From 10851dee4ba78688afdd6c3eda8db6a5af9a7a33 Mon Sep 17 00:00:00 2001 From: Microsoft Graph DevX Tooling Date: Tue, 2 May 2023 10:11:21 +0000 Subject: [PATCH] Update generated files with build 113700 --- ...cessPackageAssignmentRequestorSettings.php | 28 +++---- ...TenantAccessPolicyConfigurationDefault.php | 31 ++++++++ ...TenantAccessPolicyConfigurationPartner.php | 31 ++++++++ .../InboundOutboundPolicyConfiguration.php | 78 +++++++++++++++++++ src/Model/SignInActivity.php | 8 +- 5 files changed, 158 insertions(+), 18 deletions(-) create mode 100644 src/Model/InboundOutboundPolicyConfiguration.php diff --git a/src/Model/AccessPackageAssignmentRequestorSettings.php b/src/Model/AccessPackageAssignmentRequestorSettings.php index 54d251aa5d3..b2488ef9e16 100644 --- a/src/Model/AccessPackageAssignmentRequestorSettings.php +++ b/src/Model/AccessPackageAssignmentRequestorSettings.php @@ -25,7 +25,7 @@ class AccessPackageAssignmentRequestorSettings extends Entity { /** * Gets the allowCustomAssignmentSchedule - * If false, the requestor is not permitted to include a schedule in their request. + * False indicates that the requestor is not permitted to include a schedule in their request. * * @return bool|null The allowCustomAssignmentSchedule */ @@ -40,7 +40,7 @@ public function getAllowCustomAssignmentSchedule() /** * Sets the allowCustomAssignmentSchedule - * If false, the requestor is not permitted to include a schedule in their request. + * False indicates that the requestor is not permitted to include a schedule in their request. * * @param bool $val The value of the allowCustomAssignmentSchedule * @@ -53,7 +53,7 @@ public function setAllowCustomAssignmentSchedule($val) } /** * Gets the enableOnBehalfRequestorsToAddAccess - * If true, allows on-behalf-of requestors to create a request to add access for another principal. + * True allows on-behalf-of requestors to create a request to add access for another principal. * * @return bool|null The enableOnBehalfRequestorsToAddAccess */ @@ -68,7 +68,7 @@ public function getEnableOnBehalfRequestorsToAddAccess() /** * Sets the enableOnBehalfRequestorsToAddAccess - * If true, allows on-behalf-of requestors to create a request to add access for another principal. + * True allows on-behalf-of requestors to create a request to add access for another principal. * * @param bool $val The value of the enableOnBehalfRequestorsToAddAccess * @@ -81,7 +81,7 @@ public function setEnableOnBehalfRequestorsToAddAccess($val) } /** * Gets the enableOnBehalfRequestorsToRemoveAccess - * If true, allows on-behalf-of requestors to create a request to remove access for another principal. + * True allows on-behalf-of requestors to create a request to remove access for another principal. * * @return bool|null The enableOnBehalfRequestorsToRemoveAccess */ @@ -96,7 +96,7 @@ public function getEnableOnBehalfRequestorsToRemoveAccess() /** * Sets the enableOnBehalfRequestorsToRemoveAccess - * If true, allows on-behalf-of requestors to create a request to remove access for another principal. + * True allows on-behalf-of requestors to create a request to remove access for another principal. * * @param bool $val The value of the enableOnBehalfRequestorsToRemoveAccess * @@ -109,7 +109,7 @@ public function setEnableOnBehalfRequestorsToRemoveAccess($val) } /** * Gets the enableOnBehalfRequestorsToUpdateAccess - * If true, allows on-behalf-of requestors to create a request to update access for another principal. + * True allows on-behalf-of requestors to create a request to update access for another principal. * * @return bool|null The enableOnBehalfRequestorsToUpdateAccess */ @@ -124,7 +124,7 @@ public function getEnableOnBehalfRequestorsToUpdateAccess() /** * Sets the enableOnBehalfRequestorsToUpdateAccess - * If true, allows on-behalf-of requestors to create a request to update access for another principal. + * True allows on-behalf-of requestors to create a request to update access for another principal. * * @param bool $val The value of the enableOnBehalfRequestorsToUpdateAccess * @@ -137,7 +137,7 @@ public function setEnableOnBehalfRequestorsToUpdateAccess($val) } /** * Gets the enableTargetsToSelfAddAccess - * If true, allows requestors to create a request to add access for themselves. + * True allows requestors to create a request to add access for themselves. * * @return bool|null The enableTargetsToSelfAddAccess */ @@ -152,7 +152,7 @@ public function getEnableTargetsToSelfAddAccess() /** * Sets the enableTargetsToSelfAddAccess - * If true, allows requestors to create a request to add access for themselves. + * True allows requestors to create a request to add access for themselves. * * @param bool $val The value of the enableTargetsToSelfAddAccess * @@ -165,7 +165,7 @@ public function setEnableTargetsToSelfAddAccess($val) } /** * Gets the enableTargetsToSelfRemoveAccess - * If true, allows requestors to create a request to remove their access. + * True allows requestors to create a request to remove their access. * * @return bool|null The enableTargetsToSelfRemoveAccess */ @@ -180,7 +180,7 @@ public function getEnableTargetsToSelfRemoveAccess() /** * Sets the enableTargetsToSelfRemoveAccess - * If true, allows requestors to create a request to remove their access. + * True allows requestors to create a request to remove their access. * * @param bool $val The value of the enableTargetsToSelfRemoveAccess * @@ -193,7 +193,7 @@ public function setEnableTargetsToSelfRemoveAccess($val) } /** * Gets the enableTargetsToSelfUpdateAccess - * If true, allows requestors to create a request to update their access. + * True allows requestors to create a request to update their access. * * @return bool|null The enableTargetsToSelfUpdateAccess */ @@ -208,7 +208,7 @@ public function getEnableTargetsToSelfUpdateAccess() /** * Sets the enableTargetsToSelfUpdateAccess - * If true, allows requestors to create a request to update their access. + * True allows requestors to create a request to update their access. * * @param bool $val The value of the enableTargetsToSelfUpdateAccess * diff --git a/src/Model/CrossTenantAccessPolicyConfigurationDefault.php b/src/Model/CrossTenantAccessPolicyConfigurationDefault.php index f721667c1ef..13a0d837b20 100644 --- a/src/Model/CrossTenantAccessPolicyConfigurationDefault.php +++ b/src/Model/CrossTenantAccessPolicyConfigurationDefault.php @@ -24,6 +24,37 @@ */ class CrossTenantAccessPolicyConfigurationDefault extends Entity { + /** + * Gets the automaticUserConsentSettings + * + * @return InboundOutboundPolicyConfiguration|null The automaticUserConsentSettings + */ + public function getAutomaticUserConsentSettings() + { + if (array_key_exists("automaticUserConsentSettings", $this->_propDict)) { + if (is_a($this->_propDict["automaticUserConsentSettings"], "\Microsoft\Graph\Model\InboundOutboundPolicyConfiguration") || is_null($this->_propDict["automaticUserConsentSettings"])) { + return $this->_propDict["automaticUserConsentSettings"]; + } else { + $this->_propDict["automaticUserConsentSettings"] = new InboundOutboundPolicyConfiguration($this->_propDict["automaticUserConsentSettings"]); + return $this->_propDict["automaticUserConsentSettings"]; + } + } + return null; + } + + /** + * Sets the automaticUserConsentSettings + * + * @param InboundOutboundPolicyConfiguration $val The automaticUserConsentSettings + * + * @return CrossTenantAccessPolicyConfigurationDefault + */ + public function setAutomaticUserConsentSettings($val) + { + $this->_propDict["automaticUserConsentSettings"] = $val; + return $this; + } + /** * Gets the b2bCollaborationInbound * Defines your default configuration for users from other organizations accessing your resources via Azure AD B2B collaboration. diff --git a/src/Model/CrossTenantAccessPolicyConfigurationPartner.php b/src/Model/CrossTenantAccessPolicyConfigurationPartner.php index f7c740d9c96..89a7c4f8016 100644 --- a/src/Model/CrossTenantAccessPolicyConfigurationPartner.php +++ b/src/Model/CrossTenantAccessPolicyConfigurationPartner.php @@ -55,6 +55,37 @@ public function getProperties() return $this->_propDict; } + /** + * Gets the automaticUserConsentSettings + * + * @return InboundOutboundPolicyConfiguration|null The automaticUserConsentSettings + */ + public function getAutomaticUserConsentSettings() + { + if (array_key_exists("automaticUserConsentSettings", $this->_propDict)) { + if (is_a($this->_propDict["automaticUserConsentSettings"], "\Microsoft\Graph\Model\InboundOutboundPolicyConfiguration") || is_null($this->_propDict["automaticUserConsentSettings"])) { + return $this->_propDict["automaticUserConsentSettings"]; + } else { + $this->_propDict["automaticUserConsentSettings"] = new InboundOutboundPolicyConfiguration($this->_propDict["automaticUserConsentSettings"]); + return $this->_propDict["automaticUserConsentSettings"]; + } + } + return null; + } + + /** + * Sets the automaticUserConsentSettings + * + * @param InboundOutboundPolicyConfiguration $val The automaticUserConsentSettings + * + * @return CrossTenantAccessPolicyConfigurationPartner + */ + public function setAutomaticUserConsentSettings($val) + { + $this->_propDict["automaticUserConsentSettings"] = $val; + return $this; + } + /** * Gets the b2bCollaborationInbound * Defines your partner-specific configuration for users from other organizations accessing your resources via Azure AD B2B collaboration. diff --git a/src/Model/InboundOutboundPolicyConfiguration.php b/src/Model/InboundOutboundPolicyConfiguration.php new file mode 100644 index 00000000000..4621b559bff --- /dev/null +++ b/src/Model/InboundOutboundPolicyConfiguration.php @@ -0,0 +1,78 @@ +_propDict)) { + return $this->_propDict["inboundAllowed"]; + } else { + return null; + } + } + + /** + * Sets the inboundAllowed + * + * @param bool $val The value of the inboundAllowed + * + * @return InboundOutboundPolicyConfiguration + */ + public function setInboundAllowed($val) + { + $this->_propDict["inboundAllowed"] = $val; + return $this; + } + /** + * Gets the outboundAllowed + * + * @return bool|null The outboundAllowed + */ + public function getOutboundAllowed() + { + if (array_key_exists("outboundAllowed", $this->_propDict)) { + return $this->_propDict["outboundAllowed"]; + } else { + return null; + } + } + + /** + * Sets the outboundAllowed + * + * @param bool $val The value of the outboundAllowed + * + * @return InboundOutboundPolicyConfiguration + */ + public function setOutboundAllowed($val) + { + $this->_propDict["outboundAllowed"] = $val; + return $this; + } +} diff --git a/src/Model/SignInActivity.php b/src/Model/SignInActivity.php index f87d9bf0839..49367d4e1f9 100644 --- a/src/Model/SignInActivity.php +++ b/src/Model/SignInActivity.php @@ -26,7 +26,7 @@ class SignInActivity extends Entity /** * Gets the lastNonInteractiveSignInDateTime - * The last non-interactive sign-in date for a specific user. You can use this field to calculate the last time a client signed in to the directory on behalf of a user. Because some users may use clients to access tenant resources rather than signing into your tenant directly, you can use the non-interactive sign-in date to along with lastSignInDateTime to identify inactive users. The timestamp represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is: '2014-01-01T00:00:00Z'. Azure AD maintains non-interactive sign-ins going back to May 2020. For more information about using the value of this property, see Manage inactive user accounts in Azure AD. + * The last non-interactive sign-in date for a specific user. You can use this field to calculate the last time a client attempted to sign into the directory on behalf of a user. Because some users may use clients to access tenant resources rather than signing into your tenant directly, you can use the non-interactive sign-in date to along with lastSignInDateTime to identify inactive users. The timestamp represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is: '2014-01-01T00:00:00Z'. Azure AD maintains non-interactive sign-ins going back to May 2020. For more information about using the value of this property, see Manage inactive user accounts in Azure AD. * * @return \DateTime|null The lastNonInteractiveSignInDateTime */ @@ -45,7 +45,7 @@ public function getLastNonInteractiveSignInDateTime() /** * Sets the lastNonInteractiveSignInDateTime - * The last non-interactive sign-in date for a specific user. You can use this field to calculate the last time a client signed in to the directory on behalf of a user. Because some users may use clients to access tenant resources rather than signing into your tenant directly, you can use the non-interactive sign-in date to along with lastSignInDateTime to identify inactive users. The timestamp represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is: '2014-01-01T00:00:00Z'. Azure AD maintains non-interactive sign-ins going back to May 2020. For more information about using the value of this property, see Manage inactive user accounts in Azure AD. + * The last non-interactive sign-in date for a specific user. You can use this field to calculate the last time a client attempted to sign into the directory on behalf of a user. Because some users may use clients to access tenant resources rather than signing into your tenant directly, you can use the non-interactive sign-in date to along with lastSignInDateTime to identify inactive users. The timestamp represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is: '2014-01-01T00:00:00Z'. Azure AD maintains non-interactive sign-ins going back to May 2020. For more information about using the value of this property, see Manage inactive user accounts in Azure AD. * * @param \DateTime $val The value to assign to the lastNonInteractiveSignInDateTime * @@ -87,7 +87,7 @@ public function setLastNonInteractiveSignInRequestId($val) /** * Gets the lastSignInDateTime - * The last interactive sign-in date and time for a specific user. You can use this field to calculate the last time a user signed in to the directory with an interactive authentication method. This field can be used to build reports, such as inactive users. The timestamp represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is: '2014-01-01T00:00:00Z'. Azure AD maintains interactive sign-ins going back to April 2020. For more information about using the value of this property, see Manage inactive user accounts in Azure AD. + * The last interactive sign-in date and time for a specific user. You can use this field to calculate the last time a user attempted to sign into the directory with an interactive authentication method. This field can be used to build reports, such as inactive users. The timestamp represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is: '2014-01-01T00:00:00Z'. Azure AD maintains interactive sign-ins going back to April 2020. For more information about using the value of this property, see Manage inactive user accounts in Azure AD. * * @return \DateTime|null The lastSignInDateTime */ @@ -106,7 +106,7 @@ public function getLastSignInDateTime() /** * Sets the lastSignInDateTime - * The last interactive sign-in date and time for a specific user. You can use this field to calculate the last time a user signed in to the directory with an interactive authentication method. This field can be used to build reports, such as inactive users. The timestamp represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is: '2014-01-01T00:00:00Z'. Azure AD maintains interactive sign-ins going back to April 2020. For more information about using the value of this property, see Manage inactive user accounts in Azure AD. + * The last interactive sign-in date and time for a specific user. You can use this field to calculate the last time a user attempted to sign into the directory with an interactive authentication method. This field can be used to build reports, such as inactive users. The timestamp represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is: '2014-01-01T00:00:00Z'. Azure AD maintains interactive sign-ins going back to April 2020. For more information about using the value of this property, see Manage inactive user accounts in Azure AD. * * @param \DateTime $val The value to assign to the lastSignInDateTime *