only applicable if isEnabledForAllMicrosoftApplications is set to true. * * @param string $val The disabledForGroup * @@ -55,7 +55,7 @@ public function setDisabledForGroup($val) /** * Gets the isEnabledForAllMicrosoftApplications - * When set to true, all users in the organization can access in a Microsoft app any Microsoft 365 data that the user has been authorized to access. The Microsoft app can be a Microsoft 365 app (for example, Excel, Outlook) or non-Microsoft 365 app (for example, Edge). The default is true. It is possible to disable this access for a subset of users in an Azure AD security group, by specifying the group in the disabledForGroup property. When set to false, all users can access authorized Microsoft 365 data only in a Microsoft 365 app. + * When set to true, all users in the organization can access in a Microsoft app any Microsoft 365 data that the user has been authorized to access. The Microsoft app can be a Microsoft 365 app (for example, Excel, Outlook) or non-Microsoft 365 app (for example, Edge). The default is true. It is possible to disable this access for a subset of users in a Microsoft Entra security group, by specifying the group in the disabledForGroup property. When set to false, all users can access authorized Microsoft 365 data only in a Microsoft 365 app. * * @return bool|null The isEnabledForAllMicrosoftApplications */ @@ -70,7 +70,7 @@ public function getIsEnabledForAllMicrosoftApplications() /** * Sets the isEnabledForAllMicrosoftApplications - * When set to true, all users in the organization can access in a Microsoft app any Microsoft 365 data that the user has been authorized to access. The Microsoft app can be a Microsoft 365 app (for example, Excel, Outlook) or non-Microsoft 365 app (for example, Edge). The default is true. It is possible to disable this access for a subset of users in an Azure AD security group, by specifying the group in the disabledForGroup property. When set to false, all users can access authorized Microsoft 365 data only in a Microsoft 365 app. + * When set to true, all users in the organization can access in a Microsoft app any Microsoft 365 data that the user has been authorized to access. The Microsoft app can be a Microsoft 365 app (for example, Excel, Outlook) or non-Microsoft 365 app (for example, Edge). The default is true. It is possible to disable this access for a subset of users in a Microsoft Entra security group, by specifying the group in the disabledForGroup property. When set to false, all users can access authorized Microsoft 365 data only in a Microsoft 365 app. * * @param bool $val The isEnabledForAllMicrosoftApplications * diff --git a/src/Beta/Microsoft/Graph/Model/MobilityManagementPolicy.php b/src/Beta/Microsoft/Graph/Model/MobilityManagementPolicy.php index f6b5a22344b..ece28fecbff 100644 --- a/src/Beta/Microsoft/Graph/Model/MobilityManagementPolicy.php +++ b/src/Beta/Microsoft/Graph/Model/MobilityManagementPolicy.php @@ -234,7 +234,7 @@ public function setTermsOfUseUrl($val) /** * Gets the includedGroups - * Azure AD groups under the scope of the mobility management application if appliesTo is selected + * Microsoft Entra groups under the scope of the mobility management application if appliesTo is selected * * @return array|null The includedGroups */ @@ -249,7 +249,7 @@ public function getIncludedGroups() /** * Sets the includedGroups - * Azure AD groups under the scope of the mobility management application if appliesTo is selected + * Microsoft Entra groups under the scope of the mobility management application if appliesTo is selected * * @param Group[] $val The includedGroups * diff --git a/src/Beta/Microsoft/Graph/Model/MultiTenantOrganizationJoinRequestRecord.php b/src/Beta/Microsoft/Graph/Model/MultiTenantOrganizationJoinRequestRecord.php index a77ebcbf070..830e8271369 100644 --- a/src/Beta/Microsoft/Graph/Model/MultiTenantOrganizationJoinRequestRecord.php +++ b/src/Beta/Microsoft/Graph/Model/MultiTenantOrganizationJoinRequestRecord.php @@ -26,7 +26,7 @@ class MultiTenantOrganizationJoinRequestRecord extends Entity { /** * Gets the addedByTenantId - * Tenant ID of the Azure Active Directory tenant that added a tenant to the multi-tenant organization. To reset a failed join request, set addedByTenantId to 00000000-0000-0000-0000-000000000000. Required. + * Tenant ID of the Microsoft Entra tenant that added a tenant to the multi-tenant organization. To reset a failed join request, set addedByTenantId to 00000000-0000-0000-0000-000000000000. Required. * * @return string|null The addedByTenantId */ @@ -41,7 +41,7 @@ public function getAddedByTenantId() /** * Sets the addedByTenantId - * Tenant ID of the Azure Active Directory tenant that added a tenant to the multi-tenant organization. To reset a failed join request, set addedByTenantId to 00000000-0000-0000-0000-000000000000. Required. + * Tenant ID of the Microsoft Entra tenant that added a tenant to the multi-tenant organization. To reset a failed join request, set addedByTenantId to 00000000-0000-0000-0000-000000000000. Required. * * @param string $val The addedByTenantId * diff --git a/src/Beta/Microsoft/Graph/Model/MultiTenantOrganizationMember.php b/src/Beta/Microsoft/Graph/Model/MultiTenantOrganizationMember.php index e6e234012c8..0365d5795cd 100644 --- a/src/Beta/Microsoft/Graph/Model/MultiTenantOrganizationMember.php +++ b/src/Beta/Microsoft/Graph/Model/MultiTenantOrganizationMember.php @@ -216,7 +216,7 @@ public function setState($val) /** * Gets the tenantId - * Tenant ID of the Azure Active Directory tenant added to the multitenant organization. Set at the time tenant is added.Supports $filter. Key. + * Tenant ID of the Microsoft Entra tenant added to the multitenant organization. Set at the time tenant is added.Supports $filter. Key. * * @return string|null The tenantId */ @@ -231,7 +231,7 @@ public function getTenantId() /** * Sets the tenantId - * Tenant ID of the Azure Active Directory tenant added to the multitenant organization. Set at the time tenant is added.Supports $filter. Key. + * Tenant ID of the Microsoft Entra tenant added to the multitenant organization. Set at the time tenant is added.Supports $filter. Key. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/Model/MultiTenantOrganizationPartnerConfigurationTemplate.php b/src/Beta/Microsoft/Graph/Model/MultiTenantOrganizationPartnerConfigurationTemplate.php index af0eb91cf34..9ea5e57e998 100644 --- a/src/Beta/Microsoft/Graph/Model/MultiTenantOrganizationPartnerConfigurationTemplate.php +++ b/src/Beta/Microsoft/Graph/Model/MultiTenantOrganizationPartnerConfigurationTemplate.php @@ -59,7 +59,7 @@ public function setAutomaticUserConsentSettings($val) /** * Gets the b2bCollaborationInbound - * Defines your partner-specific configuration for users from other organizations accessing your resources via Azure AD B2B collaboration. + * Defines your partner-specific configuration for users from other organizations accessing your resources via Microsoft Entra B2B collaboration. * * @return CrossTenantAccessPolicyB2BSetting|null The b2bCollaborationInbound */ @@ -78,7 +78,7 @@ public function getB2bCollaborationInbound() /** * Sets the b2bCollaborationInbound - * Defines your partner-specific configuration for users from other organizations accessing your resources via Azure AD B2B collaboration. + * Defines your partner-specific configuration for users from other organizations accessing your resources via Microsoft Entra B2B collaboration. * * @param CrossTenantAccessPolicyB2BSetting $val The b2bCollaborationInbound * @@ -92,7 +92,7 @@ public function setB2bCollaborationInbound($val) /** * Gets the b2bCollaborationOutbound - * Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B collaboration. + * Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Microsoft Entra B2B collaboration. * * @return CrossTenantAccessPolicyB2BSetting|null The b2bCollaborationOutbound */ @@ -111,7 +111,7 @@ public function getB2bCollaborationOutbound() /** * Sets the b2bCollaborationOutbound - * Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B collaboration. + * Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Microsoft Entra B2B collaboration. * * @param CrossTenantAccessPolicyB2BSetting $val The b2bCollaborationOutbound * @@ -158,7 +158,7 @@ public function setB2bDirectConnectInbound($val) /** * Gets the b2bDirectConnectOutbound - * Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B direct connect. + * Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Microsoft Entra B2B direct connect. * * @return CrossTenantAccessPolicyB2BSetting|null The b2bDirectConnectOutbound */ @@ -177,7 +177,7 @@ public function getB2bDirectConnectOutbound() /** * Sets the b2bDirectConnectOutbound - * Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B direct connect. + * Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Microsoft Entra B2B direct connect. * * @param CrossTenantAccessPolicyB2BSetting $val The b2bDirectConnectOutbound * @@ -191,7 +191,7 @@ public function setB2bDirectConnectOutbound($val) /** * Gets the inboundTrust - * Determines the partner-specific configuration for trusting other Conditional Access claims from external Azure AD organizations. + * Determines the partner-specific configuration for trusting other Conditional Access claims from external Microsoft Entra organizations. * * @return CrossTenantAccessPolicyInboundTrust|null The inboundTrust */ @@ -210,7 +210,7 @@ public function getInboundTrust() /** * Sets the inboundTrust - * Determines the partner-specific configuration for trusting other Conditional Access claims from external Azure AD organizations. + * Determines the partner-specific configuration for trusting other Conditional Access claims from external Microsoft Entra organizations. * * @param CrossTenantAccessPolicyInboundTrust $val The inboundTrust * diff --git a/src/Beta/Microsoft/Graph/Model/NoMfaOnRoleActivationAlertIncident.php b/src/Beta/Microsoft/Graph/Model/NoMfaOnRoleActivationAlertIncident.php index 71d7734192c..ab486294b58 100644 --- a/src/Beta/Microsoft/Graph/Model/NoMfaOnRoleActivationAlertIncident.php +++ b/src/Beta/Microsoft/Graph/Model/NoMfaOnRoleActivationAlertIncident.php @@ -26,7 +26,7 @@ class NoMfaOnRoleActivationAlertIncident extends UnifiedRoleManagementAlertIncid { /** * Gets the roleDisplayName - * The name of the Azure AD directory role. + * The name of the Microsoft Entra ID directory role. * * @return string|null The roleDisplayName */ @@ -41,7 +41,7 @@ public function getRoleDisplayName() /** * Sets the roleDisplayName - * The name of the Azure AD directory role. + * The name of the Microsoft Entra ID directory role. * * @param string $val The roleDisplayName * diff --git a/src/Beta/Microsoft/Graph/Model/ObjectIdentity.php b/src/Beta/Microsoft/Graph/Model/ObjectIdentity.php index 0fcfc830cff..96643b7e1bf 100644 --- a/src/Beta/Microsoft/Graph/Model/ObjectIdentity.php +++ b/src/Beta/Microsoft/Graph/Model/ObjectIdentity.php @@ -25,7 +25,7 @@ class ObjectIdentity extends Entity { /** * Gets the issuer - * Specifies the issuer of the identity, for example facebook.com.For local accounts (where signInType isn't federated), this property is the local B2C tenant default domain name, for example contoso.onmicrosoft.com.For guests from other Azure AD organization, this is the domain of the federated organization, for example contoso.com.Supports $filter. 512 character limit. + * Specifies the issuer of the identity, for example facebook.com.For local accounts (where signInType isn't federated), this property is the local B2C tenant default domain name, for example contoso.onmicrosoft.com.For guests from other Microsoft Entra organization, this is the domain of the federated organization, for example contoso.com.Supports $filter. 512 character limit. * * @return string|null The issuer */ @@ -40,7 +40,7 @@ public function getIssuer() /** * Sets the issuer - * Specifies the issuer of the identity, for example facebook.com.For local accounts (where signInType isn't federated), this property is the local B2C tenant default domain name, for example contoso.onmicrosoft.com.For guests from other Azure AD organization, this is the domain of the federated organization, for example contoso.com.Supports $filter. 512 character limit. + * Specifies the issuer of the identity, for example facebook.com.For local accounts (where signInType isn't federated), this property is the local B2C tenant default domain name, for example contoso.onmicrosoft.com.For guests from other Microsoft Entra organization, this is the domain of the federated organization, for example contoso.com.Supports $filter. 512 character limit. * * @param string $val The value of the issuer * diff --git a/src/Beta/Microsoft/Graph/Model/OnPremisesDirectorySynchronizationFeature.php b/src/Beta/Microsoft/Graph/Model/OnPremisesDirectorySynchronizationFeature.php index 31a60279144..4d2f32e46b9 100644 --- a/src/Beta/Microsoft/Graph/Model/OnPremisesDirectorySynchronizationFeature.php +++ b/src/Beta/Microsoft/Graph/Model/OnPremisesDirectorySynchronizationFeature.php @@ -81,7 +81,7 @@ public function setBlockSoftMatchEnabled($val) } /** * Gets the bypassDirSyncOverridesEnabled - * When true, persists the values of Mobile and OtherMobile in on-premises AD during sync cycles instead of values of MobilePhone or AlternateMobilePhones in Azure AD. + * When true, persists the values of Mobile and OtherMobile in on-premises AD during sync cycles instead of values of MobilePhone or AlternateMobilePhones in Microsoft Entra ID. * * @return bool|null The bypassDirSyncOverridesEnabled */ @@ -96,7 +96,7 @@ public function getBypassDirSyncOverridesEnabled() /** * Sets the bypassDirSyncOverridesEnabled - * When true, persists the values of Mobile and OtherMobile in on-premises AD during sync cycles instead of values of MobilePhone or AlternateMobilePhones in Azure AD. + * When true, persists the values of Mobile and OtherMobile in on-premises AD during sync cycles instead of values of MobilePhone or AlternateMobilePhones in Microsoft Entra ID. * * @param bool $val The value of the bypassDirSyncOverridesEnabled * @@ -221,7 +221,7 @@ public function setDeviceWritebackEnabled($val) } /** * Gets the directoryExtensionsEnabled - * Used to indicate that directory extensions are being synced from on-premises AD to Azure AD. + * Used to indicate that directory extensions are being synced from on-premises AD to Microsoft Entra ID. * * @return bool|null The directoryExtensionsEnabled */ @@ -236,7 +236,7 @@ public function getDirectoryExtensionsEnabled() /** * Sets the directoryExtensionsEnabled - * Used to indicate that directory extensions are being synced from on-premises AD to Azure AD. + * Used to indicate that directory extensions are being synced from on-premises AD to Microsoft Entra ID. * * @param bool $val The value of the directoryExtensionsEnabled * @@ -333,7 +333,7 @@ public function setPasswordSyncEnabled($val) } /** * Gets the passwordWritebackEnabled - * Used to indicate that writeback of password resets from Azure AD to on-premises AD is enabled. + * Used to indicate that writeback of password resets from Microsoft Entra ID to on-premises AD is enabled. * * @return bool|null The passwordWritebackEnabled */ @@ -348,7 +348,7 @@ public function getPasswordWritebackEnabled() /** * Sets the passwordWritebackEnabled - * Used to indicate that writeback of password resets from Azure AD to on-premises AD is enabled. + * Used to indicate that writeback of password resets from Microsoft Entra ID to on-premises AD is enabled. * * @param bool $val The value of the passwordWritebackEnabled * diff --git a/src/Beta/Microsoft/Graph/Model/OnPremisesPublishing.php b/src/Beta/Microsoft/Graph/Model/OnPremisesPublishing.php index 7b4c8fc2c02..3e5344ed15b 100644 --- a/src/Beta/Microsoft/Graph/Model/OnPremisesPublishing.php +++ b/src/Beta/Microsoft/Graph/Model/OnPremisesPublishing.php @@ -308,7 +308,7 @@ public function setIsOnPremPublishingEnabled($val) } /** * Gets the isPersistentCookieEnabled - * Indicates if the Persistent cookie flag should be set in the HTTP response headers. Keep this value set to false. Only use this setting for applications that can't share cookies between processes. For more information about cookie settings, see Cookie settings for accessing on-premises applications in Azure Active Directory. Default value is false. + * Indicates if the Persistent cookie flag should be set in the HTTP response headers. Keep this value set to false. Only use this setting for applications that can't share cookies between processes. For more information about cookie settings, see Cookie settings for accessing on-premises applications in Microsoft Entra ID. Default value is false. * * @return bool|null The isPersistentCookieEnabled */ @@ -323,7 +323,7 @@ public function getIsPersistentCookieEnabled() /** * Sets the isPersistentCookieEnabled - * Indicates if the Persistent cookie flag should be set in the HTTP response headers. Keep this value set to false. Only use this setting for applications that can't share cookies between processes. For more information about cookie settings, see Cookie settings for accessing on-premises applications in Azure Active Directory. Default value is false. + * Indicates if the Persistent cookie flag should be set in the HTTP response headers. Keep this value set to false. Only use this setting for applications that can't share cookies between processes. For more information about cookie settings, see Cookie settings for accessing on-premises applications in Microsoft Entra ID. Default value is false. * * @param bool $val The value of the isPersistentCookieEnabled * @@ -480,7 +480,7 @@ public function setOnPremisesApplicationSegments($val) /** * Gets the segmentsConfiguration - * Represents the collection of application segments for an on-premises wildcard application that's published through Azure AD Application Proxy. + * Represents the collection of application segments for an on-premises wildcard application that's published through Microsoft Entra application proxy. * * @return SegmentConfiguration|null The segmentsConfiguration */ @@ -499,7 +499,7 @@ public function getSegmentsConfiguration() /** * Sets the segmentsConfiguration - * Represents the collection of application segments for an on-premises wildcard application that's published through Azure AD Application Proxy. + * Represents the collection of application segments for an on-premises wildcard application that's published through Microsoft Entra application proxy. * * @param SegmentConfiguration $val The value to assign to the segmentsConfiguration * diff --git a/src/Beta/Microsoft/Graph/Model/OnPremisesPublishingProfile.php b/src/Beta/Microsoft/Graph/Model/OnPremisesPublishingProfile.php index 29bb69292e7..514a415240c 100644 --- a/src/Beta/Microsoft/Graph/Model/OnPremisesPublishingProfile.php +++ b/src/Beta/Microsoft/Graph/Model/OnPremisesPublishingProfile.php @@ -86,7 +86,7 @@ public function setIsDefaultAccessEnabled($val) /** * Gets the isEnabled - * Represents if Azure AD Application Proxy is enabled for the tenant. + * Represents if Microsoft Entra application proxy is enabled for the tenant. * * @return bool|null The isEnabled */ @@ -101,7 +101,7 @@ public function getIsEnabled() /** * Sets the isEnabled - * Represents if Azure AD Application Proxy is enabled for the tenant. + * Represents if Microsoft Entra application proxy is enabled for the tenant. * * @param bool $val The isEnabled * diff --git a/src/Beta/Microsoft/Graph/Model/OpenAwsSecurityGroupFinding.php b/src/Beta/Microsoft/Graph/Model/OpenAwsSecurityGroupFinding.php new file mode 100644 index 00000000000..11f752a9874 --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/OpenAwsSecurityGroupFinding.php @@ -0,0 +1,144 @@ +_propDict)) { + if (is_a($this->_propDict["inboundPorts"], "\Beta\Microsoft\Graph\Model\InboundPorts") || is_null($this->_propDict["inboundPorts"])) { + return $this->_propDict["inboundPorts"]; + } else { + $this->_propDict["inboundPorts"] = new InboundPorts($this->_propDict["inboundPorts"]); + return $this->_propDict["inboundPorts"]; + } + } + return null; + } + + /** + * Sets the inboundPorts + * + * @param InboundPorts $val The inboundPorts + * + * @return OpenAwsSecurityGroupFinding + */ + public function setInboundPorts($val) + { + $this->_propDict["inboundPorts"] = $val; + return $this; + } + + /** + * Gets the totalStorageBucketCount + * + * @return int|null The totalStorageBucketCount + */ + public function getTotalStorageBucketCount() + { + if (array_key_exists("totalStorageBucketCount", $this->_propDict)) { + return $this->_propDict["totalStorageBucketCount"]; + } else { + return null; + } + } + + /** + * Sets the totalStorageBucketCount + * + * @param int $val The totalStorageBucketCount + * + * @return OpenAwsSecurityGroupFinding + */ + public function setTotalStorageBucketCount($val) + { + $this->_propDict["totalStorageBucketCount"] = intval($val); + return $this; + } + + + /** + * Gets the assignedComputeInstancesDetails + * + * @return array|null The assignedComputeInstancesDetails + */ + public function getAssignedComputeInstancesDetails() + { + if (array_key_exists("assignedComputeInstancesDetails", $this->_propDict)) { + return $this->_propDict["assignedComputeInstancesDetails"]; + } else { + return null; + } + } + + /** + * Sets the assignedComputeInstancesDetails + * + * @param AssignedComputeInstanceDetails[] $val The assignedComputeInstancesDetails + * + * @return OpenAwsSecurityGroupFinding + */ + public function setAssignedComputeInstancesDetails($val) + { + $this->_propDict["assignedComputeInstancesDetails"] = $val; + return $this; + } + + /** + * Gets the securityGroup + * + * @return AwsAuthorizationSystemResource|null The securityGroup + */ + public function getSecurityGroup() + { + if (array_key_exists("securityGroup", $this->_propDict)) { + if (is_a($this->_propDict["securityGroup"], "\Beta\Microsoft\Graph\Model\AwsAuthorizationSystemResource") || is_null($this->_propDict["securityGroup"])) { + return $this->_propDict["securityGroup"]; + } else { + $this->_propDict["securityGroup"] = new AwsAuthorizationSystemResource($this->_propDict["securityGroup"]); + return $this->_propDict["securityGroup"]; + } + } + return null; + } + + /** + * Sets the securityGroup + * + * @param AwsAuthorizationSystemResource $val The securityGroup + * + * @return OpenAwsSecurityGroupFinding + */ + public function setSecurityGroup($val) + { + $this->_propDict["securityGroup"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/OpenIdConnectIdentityProvider.php b/src/Beta/Microsoft/Graph/Model/OpenIdConnectIdentityProvider.php index 1b50c50931f..6d550c1c0ad 100644 --- a/src/Beta/Microsoft/Graph/Model/OpenIdConnectIdentityProvider.php +++ b/src/Beta/Microsoft/Graph/Model/OpenIdConnectIdentityProvider.php @@ -26,7 +26,7 @@ class OpenIdConnectIdentityProvider extends IdentityProviderBase { /** * Gets the claimsMapping - * After the OIDC provider sends an ID token back to Azure AD, Azure AD needs to be able to map the claims from the received token to the claims that Azure AD recognizes and uses. This complex type captures that mapping. Required. + * After the OIDC provider sends an ID token back to Microsoft Entra ID, Microsoft Entra ID needs to be able to map the claims from the received token to the claims that Microsoft Entra ID recognizes and uses. This complex type captures that mapping. Required. * * @return ClaimsMapping|null The claimsMapping */ @@ -45,7 +45,7 @@ public function getClaimsMapping() /** * Sets the claimsMapping - * After the OIDC provider sends an ID token back to Azure AD, Azure AD needs to be able to map the claims from the received token to the claims that Azure AD recognizes and uses. This complex type captures that mapping. Required. + * After the OIDC provider sends an ID token back to Microsoft Entra ID, Microsoft Entra ID needs to be able to map the claims from the received token to the claims that Microsoft Entra ID recognizes and uses. This complex type captures that mapping. Required. * * @param ClaimsMapping $val The claimsMapping * diff --git a/src/Beta/Microsoft/Graph/Model/OpenIdConnectProvider.php b/src/Beta/Microsoft/Graph/Model/OpenIdConnectProvider.php index 4a40487340a..401754c5c53 100644 --- a/src/Beta/Microsoft/Graph/Model/OpenIdConnectProvider.php +++ b/src/Beta/Microsoft/Graph/Model/OpenIdConnectProvider.php @@ -26,7 +26,7 @@ class OpenIdConnectProvider extends IdentityProvider { /** * Gets the claimsMapping - * After the OIDC provider sends an ID token back to Azure AD, Azure AD needs to be able to map the claims from the received token to the claims that Azure AD recognizes and uses. This complex type captures that mapping. It's a required property. + * After the OIDC provider sends an ID token back to Microsoft Entra ID, Microsoft Entra ID needs to be able to map the claims from the received token to the claims that Microsoft Entra ID recognizes and uses. This complex type captures that mapping. It's a required property. * * @return ClaimsMapping|null The claimsMapping */ @@ -45,7 +45,7 @@ public function getClaimsMapping() /** * Sets the claimsMapping - * After the OIDC provider sends an ID token back to Azure AD, Azure AD needs to be able to map the claims from the received token to the claims that Azure AD recognizes and uses. This complex type captures that mapping. It's a required property. + * After the OIDC provider sends an ID token back to Microsoft Entra ID, Microsoft Entra ID needs to be able to map the claims from the received token to the claims that Microsoft Entra ID recognizes and uses. This complex type captures that mapping. It's a required property. * * @param ClaimsMapping $val The claimsMapping * diff --git a/src/Beta/Microsoft/Graph/Model/OpenNetworkAzureSecurityGroupFinding.php b/src/Beta/Microsoft/Graph/Model/OpenNetworkAzureSecurityGroupFinding.php new file mode 100644 index 00000000000..a9725d9097c --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/OpenNetworkAzureSecurityGroupFinding.php @@ -0,0 +1,117 @@ +_propDict)) { + if (is_a($this->_propDict["inboundPorts"], "\Beta\Microsoft\Graph\Model\InboundPorts") || is_null($this->_propDict["inboundPorts"])) { + return $this->_propDict["inboundPorts"]; + } else { + $this->_propDict["inboundPorts"] = new InboundPorts($this->_propDict["inboundPorts"]); + return $this->_propDict["inboundPorts"]; + } + } + return null; + } + + /** + * Sets the inboundPorts + * + * @param InboundPorts $val The inboundPorts + * + * @return OpenNetworkAzureSecurityGroupFinding + */ + public function setInboundPorts($val) + { + $this->_propDict["inboundPorts"] = $val; + return $this; + } + + /** + * Gets the securityGroup + * + * @return AuthorizationSystemResource|null The securityGroup + */ + public function getSecurityGroup() + { + if (array_key_exists("securityGroup", $this->_propDict)) { + if (is_a($this->_propDict["securityGroup"], "\Beta\Microsoft\Graph\Model\AuthorizationSystemResource") || is_null($this->_propDict["securityGroup"])) { + return $this->_propDict["securityGroup"]; + } else { + $this->_propDict["securityGroup"] = new AuthorizationSystemResource($this->_propDict["securityGroup"]); + return $this->_propDict["securityGroup"]; + } + } + return null; + } + + /** + * Sets the securityGroup + * + * @param AuthorizationSystemResource $val The securityGroup + * + * @return OpenNetworkAzureSecurityGroupFinding + */ + public function setSecurityGroup($val) + { + $this->_propDict["securityGroup"] = $val; + return $this; + } + + + /** + * Gets the virtualMachines + * + * @return array|null The virtualMachines + */ + public function getVirtualMachines() + { + if (array_key_exists("virtualMachines", $this->_propDict)) { + return $this->_propDict["virtualMachines"]; + } else { + return null; + } + } + + /** + * Sets the virtualMachines + * + * @param AuthorizationSystemResource[] $val The virtualMachines + * + * @return OpenNetworkAzureSecurityGroupFinding + */ + public function setVirtualMachines($val) + { + $this->_propDict["virtualMachines"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/OrganizationalBrandingProperties.php b/src/Beta/Microsoft/Graph/Model/OrganizationalBrandingProperties.php index 3c639462a7d..c2bb55e3d8b 100644 --- a/src/Beta/Microsoft/Graph/Model/OrganizationalBrandingProperties.php +++ b/src/Beta/Microsoft/Graph/Model/OrganizationalBrandingProperties.php @@ -208,7 +208,7 @@ public function setCdnList($val) /** * Gets the contentCustomization - * Represents the various content options to be customized throughout the authentication flow for a tenant. NOTE: Supported by Azure Active Directory for customers tenants only. + * Represents the various content options to be customized throughout the authentication flow for a tenant. NOTE: Supported by Microsoft Entra ID for customers tenants only. * * @return ContentCustomization|null The contentCustomization */ @@ -227,7 +227,7 @@ public function getContentCustomization() /** * Sets the contentCustomization - * Represents the various content options to be customized throughout the authentication flow for a tenant. NOTE: Supported by Azure Active Directory for customers tenants only. + * Represents the various content options to be customized throughout the authentication flow for a tenant. NOTE: Supported by Microsoft Entra ID for customers tenants only. * * @param ContentCustomization $val The contentCustomization * @@ -564,7 +564,7 @@ public function setCustomTermsOfUseUrl($val) /** * Gets the favicon - * A custom icon (favicon) to replace a default Microsoft product favicon on an Azure AD tenant. + * A custom icon (favicon) to replace a default Microsoft product favicon on a Microsoft Entra tenant. * * @return \GuzzleHttp\Psr7\Stream|null The favicon */ @@ -583,7 +583,7 @@ public function getFavicon() /** * Sets the favicon - * A custom icon (favicon) to replace a default Microsoft product favicon on an Azure AD tenant. + * A custom icon (favicon) to replace a default Microsoft product favicon on a Microsoft Entra tenant. * * @param \GuzzleHttp\Psr7\Stream $val The favicon * diff --git a/src/Beta/Microsoft/Graph/Model/OrganizerMeetingInfo.php b/src/Beta/Microsoft/Graph/Model/OrganizerMeetingInfo.php index ff7723e8fee..7574244a675 100644 --- a/src/Beta/Microsoft/Graph/Model/OrganizerMeetingInfo.php +++ b/src/Beta/Microsoft/Graph/Model/OrganizerMeetingInfo.php @@ -37,7 +37,7 @@ public function __construct($propDict = array()) /** * Gets the organizer - * The organizer Azure Active Directory identity. + * The organizer Microsoft Entra identity. * * @return IdentitySet|null The organizer */ @@ -56,7 +56,7 @@ public function getOrganizer() /** * Sets the organizer - * The organizer Azure Active Directory identity. + * The organizer Microsoft Entra identity. * * @param IdentitySet $val The value to assign to the organizer * diff --git a/src/Beta/Microsoft/Graph/Model/OutboundSharedUserProfile.php b/src/Beta/Microsoft/Graph/Model/OutboundSharedUserProfile.php index b38f6bfc65b..12fe90b9421 100644 --- a/src/Beta/Microsoft/Graph/Model/OutboundSharedUserProfile.php +++ b/src/Beta/Microsoft/Graph/Model/OutboundSharedUserProfile.php @@ -87,7 +87,7 @@ public function setUserId($val) /** * Gets the tenants - * The collection of external Azure AD tenants that the user has shared profile data with. Read-only. + * The collection of external Microsoft Entra tenants that the user has shared profile data with. Read-only. * * @return array|null The tenants */ @@ -102,7 +102,7 @@ public function getTenants() /** * Sets the tenants - * The collection of external Azure AD tenants that the user has shared profile data with. Read-only. + * The collection of external Microsoft Entra tenants that the user has shared profile data with. Read-only. * * @param TenantReference[] $val The tenants * diff --git a/src/Beta/Microsoft/Graph/Model/OverprovisionedAwsResourceFinding.php b/src/Beta/Microsoft/Graph/Model/OverprovisionedAwsResourceFinding.php new file mode 100644 index 00000000000..b18121cd14e --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/OverprovisionedAwsResourceFinding.php @@ -0,0 +1,27 @@ +_propDict)) { + return $this->_propDict["findings"]; + } else { + return null; + } + } + + /** + * Sets the findings + * + * @param Finding[] $val The findings + * + * @return PermissionsAnalytics + */ + public function setFindings($val) + { + $this->_propDict["findings"] = $val; + return $this; + } + + + /** + * Gets the permissionsCreepIndexDistributions + * + * @return array|null The permissionsCreepIndexDistributions + */ + public function getPermissionsCreepIndexDistributions() + { + if (array_key_exists("permissionsCreepIndexDistributions", $this->_propDict)) { + return $this->_propDict["permissionsCreepIndexDistributions"]; + } else { + return null; + } + } + + /** + * Sets the permissionsCreepIndexDistributions + * + * @param PermissionsCreepIndexDistribution[] $val The permissionsCreepIndexDistributions + * + * @return PermissionsAnalytics + */ + public function setPermissionsCreepIndexDistributions($val) + { + $this->_propDict["permissionsCreepIndexDistributions"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/PermissionsAnalyticsAggregation.php b/src/Beta/Microsoft/Graph/Model/PermissionsAnalyticsAggregation.php new file mode 100644 index 00000000000..2cf774e6286 --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/PermissionsAnalyticsAggregation.php @@ -0,0 +1,120 @@ +_propDict)) { + if (is_a($this->_propDict["aws"], "\Beta\Microsoft\Graph\Model\PermissionsAnalytics") || is_null($this->_propDict["aws"])) { + return $this->_propDict["aws"]; + } else { + $this->_propDict["aws"] = new PermissionsAnalytics($this->_propDict["aws"]); + return $this->_propDict["aws"]; + } + } + return null; + } + + /** + * Sets the aws + * + * @param PermissionsAnalytics $val The aws + * + * @return PermissionsAnalyticsAggregation + */ + public function setAws($val) + { + $this->_propDict["aws"] = $val; + return $this; + } + + /** + * Gets the azure + * + * @return PermissionsAnalytics|null The azure + */ + public function getAzure() + { + if (array_key_exists("azure", $this->_propDict)) { + if (is_a($this->_propDict["azure"], "\Beta\Microsoft\Graph\Model\PermissionsAnalytics") || is_null($this->_propDict["azure"])) { + return $this->_propDict["azure"]; + } else { + $this->_propDict["azure"] = new PermissionsAnalytics($this->_propDict["azure"]); + return $this->_propDict["azure"]; + } + } + return null; + } + + /** + * Sets the azure + * + * @param PermissionsAnalytics $val The azure + * + * @return PermissionsAnalyticsAggregation + */ + public function setAzure($val) + { + $this->_propDict["azure"] = $val; + return $this; + } + + /** + * Gets the gcp + * + * @return PermissionsAnalytics|null The gcp + */ + public function getGcp() + { + if (array_key_exists("gcp", $this->_propDict)) { + if (is_a($this->_propDict["gcp"], "\Beta\Microsoft\Graph\Model\PermissionsAnalytics") || is_null($this->_propDict["gcp"])) { + return $this->_propDict["gcp"]; + } else { + $this->_propDict["gcp"] = new PermissionsAnalytics($this->_propDict["gcp"]); + return $this->_propDict["gcp"]; + } + } + return null; + } + + /** + * Sets the gcp + * + * @param PermissionsAnalytics $val The gcp + * + * @return PermissionsAnalyticsAggregation + */ + public function setGcp($val) + { + $this->_propDict["gcp"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/PermissionsCreepIndexDistribution.php b/src/Beta/Microsoft/Graph/Model/PermissionsCreepIndexDistribution.php new file mode 100644 index 00000000000..d06b725e732 --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/PermissionsCreepIndexDistribution.php @@ -0,0 +1,182 @@ +_propDict)) { + if (is_a($this->_propDict["createdDateTime"], "\DateTime") || is_null($this->_propDict["createdDateTime"])) { + return $this->_propDict["createdDateTime"]; + } else { + $this->_propDict["createdDateTime"] = new \DateTime($this->_propDict["createdDateTime"]); + return $this->_propDict["createdDateTime"]; + } + } + return null; + } + + /** + * Sets the createdDateTime + * + * @param \DateTime $val The createdDateTime + * + * @return PermissionsCreepIndexDistribution + */ + public function setCreatedDateTime($val) + { + $this->_propDict["createdDateTime"] = $val; + return $this; + } + + /** + * Gets the highRiskProfile + * + * @return RiskProfile|null The highRiskProfile + */ + public function getHighRiskProfile() + { + if (array_key_exists("highRiskProfile", $this->_propDict)) { + if (is_a($this->_propDict["highRiskProfile"], "\Beta\Microsoft\Graph\Model\RiskProfile") || is_null($this->_propDict["highRiskProfile"])) { + return $this->_propDict["highRiskProfile"]; + } else { + $this->_propDict["highRiskProfile"] = new RiskProfile($this->_propDict["highRiskProfile"]); + return $this->_propDict["highRiskProfile"]; + } + } + return null; + } + + /** + * Sets the highRiskProfile + * + * @param RiskProfile $val The highRiskProfile + * + * @return PermissionsCreepIndexDistribution + */ + public function setHighRiskProfile($val) + { + $this->_propDict["highRiskProfile"] = $val; + return $this; + } + + /** + * Gets the lowRiskProfile + * + * @return RiskProfile|null The lowRiskProfile + */ + public function getLowRiskProfile() + { + if (array_key_exists("lowRiskProfile", $this->_propDict)) { + if (is_a($this->_propDict["lowRiskProfile"], "\Beta\Microsoft\Graph\Model\RiskProfile") || is_null($this->_propDict["lowRiskProfile"])) { + return $this->_propDict["lowRiskProfile"]; + } else { + $this->_propDict["lowRiskProfile"] = new RiskProfile($this->_propDict["lowRiskProfile"]); + return $this->_propDict["lowRiskProfile"]; + } + } + return null; + } + + /** + * Sets the lowRiskProfile + * + * @param RiskProfile $val The lowRiskProfile + * + * @return PermissionsCreepIndexDistribution + */ + public function setLowRiskProfile($val) + { + $this->_propDict["lowRiskProfile"] = $val; + return $this; + } + + /** + * Gets the mediumRiskProfile + * + * @return RiskProfile|null The mediumRiskProfile + */ + public function getMediumRiskProfile() + { + if (array_key_exists("mediumRiskProfile", $this->_propDict)) { + if (is_a($this->_propDict["mediumRiskProfile"], "\Beta\Microsoft\Graph\Model\RiskProfile") || is_null($this->_propDict["mediumRiskProfile"])) { + return $this->_propDict["mediumRiskProfile"]; + } else { + $this->_propDict["mediumRiskProfile"] = new RiskProfile($this->_propDict["mediumRiskProfile"]); + return $this->_propDict["mediumRiskProfile"]; + } + } + return null; + } + + /** + * Sets the mediumRiskProfile + * + * @param RiskProfile $val The mediumRiskProfile + * + * @return PermissionsCreepIndexDistribution + */ + public function setMediumRiskProfile($val) + { + $this->_propDict["mediumRiskProfile"] = $val; + return $this; + } + + /** + * Gets the authorizationSystem + * + * @return AuthorizationSystem|null The authorizationSystem + */ + public function getAuthorizationSystem() + { + if (array_key_exists("authorizationSystem", $this->_propDict)) { + if (is_a($this->_propDict["authorizationSystem"], "\Beta\Microsoft\Graph\Model\AuthorizationSystem") || is_null($this->_propDict["authorizationSystem"])) { + return $this->_propDict["authorizationSystem"]; + } else { + $this->_propDict["authorizationSystem"] = new AuthorizationSystem($this->_propDict["authorizationSystem"]); + return $this->_propDict["authorizationSystem"]; + } + } + return null; + } + + /** + * Sets the authorizationSystem + * + * @param AuthorizationSystem $val The authorizationSystem + * + * @return PermissionsCreepIndexDistribution + */ + public function setAuthorizationSystem($val) + { + $this->_propDict["authorizationSystem"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/PlatformCredentialAuthenticationMethod.php b/src/Beta/Microsoft/Graph/Model/PlatformCredentialAuthenticationMethod.php new file mode 100644 index 00000000000..453809ed24b --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/PlatformCredentialAuthenticationMethod.php @@ -0,0 +1,178 @@ +_propDict)) { + if (is_a($this->_propDict["createdDateTime"], "\DateTime") || is_null($this->_propDict["createdDateTime"])) { + return $this->_propDict["createdDateTime"]; + } else { + $this->_propDict["createdDateTime"] = new \DateTime($this->_propDict["createdDateTime"]); + return $this->_propDict["createdDateTime"]; + } + } + return null; + } + + /** + * Sets the createdDateTime + * + * @param \DateTime $val The createdDateTime + * + * @return PlatformCredentialAuthenticationMethod + */ + public function setCreatedDateTime($val) + { + $this->_propDict["createdDateTime"] = $val; + return $this; + } + + /** + * Gets the displayName + * + * @return string|null The displayName + */ + public function getDisplayName() + { + if (array_key_exists("displayName", $this->_propDict)) { + return $this->_propDict["displayName"]; + } else { + return null; + } + } + + /** + * Sets the displayName + * + * @param string $val The displayName + * + * @return PlatformCredentialAuthenticationMethod + */ + public function setDisplayName($val) + { + $this->_propDict["displayName"] = $val; + return $this; + } + + /** + * Gets the keyStrength + * + * @return AuthenticationMethodKeyStrength|null The keyStrength + */ + public function getKeyStrength() + { + if (array_key_exists("keyStrength", $this->_propDict)) { + if (is_a($this->_propDict["keyStrength"], "\Beta\Microsoft\Graph\Model\AuthenticationMethodKeyStrength") || is_null($this->_propDict["keyStrength"])) { + return $this->_propDict["keyStrength"]; + } else { + $this->_propDict["keyStrength"] = new AuthenticationMethodKeyStrength($this->_propDict["keyStrength"]); + return $this->_propDict["keyStrength"]; + } + } + return null; + } + + /** + * Sets the keyStrength + * + * @param AuthenticationMethodKeyStrength $val The keyStrength + * + * @return PlatformCredentialAuthenticationMethod + */ + public function setKeyStrength($val) + { + $this->_propDict["keyStrength"] = $val; + return $this; + } + + /** + * Gets the platform + * + * @return AuthenticationMethodPlatform|null The platform + */ + public function getPlatform() + { + if (array_key_exists("platform", $this->_propDict)) { + if (is_a($this->_propDict["platform"], "\Beta\Microsoft\Graph\Model\AuthenticationMethodPlatform") || is_null($this->_propDict["platform"])) { + return $this->_propDict["platform"]; + } else { + $this->_propDict["platform"] = new AuthenticationMethodPlatform($this->_propDict["platform"]); + return $this->_propDict["platform"]; + } + } + return null; + } + + /** + * Sets the platform + * + * @param AuthenticationMethodPlatform $val The platform + * + * @return PlatformCredentialAuthenticationMethod + */ + public function setPlatform($val) + { + $this->_propDict["platform"] = $val; + return $this; + } + + /** + * Gets the device + * + * @return Device|null The device + */ + public function getDevice() + { + if (array_key_exists("device", $this->_propDict)) { + if (is_a($this->_propDict["device"], "\Beta\Microsoft\Graph\Model\Device") || is_null($this->_propDict["device"])) { + return $this->_propDict["device"]; + } else { + $this->_propDict["device"] = new Device($this->_propDict["device"]); + return $this->_propDict["device"]; + } + } + return null; + } + + /** + * Sets the device + * + * @param Device $val The device + * + * @return PlatformCredentialAuthenticationMethod + */ + public function setDevice($val) + { + $this->_propDict["device"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/PolicyRoot.php b/src/Beta/Microsoft/Graph/Model/PolicyRoot.php index 59b25040ebc..04d15dad625 100644 --- a/src/Beta/Microsoft/Graph/Model/PolicyRoot.php +++ b/src/Beta/Microsoft/Graph/Model/PolicyRoot.php @@ -57,7 +57,7 @@ public function getProperties() /** * Gets the authenticationMethodsPolicy - * The authentication methods and the users that are allowed to use them to sign in and perform multifactor authentication (MFA) in Azure Active Directory (Azure AD). + * The authentication methods and the users that are allowed to use them to sign in and perform multifactor authentication (MFA) in Microsoft Entra ID. * * @return AuthenticationMethodsPolicy|null The authenticationMethodsPolicy */ @@ -76,7 +76,7 @@ public function getAuthenticationMethodsPolicy() /** * Sets the authenticationMethodsPolicy - * The authentication methods and the users that are allowed to use them to sign in and perform multifactor authentication (MFA) in Azure Active Directory (Azure AD). + * The authentication methods and the users that are allowed to use them to sign in and perform multifactor authentication (MFA) in Microsoft Entra ID. * * @param AuthenticationMethodsPolicy $val The authenticationMethodsPolicy * @@ -91,7 +91,7 @@ public function setAuthenticationMethodsPolicy($val) /** * Gets the authenticationStrengthPolicies - * The authentication method combinations that are to be used in scenarios defined by Azure AD Conditional Access. + * The authentication method combinations that are to be used in scenarios defined by Microsoft Entra Conditional Access. * * @return array|null The authenticationStrengthPolicies */ @@ -106,7 +106,7 @@ public function getAuthenticationStrengthPolicies() /** * Sets the authenticationStrengthPolicies - * The authentication method combinations that are to be used in scenarios defined by Azure AD Conditional Access. + * The authentication method combinations that are to be used in scenarios defined by Microsoft Entra Conditional Access. * * @param AuthenticationStrengthPolicy[] $val The authenticationStrengthPolicies * @@ -278,7 +278,7 @@ public function setAppManagementPolicies($val) /** * Gets the authorizationPolicy - * The policy that controls Azure AD authorization settings. + * The policy that controls Microsoft Entra authorization settings. * * @return array|null The authorizationPolicy */ @@ -293,7 +293,7 @@ public function getAuthorizationPolicy() /** * Sets the authorizationPolicy - * The policy that controls Azure AD authorization settings. + * The policy that controls Microsoft Entra authorization settings. * * @param AuthorizationPolicy[] $val The authorizationPolicy * @@ -337,7 +337,7 @@ public function setClaimsMappingPolicies($val) /** * Gets the crossTenantAccessPolicy - * The custom rules that define an access scenario when interacting with external Azure AD tenants. + * The custom rules that define an access scenario when interacting with external Microsoft Entra tenants. * * @return CrossTenantAccessPolicy|null The crossTenantAccessPolicy */ @@ -356,7 +356,7 @@ public function getCrossTenantAccessPolicy() /** * Sets the crossTenantAccessPolicy - * The custom rules that define an access scenario when interacting with external Azure AD tenants. + * The custom rules that define an access scenario when interacting with external Microsoft Entra tenants. * * @param CrossTenantAccessPolicy $val The crossTenantAccessPolicy * @@ -403,7 +403,7 @@ public function setDefaultAppManagementPolicy($val) /** * Gets the externalIdentitiesPolicy - * Represents the tenant-wide policy that controls whether guests can leave an Azure AD tenant via self-service controls. + * Represents the tenant-wide policy that controls whether guests can leave a Microsoft Entra tenant via self-service controls. * * @return ExternalIdentitiesPolicy|null The externalIdentitiesPolicy */ @@ -422,7 +422,7 @@ public function getExternalIdentitiesPolicy() /** * Sets the externalIdentitiesPolicy - * Represents the tenant-wide policy that controls whether guests can leave an Azure AD tenant via self-service controls. + * Represents the tenant-wide policy that controls whether guests can leave a Microsoft Entra tenant via self-service controls. * * @param ExternalIdentitiesPolicy $val The externalIdentitiesPolicy * @@ -468,7 +468,7 @@ public function setFederatedTokenValidationPolicy($val) /** * Gets the homeRealmDiscoveryPolicies - * The policy to control Azure AD authentication behavior for federated users. + * The policy to control Microsoft Entra authentication behavior for federated users. * * @return array|null The homeRealmDiscoveryPolicies */ @@ -483,7 +483,7 @@ public function getHomeRealmDiscoveryPolicies() /** * Sets the homeRealmDiscoveryPolicies - * The policy to control Azure AD authentication behavior for federated users. + * The policy to control Microsoft Entra authentication behavior for federated users. * * @param HomeRealmDiscoveryPolicy[] $val The homeRealmDiscoveryPolicies * @@ -556,7 +556,7 @@ public function setServicePrincipalCreationPolicies($val) /** * Gets the tokenIssuancePolicies - * The policy that specifies the characteristics of SAML tokens issued by Azure AD. + * The policy that specifies the characteristics of SAML tokens issued by Microsoft Entra ID. * * @return array|null The tokenIssuancePolicies */ @@ -571,7 +571,7 @@ public function getTokenIssuancePolicies() /** * Sets the tokenIssuancePolicies - * The policy that specifies the characteristics of SAML tokens issued by Azure AD. + * The policy that specifies the characteristics of SAML tokens issued by Microsoft Entra ID. * * @param TokenIssuancePolicy[] $val The tokenIssuancePolicies * @@ -586,7 +586,7 @@ public function setTokenIssuancePolicies($val) /** * Gets the tokenLifetimePolicies - * The policy that controls the lifetime of a JWT access token, an ID token, or a SAML 1.1/2.0 token issued by Azure AD. + * The policy that controls the lifetime of a JWT access token, an ID token, or a SAML 1.1/2.0 token issued by Microsoft Entra ID. * * @return array|null The tokenLifetimePolicies */ @@ -601,7 +601,7 @@ public function getTokenLifetimePolicies() /** * Sets the tokenLifetimePolicies - * The policy that controls the lifetime of a JWT access token, an ID token, or a SAML 1.1/2.0 token issued by Azure AD. + * The policy that controls the lifetime of a JWT access token, an ID token, or a SAML 1.1/2.0 token issued by Microsoft Entra ID. * * @param TokenLifetimePolicy[] $val The tokenLifetimePolicies * diff --git a/src/Beta/Microsoft/Graph/Model/PrivateLinkDetails.php b/src/Beta/Microsoft/Graph/Model/PrivateLinkDetails.php index 5b7a53610e8..2b81ef2b5cc 100644 --- a/src/Beta/Microsoft/Graph/Model/PrivateLinkDetails.php +++ b/src/Beta/Microsoft/Graph/Model/PrivateLinkDetails.php @@ -53,7 +53,7 @@ public function setPolicyId($val) } /** * Gets the policyName - * The name of the Private Link policy in Azure AD. + * The name of the Private Link policy in Microsoft Entra ID. * * @return string|null The policyName */ @@ -68,7 +68,7 @@ public function getPolicyName() /** * Sets the policyName - * The name of the Private Link policy in Azure AD. + * The name of the Private Link policy in Microsoft Entra ID. * * @param string $val The value of the policyName * @@ -81,7 +81,7 @@ public function setPolicyName($val) } /** * Gets the policyTenantId - * The tenant identifier of the Azure AD tenant the Private Link policy belongs to. + * The tenant identifier of the Microsoft Entra tenant the Private Link policy belongs to. * * @return string|null The policyTenantId */ @@ -96,7 +96,7 @@ public function getPolicyTenantId() /** * Sets the policyTenantId - * The tenant identifier of the Azure AD tenant the Private Link policy belongs to. + * The tenant identifier of the Microsoft Entra tenant the Private Link policy belongs to. * * @param string $val The value of the policyTenantId * diff --git a/src/Beta/Microsoft/Graph/Model/PrivilegeEscalation.php b/src/Beta/Microsoft/Graph/Model/PrivilegeEscalation.php new file mode 100644 index 00000000000..71139beab30 --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/PrivilegeEscalation.php @@ -0,0 +1,137 @@ +_propDict)) { + return $this->_propDict["description"]; + } else { + return null; + } + } + + /** + * Sets the description + * + * @param string $val The description + * + * @return PrivilegeEscalation + */ + public function setDescription($val) + { + $this->_propDict["description"] = $val; + return $this; + } + + /** + * Gets the displayName + * + * @return string|null The displayName + */ + public function getDisplayName() + { + if (array_key_exists("displayName", $this->_propDict)) { + return $this->_propDict["displayName"]; + } else { + return null; + } + } + + /** + * Sets the displayName + * + * @param string $val The displayName + * + * @return PrivilegeEscalation + */ + public function setDisplayName($val) + { + $this->_propDict["displayName"] = $val; + return $this; + } + + + /** + * Gets the actions + * + * @return array|null The actions + */ + public function getActions() + { + if (array_key_exists("actions", $this->_propDict)) { + return $this->_propDict["actions"]; + } else { + return null; + } + } + + /** + * Sets the actions + * + * @param AuthorizationSystemTypeAction[] $val The actions + * + * @return PrivilegeEscalation + */ + public function setActions($val) + { + $this->_propDict["actions"] = $val; + return $this; + } + + + /** + * Gets the resources + * + * @return array|null The resources + */ + public function getResources() + { + if (array_key_exists("resources", $this->_propDict)) { + return $this->_propDict["resources"]; + } else { + return null; + } + } + + /** + * Sets the resources + * + * @param AuthorizationSystemResource[] $val The resources + * + * @return PrivilegeEscalation + */ + public function setResources($val) + { + $this->_propDict["resources"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/PrivilegeEscalationAwsResourceFinding.php b/src/Beta/Microsoft/Graph/Model/PrivilegeEscalationAwsResourceFinding.php new file mode 100644 index 00000000000..7b6d308808a --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/PrivilegeEscalationAwsResourceFinding.php @@ -0,0 +1,27 @@ +_propDict)) { + if (is_a($this->_propDict["identityDetails"], "\Beta\Microsoft\Graph\Model\IdentityDetails") || is_null($this->_propDict["identityDetails"])) { + return $this->_propDict["identityDetails"]; + } else { + $this->_propDict["identityDetails"] = new IdentityDetails($this->_propDict["identityDetails"]); + return $this->_propDict["identityDetails"]; + } + } + return null; + } + + /** + * Sets the identityDetails + * + * @param IdentityDetails $val The identityDetails + * + * @return PrivilegeEscalationFinding + */ + public function setIdentityDetails($val) + { + $this->_propDict["identityDetails"] = $val; + return $this; + } + + /** + * Gets the permissionsCreepIndex + * + * @return PermissionsCreepIndex|null The permissionsCreepIndex + */ + public function getPermissionsCreepIndex() + { + if (array_key_exists("permissionsCreepIndex", $this->_propDict)) { + if (is_a($this->_propDict["permissionsCreepIndex"], "\Beta\Microsoft\Graph\Model\PermissionsCreepIndex") || is_null($this->_propDict["permissionsCreepIndex"])) { + return $this->_propDict["permissionsCreepIndex"]; + } else { + $this->_propDict["permissionsCreepIndex"] = new PermissionsCreepIndex($this->_propDict["permissionsCreepIndex"]); + return $this->_propDict["permissionsCreepIndex"]; + } + } + return null; + } + + /** + * Sets the permissionsCreepIndex + * + * @param PermissionsCreepIndex $val The permissionsCreepIndex + * + * @return PrivilegeEscalationFinding + */ + public function setPermissionsCreepIndex($val) + { + $this->_propDict["permissionsCreepIndex"] = $val; + return $this; + } + + /** + * Gets the identity + * + * @return AuthorizationSystemIdentity|null The identity + */ + public function getIdentity() + { + if (array_key_exists("identity", $this->_propDict)) { + if (is_a($this->_propDict["identity"], "\Beta\Microsoft\Graph\Model\AuthorizationSystemIdentity") || is_null($this->_propDict["identity"])) { + return $this->_propDict["identity"]; + } else { + $this->_propDict["identity"] = new AuthorizationSystemIdentity($this->_propDict["identity"]); + return $this->_propDict["identity"]; + } + } + return null; + } + + /** + * Sets the identity + * + * @param AuthorizationSystemIdentity $val The identity + * + * @return PrivilegeEscalationFinding + */ + public function setIdentity($val) + { + $this->_propDict["identity"] = $val; + return $this; + } + + + /** + * Gets the privilegeEscalationDetails + * + * @return array|null The privilegeEscalationDetails + */ + public function getPrivilegeEscalationDetails() + { + if (array_key_exists("privilegeEscalationDetails", $this->_propDict)) { + return $this->_propDict["privilegeEscalationDetails"]; + } else { + return null; + } + } + + /** + * Sets the privilegeEscalationDetails + * + * @param PrivilegeEscalation[] $val The privilegeEscalationDetails + * + * @return PrivilegeEscalationFinding + */ + public function setPrivilegeEscalationDetails($val) + { + $this->_propDict["privilegeEscalationDetails"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/PrivilegeEscalationGcpServiceAccountFinding.php b/src/Beta/Microsoft/Graph/Model/PrivilegeEscalationGcpServiceAccountFinding.php new file mode 100644 index 00000000000..4f14fa6c4aa --- /dev/null +++ b/src/Beta/Microsoft/Graph/Model/PrivilegeEscalationGcpServiceAccountFinding.php @@ -0,0 +1,27 @@ +_propDict)) { + return $this->_propDict["accessibleCount"]; + } else { + return null; + } + } + + /** + * Sets the accessibleCount + * The total number of storage buckets that the EC2 instance can access using the role + * + * @param int $val The accessibleCount + * + * @return VirtualMachineWithAwsStorageBucketAccessFinding + */ + public function setAccessibleCount($val) + { + $this->_propDict["accessibleCount"] = intval($val); + return $this; + } + + /** + * Gets the bucketCount + * The total number of storage buckets in the authorization system that host the EC2 instance + * + * @return int|null The bucketCount + */ + public function getBucketCount() + { + if (array_key_exists("bucketCount", $this->_propDict)) { + return $this->_propDict["bucketCount"]; + } else { + return null; + } + } + + /** + * Sets the bucketCount + * The total number of storage buckets in the authorization system that host the EC2 instance + * + * @param int $val The bucketCount + * + * @return VirtualMachineWithAwsStorageBucketAccessFinding + */ + public function setBucketCount($val) + { + $this->_propDict["bucketCount"] = intval($val); + return $this; + } + + /** + * Gets the permissionsCreepIndex + * + * @return PermissionsCreepIndex|null The permissionsCreepIndex + */ + public function getPermissionsCreepIndex() + { + if (array_key_exists("permissionsCreepIndex", $this->_propDict)) { + if (is_a($this->_propDict["permissionsCreepIndex"], "\Beta\Microsoft\Graph\Model\PermissionsCreepIndex") || is_null($this->_propDict["permissionsCreepIndex"])) { + return $this->_propDict["permissionsCreepIndex"]; + } else { + $this->_propDict["permissionsCreepIndex"] = new PermissionsCreepIndex($this->_propDict["permissionsCreepIndex"]); + return $this->_propDict["permissionsCreepIndex"]; + } + } + return null; + } + + /** + * Sets the permissionsCreepIndex + * + * @param PermissionsCreepIndex $val The permissionsCreepIndex + * + * @return VirtualMachineWithAwsStorageBucketAccessFinding + */ + public function setPermissionsCreepIndex($val) + { + $this->_propDict["permissionsCreepIndex"] = $val; + return $this; + } + + /** + * Gets the ec2Instance + * + * @return AuthorizationSystemResource|null The ec2Instance + */ + public function getEc2Instance() + { + if (array_key_exists("ec2Instance", $this->_propDict)) { + if (is_a($this->_propDict["ec2Instance"], "\Beta\Microsoft\Graph\Model\AuthorizationSystemResource") || is_null($this->_propDict["ec2Instance"])) { + return $this->_propDict["ec2Instance"]; + } else { + $this->_propDict["ec2Instance"] = new AuthorizationSystemResource($this->_propDict["ec2Instance"]); + return $this->_propDict["ec2Instance"]; + } + } + return null; + } + + /** + * Sets the ec2Instance + * + * @param AuthorizationSystemResource $val The ec2Instance + * + * @return VirtualMachineWithAwsStorageBucketAccessFinding + */ + public function setEc2Instance($val) + { + $this->_propDict["ec2Instance"] = $val; + return $this; + } + + /** + * Gets the role + * + * @return AwsRole|null The role + */ + public function getRole() + { + if (array_key_exists("role", $this->_propDict)) { + if (is_a($this->_propDict["role"], "\Beta\Microsoft\Graph\Model\AwsRole") || is_null($this->_propDict["role"])) { + return $this->_propDict["role"]; + } else { + $this->_propDict["role"] = new AwsRole($this->_propDict["role"]); + return $this->_propDict["role"]; + } + } + return null; + } + + /** + * Sets the role + * + * @param AwsRole $val The role + * + * @return VirtualMachineWithAwsStorageBucketAccessFinding + */ + public function setRole($val) + { + $this->_propDict["role"] = $val; + return $this; + } + +} diff --git a/src/Beta/Microsoft/Graph/Model/WindowsAppXAppAssignmentSettings.php b/src/Beta/Microsoft/Graph/Model/WindowsAppXAppAssignmentSettings.php index 35c1517fa90..c0565626007 100644 --- a/src/Beta/Microsoft/Graph/Model/WindowsAppXAppAssignmentSettings.php +++ b/src/Beta/Microsoft/Graph/Model/WindowsAppXAppAssignmentSettings.php @@ -36,7 +36,7 @@ public function __construct($propDict = array()) /** * Gets the useDeviceContext - * Whether or not to use device execution context for Windows AppX mobile app. + * When TRUE, indicates that device execution context will be used for the AppX mobile app. When FALSE, indicates that user context will be used for the AppX mobile app. By default, this property is set to FALSE. Once this property has been set to TRUE it cannot be changed. * * @return bool|null The useDeviceContext */ @@ -51,7 +51,7 @@ public function getUseDeviceContext() /** * Sets the useDeviceContext - * Whether or not to use device execution context for Windows AppX mobile app. + * When TRUE, indicates that device execution context will be used for the AppX mobile app. When FALSE, indicates that user context will be used for the AppX mobile app. By default, this property is set to FALSE. Once this property has been set to TRUE it cannot be changed. * * @param bool $val The value of the useDeviceContext * diff --git a/src/Beta/Microsoft/Graph/Networkaccess/Model/EntitiesSummary.php b/src/Beta/Microsoft/Graph/Networkaccess/Model/EntitiesSummary.php index 04b48e26175..9e133b68fc1 100644 --- a/src/Beta/Microsoft/Graph/Networkaccess/Model/EntitiesSummary.php +++ b/src/Beta/Microsoft/Graph/Networkaccess/Model/EntitiesSummary.php @@ -86,7 +86,7 @@ public function setTrafficType($val) } /** * Gets the userCount - * Count of unique Azure Active Directory users that were seen. + * Count of unique Microsoft Entra users that were seen. * * @return int|null The userCount */ @@ -101,7 +101,7 @@ public function getUserCount() /** * Sets the userCount - * Count of unique Azure Active Directory users that were seen. + * Count of unique Microsoft Entra users that were seen. * * @param int $val The value of the userCount * diff --git a/src/Beta/Microsoft/Graph/SecurityNamespace/Model/Incident.php b/src/Beta/Microsoft/Graph/SecurityNamespace/Model/Incident.php index 4184788842d..fb83860e936 100644 --- a/src/Beta/Microsoft/Graph/SecurityNamespace/Model/Incident.php +++ b/src/Beta/Microsoft/Graph/SecurityNamespace/Model/Incident.php @@ -535,7 +535,7 @@ public function setSystemTags($val) /** * Gets the tenantId - * The Azure Active Directory tenant in which the alert was created. + * The Microsoft Entra tenant in which the alert was created. * * @return string|null The tenantId */ @@ -550,7 +550,7 @@ public function getTenantId() /** * Sets the tenantId - * The Azure Active Directory tenant in which the alert was created. + * The Microsoft Entra tenant in which the alert was created. * * @param string $val The tenantId * diff --git a/src/Beta/Microsoft/Graph/SecurityNamespace/Model/UserAccount.php b/src/Beta/Microsoft/Graph/SecurityNamespace/Model/UserAccount.php index 9d2dfd2695b..be043c47949 100644 --- a/src/Beta/Microsoft/Graph/SecurityNamespace/Model/UserAccount.php +++ b/src/Beta/Microsoft/Graph/SecurityNamespace/Model/UserAccount.php @@ -53,7 +53,7 @@ public function setAccountName($val) } /** * Gets the azureAdUserId - * The user object identifier in Azure Active Directory (Azure AD). + * The user object identifier in Microsoft Entra ID. * * @return string|null The azureAdUserId */ @@ -68,7 +68,7 @@ public function getAzureAdUserId() /** * Sets the azureAdUserId - * The user object identifier in Azure Active Directory (Azure AD). + * The user object identifier in Microsoft Entra ID. * * @param string $val The value of the azureAdUserId * @@ -81,7 +81,7 @@ public function setAzureAdUserId($val) } /** * Gets the displayName - * The user display name in Azure AD. + * The user display name in Microsoft Entra ID. * * @return string|null The displayName */ @@ -96,7 +96,7 @@ public function getDisplayName() /** * Sets the displayName - * The user display name in Azure AD. + * The user display name in Microsoft Entra ID. * * @param string $val The value of the displayName * @@ -137,7 +137,7 @@ public function setDomainName($val) } /** * Gets the userPrincipalName - * The user principal name of the account in Azure AD. + * The user principal name of the account in Microsoft Entra ID. * * @return string|null The userPrincipalName */ @@ -152,7 +152,7 @@ public function getUserPrincipalName() /** * Sets the userPrincipalName - * The user principal name of the account in Azure AD. + * The user principal name of the account in Microsoft Entra ID. * * @param string $val The value of the userPrincipalName *