diff --git a/CHANGELOG.md b/CHANGELOG.md index 905f6da6de..8f42d99245 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -16,6 +16,10 @@ * [BREAKING CHANGE] Added `IsSingleInstance` parameter. * AADTenantAppManagementPolicy * [BREAKING CHANGE] Added `IsSingleInstance` and removed `Ensure` parameter. +* EXOActiveSyncMailboxPolicy + * Changed cmdlets from `*-ActiveSyncMailboxPolicy` to `*-MobileDeviceMailboxPolicy`. + * [BREAKING CHANGE] Updated property names to match newly returned values and parameters. + Added new properties `AllowGooglePushNotifications` and `AllowMicrosoftPushNotifications`. * EXODkimSigningConfig * Fixed an issue to create new DkimSigningConfig FIXES [#6982](https://github.com/microsoft/Microsoft365DSC/issues/6982) diff --git a/Examples/Resources/EXOActiveSyncMailboxPolicy/1-Create.ps1 b/Examples/Resources/EXOActiveSyncMailboxPolicy/1-Create.ps1 index d74747c848..5bdb3dee72 100644 --- a/Examples/Resources/EXOActiveSyncMailboxPolicy/1-Create.ps1 +++ b/Examples/Resources/EXOActiveSyncMailboxPolicy/1-Create.ps1 @@ -31,14 +31,16 @@ Configuration Example AllowConsumerEmail = $True; AllowDesktopSync = $True; AllowExternalDeviceManagement = $False; + AllowGooglePushNotifications = $True; AllowHTMLEmail = $True; AllowInternetSharing = $True; AllowIrDA = $True; + AllowMicrosoftPushNotifications = $True; AllowMobileOTAUpdate = $True; AllowNonProvisionableDevices = $True; AllowPOPIMAPEmail = $True; AllowRemoteDesktop = $True; - AllowSimpleDevicePassword = $True; + AllowSimplePassword = $True; AllowSMIMEEncryptionAlgorithmNegotiation = "AllowAnyAlgorithmNegotiation"; AllowSMIMESoftCerts = $True; AllowStorageCard = $True; @@ -46,13 +48,13 @@ Configuration Example AllowUnsignedApplications = $True; AllowUnsignedInstallationPackages = $True; AllowWiFi = $True; - AlphanumericDevicePasswordRequired = $False; + AlphanumericPasswordRequired = $False; ApprovedApplicationList = @(); AttachmentsEnabled = $True; DeviceEncryptionEnabled = $False; - DevicePasswordEnabled = $False; - DevicePasswordExpiration = "Unlimited"; - DevicePasswordHistory = 0; + PasswordEnabled = $False; + PasswordExpiration = "Unlimited"; + PasswordHistory = 0; DevicePolicyRefreshInterval = "Unlimited"; Identity = "Test"; IrmEnabled = $True; @@ -60,13 +62,13 @@ Configuration Example IsDefaultPolicy = $True; MaxAttachmentSize = "Unlimited"; MaxCalendarAgeFilter = "All"; - MaxDevicePasswordFailedAttempts = "Unlimited"; + MaxPasswordFailedAttempts = "Unlimited"; MaxEmailAgeFilter = "All"; MaxEmailBodyTruncationSize = "Unlimited"; MaxEmailHTMLBodyTruncationSize = "Unlimited"; - MaxInactivityTimeDeviceLock = "Unlimited"; - MinDevicePasswordComplexCharacters = 1; - MinDevicePasswordLength = 1; + MaxInactivityTimeLock = "Unlimited"; + MinPasswordComplexCharacters = 1; + MinPasswordLength = 1; Name = "Test"; PasswordRecoveryEnabled = $False; RequireDeviceEncryption = $False; diff --git a/Examples/Resources/EXOActiveSyncMailboxPolicy/2-Update.ps1 b/Examples/Resources/EXOActiveSyncMailboxPolicy/2-Update.ps1 index 130f3fd6d7..b230830f68 100644 --- a/Examples/Resources/EXOActiveSyncMailboxPolicy/2-Update.ps1 +++ b/Examples/Resources/EXOActiveSyncMailboxPolicy/2-Update.ps1 @@ -27,18 +27,20 @@ Configuration Example AllowApplePushNotifications = $True; AllowBluetooth = "Allow"; AllowBrowser = $True; - AllowCamera = $False; #drift + AllowCamera = $False; # Drift AllowConsumerEmail = $True; AllowDesktopSync = $True; AllowExternalDeviceManagement = $False; + AllowGooglePushNotifications = $True; AllowHTMLEmail = $True; AllowInternetSharing = $True; AllowIrDA = $True; + AllowMicrosoftPushNotifications = $True; AllowMobileOTAUpdate = $True; AllowNonProvisionableDevices = $True; AllowPOPIMAPEmail = $True; AllowRemoteDesktop = $True; - AllowSimpleDevicePassword = $True; + AllowSimplePassword = $True; AllowSMIMEEncryptionAlgorithmNegotiation = "AllowAnyAlgorithmNegotiation"; AllowSMIMESoftCerts = $True; AllowStorageCard = $True; @@ -46,13 +48,13 @@ Configuration Example AllowUnsignedApplications = $True; AllowUnsignedInstallationPackages = $True; AllowWiFi = $True; - AlphanumericDevicePasswordRequired = $False; + AlphanumericPasswordRequired = $False; ApprovedApplicationList = @(); AttachmentsEnabled = $True; DeviceEncryptionEnabled = $False; - DevicePasswordEnabled = $False; - DevicePasswordExpiration = "Unlimited"; - DevicePasswordHistory = 0; + PasswordEnabled = $False; + PasswordExpiration = "Unlimited"; + PasswordHistory = 0; DevicePolicyRefreshInterval = "Unlimited"; Identity = "Test"; IrmEnabled = $True; @@ -60,13 +62,13 @@ Configuration Example IsDefaultPolicy = $True; MaxAttachmentSize = "Unlimited"; MaxCalendarAgeFilter = "All"; - MaxDevicePasswordFailedAttempts = "Unlimited"; + MaxPasswordFailedAttempts = "Unlimited"; MaxEmailAgeFilter = "All"; MaxEmailBodyTruncationSize = "Unlimited"; MaxEmailHTMLBodyTruncationSize = "Unlimited"; - MaxInactivityTimeDeviceLock = "Unlimited"; - MinDevicePasswordComplexCharacters = 1; - MinDevicePasswordLength = 1; + MaxInactivityTimeLock = "Unlimited"; + MinPasswordComplexCharacters = 1; + MinPasswordLength = 1; Name = "Test"; PasswordRecoveryEnabled = $False; RequireDeviceEncryption = $False; diff --git a/Examples/Resources/EXOActiveSyncMailboxPolicy/3-Remove.ps1 b/Examples/Resources/EXOActiveSyncMailboxPolicy/3-Remove.ps1 index 585f9b6658..d5cc2da2d6 100644 --- a/Examples/Resources/EXOActiveSyncMailboxPolicy/3-Remove.ps1 +++ b/Examples/Resources/EXOActiveSyncMailboxPolicy/3-Remove.ps1 @@ -31,14 +31,16 @@ Configuration Example AllowConsumerEmail = $True; AllowDesktopSync = $True; AllowExternalDeviceManagement = $False; + AllowGooglePushNotifications = $True; AllowHTMLEmail = $True; AllowInternetSharing = $True; AllowIrDA = $True; + AllowMicrosoftPushNotifications = $True; AllowMobileOTAUpdate = $True; AllowNonProvisionableDevices = $True; AllowPOPIMAPEmail = $True; AllowRemoteDesktop = $True; - AllowSimpleDevicePassword = $True; + AllowSimplePassword = $True; AllowSMIMEEncryptionAlgorithmNegotiation = "AllowAnyAlgorithmNegotiation"; AllowSMIMESoftCerts = $True; AllowStorageCard = $True; @@ -46,13 +48,13 @@ Configuration Example AllowUnsignedApplications = $True; AllowUnsignedInstallationPackages = $True; AllowWiFi = $True; - AlphanumericDevicePasswordRequired = $False; + AlphanumericPasswordRequired = $False; ApprovedApplicationList = @(); AttachmentsEnabled = $True; DeviceEncryptionEnabled = $False; - DevicePasswordEnabled = $False; - DevicePasswordExpiration = "Unlimited"; - DevicePasswordHistory = 0; + PasswordEnabled = $False; + PasswordExpiration = "Unlimited"; + PasswordHistory = 0; DevicePolicyRefreshInterval = "Unlimited"; Identity = "Test"; IrmEnabled = $True; @@ -60,13 +62,13 @@ Configuration Example IsDefaultPolicy = $True; MaxAttachmentSize = "Unlimited"; MaxCalendarAgeFilter = "All"; - MaxDevicePasswordFailedAttempts = "Unlimited"; + MaxPasswordFailedAttempts = "Unlimited"; MaxEmailAgeFilter = "All"; MaxEmailBodyTruncationSize = "Unlimited"; MaxEmailHTMLBodyTruncationSize = "Unlimited"; - MaxInactivityTimeDeviceLock = "Unlimited"; - MinDevicePasswordComplexCharacters = 1; - MinDevicePasswordLength = 1; + MaxInactivityTimeLock = "Unlimited"; + MinPasswordComplexCharacters = 1; + MinPasswordLength = 1; Name = "Test"; PasswordRecoveryEnabled = $False; RequireDeviceEncryption = $False; diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_EXOActiveSyncMailboxPolicy/MSFT_EXOActiveSyncMailboxPolicy.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_EXOActiveSyncMailboxPolicy/MSFT_EXOActiveSyncMailboxPolicy.psm1 index 03e69c5d00..9d7ad8e663 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_EXOActiveSyncMailboxPolicy/MSFT_EXOActiveSyncMailboxPolicy.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_EXOActiveSyncMailboxPolicy/MSFT_EXOActiveSyncMailboxPolicy.psm1 @@ -39,6 +39,10 @@ function Get-TargetResource [System.Boolean] $AllowExternalDeviceManagement, + [Parameter()] + [System.Boolean] + $AllowGooglePushNotifications, + [Parameter()] [System.Boolean] $AllowHTMLEmail, @@ -51,6 +55,10 @@ function Get-TargetResource [System.Boolean] $AllowIrDA, + [Parameter()] + [System.Boolean] + $AllowMicrosoftPushNotifications, + [Parameter()] [System.Boolean] $AllowMobileOTAUpdate, @@ -69,7 +77,7 @@ function Get-TargetResource [Parameter()] [System.Boolean] - $AllowSimpleDevicePassword, + $AllowSimplePassword, [Parameter()] [System.String] @@ -101,7 +109,7 @@ function Get-TargetResource [Parameter()] [System.Boolean] - $AlphanumericDevicePasswordRequired, + $AlphanumericPasswordRequired, [Parameter()] [System.String[]] @@ -117,15 +125,15 @@ function Get-TargetResource [Parameter()] [System.Boolean] - $DevicePasswordEnabled, + $PasswordEnabled, [Parameter()] [System.String] - $DevicePasswordExpiration, + $PasswordExpiration, [Parameter()] [System.Int32] - $DevicePasswordHistory, + $PasswordHistory, [Parameter()] [System.String] @@ -154,7 +162,7 @@ function Get-TargetResource [Parameter()] [System.String] - $MaxDevicePasswordFailedAttempts, + $MaxPasswordFailedAttempts, [Parameter()] [System.String] @@ -171,15 +179,15 @@ function Get-TargetResource [Parameter()] [System.String] - $MaxInactivityTimeDeviceLock, + $MaxInactivityTimeLock, [Parameter()] [System.Int32] - $MinDevicePasswordComplexCharacters, + $MinPasswordComplexCharacters, [Parameter()] [System.Int32] - $MinDevicePasswordLength, + $MinPasswordLength, [Parameter()] [System.Boolean] @@ -281,7 +289,7 @@ function Get-TargetResource $nullResult = $PSBoundParameters $nullResult.Ensure = 'Absent' - $instance = Get-ActiveSyncMailboxPolicy -Identity $Identity -ErrorAction SilentlyContinue + $instance = Get-MobileDeviceMailboxPolicy -Identity $Identity -ErrorAction SilentlyContinue if ($null -eq $instance) { @@ -306,14 +314,16 @@ function Get-TargetResource AllowConsumerEmail = [System.Boolean]$instance.AllowConsumerEmail AllowDesktopSync = [System.Boolean]$instance.AllowDesktopSync AllowExternalDeviceManagement = [System.Boolean]$instance.AllowExternalDeviceManagement + AllowGooglePushNotifications = [System.Boolean]$instance.AllowGooglePushNotifications AllowHTMLEmail = [System.Boolean]$instance.AllowHTMLEmail AllowInternetSharing = [System.Boolean]$instance.AllowInternetSharing AllowIrDA = [System.Boolean]$instance.AllowIrDA + AllowMicrosoftPushNotifications = [System.Boolean]$instance.AllowMicrosoftPushNotifications AllowMobileOTAUpdate = [System.Boolean]$instance.AllowMobileOTAUpdate AllowNonProvisionableDevices = [System.Boolean]$instance.AllowNonProvisionableDevices AllowPOPIMAPEmail = [System.Boolean]$instance.AllowPOPIMAPEmail AllowRemoteDesktop = [System.Boolean]$instance.AllowRemoteDesktop - AllowSimpleDevicePassword = [System.Boolean]$instance.AllowSimpleDevicePassword + AllowSimplePassword = [System.Boolean]$instance.AllowSimplePassword AllowSMIMEEncryptionAlgorithmNegotiation = [System.String]$instance.AllowSMIMEEncryptionAlgorithmNegotiation AllowSMIMESoftCerts = [System.Boolean]$instance.AllowSMIMESoftCerts AllowStorageCard = [System.Boolean]$instance.AllowStorageCard @@ -321,26 +331,26 @@ function Get-TargetResource AllowUnsignedApplications = [System.Boolean]$instance.AllowUnsignedApplications AllowUnsignedInstallationPackages = [System.Boolean]$instance.AllowUnsignedInstallationPackages AllowWiFi = [System.Boolean]$instance.AllowWiFi - AlphanumericDevicePasswordRequired = [System.Boolean]$instance.AlphanumericDevicePasswordRequired + AlphanumericPasswordRequired = [System.Boolean]$instance.AlphanumericPasswordRequired ApprovedApplicationList = [System.String[]]$instance.ApprovedApplicationList AttachmentsEnabled = [System.Boolean]$instance.AttachmentsEnabled DeviceEncryptionEnabled = [System.Boolean]$instance.DeviceEncryptionEnabled - DevicePasswordEnabled = [System.Boolean]$instance.DevicePasswordEnabled - DevicePasswordExpiration = [System.String]$instance.DevicePasswordExpiration - DevicePasswordHistory = [System.Int32]$instance.DevicePasswordHistory + PasswordEnabled = [System.Boolean]$instance.PasswordEnabled + PasswordExpiration = [System.String]$instance.PasswordExpiration + PasswordHistory = [System.Int32]$instance.PasswordHistory DevicePolicyRefreshInterval = [System.String]$instance.DevicePolicyRefreshInterval IrmEnabled = [System.Boolean]$instance.IrmEnabled IsDefault = [System.Boolean]$instance.IsDefault IsDefaultPolicy = [System.Boolean]$instance.IsDefaultPolicy MaxAttachmentSize = [System.String]$instance.MaxAttachmentSize MaxCalendarAgeFilter = [System.String]$instance.MaxCalendarAgeFilter - MaxDevicePasswordFailedAttempts = [System.String]$instance.MaxDevicePasswordFailedAttempts + MaxPasswordFailedAttempts = [System.String]$instance.MaxPasswordFailedAttempts MaxEmailAgeFilter = [System.String]$instance.MaxEmailAgeFilter MaxEmailBodyTruncationSize = [System.String]$instance.MaxEmailBodyTruncationSize MaxEmailHTMLBodyTruncationSize = [System.String]$instance.MaxEmailHTMLBodyTruncationSize - MaxInactivityTimeDeviceLock = [System.String]$instance.MaxInactivityTimeDeviceLock - MinDevicePasswordComplexCharacters = [System.Int32]$instance.MinDevicePasswordComplexCharacters - MinDevicePasswordLength = [System.Int32]$instance.MinDevicePasswordLength + MaxInactivityTimeLock = [System.String]$instance.MaxInactivityTimeLock + MinPasswordComplexCharacters = [System.Int32]$instance.MinPasswordComplexCharacters + MinPasswordLength = [System.Int32]$instance.MinPasswordLength PasswordRecoveryEnabled = [System.Boolean]$instance.PasswordRecoveryEnabled RequireDeviceEncryption = [System.Boolean]$instance.RequireDeviceEncryption RequireEncryptedSMIMEMessages = [System.Boolean]$instance.RequireEncryptedSMIMEMessages @@ -412,6 +422,10 @@ function Set-TargetResource [System.Boolean] $AllowExternalDeviceManagement, + [Parameter()] + [System.Boolean] + $AllowGooglePushNotifications, + [Parameter()] [System.Boolean] $AllowHTMLEmail, @@ -424,6 +438,10 @@ function Set-TargetResource [System.Boolean] $AllowIrDA, + [Parameter()] + [System.Boolean] + $AllowMicrosoftPushNotifications, + [Parameter()] [System.Boolean] $AllowMobileOTAUpdate, @@ -442,7 +460,7 @@ function Set-TargetResource [Parameter()] [System.Boolean] - $AllowSimpleDevicePassword, + $AllowSimplePassword, [Parameter()] [System.String] @@ -474,7 +492,7 @@ function Set-TargetResource [Parameter()] [System.Boolean] - $AlphanumericDevicePasswordRequired, + $AlphanumericPasswordRequired, [Parameter()] [System.String[]] @@ -490,15 +508,15 @@ function Set-TargetResource [Parameter()] [System.Boolean] - $DevicePasswordEnabled, + $PasswordEnabled, [Parameter()] [System.String] - $DevicePasswordExpiration, + $PasswordExpiration, [Parameter()] [System.Int32] - $DevicePasswordHistory, + $PasswordHistory, [Parameter()] [System.String] @@ -527,7 +545,7 @@ function Set-TargetResource [Parameter()] [System.String] - $MaxDevicePasswordFailedAttempts, + $MaxPasswordFailedAttempts, [Parameter()] [System.String] @@ -544,15 +562,15 @@ function Set-TargetResource [Parameter()] [System.String] - $MaxInactivityTimeDeviceLock, + $MaxInactivityTimeLock, [Parameter()] [System.Int32] - $MinDevicePasswordComplexCharacters, + $MinPasswordComplexCharacters, [Parameter()] [System.Int32] - $MinDevicePasswordLength, + $MinPasswordLength, [Parameter()] [System.Boolean] @@ -654,17 +672,17 @@ function Set-TargetResource if ($Ensure -eq 'Present' -and $currentInstance.Ensure -eq 'Absent') { $setParameters.Remove('Identity') - New-ActiveSyncMailboxPolicy @SetParameters + New-MobileDeviceMailboxPolicy @SetParameters } # UPDATE elseif ($Ensure -eq 'Present' -and $currentInstance.Ensure -eq 'Present') { - Set-ActiveSyncMailboxPolicy @SetParameters + Set-MobileDeviceMailboxPolicy @SetParameters } # REMOVE elseif ($Ensure -eq 'Absent' -and $currentInstance.Ensure -eq 'Present') { - Remove-ActiveSyncMailboxPolicy -Identity $Identity + Remove-MobileDeviceMailboxPolicy -Identity $Identity } } @@ -707,6 +725,10 @@ function Test-TargetResource [System.Boolean] $AllowExternalDeviceManagement, + [Parameter()] + [System.Boolean] + $AllowGooglePushNotifications, + [Parameter()] [System.Boolean] $AllowHTMLEmail, @@ -719,6 +741,10 @@ function Test-TargetResource [System.Boolean] $AllowIrDA, + [Parameter()] + [System.Boolean] + $AllowMicrosoftPushNotifications, + [Parameter()] [System.Boolean] $AllowMobileOTAUpdate, @@ -737,7 +763,7 @@ function Test-TargetResource [Parameter()] [System.Boolean] - $AllowSimpleDevicePassword, + $AllowSimplePassword, [Parameter()] [System.String] @@ -769,7 +795,7 @@ function Test-TargetResource [Parameter()] [System.Boolean] - $AlphanumericDevicePasswordRequired, + $AlphanumericPasswordRequired, [Parameter()] [System.String[]] @@ -785,15 +811,15 @@ function Test-TargetResource [Parameter()] [System.Boolean] - $DevicePasswordEnabled, + $PasswordEnabled, [Parameter()] [System.String] - $DevicePasswordExpiration, + $PasswordExpiration, [Parameter()] [System.Int32] - $DevicePasswordHistory, + $PasswordHistory, [Parameter()] [System.String] @@ -822,7 +848,7 @@ function Test-TargetResource [Parameter()] [System.String] - $MaxDevicePasswordFailedAttempts, + $MaxPasswordFailedAttempts, [Parameter()] [System.String] @@ -839,15 +865,15 @@ function Test-TargetResource [Parameter()] [System.String] - $MaxInactivityTimeDeviceLock, + $MaxInactivityTimeLock, [Parameter()] [System.Int32] - $MinDevicePasswordComplexCharacters, + $MinPasswordComplexCharacters, [Parameter()] [System.Int32] - $MinDevicePasswordLength, + $MinPasswordLength, [Parameter()] [System.Boolean] @@ -992,7 +1018,7 @@ function Export-TargetResource try { - [array]$policies = Get-ActiveSyncMailboxPolicy -ErrorAction Stop + [array]$policies = Get-MobileDeviceMailboxPolicy -ErrorAction Stop $i = 1 $dscContent = '' diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_EXOActiveSyncMailboxPolicy/MSFT_EXOActiveSyncMailboxPolicy.schema.mof b/Modules/Microsoft365DSC/DSCResources/MSFT_EXOActiveSyncMailboxPolicy/MSFT_EXOActiveSyncMailboxPolicy.schema.mof index 32242a76b3..9fec71878f 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_EXOActiveSyncMailboxPolicy/MSFT_EXOActiveSyncMailboxPolicy.schema.mof +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_EXOActiveSyncMailboxPolicy/MSFT_EXOActiveSyncMailboxPolicy.schema.mof @@ -1,4 +1,4 @@ -[ClassVersion("1.0.0.0"), FriendlyName("EXOActiveSyncMailboxPolicy")] +[ClassVersion("1.0.0.1"), FriendlyName("EXOActiveSyncMailboxPolicy")] class MSFT_EXOActiveSyncMailboxPolicy : OMI_BaseResource { [Write, Description("Specifies the name of the policy.")] String Name; @@ -9,14 +9,16 @@ class MSFT_EXOActiveSyncMailboxPolicy : OMI_BaseResource [Write, Description("Specifies whether the mobile phone user can configure a personal email account on the device.")] Boolean AllowConsumerEmail; [Write, Description("Specifies whether the mobile phone can synchronize with a desktop computer through a cable.")] Boolean AllowDesktopSync; [Write, Description("Specifies whether an external device management program is allowed to manage the device.")] Boolean AllowExternalDeviceManagement; + [Write, Description("The AllowGooglePushNotifications parameter controls whether the user can receive push notifications from Google for Outlook on the web for devices. Valid input for this parameter is $true or $false. The default value is $true.")] Boolean AllowGooglePushNotifications; [Write, Description("Specifies whether HTML email is enabled on the device.")] Boolean AllowHTMLEmail; [Write, Description("Specifies whether the mobile phone can be used as a modem to connect a computer to the Internet.")] Boolean AllowInternetSharing; [Write, Description("Specifies whether infrared connections are allowed to the mobile phone.")] Boolean AllowIrDA; + [Write, Description("The AllowMicrosoftPushNotifications parameter specifies whether push notifications are enabled on the mobile device. Valid input for this parameter is $true or $false. The default value is $true.")] Boolean AllowMicrosoftPushNotifications; [Write, Description("Specifies whether certain updates are seen by devices that implemented support for this restricting functionality.")] Boolean AllowMobileOTAUpdate; [Write, Description("Enables all devices to synchronize with the computer running Exchange, regardless of whether the device can enforce all the specific settings established in the Mobile Device mailbox policy.")] Boolean AllowNonProvisionableDevices; [Write, Description("Specifies whether the user can configure a POP3 or IMAP4 email account on the device.")] Boolean AllowPOPIMAPEmail; [Write, Description("Specifies whether the mobile phone can initiate a remote desktop connection.")] Boolean AllowRemoteDesktop; - [Write, Description("Specifies whether a simple device password is allowed.")] Boolean AllowSimpleDevicePassword; + [Write, Description("Specifies whether a simple device password is allowed.")] Boolean AllowSimplePassword; [Write, Description("Specifies whether the messaging application on the device can negotiate the encryption algorithm in case a recipient's certificate doesn't support the specified encryption algorithm.")] String AllowSMIMEEncryptionAlgorithmNegotiation; [Write, Description("Specifies whether S/MIME software certificates are allowed.")] Boolean AllowSMIMESoftCerts; [Write, Description("Specifies whether the device can access information stored on a storage card.")] Boolean AllowStorageCard; @@ -24,26 +26,26 @@ class MSFT_EXOActiveSyncMailboxPolicy : OMI_BaseResource [Write, Description("Specifies whether unsigned applications can be installed on the device.")] Boolean AllowUnsignedApplications; [Write, Description("Specifies whether unsigned installation packages can be run on the device.")] Boolean AllowUnsignedInstallationPackages; [Write, Description("Specifies whether wireless Internet access is allowed on the device.")] Boolean AllowWiFi; - [Write, Description("Specifies whether the device password must be alphanumeric.")] Boolean AlphanumericDevicePasswordRequired; + [Write, Description("Specifies whether the device password must be alphanumeric.")] Boolean AlphanumericPasswordRequired; [Write, Description("Specifies a list of approved applications for the device.")] String ApprovedApplicationList[]; [Write, Description("Specifies whether the user can download attachments.")] Boolean AttachmentsEnabled; [Write, Description("Enables device encryption on the mobile phone.")] Boolean DeviceEncryptionEnabled; - [Write, Description("Specifies that the user set a password for the device.")] Boolean DevicePasswordEnabled; - [Write, Description("Specifies the length of time, in days, that a password can be used.")] String DevicePasswordExpiration; - [Write, Description("Specifies the number of previously used passwords to store.")] Sint32 DevicePasswordHistory; + [Write, Description("Specifies that the user set a password for the device.")] Boolean PasswordEnabled; + [Write, Description("Specifies the length of time, in days, that a password can be used.")] String PasswordExpiration; + [Write, Description("Specifies the number of previously used passwords to store.")] Sint32 PasswordHistory; [Write, Description("Specifies how often the policy is sent from the server to the mobile phone")] String DevicePolicyRefreshInterval; [Write, Description("Specifies whether Information Rights Management (IRM) is enabled for the mailbox policy.")] Boolean IrmEnabled; [Write, Description("Specifies whether this policy is the default Mobile Device mailbox policy.")] Boolean IsDefault; [Write, Description("Specifies whether this policy is the default Mobile Device mailbox policy.")] Boolean IsDefaultPolicy; [Write, Description("Specifies the maximum size of attachments that can be downloaded to the mobile phone.")] String MaxAttachmentSize; [Write, Description("Specifies the maximum range of calendar days that can be synchronized to the device."), ValueMap{"All", "TwoWeeks", "OneMonth", "ThreeMonths", "SixMonths"}, Values{"All", "TwoWeeks", "OneMonth", "ThreeMonths", "SixMonths"}] String MaxCalendarAgeFilter; - [Write, Description("Specifies the number of attempts a user can make to enter the correct password for the device.")] String MaxDevicePasswordFailedAttempts; + [Write, Description("Specifies the number of attempts a user can make to enter the correct password for the device.")] String MaxPasswordFailedAttempts; [Write, Description("Specifies the maximum number of days of email items to synchronize to the device."), ValueMap{"All", "OneDay", "ThreeDays", "OneWeek", "TwoWeeks", "OneMonth", "ThreeMonths", "SixMonths"}, Values{"All", "OneDay", "ThreeDays", "OneWeek", "TwoWeeks", "OneMonth", "ThreeMonths", "SixMonths"}] String MaxEmailAgeFilter; [Write, Description("Specifies the maximum size at which email messages are truncated when synchronized to the device.")] String MaxEmailBodyTruncationSize; [Write, Description("Specifies the maximum size at which HTML-formatted email messages are synchronized to the device.")] String MaxEmailHTMLBodyTruncationSize; - [Write, Description("Specifies the length of time that the device can be inactive before the password is required to reactivate the device.")] String MaxInactivityTimeDeviceLock; - [Write, Description("Specifies the minimum number of complex characters required in a device password.")] Sint32 MinDevicePasswordComplexCharacters; - [Write, Description("Specifies the minimum number of characters in the device password.")] Sint32 MinDevicePasswordLength; + [Write, Description("Specifies the length of time that the device can be inactive before the password is required to reactivate the device.")] String MaxInactivityTimeLock; + [Write, Description("Specifies the minimum number of complex characters required in a device password.")] Sint32 MinPasswordComplexCharacters; + [Write, Description("Specifies the minimum number of characters in the device password.")] Sint32 MinPasswordLength; [Write, Description("Specifies whether you can store the recovery password for the device on an Exchange server.")] Boolean PasswordRecoveryEnabled; [Write, Description("Specifies whether encryption is required on the device.")] Boolean RequireDeviceEncryption; [Write, Description("Specifies whether you must encrypt S/MIME messages.")] Boolean RequireEncryptedSMIMEMessages; diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_EXOMailboxCalendarConfiguration/MSFT_EXOMailboxCalendarConfiguration.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_EXOMailboxCalendarConfiguration/MSFT_EXOMailboxCalendarConfiguration.psm1 index 2b4c07968c..cdda3d23d1 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_EXOMailboxCalendarConfiguration/MSFT_EXOMailboxCalendarConfiguration.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_EXOMailboxCalendarConfiguration/MSFT_EXOMailboxCalendarConfiguration.psm1 @@ -230,6 +230,9 @@ function Get-TargetResource $nullResult = $PSBoundParameters $nullResult.Ensure = 'Absent' + # The cmdlet will show the warning "Events from Email parameters of this cmdlet are deprecated. Use Get-EventsFromEmailConfiguration instead." + # However, the new cmdlet does not work and throws an Internal Server Error exception + # Keep using Get-MailboxCalendarConfiguration for now $config = Get-MailboxCalendarConfiguration -Identity $Identity -ErrorAction SilentlyContinue if ($null -eq $config) diff --git a/Modules/Microsoft365DSC/SchemaDefinition.json b/Modules/Microsoft365DSC/SchemaDefinition.json index b61c11622d..1319bdad33 100644 --- a/Modules/Microsoft365DSC/SchemaDefinition.json +++ b/Modules/Microsoft365DSC/SchemaDefinition.json @@ -1 +1 @@ -[{"ClassName":"MSFT_MicrosoftGraphAccessReviewPrincipalScope","Parameters":[{"CIMType":"String","Description":"The query representing what will be reviewed in an access review.","Name":"Query","Option":"Write"},{"CIMType":"String","Description":"In the scenario where reviewers need to be specified dynamically, this property is used to indicate the relative source of the query. This property is only required if a relative query is specified. For example, ./manager.","Name":"QueryRoot","Option":"Write"},{"CIMType":"String","Description":"Indicates the type of query. Types include MicrosoftGraph and ARM.","Name":"QueryType","Option":"Write"},{"CIMType":"String","Description":"The type of the entity.","Name":"odataType","Option":"Required","ValueMap":["#microsoft.graph.accessReviewPrincipalScope","#microsoft.graph.accessReviewQueryScope"],"Values":["#microsoft.graph.accessReviewPrincipalScope","#microsoft.graph.accessReviewQueryScope"]},{"CIMType":"String","Description":"The type of users to include in the review. The possible values are: allUsers, guestUsers, inactiveUsers, inactiveGuestUsers.","Name":"scopeType","Option":"Write","ValueMap":["allUsers","guestUsers","inactiveUsers","inactiveGuestUsers"],"Values":["allUsers","guestUsers","inactiveUsers","inactiveGuestUsers"]}],"Description":"Azure AD Access Review Definition"},{"ClassName":"MSFT_MicrosoftGraphAccessReviewResourceScope","Parameters":[{"CIMType":"String","Description":"The query representing what will be reviewed in an access review.","Name":"Query","Option":"Write"},{"CIMType":"String","Description":"In the scenario where reviewers need to be specified dynamically, this property is used to indicate the relative source of the query. This property is only required if a relative query is specified. For example, ./manager.","Name":"QueryRoot","Option":"Write"},{"CIMType":"String","Description":"Indicates the type of query. Types include MicrosoftGraph and ARM.","Name":"QueryType","Option":"Write"},{"CIMType":"String","Description":"The type of the entity.","Name":"odataType","Option":"Required","ValueMap":["#microsoft.graph.accessReviewResourceScope","#microsoft.graph.accessReviewQueryScope"],"Values":["#microsoft.graph.accessReviewResourceScope","#microsoft.graph.accessReviewQueryScope"]},{"CIMType":"String","Description":"The display name of the resource.","Name":"displayName","Option":"Write"},{"CIMType":"String","Description":"The identifier of the resource.","Name":"resourceScopeId","Option":"Write"},{"CIMType":"String","Description":"The type of users to include in the review. The possible values are: group, catalog, servicePrincipal, directoryRole, accessPackageAssignmentPolicy.","Name":"scopeType","Option":"Write","ValueMap":["group","catalog","servicePrincipal","directoryRole","accessPackageAssignmentPolicy"],"Values":["group","catalog","servicePrincipal","directoryRole","accessPackageAssignmentPolicy"]}],"Description":"Azure AD Access Review Definition"},{"ClassName":"MSFT_MicrosoftGraphAccessReviewScope","Parameters":[{"CIMType":"String","Description":"The query representing what will be reviewed in an access review.","Name":"Query","Option":"Write"},{"CIMType":"String","Description":"In the scenario where reviewers need to be specified dynamically, this property is used to indicate the relative source of the query. This property is only required if a relative query is specified. For example, ./manager.","Name":"QueryRoot","Option":"Write"},{"CIMType":"String","Description":"Indicates the type of query. Types include MicrosoftGraph and ARM.","Name":"QueryType","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphAccessReviewPrincipalScope[]","Description":"Defines the scopes of the principals for which access to resources are reviewed in the access review.","Name":"PrincipalScopes","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphAccessReviewResourceScope[]","Description":"Defines the scopes of the resources for which access is reviewed.","Name":"ResourceScopes","Option":"Write"},{"CIMType":"String","Description":"The type of the entity.","Name":"odataType","Option":"Required","ValueMap":["#microsoft.graph.accessReviewQueryScope","#microsoft.graph.accessReviewReviewerScope","#microsoft.graph.principalResourceMembershipsScope","#microsoft.graph.accessReviewInactiveUsersQueryScope"],"Values":["#microsoft.graph.accessReviewQueryScope","#microsoft.graph.accessReviewReviewerScope","#microsoft.graph.principalResourceMembershipsScope","#microsoft.graph.accessReviewInactiveUsersQueryScope"]}],"Description":"Azure AD Access Review Definition"},{"ClassName":"MSFT_MicrosoftGraphAccessReviewScheduleSettings","Parameters":[{"CIMType":"MSFT_MicrosoftGraphAccessReviewApplyAction[]","Description":"Optional field. Describes the actions to take once a review is complete. There are two types that are currently supported: removeAccessApplyAction (default) and disableAndDeleteUserApplyAction. Field only needs to be specified in the case of disableAndDeleteUserApplyAction.","Name":"ApplyActions","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether decisions are automatically applied. When set to false, an admin must apply the decisions manually once the reviewer completes the access review. When set to true, decisions are applied automatically after the access review instance duration ends, whether or not the reviewers have responded. Default value is false. CAUTION: If both autoApplyDecisionsEnabled and defaultDecisionEnabled are true, all access for the principals to the resource risks being revoked if the reviewers fail to respond.","Name":"AutoApplyDecisionsEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether decisions on previous access review stages are available for reviewers on an accessReviewInstance with multiple subsequent stages. If not provided, the default is disabled (false).","Name":"DecisionHistoriesForReviewersEnabled","Option":"Write"},{"CIMType":"String","Description":"Decision chosen if defaultDecisionEnabled is enabled. Can be one of Approve, Deny, or Recommendation.","Name":"DefaultDecision","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether the default decision is enabled or disabled when reviewers do not respond. Default value is false. CAUTION: If both autoApplyDecisionsEnabled and defaultDecisionEnabled are true, all access for the principals to the resource risks being revoked if the reviewers fail to respond.","Name":"DefaultDecisionEnabled","Option":"Write"},{"CIMType":"UInt32","Description":"Duration of each recurrence of review (accessReviewInstance) in number of days. NOTE: If the stageSettings of the accessReviewScheduleDefinition object is defined, its durationInDays setting will be used instead of the value of this property.","Name":"InstanceDurationInDays","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether reviewers are required to provide justification with their decision. Default value is false.","Name":"JustificationRequiredOnApproval","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether emails are enabled or disabled. Default value is false.","Name":"MailNotificationsEnabled","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphAccessReviewRecommendationInsightSetting[]","Description":"Optional. Describes the types of insights that aid reviewers to make access review decisions. NOTE: If the stageSettings of the accessReviewScheduleDefinition object is defined, its recommendationInsightSettings setting will be used instead of the value of this property.","Name":"RecommendationInsightSettings","Option":"Write"},{"CIMType":"String","Description":"Optional field. Indicates the period of inactivity (with respect to the start date of the review instance) that recommendations will be configured from. The recommendation will be to deny if the user is inactive during the look-back duration. For reviews of groups and Microsoft Entra roles, any duration is accepted. For reviews of applications, 30 days is the maximum duration. If not specified, the duration is 30 days. NOTE: If the stageSettings of the accessReviewScheduleDefinition object is defined, its recommendationLookBackDuration setting will be used instead of the value of this property.","Name":"RecommendationLookBackDuration","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether decision recommendations are enabled or disabled. NOTE: If the stageSettings of the accessReviewScheduleDefinition object is defined, its recommendationsEnabled setting will be used instead of the value of this property.","Name":"RecommendationsEnabled","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphPatternedRecurrence","Description":"Detailed settings for recurrence using the standard Outlook recurrence object. Note: Only dayOfMonth, interval, and type (weekly, absoluteMonthly) properties are supported. Use the property startDate on recurrenceRange to determine the day the review starts.","Name":"Recurrence","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether reminders are enabled or disabled. Default value is false.","Name":"ReminderNotificationsEnabled","Option":"Write"}],"Description":"Azure AD Access Review Definition"},{"ClassName":"MSFT_MicrosoftGraphAccessReviewApplyAction","Parameters":[{"CIMType":"String","Description":"The type of the entity.","Name":"odataType","Option":"Write","ValueMap":["#microsoft.graph.disableAndDeleteUserApplyAction","#microsoft.graph.removeAccessApplyAction"],"Values":["#microsoft.graph.disableAndDeleteUserApplyAction","#microsoft.graph.removeAccessApplyAction"]}],"Description":"Azure AD Access Review Definition"},{"ClassName":"MSFT_MicrosoftGraphAccessReviewRecommendationInsightSetting","Parameters":[{"CIMType":"String","Description":"Optional. Indicates the time period of inactivity (with respect to the start date of the review instance) that recommendations will be configured from. The recommendation will be to deny if the user is inactive during the look-back duration. For reviews of groups and Microsoft Entra roles, any duration is accepted. For reviews of applications, 30 days is the maximum duration. If not specified, the duration is 30 days.","Name":"RecommendationLookBackDuration","Option":"Write"},{"CIMType":"String","Description":"Indicates whether inactivity is calculated based on the user's inactivity in the tenant or in the application. The possible values are tenant, application, unknownFutureValue. application is only relevant when the access review is a review of an assignment to an application.","Name":"SignInScope","Option":"Write","ValueMap":["tenant","application","unknownFutureValue"],"Values":["tenant","application","unknownFutureValue"]},{"CIMType":"String","Description":"The type of the entity.","Name":"odataType","Option":"Write","ValueMap":["#microsoft.graph.groupPeerOutlierRecommendationInsightSettings","#microsoft.graph.userLastSignInRecommendationInsightSetting"],"Values":["#microsoft.graph.groupPeerOutlierRecommendationInsightSettings","#microsoft.graph.userLastSignInRecommendationInsightSetting"]}],"Description":"Azure AD Access Review Definition"},{"ClassName":"MSFT_MicrosoftGraphPatternedRecurrence","Parameters":[{"CIMType":"MSFT_MicrosoftGraphRecurrencePattern","Description":"The frequency of an event. Do not specify for a one-time access review. For access reviews: Do not specify this property for a one-time access review. Only interval, dayOfMonth, and type (weekly, absoluteMonthly) properties of recurrencePattern are supported.","Name":"Pattern","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphRecurrenceRange","Description":"The duration of an event.","Name":"Range","Option":"Write"}],"Description":"Azure AD Access Review Definition"},{"ClassName":"MSFT_MicrosoftGraphRecurrencePattern","Parameters":[{"CIMType":"UInt32","Description":"The day of the month on which the event occurs. Required if type is absoluteMonthly or absoluteYearly.","Name":"DayOfMonth","Option":"Write"},{"CIMType":"String[]","Description":"A collection of the days of the week on which the event occurs. The possible values are: sunday, monday, tuesday, wednesday, thursday, friday, saturday. If type is relativeMonthly or relativeYearly, and daysOfWeek specifies more than one day, the event falls on the first day that satisfies the pattern. Required if type is weekly, relativeMonthly, or relativeYearly.","Name":"DaysOfWeek","Option":"Write"},{"CIMType":"String","Description":"The first day of the week. The possible values are: sunday, monday, tuesday, wednesday, thursday, friday, saturday. Default is sunday. Required if type is weekly.","Name":"FirstDayOfWeek","Option":"Write"},{"CIMType":"String","Description":"Specifies on which instance of the allowed days specified in daysOfWeek the event occurs, counted from the first instance in the month. The possible values are: first, second, third, fourth, last. Default is first. Optional and used if type is relativeMonthly or relativeYearly.","Name":"Index","Option":"Write","ValueMap":["first","second","third","fourth","last"],"Values":["first","second","third","fourth","last"]},{"CIMType":"UInt32","Description":"The number of units between occurrences, where units can be in days, weeks, months, or years, depending on the type. Required.","Name":"Interval","Option":"Write"},{"CIMType":"UInt32","Description":"The month in which the event occurs. This is a number from 1 to 12.","Name":"Month","Option":"Write"},{"CIMType":"String","Description":"The recurrence pattern type: daily, weekly, absoluteMonthly, relativeMonthly, absoluteYearly, relativeYearly. Required. For more information, see values of type property.","Name":"Type","Option":"Write","ValueMap":["daily","weekly","absoluteMonthly","relativeMonthly","absoluteYearly","relativeYearly"],"Values":["daily","weekly","absoluteMonthly","relativeMonthly","absoluteYearly","relativeYearly"]}],"Description":"Azure AD Access Review Definition"},{"ClassName":"MSFT_MicrosoftGraphRecurrenceRange","Parameters":[{"CIMType":"String","Description":"The date to stop applying the recurrence pattern. Depending on the recurrence pattern of the event, the last occurrence of the meeting may not be this date. Required if type is endDate.","Name":"EndDate","Option":"Write"},{"CIMType":"UInt32","Description":"The number of times to repeat the event. Required and must be positive if type is numbered.","Name":"NumberOfOccurrences","Option":"Write"},{"CIMType":"String","Description":"Time zone for the startDate and endDate properties. Optional. If not specified, the time zone of the event is used.","Name":"RecurrenceTimeZone","Option":"Write"},{"CIMType":"String","Description":"The date to start applying the recurrence pattern. The first occurrence of the meeting may be this date or later, depending on the recurrence pattern of the event. Must be the same value as the start property of the recurring event. Required.","Name":"StartDate","Option":"Write"},{"CIMType":"String","Description":"The recurrence range. Possible values are: endDate, noEnd, numbered. Required.","Name":"Type","Option":"Write","ValueMap":["endDate","noEnd","numbered"],"Values":["endDate","noEnd","numbered"]}],"Description":"Azure AD Access Review Definition"},{"ClassName":"MSFT_MicrosoftGraphAccessReviewStageSettings","Parameters":[{"CIMType":"String[]","Description":"Indicate which decisions will go to the next stage. Can be a subset of Approve, Deny, Recommendation, or NotReviewed. If not provided, all decisions will go to the next stage. Optional.","Name":"DecisionsThatWillMoveToNextStage","Option":"Write"},{"CIMType":"String[]","Description":"Defines the sequential or parallel order of the stages and depends on the stageId. Only sequential stages are currently supported. For example, if stageId is 2, then dependsOn must be 1. If stageId is 1, don't specify dependsOn. Required if stageId isn't 1.","Name":"DependsOnValue","Option":"Write"},{"CIMType":"UInt32","Description":"The duration of the stage. Required. NOTE: The cumulative value of this property across all stages 1. Will override the instanceDurationInDays setting on the accessReviewScheduleDefinition object. 2. Can't exceed the length of one recurrence. That is, if the review recurs weekly, the cumulative durationInDays can't exceed 7.","Name":"DurationInDays","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphAccessReviewRecommendationInsightSetting[]","Description":"Recommendation Insights Settings","Name":"RecommendationInsightSettings","Option":"Write"},{"CIMType":"String","Description":"Optional field. Indicates the time period of inactivity (with respect to the start date of the review instance) from which that recommendations will be configured. The recommendation is to deny if the user is inactive during the look back duration. For reviews of groups and Microsoft Entra roles, any duration is accepted. For reviews of applications, 30 days is the maximum duration. If not specified, the duration is 30 days. NOTE: The value of this property overrides the corresponding setting on the accessReviewScheduleDefinition object.","Name":"RecommendationLookBackDuration","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether showing recommendations to reviewers is enabled. Required. NOTE: The value of this property overrides the corresponding setting on the accessReviewScheduleDefinition object.","Name":"RecommendationsEnabled","Option":"Required"},{"CIMType":"String","Description":"Unique identifier of the accessReviewStageSettings. The stageId is used in dependsOn property to indicate the stage relationship. Required.","Name":"StageId","Option":"Write"}],"Description":"Azure AD Access Review Definition"},{"ClassName":"MSFT_AADAccessReviewDefinitionReviewer","Parameters":[{"CIMType":"String","Description":"Indicates the display name of the current reviewer, either of a group or of a user.","Name":"DisplayName","Option":"Write"},{"CIMType":"String","Description":"Indicates the type of reviewer. Possible values: Manager, Owner, User, Group","Name":"Type","Option":"Required","ValueMap":["Manager","Owner","User","Group"],"Values":["Manager","Owner","User","Group"]},{"CIMType":"String","Description":"Indicates the type of reviewer. Possible values: User, Group, Self, Manager, Sponsor, ResourceOwner, ManagerOrSponsor","Name":"ScopeType","Option":"Write","ValueMap":["User","Group","Self","Manager","Sponsor","ResourceOwner","ManagerOrSponsor"],"Values":["User","Group","Self","Manager","Sponsor","ResourceOwner","ManagerOrSponsor"]}],"Description":"Azure AD Access Review Definition"},{"ClassName":"MSFT_AADAccessReviewDefinition","Parameters":[{"CIMType":"String","Description":"Name of the access review series. Supports $select and $orderby. Required on create.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Description provided by review creators to provide more context of the review to admins. Supports $select.","Name":"DescriptionForAdmins","Option":"Write"},{"CIMType":"String","Description":"Description provided by review creators to provide more context of the review to reviewers. Reviewers see this description in the email sent to them requesting their review. Email notifications support up to 256 characters. Supports $select.","Name":"DescriptionForReviewers","Option":"Write"},{"CIMType":"MSFT_AADAccessReviewDefinitionReviewer[]","Description":"The fallback reviewers of the access review.","Name":"FallbackReviewers","Option":"Write"},{"CIMType":"MSFT_AADAccessReviewDefinitionReviewer[]","Description":"The reviewers of the access review.","Name":"Reviewers","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphaccessReviewScope","Description":"Defines the entities whose access is reviewed. For supported scopes, see accessReviewScope. Required on create. Supports $select and $filter (contains only). For examples of options for configuring scope, see Configure the scope of your access review definition using the Microsoft Graph API.","Name":"ScopeValue","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphaccessReviewScheduleSettings","Description":"The settings for an access review series, see type definition below. Supports $select. Required on create.","Name":"SettingsValue","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphaccessReviewStageSettings[]","Description":"Required only for a multi-stage access review to define the stages and their settings. You can break down each review instance into up to three sequential stages, where each stage can have a different set of reviewers, fallback reviewers, and settings. Stages are created sequentially based on the dependsOn property. Optional. When this property is defined, its settings are used instead of the corresponding settings in the accessReviewScheduleDefinition object and its settings, reviewers, and fallbackReviewers properties.","Name":"StageSettings","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Access Review Definition"},{"ClassName":"MSFT_AADAccessReviewPolicy","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"Boolean","Description":"If true, group owners can create and manage access reviews on groups they own.","Name":"IsGroupOwnerManagementEnabled","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Use this resource to monitor the access review policy object."},{"ClassName":"MSFT_AADActivityBasedTimeoutPolicy","Parameters":[{"CIMType":"String","Description":"Display name for this policy. Required.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"Id of the policy","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Timeout value in hh:mm:ss for c44b4083-3bb0-49c1-b47d-974e53cbdf3c: applies the policy to the Azure portal.","Name":"AzurePortalTimeOut","Option":"Write"},{"CIMType":"String","Description":"Timeout value in hh:mm:ss for default: applies the policy to all applications that support activity-based timeout functionality but don't have application-specific override.","Name":"DefaultTimeOut","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configure the Azure AD Activity Based Timeout Policy"},{"ClassName":"MSFT_AADAdminConsentRequestPolicyReviewer","Parameters":[{"CIMType":"String","Description":"Type of reviewwer. Can be User, Group or Role","Name":"ReviewerType","Option":"Write"},{"CIMType":"String","Description":"Identifier for the reviewer instance.","Name":"ReviewerId","Option":"Key"},{"CIMType":"String","Description":"Associated query.","Name":"QueryRoot","Option":"Write"}],"Description":"Configures the Admin Consent Request Policy in Entra Id."},{"ClassName":"MSFT_AADAdminConsentRequestPolicy","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"Boolean","Description":"Determines if the policy is enabled or not.","Name":"IsEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether reviewers will receive notifications.","Name":"NotifyReviewers","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether reviewers will receive reminder emails.","Name":"RemindersEnabled","Option":"Write"},{"CIMType":"UInt32","Description":"Specifies the duration the request is active before it automatically expires if no decision is applied.","Name":"RequestDurationInDays","Option":"Write"},{"CIMType":"MSFT_AADAdminConsentRequestPolicyReviewer[]","Description":"The list of reviewers for the admin consent.","Name":"Reviewers","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Configures the Admin Consent Request Policy in Entra Id."},{"ClassName":"MSFT_MicrosoftGraphMember","Parameters":[{"CIMType":"String","Description":"Identity of member. For users, specify a UserPrincipalName. For groups, devices and serviceprincipals, specify DisplayName","Name":"Identity","Option":"Key"},{"CIMType":"String","Description":"Specify User, Group or Device to interpret the identity for Members. Specify User, Group or ServicePrincipal for ScopedRoleMembers.","Name":"Type","Option":"Key","ValueMap":["User","Group","Device","ServicePrincipal"],"Values":["User","Group","Device","ServicePrincipal"]}],"Description":"This resource configures an Azure AD Administrative Unit."},{"ClassName":"MSFT_MicrosoftGraphScopedRoleMembership","Parameters":[{"CIMType":"String","Description":"Name of the Azure AD Role that is assigned. See https://learn.microsoft.com/en-us/azure/active-directory/roles/admin-units-assign-roles#roles-that-can-be-assigned-with-administrative-unit-scope","Name":"RoleName","Option":"Key"},{"CIMType":"MSFT_MicrosoftGraphMember","Description":"Member that is assigned the scoped role. Note: Any groups must be role-enabled","Name":"RoleMemberInfo","Option":"Write"}],"Description":"This resource configures an Azure AD Administrative Unit."},{"ClassName":"MSFT_AADAdministrativeUnit","Parameters":[{"CIMType":"String","Description":"DisplayName of the Administrative Unit","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"Object-Id of the Administrative Unit","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Description of the Administrative Unit","Name":"Description","Option":"Write"},{"CIMType":"String","Description":"Visibility of the Administrative Unit. Specify HiddenMembership if members of the AU are hidden","Name":"Visibility","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether the management rights on resources in the administrative units should be restricted to ONLY the administrators scoped on the administrative unit object.","Name":"IsMemberManagementRestricted","Option":"Write"},{"CIMType":"String","Description":"Specify membership type. Possible values are Assigned and Dynamic. Note that the functionality is currently in preview.","Name":"MembershipType","Option":"Write"},{"CIMType":"String","Description":"Specify membership rule. Requires that MembershipType is set to Dynamic. Note that the functionality is currently in preview.","Name":"MembershipRule","Option":"Write"},{"CIMType":"String","Description":"Specify dynamic membership-rule processing-state. Valid values are 'On' and 'Paused'. Requires that MembershipType is set to Dynamic. Note that the functionality is currently in preview.","Name":"MembershipRuleProcessingState","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphMember[]","Description":"Specify members. Only specify if MembershipType is NOT set to Dynamic","Name":"Members","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphScopedRoleMembership[]","Description":"Specify Scoped Role Membership. Note: Any groups must be role-enabled","Name":"ScopedRoleMembers","Option":"Write"},{"CIMType":"string","Description":"Present ensures the Administrative Unit exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Intune Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures an Azure AD Administrative Unit."},{"ClassName":"MSFT_AADAgreement","Parameters":[{"CIMType":"String","Description":"The display name of the agreement.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"The unique identifier of the agreement.","Name":"Id","Option":"Write"},{"CIMType":"Boolean","Description":"Whether the user is required to view the agreement document before accepting.","Name":"IsViewingBeforeAcceptanceRequired","Option":"Write"},{"CIMType":"Boolean","Description":"Whether the agreement is per device or per user.","Name":"IsPerDeviceAcceptanceRequired","Option":"Write"},{"CIMType":"String","Description":"Duration after which the user must re-accept the terms of use. Must be in ISO 8601 duration format.","Name":"UserReacceptRequiredFrequency","Option":"Write"},{"CIMType":"String","Description":"The acceptance statement included in the agreement.","Name":"AcceptanceStatement","Option":"Write"},{"CIMType":"String","Description":"The content of the agreement file.","Name":"FileData","Option":"Write"},{"CIMType":"String","Description":"The name of the agreement file.","Name":"FileName","Option":"Write"},{"CIMType":"String","Description":"The language of the agreement file.","Name":"Language","Option":"Write"},{"CIMType":"String","Description":"Specify if the agreement should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures Azure AD Terms of Use Agreements in Entra ID."},{"ClassName":"MSFT_AADApplicationOnPremisesPublishingSegmentCORS","Parameters":[{"CIMType":"String[]","Description":"The request headers that the origin domain may specify on the CORS request. The wildcard character * indicates that any header beginning with the specified prefix is allowed.","Name":"allowedHeaders","Option":"Write"},{"CIMType":"UInt32","Description":"The maximum amount of time that a browser should cache the response to the preflight OPTIONS request.","Name":"maxAgeInSeconds","Option":"Write"},{"CIMType":"String","Description":"Resource within the application segment for which CORS permissions are granted. / grants permission for whole app segment.","Name":"resource","Option":"Write"},{"CIMType":"String[]","Description":"The HTTP request methods that the origin domain may use for a CORS request.","Name":"allowedMethods","Option":"Write"},{"CIMType":"String[]","Description":"The origin domains that are permitted to make a request against the service via CORS. The origin domain is the domain from which the request originates. The origin must be an exact case-sensitive match with the origin that the user age sends to the service.","Name":"allowedOrigins","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Application."},{"ClassName":"MSFT_AADApplicationOnPremisesPublishingSegment","Parameters":[{"CIMType":"String","Description":"If you're configuring a traffic manager in front of multiple App Proxy application segments, contains the user-friendly URL that will point to the traffic manager.","Name":"alternateUrl","Option":"Write"},{"CIMType":"MSFT_AADApplicationOnPremisesPublishingSegmentCORS[]","Description":"CORS Rule definition for a particular application segment.","Name":"corsConfigurations","Option":"Write"},{"CIMType":"String","Description":"The published external URL for the application segment; for example, https://intranet.contoso.com./","Name":"externalUrl","Option":"Write"},{"CIMType":"String","Description":"The internal URL of the application segment; for example, https://intranet/.","Name":"internalUrl","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Application."},{"ClassName":"MSFT_AADApplicationOnPremisesPublishingSingleSignOnSettingKerberos","Parameters":[{"CIMType":"String","Description":"The Internal Application SPN of the application server. This SPN needs to be in the list of services to which the connector can present delegated credentials.","Name":"kerberosServicePrincipalName","Option":"Write"},{"CIMType":"String","Description":"The Delegated Login Identity for the connector to use on behalf of your users. For more information, see Working with different on-premises and cloud identities . Possible values are: userPrincipalName, onPremisesUserPrincipalName, userPrincipalUsername, onPremisesUserPrincipalUsername, onPremisesSAMAccountName.","Name":"kerberosSignOnMappingAttributeType","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Application."},{"ClassName":"MSFT_AADApplicationOnPremisesPublishingSingleSignOnSetting","Parameters":[{"CIMType":"String","Description":"The preferred single-sign on mode for the application. Possible values are: none, onPremisesKerberos, aadHeaderBased,pingHeaderBased, oAuthToken.","Name":"singleSignOnMode","Option":"Write"},{"CIMType":"MSFT_AADApplicationOnPremisesPublishingSingleSignOnSettingKerberos","Description":"The Kerberos Constrained Delegation settings for applications that use Integrated Window Authentication.","Name":"kerberosSignOnSettings","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Application."},{"ClassName":"MSFT_AADApplicationOnPremisesPublishing","Parameters":[{"CIMType":"String","Description":"If you're configuring a traffic manager in front of multiple App Proxy applications, the alternateUrl is the user-friendly URL that points to the traffic manager.","Name":"alternateUrl","Option":"Write"},{"CIMType":"String","Description":"The duration the connector waits for a response from the backend application before closing the connection. Possible values are default, long.","Name":"applicationServerTimeout","Option":"Write"},{"CIMType":"String","Description":"Details the pre-authentication setting for the application. Pre-authentication enforces that users must authenticate before accessing the app. Pass through doesn't require authentication. Possible values are: passthru, aadPreAuthentication.","Name":"externalAuthenticationType","Option":"Write"},{"CIMType":"String","Description":"The published external url for the application. For example, https://intranet-contoso.msappproxy.net/.","Name":"externalUrl","Option":"Write"},{"CIMType":"String","Description":"The internal url of the application. For example, https://intranet/.","Name":"internalUrl","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether backend SSL certificate validation is enabled for the application. For all new Application Proxy apps, the property is set to true by default. For all existing apps, the property is set to false.","Name":"isBackendCertificateValidationEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates if the HTTPOnly cookie flag should be set in the HTTP response headers. Set this value to true to have Application Proxy cookies include the HTTPOnly flag in the HTTP response headers. If using Remote Desktop Services, set this value to False. Default value is false.","Name":"isHttpOnlyCookieEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates if the Persistent cookie flag should be set in the HTTP response headers. Keep this value set to false. Only use this setting for applications that can't share cookies between processes. For more information about cookie settings, see Cookie settings for accessing on-premises applications in Microsoft Entra ID. Default value is false.","Name":"isPersistentCookieEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates if the Secure cookie flag should be set in the HTTP response headers. Set this value to true to transmit cookies over a secure channel such as an encrypted HTTPS request. Default value is true.","Name":"isSecureCookieEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether validation of the state parameter when the client uses the OAuth 2.0 authorization code grant flow is enabled. This setting allows admins to specify whether they want to enable CSRF protection for their apps.","Name":"isStateSessionEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates if the application should translate urls in the response headers. Keep this value as true unless your application required the original host header in the authentication request. Default value is true.","Name":"isTranslateHostHeaderEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates if the application should translate urls in the application body. Keep this value as false unless you have hardcoded HTML links to other on-premises applications and don't use custom domains. For more information, see Link translation with Application Proxy. Default value is false.","Name":"isTranslateLinksInBodyEnabled","Option":"Write"},{"CIMType":"MSFT_AADApplicationOnPremisesPublishingSegment[]","Description":"Represents the collection of application segments for an on-premises wildcard application that's published through Microsoft Entra application proxy.","Name":"onPremisesApplicationSegments","Option":"Write"},{"CIMType":"MSFT_AADApplicationOnPremisesPublishingSingleSignOnSetting","Description":"Represents the single sign-on configuration for the on-premises application.","Name":"singleSignOnSettings","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Application."},{"ClassName":"MSFT_AADApplicationPermission","Parameters":[{"CIMType":"String","Description":"Name of the requested permission.","Name":"Name","Option":"Key"},{"CIMType":"String","Description":"Name of the API from which the permission comes from.","Name":"SourceAPI","Option":"Key"},{"CIMType":"String","Description":"Type of permission.","Name":"Type","Option":"Key","ValueMap":["AppOnly","Delegated"],"Values":["AppOnly","Delegated"]},{"CIMType":"Boolean","Description":"Represented whether or not the Admin consent been granted on the app.","Name":"AdminConsentGranted","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Application."},{"ClassName":"MSFT_MicrosoftGraphOptionalClaims","Parameters":[{"CIMType":"MSFT_MicrosoftGraphOptionalClaim[]","Description":"The optional claims returned in the JWT access token.","Name":"AccessToken","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphOptionalClaim[]","Description":"The optional claims returned in the JWT ID token.","Name":"IdToken","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphOptionalClaim[]","Description":"The optional claims returned in the SAML token.","Name":"Saml2Token","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Application."},{"ClassName":"MSFT_MicrosoftGraphOptionalClaim","Parameters":[{"CIMType":"Boolean","Description":"If the value is true, the claim specified by the client is necessary to ensure a smooth authorization experience for the specific task requested by the end user. The default value is false.","Name":"Essential","Option":"Write"},{"CIMType":"String","Description":"The name of the optional claim.","Name":"Name","Option":"Key"},{"CIMType":"String","Description":"The source (directory object) of the claim. There are predefined claims and user-defined claims from extension properties. If the source value is null, the claim is a predefined optional claim. If the source value is user, the value in the name property is the extension property from the user object.","Name":"Source","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Application."},{"ClassName":"MSFT_MicrosoftGraphPreAuthorizedApplication","Parameters":[{"CIMType":"String","Description":"The unique identifier for the client application.","Name":"AppId","Option":"Key"},{"CIMType":"String[]","Description":"The unique identifier for the scopes the client application is granted.","Name":"PermissionIds","Option":"Required"}],"Description":"This resource configures an Azure Active Directory Application."},{"ClassName":"MSFT_MicrosoftGraphApiOauth2PermissionScopes","Parameters":[{"CIMType":"String","Description":"A description of the delegated permissions, intended to be read by an administrator granting the permission on behalf of all users. This text appears in tenant-wide admin consent experiences.","Name":"adminConsentDescription","Option":"Write"},{"CIMType":"String","Description":"The permission's title, intended to be read by an administrator granting the permission on behalf of all users.","Name":"adminConsentDisplayName","Option":"Write"},{"CIMType":"String","Description":"A description of the delegated permissions, intended to be read by a user granting the permission on their own behalf. This text appears in consent experiences where the user is consenting only on behalf of themselves.","Name":"userConsentDescription","Option":"Write"},{"CIMType":"String","Description":"A title for the permission, intended to be read by a user granting the permission on their own behalf. This text appears in consent experiences where the user is consenting only on behalf of themselves.","Name":"userConsentDisplayName","Option":"Write"},{"CIMType":"String","Description":"Specifies the value to include in the scp (scope) claim in access tokens. Must not exceed 120 characters in length.","Name":"value","Option":"Key"},{"CIMType":"Boolean","Description":"When you create or update a permission, this property must be set to true (which is the default). To delete a permission, this property must first be set to false. At that point, in a subsequent call, the permission may be removed.","Name":"isEnabled","Option":"Write"},{"CIMType":"String","Description":"The possible values are: User and Admin. Specifies whether this delegated permission should be considered safe for non-admin users to consent to on behalf of themselves, or whether an administrator consent should always be required.","Name":"type","Option":"Write"},{"CIMType":"String","Description":"Unique delegated permission identifier inside the collection of delegated permissions defined for a resource application.","Name":"id","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Application."},{"ClassName":"MSFT_MicrosoftGraphApiApplication","Parameters":[{"CIMType":"MSFT_MicrosoftGraphPreAuthorizedApplication[]","Description":"Lists the client applications that are preauthorized with the specified delegated permissions to access this application's APIs. Users aren't required to consent to any preauthorized application (for the permissions specified). However, any other permissions not listed in preAuthorizedApplications (requested through incremental consent for example) will require user consent.","Name":"PreAuthorizedApplications","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphAPIOauth2PermissionScopes[]","Description":"List of associated API scopes.","Name":"Oauth2PermissionScopes","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Application."},{"ClassName":"MSFT_MicrosoftGraphAuthenticationBehaviors","Parameters":[{"CIMType":"String","Description":"If false, allows the app to have extended access to Azure AD Graph until June 30, 2025 when Azure AD Graph is fully retired. For more information on Azure AD retirement updates, see June 2024 update on Azure AD Graph API retirement. Use 'Null' to ensure the value is not configured.","Name":"BlockAzureADGraphAccess","Option":"Write","ValueMap":["True","False","Null"],"Values":["True","False","Null"]},{"CIMType":"String","Description":"If true, removes the email claim from tokens sent to an application when the email address's domain can't be verified. Use 'Null' to ensure the value is not configured.","Name":"RemoveUnverifiedEmailClaim","Option":"Write","ValueMap":["True","False","Null"],"Values":["True","False","Null"]}],"Description":"This resource configures an Azure Active Directory Application."},{"ClassName":"MSFT_MicrosoftGraphKeyCredential","Parameters":[{"CIMType":"String","Description":"A 40-character binary type that can be used to identify the credential. Optional. When not provided in the payload, defaults to the thumbprint of the certificate.","Name":"CustomKeyIdentifier","Option":"Write"},{"CIMType":"String","Description":"Friendly name for the key. Optional.","Name":"DisplayName","Option":"Write"},{"CIMType":"String","Description":"The date and time at which the credential expires. The DateTimeOffset type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z.","Name":"EndDateTime","Option":"Write"},{"CIMType":"String","Description":"The unique identifier (GUID) for the key.","Name":"KeyId","Option":"Write"},{"CIMType":"String","Description":"The certificate's raw data in byte array converted to Base64 string.","Name":"Key","Option":"Write"},{"CIMType":"String","Description":"The date and time at which the credential becomes valid.The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z.","Name":"StartDateTime","Option":"Write"},{"CIMType":"String","Description":"The type of key credential for example, Symmetric, AsymmetricX509Cert.","Name":"Type","Option":"Write"},{"CIMType":"String","Description":"A string that describes the purpose for which the key can be used for example, Verify.","Name":"Usage","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Application."},{"ClassName":"MSFT_MicrosoftGraphPasswordCredential","Parameters":[{"CIMType":"String","Description":"Friendly name for the password. Optional.","Name":"DisplayName","Option":"Write"},{"CIMType":"String","Description":"The date and time at which the password expires represented using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z. Optional.","Name":"EndDateTime","Option":"Write"},{"CIMType":"String","Description":"Contains the first three characters of the password. Read-only.","Name":"Hint","Option":"Write"},{"CIMType":"String","Description":"The unique identifier for the password.","Name":"KeyId","Option":"Write"},{"CIMType":"String","Description":"The date and time at which the password becomes valid. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z. Optional.","Name":"StartDateTime","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Application."},{"ClassName":"MSFT_MicrosoftGraphAppRole","Parameters":[{"CIMType":"String[]","Description":"Specifies whether this app role can be assigned to users and groups (by setting to 'User'), to other application's (by setting to 'Application', or both (by setting to 'User', 'Application')). App roles supporting assignment to other applications' service principals are also known as application permissions. The 'Application' value is only supported for app roles defined on application entities.","Name":"AllowedMemberTypes","Option":"Write"},{"CIMType":"String","Description":"The description for the app role. This is displayed when the app role is being assigned and, if the app role functions as an application permission, during consent experiences.","Name":"Description","Option":"Write"},{"CIMType":"String","Description":"Display name for the permission that appears in the app role assignment and consent experiences.","Name":"DisplayName","Option":"Write"},{"CIMType":"String","Description":"Unique role identifier inside the appRoles collection. When creating a new app role, a new GUID identifier must be provided.","Name":"Id","Option":"Write"},{"CIMType":"Boolean","Description":"When creating or updating an app role, this must be set to true (which is the default). To delete a role, this must first be set to false. At that point, in a subsequent call, this role may be removed.","Name":"IsEnabled","Option":"Write"},{"CIMType":"String","Description":"Specifies if the app role is defined on the application object or on the servicePrincipal entity. Must not be included in any POST or PATCH requests. Read-only.","Name":"Origin","Option":"Write"},{"CIMType":"String","Description":"Specifies the value to include in the roles claim in ID tokens and access tokens authenticating an assigned user or service principal. Must not exceed 120 characters in length. Allowed characters are : ! # $ % & ' ( ) * + , - . / : = + _ } , and characters in the ranges 0-9, A-Z and a-z. Any other character, including the space character, aren't allowed. May not begin with ..","Name":"Value","Option":"Key"}],"Description":"This resource configures an Azure Active Directory Application."},{"ClassName":"MSFT_AADApplicationSPA","Parameters":[{"CIMType":"String[]","Description":"Single page application redirect URIs.","Name":"RedirectUris","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Application."},{"ClassName":"MSFT_AADApplication","Parameters":[{"CIMType":"string","Description":"DisplayName of the app","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"ObjectID of the app.","Name":"ObjectId","Option":"Write"},{"CIMType":"String","Description":"AppId for the app.","Name":"AppId","Option":"Write"},{"CIMType":"String","Description":"A free text field to provide a description of the application object to end users. The maximum allowed size is 1024 characters.","Name":"Description","Option":"Write"},{"CIMType":"String","Description":"A bitmask that configures the groups claim issued in a user or OAuth 2.0 access token that the application expects.","Name":"GroupMembershipClaims","Option":"Write"},{"CIMType":"String","Description":"The URL to the application's homepage.","Name":"Homepage","Option":"Write"},{"CIMType":"string[]","Description":"User-defined URI(s) that uniquely identify a Web application within its Azure AD tenant, or within a verified custom domain.","Name":"IdentifierUris","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies the fallback application type as public client, such as an installed application running on a mobile device. The default value is false, which means the fallback application type is confidential client such as web app. There are certain scenarios where Microsoft Entra ID cannot determine the client application type (for example, ROPC flow where it is configured without specifying a redirect URI). In those cases, Microsoft Entra ID will interpret the application type based on the value of this property.","Name":"IsFallbackPublicClient","Option":"Write"},{"CIMType":"string[]","Description":"Client applications that are tied to this resource application.","Name":"KnownClientApplications","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphoptionalClaims","Description":"Application developers can configure optional claims in their Microsoft Entra applications to specify the claims that are sent to their application by the Microsoft security token service. For more information, see How to: Provide optional claims to your app.","Name":"OptionalClaims","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphapiApplication","Description":"Specifies settings for an application that implements a web API.","Name":"Api","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphauthenticationBehaviors","Description":"The collection of breaking change behaviors related to token issuance that are configured for the application. Authentication behaviors are unset by default (null) and must be explicitly enabled or disabled. Nullable. Returned only on $select. For more information about authentication behaviors, see Manage application authenticationBehaviors to avoid unverified use of email claims for user identification or authorization.","Name":"AuthenticationBehaviors","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphpasswordCredential[]","Description":"The collection of password credentials associated with the application. Not nullable.","Name":"PasswordCredentials","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphkeyCredential[]","Description":"The collection of key credentials associated with the application. Not nullable. Supports $filter (eq, not, ge, le).","Name":"KeyCredentials","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphappRole[]","Description":"The collection of roles defined for the application. With app role assignments, these roles can be assigned to users, groups, or service principals associated with other applications. Not nullable.","Name":"AppRoles","Option":"Write"},{"CIMType":"string","Description":"The logout url for this application.","Name":"LogoutURL","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether this application is a public client (such as an installed application running on a mobile device). Default is false.","Name":"PublicClient","Option":"Write"},{"CIMType":"String[]","Description":"Specifies the URLs that user tokens are sent to for sign in, or the redirect URIs that OAuth 2.0 authorization codes and access tokens are sent to.","Name":"ReplyURLs","Option":"Write"},{"CIMType":"String[]","Description":"UPN or ObjectID values of the app's owners.","Name":"Owners","Option":"Write"},{"CIMType":"MSFT_AADApplicationOnPremisesPublishing","Description":"Represents the set of properties required for configuring Application Proxy for this application. Configuring these properties allows you to publish your on-premises application for secure remote access.","Name":"OnPremisesPublishing","Option":"Write"},{"CIMType":"String","Description":"Identifier of the associated Application Template.","Name":"ApplicationTemplateId","Option":"Write"},{"CIMType":"String[]","Description":"List of public clients redirect URIs.","Name":"PublicClientRedirectUris","Option":"Write"},{"CIMType":"MSFT_AADApplicationSpa","Description":"List of single page application settings.","Name":"Spa","Option":"Write"},{"CIMType":"String","Description":"Specifies the Microsoft accounts that are supported for the current application. The possible values are: AzureADMyOrg (default), AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, and PersonalMicrosoftAccount","Name":"SignInAudience","Option":"Write","ValueMap":["AzureADandPersonalMicrosoftAccount","AzureADMultipleOrgs","AzureADMyOrg","PersonalMicrosoftAccount"],"Values":["AzureADandPersonalMicrosoftAccount","AzureADMultipleOrgs","AzureADMyOrg","PersonalMicrosoftAccount"]},{"CIMType":"String","Description":"The Token Lifetime Policy assigned to the application with its DisplayName.","Name":"TokenLifetimePolicy","Option":"Write"},{"CIMType":"String","Description":"Specify if the Azure AD App should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials for the Microsoft Graph delegated permissions.","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_AADApplicationPermission[]","Description":"API permissions for the Azure Active Directory Application.","Name":"Permissions","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Application."},{"ClassName":"MSFT_AADAppManagementPolicyRestrictionsCredential","Parameters":[{"CIMType":"string[]","Description":"Collection of GUIDs of certificateBasedApplicationConfiguration objects that represent trusted certificate authorities. Used when restrictionType is set to trustedCertificateAuthority for keyCredentials.","Name":"CertificateBasedApplicationConfigurationIds","Option":"Write"},{"CIMType":"string","Description":"String value that indicates the maximum lifetime for password expiration, defined as an ISO 8601 duration. For example, P4DT12H30M5S represents four days, 12 hours, 30 minutes, and five seconds. This property is required when restrictionType is set to passwordLifetime.","Name":"MaxLifetime","Option":"Write"},{"CIMType":"string","Description":"Specifies the date from which the policy restriction applies to newly created applications. For existing applications, the enforcement date can be retroactively applied.","Name":"RestrictForAppsCreatedAfterDateTime","Option":"Write"},{"CIMType":"string","Description":"The type of restriction being applied. The possible values are: passwordAddition, passwordLifetime, symmetricKeyAddition, symmetricKeyLifetime, customPasswordAddition, asymmetricKeyLifetime, trustedCertificateAuthority, and unknownFutureValue. Each value of restrictionType can be used only once per policy.","Name":"RestrictionType","Option":"Key"},{"CIMType":"string","Description":"Indicates whether the restriction is evaluated. The possible values are: enabled, disabled, unknownFutureValue. If enabled, the restriction is evaluated. If disabled, the restriction isn't evaluated or enforced.","Name":"State","Option":"Write"}],"Description":"Manages an app management policy that can be assigned to an application or service principal object."},{"ClassName":"MSFT_AADAppManagementPolicyRestrictions","Parameters":[{"CIMType":"MSFT_AADAppManagementPolicyRestrictionsCredential[]","Description":"Collection of keyCredential restrictions settings to be applied to an application or service principal.","Name":"KeyCredentials","Option":"Write"},{"CIMType":"MSFT_AADAppManagementPolicyRestrictionsCredential[]","Description":"Collection of password restrictions settings to be applied to an application or service principal.","Name":"PasswordCredentials","Option":"Write"}],"Description":"Manages an app management policy that can be assigned to an application or service principal object."},{"ClassName":"MSFT_AADAppManagementPolicy","Parameters":[{"CIMType":"String","Description":"The display name of the policy.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"Id of the policy.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"The description of the policy.","Name":"Description","Option":"Required"},{"CIMType":"Boolean","Description":"Denotes whether the policy is enabled.","Name":"IsEnabled","Option":"Write"},{"CIMType":"MSFT_AADAppManagementPolicyRestrictions","Description":"Restrictions that apply to an application or service principal object.","Name":"Restrictions","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Manages an app management policy that can be assigned to an application or service principal object."},{"ClassName":"MSFT_AADAttributeSet","Parameters":[{"CIMType":"String","Description":"Identifier for the attribute set that is unique within a tenant. Can be up to 32 characters long and include Unicode characters. Cannot contain spaces or special characters. Cannot be changed later. Case insensitive","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"Identifier for the attribute set that is unique within a tenant. Can be up to 32 characters long and include Unicode characters. Cannot contain spaces or special characters. Cannot be changed later. Case insensitive","Name":"Description","Option":"Write"},{"CIMType":"UInt32","Description":"Maximum number of custom security attributes that can be defined in this attribute set. Default value is null. If not specified, the administrator can add up to the maximum of 500 active attributes per tenant. Can be changed later.","Name":"MaxAttributesPerSet","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present"],"Values":["Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Represents a group of related custom security attribute definitions."},{"ClassName":"MSFT_AADAuthenticationContextClassReference","Parameters":[{"CIMType":"String","Description":"Identifier used to reference the authentication context class. The id is used to trigger step-up authentication for the referenced authentication requirements and is the value that will be issued in the acrs claim of an access token. This value in the claim is used to verify that the required authentication context has been satisfied. The allowed values are c1 through c25.","Name":"Id","Option":"Key","ValueMap":["c1","c2","c3","c4","c5","c6","c7","c8","c9","c10","c11","c12","c13","c14","c15","c16","c17","c18","c19","c20","c21","c22","c23","c24","c25"],"Values":["c1","c2","c3","c4","c5","c6","c7","c8","c9","c10","c11","c12","c13","c14","c15","c16","c17","c18","c19","c20","c21","c22","c23","c24","c25"]},{"CIMType":"String","Description":"A friendly name that identifies the authenticationContextClassReference object when building user-facing admin experiences. For example, a selection UX","Name":"DisplayName","Option":"Write"},{"CIMType":"String","Description":"A short explanation of the policies that are enforced by authenticationContextClassReference. This value should be used to provide secondary text to describe the authentication context class reference when building user-facing admin experiences. For example, a selection UX.","Name":"Description","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether the authenticationContextClassReference has been published by the security admin and is ready for use by apps. When it's set to false, it shouldn't be shown in admin UX experiences because the value isn't currently available for selection.","Name":"IsAvailable","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Represents a Microsoft Entra authentication context class reference. Authentication context class references are custom values that define a Conditional Access authentication requirement"},{"ClassName":"MSFT_AADAuthenticationFlowPolicy","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"String","Description":"Unique identifier of the Authentication Flow Policy.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Display name of the Authentication Flow Policy.","Name":"DisplayName","Option":"Write"},{"CIMType":"String","Description":"Description of the Authentication Flow Policy.","Name":"Description","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether self-service sign-up flow is enabled or disabled. The default value is false. This property isn't a key. Required.","Name":"SelfServiceSignUpEnabled","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the Azure Active Directory Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Represents the policy configuration of self-service sign-up experience at a tenant level that lets external users request to sign up for approval. It contains information, such as the identifier, display name, and description, and indicates whether self-service sign-up is enabled for the policy."},{"ClassName":"MSFT_MicrosoftGraphRegistrationEnforcement","Parameters":[{"CIMType":"MSFT_MicrosoftGraphAuthenticationMethodsRegistrationCampaign","Description":"Run campaigns to remind users to setup targeted authentication methods.","Name":"AuthenticationMethodsRegistrationCampaign","Option":"Write"}],"Description":"Azure AD Authentication Method Policy"},{"ClassName":"MSFT_MicrosoftGraphAuthenticationMethodsRegistrationCampaign","Parameters":[{"CIMType":"MSFT_MicrosoftGraphExcludeTarget[]","Description":"Users and groups of users that are excluded from being prompted to set up the authentication method.","Name":"ExcludeTargets","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphAuthenticationMethodsRegistrationCampaignIncludeTarget[]","Description":"Users and groups of users that are prompted to set up the authentication method.","Name":"IncludeTargets","Option":"Write"},{"CIMType":"UInt32","Description":"Specifies the number of days that the user sees a prompt again if they select 'Not now' and snoozes the prompt. Minimum 0 days. Maximum: 14 days. If the value is '0' The user is prompted during every MFA attempt.","Name":"SnoozeDurationInDays","Option":"Write"},{"CIMType":"String","Description":"Enable or disable the feature. Possible values are: default, enabled, disabled, unknownFutureValue. The default value is used when the configuration hasn't been explicitly set and uses the default behavior of Azure AD for the setting. The default value is disabled.","Name":"State","Option":"Write","ValueMap":["default","enabled","disabled","unknownFutureValue"],"Values":["default","enabled","disabled","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyExcludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["user","group","unknownFutureValue"],"Values":["user","group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyIncludeTarget","Parameters":[{"CIMType":"String","Description":"The ID of the entity targeted.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"The kind of entity targeted. Possible values are: user, group.","Name":"TargetType","Option":"Write","ValueMap":["user","group","unknownFutureValue"],"Values":["user","group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy"},{"ClassName":"MSFT_MicrosoftGraphExcludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD user or group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: user, group, unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["user","group","unknownFutureValue"],"Values":["user","group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy"},{"ClassName":"MSFT_MicrosoftGraphAuthenticationMethodsRegistrationCampaignIncludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD user or group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The authentication method that the user is prompted to register. The value must be microsoftAuthenticator.","Name":"TargetedAuthenticationMethod","Option":"Required"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: user, group, unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["user","group","unknownFutureValue"],"Values":["user","group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy"},{"ClassName":"MSFT_MicrosoftGraphSystemCredentialPreferences","Parameters":[{"CIMType":"MSFT_AADAuthenticationMethodPolicyExcludeTarget[]","Description":"Users and groups excluded from the preferred authentication method experience of the system.","Name":"ExcludeTargets","Option":"Write"},{"CIMType":"MSFT_AADAuthenticationMethodPolicyIncludeTarget[]","Description":"Users and groups included in the preferred authentication method experience of the system.","Name":"IncludeTargets","Option":"Write"},{"CIMType":"String","Description":"Indicates whether the feature is enabled or disabled. Possible values are: default, enabled, disabled, unknownFutureValue. The default value is used when the configuration hasn't been explicitly set, and uses the default behavior of Azure Active Directory for the setting. The default value is disabled.","Name":"State","Option":"Write","ValueMap":["default","enabled","disabled","unknownFutureValue"],"Values":["default","enabled","disabled","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy"},{"ClassName":"MSFT_MicrosoftGraphReportSuspiciousActivitySettings","Parameters":[{"CIMType":"MSFT_AADAuthenticationMethodPolicyIncludeTarget","Description":"Group IDs in scope for report suspicious activity.","Name":"IncludeTarget","Option":"Write"},{"CIMType":"String","Description":"Specifies the state of the reportSuspiciousActivitySettings object.","Name":"State","Option":"Write","ValueMap":["default","enabled","disabled","unknownFutureValue"],"Values":["default","enabled","disabled","unknownFutureValue"]},{"CIMType":"UInt32","Description":"Specifies the number the user enters on their phone to report the MFA prompt as suspicious.","Name":"VoiceReportingCode","Option":"Write"}],"Description":"Azure AD Authentication Method Policy"},{"ClassName":"MSFT_AADAuthenticationMethodPolicy","Parameters":[{"CIMType":"UInt32","Description":"Days before the user will be asked to reconfirm their method.","Name":"ReconfirmationInDays","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphregistrationEnforcement","Description":"Enforce registration at sign-in time. This property can be used to remind users to set up targeted authentication methods.","Name":"RegistrationEnforcement","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphreportSuspiciousActivitySettings","Description":"Allows users to report suspicious activities if they receive an authentication request that they did not initiate.","Name":"ReportSuspiciousActivitySettings","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphsystemCredentialPreferences","Description":"Prompt users with their most-preferred credential for multifactor authentication.","Name":"SystemCredentialPreferences","Option":"Write"},{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Authentication Method Policy"},{"ClassName":"MSFT_MicrosoftGraphMicrosoftAuthenticatorFeatureSettings","Parameters":[{"CIMType":"MSFT_MicrosoftGraphAuthenticationMethodFeatureConfiguration","Description":"Determines whether users will be able to approve push notifications on other Microsoft applications such as Outlook Mobile.","Name":"CompanionAppAllowedState","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphAuthenticationMethodFeatureConfiguration","Description":"Determines whether the user's Authenticator app will show them the client app they are signing into.","Name":"DisplayAppInformationRequiredState","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphAuthenticationMethodFeatureConfiguration","Description":"Determines whether the user's Authenticator app will show them the geographic location of where the authentication request originated from.","Name":"DisplayLocationInformationRequiredState","Option":"Write"}],"Description":"Azure AD Authentication Method Policy Authenticator"},{"ClassName":"MSFT_MicrosoftGraphAuthenticationMethodFeatureConfiguration","Parameters":[{"CIMType":"MSFT_AADAuthenticationMethodPolicyAuthenticatorFeatureTarget","Description":"A single entity that's excluded from using this feature.","Name":"ExcludeTarget","Option":"Write"},{"CIMType":"MSFT_AADAuthenticationMethodPolicyAuthenticatorFeatureTarget","Description":"A single entity that's allowed to use this feature.","Name":"IncludeTarget","Option":"Write"},{"CIMType":"String","Description":"Enable or disable the feature. Possible values are: default, enabled, disabled, unknownFutureValue. The default value is used when the configuration hasn't been explicitly set and uses the default behavior of Azure AD for the setting. The default value is disabled.","Name":"State","Option":"Write","ValueMap":["default","enabled","disabled","unknownFutureValue"],"Values":["default","enabled","disabled","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy Authenticator"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyAuthenticatorFeatureTarget","Parameters":[{"CIMType":"String","Description":"The ID of the entity that's targeted in the include or exclude rule or all_users to target all users.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"The kind of entity that's targeted. The possible values are: group, administrativeUnit, role, unknownFutureValue.","Name":"TargetType","Option":"Write","ValueMap":["group","administrativeUnit","role","unknownFutureValue"],"Values":["group","administrativeUnit","role","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy Authenticator"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyAuthenticatorExcludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy Authenticator"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyAuthenticatorIncludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy Authenticator"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyAuthenticator","Parameters":[{"CIMType":"MSFT_MicrosoftGraphMicrosoftAuthenticatorFeatureSettings","Description":"A collection of Microsoft Authenticator settings such as number matching and location context, and whether they are enabled for all users or specific users only.","Name":"FeatureSettings","Option":"Write"},{"CIMType":"Boolean","Description":"true if users can use the OTP code generated by the Microsoft Authenticator app, false otherwise.","Name":"IsSoftwareOathEnabled","Option":"Write"},{"CIMType":"MSFT_AADAuthenticationMethodPolicyAuthenticatorExcludeTarget[]","Description":"Displayname of the groups of users that are excluded from a policy.","Name":"ExcludeTargets","Option":"Write"},{"CIMType":"MSFT_AADAuthenticationMethodPolicyAuthenticatorIncludeTarget[]","Description":"Displayname of the groups of users that are included from a policy.","Name":"IncludeTargets","Option":"Write"},{"CIMType":"String","Description":"The state of the policy. Possible values are: enabled, disabled.","Name":"State","Option":"Write","ValueMap":["enabled","disabled"],"Values":["enabled","disabled"]},{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"Id","Option":"Key"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Authentication Method Policy Authenticator"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyEmailExcludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy Email"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyEmailIncludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy Email"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyEmail","Parameters":[{"CIMType":"String","Description":"Determines whether email OTP is usable by external users for authentication. Possible values are: default, enabled, disabled, unknownFutureValue. Tenants in the default state who did not use public preview will automatically have email OTP enabled beginning in October 2021.","Name":"AllowExternalIdToUseEmailOtp","Option":"Write","ValueMap":["default","enabled","disabled","unknownFutureValue"],"Values":["default","enabled","disabled","unknownFutureValue"]},{"CIMType":"MSFT_AADAuthenticationMethodPolicyEmailExcludeTarget[]","Description":"Displayname of the groups of users that are excluded from a policy.","Name":"ExcludeTargets","Option":"Write"},{"CIMType":"MSFT_AADAuthenticationMethodPolicyEmailIncludeTarget[]","Description":"Displayname of the groups of users that are included from a policy.","Name":"IncludeTargets","Option":"Write"},{"CIMType":"String","Description":"The state of the policy. Possible values are: enabled, disabled.","Name":"State","Option":"Write","ValueMap":["enabled","disabled"],"Values":["enabled","disabled"]},{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"Id","Option":"Key"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Authentication Method Policy Email"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyExternalExcludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy External"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyExternalIncludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy External"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyExternalOpenIdConnectSetting","Parameters":[{"CIMType":"String","Description":"The Microsoft Entra ID's client ID as generated by the provider or admin to identify Microsoft Entra ID.","Name":"ClientId","Option":"Write"},{"CIMType":"String","Description":"The host URL of the external identity provider's OIDC discovery endpoint.","Name":"DiscoveryUrl","Option":"Write"}],"Description":"Azure AD Authentication Method Policy External"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyExternal","Parameters":[{"CIMType":"MSFT_AADAuthenticationMethodPolicyExternalExcludeTarget[]","Description":"Displayname of the groups of users that are excluded from a policy.","Name":"ExcludeTargets","Option":"Write"},{"CIMType":"MSFT_AADAuthenticationMethodPolicyExternalIncludeTarget[]","Description":"Displayname of the groups of users that are included from a policy.","Name":"IncludeTargets","Option":"Write"},{"CIMType":"MSFT_AADAuthenticationMethodPolicyExternalOpenIdConnectSetting","Description":"Open ID Connection settings used by this external authentication method.","Name":"OpenIdConnectSetting","Option":"Write"},{"CIMType":"String","Description":"The state of the policy. Possible values are: enabled, disabled.","Name":"State","Option":"Write","ValueMap":["enabled","disabled"],"Values":["enabled","disabled"]},{"CIMType":"String","Description":"The appId for the app registration in Microsoft Entra ID representing the integration with the external provider.","Name":"AppId","Option":"Write"},{"CIMType":"String","Description":"The displayName of the authentication policy configuration. Read-only.","Name":"DisplayName","Option":"Key"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Authentication Method Policy External"},{"ClassName":"MSFT_MicrosoftGraphFido2KeyRestrictions","Parameters":[{"CIMType":"String[]","Description":"A collection of Authenticator Attestation GUIDs. AADGUIDs define key types and manufacturers.","Name":"AaGuids","Option":"Write"},{"CIMType":"String","Description":"Enforcement type. Possible values are: allow, block.","Name":"EnforcementType","Option":"Write","ValueMap":["allow","block","unknownFutureValue"],"Values":["allow","block","unknownFutureValue"]},{"CIMType":"Boolean","Description":"Determines if the configured key enforcement is enabled.","Name":"IsEnforced","Option":"Write"}],"Description":"Azure AD Authentication Method Policy Fido2"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyFido2ExcludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]},{"CIMType":"Boolean","Description":"Determines if registration is required for the authentication method.","Name":"IsRegistrationRequired","Option":"Write"},{"CIMType":"String[]","Description":"Collection of allowed passkey profile IDs for this target.","Name":"AllowedPasskeyProfiles","Option":"Write"}],"Description":"Azure AD Authentication Method Policy Fido2"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyFido2IncludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]},{"CIMType":"Boolean","Description":"Determines if registration is required for the authentication method.","Name":"IsRegistrationRequired","Option":"Write"},{"CIMType":"String[]","Description":"Collection of allowed passkey profile IDs for this target.","Name":"AllowedPasskeyProfiles","Option":"Write"}],"Description":"Azure AD Authentication Method Policy Fido2"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyFido2PasskeyProfile","Parameters":[{"CIMType":"String","Description":"The unique identifier for the passkey profile.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"The display name for the passkey profile.","Name":"Name","Option":"Key"},{"CIMType":"String","Description":"The passkey types supported by this profile.","Name":"PasskeyTypes","Option":"Write","ValueMap":["deviceBound","deviceBound","synced","crossDevice","synced"],"Values":["deviceBound","deviceBound","synced","crossDevice","synced"]},{"CIMType":"String","Description":"The attestation enforcement level for this profile.","Name":"AttestationEnforcement","Option":"Write","ValueMap":["disabled","registrationOnly","registrationAndSignIn"],"Values":["disabled","registrationOnly","registrationAndSignIn"]},{"CIMType":"MSFT_MicrosoftGraphFido2KeyRestrictions","Description":"Key restrictions for this passkey profile.","Name":"KeyRestrictions","Option":"Write"}],"Description":"Azure AD Authentication Method Policy Fido2"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyFido2","Parameters":[{"CIMType":"Boolean","Description":"Determines whether attestation must be enforced for FIDO2 security key registration.","Name":"IsAttestationEnforced","Option":"Write"},{"CIMType":"Boolean","Description":"Determines if users can register new FIDO2 security keys.","Name":"IsSelfServiceRegistrationAllowed","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphFido2KeyRestrictions","Description":"Controls whether key restrictions are enforced on FIDO2 security keys, either allowing or disallowing certain key types as defined by Authenticator Attestation GUID (AAGUID), an identifier that indicates the type (e.g. make and model) of the authenticator.","Name":"KeyRestrictions","Option":"Write"},{"CIMType":"MSFT_AADAuthenticationMethodPolicyFido2ExcludeTarget[]","Description":"Displayname of the groups of users that are excluded from a policy.","Name":"ExcludeTargets","Option":"Write"},{"CIMType":"MSFT_AADAuthenticationMethodPolicyFido2IncludeTarget[]","Description":"Displayname of the groups of users that are included from a policy.","Name":"IncludeTargets","Option":"Write"},{"CIMType":"MSFT_AADAuthenticationMethodPolicyFido2PasskeyProfile[]","Description":"Passkey profiles configuration for FIDO2 authentication.","Name":"PasskeyProfiles","Option":"Write"},{"CIMType":"String","Description":"The state of the policy. Possible values are: enabled, disabled.","Name":"State","Option":"Write","ValueMap":["enabled","disabled"],"Values":["enabled","disabled"]},{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"Id","Option":"Key"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Authentication Method Policy Fido2"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyHardwareExcludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy Hardware"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyHardwareIncludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy Hardware"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyHardware","Parameters":[{"CIMType":"MSFT_AADAuthenticationMethodPolicyHardwareExcludeTarget[]","Description":"Displayname of the groups of users that are excluded from a policy.","Name":"ExcludeTargets","Option":"Write"},{"CIMType":"MSFT_AADAuthenticationMethodPolicyHardwareIncludeTarget[]","Description":"Displayname of the groups of users that are included from a policy.","Name":"IncludeTargets","Option":"Write"},{"CIMType":"String","Description":"The state of the policy. Possible values are: enabled, disabled.","Name":"State","Option":"Write","ValueMap":["enabled","disabled"],"Values":["enabled","disabled"]},{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"Id","Option":"Key"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Authentication Method Policy Hardware"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyQRCodeImageExcludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]}],"Description":"This resource configures an Azure AD Authentication Method Policy QR Code Image."},{"ClassName":"MSFT_AADAuthenticationMethodPolicyQRCodeImageIncludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]}],"Description":"This resource configures an Azure AD Authentication Method Policy QR Code Image."},{"ClassName":"MSFT_AADAuthenticationMethodPolicyQRCodeImage","Parameters":[{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"Id","Option":"Key"},{"CIMType":"MSFT_AADAuthenticationMethodPolicyQRCodeImageExcludeTarget[]","Description":"Displayname of the groups of users that are excluded from a policy.","Name":"ExcludeTargets","Option":"Write"},{"CIMType":"MSFT_AADAuthenticationMethodPolicyQRCodeImageIncludeTarget[]","Description":"Displayname of the groups of users that are included from a policy.","Name":"IncludeTargets","Option":"Write"},{"CIMType":"String","Description":"The state of the policy. Possible values are: enabled, disabled.","Name":"State","Option":"Write","ValueMap":["enabled","disabled"],"Values":["enabled","disabled"]},{"CIMType":"UInt32","Description":"Lifetime in days of the qr code.","Name":"StandardQRCodeLifetimeInDays","Option":"Write"},{"CIMType":"UInt32","Description":"Length of the PIN.","Name":"PinLength","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures an Azure AD Authentication Method Policy QR Code Image."},{"ClassName":"MSFT_AADAuthenticationMethodPolicySmsExcludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy Sms"},{"ClassName":"MSFT_AADAuthenticationMethodPolicySmsIncludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy Sms"},{"ClassName":"MSFT_AADAuthenticationMethodPolicySms","Parameters":[{"CIMType":"MSFT_AADAuthenticationMethodPolicySmsExcludeTarget[]","Description":"Displayname of the groups of users that are excluded from a policy.","Name":"ExcludeTargets","Option":"Write"},{"CIMType":"MSFT_AADAuthenticationMethodPolicySmsIncludeTarget[]","Description":"Displayname of the groups of users that are included from a policy.","Name":"IncludeTargets","Option":"Write"},{"CIMType":"String","Description":"The state of the policy. Possible values are: enabled, disabled.","Name":"State","Option":"Write","ValueMap":["enabled","disabled"],"Values":["enabled","disabled"]},{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"Id","Option":"Key"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Authentication Method Policy Sms"},{"ClassName":"MSFT_AADAuthenticationMethodPolicySoftwareExcludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy Software"},{"ClassName":"MSFT_AADAuthenticationMethodPolicySoftwareIncludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy Software"},{"ClassName":"MSFT_AADAuthenticationMethodPolicySoftware","Parameters":[{"CIMType":"MSFT_AADAuthenticationMethodPolicySoftwareExcludeTarget[]","Description":"Displayname of the groups of users that are excluded from a policy.","Name":"ExcludeTargets","Option":"Write"},{"CIMType":"MSFT_AADAuthenticationMethodPolicySoftwareIncludeTarget[]","Description":"Displayname of the groups of users that are included from a policy.","Name":"IncludeTargets","Option":"Write"},{"CIMType":"String","Description":"The state of the policy. Possible values are: enabled, disabled.","Name":"State","Option":"Write","ValueMap":["enabled","disabled"],"Values":["enabled","disabled"]},{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"Id","Option":"Key"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Authentication Method Policy Software"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyTemporaryExcludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy Temporary"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyTemporaryIncludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy Temporary"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyTemporary","Parameters":[{"CIMType":"UInt32","Description":"Default length in characters of a Temporary Access Pass object. Must be between 8 and 48 characters.","Name":"DefaultLength","Option":"Write"},{"CIMType":"UInt32","Description":"Default lifetime in minutes for a Temporary Access Pass. Value can be any integer between the minimumLifetimeInMinutes and maximumLifetimeInMinutes.","Name":"DefaultLifetimeInMinutes","Option":"Write"},{"CIMType":"Boolean","Description":"If true, all the passes in the tenant will be restricted to one-time use. If false, passes in the tenant can be created to be either one-time use or reusable.","Name":"IsUsableOnce","Option":"Write"},{"CIMType":"UInt32","Description":"Maximum lifetime in minutes for any Temporary Access Pass created in the tenant. Value can be between 10 and 43200 minutes (equivalent to 30 days).","Name":"MaximumLifetimeInMinutes","Option":"Write"},{"CIMType":"UInt32","Description":"Minimum lifetime in minutes for any Temporary Access Pass created in the tenant. Value can be between 10 and 43200 minutes (equivalent to 30 days).","Name":"MinimumLifetimeInMinutes","Option":"Write"},{"CIMType":"MSFT_AADAuthenticationMethodPolicyTemporaryExcludeTarget[]","Description":"Displayname of the groups of users that are excluded from a policy.","Name":"ExcludeTargets","Option":"Write"},{"CIMType":"MSFT_AADAuthenticationMethodPolicyTemporaryIncludeTarget[]","Description":"Displayname of the groups of users that are included from a policy.","Name":"IncludeTargets","Option":"Write"},{"CIMType":"String","Description":"The state of the policy. Possible values are: enabled, disabled.","Name":"State","Option":"Write","ValueMap":["enabled","disabled"],"Values":["enabled","disabled"]},{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"Id","Option":"Key"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Authentication Method Policy Temporary"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyVoiceExcludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy Voice"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyVoiceIncludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy Voice"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyVoice","Parameters":[{"CIMType":"Boolean","Description":"true if users can register office phones, otherwise, false.","Name":"IsOfficePhoneAllowed","Option":"Write"},{"CIMType":"MSFT_AADAuthenticationMethodPolicyVoiceExcludeTarget[]","Description":"Displayname of the groups of users that are excluded from a policy.","Name":"ExcludeTargets","Option":"Write"},{"CIMType":"MSFT_AADAuthenticationMethodPolicyVoiceIncludeTarget[]","Description":"Displayname of the groups of users that are included from a policy.","Name":"IncludeTargets","Option":"Write"},{"CIMType":"String","Description":"The state of the policy. Possible values are: enabled, disabled.","Name":"State","Option":"Write","ValueMap":["enabled","disabled"],"Values":["enabled","disabled"]},{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"Id","Option":"Key"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Authentication Method Policy Voice"},{"ClassName":"MSFT_MicrosoftGraphX509CertificateAuthenticationModeConfiguration","Parameters":[{"CIMType":"MSFT_MicrosoftGraphX509CertificateRule[]","Description":"Rules are configured in addition to the authentication mode to bind a specific x509CertificateRuleType to an x509CertificateAuthenticationMode. For example, bind the policyOID with identifier 1.32.132.343 to x509CertificateMultiFactor authentication mode.","Name":"Rules","Option":"Write"},{"CIMType":"String","Description":"The type of strong authentication mode. The possible values are: x509CertificateSingleFactor, x509CertificateMultiFactor, unknownFutureValue.","Name":"X509CertificateAuthenticationDefaultMode","Option":"Write","ValueMap":["x509CertificateSingleFactor","x509CertificateMultiFactor","unknownFutureValue"],"Values":["x509CertificateSingleFactor","x509CertificateMultiFactor","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy X509"},{"ClassName":"MSFT_MicrosoftGraphX509CertificateRule","Parameters":[{"CIMType":"String","Description":"The identifier of the X.509 certificate. Required.","Name":"Identifier","Option":"Key"},{"CIMType":"String","Description":"The type of strong authentication mode. The possible values are: x509CertificateSingleFactor, x509CertificateMultiFactor, unknownFutureValue. Required.","Name":"X509CertificateAuthenticationMode","Option":"Required","ValueMap":["x509CertificateSingleFactor","x509CertificateMultiFactor","unknownFutureValue"],"Values":["x509CertificateSingleFactor","x509CertificateMultiFactor","unknownFutureValue"]},{"CIMType":"String","Description":"The type of the X.509 certificate mode configuration rule. The possible values are: issuerSubject, policyOID, unknownFutureValue. Required.","Name":"X509CertificateRuleType","Option":"Write","ValueMap":["issuerSubject","policyOID","unknownFutureValue"],"Values":["issuerSubject","policyOID","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy X509"},{"ClassName":"MSFT_MicrosoftGraphX509CertificateUserBinding","Parameters":[{"CIMType":"UInt32","Description":"The priority of the binding. Azure AD uses the binding with the highest priority. This value must be a non-negative integer and unique in the collection of objects in the certificateUserBindings property of an x509CertificateAuthenticationMethodConfiguration object. Required","Name":"Priority","Option":"Write"},{"CIMType":"String","Description":"Defines the Azure AD user property of the user object to use for the binding. The possible values are: userPrincipalName, onPremisesUserPrincipalName, email. Required.","Name":"UserProperty","Option":"Required"},{"CIMType":"String","Description":"The field on the X.509 certificate to use for the binding. The possible values are: PrincipalName, RFC822Name.","Name":"X509CertificateField","Option":"Write"}],"Description":"Azure AD Authentication Method Policy X509"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyX509ExcludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy X509"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyX509IncludeTarget","Parameters":[{"CIMType":"String","Description":"The object identifier of an Azure AD group.","Name":"Id","Option":"Key"},{"CIMType":"Boolean","Description":"Determines if the user is enforced to register the authentication method.","Name":"isRegistrationRequired","Option":"Write"},{"CIMType":"String","Description":"The type of the authentication method target. Possible values are: group and unknownFutureValue.","Name":"TargetType","Option":"Key","ValueMap":["group","unknownFutureValue"],"Values":["group","unknownFutureValue"]}],"Description":"Azure AD Authentication Method Policy X509"},{"ClassName":"MSFT_AADAuthenticationMethodPolicyX509","Parameters":[{"CIMType":"MSFT_MicrosoftGraphx509CertificateAuthenticationModeConfiguration","Description":"Defines strong authentication configurations. This configuration includes the default authentication mode and the different rules for strong authentication bindings.","Name":"AuthenticationModeConfiguration","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphx509CertificateUserBinding[]","Description":"Defines fields in the X.509 certificate that map to attributes of the Azure AD user object in order to bind the certificate to the user. The priority of the object determines the order in which the binding is carried out. The first binding that matches will be used and the rest ignored.","Name":"CertificateUserBindings","Option":"Write"},{"CIMType":"MSFT_AADAuthenticationMethodPolicyX509ExcludeTarget[]","Description":"Displayname of the groups of users that are excluded from a policy.","Name":"ExcludeTargets","Option":"Write"},{"CIMType":"MSFT_AADAuthenticationMethodPolicyX509IncludeTarget[]","Description":"Displayname of the groups of users that are included from a policy.","Name":"IncludeTargets","Option":"Write"},{"CIMType":"String","Description":"The state of the policy. Possible values are: enabled, disabled.","Name":"State","Option":"Write","ValueMap":["enabled","disabled"],"Values":["enabled","disabled"]},{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"Id","Option":"Key"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Authentication Method Policy X509"},{"ClassName":"MSFT_AADAuthenticationRequirement","Parameters":[{"CIMType":"String","Description":"The state of the MFA enablement for the user. Possible values are: enabled, disabled.","Name":"PerUserMfaState","Option":"Write","ValueMap":["enabled","disabled"],"Values":["enabled","disabled"]},{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"UserPrincipalName","Option":"Key"},{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Authentication Requirement Resource to set up Per-User MFA settings"},{"ClassName":"MSFT_AADAuthenticationStrengthPolicy","Parameters":[{"CIMType":"String","Description":"The name of the policy.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"A description of the policy.","Name":"Description","Option":"Write"},{"CIMType":"String","Description":"The unique identifier of the policy.","Name":"Id","Option":"Write"},{"CIMType":"String[]","Description":"The authentication method combinations allowed by this authentication strength policy.","Name":"AllowedCombinations","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Authentication Strength Policy"},{"ClassName":"MSFT_AADAuthorizationPolicy","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"String","Description":"Display name for this policy.","Name":"DisplayName","Option":"Write"},{"CIMType":"String","Description":"Description of this policy.","Name":"Description","Option":"Write"},{"CIMType":"Boolean","Description":"Boolean Indicates whether users can sign up for email based subscriptions.","Name":"AllowedToSignUpEmailBasedSubscriptions","Option":"Write"},{"CIMType":"Boolean","Description":"Boolean Indicates whether the Self-Serve Password Reset feature can be used by users on the tenant.","Name":"AllowedToUseSSPR","Option":"Write"},{"CIMType":"Boolean","Description":"Boolean Indicates whether a user can join the tenant by email validation.","Name":"AllowEmailVerifiedUsersToJoinOrganization","Option":"Write"},{"CIMType":"String","Description":"Indicates who can invite external users to the organization. Possible values are: None, AdminsAndGuestInviters, AdminsGuestInvitersAndAllMembers, Everyone. Everyone is the default setting for all cloud environments except US Government.","Name":"AllowInvitesFrom","Option":"Write","ValueMap":["None","AdminsAndGuestInviters","AdminsGuestInvitersAndAllMembers","Everyone"],"Values":["None","AdminsAndGuestInviters","AdminsGuestInvitersAndAllMembers","Everyone"]},{"CIMType":"Boolean","Description":"Indicates whether user consent for risky apps is allowed.","Name":"AllowUserConsentForRiskyApps","Option":"Write"},{"CIMType":"Boolean","Description":"Boolean To disable the use of MSOL PowerShell, set this property to true. This will also disable user-based access to the legacy service endpoint used by MSOL PowerShell. This does not affect Azure AD Connect or Microsoft Graph.","Name":"BlockMsolPowershell","Option":"Write"},{"CIMType":"Boolean","Description":"Boolean Indicates whether the default user role can create applications.","Name":"DefaultUserRoleAllowedToCreateApps","Option":"Write"},{"CIMType":"Boolean","Description":"Boolean Indicates whether the default user role can create security groups.","Name":"DefaultUserRoleAllowedToCreateSecurityGroups","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether the registered owners of a device can read their own BitLocker recovery keys with default user role.","Name":"DefaultUserRoleAllowedToReadBitlockerKeysForOwnedDevice","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether the default user role can create tenants. This setting corresponds to the Restrict non-admin users from creating tenants setting in the User settings menu in the Azure portal. When this setting is false, users assigned the Tenant Creator role can still create tenants.","Name":"DefaultUserRoleAllowedToCreateTenants","Option":"Write"},{"CIMType":"Boolean","Description":"Boolean Indicates whether the default user role can read other users.","Name":"DefaultUserRoleAllowedToReadOtherUsers","Option":"Write"},{"CIMType":"String","Description":"The role that should be granted to guest users. Refer to List unifiedRoleDefinitions to find the list of available role templates. Only supported roles today are User, Guest User, and Restricted Guest User (2af84b1e-32c8-42b7-82bc-daa82404023b).","Name":"GuestUserRole","Option":"Write","ValueMap":["Guest","RestrictedGuest","User"],"Values":["Guest","RestrictedGuest","User"]},{"CIMType":"String[]","Description":"String collection Indicates if user consent to apps is allowed, and if it is, which permission to grant consent and which app consent policy (permissionGrantPolicy) govern the permission for users to grant consent. Value should be in the format managePermissionGrantsForSelf.{id}, where {id} is the id of a built-in or custom app consent policy. An empty list indicates user consent to apps is disabled.","Name":"PermissionGrantPolicyIdsAssignedToDefaultUserRole","Option":"Write"},{"CIMType":"String","Description":"Specify that the Azure Authorization Policy should exist.","Name":"Ensure","Option":"Write","ValueMap":["Present"],"Values":["Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials for the Microsoft Graph delegated permissions.","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures AAD Authorization Policies."},{"ClassName":"MSFT_AADB2CAuthenticationMethodsPolicy","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"Boolean","Description":"The tenant admin can configure local accounts using email if the email and password authentication method is enabled.","Name":"IsEmailPasswordAuthenticationEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"The tenant admin can configure local accounts using username if the username and password authentication method is enabled.","Name":"IsUserNameAuthenticationEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"The tenant admin can configure local accounts using phone number if the phone number and one-time password authentication method is enabled.","Name":"IsPhoneOneTimePasswordAuthenticationEnabled","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"B2C allows tenant admins to choose a mechanism for letting end users register via local accounts."},{"ClassName":"MSFT_AADCertificateBasedApplicationConfigurationTrustedCertificateAuthority","Parameters":[{"CIMType":"String","Description":"The certificate data in base64 encoded format.","Name":"Certificate","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates if the certificate is a root authority.","Name":"IsRootAuthority","Option":"Write"},{"CIMType":"String","Description":"The issuer of the certificate.","Name":"Issuer","Option":"Write"},{"CIMType":"String","Description":"The subject key identifier of the issuer.","Name":"IssuerSubjectKeyIdentifier","Option":"Write"}],"Description":"Manages certificate-based application configurations that define trusted certificate authorities for application authentication in Azure AD. These configurations are global tenant-wide objects that can be referenced by multiple app management policies."},{"ClassName":"MSFT_AADCertificateBasedApplicationConfiguration","Parameters":[{"CIMType":"String","Description":"Display name for the configuration.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"The unique identifier for the configuration.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Description for the configuration.","Name":"Description","Option":"Write"},{"CIMType":"MSFT_AADCertificateBasedApplicationConfigurationTrustedCertificateAuthority[]","Description":"Collection of trusted certificate authorities.","Name":"TrustedCertificateAuthorities","Option":"Write"},{"CIMType":"String","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Manages certificate-based application configurations that define trusted certificate authorities for application authentication in Azure AD. These configurations are global tenant-wide objects that can be referenced by multiple app management policies."},{"ClassName":"MSFT_AADClaimsMappingPolicyDefinitionMappingPolicyClaimsTransformationInputParameter","Parameters":[{"CIMType":"String","Description":"The value of the input parameters of the claims transformation in the claims mapping policy.","Name":"Value","Option":"Write"},{"CIMType":"String","Description":"The object identifier of the input parameters of the claims transformation in the claims mapping policy.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"The data type of the input parameters of the claims transformation in the claims mapping policy.","Name":"DataType","Option":"Write"}],"Description":"Azure AD Claims Mapping Policy"},{"ClassName":"MSFT_AADClaimsMappingPolicyDefinitionMappingPolicyClaimsTransformationOutputClaims","Parameters":[{"CIMType":"String","Description":"The claim type reference ID of the output claims of the claims transformation in the claims mapping policy.","Name":"ClaimTypeReferenceId","Option":"Write"},{"CIMType":"String","Description":"The transformation type of the output claims of the claims transformation in the claims mapping policy.","Name":"TransformationClaimType","Option":"Write"}],"Description":"Azure AD Claims Mapping Policy"},{"ClassName":"MSFT_AADClaimsMappingPolicyDefinitionMappingPolicyClaimsTransformation","Parameters":[{"CIMType":"String","Description":"The object identifier of the claims transformation in the claims mapping policy.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"The transformation method of the claims transformation in the claims mapping policy.","Name":"TransformationMethod","Option":"Write"},{"CIMType":"MSFT_AADClaimsMappingPolicyDefinitionMappingPolicyClaimsTransformationInputParameter[]","Description":"The list of input parameters of the claims transformation in the claims mapping policy.","Name":"InputParameters","Option":"Write"},{"CIMType":"MSFT_AADClaimsMappingPolicyDefinitionMappingPolicyClaimsTransformationOutputClaims[]","Description":"The list of output claims of the claims transformation in the claims mapping policy.","Name":"OutputClaims","Option":"Write"}],"Description":"Azure AD Claims Mapping Policy"},{"ClassName":"MSFT_AADClaimsMappingPolicyDefinitionMappingPolicyClaimsSchema","Parameters":[{"CIMType":"String","Description":"The source name of the claims schema in the claims mapping policy.","Name":"Source","Option":"Write"},{"CIMType":"String","Description":"The object identifier of the claims schema in the claims mapping policy.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"The SAML claims type of the claims schema in the claims mapping policy.","Name":"SamlClaimType","Option":"Write"}],"Description":"Azure AD Claims Mapping Policy"},{"ClassName":"MSFT_AADClaimsMappingPolicyDefinitionMappingPolicy","Parameters":[{"CIMType":"uint32","Description":"Set value of 1. Required.","Name":"Version","Option":"Write"},{"CIMType":"Boolean","Description":"If set to true, all claims in the basic claim set are emitted in tokens affected by the policy. If set to false, claims in the basic claim set are not in the tokens, unless they are individually added in the ClaimsSchema property of the same policy.","Name":"IncludeBasicClaimSet","Option":"Write"},{"CIMType":"MSFT_AADClaimsMappingPolicyDefinitionMappingPolicyClaimsSchema[]","Description":"Defines which claims are present in the tokens affected by the policy, in addition to the basic claim set and the core claim set.","Name":"ClaimsSchema","Option":"Write"},{"CIMType":"MSFT_AADClaimsMappingPolicyDefinitionMappingPolicyClaimsTransformation[]","Description":"Defines common transformations that can be applied to source data, to generate the output data for claims specified in the ClaimsSchema.","Name":"ClaimsTransformation","Option":"Write"}],"Description":"Azure AD Claims Mapping Policy"},{"ClassName":"MSFT_AADClaimsMappingPolicyDefinition","Parameters":[{"CIMType":"MSFT_AADClaimsMappingPolicyDefinitionMappingPolicy","Description":"Rules and settings of the policy.","Name":"ClaimsMappingPolicy","Option":"Write"}],"Description":"Azure AD Claims Mapping Policy"},{"ClassName":"MSFT_AADClaimsMappingPolicy","Parameters":[{"CIMType":"MSFT_AADClaimsMappingPolicyDefinition[]","Description":"A string collection containing a JSON string that defines the rules and settings for a policy. The syntax for the definition differs for each derived policy type. Required.","Name":"Definition","Option":"Write"},{"CIMType":"Boolean","Description":"If set to true, activates this policy. There can be many policies for the same policy type, but only one can be activated as the organization default. Optional, default value is false.","Name":"IsOrganizationDefault","Option":"Write"},{"CIMType":"String","Description":"Description for this policy. Required.","Name":"Description","Option":"Write"},{"CIMType":"String","Description":"Display name for this policy. Required.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"Id","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Claims Mapping Policy"},{"ClassName":"MSFT_AADConditionalAccessPolicy","Parameters":[{"CIMType":"String","Description":"DisplayName of the AAD CA Policy","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"Specifies the GUID for the Policy.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Specifies the State of the Policy.","Name":"State","Option":"Write","ValueMap":["disabled","enabled","enabledForReportingButNotEnforced"],"Values":["disabled","enabled","enabledForReportingButNotEnforced"]},{"CIMType":"String[]","Description":"Cloud Apps in scope of the Policy.","Name":"IncludeApplications","Option":"Write"},{"CIMType":"String","Description":"Rule syntax is similar to that used for membership rules for groups in Microsoft Entra ID.","Name":"ApplicationsFilter","Option":"Write"},{"CIMType":"String","Description":"Mode to use for the filter. Possible values are include or exclude.","Name":"ApplicationsFilterMode","Option":"Write","ValueMap":["include","exclude"],"Values":["include","exclude"]},{"CIMType":"String[]","Description":"Cloud Apps out of scope of the Policy.","Name":"ExcludeApplications","Option":"Write"},{"CIMType":"String[]","Description":"User Actions in scope of the Policy.","Name":"IncludeUserActions","Option":"Write"},{"CIMType":"String[]","Description":"Users in scope of the Policy.","Name":"IncludeUsers","Option":"Write"},{"CIMType":"String[]","Description":"Users out of scope of the Policy.","Name":"ExcludeUsers","Option":"Write"},{"CIMType":"String[]","Description":"Groups in scope of the Policy.","Name":"IncludeGroups","Option":"Write"},{"CIMType":"String[]","Description":"Groups out of scope of the Policy.","Name":"ExcludeGroups","Option":"Write"},{"CIMType":"String[]","Description":"AAD Admin Roles in scope of the Policy.","Name":"IncludeRoles","Option":"Write"},{"CIMType":"String[]","Description":"AAD Admin Roles out of scope of the Policy.","Name":"ExcludeRoles","Option":"Write"},{"CIMType":"String[]","Description":"Represents the Included internal guests or external user types. This is a multi-valued property. Supported values are: b2bCollaborationGuest, b2bCollaborationMember, b2bDirectConnectUser, internalGuest, OtherExternalUser, serviceProvider and unknownFutureValue.","Name":"IncludeGuestOrExternalUserTypes","Option":"Write","ValueMap":["none","internalGuest","b2bCollaborationGuest","b2bCollaborationMember","b2bDirectConnectUser","otherExternalUser","serviceProvider","unknownFutureValue"],"Values":["none","internalGuest","b2bCollaborationGuest","b2bCollaborationMember","b2bDirectConnectUser","otherExternalUser","serviceProvider","unknownFutureValue"]},{"CIMType":"String","Description":"Represents the Included Tenants membership kind. The possible values are: all, enumerated, unknownFutureValue. enumerated references an object of conditionalAccessEnumeratedExternalTenants derived type.","Name":"IncludeExternalTenantsMembershipKind","Option":"Write","ValueMap":["","all","enumerated","unknownFutureValue"],"Values":["","all","enumerated","unknownFutureValue"]},{"CIMType":"String[]","Description":"Represents the Included collection of tenant ids in the scope of Conditional Access for guests and external users policy targeting.","Name":"IncludeExternalTenantsMembers","Option":"Write"},{"CIMType":"String[]","Description":"Represents the Excluded internal guests or external user types. This is a multi-valued property. Supported values are: b2bCollaborationGuest, b2bCollaborationMember, b2bDirectConnectUser, internalGuest, OtherExternalUser, serviceProvider and unknownFutureValue.","Name":"ExcludeGuestOrExternalUserTypes","Option":"Write","ValueMap":["none","internalGuest","b2bCollaborationGuest","b2bCollaborationMember","b2bDirectConnectUser","otherExternalUser","serviceProvider","unknownFutureValue"],"Values":["none","internalGuest","b2bCollaborationGuest","b2bCollaborationMember","b2bDirectConnectUser","otherExternalUser","serviceProvider","unknownFutureValue"]},{"CIMType":"String","Description":"Represents the Excluded Tenants membership kind. The possible values are: all, enumerated, unknownFutureValue. enumerated references an object of conditionalAccessEnumeratedExternalTenants derived type.","Name":"ExcludeExternalTenantsMembershipKind","Option":"Write","ValueMap":["","all","enumerated","unknownFutureValue"],"Values":["","all","enumerated","unknownFutureValue"]},{"CIMType":"String[]","Description":"Represents the Excluded collection of tenant ids in the scope of Conditional Access for guests and external users policy targeting.","Name":"ExcludeExternalTenantsMembers","Option":"Write"},{"CIMType":"String[]","Description":"Service Principals in scope of the Policy. 'Attribute Definition Reader' role is needed.","Name":"IncludeServicePrincipals","Option":"Write"},{"CIMType":"String[]","Description":"Service Principals out of scope of the Policy. 'Attribute Definition Reader' role is needed.","Name":"ExcludeServicePrincipals","Option":"Write"},{"CIMType":"String","Description":"Mode to use for the Service Principal filter. Possible values are include or exclude. 'Attribute Definition Reader' role is needed.","Name":"ServicePrincipalFilterMode","Option":"Write","ValueMap":["include","exclude"],"Values":["include","exclude"]},{"CIMType":"String","Description":"Rule syntax for the Service Principal filter. 'Attribute Definition Reader' role is needed.","Name":"ServicePrincipalFilterRule","Option":"Write"},{"CIMType":"String[]","Description":"Client Device Platforms in scope of the Policy.","Name":"IncludePlatforms","Option":"Write"},{"CIMType":"String[]","Description":"Client Device Platforms out of scope of the Policy.","Name":"ExcludePlatforms","Option":"Write"},{"CIMType":"String[]","Description":"AAD Named Locations in scope of the Policy.","Name":"IncludeLocations","Option":"Write"},{"CIMType":"String[]","Description":"AAD Named Locations out of scope of the Policy.","Name":"ExcludeLocations","Option":"Write"},{"CIMType":"String","Description":"Client Device Filter mode of the Policy.","Name":"DeviceFilterMode","Option":"Write","ValueMap":["include","exclude"],"Values":["include","exclude"]},{"CIMType":"String","Description":"Client Device Filter rule of the Policy.","Name":"DeviceFilterRule","Option":"Write"},{"CIMType":"String[]","Description":"AAD Identity Protection User Risk Levels in scope of the Policy.","Name":"UserRiskLevels","Option":"Write"},{"CIMType":"String[]","Description":"AAD Identity Protection Sign-in Risk Levels in scope of the Policy.","Name":"SignInRiskLevels","Option":"Write"},{"CIMType":"String[]","Description":"Client App types in scope of the Policy.","Name":"ClientAppTypes","Option":"Write"},{"CIMType":"String","Description":"Operator to be used for Grant Controls.","Name":"GrantControlOperator","Option":"Write","ValueMap":["AND","OR"],"Values":["AND","OR"]},{"CIMType":"String[]","Description":"List of built-in Grant Controls to be applied by the Policy.","Name":"BuiltInControls","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies, whether Application Enforced Restrictions are enabled in the Policy.","Name":"ApplicationEnforcedRestrictionsIsEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies, whether Cloud App Security is enforced by the Policy.","Name":"CloudAppSecurityIsEnabled","Option":"Write"},{"CIMType":"String","Description":"Specifies, what Cloud App Security control is enforced by the Policy.","Name":"CloudAppSecurityType","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies if token protection for sign-in sessions is to be enforced by the policy.","Name":"SecureSignInSessionIsEnabled","Option":"Write"},{"CIMType":"UInt32","Description":"Sign in frequency time in the given unit to be enforced by the policy.","Name":"SignInFrequencyValue","Option":"Write"},{"CIMType":"String","Description":"Display name of the terms of use to assign.","Name":"TermsOfUse","Option":"Write"},{"CIMType":"String[]","Description":"Custom Controls assigned to the grant property of this policy.","Name":"CustomAuthenticationFactors","Option":"Write"},{"CIMType":"String","Description":"Sign in frequency unit (days/hours) to be interpreted by the policy.","Name":"SignInFrequencyType","Option":"Write","ValueMap":["Days","Hours",""],"Values":["Days","Hours",""]},{"CIMType":"Boolean","Description":"Specifies, whether sign-in frequency is enforced by the Policy.","Name":"SignInFrequencyIsEnabled","Option":"Write"},{"CIMType":"String","Description":"Sign in frequency interval. Possible values are: 'timeBased', 'everyTime' and 'unknownFutureValue'.","Name":"SignInFrequencyInterval","Option":"Write","ValueMap":["timeBased","everyTime","unknownFutureValue"],"Values":["timeBased","everyTime","unknownFutureValue"]},{"CIMType":"Boolean","Description":"Specifies, whether Browser Persistence is controlled by the Policy.","Name":"PersistentBrowserIsEnabled","Option":"Write"},{"CIMType":"String","Description":"Specifies, what Browser Persistence control is enforced by the Policy.","Name":"PersistentBrowserMode","Option":"Write","ValueMap":["Always","Never",""],"Values":["Always","Never",""]},{"CIMType":"Boolean","Description":"Specifies, if DisableResilienceDefaults is enabled.","Name":"DisableResilienceDefaultsIsEnabled","Option":"Write"},{"CIMType":"String","Description":"Name of the associated authentication strength policy.","Name":"AuthenticationStrength","Option":"Write"},{"CIMType":"String","Description":"Names of the associated authentication flow transfer methods. Possible values are '', 'deviceCodeFlow', 'authenticationTransfer', or 'deviceCodeFlow,authenticationTransfer'.","Name":"TransferMethods","Option":"Write"},{"CIMType":"String[]","Description":"Authentication context class references.","Name":"AuthenticationContexts","Option":"Write"},{"CIMType":"String[]","Description":"Insider risk levels conditions.","Name":"InsiderRiskLevels","Option":"Write","ValueMap":["minor","moderate","elevated","unknownFutureValue"],"Values":["minor","moderate","elevated","unknownFutureValue"]},{"CIMType":"String[]","Description":"Service principal risk levels included in the policy.","Name":"ServicePrincipalRiskLevels","Option":"Write","ValueMap":["low","medium","high","none","unknownFutureValue"],"Values":["low","medium","high","none","unknownFutureValue"]},{"CIMType":"String[]","Description":"Specifies the protocol flows to block.","Name":"ProtocolFlows","Option":"Write"},{"CIMType":"String","Description":"Specify if the Azure AD CA Policy should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials for the Microsoft Graph delegated permissions.","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Conditional Access Policy."},{"ClassName":"MSFT_AADConnectorGroupApplicationProxy","Parameters":[{"CIMType":"String","Description":"The name associated with the connectorGroup.","Name":"Name","Option":"Key"},{"CIMType":"String","Description":"The region the connectorGroup is assigned to and will optimize traffic for. This region can only be set if no connectors or applications are assigned to the connectorGroup. The possible values are: nam (for North America), eur (for Europe), aus (for Australia), asia (for Asia), ind (for India), and unknownFutureValue.","Name":"Region","Option":"Write","ValueMap":["nam","eur","aus","asia","ind","unknownFutureValue"],"Values":["nam","eur","aus","asia","ind","unknownFutureValue"]},{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"Id","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Connector Group Application Proxy"},{"ClassName":"MSFT_AADCrossTenantAccessPolicy","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"String","Description":"The name of the policy.","Name":"DisplayName","Option":"Write"},{"CIMType":"String[]","Description":"Used to specify which Microsoft clouds an organization would like to collaborate with. By default, this value is empty.","Name":"AllowedCloudEndpoints","Option":"Write","ValueMap":["microsoftonline.com","microsoftonline.us","partner.microsoftonline.cn"],"Values":["microsoftonline.com","microsoftonline.us","partner.microsoftonline.cn"]},{"CIMType":"String","Description":"Specify if the policy should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present"],"Values":["Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource manages Azure AD Cross Tenant Access Policies."},{"ClassName":"MSFT_AADCrossTenantAccessPolicyTarget","Parameters":[{"CIMType":"String","Description":"The unique identifier of the user, group, or application; one of the following keywords: AllUsers and AllApplications; or for targets that are applications, you may use reserved values.","Name":"Target","Option":"Write"},{"CIMType":"String","Description":"The type of resource that you want to target. The possible values are: user, group, application, unknownFutureValue.","Name":"TargetType","Option":"Write","ValueMap":["user","group","application","unknownFutureValue"],"Values":["user","group","application","unknownFutureValue"]}],"Description":"This resource manages Azure AD Cross Tenant Access Policies Configuration Default."},{"ClassName":"MSFT_AADCrossTenantAccessPolicyTargetConfiguration","Parameters":[{"CIMType":"String","Description":"Defines whether access is allowed or blocked. The possible values are: allowed, blocked, unknownFutureValue.","Name":"AccessType","Option":"Write","ValueMap":["allowed","blocked","unknownFutureValue"],"Values":["allowed","blocked","unknownFutureValue"]},{"CIMType":"MSFT_AADCrossTenantAccessPolicyTarget[]","Description":"Specifies whether to target users, groups, or applications with this rule.","Name":"Targets","Option":"Write"}],"Description":"This resource manages Azure AD Cross Tenant Access Policies Configuration Default."},{"ClassName":"MSFT_AADCrossTenantAccessPolicyB2BSetting","Parameters":[{"CIMType":"MSFT_AADCrossTenantAccessPolicyTargetConfiguration","Description":"The list of applications targeted with your cross-tenant access policy.","Name":"Applications","Option":"Write"},{"CIMType":"MSFT_AADCrossTenantAccessPolicyTargetConfiguration","Description":"The list of users and groups targeted with your cross-tenant access policy.","Name":"UsersAndGroups","Option":"Write"}],"Description":"This resource manages Azure AD Cross Tenant Access Policies Configuration Default."},{"ClassName":"MSFT_AADCrossTenantAccessPolicyInboundTrust","Parameters":[{"CIMType":"Boolean","Description":"Specifies whether compliant devices from external Azure AD organizations are trusted.","Name":"IsCompliantDeviceAccepted","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether hybrid Azure AD joined devices from external Azure AD organizations are trusted.","Name":"IsHybridAzureADJoinedDeviceAccepted","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether MFA from external Azure AD organizations is trusted.","Name":"IsMfaAccepted","Option":"Write"}],"Description":"This resource manages Azure AD Cross Tenant Access Policies Configuration Default."},{"ClassName":"MSFT_AADDefaultInvitationRedemptionIdentityProviderConfiguration","Parameters":[{"CIMType":"String[]","Description":"Collection of identity providers in priority order of preference to be used for guest invitation redemption. The possible values are: azureActiveDirectory, externalFederation, or socialIdentityProviders.","Name":"PrimaryIdentityProviderPrecedenceOrder","Option":"Write","ValueMap":["azureActiveDirectory","externalFederation","socialIdentityProviders"],"Values":["azureActiveDirectory","externalFederation","socialIdentityProviders"]},{"CIMType":"String","Description":"The fallback identity provider to be used in case no primary identity provider can be used for guest invitation redemption. The possible values are: defaultConfiguredIdp, emailOneTimePasscode, or microsoftAccount.","Name":"FallbackIdentityProvider","Option":"Write","ValueMap":["defaultConfiguredIdp","emailOneTimePasscode","microsoftAccount"],"Values":["defaultConfiguredIdp","emailOneTimePasscode","microsoftAccount"]}],"Description":"This resource manages Azure AD Cross Tenant Access Policies Configuration Default."},{"ClassName":"MSFT_AADDevicesFilter","Parameters":[{"CIMType":"String","Description":"Determines whether devices that satisfy the rule should be allowed or blocked. The possible values are: allowed, blocked.","Name":"Mode","Option":"Write","ValueMap":["allowed","blocked"],"Values":["allowed","blocked"]},{"CIMType":"String","Description":"Defines the rule to filter the devices. For example, 'device.deviceAttribute2 -eq 'PrivilegedAccessWorkstation'.","Name":"Rule","Option":"Write"}],"Description":"This resource manages Azure AD Cross Tenant Access Policies Configuration Default."},{"ClassName":"MSFT_AADCrossTenantAccessPolicyTenantRestrictions","Parameters":[{"CIMType":"MSFT_AADCrossTenantAccessPolicyTargetConfiguration","Description":"The list of applications targeted with your cross-tenant access policy.","Name":"Applications","Option":"Write"},{"CIMType":"MSFT_AADDevicesFilter","Description":"Defines the rule for filtering devices and whether devices satisfying the rule should be allowed or blocked. This property isn't supported on the server side yet.","Name":"Devices","Option":"Write"},{"CIMType":"MSFT_AADCrossTenantAccessPolicyTargetConfiguration","Description":"The list of users and groups targeted with your cross-tenant access policy.","Name":"UsersAndGroups","Option":"Write"}],"Description":"This resource manages Azure AD Cross Tenant Access Policies Configuration Default."},{"ClassName":"MSFT_AADCrossTenantAccessPolicyConfigurationDefault","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"MSFT_AADCrossTenantAccessPolicyB2BSetting","Description":"Defines your partner-specific configuration for users from other organizations accessing your resources via Azure AD B2B collaboration.","Name":"B2BCollaborationInbound","Option":"Write"},{"CIMType":"MSFT_AADCrossTenantAccessPolicyB2BSetting","Description":"Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B collaboration.","Name":"B2BCollaborationOutbound","Option":"Write"},{"CIMType":"MSFT_AADCrossTenantAccessPolicyB2BSetting","Description":"Defines your partner-specific configuration for users from other organizations accessing your resources via Azure AD B2B direct connect.","Name":"B2BDirectConnectInbound","Option":"Write"},{"CIMType":"MSFT_AADCrossTenantAccessPolicyB2BSetting","Description":"Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B direct connect.","Name":"B2BDirectConnectOutbound","Option":"Write"},{"CIMType":"MSFT_AADCrossTenantAccessPolicyInboundTrust","Description":"Determines the partner-specific configuration for trusting other Conditional Access claims from external Azure AD organizations.","Name":"InboundTrust","Option":"Write"},{"CIMType":"MSFT_AADDefaultInvitationRedemptionIdentityProviderConfiguration","Description":"Defines the priority order based on which an identity provider is selected during invitation redemption for a guest user.","Name":"InvitationRedemptionIdentityProviderConfiguration","Option":"Write"},{"CIMType":"MSFT_AADCrossTenantAccessPolicyTenantRestrictions","Description":"Defines the default tenant restrictions configuration for users in your organization who access an external organization on your network or devices.","Name":"TenantRestrictions","Option":"Write"},{"CIMType":"String","Description":"Specify if the instance should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present"],"Values":["Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource manages Azure AD Cross Tenant Access Policies Configuration Default."},{"ClassName":"MSFT_AADCrossTenantAccessPolicyAutomaticUserConsentSettings","Parameters":[{"CIMType":"Boolean","Description":"Specifies whether you want to automatically trust Inbound invitations.","Name":"InboundAllowed","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether you want to automatically trust Outbound invitations.","Name":"OutboundAllowed","Option":"Write"}],"Description":"This resource manages Azure AD Cross Tenant Access Policies Configuration Partner."},{"ClassName":"MSFT_AADCrossTenantGroupSyncInbound","Parameters":[{"CIMType":"Boolean","Description":"Defines whether group objects should be synchronized from the partner tenant. false stops any current group synchronization from the source tenant to the target tenant. This property has no impact on existing groups that were synchronized.","Name":"IsSyncAllowed","Option":"Write"}],"Description":"This resource manages Azure AD Cross Tenant Access Policies Configuration Partner."},{"ClassName":"MSFT_AADCrossTenantUserSyncInbound","Parameters":[{"CIMType":"Boolean","Description":"Defines whether user objects should be synchronized from the partner tenant. false causes any current user synchronization from the source tenant to the target tenant to stop. This property has no impact on existing users who have already been synchronized.","Name":"IsSyncAllowed","Option":"Write"}],"Description":"This resource manages Azure AD Cross Tenant Access Policies Configuration Partner."},{"ClassName":"MSFT_AADCrossTenantIdentitySyncPolicyPartner","Parameters":[{"CIMType":"MSFT_AADCrossTenantGroupSyncInbound","Description":"Defines whether groups can be synchronized from a partner tenant. Key.","Name":"GroupSyncInbound","Option":"Write"},{"CIMType":"MSFT_AADCrossTenantUserSyncInbound","Description":"Specifies whether you want to automatically trust Outbound invitations.","Name":"UserSyncInbound","Option":"Write"}],"Description":"This resource manages Azure AD Cross Tenant Access Policies Configuration Partner."},{"ClassName":"MSFT_AADCrossTenantAccessPolicyConfigurationPartner","Parameters":[{"CIMType":"String","Description":"The tenant identifier for the partner Azure Active Directory (Azure AD) organization.","Name":"PartnerTenantId","Option":"Key"},{"CIMType":"MSFT_AADCrossTenantAccessPolicyB2BSetting","Description":"Defines your partner-specific configuration for users from other organizations accessing your resources via Azure AD B2B collaboration.","Name":"B2BCollaborationInbound","Option":"Write"},{"CIMType":"MSFT_AADCrossTenantAccessPolicyB2BSetting","Description":"Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B collaboration.","Name":"B2BCollaborationOutbound","Option":"Write"},{"CIMType":"MSFT_AADCrossTenantAccessPolicyB2BSetting","Description":"Defines your partner-specific configuration for users from other organizations accessing your resources via Azure AD B2B direct connect.","Name":"B2BDirectConnectInbound","Option":"Write"},{"CIMType":"MSFT_AADCrossTenantAccessPolicyB2BSetting","Description":"Defines your partner-specific configuration for users in your organization going outbound to access resources in another organization via Azure AD B2B direct connect.","Name":"B2BDirectConnectOutbound","Option":"Write"},{"CIMType":"MSFT_AADCrossTenantAccessPolicyAutomaticUserConsentSettings","Description":"Determines the partner-specific configuration for accepting trust claims from other tenant invitations.","Name":"AutomaticUserConsentSettings","Option":"Write"},{"CIMType":"MSFT_AADCrossTenantIdentitySyncPolicyPartner","Description":"Defines the identity synchronization settings.","Name":"IdentitySynchronization","Option":"Write"},{"CIMType":"MSFT_AADCrossTenantAccessPolicyInboundTrust","Description":"Determines the partner-specific configuration for trusting other Conditional Access claims from external Azure AD organizations.","Name":"InboundTrust","Option":"Write"},{"CIMType":"String","Description":"Specify if the policy should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource manages Azure AD Cross Tenant Access Policies Configuration Partner."},{"ClassName":"MSFT_AADCustomAuthenticationExtensionEndPointConfiguration","Parameters":[{"CIMType":"String","Description":"Defines the type of the endpoint configuration","Name":"EndpointType","Option":"Write"},{"CIMType":"String","Description":"Defines the workflow name for the logic app","Name":"LogicAppWorkflowName","Option":"Write"},{"CIMType":"String","Description":"Defines the resource group name for the logic app","Name":"ResourceGroupName","Option":"Write"},{"CIMType":"String","Description":"Defines the subscription id for the logic app","Name":"SubscriptionId","Option":"Write"},{"CIMType":"String","Description":"Defines the target url for the http endpoint","Name":"TargetUrl","Option":"Write"}],"Description":"Custom authentication extensions define interactions with external systems during a user authentication session."},{"ClassName":"MSFT_AADCustomAuthenticationExtensionClaimForTokenConfiguration","Parameters":[{"CIMType":"String","Description":"Defines the claim id in api response.","Name":"ClaimIdInApiResponse","Option":"Write"}],"Description":"Custom authentication extensions define interactions with external systems during a user authentication session."},{"ClassName":"MSFT_AADCustomAuthenticationExtension","Parameters":[{"CIMType":"String","Description":"Display Name of the custom security attribute. Must be unique within an attribute set. Can be up to 32 characters long and include Unicode characters. Can't contain spaces or special characters. Can't be changed later. Case sensitive.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"Unique identifier of the Attribute Definition.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Defines the custom authentication extension type.","Name":"CustomAuthenticationExtensionType","Option":"Write"},{"CIMType":"String","Description":"Description of the custom security attribute. Can be up to 128 characters long and include Unicode characters. Can't contain spaces or special characters. Can be changed later. ","Name":"Description","Option":"Write"},{"CIMType":"String","Description":"Defines the authentication configuration type","Name":"AuthenticationConfigurationType","Option":"Write"},{"CIMType":"String","Description":"Defines the authentication configuration resource id","Name":"AuthenticationConfigurationResourceId","Option":"Write"},{"CIMType":"UInt32","Description":"Defines the client configuration timeout in milliseconds","Name":"ClientConfigurationTimeoutMilliseconds","Option":"Write"},{"CIMType":"UInt32","Description":"Defines the client configuration max retries","Name":"ClientConfigurationMaximumRetries","Option":"Write"},{"CIMType":"MSFT_AADCustomAuthenticationExtensionEndPointConfiguration","Description":"Defines the endpoint configuration","Name":"EndpointConfiguration","Option":"Write"},{"CIMType":"MSFT_AADCustomAuthenticationExtensionClaimForTokenConfiguration[]","Description":"Defines the list of claims for token configurations","Name":"ClaimsForTokenConfiguration","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Custom authentication extensions define interactions with external systems during a user authentication session."},{"ClassName":"MSFT_CustomSecurityAttributeAllowedValue","Parameters":[{"CIMType":"String","Description":"The id of the allowed value. Must be unique in the set of allowed values.","Name":"ValueId","Option":"Key"},{"CIMType":"Boolean","Description":"If the allowed value is active.","Name":"IsActive","Option":"Required"}],"Description":"Configures custom security attribute definitions in Entra Id."},{"ClassName":"MSFT_AADCustomSecurityAttributeDefinition","Parameters":[{"CIMType":"String","Description":"Name of the custom security attribute. Must be unique within an attribute set. Can be up to 32 characters long and include Unicode characters. Can't contain spaces or special characters. Can't be changed later. Case sensitive.","Name":"Name","Option":"Key"},{"CIMType":"String","Description":"Name of the attribute set. Case sensitive.","Name":"AttributeSet","Option":"Key"},{"CIMType":"MSFT_CustomSecurityAttributeAllowedValue[]","Description":"The allowed values of the attribute definition.","Name":"AllowedValues","Option":"Write"},{"CIMType":"String","Description":"Unique identifier of the Attribute Definition.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Description of the custom security attribute. Can be up to 128 characters long and include Unicode characters. Can't contain spaces or special characters. Can be changed later. ","Name":"Description","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether multiple values can be assigned to the custom security attribute. Can't be changed later. If type is set to Boolean, isCollection can't be set to true.","Name":"IsCollection","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether custom security attribute values are indexed for searching on objects that are assigned attribute values. Can't be changed later.","Name":"IsSearchable","Option":"Write"},{"CIMType":"String","Description":"Specifies whether the custom security attribute is active or deactivated. Acceptable values are Available and Deprecated. Can be changed later.","Name":"Status","Option":"Write","ValueMap":["Available","Deprecated"],"Values":["Available","Deprecated"]},{"CIMType":"String","Description":"Data type for the custom security attribute values. Supported types are: Boolean, Integer, and String. Can't be changed later.","Name":"Type","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether only predefined values can be assigned to the custom security attribute. If set to false, free-form values are allowed. Can later be changed from true to false, but can't be changed from false to true. If type is set to Boolean, usePreDefinedValuesOnly can't be set to true.","Name":"UsePreDefinedValuesOnly","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Configures custom security attribute definitions in Entra Id."},{"ClassName":"MSFT_AADDeviceRegistrationPolicy","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"Boolean","Description":"Determines whether or not administrators can configure Azure AD Join.","Name":"AzureADJoinIsAdminConfigurable","Option":"Write"},{"CIMType":"UInt32","Description":"Specifies the maximum number of devices that a user can have within your organization before blocking new device registrations. The default value is set to 50. If this property isn't specified during the policy update operation, it's automatically reset to 0 to indicate that users aren't allowed to join any devices.","Name":"UserDeviceQuota","Option":"Write"},{"CIMType":"String","Description":"Scope that a device registration policy applies to.","Name":"AzureADAllowedToJoin","Option":"Write","ValueMap":["All","Selected","None"],"Values":["All","Selected","None"]},{"CIMType":"String[]","Description":"List of users that this policy applies to.","Name":"AzureADAllowedToJoinUsers","Option":"Write"},{"CIMType":"String[]","Description":"List of groups that this policy applies to.","Name":"AzureADAllowedToJoinGroups","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies the authentication policy for a user to complete registration using Microsoft Entra join or Microsoft Entra registered within your organization.","Name":"MultiFactorAuthConfiguration","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether global administrators are local administrators on all Microsoft Entra-joined devices. This setting only applies to future registrations. Default is true.","Name":"LocalAdminsEnableGlobalAdmins","Option":"Write"},{"CIMType":"String","Description":"Scope that a device registration policy applies to for local admins.","Name":"AzureAdJoinLocalAdminsRegisteringMode","Option":"Write","ValueMap":["All","Selected","None"],"Values":["All","Selected","None"]},{"CIMType":"String[]","Description":"List of groups that this policy applies to.","Name":"AzureAdJoinLocalAdminsRegisteringGroups","Option":"Write"},{"CIMType":"String[]","Description":"List of users that this policy applies to.","Name":"AzureAdJoinLocalAdminsRegisteringUsers","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether this policy scope is configurable by the admin. The default value is false. An admin can set it to true to enable Local Admin Password Solution (LAPS) within their organzation.","Name":"LocalAdminPasswordIsEnabled","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Represents the policy scope that controls quota restrictions, additional authentication, and authorization policies to register device identities to your organization."},{"ClassName":"MSFT_AADDomain","Parameters":[{"CIMType":"String","Description":"Custom domain name.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"Indicates the configured authentication type for the domain. The value is either Managed or Federated. Managed indicates a cloud managed domain where Microsoft Entra ID performs user authentication. Federated indicates authentication is federated with an identity provider such as the tenant's on-premises Active Directory via Active Directory Federation Services.","Name":"AuthenticationType","Option":"Write"},{"CIMType":"String","Description":"This property is always null except when the verify action is used. When the verify action is used, a domain entity is returned in the response. The availabilityStatus property of the domain entity in the response is either AvailableImmediately or EmailVerifiedDomainTakeoverScheduled.","Name":"AvailabilityStatus","Option":"Write"},{"CIMType":"Boolean","Description":"The value of the property is false if the DNS record management of the domain is delegated to Microsoft 365. Otherwise, the value is true. Not nullable","Name":"IsAdminManaged","Option":"Write"},{"CIMType":"Boolean","Description":"True if this is the default domain that is used for user creation. There's only one default domain per company. Not nullable.","Name":"IsDefault","Option":"Write"},{"CIMType":"Boolean","Description":"True if the domain is a verified root domain. Otherwise, false if the domain is a subdomain or unverified. Not nullable.","Name":"IsRoot","Option":"Write"},{"CIMType":"Boolean","Description":"True if the domain completed domain ownership verification. Not nullable.","Name":"IsVerified","Option":"Write"},{"CIMType":"UInt32","Description":"Specifies the number of days before a user receives notification that their password expires. If the property isn't set, a default value of 14 days is used.","Name":"PasswordNotificationWindowInDays","Option":"Write"},{"CIMType":"UInt32","Description":"Specifies the length of time that a password is valid before it must be changed. If the property isn't set, a default value of 90 days is used.","Name":"PasswordValidityPeriodInDays","Option":"Write"},{"CIMType":"String[]","Description":"The capabilities assigned to the domain. Can include 0, 1 or more of following values: Email, Sharepoint, EmailInternalRelayOnly, OfficeCommunicationsOnline, SharePointDefaultDomain, FullRedelegation, SharePointPublic, OrgIdAuthentication, Yammer, Intune. The values that you can add or remove using the API include: Email, OfficeCommunicationsOnline, Yammer. Not nullable.","Name":"SupportedServices","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Configures custom domain names in Entra Id."},{"ClassName":"MSFT_AccessPackageResourceRoleScope","Parameters":[{"CIMType":"String","Description":"The Id of the resource roleScope.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"The origine Id of the resource.","Name":"AccessPackageResourceOriginId","Option":"Write"},{"CIMType":"String","Description":"The display name of the resource role.","Name":"AccessPackageResourceRoleDisplayName","Option":"Write"}],"Description":"This resource configures an Azure AD Entitlement Management Access Package."},{"ClassName":"MSFT_AADEntitlementManagementAccessPackage","Parameters":[{"CIMType":"String","Description":"The display name of the access package.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"The Id of the access package.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Identifier of the access package catalog referencing this access package.","Name":"CatalogId","Option":"Write"},{"CIMType":"String","Description":"The description of the access package.","Name":"Description","Option":"Write"},{"CIMType":"Boolean","Description":"Whether the access package is hidden from the requestor.","Name":"IsHidden","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether role scopes are visible.","Name":"IsRoleScopesVisible","Option":"Write"},{"CIMType":"MSFT_AccessPackageResourceRoleScope[]","Description":"The resources and roles included in the access package.","Name":"AccessPackageResourceRoleScopes","Option":"Write"},{"CIMType":"String[]","Description":"The access packages whose assigned users are ineligible to be assigned this access package.","Name":"IncompatibleAccessPackages","Option":"Write"},{"CIMType":"String[]","Description":"The access packages that are incompatible with this package.","Name":"AccessPackagesIncompatibleWith","Option":"Write"},{"CIMType":"String[]","Description":"The groups whose members are ineligible to be assigned this access package.","Name":"IncompatibleGroups","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Intune Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures an Azure AD Entitlement Management Access Package."},{"ClassName":"MSFT_MicrosoftGraphassignmentreviewsettings","Parameters":[{"CIMType":"String","Description":"The default decision to apply if the request is not reviewed within the period specified in durationInDays.","Name":"AccessReviewTimeoutBehavior","Option":"Write","ValueMap":["acceptAccessRecommendation","keepAccess","removeAccess","unknownFutureValue"],"Values":["acceptAccessRecommendation","keepAccess","removeAccess","unknownFutureValue"]},{"CIMType":"UInt32","Description":"The number of days within which reviewers should provide input.","Name":"DurationInDays","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether to display recommendations to the reviewer. The default value is true","Name":"IsAccessRecommendationEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether the agentic experience is enabled for this policy.","Name":"IsAgenticExperienceEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether the reviewer must provide justification for the approval. The default value is true.","Name":"IsApprovalJustificationRequired","Option":"Write"},{"CIMType":"Boolean","Description":"If true, access reviews are required for assignments from this policy.","Name":"IsEnabled","Option":"Write"},{"CIMType":"String","Description":"The interval for recurrence, such as monthly or quarterly.","Name":"RecurrenceType","Option":"Write"},{"CIMType":"String","Description":"Who should be asked to do the review, either Self or Reviewers.","Name":"ReviewerType","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphuserset[]","Description":"If the reviewerType is Reviewers, this collection specifies the users who will be reviewers, either by ID or as members of a group, using a collection of singleUser and groupMembers.","Name":"Reviewers","Option":"Write"},{"CIMType":"String","Description":"When the first review should start.","Name":"StartDateTime","Option":"Write"}],"Description":"This resource configures an Azure AD Entitlement Management Access Package Assignment Policy."},{"ClassName":"MSFT_MicrosoftGraphuserset","Parameters":[{"CIMType":"String","Description":"The type of the resource","Name":"odataType","Option":"Write","ValueMap":["#microsoft.graph.singleUser","#microsoft.graph.groupMembers","#microsoft.graph.requestorManager","#microsoft.graph.internalSponsors","#microsoft.graph.externalSponsors","#microsoft.graph.connectedOrganizationMembers"],"Values":["#microsoft.graph.singleUser","#microsoft.graph.groupMembers","#microsoft.graph.requestorManager","#microsoft.graph.internalSponsors","#microsoft.graph.externalSponsors","#microsoft.graph.connectedOrganizationMembers"]},{"CIMType":"String","Description":"The id of the resource.","Name":"Id","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether the resource is a backup fallback approver.","Name":"IsBackup","Option":"Write"},{"CIMType":"UInt32","Description":"The hierarchical level of the manager with respect to the requestor. For example, the direct manager of a requestor would have a managerLevel of 1, while the manager of the requestor's manager would have a managerLevel of 2. Default value for managerLevel is 1. Possible values for this property range from 1 to 2.","Name":"ManagerLevel","Option":"Write"}],"Description":"This resource configures an Azure AD Entitlement Management Access Package Assignment Policy."},{"ClassName":"MSFT_MicrosoftGraphaccesspackagequestion","Parameters":[{"CIMType":"String","Description":"The type of the resource","Name":"odataType","Option":"Write","ValueMap":["#microsoft.graph.accessPackageMultipleChoiceQuestion","#microsoft.graph.accessPackageTextInputQuestion"],"Values":["#microsoft.graph.accessPackageMultipleChoiceQuestion","#microsoft.graph.accessPackageTextInputQuestion"]},{"CIMType":"String","Description":"ID of the question.","Name":"Id","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether the requestor is allowed to edit answers to questions.","Name":"IsAnswerEditable","Option":"Write"},{"CIMType":"Boolean","Description":"Whether the requestor is required to supply an answer or not.","Name":"IsRequired","Option":"Write"},{"CIMType":"UInt32","Description":"Relative position of this question when displaying a list of questions to the requestor.","Name":"Sequence","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphaccessPackageLocalizedContent","Description":"The text of the question to show to the requestor.","Name":"QuestionText","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphaccessPackageAnswerChoice[]","Description":"List of answer choices.","Name":"Choices","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether requestor can select multiple choices as their answer.","Name":"AllowsMultipleSelection","Option":"Write"},{"CIMType":"String","Description":"This is the regex pattern that the corresponding text answer must follow.","Name":"RegexPattern","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether the answer will be in single or multiple line format.","Name":"IsSingleLineQuestion","Option":"Write"}],"Description":"This resource configures an Azure AD Entitlement Management Access Package Assignment Policy."},{"ClassName":"MSFT_MicrosoftGraphaccessPackageLocalizedContent","Parameters":[{"CIMType":"String","Description":"The fallback string, which is used when a requested localization is not available. Required.","Name":"DefaultText","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphaccessPackageLocalizedText[]","Description":"Content represented in a format for a specific locale.","Name":"LocalizedTexts","Option":"Write"}],"Description":"This resource configures an Azure AD Entitlement Management Access Package Assignment Policy."},{"ClassName":"MSFT_MicrosoftGraphaccessPackageLocalizedText","Parameters":[{"CIMType":"String","Description":"The text in the specific language. Required.","Name":"Text","Option":"Write"},{"CIMType":"String","Description":"The ISO code for the intended language. Required.","Name":"LanguageCode","Option":"Write"}],"Description":"This resource configures an Azure AD Entitlement Management Access Package Assignment Policy."},{"ClassName":"MSFT_MicrosoftGraphaccessPackageAnswerChoice","Parameters":[{"CIMType":"String","Description":"The actual value of the selected choice. This is typically a string value which is understandable by applications. Required.","Name":"ActualValue","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphaccessPackageLocalizedContent","Description":"The localized display values shown to the requestor and approvers. Required.","Name":"displayValue","Option":"Write"}],"Description":"This resource configures an Azure AD Entitlement Management Access Package Assignment Policy."},{"ClassName":"MSFT_MicrosoftGraphapprovalsettings","Parameters":[{"CIMType":"String","Description":"One of SingleStage, Serial, Parallel, NoApproval (default). NoApproval is used when isApprovalRequired is false.","Name":"ApprovalMode","Option":"Write","ValueMap":["SingleStage","Serial","Parallel","NoApproval"],"Values":["SingleStage","Serial","Parallel","NoApproval"]},{"CIMType":"MSFT_MicrosoftGraphapprovalstage1[]","Description":"If approval is required, the one or two elements of this collection define each of the stages of approval. An empty array if no approval is required.","Name":"ApprovalStages","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether approval is required for requests in this policy.","Name":"IsApprovalRequired","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether approval is required for a user to extend their assignment.","Name":"IsApprovalRequiredForExtension","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether the requestor is required to supply a justification in their request.","Name":"IsRequestorJustificationRequired","Option":"Write"}],"Description":"This resource configures an Azure AD Entitlement Management Access Package Assignment Policy."},{"ClassName":"MSFT_MicrosoftGraphapprovalstage1","Parameters":[{"CIMType":"UInt32","Description":"The number of days that a request can be pending a response before it is automatically denied.","Name":"ApprovalStageTimeOutInDays","Option":"Write"},{"CIMType":"String","Description":"Defines whether approver information is visible to the requestor in approval processes within Microsoft Entra entitlement management and related governance scenarios.","Name":"ApproverInformationVisibility","Option":"Write","ValueMap":["default","notVisible","visible","unknownFutureValue"],"Values":["default","notVisible","visible","unknownFutureValue"]},{"CIMType":"UInt32","Description":"Indicates whether the approver is required to provide a justification for approving a request.","Name":"EscalationTimeInMinutes","Option":"Write"},{"CIMType":"Boolean","Description":"If true, then one or more escalation approvers are configured in this approval stage.","Name":"IsApproverJustificationRequired","Option":"Write"},{"CIMType":"Boolean","Description":"If escalation is required, the time a request can be pending a response from a primary approver.","Name":"IsEscalationEnabled","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphuserset[]","Description":"The users who will be asked to approve requests. A collection of singleUser, groupMembers, requestorManager, internalSponsors and externalSponsors. When creating or updating a policy, include at least one userSet in this collection.","Name":"PrimaryApprovers","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphuserset[]","Description":"If escalation is enabled and the primary approvers do not respond before the escalation time, the escalationApprovers are the users who will be asked to approve requests. This can be a collection of singleUser, groupMembers, requestorManager, internalSponsors and externalSponsors. When creating or updating a policy, if there are no escalation approvers, or escalation approvers are not required for the stage, the value of this property should be an empty collection.","Name":"EscalationApprovers","Option":"Write"}],"Description":"This resource configures an Azure AD Entitlement Management Access Package Assignment Policy."},{"ClassName":"MSFT_MicrosoftGraphrequestorsettings","Parameters":[{"CIMType":"Boolean","Description":"Indicates whether new requests are accepted on this policy.","Name":"AcceptRequests","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphuserset[]","Description":"The users who are allowed to request on this policy, which can be singleUser, groupMembers, and connectedOrganizationMembers.","Name":"AllowedRequestors","Option":"Write"},{"CIMType":"String","Description":"Who can request.","Name":"ScopeType","Option":"Write","ValueMap":["NoSubjects","SpecificDirectorySubjects","SpecificConnectedOrganizationSubjects","AllConfiguredConnectedOrganizationSubjects","AllExistingConnectedOrganizationSubjects","AllExistingDirectoryMemberUsers","AllExistingDirectorySubjects","AllExternalSubjects"],"Values":["NoSubjects","SpecificDirectorySubjects","SpecificConnectedOrganizationSubjects","AllConfiguredConnectedOrganizationSubjects","AllExistingConnectedOrganizationSubjects","AllExistingDirectoryMemberUsers","AllExistingDirectorySubjects","AllExternalSubjects"]}],"Description":"This resource configures an Azure AD Entitlement Management Access Package Assignment Policy."},{"ClassName":"MSFT_MicrosoftGraphcustomextensionhandler","Parameters":[{"CIMType":"String","Description":"Indicates which custom workflow extension will be executed at this stage.","Name":"CustomExtensionId","Option":"Write"},{"CIMType":"String","Description":"Indicates the stage of the access package assignment request workflow when the access package custom extension runs.","Name":"Stage","Option":"Write","ValueMap":["assignmentRequestCreated","assignmentRequestApproved","assignmentRequestGranted","assignmentRequestRemoved","assignmentFourteenDaysBeforeExpiration","assignmentOneDayBeforeExpiration","unknownFutureValue"],"Values":["assignmentRequestCreated","assignmentRequestApproved","assignmentRequestGranted","assignmentRequestRemoved","assignmentFourteenDaysBeforeExpiration","assignmentOneDayBeforeExpiration","unknownFutureValue"]},{"CIMType":"String","Description":"Identifier of the stage.","Name":"Id","Option":"Write"}],"Description":"This resource configures an Azure AD Entitlement Management Access Package Assignment Policy."},{"ClassName":"MSFT_AADEntitlementManagementAccessPackageAssignmentPolicy","Parameters":[{"CIMType":"String","Description":"The display name of the policy.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"Id of the access package assignment policy.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Identifier of the access package.","Name":"AccessPackageId","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphassignmentreviewsettings","Description":"Who must review, and how often, the assignments to the access package from this policy. This property is null if reviews are not required.","Name":"AccessReviewSettings","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether a user can extend the access package assignment duration after approval.","Name":"CanExtend","Option":"Write"},{"CIMType":"String","Description":"The description of the policy.","Name":"Description","Option":"Write"},{"CIMType":"UInt32","Description":"The number of days in which assignments from this policy last until they are expired.","Name":"DurationInDays","Option":"Write"},{"CIMType":"String","Description":"The expiration date for assignments created in this policy. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z","Name":"ExpirationDateTime","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphaccesspackagequestion[]","Description":"Questions that are posed to the requestor.","Name":"Questions","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphapprovalsettings","Description":"Who must approve requests for access package in this policy.","Name":"RequestApprovalSettings","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphrequestorsettings","Description":"Who can request this access package from this policy.","Name":"RequestorSettings","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphcustomextensionhandler[]","Description":"The collection of stages when to execute one or more custom access package workflow extensions.","Name":"CustomExtensionHandlers","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Intune Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures an Azure AD Entitlement Management Access Package Assignment Policy."},{"ClassName":"MSFT_AADEntitlementManagementAccessPackageCatalog","Parameters":[{"CIMType":"String","Description":"The display name of the access package catalog.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"The id of the access package catalog.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Has the value Published if the access packages are available for management.","Name":"CatalogStatus","Option":"Write"},{"CIMType":"String","Description":"One of UserManaged or ServiceDefault.","Name":"CatalogType","Option":"Write","ValueMap":["UserManaged","ServiceDefault"],"Values":["UserManaged","ServiceDefault"]},{"CIMType":"String","Description":"The description of the access package catalog.","Name":"Description","Option":"Write"},{"CIMType":"Boolean","Description":"Whether the access packages in this catalog can be requested by users outside of the tenant.","Name":"IsExternallyVisible","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Intune Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures an Azure AD Entitlement Management Access Package Catalog."},{"ClassName":"MSFT_MicrosoftGraphaccesspackageresourceattribute","Parameters":[{"CIMType":"MSFT_MicrosoftGraphaccesspackageresourceattributedestination","Description":"Information about how to set the attribute, currently a accessPackageUserDirectoryAttributeStore object type.","Name":"AttributeDestination","Option":"Write"},{"CIMType":"String","Description":"The name of the attribute in the end system.","Name":"AttributeName","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphaccesspackageresourceattributesource","Description":"Information about how to populate the attribute value when an accessPackageAssignmentRequest is being fulfilled, currently a accessPackageResourceAttributeQuestion object type.","Name":"AttributeSource","Option":"Write"},{"CIMType":"String","Description":"Id of the access package resource attribute.","Name":"Id","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether or not an existing attribute value can be edited by the requester.","Name":"IsEditable","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether the attribute will remain in the end system after an assignment ends.","Name":"IsPersistedOnAssignmentRemoval","Option":"Write"}],"Description":"This resource configures an Azure AD Entitlement Management Access Package Catalog Resource."},{"ClassName":"MSFT_MicrosoftGraphaccesspackageresourceattributedestination","Parameters":[{"CIMType":"String","Description":"Type of the access package resource attribute destination.","Name":"odataType","Option":"Write","ValueMap":["#microsoft.graph.accessPackageUserDirectoryAttributeStore"],"Values":["#microsoft.graph.accessPackageUserDirectoryAttributeStore"]}],"Description":"This resource configures an Azure AD Entitlement Management Access Package Catalog Resource."},{"ClassName":"MSFT_MicrosoftGraphaccesspackageresourceattributesource","Parameters":[{"CIMType":"String","Description":"Type of the access package resource attribute source.","Name":"odataType","Option":"Write","ValueMap":["#microsoft.graph.accessPackageResourceAttributeQuestion"],"Values":["#microsoft.graph.accessPackageResourceAttributeQuestion"]},{"CIMType":"MSFT_MicrosoftGraphaccessPackageResourceAttributeQuestion","Description":"The question asked in order to get the value of the attribute.","Name":"Question","Option":"Write"}],"Description":"This resource configures an Azure AD Entitlement Management Access Package Catalog Resource."},{"ClassName":"MSFT_MicrosoftGraphaccessPackageResourceAttributeQuestion","Parameters":[{"CIMType":"String","Description":"Type of the access package resource attribute question.","Name":"odataType","Option":"Write","ValueMap":["#microsoft.graph.accessPackageTextInputQuestion","#microsoft.graph.accessPackageMultipleChoiceQuestion"],"Values":["#microsoft.graph.accessPackageTextInputQuestion","#microsoft.graph.accessPackageMultipleChoiceQuestion"]},{"CIMType":"String","Description":"Id of the access package resource attribute question.","Name":"Id","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether the requestor is required to supply an answer or not.","Name":"IsRequired","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether the answer will be in single or multiple line format.","Name":"IsSingleLine","Option":"Write"},{"CIMType":"String","Description":"This is the regex pattern that the corresponding text answer must follow.","Name":"RegexPattern","Option":"Write"},{"CIMType":"UInt32","Description":"Relative position of this question when displaying a list of questions to the requestor.","Name":"Sequence","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphaccessPackageLocalizedContent","Description":"The text of the question to show to the requestor.","Name":"QuestionText","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether requestor can select multiple choices as their answer.","Name":"AllowsMultipleSelection","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphaccessPackageAnswerChoice[]","Description":"List of answer choices.","Name":"Choices","Option":"Write"}],"Description":"This resource configures an Azure AD Entitlement Management Access Package Catalog Resource."},{"ClassName":"MSFT_AADEntitlementManagementAccessPackageCatalogResource","Parameters":[{"CIMType":"String","Description":"The display name of the resource, such as the application name, group name or site name.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"Id of the access package catalog resource.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"The unique ID of the access package catalog.","Name":"CatalogId","Option":"Write"},{"CIMType":"String","Description":"The name of the user or application that first added this resource. Read-only.","Name":"AddedBy","Option":"Write"},{"CIMType":"String","Description":"The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z. Read-only.","Name":"AddedOn","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphaccesspackageresourceattribute[]","Description":"Contains information about the attributes to be collected from the requestor and sent to the resource application.","Name":"Attributes","Option":"Write"},{"CIMType":"String","Description":"A description for the resource.","Name":"Description","Option":"Write"},{"CIMType":"Boolean","Description":"True if the resource is not yet available for assignment. Read-only.","Name":"IsPendingOnboarding","Option":"Write"},{"CIMType":"String","Description":"The unique identifier of the resource in the origin system. In the case of an Azure AD group, this is the identifier of the group.","Name":"OriginId","Option":"Write"},{"CIMType":"String","Description":"The type of the resource in the origin system.","Name":"OriginSystem","Option":"Write"},{"CIMType":"String","Description":"The type of the resource.","Name":"ResourceType","Option":"Write"},{"CIMType":"String","Description":"A unique resource locator for the resource, such as the URL for signing a user into an application.","Name":"Url","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Intune Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures an Azure AD Entitlement Management Access Package Catalog Resource."},{"ClassName":"MSFT_AADEntitlementManagementConnectedOrganizationIdentitySource","Parameters":[{"CIMType":"String","Description":"Type of the identity source.","Name":"odataType","Option":"Required","ValueMap":["#microsoft.graph.azureActiveDirectoryTenant","#microsoft.graph.crossCloudAzureActiveDirectoryTenant","#microsoft.graph.domainIdentitySource","#microsoft.graph.externalDomainFederation"],"Values":["#microsoft.graph.azureActiveDirectoryTenant","#microsoft.graph.crossCloudAzureActiveDirectoryTenant","#microsoft.graph.domainIdentitySource","#microsoft.graph.externalDomainFederation"]},{"CIMType":"String","Description":"The name of the Azure Active Directory tenant.","Name":"DisplayName","Option":"Write"},{"CIMType":"String","Description":"The ID of the Azure Active Directory tenant.","Name":"ExternalTenantId","Option":"Key"},{"CIMType":"String","Description":"The ID of the cloud where the tenant is located, one of microsoftonline.com, microsoftonline.us or partner.microsoftonline.cn.","Name":"CloudInstance","Option":"Write"},{"CIMType":"String","Description":"The domain name.","Name":"DomainName","Option":"Write"},{"CIMType":"String","Description":"The issuerURI of the incoming federation.","Name":"IssuerUri","Option":"Write"}],"Description":"This resource configures an Azure AD Entitlement Management Connected Organization."},{"ClassName":"MSFT_AADEntitlementManagementConnectedOrganization","Parameters":[{"CIMType":"String","Description":"The display name of the connected organization.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"The Id of the Connected organization object.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"The description of the connected organization.","Name":"Description","Option":"Write"},{"CIMType":"MSFT_AADEntitlementManagementConnectedOrganizationIdentitySource[]","Description":"The identity sources in this connected organization.","Name":"IdentitySources","Option":"Write"},{"CIMType":"String","Description":"The state of a connected organization defines whether assignment policies with requestor scope type AllConfiguredConnectedOrganizationSubjects are applicable or not.","Name":"State","Option":"Write","ValueMap":["configured","proposed","unknownFutureValue"],"Values":["configured","proposed","unknownFutureValue"]},{"CIMType":"String[]","Description":"Collection of objectID of external sponsors. the sponsor can be a user or a group.","Name":"ExternalSponsors","Option":"Write"},{"CIMType":"String[]","Description":"Collection of objectID of internal sponsors. the sponsor can be a user or a group.","Name":"InternalSponsors","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Intune Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures an Azure AD Entitlement Management Connected Organization."},{"ClassName":"MSFT_AADEntitlementManagementRoleAssignment","Parameters":[{"CIMType":"String","Description":"Unique Id of the role assignment.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Identifier of the principal to which the assignment is granted.","Name":"Principal","Option":"Key"},{"CIMType":"String","Description":"Identifier of the unifiedRoleDefinition the assignment is for.","Name":"RoleDefinition","Option":"Key"},{"CIMType":"String","Description":"Identifier of the app specific scope when the assignment scope is app specific. The scope of an assignment determines the set of resources for which the principal has been granted access. App scopes are scopes that are defined and understood by a resource application only.","Name":"AppScopeId","Option":"Write"},{"CIMType":"String","Description":"Identifier of the directory object representing the scope of the assignment. The scope of an assignment determines the set of resources for which the principal has been granted access. Directory scopes are shared scopes stored in the directory that are understood by multiple applications, unlike app scopes that are defined and understood by a resource application only.","Name":"DirectoryScopeId","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Intune Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures an Azure AD Entitlement Management Role Assignment."},{"ClassName":"MSFT_AADEntitlementManagementSettings","Parameters":[{"CIMType":"String","Description":"Only accepted value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"UInt32","Description":"If externalUserLifecycleAction is blockSignInAndDelete, the duration, typically many days, after an external user is blocked from sign in before their account is deleted.","Name":"DaysUntilExternalUserDeletedAfterBlocked","Option":"Write"},{"CIMType":"String","Description":"Automatic action that the service should take when an external user's last access package assignment is removed. The possible values are: none, blockSignIn, blockSignInAndDelete, unknownFutureValue.","Name":"ExternalUserLifecycleAction","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Manages Entra Id Entitlement Management settings."},{"ClassName":"MSFT_AADExternalIdentityPolicy","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"Boolean","Description":"Reserved for future use.","Name":"AllowDeletedIdentitiesDataRemoval","Option":"Write"},{"CIMType":"Boolean","Description":"Defines whether external users can leave the guest tenant. If set to false, self-service controls are disabled, and the admin of the guest tenant must manually remove the external user from the guest tenant. When the external user leaves the tenant, their data in the guest tenant is first soft-deleted then permanently deleted in 30 days.","Name":"AllowExternalIdentitiesToLeave","Option":"Required"},{"CIMType":"MSFT_Credential","Description":"Credentials for the Microsoft Graph delegated permissions.","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Represents the tenant-wide policy that controls whether external users can leave the guest Microsoft Entra tenant via self-service controls."},{"ClassName":"MSFT_AADFeatureRolloutPolicy","Parameters":[{"CIMType":"String[]","Description":"Indicates the DisplayName of the groups the policy is assigned to.","Name":"AppliesTo","Option":"Write"},{"CIMType":"String","Description":"A description for this feature rollout policy.","Name":"Description","Option":"Write"},{"CIMType":"String","Description":"The display name for this feature rollout policy.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"Possible values are: passthroughAuthentication, seamlessSso, passwordHashSync, emailAsAlternateId, unknownFutureValue, certificateBasedAuthentication. You must use the Prefer: include-unknown-enum-members request header to get the following value or values in this evolvable enum: certificateBasedAuthentication. For more information about the prerequisites for the enabled features, see Prerequisites for enabled features.","Name":"Feature","Option":"Write","ValueMap":["passthroughAuthentication","seamlessSso","passwordHashSync","emailAsAlternateId","unknownFutureValue","certificateBasedAuthentication"],"Values":["passthroughAuthentication","seamlessSso","passwordHashSync","emailAsAlternateId","unknownFutureValue","certificateBasedAuthentication"]},{"CIMType":"Boolean","Description":"Indicates whether this feature rollout policy should be applied to the entire organization.","Name":"IsAppliedToOrganization","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether the feature rollout is enabled.","Name":"IsEnabled","Option":"Write"},{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"Id","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Policy Feature Rollout Policy"},{"ClassName":"MSFT_AADFederationConfiguration","Parameters":[{"CIMType":"String","Description":"The display name of the SAML/WS-Fed based identity provider. Inherited from identityProviderBase.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"Unique fientifier","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Issuer URI of the federation server. Inherited from samlOrWsFedProvider.","Name":"IssuerUri","Option":"Write"},{"CIMType":"String","Description":"URI of the metadata exchange endpoint used for authentication from rich client applications. Inherited from samlOrWsFedProvider.","Name":"MetadataExchangeUri","Option":"Write"},{"CIMType":"String","Description":"URI that web-based clients are directed to when signing in to Microsoft Entra services. Inherited from samlOrWsFedProvider.","Name":"PassiveSignInUri","Option":"Write"},{"CIMType":"String","Description":"Preferred authentication protocol. The possible values are: wsFed, saml. Inherited from samlOrWsFedProvider.","Name":"PreferredAuthenticationProtocol","Option":"Write"},{"CIMType":"String","Description":"Current certificate used to sign tokens passed to the Microsoft identity platform. The certificate is formatted as a Base64 encoded string of the public portion of the federated IdP's token signing certificate and must be compatible with the X509Certificate2 class.","Name":"SigningCertificate","Option":"Write"},{"CIMType":"String[]","Description":"List of associated domains.","Name":"Domains","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Configures federation in Entra Id."},{"ClassName":"MSFT_AADFilteringPolicy","Parameters":[{"CIMType":"String","Description":"Name of the policy.","Name":"Name","Option":"Key"},{"CIMType":"String","Description":"Unique identifier of the policy.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Description for the policy.","Name":"Description","Option":"Write"},{"CIMType":"String","Description":"Action associated with the policy.","Name":"Action","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Configures filtering policies in Entra Id."},{"ClassName":"MSFT_AADFilteringPolicyRuleDestination","Parameters":[{"CIMType":"String","Description":"Name of the destination.","Name":"name","Option":"Write"},{"CIMType":"String","Description":"FQDN value for the destination.","Name":"value","Option":"Write"}],"Description":"Configures filtering rules in Entra Id."},{"ClassName":"MSFT_AADFilteringPolicyRule","Parameters":[{"CIMType":"String","Description":"Name of the rule.","Name":"Name","Option":"Key"},{"CIMType":"String","Description":"Name of the associated policy.","Name":"Policy","Option":"Key"},{"CIMType":"String","Description":"Unique Id for the rule.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Type of rule.","Name":"RuleType","Option":"Write"},{"CIMType":"MSFT_AADFilteringPolicyRuleDestination[]","Description":"List of associated destinations with the rule.","Name":"Destinations","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Configures filtering rules in Entra Id."},{"ClassName":"MSFT_AADFilteringProfilePolicyLink","Parameters":[{"CIMType":"String","Description":"Logging state for the associated policy.","Name":"LoggingState","Option":"Write"},{"CIMType":"UInt32","Description":"Priority of the associated policy.","Name":"Priority","Option":"Write"},{"CIMType":"String","Description":"State of the associated policy.","Name":"State","Option":"Write"},{"CIMType":"String","Description":"Name of the associated policy.","Name":"PolicyName","Option":"Key"}],"Description":"Configures filtering profiles in Entra Id."},{"ClassName":"MSFT_AADFilteringProfile","Parameters":[{"CIMType":"String","Description":"Profile name.","Name":"Name","Option":"Key"},{"CIMType":"String","Description":"Unique identifier for the profile.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Description of the profile.","Name":"Description","Option":"Write"},{"CIMType":"String","Description":"State of the profile.","Name":"State","Option":"Write"},{"CIMType":"UInt32","Description":"Priority level for the profile.","Name":"Priority","Option":"Write"},{"CIMType":"MSFT_AADFilteringProfilePolicyLink[]","Description":"List of filtering policy names associated with the profile.","Name":"Policies","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Configures filtering profiles in Entra Id."},{"ClassName":"MSFT_AADGroupLicense","Parameters":[{"CIMType":"String[]","Description":"A collection of the unique identifiers for plans that have been disabled.","Name":"DisabledPlans","Option":"Write"},{"CIMType":"String","Description":"The unique identifier for the SKU.","Name":"SkuId","Option":"Key"}],"Description":"This resource configures an Azure Active Directory group. IMPORTANT: It does not support mail enabled security groups or mail enabled groups that are not unified or dynamic groups.\n\nIf using with AADUser, be aware that if AADUser->MemberOf is being specified and the referenced group is configured with AADGroup->Member then a conflict may arise if the two don't match. It is usually best to choose only one of them. See AADUser"},{"ClassName":"MSFT_AADGroup","Parameters":[{"CIMType":"String","Description":"DisplayName of the Azure Active Directory Group","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"Specifies a mail nickname for the group.","Name":"MailNickname","Option":"Key"},{"CIMType":"String","Description":"Specifies a description for the group.","Name":"Description","Option":"Write"},{"CIMType":"String","Description":"Specifies an ID for the group.","Name":"Id","Option":"Write"},{"CIMType":"String[]","Description":"User Service Principal values for the group's owners.","Name":"Owners","Option":"Write"},{"CIMType":"String[]","Description":"User Service Principal values for the group's members.","Name":"Members","Option":"Write"},{"CIMType":"String[]","Description":"Displayname values for the groups member of the group.","Name":"GroupAsMembers","Option":"Write"},{"CIMType":"String[]","Description":"DisplayName values for the groups that this group is a member of.","Name":"MemberOf","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies if the current group is part of a selected Group Lifecycle Policy configuration. Only applicable for Microsoft 365 Groups.","Name":"GroupLifecyclePolicySelectedEnabled","Option":"Write"},{"CIMType":"String[]","Description":"Specifies that the group is a dynamic group. To create a dynamic group, specify a value of DynamicMembership.","Name":"GroupTypes","Option":"Write"},{"CIMType":"String","Description":"Specifies the membership rule for a dynamic group.","Name":"MembershipRule","Option":"Write"},{"CIMType":"String","Description":"Specifies the rule processing state. The acceptable values for this parameter are: On. Process the group rule or Paused. Stop processing the group rule.","Name":"MembershipRuleProcessingState","Option":"Write","ValueMap":["On","Paused"],"Values":["On","Paused"]},{"CIMType":"Boolean","Description":"Specifies whether the group is security enabled. For security groups, this value must be $True.","Name":"SecurityEnabled","Option":"Required"},{"CIMType":"Boolean","Description":"Specifies whether this group is mail enabled. Currently, you cannot create mail enabled groups in Azure AD.","Name":"MailEnabled","Option":"Required"},{"CIMType":"Boolean","Description":"Specifies whether this group can be assigned a role. Only available when creating a group and can't be modified after group is created.","Name":"IsAssignableToRole","Option":"Write"},{"CIMType":"String[]","Description":"DisplayName values for the roles that the group is assigned to.","Name":"AssignedToRole","Option":"Write"},{"CIMType":"String","Description":"This parameter determines the visibility of the group's content and members list.","Name":"Visibility","Option":"Write","ValueMap":["Public","Private","HiddenMembership"],"Values":["Public","Private","HiddenMembership"]},{"CIMType":"MSFT_AADGroupLicense[]","Description":"List of Licenses assigned to the group.","Name":"AssignedLicenses","Option":"Write"},{"CIMType":"String","Description":"Specify if the Azure AD Group should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials for the Microsoft Graph delegated permissions.","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures an Azure Active Directory group. IMPORTANT: It does not support mail enabled security groups or mail enabled groups that are not unified or dynamic groups.\n\nIf using with AADUser, be aware that if AADUser->MemberOf is being specified and the referenced group is configured with AADGroup->Member then a conflict may arise if the two don't match. It is usually best to choose only one of them. See AADUser"},{"ClassName":"MSFT_MicrosoftGraphRequestSchedule","Parameters":[{"CIMType":"MSFT_MicrosoftGraphExpirationPattern","Description":"When the eligible or active assignment expires.","Name":"Expiration","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphPatternedRecurrence1","Description":"The frequency of the eligible or active assignment. This property is currently unsupported in PIM.","Name":"Recurrence","Option":"Write"},{"CIMType":"String","Description":"When the eligible or active assignment becomes active.","Name":"StartDateTime","Option":"Write"}],"Description":"Azure AD Group Eligibility Schedule"},{"ClassName":"MSFT_MicrosoftGraphExpirationPattern","Parameters":[{"CIMType":"String","Description":"The requestor's desired duration of access represented in ISO 8601 format for durations. For example, PT3H refers to three hours. If specified in a request, endDateTime should not be present and the type property should be set to afterDuration.","Name":"Duration","Option":"Write"},{"CIMType":"String","Description":"Timestamp of date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z.","Name":"EndDateTime","Option":"Write"},{"CIMType":"String","Description":"The requestor's desired expiration pattern type. The possible values are: notSpecified, noExpiration, afterDateTime, afterDuration.","Name":"Type","Option":"Write","ValueMap":["notSpecified","noExpiration","afterDateTime","afterDuration"],"Values":["notSpecified","noExpiration","afterDateTime","afterDuration"]}],"Description":"Azure AD Group Eligibility Schedule"},{"ClassName":"MSFT_MicrosoftGraphPatternedRecurrence1","Parameters":[{"CIMType":"MSFT_MicrosoftGraphRecurrencePattern1","Description":"The frequency of an event. For access reviews: Do not specify this property for a one-time access review. Only interval, dayOfMonth, and type (weekly, absoluteMonthly) properties of recurrencePattern are supported.","Name":"Pattern","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphRecurrenceRange1","Description":"The duration of an event.","Name":"Range","Option":"Write"}],"Description":"Azure AD Group Eligibility Schedule"},{"ClassName":"MSFT_MicrosoftGraphRecurrencePattern1","Parameters":[{"CIMType":"UInt32","Description":"The day of the month on which the event occurs. Required if type is absoluteMonthly or absoluteYearly.","Name":"DayOfMonth","Option":"Write"},{"CIMType":"String[]","Description":"A collection of the days of the week on which the event occurs. The possible values are: sunday, monday, tuesday, wednesday, thursday, friday, saturday. If type is relativeMonthly or relativeYearly, and daysOfWeek specifies more than one day, the event falls on the first day that satisfies the pattern. Required if type is weekly, relativeMonthly, or relativeYearly.","Name":"DaysOfWeek","Option":"Write","ValueMap":["sunday","monday","tuesday","wednesday","thursday","friday","saturday"],"Values":["sunday","monday","tuesday","wednesday","thursday","friday","saturday"]},{"CIMType":"String","Description":"The first day of the week. The possible values are: sunday, monday, tuesday, wednesday, thursday, friday, saturday. Default is sunday. Required if type is weekly.","Name":"FirstDayOfWeek","Option":"Write","ValueMap":["sunday","monday","tuesday","wednesday","thursday","friday","saturday"],"Values":["sunday","monday","tuesday","wednesday","thursday","friday","saturday"]},{"CIMType":"String","Description":"Specifies on which instance of the allowed days specified in daysOfWeek the event occurs, counted from the first instance in the month. The possible values are: first, second, third, fourth, last. Default is first. Optional and used if type is relativeMonthly or relativeYearly.","Name":"Index","Option":"Write","ValueMap":["first","second","third","fourth","last"],"Values":["first","second","third","fourth","last"]},{"CIMType":"UInt32","Description":"The number of units between occurrences, where units can be in days, weeks, months, or years, depending on the type. Required.","Name":"Interval","Option":"Write"},{"CIMType":"UInt32","Description":"The month in which the event occurs. This is a number from 1 to 12.","Name":"Month","Option":"Write"},{"CIMType":"String","Description":"The recurrence pattern type: daily, weekly, absoluteMonthly, relativeMonthly, absoluteYearly, relativeYearly. Required. For more information, see values of type property.","Name":"Type","Option":"Write","ValueMap":["daily","weekly","absoluteMonthly","relativeMonthly","absoluteYearly","relativeYearly"],"Values":["daily","weekly","absoluteMonthly","relativeMonthly","absoluteYearly","relativeYearly"]}],"Description":"Azure AD Group Eligibility Schedule"},{"ClassName":"MSFT_MicrosoftGraphRecurrenceRange1","Parameters":[{"CIMType":"String","Description":"The date to stop applying the recurrence pattern. Depending on the recurrence pattern of the event, the last occurrence of the meeting may not be this date. Required if type is endDate.","Name":"EndDate","Option":"Write"},{"CIMType":"UInt32","Description":"The number of times to repeat the event. Required and must be positive if type is numbered.","Name":"NumberOfOccurrences","Option":"Write"},{"CIMType":"String","Description":"Time zone for the startDate and endDate properties. Optional. If not specified, the time zone of the event is used.","Name":"RecurrenceTimeZone","Option":"Write"},{"CIMType":"String","Description":"The date to start applying the recurrence pattern. The first occurrence of the meeting may be this date or later, depending on the recurrence pattern of the event. Must be the same value as the start property of the recurring event. Required.","Name":"StartDate","Option":"Write"},{"CIMType":"String","Description":"The recurrence range. The possible values are: endDate, noEnd, numbered. Required.","Name":"Type","Option":"Write","ValueMap":["endDate","noEnd","numbered"],"Values":["endDate","noEnd","numbered"]}],"Description":"Azure AD Group Eligibility Schedule"},{"ClassName":"MSFT_AADGroupEligibilitySchedule","Parameters":[{"CIMType":"String","Description":"Displayname if the Principal is group, otherwise UserPrincipalName for user.","Name":"Principal","Option":"Key"},{"CIMType":"String","Description":"The identifier of the membership or ownership eligibility to the group that is governed by PIM. Required. The possible values are: owner, member. Supports $filter (eq).","Name":"AccessId","Option":"Key","ValueMap":["owner","member","unknownFutureValue"],"Values":["owner","member","unknownFutureValue"]},{"CIMType":"String","Description":"Displayname of the group representing the scope of the membership or ownership eligibility through PIM for groups.","Name":"GroupDisplayName","Option":"Key"},{"CIMType":"String","Description":"The identifier of the group representing the scope of the membership or ownership eligibility through PIM for groups. Required. Supports $filter (eq).","Name":"GroupId","Option":"Write"},{"CIMType":"String","Description":"Indicates whether the assignment is derived from a group assignment. It can further imply whether the caller can manage the schedule. Required. The possible values are: direct, group, unknownFutureValue. Supports $filter (eq).","Name":"MemberType","Option":"Write","ValueMap":["direct","group","unknownFutureValue"],"Values":["direct","group","unknownFutureValue"]},{"CIMType":"String","Description":"Principal type user or group","Name":"PrincipalType","Option":"Write","ValueMap":["user","group"],"Values":["user","group"]},{"CIMType":"MSFT_MicrosoftGraphrequestSchedule","Description":"Represents the period of the access assignment or eligibility. The scheduleInfo can represent a single occurrence or multiple recurring instances. Required.","Name":"ScheduleInfo","Option":"Write"},{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"Id","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Group Eligibility Schedule"},{"ClassName":"MSFT_AADRoleManagementPolicyExpirationRule","Parameters":[{"CIMType":"Boolean","Description":"Specifies if expiration is required.","Name":"isExpirationRequired","Option":"Write"},{"CIMType":"String","Description":"The maximum duration for the expiration.","Name":"maximumDuration","Option":"Write"}],"Description":"Azure AD Group Eligibility Schedule Settings"},{"ClassName":"MSFT_AADRoleManagementPolicyNotificationRule","Parameters":[{"CIMType":"String","Description":"Notification type for the rule.","Name":"notificationType","Option":"Write"},{"CIMType":"String","Description":"Type of the recipient for the notification.","Name":"recipientType","Option":"Write"},{"CIMType":"String","Description":"Level of the notification.","Name":"notificationLevel","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates if default recipients are enabled.","Name":"isDefaultRecipientsEnabled","Option":"Write"},{"CIMType":"String[]","Description":"List of notification recipients.","Name":"notificationRecipients","Option":"Write"}],"Description":"Azure AD Group Eligibility Schedule Settings"},{"ClassName":"MSFT_AADRoleManagementPolicyEnablementRule","Parameters":[{"CIMType":"String[]","Description":"List of enabled rules.","Name":"enabledRules","Option":"Write"}],"Description":"Azure AD Group Eligibility Schedule Settings"},{"ClassName":"MSFT_AADRoleManagementPolicySubjectSet","Parameters":[{"CIMType":"String","Description":"The type of the subject set.","Name":"odataType","Option":"Write"}],"Description":"Azure AD Group Eligibility Schedule Settings"},{"ClassName":"MSFT_AADRoleManagementPolicyApprovalStage","Parameters":[{"CIMType":"UInt32","Description":"The number of days that a request can be pending a response before it is automatically denied.","Name":"approvalStageTimeOutInDays","Option":"Write"},{"CIMType":"UInt32","Description":"The time a request can be pending a response from a primary approver before it can be escalated to the escalation approvers.","Name":"escalationTimeInMinutes","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether the approver must provide justification for their reponse.","Name":"isApproverJustificationRequired","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether escalation if enabled.","Name":"isEscalationEnabled","Option":"Write"},{"CIMType":"MSFT_AADRoleManagementPolicySubjectSet[]","Description":"The escalation approvers for this stage when the primary approvers don't respond.","Name":"escalationApprovers","Option":"Write"},{"CIMType":"MSFT_AADRoleManagementPolicySubjectSet[]","Description":"The primary approvers of this stage.","Name":"primaryApprovers","Option":"Write"}],"Description":"Azure AD Group Eligibility Schedule Settings"},{"ClassName":"MSFT_AADRoleManagementPolicyApprovalSettings","Parameters":[{"CIMType":"String","Description":"One of SingleStage, Serial, Parallel, NoApproval (default). NoApproval is used when isApprovalRequired is false.","Name":"approvalMode","Option":"Write"},{"CIMType":"MSFT_AADRoleManagementPolicyApprovalStage[]","Description":"If approval is required, the one or two elements of this collection define each of the stages of approval. An empty array if no approval is required.","Name":"approvalStages","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether approval is required for requests in this policy.","Name":"isApprovalRequired","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether approval is required for a user to extend their assignment.","Name":"isApprovalRequiredForExtension","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether the requestor is required to supply a justification in their request.","Name":"isRequestorJustificationRequired","Option":"Write"}],"Description":"Azure AD Group Eligibility Schedule Settings"},{"ClassName":"MSFT_AADRoleManagementPolicyApprovalRule","Parameters":[{"CIMType":"MSFT_AADRoleManagementPolicyApprovalSettings","Description":"Settings for approval requirements.","Name":"setting","Option":"Write"}],"Description":"Azure AD Group Eligibility Schedule Settings"},{"ClassName":"MSFT_AADRoleManagementPolicyAuthenticationContextRule","Parameters":[{"CIMType":"Boolean","Description":"Indicates if the authentication context rule is enabled.","Name":"isEnabled","Option":"Write"},{"CIMType":"String","Description":"Claim value associated with the rule.","Name":"claimValue","Option":"Write"}],"Description":"Azure AD Group Eligibility Schedule Settings"},{"ClassName":"MSFT_AADGroupEligibilityScheduleSettings","Parameters":[{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"Group display name.","Name":"GroupDisplayName","Option":"Key"},{"CIMType":"String","Description":"Rule Type.","Name":"RuleType","Option":"Write"},{"CIMType":"string","Description":"PIM Group Role.","Name":"PIMGroupRole","Option":"Key","ValueMap":["member","owner"],"Values":["member","owner"]},{"CIMType":"MSFT_AADRoleManagementPolicyExpirationRule","Description":"Expiration Rule.","Name":"ExpirationRule","Option":"Write"},{"CIMType":"MSFT_AADRoleManagementPolicyNotificationRule","Description":"Notification Rule.","Name":"NotificationRule","Option":"Write"},{"CIMType":"MSFT_AADRoleManagementPolicyEnablementRule","Description":"Enablement Rule.","Name":"EnablementRule","Option":"Write"},{"CIMType":"MSFT_AADRoleManagementPolicyApprovalRule","Description":"Approval Rule.","Name":"ApprovalRule","Option":"Write"},{"CIMType":"MSFT_AADRoleManagementPolicyAuthenticationContextRule","Description":"Authentication Context Rule.","Name":"AuthenticationContextRule","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Group Eligibility Schedule Settings"},{"ClassName":"MSFT_AADGroupLifecyclePolicy","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"UInt32","Description":"The number of days a group can exist before it needs to be renewed.","Name":"GroupLifetimeInDays","Option":"Required"},{"CIMType":"String","Description":"This parameter allows the admin to select which office 365 groups the policy will apply to. 'None' will create the policy in a disabled state. 'All' will apply the policy to every Office 365 group in the tenant. 'Selected' will allow the admin to choose specific Office 365 groups that the policy will apply to.","Name":"ManagedGroupTypes","Option":"Required","ValueMap":["All","None","Selected"],"Values":["All","None","Selected"]},{"CIMType":"String[]","Description":"Notification emails for groups that have no owners will be sent to these email addresses.","Name":"AlternateNotificationEmails","Option":"Required"},{"CIMType":"String","Description":"Specify if the Azure AD Groups Lifecycle Policy should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials for the Microsoft Graph delegated permissions.","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Group Lifecycle Policy (e.g. Expiration)."},{"ClassName":"MSFT_AADGroupsNamingPolicy","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"String","Description":"Prefixes and suffixes to add to the group name.","Name":"PrefixSuffixNamingRequirement","Option":"Write"},{"CIMType":"String[]","Description":"Comma delimited list of words that should be blocked from being included in groups' names.","Name":"CustomBlockedWordsList","Option":"Write"},{"CIMType":"String","Description":"Specify if the Azure AD Groups Naming Policy should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials for the Microsoft Graph delegated permissions.","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Group Naming Policy."},{"ClassName":"MSFT_AADGroupsSettings","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"Boolean","Description":"The flag indicating whether Office 365 group creation is allowed in the directory by non-admin users. This setting does not require an Azure Active Directory Premium P1 license.","Name":"EnableGroupCreation","Option":"Write"},{"CIMType":"Boolean","Description":"Boolean indicating whether or not sensitivity labels can be assigned to M365-groups.","Name":"EnableMIPLabels","Option":"Write"},{"CIMType":"Boolean","Description":"Boolean indicating whether or not a guest user can be an owner of groups.","Name":"AllowGuestsToBeGroupOwner","Option":"Write"},{"CIMType":"Boolean","Description":"Boolean indicating whether or not a guest user can have access to Office 365 groups content. This setting does not require an Azure Active Directory Premium P1 license.","Name":"AllowGuestsToAccessGroups","Option":"Write"},{"CIMType":"String","Description":"The url of a link to the guest usage guidelines.","Name":"GuestUsageGuidelinesUrl","Option":"Write"},{"CIMType":"String","Description":"Name of the security group for which the members are allowed to create Office 365 groups even when EnableGroupCreation == false.","Name":"GroupCreationAllowedGroupName","Option":"Write"},{"CIMType":"Boolean","Description":"A boolean indicating whether or not is allowed to add guests to this directory.","Name":"AllowToAddGuests","Option":"Write"},{"CIMType":"String","Description":"A link to the Group Usage Guidelines.","Name":"UsageGuidelinesUrl","Option":"Write"},{"CIMType":"Boolean","Description":"Boolean, a tenant-wide setting that assigns the default value to the writebackConfiguration/isEnabled property of new groups, if the property isn't specified during group creation. This setting is applicable when group writeback is configured in Microsoft Entra Connect.","Name":"NewUnifiedGroupWritebackDefault","Option":"Write"},{"CIMType":"String","Description":"Specify if the Azure AD Groups Naming Policy should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials for the Microsoft Graph delegated permissions.","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Groups Settings."},{"ClassName":"MSFT_AADHomeRealDiscoveryPolicyDefinition","Parameters":[{"CIMType":"Boolean","Description":"Accelerate to Federated Domain.","Name":"AccelerateToFederatedDomain","Option":"Write"},{"CIMType":"Boolean","Description":"Allow cloud password validation.","Name":"AllowCloudPasswordValidation","Option":"Write"},{"CIMType":"MSFT_AADHomeRealDiscoveryPolicyDefinitionAlternateIdLogin","Description":"AlternateIdLogin complex object.","Name":"AlternateIdLogin","Option":"Write"},{"CIMType":"String","Description":"Preffered Domain value.","Name":"PreferredDomain","Option":"Write"}],"Description":"Azure AD Home Realm Discovery Policy"},{"ClassName":"MSFT_AADHomeRealDiscoveryPolicyDefinitionAlternateIdLogin","Parameters":[{"CIMType":"Boolean","Description":"Boolean for whether AlternateIdLogin is enabled.","Name":"Enabled","Option":"Write"}],"Description":"Azure AD Home Realm Discovery Policy"},{"ClassName":"MSFT_AADHomeRealmDiscoveryPolicy","Parameters":[{"CIMType":"String","Description":"Display name for this policy. Required.","Name":"DisplayName","Option":"Key"},{"CIMType":"MSFT_AADHomeRealDiscoveryPolicyDefinition[]","Description":"A string collection containing a complex object array that defines the rules and settings for a policy. The syntax for the definition differs for each derived policy type. Required.","Name":"Definition","Option":"Write"},{"CIMType":"Boolean","Description":"If set to true, activates this policy. There can be many policies for the same policy type, but only one can be activated as the organization default. Optional, default value is false.","Name":"IsOrganizationDefault","Option":"Write"},{"CIMType":"String","Description":"Description for this policy. Required.","Name":"Description","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Home Realm Discovery Policy"},{"ClassName":"MSFT_AADIdentityAPIConnectionCertificate","Parameters":[{"CIMType":"MSFT_Credential","Description":"Pkcs12Value of the certificate as a secure string in Base64 encoding","Name":"Pkcs12Value","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the certificate in Base64 encoding","Name":"Thumbprint","Option":"Key"},{"CIMType":"MSFT_Credential","Description":"Password of the certificate as a secure string","Name":"Password","Option":"Write"},{"CIMType":"Boolean","Description":"Tells if the certificate is in use or not","Name":"IsActive","Option":"Write"}],"Description":"Azure AD Identity API Connector"},{"ClassName":"MSFT_AADIdentityAPIConnector","Parameters":[{"CIMType":"String","Description":"The name of the API connector.","Name":"DisplayName","Option":"Required"},{"CIMType":"String","Description":"The URL of the API endpoint to call.","Name":"TargetUrl","Option":"Write"},{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The username of the password","Name":"Username","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"The password of certificate/basic auth","Name":"Password","Option":"Write"},{"CIMType":"MSFT_AADIdentityAPIConnectionCertificate[]","Description":"List of certificates to be used in the API connector","Name":"Certificates","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Identity API Connector"},{"ClassName":"MSFT_MicrosoftGraphUserFlowApiConnectorConfiguration","Parameters":[{"CIMType":"String","Description":"The name of the connector used for post federation signup step.","Name":"postFederationSignupConnectorName","Option":"Write"},{"CIMType":"String","Description":"The name of the connector used for post attribute collection step.","Name":"postAttributeCollectionConnectorName","Option":"Write"}],"Description":"Azure AD Identity B2 X User Flow"},{"ClassName":"MSFT_MicrosoftGraphuserFlowUserAttributeAssignmentUserAttributeValues","Parameters":[{"CIMType":"String","Description":"The display name of the property displayed to the end user in the user flow.","Name":"Name","Option":"Key"},{"CIMType":"String","Description":"The value that is set when this item is selected.","Name":"Value","Option":"Write"},{"CIMType":"Boolean","Description":"Used to set the value as the default.","Name":"IsDefault","Option":"Write"}],"Description":"Azure AD Identity B2 X User Flow"},{"ClassName":"MSFT_MicrosoftGraphuserFlowUserAttributeAssignment","Parameters":[{"CIMType":"String","Description":"The unique identifier of identityUserFlowAttributeAssignment.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"The display name of the identityUserFlowAttribute within a user flow.","Name":"DisplayName","Option":"Write"},{"CIMType":"Boolean","Description":"Determines whether the identityUserFlowAttribute is optional.","Name":"IsOptional","Option":"Write"},{"CIMType":"String","Description":"User Flow Attribute Input Type.","Name":"UserInputType","Option":"Write","ValueMap":["textBox","dateTimeDropdown","radioSingleSelect","dropdownSingleSelect","emailBox","checkboxMultiSelect"],"Values":["textBox","dateTimeDropdown","radioSingleSelect","dropdownSingleSelect","emailBox","checkboxMultiSelect"]},{"CIMType":"MSFT_MicrosoftGraphuserFlowUserAttributeAssignmentUserAttributeValues[]","Description":"The list of user attribute values for this assignment.","Name":"UserAttributeValues","Option":"Write"}],"Description":"Azure AD Identity B2 X User Flow"},{"ClassName":"MSFT_AADIdentityB2XUserFlow","Parameters":[{"CIMType":"MSFT_MicrosoftGraphuserFlowApiConnectorConfiguration","Description":"Configuration for enabling an API connector for use as part of the self-service sign-up user flow. You can only obtain the value of this object using Get userFlowApiConnectorConfiguration.","Name":"ApiConnectorConfiguration","Option":"Write"},{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"Id","Option":"Key"},{"CIMType":"String[]","Description":"The identity providers included in the user flow.","Name":"IdentityProviders","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphuserFlowUserAttributeAssignment[]","Description":"The user attribute assignments included in the user flow.","Name":"UserAttributeAssignments","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Identity B2 X User Flow"},{"ClassName":"MSFT_IdentityGovernanceScope","Parameters":[{"CIMType":"String","Description":"The @odata.type for the Scope.","Name":"OdataType","Option":"Write"},{"CIMType":"String","Description":"The rule associated with the Scope.","Name":"Rule","Option":"Write"}],"Description":"Use this resource to manage Lifecycle workflows."},{"ClassName":"MSFT_IdentityGovernanceTrigger","Parameters":[{"CIMType":"String","Description":"The @odata.type for the Trigger.","Name":"OdataType","Option":"Write"},{"CIMType":"String","Description":"The time-based attribute for the Trigger.","Name":"TimeBasedAttribute","Option":"Write"},{"CIMType":"SInt32","Description":"The offset in days for the Trigger.","Name":"OffsetInDays","Option":"Write"}],"Description":"Use this resource to manage Lifecycle workflows."},{"ClassName":"MSFT_IdentityGovernanceWorkflowExecutionConditions","Parameters":[{"CIMType":"String","Description":"The @odata.type for the Workflow Execution Conditions.","Name":"OdataType","Option":"Write"},{"CIMType":"MSFT_IdentityGovernanceScope","Description":"The scope for the Workflow Execution Conditions.","Name":"ScopeValue","Option":"Write"},{"CIMType":"MSFT_IdentityGovernanceTrigger","Description":"The trigger for the Workflow Execution Conditions.","Name":"TriggerValue","Option":"Write"}],"Description":"Use this resource to manage Lifecycle workflows."},{"ClassName":"MSFT_AADIdentityGovernanceTaskArguments","Parameters":[{"CIMType":"String","Description":"The name of the key","Name":"Name","Option":"Key"},{"CIMType":"String","Description":"The value associated with the key","Name":"Value","Option":"Write"}],"Description":"Use this resource to manage Lifecycle workflows."},{"ClassName":"MSFT_AADIdentityGovernanceTask","Parameters":[{"CIMType":"String","Description":"Specifies the display name of the Workflow Task","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"Description of the Workflow Task","Name":"Description","Option":"Write"},{"CIMType":"String","Description":"Category of the Workflow Task","Name":"Category","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates if the Workflow Task is enabled or not","Name":"IsEnabled","Option":"Write"},{"CIMType":"SInt32","Description":"The sequence in which the task is executed","Name":"ExecutionSequence","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether the task should continue on error","Name":"ContinueOnError","Option":"Write"},{"CIMType":"String","Description":"ID of the task definition associated with this Workflow Task","Name":"TaskDefinitionId","Option":"Write"},{"CIMType":"MSFT_AADIdentityGovernanceTaskArguments[]","Description":"Arguments for the Workflow Task","Name":"Arguments","Option":"Write"}],"Description":"Use this resource to manage Lifecycle workflows."},{"ClassName":"MSFT_AADIdentityGovernanceLifecycleWorkflow","Parameters":[{"CIMType":"String","Description":"Specifies the Display Name of the Workflow","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"Description of the Workflow","Name":"Description","Option":"Write"},{"CIMType":"String","Description":"Category of the Workflow","Name":"Category","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates if the Workflow is enabled","Name":"IsEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates if scheduling is enabled for the Workflow","Name":"IsSchedulingEnabled","Option":"Write"},{"CIMType":"MSFT_AADIdentityGovernanceTask[]","Description":"Tasks associated with this workflow","Name":"Tasks","Option":"Write"},{"CIMType":"MSFT_IdentityGovernanceWorkflowExecutionConditions","Description":"ExecutionConditions for this workflow","Name":"ExecutionConditions","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Use this resource to manage Lifecycle workflows."},{"ClassName":"MSFT_AADIdentityGovernanceLifecycleWorkflowCustomTaskExtensionClientConfiguration","Parameters":[{"CIMType":"UInt32","Description":"The max duration in milliseconds that Microsoft Entra ID waits for a response from the external app before it shuts down the connection. The valid range is between 200 and 2000 milliseconds. Default duration is 1000.","Name":"timeoutInMilliseconds","Option":"Write"},{"CIMType":"UInt32","Description":"The max number of retries that Microsoft Entra ID makes to the external API. Values of 0 or 1 are supported. If null, the default for the service applies.","Name":"maximumRetries","Option":"Write"}],"Description":"Configures custom extensions for Lifecycle workflows in Entra id."},{"ClassName":"MSFT_AADIdentityGovernanceLifecycleWorkflowCustomTaskExtensionEndpointConfiguration","Parameters":[{"CIMType":"String","Description":"The name of the logic app.","Name":"logicAppWorkflowName","Option":"Write"},{"CIMType":"String","Description":"The Azure resource group name for the logic app.","Name":"resourceGroupName","Option":"Write"},{"CIMType":"String","Description":"Identifier of the Azure subscription for the logic app.","Name":"subscriptionId","Option":"Write"},{"CIMType":"String","Description":"Url of the logic app.","Name":"url","Option":"Write"}],"Description":"Configures custom extensions for Lifecycle workflows in Entra id."},{"ClassName":"MSFT_AADIdentityGovernanceLifecycleWorkflowCustomTaskExtensionCallbackConfiguration","Parameters":[{"CIMType":"String","Description":"Callback time out in ISO 8601 time duration. Accepted time durations are between five minutes to three hours. For example, PT5M for five minutes and PT3H for three hours. Inherited from customExtensionCallbackConfiguration.","Name":"timeoutDuration","Option":"Write"},{"CIMType":"String[]","Description":"List of apps names that are allowed to resume a task processing result.","Name":"authorizedApps","Option":"Write"}],"Description":"Configures custom extensions for Lifecycle workflows in Entra id."},{"ClassName":"MSFT_AADIdentityGovernanceLifecycleWorkflowCustomTaskExtension","Parameters":[{"CIMType":"String","Description":"Display name of the custom extension.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"Unique Id of the extension.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Description of the extension.","Name":"Description","Option":"Write"},{"CIMType":"MSFT_AADIdentityGovernanceLifecycleWorkflowCustomTaskExtensionClientConfiguration","Description":"Client configuration for the extension","Name":"ClientConfiguration","Option":"Write"},{"CIMType":"MSFT_AADIdentityGovernanceLifecycleWorkflowCustomTaskExtensionEndpointConfiguration","Description":"Endpoint configuration for the extension","Name":"EndpointConfiguration","Option":"Write"},{"CIMType":"MSFT_AADIdentityGovernanceLifecycleWorkflowCustomTaskExtensionCallbackConfiguration","Description":"Callback configuration for the extension","Name":"CallbackConfiguration","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Configures custom extensions for Lifecycle workflows in Entra id."},{"ClassName":"MSFT_AADIdentityGovernanceProgram","Parameters":[{"CIMType":"String","Description":"A description for this identity governance program.","Name":"Description","Option":"Write"},{"CIMType":"String","Description":"The display name for this identity governance program.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"Id","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Identity Governance Program."},{"ClassName":"MSFT_AADIdentityProtectionPolicySettings","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"Boolean","Description":"If true, user risk is cleared on password reset.","Name":"IsUserRiskClearedOnPasswordReset","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Use this resource to monitor the identity protection policy settings in AAD."},{"ClassName":"MSFT_AADLifecycleWorkflowSettings","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"String","Description":"Specifies the domain that should be used when sending email notifications. This domain must be verified in order to be used. We recommend that you use a domain that has the appropriate DNS records to facilitate email validation, like SPF, DKIM, DMARC, and MX, because this then complies with the RFC compliance for sending and receiving email. For details, see Learn more about Exchange Online Email Routing.","Name":"SenderDomain","Option":"Write"},{"CIMType":"UInt32","Description":"The interval in hours at which all workflows running in the tenant should be scheduled for execution. This interval has a minimum value of 1 and a maximum value of 24. The default value is 3 hours.","Name":"WorkflowScheduleIntervalInHours","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies if the organization's banner logo should be included in email notifications. The banner logo will replace the Microsoft logo at the top of the email notification. If true the banner logo will be taken from the tenant's branding settings. This value can only be set to true if the organizationalBranding bannerLogo property is set.","Name":"UseCompanyBranding","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Update the properties of a lifecycleManagementSettings object."},{"ClassName":"MSFT_AADMultiTenantOrganizationIdentitySyncPolicyTemplateUserSyncInbound","Parameters":[{"CIMType":"Boolean","Description":"Defines whether user objects should be synchronized from the partner tenant. false causes any current user synchronization from the source tenant to the target tenant to stop. This property has no impact on existing users who have already been synchronized.","Name":"isSyncAllowed","Option":"Write"}],"Description":"Defines an optional cross-tenant access policy template with user synchronization settings for multitenant organization tenants."},{"ClassName":"MSFT_AADMultiTenantOrganizationIdentitySyncPolicyTemplate","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"String","Description":"Specifies whether the template will be applied to user synchronization settings of certain tenants. The possible values are: none, newPartners, existingPartners, unknownFutureValue. You can also specify multiple values like newPartners,existingPartners (default). none indicates the template is not applied to any new or existing partner tenants. newPartners indicates the template is applied to new partner tenants. existingPartners indicates the template is applied to existing partner tenants, those who already had partner-specific user synchronization settings in place.","Name":"TemplateApplicationLevel","Option":"Write"},{"CIMType":"MSFT_AADMultiTenantOrganizationIdentitySyncPolicyTemplateUserSyncInbound","Description":"Determines whether users can be synchronized from the partner tenant. false causes any current user synchronization from the source tenant to the target tenant to stop. This property has no impact on existing users who have already been synchronized.","Name":"UserSyncInbound","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Defines an optional cross-tenant access policy template with user synchronization settings for multitenant organization tenants."},{"ClassName":"MSFT_AADNamedLocationPolicy","Parameters":[{"CIMType":"string","Description":"Specifies the Odata Type of a Named Location object in Azure Active Directory","Name":"OdataType","Option":"Write","ValueMap":["#microsoft.graph.CountryNamedLocation","#microsoft.graph.ipNamedLocation","#microsoft.graph.compliantNetworkNamedLocation"],"Values":["#microsoft.graph.CountryNamedLocation","#microsoft.graph.ipNamedLocation","#microsoft.graph.compliantNetworkNamedLocation"]},{"CIMType":"String","Description":"Specifies the ID of a Named Location in Azure Active Directory.","Name":"Id","Option":"Write"},{"CIMType":"string","Description":"Specifies the Display Name of a Named Location in Azure Active Directory","Name":"DisplayName","Option":"Key"},{"CIMType":"String[]","Description":"Specifies the IP ranges of the Named Location in Azure Active Directory","Name":"IpRanges","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies the isTrusted value for the Named Location (IP ranges only) in Azure Active Directory","Name":"IsTrusted","Option":"Write"},{"CIMType":"String[]","Description":"Specifies the countries and regions for the Named Location in Azure Active Directory","Name":"CountriesAndRegions","Option":"Write"},{"CIMType":"String","Description":"Determines what method is used to decide which country the user is located in. Possible values are clientIpAddress(default) and authenticatorAppGps.","Name":"CountryLookupMethod","Option":"Write","ValueMap":["clientIpAddress","authenticatorAppGps"],"Values":["clientIpAddress","authenticatorAppGps"]},{"CIMType":"Boolean","Description":"Specifies the includeUnknownCountriesAndRegions value for the Named Location in Azure Active Directory","Name":"IncludeUnknownCountriesAndRegions","Option":"Write"},{"CIMType":"String","Description":"Specify if the Azure AD Named Location should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials for the Microsoft Graph delegated permissions.","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures the Azure AD Named Location Policies in Azure Active Directory"},{"ClassName":"MSFT_MicrosoftGraphNetworkAccessForwardingPolicyRule","Parameters":[{"CIMType":"String","Description":"Policy Rule Name. Required","Name":"Name","Option":"Key"},{"CIMType":"String","Description":"Action value.","Name":"ActionValue","Option":"Write"},{"CIMType":"String","Description":"Type of Rule","Name":"RuleType","Option":"Write"},{"CIMType":"UInt32[]","Description":"List of Ports.","Name":"Ports","Option":"Write"},{"CIMType":"String","Description":"Protocol Value","Name":"Protocol","Option":"Write"},{"CIMType":"String[]","Description":"List of destinations.","Name":"Destinations","Option":"Write"}],"Description":"Use this resource to monitor the forwarding policy rules associated with the forwarding policies."},{"ClassName":"MSFT_AADNetworkAccessForwardingPolicy","Parameters":[{"CIMType":"String","Description":"Name of the forwarding policy","Name":"Name","Option":"Key"},{"CIMType":"MSFT_MicrosoftGraphNetworkAccessForwardingPolicyRule[]","Description":"List of rules associated to this forwarding policy.","Name":"PolicyRules","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Use this resource to monitor the forwarding policy rules associated with the forwarding policies."},{"ClassName":"MSFT_MicrosoftGraphNetworkaccessPolicyLink","Parameters":[{"CIMType":"String","Description":"Policy Name. Required","Name":"Name","Option":"Key"},{"CIMType":"String","Description":"Policy Link Id","Name":"PolicyLinkId","Option":"Write"},{"CIMType":"String","Description":"status","Name":"state","Option":"Write"}],"Description":"This resource configure the Azure AD Network Access Forwarding Profile"},{"ClassName":"MSFT_AADNetworkAccessForwardingProfile","Parameters":[{"CIMType":"String","Description":"Profile Name. Required.","Name":"Name","Option":"Key"},{"CIMType":"String","Description":"Id of the profile. Unique Identifier","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"status of the profile","Name":"State","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphNetworkaccessPolicyLink[]","Description":"Traffic forwarding policies associated with this profile.","Name":"Policies","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configure the Azure AD Network Access Forwarding Profile"},{"ClassName":"MSFT_AADNetworkAccessSettingConditionalAccess","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"String","Description":"Enable CA Signaling for Entra ID (covering all cloud apps). Accepted values are enabled or disabled.","Name":"SignalingStatus","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Configures the adaptive access settings in Entra Id"},{"ClassName":"MSFT_AADNetworkAccessSettingCrossTenantAccess","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"String","Description":"Enable Tenant Restrictions for Entra ID (covering all cloud apps). Accepted values are enabled or disabled.","Name":"NetworkPacketTaggingStatus","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Configures the universal tenant restrictions in Entra Id"},{"ClassName":"MSFT_AADOnPremisesPublishingProfilesSettings","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"Boolean","Description":"Enables of disables private net work connectors in Entra Id.","Name":"IsEnabled","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Configures the settings for the on-premises publishing profiles in Entra Id."},{"ClassName":"MSFT_MicrosoftGraphCertificateAuthority","Parameters":[{"CIMType":"String","Description":"Required. The base64 encoded string representing the public certificate.","Name":"Certificate","Option":"Key"},{"CIMType":"String","Description":"The URL of the certificate revocation list.","Name":"CertificateRevocationListUrl","Option":"Write"},{"CIMType":"String","Description":"The URL contains the list of all revoked certificates since the last time a full certificate revocaton list was created.","Name":"DeltaCertificateRevocationListUrl","Option":"Write"},{"CIMType":"Boolean","Description":"Required. true if the trusted certificate is a root authority, false if the trusted certificate is an intermediate authority.","Name":"IsRootAuthority","Option":"Write"}],"Description":"Azure AD Organization Certificate Based Auth Configuration"},{"ClassName":"MSFT_AADOrganizationCertificateBasedAuthConfiguration","Parameters":[{"CIMType":"MSFT_MicrosoftGraphcertificateAuthority[]","Description":"Collection of certificate authorities which creates a trusted certificate chain.","Name":"CertificateAuthorities","Option":"Write"},{"CIMType":"String","Description":"The Organization ID. Read-only.","Name":"OrganizationId","Option":"Key"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Organization Certificate Based Auth Configuration"},{"ClassName":"MSFT_AADPasswordRuleSettings","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"UInt32","Description":"The number of failed login attempts before the first lockout period begins.","Name":"LockoutThreshold","Option":"Write"},{"CIMType":"UInt32","Description":"The duration in seconds of the initial lockout period.","Name":"LockoutDurationInSeconds","Option":"Write"},{"CIMType":"Boolean","Description":"Boolean indicating if the banned password check for tenant specific banned password list is turned on or not.","Name":"EnableBannedPasswordCheck","Option":"Write"},{"CIMType":"String[]","Description":"A list of banned words in passwords.","Name":"BannedPasswordList","Option":"Write"},{"CIMType":"String","Description":"How should we enforce password policy check in on-premises system.","Name":"BannedPasswordCheckOnPremisesMode","Option":"Write","ValueMap":["Enforce","Audit"],"Values":["Enforce","Audit"]},{"CIMType":"Boolean","Description":"Boolean indicating if the banned password check is turned on or not for on-premises system.","Name":"EnableBannedPasswordCheckOnPremises","Option":"Write"},{"CIMType":"String","Description":"Specify if the Azure AD Password Rule Settings should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials for the Microsoft Graph delegated permissions.","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures the Azure Active Directory Password Rule Settings."},{"ClassName":"MSFT_AADPermissionGrantConditionSet","Parameters":[{"CIMType":"String","Description":"The unique identifier for the condition set.","Name":"Id","Option":"Write"},{"CIMType":"Boolean","Description":"Set to true to only match on client applications that are from a Microsoft Partner Network verified publisher. Set to false to match on any client app.","Name":"CertifiedClientApplicationsOnly","Option":"Write"},{"CIMType":"String[]","Description":"A list of appId values for the client applications to match with, or a list with the single value all to match any client application.","Name":"ClientApplicationIds","Option":"Write"},{"CIMType":"String[]","Description":"A list of Microsoft Partner Network (MPN) IDs for verified publishers of the client application, or a list with the single value all to match with client apps from any publisher.","Name":"ClientApplicationPublisherIds","Option":"Write"},{"CIMType":"String[]","Description":"A list of Entra ID tenant IDs in which the client application is registered, or a list with the single value all to match with client apps registered in any tenant.","Name":"ClientApplicationTenantIds","Option":"Write"},{"CIMType":"Boolean","Description":"Set to true to only match on client applications with a verified publisher. Set to false to match on any client app. Default is false.","Name":"ClientApplicationsFromVerifiedPublisherOnly","Option":"Write"},{"CIMType":"String","Description":"The permission classification for the permission being granted, or all to match with any permission classification (including permissions which are not classified). Default is all.","Name":"PermissionClassification","Option":"Write"},{"CIMType":"String[]","Description":"The list of permission display names to match with (e.g. 'User.Read', 'Mail.Send'), or a list with the single value all to match with any permission. Do not use permission GUIDs.","Name":"Permissions","Option":"Write"},{"CIMType":"String","Description":"The permission type of the permission being granted. Possible values: application for application permissions, or delegated for delegated permissions.","Name":"PermissionType","Option":"Write"},{"CIMType":"String","Description":"The appId of the resource application (e.g. '00000003-0000-0000-c000-000000000000' for Microsoft Graph) for which a permission is being granted, or 'any' to match any resource application. Use the AppId GUID, not the display name.","Name":"ResourceApplication","Option":"Write"}],"Description":"This resource configures an Entra Permission Grant Policy with its associated include and exclude condition sets.\n\nPermission Grant Policies allow organizations to delegate admin consent capabilities for specific Microsoft Graph permissions to non-Global Administrator users and groups.\n\nThis resource combines the parent policy and its condition sets into a single configuration, managing:\n- The parent permission grant policy properties (Id, DisplayName, Description)\n- Include condition sets as an embedded CIM instance array\n- Exclude condition sets as an embedded CIM instance array\n\n## Example\n\n```powershell\nAADPermissionGrantPolicy 'CustomConsentPolicy'\n{\n Id = \"my-custom-consent-policy\"\n DisplayName = \"My Custom Consent Policy\"\n Description = \"Custom policy for app consent with specific conditions\"\n Includes = @(\n MSFT_AADPermissionGrantConditionSet {\n Id = \"include-low-risk-delegated\"\n PermissionType = \"delegated\"\n PermissionClassification = \"low\"\n ClientApplicationIds = @(\"all\")\n ClientApplicationTenantIds = @($TenantId)\n ClientApplicationPublisherIds = @(\"all\")\n ClientApplicationsFromVerifiedPublisherOnly = $false\n ResourceApplication = \"00000003-0000-0000-c000-000000000000\"\n Permissions = @(\"User.Read\", \"openid\", \"profile\")\n }\n )\n Excludes = @(\n MSFT_AADPermissionGrantConditionSet {\n Id = \"exclude-high-risk-permissions\"\n PermissionType = \"delegated\"\n PermissionClassification = \"high\"\n ClientApplicationIds = @(\"all\")\n ResourceApplication = \"any\"\n Permissions = @(\"all\")\n }\n )\n Ensure = \"Present\"\n ApplicationId = $ApplicationId\n TenantId = $TenantId\n CertificateThumbprint = $CertificateThumbprint\n}\n```"},{"ClassName":"MSFT_AADPermissionGrantPolicy","Parameters":[{"CIMType":"String","Description":"The unique identifier for the permission grant policy.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"The display name for the permission grant policy.","Name":"DisplayName","Option":"Write"},{"CIMType":"String","Description":"The description for the permission grant policy.","Name":"Description","Option":"Write"},{"CIMType":"MSFT_AADPermissionGrantConditionSet[]","Description":"Condition sets which are included in this permission grant policy. Automatically constructed as part of the permission grant policy.","Name":"Includes","Option":"Write"},{"CIMType":"MSFT_AADPermissionGrantConditionSet[]","Description":"Condition sets which are excluded in this permission grant policy. Automatically constructed as part of the permission grant policy.","Name":"Excludes","Option":"Write"},{"CIMType":"String","Description":"Specify if the policy should exist.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials for the Microsoft Graph delegated permissions.","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Entra ID application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Entra ID tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Entra ID application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Entra ID application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures an Entra Permission Grant Policy with its associated include and exclude condition sets.\n\nPermission Grant Policies allow organizations to delegate admin consent capabilities for specific Microsoft Graph permissions to non-Global Administrator users and groups.\n\nThis resource combines the parent policy and its condition sets into a single configuration, managing:\n- The parent permission grant policy properties (Id, DisplayName, Description)\n- Include condition sets as an embedded CIM instance array\n- Exclude condition sets as an embedded CIM instance array\n\n## Example\n\n```powershell\nAADPermissionGrantPolicy 'CustomConsentPolicy'\n{\n Id = \"my-custom-consent-policy\"\n DisplayName = \"My Custom Consent Policy\"\n Description = \"Custom policy for app consent with specific conditions\"\n Includes = @(\n MSFT_AADPermissionGrantConditionSet {\n Id = \"include-low-risk-delegated\"\n PermissionType = \"delegated\"\n PermissionClassification = \"low\"\n ClientApplicationIds = @(\"all\")\n ClientApplicationTenantIds = @($TenantId)\n ClientApplicationPublisherIds = @(\"all\")\n ClientApplicationsFromVerifiedPublisherOnly = $false\n ResourceApplication = \"00000003-0000-0000-c000-000000000000\"\n Permissions = @(\"User.Read\", \"openid\", \"profile\")\n }\n )\n Excludes = @(\n MSFT_AADPermissionGrantConditionSet {\n Id = \"exclude-high-risk-permissions\"\n PermissionType = \"delegated\"\n PermissionClassification = \"high\"\n ClientApplicationIds = @(\"all\")\n ResourceApplication = \"any\"\n Permissions = @(\"all\")\n }\n )\n Ensure = \"Present\"\n ApplicationId = $ApplicationId\n TenantId = $TenantId\n CertificateThumbprint = $CertificateThumbprint\n}\n```"},{"ClassName":"MSFT_AADPIMGroupSetting","Parameters":[{"CIMType":"String","Description":"RuleDefinition DisplayName","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"The identifier of the membership or ownership eligibility to the group that is governed by PIM. Required. The possible values are: owner, member. Supports $filter (eq).","Name":"RoleDefinitionId","Option":"Key","ValueMap":["owner","member"],"Values":["owner","member"]},{"CIMType":"String","Description":"Specifies the Group Policy Id.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Activation maximum duration (hours).","Name":"ActivationMaxDuration","Option":"Write"},{"CIMType":"Boolean","Description":"Require justification on activation (True/False)","Name":"ActivationReqJustification","Option":"Write"},{"CIMType":"Boolean","Description":"Require ticket information on activation (True/False)","Name":"ActivationReqTicket","Option":"Write"},{"CIMType":"Boolean","Description":"Require MFA on activation (True/False)","Name":"ActivationReqMFA","Option":"Write"},{"CIMType":"Boolean","Description":"Require approval to activate (True/False)","Name":"ApprovaltoActivate","Option":"Write"},{"CIMType":"String[]","Description":"Approver User UPN and/or Group Displayname","Name":"ActivateApprover","Option":"Write"},{"CIMType":"Boolean","Description":"Allow permanent eligible assignment (True/False)","Name":"PermanentEligibleAssignmentisExpirationRequired","Option":"Write"},{"CIMType":"String","Description":"Expire eligible assignments after (Days)","Name":"ExpireEligibleAssignment","Option":"Write"},{"CIMType":"Boolean","Description":"Allow permanent active assignment (True/False)","Name":"PermanentActiveAssignmentisExpirationRequired","Option":"Write"},{"CIMType":"String","Description":"Expire active assignments after (Days)","Name":"ExpireActiveAssignment","Option":"Write"},{"CIMType":"Boolean","Description":"Require Azure Multi-Factor Authentication on active assignment (True/False)","Name":"AssignmentReqMFA","Option":"Write"},{"CIMType":"Boolean","Description":"Require justification on active assignment (True/False)","Name":"AssignmentReqJustification","Option":"Write"},{"CIMType":"Boolean","Description":"Require Azure Multi-Factor Authentication on eligible assignment (True/False)","Name":"ElegibilityAssignmentReqMFA","Option":"Write"},{"CIMType":"Boolean","Description":"Require justification on eligible assignment (True/False)","Name":"ElegibilityAssignmentReqJustification","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as eligible to this group: Group assignment alert, default recipient (True/False)","Name":"EligibleAlertNotificationDefaultRecipient","Option":"Write"},{"CIMType":"String[]","Description":"Send notifications when members are assigned as eligible to this group: Group assignment alert, additional recipient (UPN)","Name":"EligibleAlertNotificationAdditionalRecipient","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as eligible to this group: Group assignment alert, only critical Email (True/False)","Name":"EligibleAlertNotificationOnlyCritical","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as eligible to this group: Notification to the assigned user (assignee), default recipient (True/False)","Name":"EligibleAssigneeNotificationDefaultRecipient","Option":"Write"},{"CIMType":"String[]","Description":"Send notifications when members are assigned as eligible to this group: Notification to the assigned user (assignee), additional recipient (UPN)","Name":"EligibleAssigneeNotificationAdditionalRecipient","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as eligible to this group: Notification to the assigned user (assignee), only critical Email (True/False)","Name":"EligibleAssigneeNotificationOnlyCritical","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as eligible to this group: Request to approve a group assignment renewal/extension, default recipient (True/False)","Name":"EligibleApproveNotificationDefaultRecipient","Option":"Write"},{"CIMType":"String[]","Description":"Send notifications when members are assigned as eligible to this group: Request to approve a group assignment renewal/extension, additional recipient (UPN)","Name":"EligibleApproveNotificationAdditionalRecipient","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as eligible to this group: Request to approve a group assignment renewal/extension, only critical Email (True/False)","Name":"EligibleApproveNotificationOnlyCritical","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as active to this group: Group assignment alert, default recipient (True/False)","Name":"ActiveAlertNotificationDefaultRecipient","Option":"Write"},{"CIMType":"String[]","Description":"Send notifications when members are assigned as active to this group: Group assignment alert, additional recipient (UPN)","Name":"ActiveAlertNotificationAdditionalRecipient","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as active to this group: Group assignment alert, only critical Email (True/False)","Name":"ActiveAlertNotificationOnlyCritical","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as active to this group: Notification to the assigned user (assignee), default recipient (True/False)","Name":"ActiveAssigneeNotificationDefaultRecipient","Option":"Write"},{"CIMType":"String[]","Description":"Send notifications when members are assigned as active to this group: Notification to the assigned user (assignee), additional recipient (UPN)","Name":"ActiveAssigneeNotificationAdditionalRecipient","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as active to this group: Notification to the assigned user (assignee), only critical Email (True/False)","Name":"ActiveAssigneeNotificationOnlyCritical","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as active to this group: Request to approve a group assignment renewal/extension, default recipient (True/False)","Name":"ActiveApproveNotificationDefaultRecipient","Option":"Write"},{"CIMType":"String[]","Description":"Send notifications when members are assigned as active to this group: Request to approve a group assignment renewal/extension, additional recipient (UPN)","Name":"ActiveApproveNotificationAdditionalRecipient","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as active to this group: Request to approve a group assignment renewal/extension, only critical Email (True/False)","Name":"ActiveApproveNotificationOnlyCritical","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when eligible members activate this group: Group assignment alert, default recipient (True/False)","Name":"EligibleAssignmentAlertNotificationDefaultRecipient","Option":"Write"},{"CIMType":"String[]","Description":"Send notifications when eligible members activate this group: Group assignment alert, additional recipient (UPN)","Name":"EligibleAssignmentAlertNotificationAdditionalRecipient","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when eligible members activate this group: Group assignment alert, only critical Email (True/False)","Name":"EligibleAssignmentAlertNotificationOnlyCritical","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when eligible members activate this group: Notification to activated user (requestor), default recipient (True/False)","Name":"EligibleAssignmentAssigneeNotificationDefaultRecipient","Option":"Write"},{"CIMType":"String[]","Description":"Send notifications when eligible members activate this group: Notification to activated user (requestor), additional recipient (UPN)","Name":"EligibleAssignmentAssigneeNotificationAdditionalRecipient","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when eligible members activate this group: Notification to activated user (requestor), only critical Email (True/False)","Name":"EligibleAssignmentAssigneeNotificationOnlyCritical","Option":"Write"},{"CIMType":"Boolean","Description":"Authorization context is required (True/False)","Name":"AuthenticationContextRequired","Option":"Write"},{"CIMType":"String","Description":"Descriptive name of associated authorization context","Name":"AuthenticationContextName","Option":"Write"},{"CIMType":"String","Description":"Authorization context id","Name":"AuthenticationContextId","Option":"Write"},{"CIMType":"String","Description":"Specify if the Azure AD group setting should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present"],"Values":["Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials for the Microsoft Graph delegated permissions.","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures AAD PIM Group Settings."},{"ClassName":"MSFT_AADRemoteNetworkDeviceLinkbgpConfiguration","Parameters":[{"CIMType":"String","Description":"LocalIpAddress.","Name":"LocalIPAddress","Option":"Write"},{"CIMType":"String","Description":"PeerIpAddress.","Name":"PeerIPAddress","Option":"Write"},{"CIMType":"UInt32","Description":"Asn.","Name":"Asn","Option":"Write"}],"Description":"Use this resource to manage the Entra's Network Access Remote Networks, and related Device links."},{"ClassName":"MSFT_AADRemoteNetworkDeviceLinkRedundancyConfiguration","Parameters":[{"CIMType":"String","Description":"ZoneLocalIpAddress.","Name":"ZoneLocalIPAddress","Option":"Write"},{"CIMType":"String","Description":"RedundancyTier.","Name":"RedundancyTier","Option":"Write"}],"Description":"Use this resource to manage the Entra's Network Access Remote Networks, and related Device links."},{"ClassName":"MSFT_AADRemoteNetworkDeviceLinkTunnelConfiguration","Parameters":[{"CIMType":"String","Description":"PreSharedKey","Name":"PreSharedKey","Option":"Write"},{"CIMType":"String","Description":"ZoneRedundancyPreSharedKey","Name":"ZoneRedundancyPreSharedKey","Option":"Write"},{"CIMType":"UInt32","Description":"SaLifeTimeSeconds","Name":"SaLifeTimeSeconds","Option":"Write"},{"CIMType":"String","Description":"IpSecEncryption","Name":"IPSecEncryption","Option":"Write"},{"CIMType":"String","Description":"IpSecIntegrity","Name":"IPSecIntegrity","Option":"Write"},{"CIMType":"String","Description":"IkeEncryption","Name":"IKEEncryption","Option":"Write"},{"CIMType":"String","Description":"IkeIntegrity","Name":"IKEIntegrity","Option":"Write"},{"CIMType":"String","Description":"DhGroup","Name":"DHGroup","Option":"Write"},{"CIMType":"String","Description":"PfsGroup","Name":"PFSGroup","Option":"Write"},{"CIMType":"String","Description":"ODataType","Name":"ODataType","Option":"Write"}],"Description":"Use this resource to manage the Entra's Network Access Remote Networks, and related Device links."},{"ClassName":"MSFT_AADRemoteNetworkDeviceLink","Parameters":[{"CIMType":"String","Description":"Name of the Device Link","Name":"Name","Option":"Key"},{"CIMType":"String","Description":"IP Address","Name":"IPAddress","Option":"Write"},{"CIMType":"String","Description":"Bandwidth Capacity in Mbps","Name":"BandwidthCapacityInMbps","Option":"Write"},{"CIMType":"String","Description":"Device Vendor","Name":"DeviceVendor","Option":"Write"},{"CIMType":"MSFT_AADRemoteNetworkDeviceLinkbgpConfiguration","Description":"BgpConfiguration.","Name":"BgpConfiguration","Option":"Write"},{"CIMType":"MSFT_AADRemoteNetworkDeviceLinkRedundancyConfiguration","Description":"redundancyConfiguration.","Name":"RedundancyConfiguration","Option":"Write"},{"CIMType":"MSFT_AADRemoteNetworkDeviceLinkTunnelConfiguration","Description":"tunnelConfiguration","Name":"TunnelConfiguration","Option":"Write"}],"Description":"Use this resource to manage the Entra's Network Access Remote Networks, and related Device links."},{"ClassName":"MSFT_AADRemoteNetwork","Parameters":[{"CIMType":"String","Description":"Name of the remote network.","Name":"Name","Option":"Key"},{"CIMType":"String","Description":"Id of the remote network","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Region","Name":"Region","Option":"Write"},{"CIMType":"String[]","Description":"List of the forwarding profile names associated to this remote network","Name":"ForwardingProfiles","Option":"Write"},{"CIMType":"MSFT_AADRemoteNetworkDeviceLink[]","Description":"Device Links associated to this remote network","Name":"DeviceLinks","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Use this resource to manage the Entra's Network Access Remote Networks, and related Device links."},{"ClassName":"MSFT_AADRoleAssignmentScheduleRequestScheduleRecurrenceRange","Parameters":[{"CIMType":"DATETIME","Description":"The date to stop applying the recurrence pattern. Depending on the recurrence pattern of the event, the last occurrence of the meeting may not be this date.","Name":"endDate","Option":"Required"},{"CIMType":"UInt32","Description":"The number of times to repeat the event. Required and must be positive if type is numbered.","Name":"numberOfOccurrences","Option":"Write"},{"CIMType":"String","Description":"Time zone for the startDate and endDate properties.","Name":"recurrenceTimeZone","Option":"Write"},{"CIMType":"DATETIME","Description":"The date to start applying the recurrence pattern. The first occurrence of the meeting may be this date or later, depending on the recurrence pattern of the event. Must be the same value as the start property of the recurring event.","Name":"startDate","Option":"Required"},{"CIMType":"String","Description":"The recurrence range. The possible values are: endDate, noEnd, numbered.","Name":"type","Option":"Required","ValueMap":["endDate","noEnd","numbered"],"Values":["endDate","noEnd","numbered"]}],"Description":"This resource configures an Azure Active Directory Privilege Identity Management assignment.\n\n**Please note:** The difference between start and end times of assignments must be at least 5 minutes. Lower assignment times will result in an error.\nAlso, if you attempt to remove or update an assignment less than 5 minutes after the last modification, it will fail as well."},{"ClassName":"MSFT_AADRoleAssignmentScheduleRequestScheduleRecurrencePattern","Parameters":[{"CIMType":"UInt32","Description":"The day of the month on which the event occurs.","Name":"dayOfMonth","Option":"Write"},{"CIMType":"String[]","Description":"A collection of the days of the week on which the event occurs. The possible values are: sunday, monday, tuesday, wednesday, thursday, friday, saturday","Name":"daysOfWeek","Option":"Write","ValueMap":["sunday","monday","tuesday","wednesday","thursday","friday","saturday"],"Values":["sunday","monday","tuesday","wednesday","thursday","friday","saturday"]},{"CIMType":"String","Description":"The first day of the week.","Name":"firstDayOfWeek","Option":"Write","ValueMap":["sunday","monday","tuesday","wednesday","thursday","friday","saturday"],"Values":["sunday","monday","tuesday","wednesday","thursday","friday","saturday"]},{"CIMType":"String","Description":"Specifies on which instance of the allowed days specified in daysOfWeek the event occurs, counted from the first instance in the month. The possible values are: first, second, third, fourth, last.","Name":"index","Option":"Write","ValueMap":["first","second","third","fourth","last"],"Values":["first","second","third","fourth","last"]},{"CIMType":"UInt32","Description":"The number of units between occurrences, where units can be in days, weeks, months, or years, depending on the type.","Name":"interval","Option":"Write"},{"CIMType":"UInt32","Description":"The month in which the event occurs. This is a number from 1 to 12.","Name":"month","Option":"Write"},{"CIMType":"String","Description":"The recurrence pattern type: daily, weekly, absoluteMonthly, relativeMonthly, absoluteYearly, relativeYearly.","Name":"type","Option":"Write","ValueMap":["daily","weekly","absoluteMonthly","relativeMonthly","absoluteYearly","relativeYearly"],"Values":["daily","weekly","absoluteMonthly","relativeMonthly","absoluteYearly","relativeYearly"]}],"Description":"This resource configures an Azure Active Directory Privilege Identity Management assignment.\n\n**Please note:** The difference between start and end times of assignments must be at least 5 minutes. Lower assignment times will result in an error.\nAlso, if you attempt to remove or update an assignment less than 5 minutes after the last modification, it will fail as well."},{"ClassName":"MSFT_AADRoleAssignmentScheduleRequestScheduleRecurrence","Parameters":[{"CIMType":"MSFT_AADRoleAssignmentScheduleRequestScheduleRecurrencePattern","Description":"The frequency of an event.","Name":"pattern","Option":"Write"},{"CIMType":"MSFT_AADRoleAssignmentScheduleRequestScheduleRecurrenceRange","Description":"The duration of an event.","Name":"range","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Privilege Identity Management assignment.\n\n**Please note:** The difference between start and end times of assignments must be at least 5 minutes. Lower assignment times will result in an error.\nAlso, if you attempt to remove or update an assignment less than 5 minutes after the last modification, it will fail as well."},{"ClassName":"MSFT_AADRoleAssignmentScheduleRequestScheduleExpiration","Parameters":[{"CIMType":"String","Description":"The requestor's desired duration of access represented in ISO 8601 format for durations. For example, PT3H refers to three hours. If specified in a request, endDateTime should not be present and the type property should be set to afterDuration.","Name":"duration","Option":"Write"},{"CIMType":"String","Description":"Timestamp of date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z.","Name":"endDateTime","Option":"Write"},{"CIMType":"String","Description":"The requestor's desired expiration pattern type. The possible values are: notSpecified, noExpiration, afterDateTime, afterDuration.","Name":"type","Option":"Write","ValueMap":["notSpecified","noExpiration","afterDateTime","afterDuration"],"Values":["notSpecified","noExpiration","afterDateTime","afterDuration"]}],"Description":"This resource configures an Azure Active Directory Privilege Identity Management assignment.\n\n**Please note:** The difference between start and end times of assignments must be at least 5 minutes. Lower assignment times will result in an error.\nAlso, if you attempt to remove or update an assignment less than 5 minutes after the last modification, it will fail as well."},{"ClassName":"MSFT_AADRoleAssignmentScheduleRequestSchedule","Parameters":[{"CIMType":"MSFT_AADRoleAssignmentScheduleRequestScheduleExpiration","Description":"When the eligible or active assignment expires.","Name":"expiration","Option":"Write"},{"CIMType":"MSFT_AADRoleAssignmentScheduleRequestScheduleRecurrence","Description":"The frequency of the eligible or active assignment. This property is currently unsupported in PIM.","Name":"recurrence","Option":"Write"},{"CIMType":"String","Description":"When the eligible or active assignment becomes active.","Name":"startDateTime","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Privilege Identity Management assignment.\n\n**Please note:** The difference between start and end times of assignments must be at least 5 minutes. Lower assignment times will result in an error.\nAlso, if you attempt to remove or update an assignment less than 5 minutes after the last modification, it will fail as well."},{"ClassName":"MSFT_AADRoleAssignmentScheduleRequestTicketInfo","Parameters":[{"CIMType":"String","Description":"The ticket number.","Name":"ticketNumber","Option":"Write"},{"CIMType":"String","Description":"The description of the ticket system.","Name":"ticketSystem","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Privilege Identity Management assignment.\n\n**Please note:** The difference between start and end times of assignments must be at least 5 minutes. Lower assignment times will result in an error.\nAlso, if you attempt to remove or update an assignment less than 5 minutes after the last modification, it will fail as well."},{"ClassName":"MSFT_AADRoleAssignmentScheduleRequest","Parameters":[{"CIMType":"String","Description":"User Principal Name of the assignment request.","Name":"Principal","Option":"Key"},{"CIMType":"String","Description":"Role associated with the assignment request.","Name":"RoleDefinition","Option":"Key"},{"CIMType":"String","Description":"Represented the type of principal to assign the request to. Accepted values are: Group and User.","Name":"PrincipalType","Option":"Write","ValueMap":["Group","User","ServicePrincipal"],"Values":["Group","User","ServicePrincipal"]},{"CIMType":"String","Description":"Identifier of the directory object representing the scope of the role assignment. The scope of an role assignment determines the set of resources for which the principal has been granted access. Directory scopes are shared scopes stored in the directory that are understood by multiple applications. Use / for tenant-wide scope. Use appScopeId to limit the scope to an application only. Either directoryScopeId or appScopeId is required.","Name":"DirectoryScopeId","Option":"Key"},{"CIMType":"String","Description":"Identifier for the Role Assignment Schedule Request.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Identifier of the app-specific scope when the role assignment is scoped to an app. The scope of a role assignment determines the set of resources for which the principal is eligible to access. App scopes are scopes that are defined and understood by this application only. Use / for tenant-wide app scopes. Use directoryScopeId to limit the scope to particular directory objects, for example, administrative units. Either directoryScopeId or appScopeId is required.","Name":"AppScopeId","Option":"Write"},{"CIMType":"String","Description":"This parameter is deprecated and will be removed in a future release. Represents the type of operation on the role assignment request.The possible values are: adminAssign, adminUpdate, adminRemove, selfActivate, selfDeactivate, adminExtend, adminRenew, selfExtend, selfRenew, unknownFutureValue.","Name":"Action","Option":"Write","ValueMap":["adminAssign","adminUpdate","adminRemove","selfActivate","selfDeactivate","adminExtend","adminRenew","selfExtend","selfRenew","unknownFutureValue"],"Values":["adminAssign","adminUpdate","adminRemove","selfActivate","selfDeactivate","adminExtend","adminRenew","selfExtend","selfRenew","unknownFutureValue"]},{"CIMType":"Boolean","Description":"This parameter is deprecated and will be removed in a future release. Determines whether the call is a validation or an actual call. Only set this property if you want to check whether an activation is subject to additional rules like MFA before actually submitting the request.","Name":"IsValidationOnly","Option":"Write"},{"CIMType":"String","Description":"A message provided by users and administrators when create they create the unifiedRoileAssignmentScheduleRequest object. Optional when action is adminRemove. Whether this property is required or optional is also dependent on the settings for the Azure AD role.","Name":"Justification","Option":"Write"},{"CIMType":"MSFT_AADRoleAssignmentScheduleRequestSchedule","Description":"The period of the role assignment. Optional when action is adminRemove. The period of assignment is dependent on the settings of the Azure AD role.","Name":"ScheduleInfo","Option":"Write"},{"CIMType":"MSFT_AADRoleAssignmentScheduleRequestTicketInfo","Description":"This parameter is deprecated and will be removed in a future release. Ticket details linked to the role assignment request including details of the ticket number and ticket system.","Name":"TicketInfo","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Intune Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures an Azure Active Directory Privilege Identity Management assignment.\n\n**Please note:** The difference between start and end times of assignments must be at least 5 minutes. Lower assignment times will result in an error.\nAlso, if you attempt to remove or update an assignment less than 5 minutes after the last modification, it will fail as well."},{"ClassName":"MSFT_AADRoleDefinition","Parameters":[{"CIMType":"String","Description":"Specifies a display name for the role definition.","Name":"DisplayName","Option":"Key"},{"CIMType":"string","Description":"Specifies Id for the role definition.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Specifies a description for the role definition.","Name":"Description","Option":"Write"},{"CIMType":"String[]","Description":"Specifies the resource scopes for the role definition.","Name":"ResourceScopes","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether the role definition is enabled.","Name":"IsEnabled","Option":"Required"},{"CIMType":"String[]","Description":"Specifies permissions for the role definition.","Name":"RolePermissions","Option":"Required"},{"CIMType":"String","Description":"Specifies template id for the role definition.","Name":"TemplateId","Option":"Write"},{"CIMType":"String","Description":"Specifies version for the role definition.","Name":"Version","Option":"Write"},{"CIMType":"String","Description":"Specify if the Azure AD Role definition should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Azure AD Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures an Azure Active Directory role definition.\nTo configure custom roles you require an Azure AD Premium P1 license.\nThe account used to configure role definitions based on this resource needs either to be a\n\"Global Administrator\" or a \"Privileged role administrator\"."},{"ClassName":"MSFT_AADRoleEligibilityScheduleRequestScheduleRecurrenceRange","Parameters":[{"CIMType":"String","Description":"The date to stop applying the recurrence pattern. Depending on the recurrence pattern of the event, the last occurrence of the meeting may not be this date.","Name":"endDate","Option":"Required"},{"CIMType":"UInt32","Description":"The number of times to repeat the event. Required and must be positive if type is numbered.","Name":"numberOfOccurrences","Option":"Write"},{"CIMType":"String","Description":"Time zone for the startDate and endDate properties.","Name":"recurrenceTimeZone","Option":"Write"},{"CIMType":"String","Description":"The date to start applying the recurrence pattern. The first occurrence of the meeting may be this date or later, depending on the recurrence pattern of the event. Must be the same value as the start property of the recurring event.","Name":"startDate","Option":"Required"},{"CIMType":"String","Description":"The recurrence range. The possible values are: endDate, noEnd, numbered.","Name":"type","Option":"Required","ValueMap":["endDate","noEnd","numbered"],"Values":["endDate","noEnd","numbered"]}],"Description":"Represents a request for a role eligibility for a principal through PIM. The role eligibility can be permanently eligible without an expiry date or temporarily eligible with an expiry date.\n\n**Please note:** The difference between start and end times of assignments must be at least 5 minutes. Lower assignment times will result in an error.\nAlso, if you attempt to remove or update an assignment less than 5 minutes after the last modification, it will fail as well."},{"ClassName":"MSFT_AADRoleEligibilityScheduleRequestScheduleRecurrencePattern","Parameters":[{"CIMType":"UInt32","Description":"The day of the month on which the event occurs.","Name":"dayOfMonth","Option":"Write"},{"CIMType":"String[]","Description":"A collection of the days of the week on which the event occurs. The possible values are: sunday, monday, tuesday, wednesday, thursday, friday, saturday","Name":"daysOfWeek","Option":"Write","ValueMap":["sunday","monday","tuesday","wednesday","thursday","friday","saturday"],"Values":["sunday","monday","tuesday","wednesday","thursday","friday","saturday"]},{"CIMType":"String","Description":"The first day of the week.","Name":"firstDayOfWeek","Option":"Write","ValueMap":["sunday","monday","tuesday","wednesday","thursday","friday","saturday"],"Values":["sunday","monday","tuesday","wednesday","thursday","friday","saturday"]},{"CIMType":"String","Description":"Specifies on which instance of the allowed days specified in daysOfWeek the event occurs, counted from the first instance in the month. The possible values are: first, second, third, fourth, last.","Name":"index","Option":"Write","ValueMap":["first","second","third","fourth","last"],"Values":["first","second","third","fourth","last"]},{"CIMType":"UInt32","Description":"The number of units between occurrences, where units can be in days, weeks, months, or years, depending on the type.","Name":"interval","Option":"Write"},{"CIMType":"UInt32","Description":"The month in which the event occurs. This is a number from 1 to 12.","Name":"month","Option":"Write"},{"CIMType":"String","Description":"The recurrence pattern type: daily, weekly, absoluteMonthly, relativeMonthly, absoluteYearly, relativeYearly.","Name":"type","Option":"Write","ValueMap":["daily","weekly","absoluteMonthly","relativeMonthly","absoluteYearly","relativeYearly"],"Values":["daily","weekly","absoluteMonthly","relativeMonthly","absoluteYearly","relativeYearly"]}],"Description":"Represents a request for a role eligibility for a principal through PIM. The role eligibility can be permanently eligible without an expiry date or temporarily eligible with an expiry date.\n\n**Please note:** The difference between start and end times of assignments must be at least 5 minutes. Lower assignment times will result in an error.\nAlso, if you attempt to remove or update an assignment less than 5 minutes after the last modification, it will fail as well."},{"ClassName":"MSFT_AADRoleEligibilityScheduleRequestScheduleRecurrence","Parameters":[{"CIMType":"MSFT_AADRoleEligibilityScheduleRequestScheduleRecurrencePattern","Description":"The frequency of an event.","Name":"pattern","Option":"Write"},{"CIMType":"MSFT_AADRoleEligibilityScheduleRequestScheduleRecurrenceRange","Description":"The duration of an event.","Name":"range","Option":"Write"}],"Description":"Represents a request for a role eligibility for a principal through PIM. The role eligibility can be permanently eligible without an expiry date or temporarily eligible with an expiry date.\n\n**Please note:** The difference between start and end times of assignments must be at least 5 minutes. Lower assignment times will result in an error.\nAlso, if you attempt to remove or update an assignment less than 5 minutes after the last modification, it will fail as well."},{"ClassName":"MSFT_AADRoleEligibilityScheduleRequestScheduleExpiration","Parameters":[{"CIMType":"String","Description":"The requestor's desired duration of access represented in ISO 8601 format for durations. For example, PT3H refers to three hours. If specified in a request, endDateTime should not be present and the type property should be set to afterDuration.","Name":"duration","Option":"Write"},{"CIMType":"String","Description":"Timestamp of date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z.","Name":"endDateTime","Option":"Write"},{"CIMType":"String","Description":"The requestor's desired expiration pattern type. The possible values are: notSpecified, noExpiration, afterDateTime, afterDuration.","Name":"type","Option":"Write","ValueMap":["notSpecified","noExpiration","afterDateTime","afterDuration"],"Values":["notSpecified","noExpiration","afterDateTime","afterDuration"]}],"Description":"Represents a request for a role eligibility for a principal through PIM. The role eligibility can be permanently eligible without an expiry date or temporarily eligible with an expiry date.\n\n**Please note:** The difference between start and end times of assignments must be at least 5 minutes. Lower assignment times will result in an error.\nAlso, if you attempt to remove or update an assignment less than 5 minutes after the last modification, it will fail as well."},{"ClassName":"MSFT_AADRoleEligibilityScheduleRequestSchedule","Parameters":[{"CIMType":"MSFT_AADRoleEligibilityScheduleRequestScheduleExpiration","Description":"When the eligible or active assignment expires.","Name":"expiration","Option":"Write"},{"CIMType":"MSFT_AADRoleEligibilityScheduleRequestScheduleRecurrence","Description":"The frequency of the eligible or active assignment. This property is currently unsupported in PIM.","Name":"recurrence","Option":"Write"},{"CIMType":"String","Description":"When the eligible or active assignment becomes active.","Name":"startDateTime","Option":"Write"}],"Description":"Represents a request for a role eligibility for a principal through PIM. The role eligibility can be permanently eligible without an expiry date or temporarily eligible with an expiry date.\n\n**Please note:** The difference between start and end times of assignments must be at least 5 minutes. Lower assignment times will result in an error.\nAlso, if you attempt to remove or update an assignment less than 5 minutes after the last modification, it will fail as well."},{"ClassName":"MSFT_AADRoleEligibilityScheduleRequest","Parameters":[{"CIMType":"String","Description":"User Principal Name of the eligibility request.","Name":"Principal","Option":"Key"},{"CIMType":"String","Description":"Role associated with the eligibility request.","Name":"RoleDefinition","Option":"Key"},{"CIMType":"String","Description":"Represented the type of principal to assign the request to. Accepted values are: Group and User.","Name":"PrincipalType","Option":"Write","ValueMap":["Group","User"],"Values":["Group","User"]},{"CIMType":"String","Description":"Identifier of the directory object representing the scope of the role eligibility. The scope of an role eligibility determines the set of resources for which the principal has been granted access. Directory scopes are shared scopes stored in the directory that are understood by multiple applications. Use / for tenant-wide scope. Use appScopeId to limit the scope to an application only. Either directoryScopeId or appScopeId is required.","Name":"DirectoryScopeId","Option":"Key"},{"CIMType":"String","Description":"Identifier for the Role Eligibility Schedule Request.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Identifier of the app-specific scope when the role eligibility is scoped to an app. The scope of a role eligibility determines the set of resources for which the principal is eligible to access. App scopes are scopes that are defined and understood by this application only. Use / for tenant-wide app scopes. Use directoryScopeId to limit the scope to particular directory objects, for example, administrative units. Either directoryScopeId or appScopeId is required.","Name":"AppScopeId","Option":"Write"},{"CIMType":"String","Description":"This parameter is deprecated and will be removed in a future release. Represents the type of operation on the role eligibility request.The possible values are: adminAssign, adminUpdate, adminRemove, selfActivate, selfDeactivate, adminExtend, adminRenew, selfExtend, selfRenew, unknownFutureValue.","Name":"Action","Option":"Write","ValueMap":["adminAssign","adminUpdate","adminRemove","selfActivate","selfDeactivate","adminExtend","adminRenew","selfExtend","selfRenew","unknownFutureValue"],"Values":["adminAssign","adminUpdate","adminRemove","selfActivate","selfDeactivate","adminExtend","adminRenew","selfExtend","selfRenew","unknownFutureValue"]},{"CIMType":"Boolean","Description":"This parameter is deprecated and will be removed in a future release. Determines whether the call is a validation or an actual call. Only set this property if you want to check whether an activation is subject to additional rules like MFA before actually submitting the request.","Name":"IsValidationOnly","Option":"Write"},{"CIMType":"String","Description":"A message provided by users and administrators when create they create the unifiedRoleEligibilityScheduleRequest object. Optional when action is adminRemove. Whether this property is required or optional is also dependent on the settings for the Azure AD role.","Name":"Justification","Option":"Write"},{"CIMType":"MSFT_AADRoleEligibilityScheduleRequestSchedule","Description":"The period of the role eligibility. Optional when action is adminRemove. The period of eligibility is dependent on the settings of the Azure AD role.","Name":"ScheduleInfo","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Intune Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Represents a request for a role eligibility for a principal through PIM. The role eligibility can be permanently eligible without an expiry date or temporarily eligible with an expiry date.\n\n**Please note:** The difference between start and end times of assignments must be at least 5 minutes. Lower assignment times will result in an error.\nAlso, if you attempt to remove or update an assignment less than 5 minutes after the last modification, it will fail as well."},{"ClassName":"MSFT_AADRoleManagementPolicyRule","Parameters":[{"CIMType":"String","Description":"The unique identifier for an entity. Read-only.","Name":"Id","Option":"Key"},{"CIMType":"String","Description":"Role display name.","Name":"RoleDisplayName","Option":"Key"},{"CIMType":"String","Description":"Rule Type.","Name":"RuleType","Option":"Write"},{"CIMType":"String","Description":"Policy Id.","Name":"PolicyId","Option":"Write"},{"CIMType":"MSFT_AADRoleManagementPolicyExpirationRule","Description":"Expiration Rule.","Name":"ExpirationRule","Option":"Write"},{"CIMType":"MSFT_AADRoleManagementPolicyNotificationRule","Description":"Notification Rule.","Name":"NotificationRule","Option":"Write"},{"CIMType":"MSFT_AADRoleManagementPolicyEnablementRule","Description":"Enablement Rule.","Name":"EnablementRule","Option":"Write"},{"CIMType":"MSFT_AADRoleManagementPolicyApprovalRule","Description":"Approval Rule.","Name":"ApprovalRule","Option":"Write"},{"CIMType":"MSFT_AADRoleManagementPolicyAuthenticationContextRule","Description":"Authentication Context Rule.","Name":"AuthenticationContextRule","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Role Management Policy Rule"},{"ClassName":"MSFT_AADRoleSetting","Parameters":[{"CIMType":"String","Description":"RuleDefinition DisplayName","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"Specifies the RoleId.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Activation maximum duration (hours).","Name":"ActivationMaxDuration","Option":"Write"},{"CIMType":"Boolean","Description":"Require justification on activation (True/False)","Name":"ActivationReqJustification","Option":"Write"},{"CIMType":"Boolean","Description":"Require ticket information on activation (True/False)","Name":"ActivationReqTicket","Option":"Write"},{"CIMType":"Boolean","Description":"Require MFA on activation (True/False)","Name":"ActivationReqMFA","Option":"Write"},{"CIMType":"Boolean","Description":"Require approval to activate (True/False)","Name":"ApprovaltoActivate","Option":"Write"},{"CIMType":"String[]","Description":"Approver User UPN and/or Group Displayname","Name":"ActivateApprover","Option":"Write"},{"CIMType":"Boolean","Description":"Allow permanent eligible assignment (True/False)","Name":"PermanentEligibleAssignmentisExpirationRequired","Option":"Write"},{"CIMType":"String","Description":"Expire eligible assignments after (Days)","Name":"ExpireEligibleAssignment","Option":"Write"},{"CIMType":"Boolean","Description":"Allow permanent active assignment (True/False)","Name":"PermanentActiveAssignmentisExpirationRequired","Option":"Write"},{"CIMType":"String","Description":"Expire active assignments after (Days)","Name":"ExpireActiveAssignment","Option":"Write"},{"CIMType":"Boolean","Description":"Require Azure Multi-Factor Authentication on active assignment (True/False)","Name":"AssignmentReqMFA","Option":"Write"},{"CIMType":"Boolean","Description":"Require justification on active assignment (True/False)","Name":"AssignmentReqJustification","Option":"Write"},{"CIMType":"Boolean","Description":"Require Azure Multi-Factor Authentication on eligible assignment (True/False)","Name":"ElegibilityAssignmentReqMFA","Option":"Write"},{"CIMType":"Boolean","Description":"Require justification on eligible assignment (True/False)","Name":"ElegibilityAssignmentReqJustification","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as eligible to this role: Role assignment alert, default recipient (True/False)","Name":"EligibleAlertNotificationDefaultRecipient","Option":"Write"},{"CIMType":"String[]","Description":"Send notifications when members are assigned as eligible to this role: Role assignment alert, additional recipient (UPN)","Name":"EligibleAlertNotificationAdditionalRecipient","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as eligible to this role: Role assignment alert, only critical Email (True/False)","Name":"EligibleAlertNotificationOnlyCritical","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as eligible to this role: Notification to the assigned user (assignee), default recipient (True/False)","Name":"EligibleAssigneeNotificationDefaultRecipient","Option":"Write"},{"CIMType":"String[]","Description":"Send notifications when members are assigned as eligible to this role: Notification to the assigned user (assignee), additional recipient (UPN)","Name":"EligibleAssigneeNotificationAdditionalRecipient","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as eligible to this role: Notification to the assigned user (assignee), only critical Email (True/False)","Name":"EligibleAssigneeNotificationOnlyCritical","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as eligible to this role: Request to approve a role assignment renewal/extension, default recipient (True/False)","Name":"EligibleApproveNotificationDefaultRecipient","Option":"Write"},{"CIMType":"String[]","Description":"Send notifications when members are assigned as eligible to this role: Request to approve a role assignment renewal/extension, additional recipient (UPN)","Name":"EligibleApproveNotificationAdditionalRecipient","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as eligible to this role: Request to approve a role assignment renewal/extension, only critical Email (True/False)","Name":"EligibleApproveNotificationOnlyCritical","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as active to this role: Role assignment alert, default recipient (True/False)","Name":"ActiveAlertNotificationDefaultRecipient","Option":"Write"},{"CIMType":"String[]","Description":"Send notifications when members are assigned as active to this role: Role assignment alert, additional recipient (UPN)","Name":"ActiveAlertNotificationAdditionalRecipient","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as active to this role: Role assignment alert, only critical Email (True/False)","Name":"ActiveAlertNotificationOnlyCritical","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as active to this role: Notification to the assigned user (assignee), default recipient (True/False)","Name":"ActiveAssigneeNotificationDefaultRecipient","Option":"Write"},{"CIMType":"String[]","Description":"Send notifications when members are assigned as active to this role: Notification to the assigned user (assignee), additional recipient (UPN)","Name":"ActiveAssigneeNotificationAdditionalRecipient","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as active to this role: Notification to the assigned user (assignee), only critical Email (True/False)","Name":"ActiveAssigneeNotificationOnlyCritical","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as active to this role: Request to approve a role assignment renewal/extension, default recipient (True/False)","Name":"ActiveApproveNotificationDefaultRecipient","Option":"Write"},{"CIMType":"String[]","Description":"Send notifications when members are assigned as active to this role: Request to approve a role assignment renewal/extension, additional recipient (UPN)","Name":"ActiveApproveNotificationAdditionalRecipient","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when members are assigned as active to this role: Request to approve a role assignment renewal/extension, only critical Email (True/False)","Name":"ActiveApproveNotificationOnlyCritical","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when eligible members activate this role: Role assignment alert, default recipient (True/False)","Name":"EligibleAssignmentAlertNotificationDefaultRecipient","Option":"Write"},{"CIMType":"String[]","Description":"Send notifications when eligible members activate this role: Role assignment alert, additional recipient (UPN)","Name":"EligibleAssignmentAlertNotificationAdditionalRecipient","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when eligible members activate this role: Role assignment alert, only critical Email (True/False)","Name":"EligibleAssignmentAlertNotificationOnlyCritical","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when eligible members activate this role: Notification to activated user (requestor), default recipient (True/False)","Name":"EligibleAssignmentAssigneeNotificationDefaultRecipient","Option":"Write"},{"CIMType":"String[]","Description":"Send notifications when eligible members activate this role: Notification to activated user (requestor), additional recipient (UPN)","Name":"EligibleAssignmentAssigneeNotificationAdditionalRecipient","Option":"Write"},{"CIMType":"Boolean","Description":"Send notifications when eligible members activate this role: Notification to activated user (requestor), only critical Email (True/False)","Name":"EligibleAssignmentAssigneeNotificationOnlyCritical","Option":"Write"},{"CIMType":"Boolean","Description":"Authorization context is required (True/False)","Name":"AuthenticationContextRequired","Option":"Write"},{"CIMType":"String","Description":"Descriptive name of associated authorization context","Name":"AuthenticationContextName","Option":"Write"},{"CIMType":"String","Description":"Authorization context id","Name":"AuthenticationContextId","Option":"Write"},{"CIMType":"String","Description":"Specify if the Azure AD role setting should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present"],"Values":["Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials for the Microsoft Graph delegated permissions.","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures AAD Role Settings."},{"ClassName":"MSFT_AADSecurityDefaults","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"String","Description":"Display name of the security defaults.","Name":"DisplayName","Option":"Write"},{"CIMType":"String","Description":"Description of the security defaults.","Name":"Description","Option":"Write"},{"CIMType":"Boolean","Description":"Represents whether or not security defaults are enabled.","Name":"IsEnabled","Option":"Write"},{"CIMType":"String","Description":"Specify if the Azure AD App should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the Azure AD Admin","Name":"Credential","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures the Security Defaults in Azure Active Directory."},{"ClassName":"MSFT_AADServicePrincipalRoleAssignment","Parameters":[{"CIMType":"String","Description":"Type of principal. Accepted values are User or Group","Name":"PrincipalType","Option":"Key","ValueMap":["Group","User"],"Values":["Group","User"]},{"CIMType":"String","Description":"Unique identity representing the principal.","Name":"Identity","Option":"Key"}],"Description":"This resource configures an Azure Active Directory ServicePrincipal."},{"ClassName":"MSFT_AADServicePrincipalDelegatedPermissionClassification","Parameters":[{"CIMType":"String","Description":"Classification of the delegated permission","Name":"Classification","Option":"Write","ValueMap":["low","medium","high"],"Values":["low","medium","high"]},{"CIMType":"String","Description":"Name of the permission","Name":"PermissionName","Option":"Key"}],"Description":"This resource configures an Azure Active Directory ServicePrincipal."},{"ClassName":"MSFT_AADServicePrincipalAttributeValue","Parameters":[{"CIMType":"String","Description":"Name of the Attribute","Name":"AttributeName","Option":"Key"},{"CIMType":"String[]","Description":"If the attribute has a string array value","Name":"StringArrayValue","Option":"Write"},{"CIMType":"UInt32[]","Description":"If the attribute has a int array value","Name":"IntArrayValue","Option":"Write"},{"CIMType":"String","Description":"If the attribute has a string value","Name":"StringValue","Option":"Write"},{"CIMType":"UInt32","Description":"If the attribute has a int value","Name":"IntValue","Option":"Write"},{"CIMType":"Boolean","Description":"If the attribute has a boolean value","Name":"BoolValue","Option":"Write"}],"Description":"This resource configures an Azure Active Directory ServicePrincipal."},{"ClassName":"MSFT_AADServicePrincipalAttributeSet","Parameters":[{"CIMType":"String","Description":"Attribute Set Name.","Name":"AttributeSetName","Option":"Key"},{"CIMType":"MSFT_AADServicePrincipalAttributeValue[]","Description":"List of attribute values.","Name":"AttributeValues","Option":"Write"}],"Description":"This resource configures an Azure Active Directory ServicePrincipal."},{"ClassName":"MSFT_AADServicePrincipal","Parameters":[{"CIMType":"String","Description":"The unique identifier for the associated application.","Name":"AppId","Option":"Key"},{"CIMType":"MSFT_AADServicePrincipalRoleAssignment[]","Description":"App role assignments for this app or service, granted to users, groups, and other service principals.","Name":"AppRoleAssignedTo","Option":"Write"},{"CIMType":"String","Description":"The ObjectID of the ServicePrincipal","Name":"ObjectID","Option":"Write"},{"CIMType":"String","Description":"Displayname of the ServicePrincipal.","Name":"DisplayName","Option":"Write"},{"CIMType":"String[]","Description":"The alternative names for this service principal","Name":"AlternativeNames","Option":"Write"},{"CIMType":"Boolean","Description":"True if the service principal account is enabled; otherwise, false.","Name":"AccountEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"Indicates whether an application role assignment is required.","Name":"AppRoleAssignmentRequired","Option":"Write"},{"CIMType":"String","Description":"Specifies the error URL of the ServicePrincipal.","Name":"ErrorUrl","Option":"Write"},{"CIMType":"String","Description":"Specifies the homepage of the ServicePrincipal.","Name":"Homepage","Option":"Write"},{"CIMType":"String","Description":"Specifies the LogoutURL of the ServicePrincipal.","Name":"LogoutUrl","Option":"Write"},{"CIMType":"String","Description":"Notes associated with the ServicePrincipal.","Name":"Notes","Option":"Write"},{"CIMType":"String","Description":"Specifies the PublisherName of the ServicePrincipal.","Name":"PublisherName","Option":"Write"},{"CIMType":"String[]","Description":"List of the owners of the service principal.","Name":"Owners","Option":"Write"},{"CIMType":"String","Description":"Specifies the signle sign-on mode configured for this application.","Name":"PreferredSingleSignOnMode","Option":"Write"},{"CIMType":"String[]","Description":"The URLs that user tokens are sent to for sign in with the associated application, or the redirect URIs that OAuth 2.0 authorization codes and access tokens are sent to for the associated application.","Name":"ReplyUrls","Option":"Write"},{"CIMType":"String","Description":"The URL for the SAML metadata of the ServicePrincipal.","Name":"SamlMetadataUrl","Option":"Write"},{"CIMType":"String[]","Description":"Specifies an array of service principal names. Based on the identifierURIs collection, plus the application's appId property, these URIs are used to reference an application's service principal.","Name":"ServicePrincipalNames","Option":"Write"},{"CIMType":"String","Description":"The type of the service principal.","Name":"ServicePrincipalType","Option":"Write"},{"CIMType":"String[]","Description":"Tags linked to this service principal.Note that if you intend for this service principal to show up in the All Applications list in the admin portal, you need to set this value to {WindowsAzureActiveDirectoryIntegratedApp}","Name":"Tags","Option":"Write"},{"CIMType":"MSFT_AADServicePrincipalDelegatedPermissionClassification[]","Description":"The permission classifications for delegated permissions exposed by the app that this service principal represents.","Name":"DelegatedPermissionClassifications","Option":"Write"},{"CIMType":"MSFT_AADServicePrincipalAttributeSet[]","Description":"The list of custom security attributes attached to this SPN","Name":"CustomSecurityAttributes","Option":"Write"},{"CIMType":"String","Description":"Specify if the Azure AD App should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the Azure AD Admin","Name":"Credential","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphpasswordCredential[]","Description":"The collection of password credentials associated with the service principal. Not nullable.","Name":"PasswordCredentials","Option":"Write"},{"CIMType":"MSFT_MicrosoftGraphkeyCredential[]","Description":"The collection of key credentials associated with the service principal. Not nullable. Supports $filter (eq, NOT, ge, le).","Name":"KeyCredentials","Option":"Write"}],"Description":"This resource configures an Azure Active Directory ServicePrincipal."},{"ClassName":"MSFT_AADSocialIdentityProvider","Parameters":[{"CIMType":"String","Description":"The client identifier for the application obtained when registering the application with the identity provider.","Name":"ClientId","Option":"Key"},{"CIMType":"String","Description":"The client secret for the application that is obtained when the application is registered with the identity provider. This is write-only. A read operation returns ****.","Name":"ClientSecret","Option":"Write"},{"CIMType":"String","Description":"The display name of the identity provider.","Name":"DisplayName","Option":"Write"},{"CIMType":"String","Description":"For a B2B scenario, possible values: Google, Facebook. For a B2C scenario, possible values: Microsoft, Google, Amazon, LinkedIn, Facebook, GitHub, Twitter, Weibo, QQ, WeChat.","Name":"IdentityProviderType","Option":"Write","ValueMap":["AADSignup","EmailOTP","Microsoft","MicrosoftAccount","Google","Amazon","LinkedIn","Facebook","GitHub","Twitter","Weibo","QQ","WeChat"],"Values":["AADSignup","EmailOTP","Microsoft","MicrosoftAccount","Google","Amazon","LinkedIn","Facebook","GitHub","Twitter","Weibo","QQ","WeChat"]},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Represents identity providers with External Identities for both Microsoft Entra ID and Azure AD B2C tenants. For Microsoft Entra B2B scenarios in a Microsoft Entra tenant, the identity provider type can be Google or Facebook."},{"ClassName":"MSFT_AADTenantAppManagementPolicyRestrictionsCredential","Parameters":[{"CIMType":"string[]","Description":"Collection of GUIDs of certificateBasedApplicationConfiguration objects that represent trusted certificate authorities. Used when restrictionType is set to trustedCertificateAuthority for keyCredentials.","Name":"CertificateBasedApplicationConfigurationIds","Option":"Write"},{"CIMType":"string","Description":"String value that indicates the maximum lifetime for password expiration, defined as an ISO 8601 duration. For example, P4DT12H30M5S represents four days, 12 hours, 30 minutes, and five seconds. This property is required when restrictionType is set to passwordLifetime.","Name":"MaxLifetime","Option":"Write"},{"CIMType":"string","Description":"Specifies the date from which the policy restriction applies to newly created applications. For existing applications, the enforcement date can be retroactively applied.","Name":"RestrictForAppsCreatedAfterDateTime","Option":"Write"},{"CIMType":"string","Description":"The type of restriction being applied. The possible values are: passwordAddition, passwordLifetime, symmetricKeyAddition, symmetricKeyLifetime, customPasswordAddition, asymmetricKeyLifetime, trustedCertificateAuthority, and unknownFutureValue. Each value of restrictionType can be used only once per policy.","Name":"RestrictionType","Option":"Key"},{"CIMType":"string","Description":"Indicates whether the restriction is evaluated. The possible values are: enabled, disabled, unknownFutureValue. If enabled, the restriction is evaluated. If disabled, the restriction isn't evaluated or enforced.","Name":"State","Option":"Write"}],"Description":"Tenant-wide application authentication method policy to enforce app management restrictions for all applications and service principals."},{"ClassName":"MSFT_AADTenantAppManagementPolicyRestrictions","Parameters":[{"CIMType":"MSFT_AADTenantAppManagementPolicyRestrictionsCredential[]","Description":"Collection of keyCredential restrictions settings to be applied to an application or service principal.","Name":"KeyCredentials","Option":"Write"},{"CIMType":"MSFT_AADTenantAppManagementPolicyRestrictionsCredential[]","Description":"Collection of password restrictions settings to be applied to an application or service principal.","Name":"PasswordCredentials","Option":"Write"}],"Description":"Tenant-wide application authentication method policy to enforce app management restrictions for all applications and service principals."},{"ClassName":"MSFT_AADTenantAppManagementPolicy","Parameters":[{"CIMType":"String","Description":"The display name of the policy.","Name":"DisplayName","Option":"Write"},{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"String","Description":"The description of the policy.","Name":"Description","Option":"Write"},{"CIMType":"Boolean","Description":"Denotes whether the policy is enabled.","Name":"IsEnabled","Option":"Write"},{"CIMType":"MSFT_AADTenantAppManagementPolicyRestrictions","Description":"Restrictions that apply to an application object.","Name":"ApplicationRestrictions","Option":"Write"},{"CIMType":"MSFT_AADTenantAppManagementPolicyRestrictions","Description":"Restrictions that apply to a service principal object.","Name":"ServicePrincipalRestrictions","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Tenant-wide application authentication method policy to enforce app management restrictions for all applications and service principals."},{"ClassName":"MSFT_AADTenantDetails","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"String[]","Description":"Email-addresses from the people who should receive Marketing Notifications","Name":"MarketingNotificationEmails","Option":"Write"},{"CIMType":"String[]","Description":"Email-addresses from the people who should receive Security Compliance Notifications","Name":"SecurityComplianceNotificationMails","Option":"Write"},{"CIMType":"String[]","Description":"Phone Numbers from the people who should receive Security Notifications","Name":"SecurityComplianceNotificationPhones","Option":"Write"},{"CIMType":"String[]","Description":"Email-addresses from the people who should receive Technical Notifications","Name":"TechnicalNotificationMails","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the Azure Active Directory Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures the Azure AD Tenant Details"},{"ClassName":"MSFT_AADTokenIssuancePolicy","Parameters":[{"CIMType":"String","Description":"Display name for this policy. Required.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"Unique identifier for this policy. Read-only.","Name":"Id","Option":"Write"},{"CIMType":"Boolean","Description":"The token-issuance policy can only be applied to service principals and can't be set globally for the organization.","Name":"IsOrganizationDefault","Option":"Write"},{"CIMType":"String","Description":"Description for this policy.","Name":"Description","Option":"Write"},{"CIMType":"String[]","Description":"A string collection containing a JSON string that defines the rules and settings for this policy. See below for more details about the JSON schema for this property. Required.","Name":"Definition","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Represents the policy to specify the characteristics of SAML tokens issued by Microsoft Entra ID."},{"ClassName":"MSFT_AADTokenLifetimePolicy","Parameters":[{"CIMType":"string","Description":"DisplayName of the Policy","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"ObjectID of the Policy.","Name":"Id","Option":"Write"},{"CIMType":"string","Description":"Description of the Policy.","Name":"Description","Option":"Write"},{"CIMType":"String[]","Description":"Definition of the Policy.","Name":"Definition","Option":"Write"},{"CIMType":"Boolean","Description":"IsOrganizationDefault of the Policy.","Name":"IsOrganizationDefault","Option":"Write"},{"CIMType":"String","Description":"Specify if the Azure AD Policy should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials for the Microsoft Graph delegated permissions.","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures the Azure AD Token Lifetime Policies"},{"ClassName":"MSFT_AADUser","Parameters":[{"CIMType":"String","Description":"The login name of the user","Name":"UserPrincipalName","Option":"Key"},{"CIMType":"Boolean","Description":"Specifies whether the user account is enabled or not. Required when a user is created.","Name":"AccountEnabled","Option":"Write"},{"CIMType":"String","Description":"The display name for the user","Name":"DisplayName","Option":"Write"},{"CIMType":"String","Description":"The first name of the user","Name":"FirstName","Option":"Write"},{"CIMType":"String","Description":"The last name of the user","Name":"LastName","Option":"Write"},{"CIMType":"String[]","Description":"The list of Azure Active Directory roles assigned to the user.","Name":"Roles","Option":"Write"},{"CIMType":"String","Description":"The country code the user will be assigned to","Name":"UsageLocation","Option":"Write"},{"CIMType":"String[]","Description":"The account SKU Id for the license to be assigned to the user","Name":"LicenseAssignment","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"The password for the account. The parameter is a PSCredential object, but only the Password component will be used. If Password is not supplied for a new resource a new random password will be generated. Property will only be used when creating the user and not on subsequent updates.","Name":"Password","Option":"Write"},{"CIMType":"String","Description":"The City name of the user","Name":"City","Option":"Write"},{"CIMType":"String","Description":"The Country name of the user","Name":"Country","Option":"Write"},{"CIMType":"String","Description":"The Department name of the user","Name":"Department","Option":"Write"},{"CIMType":"String","Description":"The Fax Number of the user","Name":"Fax","Option":"Write"},{"CIMType":"String[]","Description":"The Groups that the user is a direct member of","Name":"MemberOf","Option":"Write"},{"CIMType":"String","Description":"The Mobile Phone Number of the user","Name":"MobilePhone","Option":"Write"},{"CIMType":"String","Description":"The Office Name of the user","Name":"Office","Option":"Write"},{"CIMType":"String","Description":"The mail address of the user","Name":"Mail","Option":"Write"},{"CIMType":"String[]","Description":"The other mails assigned to the user","Name":"OtherMails","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether the user password expires periodically. Default value is false","Name":"PasswordNeverExpires","Option":"Write"},{"CIMType":"String","Description":"Specifies password policies for the user.","Name":"PasswordPolicies","Option":"Write"},{"CIMType":"String","Description":"The Phone Number of the user","Name":"PhoneNumber","Option":"Write"},{"CIMType":"String","Description":"The Postal Code of the user","Name":"PostalCode","Option":"Write"},{"CIMType":"String","Description":"The Preferred Language of the user","Name":"PreferredLanguage","Option":"Write"},{"CIMType":"String","Description":"Specifies the state or province where the user is located","Name":"State","Option":"Write"},{"CIMType":"String","Description":"Specifies the street address of the user","Name":"StreetAddress","Option":"Write"},{"CIMType":"String","Description":"Specifies the title of the user","Name":"Title","Option":"Write"},{"CIMType":"String","Description":"Specifies the title of the user","Name":"UserType","Option":"Write","ValueMap":["Guest","Member","Other","Viral"],"Values":["Guest","Member","Other","Viral"]},{"CIMType":"String","Description":"Present ensures the user exists, absent ensures it is removed","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Name of the Azure Active Directory tenant used for authentication. Format contoso.onmicrosoft.com","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource allows users to create Azure AD Users and assign them licenses, roles and/or groups.\n\nIf using with AADGroup, be aware that if AADUser->MemberOf is being specified and the referenced group is configured with AADGroup->Member then a conflict may arise if the two don't match. It is usually best to choose only one of them. See AADGroup"},{"ClassName":"MSFT_AADUserFlowAttribute","Parameters":[{"CIMType":"String","Description":"User flow attribute Id.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Display name of the user flow attribute.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"Description of the user flow attribute.","Name":"Description","Option":"Write"},{"CIMType":"String","Description":"Defines the user flow attribute data type.","Name":"DataType","Option":"Write"},{"CIMType":"String","Description":"Specify if the Azure AD role setting should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials for the Microsoft Graph delegated permissions.","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configure User flow attributes which are custom attributes that you can define and use in your user flows, which are predefined, configurable policies that control the user experience during sign-up, sign-in, and profile editing processes."},{"ClassName":"MSFT_AADVerifiedIdAuthorityKeyVaultMetadata","Parameters":[{"CIMType":"String","Description":"Subscription ID of the Key Vault.","Name":"SubscriptionId","Option":"Write"},{"CIMType":"String","Description":"Resource group of the Key Vault.","Name":"ResourceGroup","Option":"Write"},{"CIMType":"String","Description":"Resource name of the Key Vault.","Name":"ResourceName","Option":"Write"},{"CIMType":"String","Description":"Resource URL of the Key Vault.","Name":"ResourceUrl","Option":"Write"}],"Description":"Azure AD Verified Identity Authority\n\nUse the VerifiableCredential.Authority.ReadWrite permission to read and write the authority.\n\nDocumentation Link: "},{"ClassName":"MSFT_AADVerifiedIdAuthority","Parameters":[{"CIMType":"String","Description":"Name of the Verified ID Authority.","Name":"Name","Option":"Write"},{"CIMType":"String","Description":"Id of the Verified ID Authority.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"URL of the linked domain.","Name":"LinkedDomainUrl","Option":"Key"},{"CIMType":"String","Description":"DID method used by the Verified ID Authority.","Name":"DidMethod","Option":"Write"},{"CIMType":"MSFT_AADVerifiedIdAuthorityKeyVaultMetadata","Description":"Key Vault metadata for the Verified ID Authority.","Name":"KeyVaultMetadata","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Verified Identity Authority\n\nUse the VerifiableCredential.Authority.ReadWrite permission to read and write the authority.\n\nDocumentation Link: "},{"ClassName":"MSFT_AADVerifiedIdAuthorityContractDisplayCredentialLogo","Parameters":[{"CIMType":"String","Description":"URI of the logo. If this is a URL, it must be reachable over the public internet anonymously.","Name":"uri","Option":"Write"},{"CIMType":"String","Description":"Description of the logo.","Name":"description","Option":"Write"}],"Description":"Azure AD Verified Identity Authority Contract\nUse the VerifiableCredential.Contract.ReadWrite permission to read and write the authority contract.\nDocumentation Link: "},{"ClassName":"MSFT_AADVerifiedIdAuthorityContractDisplayCard","Parameters":[{"CIMType":"String","Description":"Title of the credential.","Name":"title","Option":"Write"},{"CIMType":"String","Description":"The name of the issuer of the credential.","Name":"issuedBy","Option":"Write"},{"CIMType":"String","Description":"Background color of the credential in hex, for example, #FFAABB.","Name":"backgroundColor","Option":"Write"},{"CIMType":"String","Description":"Text color of the credential in hex, for example, #FFAABB.","Name":"textColor","Option":"Write"},{"CIMType":"String","Description":"Supplemental text displayed alongside each credential.","Name":"description","Option":"Write"}],"Description":"Azure AD Verified Identity Authority Contract\nUse the VerifiableCredential.Contract.ReadWrite permission to read and write the authority contract.\nDocumentation Link: "},{"ClassName":"MSFT_AADVerifiedIdAuthorityContractDisplayConsent","Parameters":[{"CIMType":"String","Description":"Title of the consent.","Name":"title","Option":"Write"},{"CIMType":"String","Description":"Supplemental text to use when displaying consent.","Name":"instructions","Option":"Write"}],"Description":"Azure AD Verified Identity Authority Contract\nUse the VerifiableCredential.Contract.ReadWrite permission to read and write the authority contract.\nDocumentation Link: "},{"ClassName":"MSFT_AADVerifiedIdAuthorityContractDisplayClaims","Parameters":[{"CIMType":"String","Description":"The label of the claim in display.","Name":"label","Option":"Write"},{"CIMType":"String","Description":"The name of the claim to which the label applies.","Name":"claim","Option":"Write"},{"CIMType":"String","Description":"The type of the claim.","Name":"type","Option":"Write"},{"CIMType":"String","Description":"The description of the claim.","Name":"description","Option":"Write"}],"Description":"Azure AD Verified Identity Authority Contract\nUse the VerifiableCredential.Contract.ReadWrite permission to read and write the authority contract.\nDocumentation Link: "},{"ClassName":"MSFT_AADVerifiedIdAuthorityContractDisplayModel","Parameters":[{"CIMType":"String","Description":"The locale of this display.","Name":"locale","Option":"Write"}],"Description":"Azure AD Verified Identity Authority Contract\nUse the VerifiableCredential.Contract.ReadWrite permission to read and write the authority contract.\nDocumentation Link: "},{"ClassName":"MSFT_AADVerifiedIdAuthorityContractClaimMapping","Parameters":[{"CIMType":"String","Description":"The name of the claim to use from the input.","Name":"inputClaim","Option":"Write"},{"CIMType":"String","Description":"The name of the claim in the verifiable credential.","Name":"outputClaim","Option":"Write"},{"CIMType":"Boolean","Description":"Indicating whether the value of this claim is used for searching.","Name":"indexed","Option":"Write"},{"CIMType":"Boolean","Description":"Indicating whether this mapping is required or not.","Name":"required","Option":"Write"},{"CIMType":"String","Description":"Type of claim.","Name":"type","Option":"Write"}],"Description":"Azure AD Verified Identity Authority Contract\nUse the VerifiableCredential.Contract.ReadWrite permission to read and write the authority contract.\nDocumentation Link: "},{"ClassName":"MSFT_AADVerifiedIdAuthorityContractAttestationValues","Parameters":[{"CIMType":"Boolean","Description":"Indicating whether this attestation is required or not.","Name":"required","Option":"Write"},{"CIMType":"String[]","Description":"A list of DIDs allowed to issue the verifiable credential for this contract.","Name":"trustedIssuers","Option":"Write"},{"CIMType":"String","Description":"Required credential type of the input.","Name":"credentialType","Option":"Write"},{"CIMType":"String","Description":"Location of the identity provider's configuration document.","Name":"configuration","Option":"Write"},{"CIMType":"String","Description":"Client ID to use when obtaining the ID token.","Name":"clientId","Option":"Write"},{"CIMType":"String","Description":"Redirect URI to use when obtaining the ID token. MUST BE vcclient://openid/","Name":"redirectUri","Option":"Write"},{"CIMType":"String","Description":"Space delimited list of scopes to use when obtaining the ID token.","Name":"scopeValue","Option":"Write"}],"Description":"Azure AD Verified Identity Authority Contract\nUse the VerifiableCredential.Contract.ReadWrite permission to read and write the authority contract.\nDocumentation Link: "},{"ClassName":"MSFT_AADVerifiedIdAuthorityContractAttestations","Parameters":[],"Description":"Azure AD Verified Identity Authority Contract\nUse the VerifiableCredential.Contract.ReadWrite permission to read and write the authority contract.\nDocumentation Link: "},{"ClassName":"MSFT_AADVerifiedIdAuthorityContractCustomStatusEndpoint","Parameters":[{"CIMType":"String","Description":"The URL of the custom status endpoint.","Name":"url","Option":"Write"},{"CIMType":"String","Description":"The type of the endpoint.","Name":"type","Option":"Write"}],"Description":"Azure AD Verified Identity Authority Contract\nUse the VerifiableCredential.Contract.ReadWrite permission to read and write the authority contract.\nDocumentation Link: "},{"ClassName":"MSFT_AADVerifiedIdAuthorityContractVcType","Parameters":[{"CIMType":"String[]","Description":"The type of the vc.","Name":"type","Option":"Write"}],"Description":"Azure AD Verified Identity Authority Contract\nUse the VerifiableCredential.Contract.ReadWrite permission to read and write the authority contract.\nDocumentation Link: "},{"ClassName":"MSFT_AADVerifiedIdAuthorityContractRulesModel","Parameters":[{"CIMType":"UInt32","Description":"This value shows the lifespan of the credential.","Name":"validityInterval","Option":"Write"}],"Description":"Azure AD Verified Identity Authority Contract\nUse the VerifiableCredential.Contract.ReadWrite permission to read and write the authority contract.\nDocumentation Link: "},{"ClassName":"MSFT_AADVerifiedIdAuthorityContract","Parameters":[{"CIMType":"String","Description":"Id of the Verified ID Authority Contract.","Name":"id","Option":"Write"},{"CIMType":"String","Description":"URL of the linked domain of the authority.","Name":"linkedDomainUrl","Option":"Key"},{"CIMType":"String","Description":"Id of the Verified ID Authority.","Name":"authorityId","Option":"Write"},{"CIMType":"String","Description":"Name of the Verified ID Authority Contract.","Name":"name","Option":"Key"},{"CIMType":"MSFT_AADVerifiedIdAuthorityContractDisplayModel[]","Description":"Display settings of the Authority Contract.","Name":"displays","Option":"Write"},{"CIMType":"MSFT_AADVerifiedIdAuthorityContractRulesModel","Description":"Rules settings of the Authority Contract.","Name":"rules","Option":"Write"},{"CIMType":"string","Description":"Present ensures the policy exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Azure AD Verified Identity Authority Contract\nUse the VerifiableCredential.Contract.ReadWrite permission to read and write the authority contract.\nDocumentation Link: "},{"ClassName":"MSFT_ADOOrganizationOwner","Parameters":[{"CIMType":"String","Description":"NAme of the Azure DevOPS Organization","Name":"OrganizationName","Option":"Key"},{"CIMType":"String","Description":"User principal of the organization's owner","Name":"Owner","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Configures the owner of an Azure DevOPS organization."},{"ClassName":"MSFT_ADOPermissionGroup","Parameters":[{"CIMType":"String","Description":"The name of the Azure DevOPS Organization.","Name":"OrganizationName","Option":"Key"},{"CIMType":"String","Description":"Principal name to identify the group.","Name":"PrincipalName","Option":"Key"},{"CIMType":"String","Description":"Display name for the group.","Name":"DisplayName","Option":"Write"},{"CIMType":"String","Description":"Description of the group.","Name":"Description","Option":"Write"},{"CIMType":"String[]","Description":"List of principal names of the members of the group.","Name":"Members","Option":"Write"},{"CIMType":"String","Description":"Unique identifier for the group.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Unique descriptor for the group.","Name":"Descriptor","Option":"Write"},{"CIMType":"String","Description":"Determines at what level in the hierarchy the group exists. Valid values are Project or Organization.","Name":"Level","Option":"Write","ValueMap":["Organization","Project"],"Values":["Organization","Project"]},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Manages Azure DevOPS permission groups."},{"ClassName":"MSFT_ADOPermission","Parameters":[{"CIMType":"String","Description":"Id of the associate security namespace.","Name":"NamespaceId","Option":"Key"},{"CIMType":"String","Description":"Display name of the permission scope.","Name":"DisplayName","Option":"Key"},{"CIMType":"UInt32","Description":"Bit mask for the permission","Name":"Bit","Option":"Write"},{"CIMType":"String","Description":"Token value","Name":"Token","Option":"Key"}],"Description":"Manages permissions in Azure DevOPS."},{"ClassName":"MSFT_ADOPermissionGroupSettings","Parameters":[{"CIMType":"String","Description":"Name of the group.","Name":"GroupName","Option":"Key"},{"CIMType":"String","Description":"Name of the DevOPS Organization.","Name":"OrganizationName","Option":"Write"},{"CIMType":"String","Description":"Descriptor for the group.","Name":"Descriptor","Option":"Write"},{"CIMType":"MSFT_ADOPermission[]","Description":"Allow permissions.","Name":"AllowPermissions","Option":"Write"},{"CIMType":"MSFT_ADOPermission[]","Description":"Deny permissions","Name":"DenyPermissions","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Manages permissions in Azure DevOPS."},{"ClassName":"MSFT_ADOSecurityPolicy","Parameters":[{"CIMType":"String","Description":"The name of the Azure DevOPS Organization.","Name":"OrganizationName","Option":"Key"},{"CIMType":"Boolean","Description":"Controls the external guest access.","Name":"DisallowAadGuestUserAccess","Option":"Write"},{"CIMType":"Boolean","Description":"Controls the Third-party application access via OAuth.","Name":"DisallowOAuthAuthentication","Option":"Write"},{"CIMType":"Boolean","Description":"Controls SSH Authentication.","Name":"DisallowSecureShell","Option":"Write"},{"CIMType":"Boolean","Description":"Controls Log Audit Events.","Name":"LogAuditEvents","Option":"Write"},{"CIMType":"Boolean","Description":"Controls the Allow public projects setting.","Name":"AllowAnonymousAccess","Option":"Write"},{"CIMType":"Boolean","Description":"Controls the Additional protections when using public package registries setting.","Name":"ArtifactsExternalPackageProtectionToken","Option":"Write"},{"CIMType":"Boolean","Description":"Controls the Enable IP Conditional Access policy validation setting.","Name":"EnforceAADConditionalAccess","Option":"Write"},{"CIMType":"Boolean","Description":"Controls the Allow team and project administrators to invite new user setting.","Name":"AllowTeamAdminsInvitationsAccessToken","Option":"Write"},{"CIMType":"Boolean","Description":"Controls the Request access setting.","Name":"AllowRequestAccessToken","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Configures Azure DevOPS Security Policies."},{"ClassName":"MSFT_AzureBillingAccountPolicyEnterpriseAgreementPolicy","Parameters":[{"CIMType":"String","Description":"The policy that controls whether account owner can view charges.","Name":"accountOwnerViewCharges","Option":"Write"},{"CIMType":"String","Description":"The state showing the enrollment auth level.","Name":"authenticationType","Option":"Write"},{"CIMType":"String","Description":"The policy that controls whether department admin can view charges.","Name":"departmentAdminViewCharges","Option":"Write"}],"Description":"Configures policies settings for an Azure billing account."},{"ClassName":"MSFT_AzureBillingAccountPolicy","Parameters":[{"CIMType":"String","Description":"Unique identifier of the associated billing account.","Name":"BillingAccount","Option":"Key"},{"CIMType":"String","Description":"Name of the policy.","Name":"Name","Option":"Write"},{"CIMType":"MSFT_AzureBillingAccountPolicyEnterpriseAgreementPolicy","Description":"The policies for Enterprise Agreement enrollments.","Name":"EnterpriseAgreementPolicies","Option":"Write"},{"CIMType":"String","Description":"The policy that controls whether Azure marketplace purchases are allowed.","Name":"MarketplacePurchases","Option":"Write"},{"CIMType":"String","Description":"The policy that controls whether Azure reservation purchases are allowed.","Name":"ReservationPurchases","Option":"Write"},{"CIMType":"String","Description":"The policy that controls whether users with Azure savings plan purchase are allowed.","Name":"SavingsPlanPurchases","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Configures policies settings for an Azure billing account."},{"ClassName":"MSFT_AzureBillingAccountsAssociatedTenant","Parameters":[{"CIMType":"String","Description":"The ID that uniquely identifies a tenant.","Name":"AssociatedTenantId","Option":"Key"},{"CIMType":"String","Description":"The name of the associated tenant.","Name":"DisplayName","Option":"Write"},{"CIMType":"String","Description":"Name of the billing account.","Name":"BillingAccount","Option":"Write"},{"CIMType":"String","Description":"The state determines whether users from the associated tenant can be assigned roles for commerce activities like viewing and downloading invoices, managing payments, and making purchases.","Name":"BillingManagementState","Option":"Write"},{"CIMType":"String","Description":"The state determines whether subscriptions and licenses can be provisioned in the associated tenant. It can be set to 'Pending' to initiate a billing request.","Name":"ProvisioningManagementState","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Configures associated tenants to billing accounts in the Microsoft Admin Center."},{"ClassName":"MSFT_AzureBillingAccountScheduledActionNotification","Parameters":[{"CIMType":"String","Description":"Subject of the email. Length is limited to 70 characters.","Name":"subject","Option":"Write"},{"CIMType":"String","Description":"Optional message to be added in the email. Length is limited to 250 characters.","Name":"message","Option":"Write"},{"CIMType":"String[]","Description":"Array of email addresses.","Name":"to","Option":"Write"}],"Description":"Manages scheduled actions for Azure billing accounts."},{"ClassName":"MSFT_AzureBillingAccountScheduledActionSchedule","Parameters":[{"CIMType":"UInt32","Description":"UTC day on which cost analysis data will be emailed. Must be between 1 and 31. This property is applicable when frequency is Monthly and overrides weeksOfMonth or daysOfWeek.","Name":"dayOfMonth","Option":"Write"},{"CIMType":"String[]","Description":"Day names in english on which cost analysis data will be emailed. This property is applicable when frequency is Weekly or Monthly.","Name":"daysOfWeek","Option":"Write"},{"CIMType":"String","Description":"The start date and time of the scheduled action (UTC).","Name":"startDate","Option":"Write"},{"CIMType":"String","Description":"The end date and time of the scheduled action (UTC).","Name":"endDate","Option":"Write"},{"CIMType":"String[]","Description":"Weeks in which cost analysis data will be emailed. This property is applicable when frequency is Monthly and used in combination with daysOfWeek.","Name":"weeksOfMonth","Option":"Write"},{"CIMType":"String","Description":"Frequency of the schedule.","Name":"frequency","Option":"Write"},{"CIMType":"UInt32","Description":"UTC time at which cost analysis data will be emailed.","Name":"hourOfDay","Option":"Write"}],"Description":"Manages scheduled actions for Azure billing accounts."},{"ClassName":"MSFT_AzureBillingAccountScheduledAction","Parameters":[{"CIMType":"String","Description":"Display name of the scheduled action.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"Associated billing account id.","Name":"BillingAccount","Option":"Write"},{"CIMType":"String","Description":"Status of the scheduled action.","Name":"Status","Option":"Write"},{"CIMType":"String","Description":"Associated view id.","Name":"View","Option":"Write"},{"CIMType":"MSFT_AzureBillingAccountScheduledActionNotification","Description":"Notification properties based on scheduled action kind.","Name":"Notification","Option":"Write"},{"CIMType":"String","Description":"Email address of the point of contact that should get the unsubscribe requests and notification emails.","Name":"NotificationEmail","Option":"Write"},{"CIMType":"MSFT_AzureBillingAccountScheduledActionSchedule","Description":"Schedule of the scheduled action.","Name":"Schedule","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Manages scheduled actions for Azure billing accounts."},{"ClassName":"MSFT_AzureBillingaccountsRoleAssignment","Parameters":[{"CIMType":"String","Description":"Name of the principal associated to the role assignment.","Name":"PrincipalName","Option":"Key"},{"CIMType":"String","Description":"Name of the role assigned to the principal.","Name":"RoleDefinition","Option":"Key"},{"CIMType":"String","Description":"Principal type. Can be User, Group or ServicePrincipal.","Name":"PrincipalType","Option":"Write"},{"CIMType":"String","Description":"Name of the billing account.","Name":"BillingAccount","Option":"Write"},{"CIMType":"String","Description":"The principal tenant id of the user to whom the role was assigned.","Name":"PrincipalTenantId","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Manages roles on billing accounts."},{"ClassName":"MSFT_AzureDiagnosticSettingsCategory","Parameters":[{"CIMType":"String","Description":"Name of the category.","Name":"Category","Option":"Key"},{"CIMType":"Boolean","Description":"Is the log category enabled or not.","Name":"enabled","Option":"Write"}],"Description":"Configures Diagnostics settings in Azure.\n\nUsers will need to grant permissions to the associated scope by running the following command in Azure Cloud Shell:\n\n```powershell\nNew-AzRoleAssignment -ObjectId \"\" -Scope \"/providers/Microsoft.aadiam\" -RoleDefinitionName 'Contributor' -ObjectType 'ServicePrincipal'\n```"},{"ClassName":"MSFT_AzureDiagnosticSettings","Parameters":[{"CIMType":"String","Description":"Diagnostic setting name.","Name":"Name","Option":"Key"},{"CIMType":"MSFT_AzureDiagnosticSettingsCategory[]","Description":"List of log categories.","Name":"Categories","Option":"Write"},{"CIMType":"String","Description":"Storage account id.","Name":"StorageAccountId","Option":"Write"},{"CIMType":"String","Description":"Service bus id.","Name":"ServiceBusRuleId","Option":"Write"},{"CIMType":"String","Description":"Event hub id.","Name":"EventHubAuthorizationRuleId","Option":"Write"},{"CIMType":"String","Description":"Event hub name.","Name":"EventHubName","Option":"Write"},{"CIMType":"String","Description":"Workspace id.","Name":"WorkspaceId","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Configures Diagnostics settings in Azure.\n\nUsers will need to grant permissions to the associated scope by running the following command in Azure Cloud Shell:\n\n```powershell\nNew-AzRoleAssignment -ObjectId \"\" -Scope \"/providers/Microsoft.aadiam\" -RoleDefinitionName 'Contributor' -ObjectType 'ServicePrincipal'\n```"},{"ClassName":"MSFT_AzureDiagnosticSettingsCustomSecurityAttributeCategory","Parameters":[{"CIMType":"String","Description":"Name of the category.","Name":"Category","Option":"Key"},{"CIMType":"Boolean","Description":"Is the log category enabled or not.","Name":"enabled","Option":"Write"}],"Description":"Configures Diagnostics settings custom security attributes in Azure.\n\nUsers will need to grant permissions to the associated scope by running the following command in Azure Cloud Shell:\n\n```powershell\nNew-AzRoleAssignment -ObjectId \"\" -Scope \"/providers/microsoft.AadCustomSecurityAttributesDiagnosticSettings\" -RoleDefinitionName 'Contributor' -ObjectType 'ServicePrincipal'\n```"},{"ClassName":"MSFT_AzureDiagnosticSettingsCustomSecurityAttribute","Parameters":[{"CIMType":"String","Description":"Diagnostic setting name.","Name":"Name","Option":"Key"},{"CIMType":"MSFT_AzureDiagnosticSettingsCustomSecurityAttributeCategory[]","Description":"List of log categories.","Name":"Categories","Option":"Write"},{"CIMType":"String","Description":"Storage account id.","Name":"StorageAccountId","Option":"Write"},{"CIMType":"String","Description":"Service bus id.","Name":"ServiceBusRuleId","Option":"Write"},{"CIMType":"String","Description":"Event hub id.","Name":"EventHubAuthorizationRuleId","Option":"Write"},{"CIMType":"String","Description":"Event hub name.","Name":"EventHubName","Option":"Write"},{"CIMType":"String","Description":"Workspace id.","Name":"WorkspaceId","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Configures Diagnostics settings custom security attributes in Azure.\n\nUsers will need to grant permissions to the associated scope by running the following command in Azure Cloud Shell:\n\n```powershell\nNew-AzRoleAssignment -ObjectId \"\" -Scope \"/providers/microsoft.AadCustomSecurityAttributesDiagnosticSettings\" -RoleDefinitionName 'Contributor' -ObjectType 'ServicePrincipal'\n```"},{"ClassName":"MSFT_AzureRoleAssignmentScheduleRequestScheduleRecurrenceRange","Parameters":[{"CIMType":"String","Description":"The date to stop applying the recurrence pattern. Depending on the recurrence pattern of the event, the last occurrence of the meeting may not be this date.","Name":"endDate","Option":"Required"},{"CIMType":"UInt32","Description":"The number of times to repeat the event. Required and must be positive if type is numbered.","Name":"numberOfOccurrences","Option":"Write"},{"CIMType":"String","Description":"Time zone for the startDate and endDate properties.","Name":"recurrenceTimeZone","Option":"Write"},{"CIMType":"String","Description":"The date to start applying the recurrence pattern. The first occurrence of the meeting may be this date or later, depending on the recurrence pattern of the event. Must be the same value as the start property of the recurring event.","Name":"startDate","Option":"Required"},{"CIMType":"String","Description":"The recurrence range. The possible values are: endDate, noEnd, numbered.","Name":"type","Option":"Required","ValueMap":["endDate","noEnd","numbered"],"Values":["endDate","noEnd","numbered"]}],"Description":"This resource manages Azure PIM (Privileged Identity Management) role assignment schedule requests for Azure RBAC roles. It supports role assignments at all scope levels including subscription, management group, resource group, and resource-specific scopes.\n\n## Key Differences from AADRoleAssignmentScheduleRequest\n\n- **AADRoleAssignmentScheduleRequest**: Manages Entra ID (Azure AD) directory roles via Microsoft Graph API\n- **AzureRoleAssignmentScheduleRequest**: Manages Azure RBAC roles via Azure Resource Manager API\n\n## Key Differences from AzureRoleEligibilityScheduleRequest\n\n- **AzureRoleEligibilityScheduleRequest**: Manages role eligibility (makes principal eligible to activate the role via PIM)\n- **AzureRoleAssignmentScheduleRequest**: Manages active role assignments (principal has the role actively assigned)\n\n## Supported Scope Levels\n\n### Subscription Scope\nFormat: `/subscriptions/{subscriptionId}`\n\nExample: Assign \"Owner\" role on subscription\n\n### Management Group Scope\nFormat: `/providers/Microsoft.Management/managementGroups/{managementGroupId}`\n\nExample: Assign \"Reader\" role on management group\n\n### Resource Group Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}`\n\nExample: Assign \"Contributor\" role on resource group\n\n### Resource Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{resourceType}/{resourceName}`\n\nExample: Assign \"Key Vault Administrator\" role on specific key vault\n\n## Azure Government Cloud Support\n\nThis resource automatically detects the tenant region and uses the appropriate Azure Management endpoint:\n\n- **Global Azure**: `https://management.azure.com`\n- **Azure US Government**: `https://management.usgovcloudapi.net`\n- **Azure US Government DoD**: `https://management.usgovcloudapi.net`\n\n## Required Permissions\n\nTo manage Azure PIM role assignment schedules, you need one of the following:\n\n- **Privileged Role Administrator** role in Azure AD\n- **Owner** or **User Access Administrator** role at the appropriate Azure scope\n- Custom role with permissions:\n - `Microsoft.Authorization/roleAssignmentScheduleRequests/write`\n - `Microsoft.Authorization/roleAssignmentSchedules/read`\n - `Microsoft.Authorization/roleDefinitions/read`\n\n## Known Limitations\n\n- The resource creates new schedule requests rather than directly modifying existing schedules\n- Schedule changes may take a few minutes to propagate\n- Some built-in roles may have restrictions on assignments\n- Management group scope requires appropriate permissions at the management group level\n\n## Examples\n\nSee the Examples folder for comprehensive usage scenarios."},{"ClassName":"MSFT_AzureRoleAssignmentScheduleRequestScheduleRecurrencePattern","Parameters":[{"CIMType":"UInt32","Description":"The day of the month on which the event occurs.","Name":"dayOfMonth","Option":"Write"},{"CIMType":"String[]","Description":"A collection of the days of the week on which the event occurs. The possible values are: sunday, monday, tuesday, wednesday, thursday, friday, saturday","Name":"daysOfWeek","Option":"Write","ValueMap":["sunday","monday","tuesday","wednesday","thursday","friday","saturday"],"Values":["sunday","monday","tuesday","wednesday","thursday","friday","saturday"]},{"CIMType":"String","Description":"The first day of the week.","Name":"firstDayOfWeek","Option":"Write","ValueMap":["sunday","monday","tuesday","wednesday","thursday","friday","saturday"],"Values":["sunday","monday","tuesday","wednesday","thursday","friday","saturday"]},{"CIMType":"String","Description":"Specifies on which instance of the allowed days specified in daysOfWeek the event occurs, counted from the first instance in the month. The possible values are: first, second, third, fourth, last.","Name":"index","Option":"Write","ValueMap":["first","second","third","fourth","last"],"Values":["first","second","third","fourth","last"]},{"CIMType":"UInt32","Description":"The number of units between occurrences, where units can be in days, weeks, months, or years, depending on the type.","Name":"interval","Option":"Write"},{"CIMType":"UInt32","Description":"The month in which the event occurs. This is a number from 1 to 12.","Name":"month","Option":"Write"},{"CIMType":"String","Description":"The recurrence pattern type: daily, weekly, absoluteMonthly, relativeMonthly, absoluteYearly, relativeYearly.","Name":"type","Option":"Write","ValueMap":["daily","weekly","absoluteMonthly","relativeMonthly","absoluteYearly","relativeYearly"],"Values":["daily","weekly","absoluteMonthly","relativeMonthly","absoluteYearly","relativeYearly"]}],"Description":"This resource manages Azure PIM (Privileged Identity Management) role assignment schedule requests for Azure RBAC roles. It supports role assignments at all scope levels including subscription, management group, resource group, and resource-specific scopes.\n\n## Key Differences from AADRoleAssignmentScheduleRequest\n\n- **AADRoleAssignmentScheduleRequest**: Manages Entra ID (Azure AD) directory roles via Microsoft Graph API\n- **AzureRoleAssignmentScheduleRequest**: Manages Azure RBAC roles via Azure Resource Manager API\n\n## Key Differences from AzureRoleEligibilityScheduleRequest\n\n- **AzureRoleEligibilityScheduleRequest**: Manages role eligibility (makes principal eligible to activate the role via PIM)\n- **AzureRoleAssignmentScheduleRequest**: Manages active role assignments (principal has the role actively assigned)\n\n## Supported Scope Levels\n\n### Subscription Scope\nFormat: `/subscriptions/{subscriptionId}`\n\nExample: Assign \"Owner\" role on subscription\n\n### Management Group Scope\nFormat: `/providers/Microsoft.Management/managementGroups/{managementGroupId}`\n\nExample: Assign \"Reader\" role on management group\n\n### Resource Group Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}`\n\nExample: Assign \"Contributor\" role on resource group\n\n### Resource Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{resourceType}/{resourceName}`\n\nExample: Assign \"Key Vault Administrator\" role on specific key vault\n\n## Azure Government Cloud Support\n\nThis resource automatically detects the tenant region and uses the appropriate Azure Management endpoint:\n\n- **Global Azure**: `https://management.azure.com`\n- **Azure US Government**: `https://management.usgovcloudapi.net`\n- **Azure US Government DoD**: `https://management.usgovcloudapi.net`\n\n## Required Permissions\n\nTo manage Azure PIM role assignment schedules, you need one of the following:\n\n- **Privileged Role Administrator** role in Azure AD\n- **Owner** or **User Access Administrator** role at the appropriate Azure scope\n- Custom role with permissions:\n - `Microsoft.Authorization/roleAssignmentScheduleRequests/write`\n - `Microsoft.Authorization/roleAssignmentSchedules/read`\n - `Microsoft.Authorization/roleDefinitions/read`\n\n## Known Limitations\n\n- The resource creates new schedule requests rather than directly modifying existing schedules\n- Schedule changes may take a few minutes to propagate\n- Some built-in roles may have restrictions on assignments\n- Management group scope requires appropriate permissions at the management group level\n\n## Examples\n\nSee the Examples folder for comprehensive usage scenarios."},{"ClassName":"MSFT_AzureRoleAssignmentScheduleRequestScheduleRecurrence","Parameters":[{"CIMType":"MSFT_AzureRoleAssignmentScheduleRequestScheduleRecurrencePattern","Description":"The frequency of an event.","Name":"pattern","Option":"Write"},{"CIMType":"MSFT_AzureRoleAssignmentScheduleRequestScheduleRecurrenceRange","Description":"The duration of an event.","Name":"range","Option":"Write"}],"Description":"This resource manages Azure PIM (Privileged Identity Management) role assignment schedule requests for Azure RBAC roles. It supports role assignments at all scope levels including subscription, management group, resource group, and resource-specific scopes.\n\n## Key Differences from AADRoleAssignmentScheduleRequest\n\n- **AADRoleAssignmentScheduleRequest**: Manages Entra ID (Azure AD) directory roles via Microsoft Graph API\n- **AzureRoleAssignmentScheduleRequest**: Manages Azure RBAC roles via Azure Resource Manager API\n\n## Key Differences from AzureRoleEligibilityScheduleRequest\n\n- **AzureRoleEligibilityScheduleRequest**: Manages role eligibility (makes principal eligible to activate the role via PIM)\n- **AzureRoleAssignmentScheduleRequest**: Manages active role assignments (principal has the role actively assigned)\n\n## Supported Scope Levels\n\n### Subscription Scope\nFormat: `/subscriptions/{subscriptionId}`\n\nExample: Assign \"Owner\" role on subscription\n\n### Management Group Scope\nFormat: `/providers/Microsoft.Management/managementGroups/{managementGroupId}`\n\nExample: Assign \"Reader\" role on management group\n\n### Resource Group Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}`\n\nExample: Assign \"Contributor\" role on resource group\n\n### Resource Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{resourceType}/{resourceName}`\n\nExample: Assign \"Key Vault Administrator\" role on specific key vault\n\n## Azure Government Cloud Support\n\nThis resource automatically detects the tenant region and uses the appropriate Azure Management endpoint:\n\n- **Global Azure**: `https://management.azure.com`\n- **Azure US Government**: `https://management.usgovcloudapi.net`\n- **Azure US Government DoD**: `https://management.usgovcloudapi.net`\n\n## Required Permissions\n\nTo manage Azure PIM role assignment schedules, you need one of the following:\n\n- **Privileged Role Administrator** role in Azure AD\n- **Owner** or **User Access Administrator** role at the appropriate Azure scope\n- Custom role with permissions:\n - `Microsoft.Authorization/roleAssignmentScheduleRequests/write`\n - `Microsoft.Authorization/roleAssignmentSchedules/read`\n - `Microsoft.Authorization/roleDefinitions/read`\n\n## Known Limitations\n\n- The resource creates new schedule requests rather than directly modifying existing schedules\n- Schedule changes may take a few minutes to propagate\n- Some built-in roles may have restrictions on assignments\n- Management group scope requires appropriate permissions at the management group level\n\n## Examples\n\nSee the Examples folder for comprehensive usage scenarios."},{"ClassName":"MSFT_AzureRoleAssignmentScheduleRequestScheduleExpiration","Parameters":[{"CIMType":"String","Description":"The requestor's desired duration of access represented in ISO 8601 format for durations. For example, PT3H refers to three hours. If specified in a request, endDateTime should not be present and the type property should be set to afterDuration.","Name":"duration","Option":"Write"},{"CIMType":"String","Description":"Timestamp of date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z.","Name":"endDateTime","Option":"Write"},{"CIMType":"String","Description":"The requestor's desired expiration pattern type. The possible values are: notSpecified, noExpiration, afterDateTime, afterDuration.","Name":"type","Option":"Write","ValueMap":["notSpecified","noExpiration","afterDateTime","afterDuration"],"Values":["notSpecified","noExpiration","afterDateTime","afterDuration"]}],"Description":"This resource manages Azure PIM (Privileged Identity Management) role assignment schedule requests for Azure RBAC roles. It supports role assignments at all scope levels including subscription, management group, resource group, and resource-specific scopes.\n\n## Key Differences from AADRoleAssignmentScheduleRequest\n\n- **AADRoleAssignmentScheduleRequest**: Manages Entra ID (Azure AD) directory roles via Microsoft Graph API\n- **AzureRoleAssignmentScheduleRequest**: Manages Azure RBAC roles via Azure Resource Manager API\n\n## Key Differences from AzureRoleEligibilityScheduleRequest\n\n- **AzureRoleEligibilityScheduleRequest**: Manages role eligibility (makes principal eligible to activate the role via PIM)\n- **AzureRoleAssignmentScheduleRequest**: Manages active role assignments (principal has the role actively assigned)\n\n## Supported Scope Levels\n\n### Subscription Scope\nFormat: `/subscriptions/{subscriptionId}`\n\nExample: Assign \"Owner\" role on subscription\n\n### Management Group Scope\nFormat: `/providers/Microsoft.Management/managementGroups/{managementGroupId}`\n\nExample: Assign \"Reader\" role on management group\n\n### Resource Group Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}`\n\nExample: Assign \"Contributor\" role on resource group\n\n### Resource Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{resourceType}/{resourceName}`\n\nExample: Assign \"Key Vault Administrator\" role on specific key vault\n\n## Azure Government Cloud Support\n\nThis resource automatically detects the tenant region and uses the appropriate Azure Management endpoint:\n\n- **Global Azure**: `https://management.azure.com`\n- **Azure US Government**: `https://management.usgovcloudapi.net`\n- **Azure US Government DoD**: `https://management.usgovcloudapi.net`\n\n## Required Permissions\n\nTo manage Azure PIM role assignment schedules, you need one of the following:\n\n- **Privileged Role Administrator** role in Azure AD\n- **Owner** or **User Access Administrator** role at the appropriate Azure scope\n- Custom role with permissions:\n - `Microsoft.Authorization/roleAssignmentScheduleRequests/write`\n - `Microsoft.Authorization/roleAssignmentSchedules/read`\n - `Microsoft.Authorization/roleDefinitions/read`\n\n## Known Limitations\n\n- The resource creates new schedule requests rather than directly modifying existing schedules\n- Schedule changes may take a few minutes to propagate\n- Some built-in roles may have restrictions on assignments\n- Management group scope requires appropriate permissions at the management group level\n\n## Examples\n\nSee the Examples folder for comprehensive usage scenarios."},{"ClassName":"MSFT_AzureRoleAssignmentScheduleRequestSchedule","Parameters":[{"CIMType":"MSFT_AzureRoleAssignmentScheduleRequestScheduleExpiration","Description":"When the eligible or active assignment expires.","Name":"expiration","Option":"Write"},{"CIMType":"MSFT_AzureRoleAssignmentScheduleRequestScheduleRecurrence","Description":"The frequency of the eligible or active assignment. This property is currently unsupported in PIM.","Name":"recurrence","Option":"Write"},{"CIMType":"String","Description":"When the eligible or active assignment becomes active.","Name":"startDateTime","Option":"Write"}],"Description":"This resource manages Azure PIM (Privileged Identity Management) role assignment schedule requests for Azure RBAC roles. It supports role assignments at all scope levels including subscription, management group, resource group, and resource-specific scopes.\n\n## Key Differences from AADRoleAssignmentScheduleRequest\n\n- **AADRoleAssignmentScheduleRequest**: Manages Entra ID (Azure AD) directory roles via Microsoft Graph API\n- **AzureRoleAssignmentScheduleRequest**: Manages Azure RBAC roles via Azure Resource Manager API\n\n## Key Differences from AzureRoleEligibilityScheduleRequest\n\n- **AzureRoleEligibilityScheduleRequest**: Manages role eligibility (makes principal eligible to activate the role via PIM)\n- **AzureRoleAssignmentScheduleRequest**: Manages active role assignments (principal has the role actively assigned)\n\n## Supported Scope Levels\n\n### Subscription Scope\nFormat: `/subscriptions/{subscriptionId}`\n\nExample: Assign \"Owner\" role on subscription\n\n### Management Group Scope\nFormat: `/providers/Microsoft.Management/managementGroups/{managementGroupId}`\n\nExample: Assign \"Reader\" role on management group\n\n### Resource Group Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}`\n\nExample: Assign \"Contributor\" role on resource group\n\n### Resource Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{resourceType}/{resourceName}`\n\nExample: Assign \"Key Vault Administrator\" role on specific key vault\n\n## Azure Government Cloud Support\n\nThis resource automatically detects the tenant region and uses the appropriate Azure Management endpoint:\n\n- **Global Azure**: `https://management.azure.com`\n- **Azure US Government**: `https://management.usgovcloudapi.net`\n- **Azure US Government DoD**: `https://management.usgovcloudapi.net`\n\n## Required Permissions\n\nTo manage Azure PIM role assignment schedules, you need one of the following:\n\n- **Privileged Role Administrator** role in Azure AD\n- **Owner** or **User Access Administrator** role at the appropriate Azure scope\n- Custom role with permissions:\n - `Microsoft.Authorization/roleAssignmentScheduleRequests/write`\n - `Microsoft.Authorization/roleAssignmentSchedules/read`\n - `Microsoft.Authorization/roleDefinitions/read`\n\n## Known Limitations\n\n- The resource creates new schedule requests rather than directly modifying existing schedules\n- Schedule changes may take a few minutes to propagate\n- Some built-in roles may have restrictions on assignments\n- Management group scope requires appropriate permissions at the management group level\n\n## Examples\n\nSee the Examples folder for comprehensive usage scenarios."},{"ClassName":"MSFT_AzureRoleAssignmentScheduleRequest","Parameters":[{"CIMType":"String","Description":"User Principal Name of the Azure role assignment request.","Name":"Principal","Option":"Key"},{"CIMType":"String","Description":"Azure role associated with the assignment request (e.g., 'Owner', 'Contributor').","Name":"RoleDefinition","Option":"Key"},{"CIMType":"String","Description":"Represented the type of principal to assign the request to. Accepted values are: Group, User and ServicePrincipal.","Name":"PrincipalType","Option":"Write","ValueMap":["Group","User","ServicePrincipal"],"Values":["Group","User","ServicePrincipal"]},{"CIMType":"String","Description":"Identifier of the scope representing the Azure resource (e.g., /subscriptions/{id}, /providers/Microsoft.Management/managementGroups/{id}). The scope determines the set of Azure resources for which the principal has been granted access.","Name":"DirectoryScopeId","Option":"Key"},{"CIMType":"String","Description":"Identifier for the Role Assignment Schedule Request.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Identifier of the app-specific scope when the role assignment is scoped to an app. Not commonly used for Azure RBAC roles.","Name":"AppScopeId","Option":"Write"},{"CIMType":"String","Description":"A message provided by users and administrators when they create the role assignment schedule request.","Name":"Justification","Option":"Write"},{"CIMType":"MSFT_AzureRoleAssignmentScheduleRequestSchedule","Description":"The period of the role assignment. The period of assignment is dependent on the settings of the Azure role.","Name":"ScheduleInfo","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource manages Azure PIM (Privileged Identity Management) role assignment schedule requests for Azure RBAC roles. It supports role assignments at all scope levels including subscription, management group, resource group, and resource-specific scopes.\n\n## Key Differences from AADRoleAssignmentScheduleRequest\n\n- **AADRoleAssignmentScheduleRequest**: Manages Entra ID (Azure AD) directory roles via Microsoft Graph API\n- **AzureRoleAssignmentScheduleRequest**: Manages Azure RBAC roles via Azure Resource Manager API\n\n## Key Differences from AzureRoleEligibilityScheduleRequest\n\n- **AzureRoleEligibilityScheduleRequest**: Manages role eligibility (makes principal eligible to activate the role via PIM)\n- **AzureRoleAssignmentScheduleRequest**: Manages active role assignments (principal has the role actively assigned)\n\n## Supported Scope Levels\n\n### Subscription Scope\nFormat: `/subscriptions/{subscriptionId}`\n\nExample: Assign \"Owner\" role on subscription\n\n### Management Group Scope\nFormat: `/providers/Microsoft.Management/managementGroups/{managementGroupId}`\n\nExample: Assign \"Reader\" role on management group\n\n### Resource Group Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}`\n\nExample: Assign \"Contributor\" role on resource group\n\n### Resource Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{resourceType}/{resourceName}`\n\nExample: Assign \"Key Vault Administrator\" role on specific key vault\n\n## Azure Government Cloud Support\n\nThis resource automatically detects the tenant region and uses the appropriate Azure Management endpoint:\n\n- **Global Azure**: `https://management.azure.com`\n- **Azure US Government**: `https://management.usgovcloudapi.net`\n- **Azure US Government DoD**: `https://management.usgovcloudapi.net`\n\n## Required Permissions\n\nTo manage Azure PIM role assignment schedules, you need one of the following:\n\n- **Privileged Role Administrator** role in Azure AD\n- **Owner** or **User Access Administrator** role at the appropriate Azure scope\n- Custom role with permissions:\n - `Microsoft.Authorization/roleAssignmentScheduleRequests/write`\n - `Microsoft.Authorization/roleAssignmentSchedules/read`\n - `Microsoft.Authorization/roleDefinitions/read`\n\n## Known Limitations\n\n- The resource creates new schedule requests rather than directly modifying existing schedules\n- Schedule changes may take a few minutes to propagate\n- Some built-in roles may have restrictions on assignments\n- Management group scope requires appropriate permissions at the management group level\n\n## Examples\n\nSee the Examples folder for comprehensive usage scenarios."},{"ClassName":"MSFT_AzureRoleEligibilityScheduleRequestScheduleRecurrenceRange","Parameters":[{"CIMType":"String","Description":"The date to stop applying the recurrence pattern. Depending on the recurrence pattern of the event, the last occurrence of the meeting may not be this date.","Name":"endDate","Option":"Required"},{"CIMType":"UInt32","Description":"The number of times to repeat the event. Required and must be positive if type is numbered.","Name":"numberOfOccurrences","Option":"Write"},{"CIMType":"String","Description":"Time zone for the startDate and endDate properties.","Name":"recurrenceTimeZone","Option":"Write"},{"CIMType":"String","Description":"The date to start applying the recurrence pattern. The first occurrence of the meeting may be this date or later, depending on the recurrence pattern of the event. Must be the same value as the start property of the recurring event.","Name":"startDate","Option":"Required"},{"CIMType":"String","Description":"The recurrence range. The possible values are: endDate, noEnd, numbered.","Name":"type","Option":"Required","ValueMap":["endDate","noEnd","numbered"],"Values":["endDate","noEnd","numbered"]}],"Description":"This resource manages Azure PIM (Privileged Identity Management) role eligibility schedule requests for Azure RBAC roles. It supports role assignments and eligibility at all scope levels including subscription, management group, resource group, and resource-specific scopes.\n\n## Key Differences from AADRoleEligibilityScheduleRequest\n\n- **AADRoleEligibilityScheduleRequest**: Manages Entra ID (Azure AD) directory roles via Microsoft Graph API\n- **AzureRoleEligibilityScheduleRequest**: Manages Azure RBAC roles via Azure Resource Manager API\n\n## Supported Scope Levels\n\n### Subscription Scope\nFormat: `/subscriptions/{subscriptionId}`\n\nExample: Assign \"Owner\" eligibility on subscription\n\n### Management Group Scope\nFormat: `/providers/Microsoft.Management/managementGroups/{managementGroupId}`\n\nExample: Assign \"Reader\" eligibility on management group\n\n### Resource Group Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}`\n\nExample: Assign \"Contributor\" eligibility on resource group\n\n### Resource Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{resourceType}/{resourceName}`\n\nExample: Assign \"Key Vault Administrator\" eligibility on specific key vault\n\n## Azure Government Cloud Support\n\nThis resource automatically detects the tenant region and uses the appropriate Azure Management endpoint:\n\n- **Global Azure**: `https://management.azure.com`\n- **Azure US Government**: `https://management.usgovcloudapi.net`\n- **Azure US Government DoD**: `https://management.usgovcloudapi.net`\n\n## Required Permissions\n\nTo manage Azure PIM role eligibility schedules, you need one of the following:\n\n- **Privileged Role Administrator** role in Azure AD\n- **Owner** or **User Access Administrator** role at the appropriate Azure scope\n- Custom role with permissions:\n - `Microsoft.Authorization/roleEligibilityScheduleRequests/write`\n - `Microsoft.Authorization/roleEligibilitySchedules/read`\n - `Microsoft.Authorization/roleDefinitions/read`\n\n## Known Limitations\n\n- The resource creates new schedule requests rather than directly modifying existing schedules\n- Schedule changes may take a few minutes to propagate\n- Some built-in roles may have restrictions on eligibility assignments\n- Management group scope requires appropriate permissions at the management group level\n\n## Examples\n\nSee the Examples folder for comprehensive usage scenarios."},{"ClassName":"MSFT_AzureRoleEligibilityScheduleRequestScheduleRecurrencePattern","Parameters":[{"CIMType":"UInt32","Description":"The day of the month on which the event occurs.","Name":"dayOfMonth","Option":"Write"},{"CIMType":"String[]","Description":"A collection of the days of the week on which the event occurs. The possible values are: sunday, monday, tuesday, wednesday, thursday, friday, saturday","Name":"daysOfWeek","Option":"Write","ValueMap":["sunday","monday","tuesday","wednesday","thursday","friday","saturday"],"Values":["sunday","monday","tuesday","wednesday","thursday","friday","saturday"]},{"CIMType":"String","Description":"The first day of the week.","Name":"firstDayOfWeek","Option":"Write","ValueMap":["sunday","monday","tuesday","wednesday","thursday","friday","saturday"],"Values":["sunday","monday","tuesday","wednesday","thursday","friday","saturday"]},{"CIMType":"String","Description":"Specifies on which instance of the allowed days specified in daysOfWeek the event occurs, counted from the first instance in the month. The possible values are: first, second, third, fourth, last.","Name":"index","Option":"Write","ValueMap":["first","second","third","fourth","last"],"Values":["first","second","third","fourth","last"]},{"CIMType":"UInt32","Description":"The number of units between occurrences, where units can be in days, weeks, months, or years, depending on the type.","Name":"interval","Option":"Write"},{"CIMType":"UInt32","Description":"The month in which the event occurs. This is a number from 1 to 12.","Name":"month","Option":"Write"},{"CIMType":"String","Description":"The recurrence pattern type: daily, weekly, absoluteMonthly, relativeMonthly, absoluteYearly, relativeYearly.","Name":"type","Option":"Write","ValueMap":["daily","weekly","absoluteMonthly","relativeMonthly","absoluteYearly","relativeYearly"],"Values":["daily","weekly","absoluteMonthly","relativeMonthly","absoluteYearly","relativeYearly"]}],"Description":"This resource manages Azure PIM (Privileged Identity Management) role eligibility schedule requests for Azure RBAC roles. It supports role assignments and eligibility at all scope levels including subscription, management group, resource group, and resource-specific scopes.\n\n## Key Differences from AADRoleEligibilityScheduleRequest\n\n- **AADRoleEligibilityScheduleRequest**: Manages Entra ID (Azure AD) directory roles via Microsoft Graph API\n- **AzureRoleEligibilityScheduleRequest**: Manages Azure RBAC roles via Azure Resource Manager API\n\n## Supported Scope Levels\n\n### Subscription Scope\nFormat: `/subscriptions/{subscriptionId}`\n\nExample: Assign \"Owner\" eligibility on subscription\n\n### Management Group Scope\nFormat: `/providers/Microsoft.Management/managementGroups/{managementGroupId}`\n\nExample: Assign \"Reader\" eligibility on management group\n\n### Resource Group Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}`\n\nExample: Assign \"Contributor\" eligibility on resource group\n\n### Resource Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{resourceType}/{resourceName}`\n\nExample: Assign \"Key Vault Administrator\" eligibility on specific key vault\n\n## Azure Government Cloud Support\n\nThis resource automatically detects the tenant region and uses the appropriate Azure Management endpoint:\n\n- **Global Azure**: `https://management.azure.com`\n- **Azure US Government**: `https://management.usgovcloudapi.net`\n- **Azure US Government DoD**: `https://management.usgovcloudapi.net`\n\n## Required Permissions\n\nTo manage Azure PIM role eligibility schedules, you need one of the following:\n\n- **Privileged Role Administrator** role in Azure AD\n- **Owner** or **User Access Administrator** role at the appropriate Azure scope\n- Custom role with permissions:\n - `Microsoft.Authorization/roleEligibilityScheduleRequests/write`\n - `Microsoft.Authorization/roleEligibilitySchedules/read`\n - `Microsoft.Authorization/roleDefinitions/read`\n\n## Known Limitations\n\n- The resource creates new schedule requests rather than directly modifying existing schedules\n- Schedule changes may take a few minutes to propagate\n- Some built-in roles may have restrictions on eligibility assignments\n- Management group scope requires appropriate permissions at the management group level\n\n## Examples\n\nSee the Examples folder for comprehensive usage scenarios."},{"ClassName":"MSFT_AzureRoleEligibilityScheduleRequestScheduleRecurrence","Parameters":[{"CIMType":"MSFT_AzureRoleEligibilityScheduleRequestScheduleRecurrencePattern","Description":"The frequency of an event.","Name":"pattern","Option":"Write"},{"CIMType":"MSFT_AzureRoleEligibilityScheduleRequestScheduleRecurrenceRange","Description":"The duration of an event.","Name":"range","Option":"Write"}],"Description":"This resource manages Azure PIM (Privileged Identity Management) role eligibility schedule requests for Azure RBAC roles. It supports role assignments and eligibility at all scope levels including subscription, management group, resource group, and resource-specific scopes.\n\n## Key Differences from AADRoleEligibilityScheduleRequest\n\n- **AADRoleEligibilityScheduleRequest**: Manages Entra ID (Azure AD) directory roles via Microsoft Graph API\n- **AzureRoleEligibilityScheduleRequest**: Manages Azure RBAC roles via Azure Resource Manager API\n\n## Supported Scope Levels\n\n### Subscription Scope\nFormat: `/subscriptions/{subscriptionId}`\n\nExample: Assign \"Owner\" eligibility on subscription\n\n### Management Group Scope\nFormat: `/providers/Microsoft.Management/managementGroups/{managementGroupId}`\n\nExample: Assign \"Reader\" eligibility on management group\n\n### Resource Group Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}`\n\nExample: Assign \"Contributor\" eligibility on resource group\n\n### Resource Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{resourceType}/{resourceName}`\n\nExample: Assign \"Key Vault Administrator\" eligibility on specific key vault\n\n## Azure Government Cloud Support\n\nThis resource automatically detects the tenant region and uses the appropriate Azure Management endpoint:\n\n- **Global Azure**: `https://management.azure.com`\n- **Azure US Government**: `https://management.usgovcloudapi.net`\n- **Azure US Government DoD**: `https://management.usgovcloudapi.net`\n\n## Required Permissions\n\nTo manage Azure PIM role eligibility schedules, you need one of the following:\n\n- **Privileged Role Administrator** role in Azure AD\n- **Owner** or **User Access Administrator** role at the appropriate Azure scope\n- Custom role with permissions:\n - `Microsoft.Authorization/roleEligibilityScheduleRequests/write`\n - `Microsoft.Authorization/roleEligibilitySchedules/read`\n - `Microsoft.Authorization/roleDefinitions/read`\n\n## Known Limitations\n\n- The resource creates new schedule requests rather than directly modifying existing schedules\n- Schedule changes may take a few minutes to propagate\n- Some built-in roles may have restrictions on eligibility assignments\n- Management group scope requires appropriate permissions at the management group level\n\n## Examples\n\nSee the Examples folder for comprehensive usage scenarios."},{"ClassName":"MSFT_AzureRoleEligibilityScheduleRequestScheduleExpiration","Parameters":[{"CIMType":"String","Description":"The requestor's desired duration of access represented in ISO 8601 format for durations. For example, PT3H refers to three hours. If specified in a request, endDateTime should not be present and the type property should be set to afterDuration.","Name":"duration","Option":"Write"},{"CIMType":"String","Description":"Timestamp of date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z.","Name":"endDateTime","Option":"Write"},{"CIMType":"String","Description":"The requestor's desired expiration pattern type. The possible values are: notSpecified, noExpiration, afterDateTime, afterDuration.","Name":"type","Option":"Write","ValueMap":["notSpecified","noExpiration","afterDateTime","afterDuration"],"Values":["notSpecified","noExpiration","afterDateTime","afterDuration"]}],"Description":"This resource manages Azure PIM (Privileged Identity Management) role eligibility schedule requests for Azure RBAC roles. It supports role assignments and eligibility at all scope levels including subscription, management group, resource group, and resource-specific scopes.\n\n## Key Differences from AADRoleEligibilityScheduleRequest\n\n- **AADRoleEligibilityScheduleRequest**: Manages Entra ID (Azure AD) directory roles via Microsoft Graph API\n- **AzureRoleEligibilityScheduleRequest**: Manages Azure RBAC roles via Azure Resource Manager API\n\n## Supported Scope Levels\n\n### Subscription Scope\nFormat: `/subscriptions/{subscriptionId}`\n\nExample: Assign \"Owner\" eligibility on subscription\n\n### Management Group Scope\nFormat: `/providers/Microsoft.Management/managementGroups/{managementGroupId}`\n\nExample: Assign \"Reader\" eligibility on management group\n\n### Resource Group Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}`\n\nExample: Assign \"Contributor\" eligibility on resource group\n\n### Resource Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{resourceType}/{resourceName}`\n\nExample: Assign \"Key Vault Administrator\" eligibility on specific key vault\n\n## Azure Government Cloud Support\n\nThis resource automatically detects the tenant region and uses the appropriate Azure Management endpoint:\n\n- **Global Azure**: `https://management.azure.com`\n- **Azure US Government**: `https://management.usgovcloudapi.net`\n- **Azure US Government DoD**: `https://management.usgovcloudapi.net`\n\n## Required Permissions\n\nTo manage Azure PIM role eligibility schedules, you need one of the following:\n\n- **Privileged Role Administrator** role in Azure AD\n- **Owner** or **User Access Administrator** role at the appropriate Azure scope\n- Custom role with permissions:\n - `Microsoft.Authorization/roleEligibilityScheduleRequests/write`\n - `Microsoft.Authorization/roleEligibilitySchedules/read`\n - `Microsoft.Authorization/roleDefinitions/read`\n\n## Known Limitations\n\n- The resource creates new schedule requests rather than directly modifying existing schedules\n- Schedule changes may take a few minutes to propagate\n- Some built-in roles may have restrictions on eligibility assignments\n- Management group scope requires appropriate permissions at the management group level\n\n## Examples\n\nSee the Examples folder for comprehensive usage scenarios."},{"ClassName":"MSFT_AzureRoleEligibilityScheduleRequestSchedule","Parameters":[{"CIMType":"MSFT_AzureRoleEligibilityScheduleRequestScheduleExpiration","Description":"When the eligible or active assignment expires.","Name":"expiration","Option":"Write"},{"CIMType":"MSFT_AzureRoleEligibilityScheduleRequestScheduleRecurrence","Description":"The frequency of the eligible or active assignment. This property is currently unsupported in PIM.","Name":"recurrence","Option":"Write"},{"CIMType":"String","Description":"When the eligible or active assignment becomes active.","Name":"startDateTime","Option":"Write"}],"Description":"This resource manages Azure PIM (Privileged Identity Management) role eligibility schedule requests for Azure RBAC roles. It supports role assignments and eligibility at all scope levels including subscription, management group, resource group, and resource-specific scopes.\n\n## Key Differences from AADRoleEligibilityScheduleRequest\n\n- **AADRoleEligibilityScheduleRequest**: Manages Entra ID (Azure AD) directory roles via Microsoft Graph API\n- **AzureRoleEligibilityScheduleRequest**: Manages Azure RBAC roles via Azure Resource Manager API\n\n## Supported Scope Levels\n\n### Subscription Scope\nFormat: `/subscriptions/{subscriptionId}`\n\nExample: Assign \"Owner\" eligibility on subscription\n\n### Management Group Scope\nFormat: `/providers/Microsoft.Management/managementGroups/{managementGroupId}`\n\nExample: Assign \"Reader\" eligibility on management group\n\n### Resource Group Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}`\n\nExample: Assign \"Contributor\" eligibility on resource group\n\n### Resource Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{resourceType}/{resourceName}`\n\nExample: Assign \"Key Vault Administrator\" eligibility on specific key vault\n\n## Azure Government Cloud Support\n\nThis resource automatically detects the tenant region and uses the appropriate Azure Management endpoint:\n\n- **Global Azure**: `https://management.azure.com`\n- **Azure US Government**: `https://management.usgovcloudapi.net`\n- **Azure US Government DoD**: `https://management.usgovcloudapi.net`\n\n## Required Permissions\n\nTo manage Azure PIM role eligibility schedules, you need one of the following:\n\n- **Privileged Role Administrator** role in Azure AD\n- **Owner** or **User Access Administrator** role at the appropriate Azure scope\n- Custom role with permissions:\n - `Microsoft.Authorization/roleEligibilityScheduleRequests/write`\n - `Microsoft.Authorization/roleEligibilitySchedules/read`\n - `Microsoft.Authorization/roleDefinitions/read`\n\n## Known Limitations\n\n- The resource creates new schedule requests rather than directly modifying existing schedules\n- Schedule changes may take a few minutes to propagate\n- Some built-in roles may have restrictions on eligibility assignments\n- Management group scope requires appropriate permissions at the management group level\n\n## Examples\n\nSee the Examples folder for comprehensive usage scenarios."},{"ClassName":"MSFT_AzureRoleEligibilityScheduleRequest","Parameters":[{"CIMType":"String","Description":"User Principal Name of the Azure role eligibility request.","Name":"Principal","Option":"Key"},{"CIMType":"String","Description":"Azure role associated with the eligibility request (e.g., 'Owner', 'Contributor').","Name":"RoleDefinition","Option":"Key"},{"CIMType":"String","Description":"Represented the type of principal to assign the request to. Accepted values are: Group, User and ServicePrincipal.","Name":"PrincipalType","Option":"Write","ValueMap":["Group","User","ServicePrincipal"],"Values":["Group","User","ServicePrincipal"]},{"CIMType":"String","Description":"Identifier of the scope representing the Azure resource (e.g., /subscriptions/{id}, /providers/Microsoft.Management/managementGroups/{id}). The scope determines the set of Azure resources for which the principal is eligible to access.","Name":"DirectoryScopeId","Option":"Key"},{"CIMType":"String","Description":"Identifier for the Role Eligibility Schedule Request.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"Identifier of the app-specific scope when the role eligibility is scoped to an app. Not commonly used for Azure RBAC roles.","Name":"AppScopeId","Option":"Write"},{"CIMType":"String","Description":"A message provided by users and administrators when they create the role eligibility schedule request.","Name":"Justification","Option":"Write"},{"CIMType":"MSFT_AzureRoleEligibilityScheduleRequestSchedule","Description":"The period of the role eligibility. The period of eligibility is dependent on the settings of the Azure role.","Name":"ScheduleInfo","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory application to authenticate with.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource manages Azure PIM (Privileged Identity Management) role eligibility schedule requests for Azure RBAC roles. It supports role assignments and eligibility at all scope levels including subscription, management group, resource group, and resource-specific scopes.\n\n## Key Differences from AADRoleEligibilityScheduleRequest\n\n- **AADRoleEligibilityScheduleRequest**: Manages Entra ID (Azure AD) directory roles via Microsoft Graph API\n- **AzureRoleEligibilityScheduleRequest**: Manages Azure RBAC roles via Azure Resource Manager API\n\n## Supported Scope Levels\n\n### Subscription Scope\nFormat: `/subscriptions/{subscriptionId}`\n\nExample: Assign \"Owner\" eligibility on subscription\n\n### Management Group Scope\nFormat: `/providers/Microsoft.Management/managementGroups/{managementGroupId}`\n\nExample: Assign \"Reader\" eligibility on management group\n\n### Resource Group Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}`\n\nExample: Assign \"Contributor\" eligibility on resource group\n\n### Resource Scope\nFormat: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{resourceType}/{resourceName}`\n\nExample: Assign \"Key Vault Administrator\" eligibility on specific key vault\n\n## Azure Government Cloud Support\n\nThis resource automatically detects the tenant region and uses the appropriate Azure Management endpoint:\n\n- **Global Azure**: `https://management.azure.com`\n- **Azure US Government**: `https://management.usgovcloudapi.net`\n- **Azure US Government DoD**: `https://management.usgovcloudapi.net`\n\n## Required Permissions\n\nTo manage Azure PIM role eligibility schedules, you need one of the following:\n\n- **Privileged Role Administrator** role in Azure AD\n- **Owner** or **User Access Administrator** role at the appropriate Azure scope\n- Custom role with permissions:\n - `Microsoft.Authorization/roleEligibilityScheduleRequests/write`\n - `Microsoft.Authorization/roleEligibilitySchedules/read`\n - `Microsoft.Authorization/roleDefinitions/read`\n\n## Known Limitations\n\n- The resource creates new schedule requests rather than directly modifying existing schedules\n- Schedule changes may take a few minutes to propagate\n- Some built-in roles may have restrictions on eligibility assignments\n- Management group scope requires appropriate permissions at the management group level\n\n## Examples\n\nSee the Examples folder for comprehensive usage scenarios."},{"ClassName":"MSFT_AzureSubscription","Parameters":[{"CIMType":"String","Description":"The display name of the subscription.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"The unique identifier of the subscription.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"The unique identifier of the invoice section associated with the subscription.","Name":"InvoiceSectionId","Option":"Write"},{"CIMType":"String","Description":"Status of the subscription.","Name":"Status","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource controls the properties of an Azure subscription.\n\nTo grant permissions, go to the Cost Management + Billing blade in Azure Portal --> Billing Scopes --> Select your desired billing account --> then Access Control (IAM) to grant 'Billing Account Contributor' permissions to manage billing accounts.\nIf the resource is only used for backup, the `Billing Account Reader` role is sufficient."},{"ClassName":"MSFT_AzureVerifiedIdFaceCheck","Parameters":[{"CIMType":"String","Description":"Id of the Azure subscription.","Name":"SubscriptionId","Option":"Key"},{"CIMType":"String","Description":"Name of the associated resource group.","Name":"ResourceGroupName","Option":"Key"},{"CIMType":"String","Description":"Id of the verified ID authority.","Name":"VerifiedIdAuthorityId","Option":"Key"},{"CIMType":"Boolean","Description":"Represents whether or not FaceCheck is enabled for the authrotiy.","Name":"FaceCheckEnabled","Option":"Write"},{"CIMType":"String","Description":"Location of the Verified ID Authority.","Name":"VerifiedIdAuthorityLocation","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Configures Azure Verified Id FaceCheck."},{"ClassName":"MSFT_CommerceSelfServicePurchase","Parameters":[{"CIMType":"String","Description":"Unique ID of the product.","Name":"ProductId","Option":"Key"},{"CIMType":"String","Description":"Name of the product","Name":"ProductName","Option":"Write"},{"CIMType":"String","Description":"Can be Enabled or Disabled.","Name":"PolicyValue","Option":"Write","ValueMap":["Enabled","Disabled","OnlyTrialsWithoutPaymentMethod"],"Values":["Enabled","Disabled","OnlyTrialsWithoutPaymentMethod"]},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Manages the Self Purchase policies in commerce."},{"ClassName":"MSFT_DefenderDeviceAuthenticatedScanDefinitionAuthenticationParams","Parameters":[{"CIMType":"String","Description":"Odata type associated with the request.","Name":"DataType","Option":"Write"},{"CIMType":"String","Description":"Type of scan.","Name":"Type","Option":"Write"},{"CIMType":"String","Description":"An optional property that specifies from which KeyVault the scanner should retrieve credentials. If KeyVault is specified there's no need to specify username, password.","Name":"KeyVaultUrl","Option":"Write"},{"CIMType":"String","Description":"An optional property that specifies KeyVault secret name from which the scanner should retrieve credentials. If KeyVault is specified there's no need to specify username, password.","Name":"KeyVaultSecretName","Option":"Write"},{"CIMType":"String","Description":"Domain name when using WindowsAuthParams.","Name":"Domain","Option":"Write"},{"CIMType":"String","Description":"Username when using WindowsAuthParams or the username when choosing SnmpAuthParams with any type other than CommunityString.","Name":"Username","Option":"Write"},{"CIMType":"Boolean","Description":"Must be set to true when choosing WindowsAuthParams.","Name":"IsGMSAUser","Option":"Write"},{"CIMType":"String","Description":"Community string to use when choosing SnmpAuthParams with CommunityString.","Name":"CommunityString","Option":"Write"},{"CIMType":"String","Description":"Auth protocol to use with SnmpAuthParams and AuthNoPriv or AuthPriv. Possible values are MD5, SHA1.","Name":"AuthProtocol","Option":"Write"},{"CIMType":"String","Description":"Auth password to use with SnmpAuthParams and AuthNoPriv or AuthPriv.","Name":"AuthPassword","Option":"Write"},{"CIMType":"String","Description":"Priv protocol to use with SnmpAuthParams and AuthPriv. Possible values are DES, 3DES, AES.","Name":"PrivProtocol","Option":"Write"},{"CIMType":"String","Description":"Priv password to use with SnmpAuthParams and AuthPriv.","Name":"PrivPassword","Option":"Write"}],"Description":"Configures device authenticated scan definitions in Defender."},{"ClassName":"MSFT_DefenderDeviceAuthenticatedScanDefinitionScanAgent","Parameters":[{"CIMType":"String","Description":"Unique identified for the scan agent.","Name":"id","Option":"Write"},{"CIMType":"String","Description":"Id of the machine associated with the agent.","Name":"machineId","Option":"Write"},{"CIMType":"String","Description":"Name of the machine associated with the agent.","Name":"machineName","Option":"Write"}],"Description":"Configures device authenticated scan definitions in Defender."},{"ClassName":"MSFT_DefenderDeviceAuthenticatedScanDefinition","Parameters":[{"CIMType":"String","Description":"Name of the scan definition.","Name":"Name","Option":"Key"},{"CIMType":"String","Description":"Unique identified for the scan definition.","Name":"Id","Option":"Write"},{"CIMType":"UInt32","Description":"Interval in hours to run the scan.","Name":"IntervalInHours","Option":"Write"},{"CIMType":"String","Description":"Target of the scan definition.","Name":"Target","Option":"Write"},{"CIMType":"Boolean","Description":"Determines if the scan definition is active or not.","Name":"IsActive","Option":"Write"},{"CIMType":"String","Description":"Type of scan.","Name":"ScanType","Option":"Write"},{"CIMType":"MSFT_DefenderDeviceAuthenticatedScanDefinitionScanAgent","Description":"Information about the associated scan agent.","Name":"ScannerAgent","Option":"Write"},{"CIMType":"MSFT_DefenderDeviceAuthenticatedScanDefinitionAuthenticationParams","Description":"Authentication parameters.","Name":"ScanAuthenticationParams","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Configures device authenticated scan definitions in Defender."},{"ClassName":"MSFT_DefenderRoleDefinitionRolePermissions","Parameters":[{"CIMType":"String[]","Description":"Set of tasks that can be performed on a resource.","Name":"allowedResourceActions","Option":"Write"}],"Description":"## Managed custom roles in Defender"},{"ClassName":"MSFT_DefenderRoleDefinition","Parameters":[{"CIMType":"String","Description":"The display name for the role definition.","Name":"DisplayName","Option":"Key"},{"CIMType":"String","Description":"The id of the role definition.","Name":"Id","Option":"Write"},{"CIMType":"String","Description":"The description of the role definition.","Name":"Description","Option":"Write"},{"CIMType":"MSFT_DefenderRoleDefinitionRolePermissions[]","Description":"List of permissions included in the role.","Name":"RolePermissions","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"## Managed custom roles in Defender"},{"ClassName":"MSFT_DefenderSubscriptionPlan","Parameters":[{"CIMType":"String","Description":"The display name of the subscription.","Name":"SubscriptionName","Option":"Key"},{"CIMType":"String","Description":"The Defender plan name, for the list all of possible Defender plans refer to Defender for Cloud documentation","Name":"PlanName","Option":"Key"},{"CIMType":"String","Description":"The unique identifier of the Azure subscription.","Name":"SubscriptionId","Option":"Write"},{"CIMType":"String","Description":"The pricing tier ('Standard' or 'Free')","Name":"PricingTier","Option":"Write"},{"CIMType":"String","Description":"The Defender sub plan name, for the list all of possible sub plans refer to Defender for Cloud documentation","Name":"SubPlanName","Option":"Write"},{"CIMType":"String","Description":"The extensions offered under the plan, for more information refer to Defender for Cloud documentation","Name":"Extensions","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present"],"Values":["Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Enables or disables Microsoft Defender plans for a subscription in Microsoft Defender for Cloud.\nFor more information about the available Defender plans, sub plans and plan extensions refer to Defender for Cloud onboarding API documentation.\n\n\nTo have all security features enabled during plan enablement, make sure to assign the required Azure RBAC permissions to the application running this module.\nFor more information about the required permissions refer to the documentation ."},{"ClassName":"MSFT_EXOAcceptedDomain","Parameters":[{"CIMType":"String","Description":"Specify the Fully Qualified Domain Name for the AcceptedDomain.","Name":"Identity","Option":"Key"},{"CIMType":"String","Description":"Specify if the AcceptedDomain should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"String","Description":"The type of AcceptedDomain. Currently the EXOAcceptedDomain DSC Resource accepts a value of 'Authoritative' and 'InternalRelay'.","Name":"DomainType","Option":"Write","ValueMap":["Authoritative","InternalRelay"],"Values":["Authoritative","InternalRelay"]},{"CIMType":"Boolean","Description":"The MatchSubDomains parameter must be false on Authoritative domains. The default value is false.","Name":"MatchSubDomains","Option":"Write"},{"CIMType":"Boolean","Description":"OutboundOnly can only be enabled if the DomainType parameter is set to Authoritative or InternalRelay. The default value is false.","Name":"OutboundOnly","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures the Accepted Email Domains in Exchange Online."},{"ClassName":"MSFT_EXOActiveSyncDeviceAccessRule","Parameters":[{"CIMType":"String","Description":"The Identity parameter specifies the identity of the device access rule.","Name":"Identity","Option":"Key"},{"CIMType":"String","Description":"The AccessLevel parameter specifies whether the devices are allowed, blocked or quarantined.","Name":"AccessLevel","Option":"Write","ValueMap":["Allow","Block","Quarantine"],"Values":["Allow","Block","Quarantine"]},{"CIMType":"String","Description":"The Characteristic parameter specifies the device characteristic or category that's used by the rule.","Name":"Characteristic","Option":"Write","ValueMap":["DeviceModel","DeviceType","DeviceOS","UserAgent","XMSWLHeader"],"Values":["DeviceModel","DeviceType","DeviceOS","UserAgent","XMSWLHeader"]},{"CIMType":"String","Description":"The QueryString parameter specifies the device identifier that's used by the rule. This parameter uses a text value that's used with Characteristic parameter value to define the device.","Name":"QueryString","Option":"Write"},{"CIMType":"String","Description":"Specify if the Active Sync Device Access Rule should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures Active Sync Device Access Rules in Exchange Online."},{"ClassName":"MSFT_EXOActiveSyncMailboxPolicy","Parameters":[{"CIMType":"String","Description":"Specifies the name of the policy.","Name":"Name","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether push notifications are allowed for Apple mobile devices.","Name":"AllowApplePushNotifications","Option":"Write"},{"CIMType":"String","Description":"Specifies whether the Bluetooth capabilities of the mobile phone are allowed.","Name":"AllowBluetooth","Option":"Write","ValueMap":["Disable","HandsfreeOnly","Allow"],"Values":["Disable","HandsfreeOnly","Allow"]},{"CIMType":"Boolean","Description":"Specifies whether Microsoft Pocket Internet Explorer is allowed on the mobile phone.","Name":"AllowBrowser","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether the mobile phone's camera is allowed.","Name":"AllowCamera","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether the mobile phone user can configure a personal email account on the device.","Name":"AllowConsumerEmail","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether the mobile phone can synchronize with a desktop computer through a cable.","Name":"AllowDesktopSync","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether an external device management program is allowed to manage the device.","Name":"AllowExternalDeviceManagement","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether HTML email is enabled on the device.","Name":"AllowHTMLEmail","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether the mobile phone can be used as a modem to connect a computer to the Internet.","Name":"AllowInternetSharing","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether infrared connections are allowed to the mobile phone.","Name":"AllowIrDA","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether certain updates are seen by devices that implemented support for this restricting functionality.","Name":"AllowMobileOTAUpdate","Option":"Write"},{"CIMType":"Boolean","Description":"Enables all devices to synchronize with the computer running Exchange, regardless of whether the device can enforce all the specific settings established in the Mobile Device mailbox policy.","Name":"AllowNonProvisionableDevices","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether the user can configure a POP3 or IMAP4 email account on the device.","Name":"AllowPOPIMAPEmail","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether the mobile phone can initiate a remote desktop connection.","Name":"AllowRemoteDesktop","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether a simple device password is allowed.","Name":"AllowSimpleDevicePassword","Option":"Write"},{"CIMType":"String","Description":"Specifies whether the messaging application on the device can negotiate the encryption algorithm in case a recipient's certificate doesn't support the specified encryption algorithm.","Name":"AllowSMIMEEncryptionAlgorithmNegotiation","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether S/MIME software certificates are allowed.","Name":"AllowSMIMESoftCerts","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether the device can access information stored on a storage card.","Name":"AllowStorageCard","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether text messaging is allowed from the device.","Name":"AllowTextMessaging","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether unsigned applications can be installed on the device.","Name":"AllowUnsignedApplications","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether unsigned installation packages can be run on the device.","Name":"AllowUnsignedInstallationPackages","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether wireless Internet access is allowed on the device.","Name":"AllowWiFi","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether the device password must be alphanumeric.","Name":"AlphanumericDevicePasswordRequired","Option":"Write"},{"CIMType":"String[]","Description":"Specifies a list of approved applications for the device.","Name":"ApprovedApplicationList","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether the user can download attachments.","Name":"AttachmentsEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"Enables device encryption on the mobile phone.","Name":"DeviceEncryptionEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies that the user set a password for the device.","Name":"DevicePasswordEnabled","Option":"Write"},{"CIMType":"String","Description":"Specifies the length of time, in days, that a password can be used.","Name":"DevicePasswordExpiration","Option":"Write"},{"CIMType":"Sint32","Description":"Specifies the number of previously used passwords to store.","Name":"DevicePasswordHistory","Option":"Write"},{"CIMType":"String","Description":"Specifies how often the policy is sent from the server to the mobile phone","Name":"DevicePolicyRefreshInterval","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether Information Rights Management (IRM) is enabled for the mailbox policy.","Name":"IrmEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether this policy is the default Mobile Device mailbox policy.","Name":"IsDefault","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether this policy is the default Mobile Device mailbox policy.","Name":"IsDefaultPolicy","Option":"Write"},{"CIMType":"String","Description":"Specifies the maximum size of attachments that can be downloaded to the mobile phone.","Name":"MaxAttachmentSize","Option":"Write"},{"CIMType":"String","Description":"Specifies the maximum range of calendar days that can be synchronized to the device.","Name":"MaxCalendarAgeFilter","Option":"Write","ValueMap":["All","TwoWeeks","OneMonth","ThreeMonths","SixMonths"],"Values":["All","TwoWeeks","OneMonth","ThreeMonths","SixMonths"]},{"CIMType":"String","Description":"Specifies the number of attempts a user can make to enter the correct password for the device.","Name":"MaxDevicePasswordFailedAttempts","Option":"Write"},{"CIMType":"String","Description":"Specifies the maximum number of days of email items to synchronize to the device.","Name":"MaxEmailAgeFilter","Option":"Write","ValueMap":["All","OneDay","ThreeDays","OneWeek","TwoWeeks","OneMonth","ThreeMonths","SixMonths"],"Values":["All","OneDay","ThreeDays","OneWeek","TwoWeeks","OneMonth","ThreeMonths","SixMonths"]},{"CIMType":"String","Description":"Specifies the maximum size at which email messages are truncated when synchronized to the device.","Name":"MaxEmailBodyTruncationSize","Option":"Write"},{"CIMType":"String","Description":"Specifies the maximum size at which HTML-formatted email messages are synchronized to the device.","Name":"MaxEmailHTMLBodyTruncationSize","Option":"Write"},{"CIMType":"String","Description":"Specifies the length of time that the device can be inactive before the password is required to reactivate the device.","Name":"MaxInactivityTimeDeviceLock","Option":"Write"},{"CIMType":"Sint32","Description":"Specifies the minimum number of complex characters required in a device password.","Name":"MinDevicePasswordComplexCharacters","Option":"Write"},{"CIMType":"Sint32","Description":"Specifies the minimum number of characters in the device password.","Name":"MinDevicePasswordLength","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether you can store the recovery password for the device on an Exchange server.","Name":"PasswordRecoveryEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether encryption is required on the device.","Name":"RequireDeviceEncryption","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether you must encrypt S/MIME messages.","Name":"RequireEncryptedSMIMEMessages","Option":"Write"},{"CIMType":"String","Description":"Specifies what required algorithm must be used when encrypting a message.","Name":"RequireEncryptionSMIMEAlgorithm","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether the device must synchronize manually while roaming.","Name":"RequireManualSyncWhenRoaming","Option":"Write"},{"CIMType":"String","Description":"Specifies what required algorithm must be used when signing a message.","Name":"RequireSignedSMIMEAlgorithm","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether the device must send signed S/MIME messages.","Name":"RequireSignedSMIMEMessages","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether encryption of a storage card is required.","Name":"RequireStorageCardEncryption","Option":"Write"},{"CIMType":"String[]","Description":"Specifies a list of applications that can't be run in ROM.","Name":"UnapprovedInROMApplicationList","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether access to Microsoft Windows file shares is enabled.","Name":"UNCAccessEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether access to Microsoft Windows SharePoint Services is enabled.","Name":"WSSAccessEnabled","Option":"Write"},{"CIMType":"String","Description":"Specifies the Mobile Device mailbox policy.","Name":"Identity","Option":"Key"},{"CIMType":"String","Description":"Specifies if this AddressList should exist.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource manages Mobile Device mailbox policy for mailboxes accessed by mobile devices."},{"ClassName":"MSFT_EXOAddressBookPolicy","Parameters":[{"CIMType":"String","Description":"The Name parameter specifies the name that you want this address book policy to be called.","Name":"Name","Option":"Key"},{"CIMType":"String[]","Description":"The AddressLists parameter specifies the address lists that will be used by mailbox users who are assigned this address book policy. This parameter accepts multiple values.","Name":"AddressLists","Option":"Write"},{"CIMType":"String","Description":"The GlobalAddressList parameter specifies the identity of the global address list (GAL) that will be used by mailbox users who are assigned this address book policy. You can specify only one GAL for each address book policy.","Name":"GlobalAddressList","Option":"Write"},{"CIMType":"String","Description":"The OfflineAddressBook parameter specifies the identity of the offline address book (OAB) that will be used by mailbox users who are assigned this address book policy. You can specify only one OAB for each address book policy.","Name":"OfflineAddressBook","Option":"Write"},{"CIMType":"String","Description":"The RoomList parameter specifies the name of the room address list.","Name":"RoomList","Option":"Write"},{"CIMType":"String","Description":"Specify if the Address Book Policy should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures Address Book Policies in Exchange Online."},{"ClassName":"MSFT_EXOAddressList","Parameters":[{"CIMType":"String","Description":"The Name parameter specifies a unique name for the address list.","Name":"Name","Option":"Key"},{"CIMType":"String[]","Description":"The ConditionalCompany parameter specifies a precanned filter that's based on the value of the recipient's Company property.","Name":"ConditionalCompany","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute1 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute1 property.","Name":"ConditionalCustomAttribute1","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute10 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute10 property.","Name":"ConditionalCustomAttribute10","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute11 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute11 property.","Name":"ConditionalCustomAttribute11","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute12 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute12 property.","Name":"ConditionalCustomAttribute12","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute13 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute13 property.","Name":"ConditionalCustomAttribute13","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute14 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute14 property.","Name":"ConditionalCustomAttribute14","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute15 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute15 property.","Name":"ConditionalCustomAttribute15","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute2 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute2 property.","Name":"ConditionalCustomAttribute2","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute3 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute3 property.","Name":"ConditionalCustomAttribute3","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute4 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute4 property.","Name":"ConditionalCustomAttribute4","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute5 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute5 property.","Name":"ConditionalCustomAttribute5","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute6 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute6 property.","Name":"ConditionalCustomAttribute6","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute7 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute7 property.","Name":"ConditionalCustomAttribute7","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute8 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute8 property.","Name":"ConditionalCustomAttribute8","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute9 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute9 property.","Name":"ConditionalCustomAttribute9","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalDepartment parameter specifies a precanned filter that's based on the value of the recipient's Department property.","Name":"ConditionalDepartment","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalStateOrProvince parameter specifies a precanned filter that's based on the value of the recipient's StateOrProvince property.","Name":"ConditionalStateOrProvince","Option":"Write"},{"CIMType":"String","Description":"The DisplayName parameter specifies the display name of the address list.","Name":"DisplayName","Option":"Write"},{"CIMType":"String[]","Description":"The IncludedRecipients parameter specifies a precanned filter that's based on the recipient type.","Name":"IncludedRecipients","Option":"Write","ValueMap":["AllRecipients","MailboxUsers","MailContacts","MailGroups","MailUsers","Resources"],"Values":["AllRecipients","MailboxUsers","MailContacts","MailGroups","MailUsers","Resources"]},{"CIMType":"String","Description":"The RecipientFilter parameter specifies a custom OPath filter that's based on the value of any available recipient property.","Name":"RecipientFilter","Option":"Write"},{"CIMType":"String","Description":"Specifies if this AddressList should exist.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures Exchange Online address lists."},{"ClassName":"MSFT_EXOAntiPhishPolicy","Parameters":[{"CIMType":"String","Description":"The Identity parameter specifies the name of the antiphishing policy that you want to modify.","Name":"Identity","Option":"Key"},{"CIMType":"String","Description":"Specify if this policy should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"String","Description":"The AdminDisplayName parameter specifies a description for the policy.","Name":"AdminDisplayName","Option":"Write"},{"CIMType":"UInt32","Description":"The PhishThresholdLevel parameter specifies the tolerance level that's used by machine learning in the handling of phishing messages.","Name":"PhishThresholdLevel","Option":"Write","ValueMap":[1,2,3,4],"Values":[1,2,3,4]},{"CIMType":"String","Description":"The AuthenticationFailAction parameter specifies the action to take when the message fails composite authentication.","Name":"AuthenticationFailAction","Option":"Write","ValueMap":["MoveToJmf","Quarantine"],"Values":["MoveToJmf","Quarantine"]},{"CIMType":"String","Description":"The TargetedUserProtectionAction parameter specifies the action to take on detected user impersonation messages for the users specified by the TargetedUsersToProtect parameter.","Name":"TargetedUserProtectionAction","Option":"Write","ValueMap":["BccMessage","Delete","MoveToJmf","NoAction","Quarantine","Redirect"],"Values":["BccMessage","Delete","MoveToJmf","NoAction","Quarantine","Redirect"]},{"CIMType":"Boolean","Description":"Specify if this policy should be enabled. Default is $true.","Name":"Enabled","Option":"Write"},{"CIMType":"Boolean","Description":"The EnableFirstContactSafetyTips parameter specifies whether to enable or disable the safety tip that's shown when recipients first receive an email from a sender or do not often receive email from a sender.","Name":"EnableFirstContactSafetyTips","Option":"Write"},{"CIMType":"Boolean","Description":"The EnableMailboxIntelligence parameter specifies whether to enable or disable mailbox intelligence (the first contact graph) in domain and user impersonation protection.","Name":"EnableMailboxIntelligence","Option":"Write"},{"CIMType":"Boolean","Description":"The EnableMailboxIntelligenceProtection specifies whether to enable or disable enhanced impersonation results based on each user's individual sender map. This intelligence allows Microsoft 365 to customize user impersonation detection and better handle false positives.","Name":"EnableMailboxIntelligenceProtection","Option":"Write"},{"CIMType":"Boolean","Description":"The EnableOrganizationDomainsProtection parameter specifies whether to enable domain impersonation protection for all registered domains in the Office 365 organization.","Name":"EnableOrganizationDomainsProtection","Option":"Write"},{"CIMType":"Boolean","Description":"The EnableSimilarDomainsSafetyTips parameter specifies whether to enable safety tips that are shown to recipients in messages for domain impersonation detections.","Name":"EnableSimilarDomainsSafetyTips","Option":"Write"},{"CIMType":"Boolean","Description":"The EnableSimilarUsersSafetyTips parameter specifies whether to enable safety tips that are shown to recipients in messages for user impersonation detections.","Name":"EnableSimilarUsersSafetyTips","Option":"Write"},{"CIMType":"Boolean","Description":"The EnableSpoofIntelligence parameter specifies whether to enable or disable antispoofing protection for the policy.","Name":"EnableSpoofIntelligence","Option":"Write"},{"CIMType":"Boolean","Description":"The EnableTargetedDomainsProtection parameter specifies whether to enable domain impersonation protection for a list of specified domains.","Name":"EnableTargetedDomainsProtection","Option":"Write"},{"CIMType":"Boolean","Description":"The EnableTargetedUserProtection parameter specifies whether to enable user impersonation protection for the users specified by the TargetedUsersToProtect parameter","Name":"EnableTargetedUserProtection","Option":"Write"},{"CIMType":"Boolean","Description":"The EnableUnauthenticatedSender parameter enables or disables unauthenticated sender identification in Outlook.","Name":"EnableUnauthenticatedSender","Option":"Write"},{"CIMType":"Boolean","Description":"The EnableUnusualCharactersSafetyTips parameter specifies whether to enable safety tips that are shown to recipients in messages for unusual characters in domain and user impersonation detections.","Name":"EnableUnusualCharactersSafetyTips","Option":"Write"},{"CIMType":"Boolean","Description":"This setting is part of spoof protection. The EnableViaTag parameter enables or disables adding the via tag to the From address in Outlook.","Name":"EnableViaTag","Option":"Write"},{"CIMType":"Boolean","Description":"Make this the default antiphishing policy","Name":"MakeDefault","Option":"Write"},{"CIMType":"String[]","Description":"The ExcludedDomains parameter specifies trusted domains that are excluded from scanning by antiphishing protection. You can specify multiple domains separated by commas.","Name":"ExcludedDomains","Option":"Write"},{"CIMType":"String[]","Description":"The ExcludedSenders parameter specifies a list of trusted sender email addresses that are excluded from scanning by antiphishing protection. You can specify multiple email addresses separated by commas.","Name":"ExcludedSenders","Option":"Write"},{"CIMType":"Boolean","Description":"The HonorDmarcPolicy enables or disables using the sender's DMARC policy to determine what to do to messages that fail DMARC checks.","Name":"HonorDmarcPolicy","Option":"Write"},{"CIMType":"String","Description":"The ImpersonationProtectionState parameter specifies the configuration of impersonation protection.","Name":"ImpersonationProtectionState","Option":"Write"},{"CIMType":"String","Description":"The MailboxIntelligenceProtectionAction parameter specifies what to do with messages that fail mailbox intelligence protection.","Name":"MailboxIntelligenceProtectionAction","Option":"Write"},{"CIMType":"String[]","Description":"The MailboxIntelligenceProtectionActionRecipients parameter specifies the recipients to add to detected messages when the MailboxIntelligenceProtectionAction parameter is set to the value Redirect or BccMessage.","Name":"MailboxIntelligenceProtectionActionRecipients","Option":"Write"},{"CIMType":"String","Description":"The MailboxIntelligenceQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by mailbox intelligence.","Name":"MailboxIntelligenceQuarantineTag","Option":"Write"},{"CIMType":"String","Description":"The SpoofQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by spoof intelligence.","Name":"SpoofQuarantineTag","Option":"Write"},{"CIMType":"String[]","Description":"The TargetedDomainActionRecipients parameter specifies the recipients to add to detected domain impersonation messages when the TargetedDomainProtectionAction parameter is set to the value Redirect or BccMessage. A valid value for this parameter is an email address. You can specify multiple email addresses separated by commas.","Name":"TargetedDomainActionRecipients","Option":"Write"},{"CIMType":"String","Description":"The TargetedDomainProtectionAction parameter specifies the action to take on detected domain impersonation messages.","Name":"TargetedDomainProtectionAction","Option":"Write","ValueMap":["BccMessage","Delete","MoveToJmf","NoAction","Quarantine","Redirect"],"Values":["BccMessage","Delete","MoveToJmf","NoAction","Quarantine","Redirect"]},{"CIMType":"String[]","Description":"The TargetedDomainsToProtect parameter specifies the domains that are included in domain impersonation protection when the EnableTargetedDomainsProtection parameter is set to $true.","Name":"TargetedDomainsToProtect","Option":"Write"},{"CIMType":"String","Description":"The TargetedDomainQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by domain impersonation protection.","Name":"TargetedDomainQuarantineTag","Option":"Write"},{"CIMType":"String[]","Description":"The TargetedUserActionRecipients parameter specifies the replacement or additional recipients for detected user impersonation messages when the TargetedUserProtectionAction parameter is set to the value Redirect or BccMessage. A valid value for this parameter is an email address. You can specify multiple email addresses separated by commas.","Name":"TargetedUserActionRecipients","Option":"Write"},{"CIMType":"String[]","Description":"The TargetedUsersToProtect parameter specifies the users that are included in user impersonation protection when the EnableTargetedUserProtection parameter is set to $true.","Name":"TargetedUsersToProtect","Option":"Write"},{"CIMType":"String","Description":"The TargetedUserQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by user impersonation protection.","Name":"TargetedUserQuarantineTag","Option":"Write"},{"CIMType":"String","Description":"The DmarcQuarantineAction parameter specifies the action to take when a message fails DMARC checks and the sender's DMARC policy is p=quarantine","Name":"DmarcQuarantineAction","Option":"Write","ValueMap":["MoveToJmf","Quarantine"],"Values":["MoveToJmf","Quarantine"]},{"CIMType":"String","Description":"The DmarcRejectAction parameter specifies the action to take when a message fails DMARC checks and the sender's DMARC policy is p=reject.","Name":"DmarcRejectAction","Option":"Write","ValueMap":["Quarantine","Reject"],"Values":["Quarantine","Reject"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures an Anti-Phish Policy in Exchange Online."},{"ClassName":"MSFT_EXOAntiPhishRule","Parameters":[{"CIMType":"String","Description":"The Identity parameter specifies the name of the antiphishing rule that you want to modify.","Name":"Identity","Option":"Key"},{"CIMType":"String","Description":"Specify if this rule should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"String","Description":"The AntiPhishPolicy parameter specifies the name of the antiphishing policy that's associated with the antiphishing rule.","Name":"AntiPhishPolicy","Option":"Required"},{"CIMType":"Boolean","Description":"Specify if this rule should be enabled. Default is $true.","Name":"Enabled","Option":"Write"},{"CIMType":"uint32","Description":"The Priority parameter specifies a priority value for the rule that determines the order of rule processing. A lower integer value indicates a higher priority, the value 0 is the highest priority, and rules can't have the same priority value.","Name":"Priority","Option":"Write"},{"CIMType":"String","Description":"The Comments parameter specifies informative comments for the rule, such as what the rule is used for or how it has changed over time. The length of the comment can't exceed 1024 characters.","Name":"Comments","Option":"Write"},{"CIMType":"String[]","Description":"The ExceptIfRecipientDomainIs parameter specifies an exception that looks for recipients with email address in the specified domains. You can specify multiple domains separated by commas.","Name":"ExceptIfRecipientDomainIs","Option":"Write"},{"CIMType":"String[]","Description":"The ExceptIfSentTo parameter specifies an exception that looks for recipients in messages. You can use any value that uniquely identifies the recipient.","Name":"ExceptIfSentTo","Option":"Write"},{"CIMType":"String[]","Description":"The ExceptIfSentToMemberOf parameter specifies an exception that looks for messages sent to members of groups. You can use any value that uniquely identifies the group.","Name":"ExceptIfSentToMemberOf","Option":"Write"},{"CIMType":"String[]","Description":"The RecipientDomainIs parameter specifies a condition that looks for recipients with email address in the specified domains. You can specify multiple domains separated by commas.","Name":"RecipientDomainIs","Option":"Write"},{"CIMType":"String[]","Description":"The SentTo parameter specifies a condition that looks for recipients in messages. You can use any value that uniquely identifies the recipient.","Name":"SentTo","Option":"Write"},{"CIMType":"String[]","Description":"The SentToMemberOf parameter looks for messages sent to members of groups. You can use any value that uniquely identifies the group.","Name":"SentToMemberOf","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures an Anti-Phish Rule in Exchange Online."},{"ClassName":"MSFT_EXOApplicationAccessPolicy","Parameters":[{"CIMType":"String","Description":"The Identity parameter specifies the application access policy that you want to modify.","Name":"Identity","Option":"Key"},{"CIMType":"String","Description":"The AccessRight parameter specifies the permission that you want to assign in the application access policy.","Name":"AccessRight","Option":"Write","ValueMap":["RestrictAccess","DenyAccess"],"Values":["RestrictAccess","DenyAccess"]},{"CIMType":"String[]","Description":"The AppID parameter specifies the GUID of the apps to include in the policy.","Name":"AppID","Option":"Write"},{"CIMType":"String","Description":"The PolicyScopeGroupID parameter specifies the recipient to define in the policy. You can use any value that uniquely identifies the recipient.","Name":"PolicyScopeGroupId","Option":"Write"},{"CIMType":"String","Description":"The Description parameter specifies a description for the policy.","Name":"Description","Option":"Write"},{"CIMType":"String","Description":"Specify if the Application Access Policy should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures Applications Access Policies in Exchange Online."},{"ClassName":"MSFT_EXOArcConfig","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"String[]","Description":"The domain names of the ARC sealers.","Name":"ArcTrustedSealers","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource manages the list of trusted Authenticated Received Chain (ARC) sealers that are configured in the organization."},{"ClassName":"MSFT_EXOATPBuiltInProtectionRule","Parameters":[{"CIMType":"String","Description":"The Identity parameter specifies the rule that you want to modify. You can use any value that uniquely identifies the rule. ","Name":"Identity","Option":"Key"},{"CIMType":"String","Description":"The Comments parameter specifies informative comments for the rule, such as what the rule is used for or how it has changed over time. The length of the comment can't exceed 1024 characters.","Name":"Comments","Option":"Write"},{"CIMType":"String[]","Description":"The ExceptIfRecipientDomainIs parameter specifies an exception that looks for recipients with email addresses in the specified domains. You can specify multiple domains separated by commas.","Name":"ExceptIfRecipientDomainIs","Option":"Write"},{"CIMType":"String[]","Description":"The ExceptIfSentTo parameter specifies an exception that looks for recipients in messages. You can use any value that uniquely identifies the recipient.","Name":"ExceptIfSentTo","Option":"Write"},{"CIMType":"String[]","Description":"The ExceptIfSentToMemberOf parameter specifies an exception that looks for messages sent to members of groups. You can use any value that uniquely identifies the group.","Name":"ExceptIfSentToMemberOf","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Configures Defender ATP built-in protection rules."},{"ClassName":"MSFT_EXOAtpPolicyForO365","Parameters":[{"CIMType":"String","Description":"Specifies the resource is a single instance, the value must be 'Yes'","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"String","Description":"The Identity parameter specifies the ATP policy that you want to modify. There's only one policy named Default.","Name":"Identity","Option":"Write"},{"CIMType":"Boolean","Description":"The AllowSafeDocsOpen parameter specifies whether users can click through and bypass the Protected View container even when Safe Documents identifies a file as malicious.","Name":"AllowSafeDocsOpen","Option":"Write"},{"CIMType":"Boolean","Description":"The EnableATPForSPOTeamsODB parameter specifies whether ATP is enabled for SharePoint Online, OneDrive for Business and Microsoft Teams. Default is $false.","Name":"EnableATPForSPOTeamsODB","Option":"Write"},{"CIMType":"Boolean","Description":"The EnableSafeDocs parameter specifies whether to enable the Safe Documents feature in the organization. Default is $false.","Name":"EnableSafeDocs","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures the Advanced Threat Protection (ATP) policy in Office 365. Tenant must be subscribed to ATP."},{"ClassName":"MSFT_EXOAtpProtectionPolicyRule","Parameters":[{"CIMType":"String","Description":"Identifier for the rule","Name":"Identity","Option":"Key"},{"CIMType":"Boolean","Description":"Specifies whether the rule is enabled","Name":"Enabled","Option":"Write"},{"CIMType":"String","Description":"Informative comments for the rule, such as what the rule is used for or how it has changed over time. The length of the comment can't exceed 1024 characters.","Name":"Comments","Option":"Write"},{"CIMType":"String[]","Description":"Specifies an exception that looks for recipients with email addresses in the specified domains.","Name":"ExceptIfRecipientDomainIs","Option":"Write"},{"CIMType":"String[]","Description":"Specifies an exception that looks for recipients in messages. You can use any value that uniquely identifies the recipient","Name":"ExceptIfSentTo","Option":"Write"},{"CIMType":"String[]","Description":"Specifies an exception that looks for messages sent to members of groups. You can use any value that uniquely identifies the group.","Name":"ExceptIfSentToMemberOf","Option":"Write"},{"CIMType":"String","Description":"Unique name for the rule. The maximum length is 64 characters.","Name":"Name","Option":"Write"},{"CIMType":"UInt32","Description":"Specifies a priority value for the rule that determines the order of rule processing. A lower integer value indicates a higher priority, the value 0 is the highest priority, and rules can't have the same priority value.","Name":"Priority","Option":"Write"},{"CIMType":"String[]","Description":"Specifies a condition that looks for recipients with email addresses in the specified domains.","Name":"RecipientDomainIs","Option":"Write"},{"CIMType":"String","Description":"Specifies the existing Safe Attachments policy that's associated with the preset security policy.","Name":"SafeAttachmentPolicy","Option":"Write"},{"CIMType":"String","Description":"Specifies the existing Safe Links policy that's associated with the preset security policy.","Name":"SafeLinksPolicy","Option":"Write"},{"CIMType":"String[]","Description":"Specifies a condition that looks for recipients in messages. You can use any value that uniquely identifies the recipient.","Name":"SentTo","Option":"Write"},{"CIMType":"String[]","Description":"Specifies a condition that looks for messages sent to members of distribution groups, dynamic distribution groups, or mail-enabled security groups. ","Name":"SentToMemberOf","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Manage ATP Protection policy rules that are associated with Microsoft Defender for Office 365 protections in preset security policies."},{"ClassName":"MSFT_EXOAuthenticationPolicy","Parameters":[{"CIMType":"String","Description":"The Identity parameter specifies the authentication policy you want to view or modify.","Name":"Identity","Option":"Key"},{"CIMType":"Boolean","Description":"The AllowBasicAuthActiveSync switch specifies whether to allow Basic authentication with Exchange Active Sync.","Name":"AllowBasicAuthActiveSync","Option":"write"},{"CIMType":"Boolean","Description":"The AllowBasicAuthAutodiscover switch specifies whether to allow Basic authentication with Autodiscover.","Name":"AllowBasicAuthAutodiscover","Option":"write"},{"CIMType":"Boolean","Description":"The AllowBasicAuthImap switch specifies whether to allow Basic authentication with IMAP.","Name":"AllowBasicAuthImap","Option":"write"},{"CIMType":"Boolean","Description":"The AllowBasicAuthMapi switch specifies whether to allow Basic authentication with MAPI.","Name":"AllowBasicAuthMapi","Option":"write"},{"CIMType":"Boolean","Description":"The AllowBasicAuthOfflineAddressBook switch specifies whether to allow Basic authentication with Offline Address Books.","Name":"AllowBasicAuthOfflineAddressBook","Option":"write"},{"CIMType":"Boolean","Description":"The AllowBasicAuthOutlookService switch specifies whether to allow Basic authentication with the Outlook service.","Name":"AllowBasicAuthOutlookService","Option":"write"},{"CIMType":"Boolean","Description":"The AllowBasicAuthPop switch specifies whether to allow Basic authentication with POP.","Name":"AllowBasicAuthPop","Option":"write"},{"CIMType":"Boolean","Description":"The AllowBasicAuthPowerShell switch specifies whether to allow Basic authentication with PowerShell.","Name":"AllowBasicAuthPowershell","Option":"write"},{"CIMType":"Boolean","Description":"The AllowBasicAuthReporting Web Services switch specifies whether to allow Basic authentication with reporting web services.","Name":"AllowBasicAuthReportingWebServices","Option":"write"},{"CIMType":"Boolean","Description":"The AllowBasicAuthRpc switch specifies whether to allow Basic authentication with RPC.","Name":"AllowBasicAuthRpc","Option":"write"},{"CIMType":"Boolean","Description":"The AllowBasicAuthSmtp switch specifies whether to allow Basic authentication with SMTP.","Name":"AllowBasicAuthSmtp","Option":"write"},{"CIMType":"Boolean","Description":"The AllowBasicAuthWebServices switch specifies whether to allow Basic authentication with Exchange Web Services (EWS).","Name":"AllowBasicAuthWebServices","Option":"write"},{"CIMType":"String","Description":"Specify if the authentication Policy should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures Authentication Policies in Exchange Online."},{"ClassName":"MSFT_EXOAuthenticationPolicyAssignment","Parameters":[{"CIMType":"String","Description":"Name of the user assigned to the authentication policy.","Name":"UserName","Option":"Key"},{"CIMType":"String","Description":"Name of the authentication policy.","Name":"AuthenticationPolicyName","Option":"write"},{"CIMType":"String","Description":"Specify if the authentication Policy should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource assigns Exchange Online Authentication Policies to users."},{"ClassName":"MSFT_EXOAvailabilityAddressSpace","Parameters":[{"CIMType":"String","Description":"The Identity parameter specifies the AvailabilityAddressSpace you want to modify.","Name":"Identity","Option":"Key"},{"CIMType":"String","Description":"The AccessMethod parameter specifies how the free/busy data is accessed. Valid values are:PerUserFB, OrgWideFB, OrgWideFBToken, OrgWideFBBasic,InternalProxy","Name":"AccessMethod","Option":"Write","ValueMap":["PerUserFB","OrgWideFB","OrgWideFBToken","OrgWideFBBasic","InternalProxy"],"Values":["PerUserFB","OrgWideFB","OrgWideFBToken","OrgWideFBBasic","InternalProxy"]},{"CIMType":"String","Description":"The Credentials parameter specifies the username and password that's used to access the Availability services in the target forest.","Name":"Credentials","Option":"Write"},{"CIMType":"String","Description":"The ForestName parameter specifies the SMTP domain name of the target forest for users whose free/busy data must be retrieved. If your users are distributed among multiple SMTP domains in the target forest, run the Add-AvailabilityAddressSpace command once for each SMTP domain.","Name":"ForestName","Option":"Write"},{"CIMType":"String","Description":"The TargetAutodiscoverEpr parameter specifies the Autodiscover URL of Exchange Web Services for the external organization. Exchange uses Autodiscover to automatically detect the correct server endpoint for external requests.","Name":"TargetAutodiscoverEpr","Option":"Write"},{"CIMType":"String","Description":"The TargetServiceEpr parameter specifies the Exchange Online Calendar Service URL of the external Microsoft 365 organization that you're trying to read free/busy information from.","Name":"TargetServiceEpr","Option":"Write"},{"CIMType":"String","Description":"The TargetTenantID parameter specifies the tenant ID of the external Microsoft 365 organization that you're trying to read free/busy information from.","Name":"TargetTenantId","Option":"Write"},{"CIMType":"String","Description":"Specifies if this AvailabilityAddressSpace should exist.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Create a new AvailabilityAddressSpace in your cloud-based organization."},{"ClassName":"MSFT_EXOAvailabilityConfig","Parameters":[{"CIMType":"String","Description":"Specify the OrgWideAccount for the AvailabilityConfig.","Name":"OrgWideAccount","Option":"Key"},{"CIMType":"String","Description":"Specify if the AvailabilityConfig should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures the Availability Config in Exchange Online."},{"ClassName":"MSFT_EXOCalendarProcessing","Parameters":[{"CIMType":"String","Description":"The Identity parameter specifies the resource mailbox that you want to view. You can use any value that uniquely identifies the mailbox.","Name":"Identity","Option":"Key"},{"CIMType":"Boolean","Description":"The AddAdditionalResponse parameter specifies whether additional information (the value of the AdditionalResponse parameter) is added to meeting request responses","Name":"AddAdditionalResponse","Option":"Write"},{"CIMType":"String","Description":"The AdditionalResponse parameter specifies the additional information to be included in responses to meeting requests when the value of the AddAdditionalResponse parameter is $true. If the value contains spaces, enclose the value in quotation marks.","Name":"AdditionalResponse","Option":"Write"},{"CIMType":"Boolean","Description":"The AddNewRequestsTentatively parameter specifies whether new meeting requests are added to the calendar as tentative","Name":"AddNewRequestsTentatively","Option":"Write"},{"CIMType":"Boolean","Description":"The AddOrganizerToSubject parameter specifies whether the meeting organizer's name is used as the subject of the meeting request.","Name":"AddOrganizerToSubject","Option":"Write"},{"CIMType":"Boolean","Description":"The AllBookInPolicy parameter specifies whether to automatically approve in-policy requests from all users to the resource mailbox.","Name":"AllBookInPolicy","Option":"Write"},{"CIMType":"Boolean","Description":"The AllowConflicts parameter specifies whether to allow conflicting meeting requests.","Name":"AllowConflicts","Option":"Write"},{"CIMType":"Boolean","Description":"The AllowRecurringMeetings parameter specifies whether to allow recurring meetings in meeting requests.","Name":"AllowRecurringMeetings","Option":"Write"},{"CIMType":"Boolean","Description":"The AllRequestInPolicy parameter specifies whether to allow all users to submit in-policy requests to the resource mailbox.","Name":"AllRequestInPolicy","Option":"Write"},{"CIMType":"Boolean","Description":"The AllRequestOutOfPolicy parameter specifies whether to allow all users to submit out-of-policy requests to the resource mailbox.","Name":"AllRequestOutOfPolicy","Option":"Write"},{"CIMType":"String","Description":"The AutomateProcessing parameter enables or disables calendar processing on the mailbox.","Name":"AutomateProcessing","Option":"Write","ValueMap":["None","AutoUpdate","AutoAccept"],"Values":["None","AutoUpdate","AutoAccept"]},{"CIMType":"String","Description":"The BookingType parameter specifies how reservations work on the resource mailbox.","Name":"BookingType","Option":"Write","ValueMap":["Standard","Reserved"],"Values":["Standard","Reserved"]},{"CIMType":"UInt32","Description":"The BookingWindowInDays parameter specifies the maximum number of days in advance that the resource can be reserved. A valid value is an integer from 0 through 1080. The default value is 180 days. The value 0 means today.","Name":"BookingWindowInDays","Option":"Write"},{"CIMType":"String[]","Description":"The BookInPolicy parameter specifies users or groups who are allowed to submit in-policy meeting requests to the resource mailbox that are automatically approved. You can use any value that uniquely identifies the user or group.","Name":"BookInPolicy","Option":"Write"},{"CIMType":"UInt32","Description":"The ConflictPercentageAllowed parameter specifies the maximum percentage of meeting conflicts for new recurring meeting requests. A valid value is an integer from 0 through 100. The default value is 0.","Name":"ConflictPercentageAllowed","Option":"Write"},{"CIMType":"Boolean","Description":"The DeleteAttachments parameter specifies whether to remove attachments from all incoming messages.","Name":"DeleteAttachments","Option":"Write"},{"CIMType":"Boolean","Description":"The DeleteComments parameter specifies whether to remove or keep any text in the message body of incoming meeting requests.","Name":"DeleteComments","Option":"Write"},{"CIMType":"Boolean","Description":"The DeleteNonCalendarItems parameter specifies whether to remove or keep all non-calendar-related messages that are received by the resource mailbox.","Name":"DeleteNonCalendarItems","Option":"Write"},{"CIMType":"Boolean","Description":"The DeleteSubject parameter specifies whether to remove or keep the subject of incoming meeting requests. ","Name":"DeleteSubject","Option":"Write"},{"CIMType":"Boolean","Description":"N/A","Name":"EnableAutoRelease","Option":"Write"},{"CIMType":"Boolean","Description":"The EnableResponseDetails parameter specifies whether to include the reasons for accepting or declining a meeting in the response email message.","Name":"EnableResponseDetails","Option":"Write"},{"CIMType":"Boolean","Description":"The EnforceCapacity parameter specifies whether to restrict the number of attendees to the capacity of the workspace. For example, if capacity is set to 10, then only 10 people can book the workspace.","Name":"EnforceCapacity","Option":"Write"},{"CIMType":"Boolean","Description":"The EnforceSchedulingHorizon parameter controls the behavior of recurring meetings that extend beyond the date specified by the BookingWindowInDays parameter.","Name":"EnforceSchedulingHorizon","Option":"Write"},{"CIMType":"Boolean","Description":"The ForwardRequestsToDelegates parameter specifies whether to forward incoming meeting requests to the delegates that are configured for the resource mailbox.","Name":"ForwardRequestsToDelegates","Option":"Write"},{"CIMType":"UInt32","Description":"The MaximumConflictInstances parameter specifies the maximum number of conflicts for new recurring meeting requests when the AllowRecurringMeetings parameter is set to $true. A valid value is an integer from 0 through INT32 (2147483647). The default value is 0.","Name":"MaximumConflictInstances","Option":"Write"},{"CIMType":"UInt32","Description":"The MaximumDurationInMinutes parameter specifies the maximum duration in minutes for meeting requests. A valid value is an integer from 0 through INT32 (2147483647). The default value is 1440 (24 hours).","Name":"MaximumDurationInMinutes","Option":"Write"},{"CIMType":"UInt32","Description":"The MinimumDurationInMinutes parameter specifies the minimum duration in minutes for meeting requests in workspace mailboxes. A valid value is an integer from 0 through INT32 (2147483647). The default value is 0, which means there is no minimum duration.","Name":"MinimumDurationInMinutes","Option":"Write"},{"CIMType":"Boolean","Description":"The OrganizerInfo parameter specifies whether the resource mailbox sends organizer information when a meeting request is declined because of conflicts.","Name":"OrganizerInfo","Option":"Write"},{"CIMType":"UInt32","Description":"N/A","Name":"PostReservationMaxClaimTimeInMinutes","Option":"Write"},{"CIMType":"Boolean","Description":"The ProcessExternalMeetingMessages parameter specifies whether to process meeting requests that originate outside the Exchange organization.","Name":"ProcessExternalMeetingMessages","Option":"Write"},{"CIMType":"Boolean","Description":"The RemoveCanceledMeetings parameter specifies whether to automatically delete meetings that were cancelled by the organizer from the resource mailbox's calendar. ","Name":"RemoveCanceledMeetings","Option":"Write"},{"CIMType":"Boolean","Description":"The RemoveForwardedMeetingNotifications parameter specifies whether forwarded meeting notifications are moved to the Deleted Items folder after they're processed by the Calendar Attendant. ","Name":"RemoveForwardedMeetingNotifications","Option":"Write"},{"CIMType":"Boolean","Description":"The RemoveOldMeetingMessages parameter specifies whether the Calendar Attendant removes old and redundant updates and responses.","Name":"RemoveOldMeetingMessages","Option":"Write"},{"CIMType":"Boolean","Description":"The RemovePrivateProperty parameter specifies whether to clear the private flag for incoming meetings that were sent by the organizer in the original requests. ","Name":"RemovePrivateProperty","Option":"Write"},{"CIMType":"String[]","Description":"The RemovePrivateProperty parameter specifies whether to clear the private flag for incoming meetings that were sent by the organizer in the original requests. ","Name":"RequestInPolicy","Option":"Write"},{"CIMType":"String[]","Description":"The RequestOutOfPolicy parameter specifies users who are allowed to submit out-of-policy requests that require approval by a resource mailbox delegate. You can use any value that uniquely identifies the user. ","Name":"RequestOutOfPolicy","Option":"Write"},{"CIMType":"String[]","Description":"The ResourceDelegates parameter specifies users can approve or reject requests that are sent to the resource mailbox. You can use any value that uniquely identifies the user. ","Name":"ResourceDelegates","Option":"Write"},{"CIMType":"Boolean","Description":"The ScheduleOnlyDuringWorkHours parameter specifies whether to allow meetings to be scheduled outside of the working hours that are defined for the resource mailbox.","Name":"ScheduleOnlyDuringWorkHours","Option":"Write"},{"CIMType":"Boolean","Description":"The TentativePendingApproval parameter specifies whether to mark pending requests as tentative on the calendar.","Name":"TentativePendingApproval","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Determines whether or not the instance exist.","Name":"Ensure","Option":"Write","ValueMap":["Present"],"Values":["Present"]},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures the Calendar Processing settings Exchange Online."},{"ClassName":"MSFT_EXOCASMailboxPlan","Parameters":[{"CIMType":"String","Description":"The Identity parameter specifies the CAS Mailbox Plan that you want to modify.","Name":"Identity","Option":"Key"},{"CIMType":"String","Description":"The display name of the CAS Mailbox Plan.","Name":"DisplayName","Option":"Write"},{"CIMType":"String","Description":"CASMailboxPlans cannot be created/removed in O365. This must be set to 'Present'","Name":"Ensure","Option":"Write","ValueMap":["Present"],"Values":["Present"]},{"CIMType":"Boolean","Description":"The ActiveSyncEnabled parameter enables or disables access to the mailbox by using Exchange Active Sync. Default is $true.","Name":"ActiveSyncEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"The ImapEnabled parameter enables or disables access to the mailbox by using IMAP4 clients. The default value is $true for all CAS mailbox plans except ExchangeOnlineDeskless which is $false by default.","Name":"ImapEnabled","Option":"Write"},{"CIMType":"String","Description":"The OwaMailboxPolicy parameter specifies the Outlook on the web (formerly known as Outlook Web App) mailbox policy for the mailbox plan. The default value is OwaMailboxPolicy-Default. You can use the Get-OwaMailboxPolicy cmdlet to view the available Outlook on the web mailbox policies.","Name":"OwaMailboxPolicy","Option":"Write"},{"CIMType":"Boolean","Description":"The PopEnabled parameter enables or disables access to the mailbox by using POP3 clients. Default is $true.","Name":"PopEnabled","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures Client Access services (CAS) mailbox plans in cloud-based organizations."},{"ClassName":"MSFT_EXOCASMailboxSettings","Parameters":[{"CIMType":"String","Description":"The Identity parameter specifies the mailbox that you want to configure.","Name":"Identity","Option":"Key"},{"CIMType":"String[]","Description":"TheActiveSyncAllowedDeviceIDs parameter specifies one or more Exchange ActiveSync device IDs that are allowed to synchronize with the mailbox.","Name":"ActiveSyncAllowedDeviceIDs","Option":"Write"},{"CIMType":"String[]","Description":"The ActiveSyncBlockedDeviceIDs parameter specifies one or more Exchange ActiveSync device IDs that aren't allowed to synchronize with the mailbox.","Name":"ActiveSyncBlockedDeviceIDs","Option":"Write"},{"CIMType":"Boolean","Description":"The ActiveSyncDebugLogging parameter enables or disables Exchange ActiveSync debug logging for the mailbox.","Name":"ActiveSyncDebugLogging","Option":"Write"},{"CIMType":"Boolean","Description":"The ActiveSyncEnabled parameter enables or disables access to the mailbox using Exchange ActiveSync.","Name":"ActiveSyncEnabled","Option":"Write"},{"CIMType":"String","Description":"The ActiveSyncMailboxPolicy parameter specifies the Exchange ActiveSync mailbox policy for the mailbox.","Name":"ActiveSyncMailboxPolicy","Option":"Write"},{"CIMType":"Boolean","Description":"The ActiveSyncSuppressReadReceipt parameter controls the behavior of read receipts for Exchange ActiveSync clients that access the mailbox.","Name":"ActiveSyncSuppressReadReceipt","Option":"Write"},{"CIMType":"Boolean","Description":"The EwsAllowEntourage parameter enables or disables access to the mailbox by Microsoft Entourage clients that use Exchange Web Services.","Name":"EwsAllowEntourage","Option":"Write"},{"CIMType":"String[]","Description":"The EwsAllowList parameter specifies the Exchange Web Services applications (user agent strings) that are allowed to access the mailbox.","Name":"EwsAllowList","Option":"Write"},{"CIMType":"Boolean","Description":"The EwsAllowMacOutlook parameter enables or disables access to the mailbox by Outlook for Mac clients that use Exchange Web Services.","Name":"EwsAllowMacOutlook","Option":"Write"},{"CIMType":"Boolean","Description":"The EwsAllowOutlook parameter enables or disables access to the mailbox by Outlook clients that use Exchange Web Services.","Name":"EwsAllowOutlook","Option":"Write"},{"CIMType":"String","Description":"The EwsApplicationAccessPolicy parameter controls access to the mailbox using Exchange Web Services applications.","Name":"EwsApplicationAccessPolicy","Option":"Write"},{"CIMType":"String[]","Description":"The EwsBlockList parameter specifies the Exchange Web Services applications (user agent strings) that aren't allowed to access the mailbox using Exchange Web Services.","Name":"EwsBlockList","Option":"Write"},{"CIMType":"Boolean","Description":"The EwsEnabled parameter enables or disables access to the mailbox using Exchange Web Services clients.","Name":"EwsEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"The ImapEnabled parameter enables or disables access to the mailbox using IMAP4 clients.","Name":"ImapEnabled","Option":"Write"},{"CIMType":"String","Description":"The ImapMessagesRetrievalMimeFormat parameter specifies the message format for IMAP4 clients that access the mailbox.","Name":"ImapMessagesRetrievalMimeFormat","Option":"Write"},{"CIMType":"Boolean","Description":"The ImapForceICalForCalendarRetrievalOption parameter specifies how meeting requests are presented to IMAP4 clients that access the mailbox.","Name":"ImapForceICalForCalendarRetrievalOption","Option":"Write"},{"CIMType":"Boolean","Description":"The ImapSuppressReadReceipt parameter controls the behavior of read receipts for IMAP4 clients that access the mailbox.","Name":"ImapSuppressReadReceipt","Option":"Write"},{"CIMType":"Boolean","Description":"The ImapUseProtocolDefaults parameter specifies whether to use the IMAP4 protocol defaults for the mailbox.","Name":"ImapUseProtocolDefaults","Option":"Write"},{"CIMType":"Boolean","Description":"The MacOutlookEnabled parameter enables or disables access to the mailbox using Outlook for Mac clients that use Microsoft Sync technology.","Name":"MacOutlookEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"The MAPIEnabled parameter enables or disables access to the mailbox using MAPI clients (for example, Outlook).","Name":"MAPIEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"The OneWinNativeOutlookEnabled parameter enables or disables access to the mailbox using the new Outlook for Windows.","Name":"OneWinNativeOutlookEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"The OutlookMobileEnabled parameter enables or disables access to the mailbox using Outlook for iOS and Android.","Name":"OutlookMobileEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"The OWAEnabled parameter enables or disables access to the mailbox using Outlook on the web (formerly known as Outlook Web App or OWA).","Name":"OWAEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"The OWAforDevicesEnabled parameter enables or disables access to the mailbox using the older Outlook Web App (OWA) app on iOS and Android devices.","Name":"OWAforDevicesEnabled","Option":"Write"},{"CIMType":"String","Description":"The OwaMailboxPolicy parameter specifies the Outlook on the web mailbox policy for the mailbox.","Name":"OwaMailboxPolicy","Option":"Write"},{"CIMType":"Boolean","Description":"The PopEnabled parameter enables or disables access to the mailbox using POP3 clients.","Name":"PopEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"The PopForceICalForCalendarRetrievalOption parameter specifies how meeting requests are presented to POP3 clients that access the mailbox.","Name":"PopForceICalForCalendarRetrievalOption","Option":"Write"},{"CIMType":"String","Description":"The PopMessagesRetrievalMimeFormat parameter specifies the message format for POP3 clients that access the mailbox.","Name":"PopMessagesRetrievalMimeFormat","Option":"Write"},{"CIMType":"Boolean","Description":"The PopSuppressReadReceipt parameter controls the behavior of read receipts for POP3 clients that access the mailbox.","Name":"PopSuppressReadReceipt","Option":"Write"},{"CIMType":"Boolean","Description":"The PopUseProtocolDefaults parameter specifies whether to use the POP3 protocol defaults for the mailbox.","Name":"PopUseProtocolDefaults","Option":"Write"},{"CIMType":"Boolean","Description":"The PublicFolderClientAccess parameter enables or disables access to public folders in Microsoft Outlook.","Name":"PublicFolderClientAccess","Option":"Write"},{"CIMType":"Boolean","Description":"The ShowGalAsDefaultView parameter specifies whether the global address list (GAL) is the default recipient picker for messages.","Name":"ShowGalAsDefaultView","Option":"Write"},{"CIMType":"Boolean","Description":"The SmtpClientAuthenticationDisabled parameter specifies whether to disable authenticated SMTP (SMTP AUTH) for the mailbox.","Name":"SmtpClientAuthenticationDisabled","Option":"Write"},{"CIMType":"Boolean","Description":"The UniversalOutlookEnabled parameter enables or disables access to the mailbox using Windows 10 Mail and Calendar.","Name":"UniversalOutlookEnabled","Option":"Write"},{"CIMType":"string","Description":"Present ensures the Mailbox CAS settings are applied.","Name":"Ensure","Option":"Write","ValueMap":["Present"],"Values":["Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures CAS mailbox settings."},{"ClassName":"MSFT_EXODataAtRestEncryptionPolicy","Parameters":[{"CIMType":"String","Description":"The Identity parameter specifies the data-at-rest encryption policy that you want to modify.","Name":"Identity","Option":"Key"},{"CIMType":"String","Description":"The Name parameter specifies a unique name for the Microsoft 365 data-at-rest encryption policy.","Name":"Name","Option":"Write"},{"CIMType":"String","Description":"The Description parameter specifies an optional description for the policy.","Name":"Description","Option":"Write"},{"CIMType":"Boolean","Description":"The Enabled parameter specifies whether the policy is enabled or disabled. ","Name":"Enabled","Option":"Write"},{"CIMType":"String[]","Description":"The AzureKeyIDs parameter specifies the URL of the encryption key in the Azure Key Vault that's used for encryption.","Name":"AzureKeyIDs","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Absent","Present"],"Values":["Absent","Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Microsoft 365 data-at-rest encryption policy for multi-workload usage."},{"ClassName":"MSFT_EXODataAtRestEncryptionPolicyAssignment","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"String","Description":"The DataEncryptionPolicy parameter specifies the Microsoft 365 data-at-rest encryption policy.","Name":"DataEncryptionPolicy","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Use the Set-M365DataAtRestEncryptionPolicyAssignment cmdlet to assign a Microsoft 365 data-at-rest encryption policy at the tenant level."},{"ClassName":"MSFT_EXODataClassification","Parameters":[{"CIMType":"String","Description":"The Identity parameter specifies the data classification rule that you want to modify.","Name":"Identity","Option":"Key"},{"CIMType":"String","Description":"The Description parameter specifies a description for the data classification rule. You use the Description parameter with the Locale and Name parameters to specify descriptions for the data classification rule in different languages. ","Name":"Description","Option":"Write"},{"CIMType":"String[]","Description":"The Fingerprints parameter specifies the byte-encoded document files that are used as fingerprints by the data classification rule.","Name":"Fingerprints","Option":"Write"},{"CIMType":"Boolean","Description":"IsDefault is used with the Locale parameter to specify the default language for the data classification rule.","Name":"IsDefault","Option":"Write"},{"CIMType":"String","Description":"The Locale parameter adds or removes languages that are associated with the data classification rule.","Name":"Locale","Option":"Write"},{"CIMType":"String","Description":"The Name parameter specifies a name for the data classification rule. The value must be less than 256 characters.","Name":"Name","Option":"Write"},{"CIMType":"String","Description":"Specifies if this policy should exist.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Create a new data classification policy in your cloud-based organization."},{"ClassName":"MSFT_EXODataEncryptionPolicy","Parameters":[{"CIMType":"String","Description":"The Identity parameter specifies the data encryption policy that you want to modify.","Name":"Identity","Option":"Key"},{"CIMType":"String[]","Description":"The AzureKeyIDs parameter specifies the URI values of the Azure Key Vault keys to associate with the data encryption policy.","Name":"AzureKeyIDs","Option":"Write"},{"CIMType":"String","Description":"The Description parameter specifies an optional description for the data encryption policy","Name":"Description","Option":"Write"},{"CIMType":"Boolean","Description":"The Enabled parameter enables or disable the data encryption policy.","Name":"Enabled","Option":"Write"},{"CIMType":"String","Description":"The Name parameter specifies the unique name for the data encryption policy.","Name":"Name","Option":"Write"},{"CIMType":"String","Description":"The PermanentDataPurgeContact parameter specifies a contact for the purge of all data that's encrypted by the data encryption policy.","Name":"PermanentDataPurgeContact","Option":"Write"},{"CIMType":"String","Description":"The PermanentDataPurgeReason parameter specifies a descriptive reason for the purge of all data that's encrypted by the data encryption policy","Name":"PermanentDataPurgeReason","Option":"Write"},{"CIMType":"String","Description":"Specifies if this policy should exist.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Create a new Data Encryption policy in your cloud-based organization."},{"ClassName":"MSFT_EXODistributionGroup","Parameters":[{"CIMType":"String","Description":"The Identity parameter specifies the distribution group or mail-enabled security group that you want to modify. You can use any value that uniquely identifies the group.","Name":"Identity","Option":"Key"},{"CIMType":"String","Description":"The Name parameter specifies a unique name for the address list.","Name":"Name","Option":"Required"},{"CIMType":"String","Description":"Exchange alias (also known as the mail nickname) for the recipient","Name":"Alias","Option":"Write"},{"CIMType":"Boolean","Description":"Is Bcc blocked for the distribution group.","Name":"BccBlocked","Option":"Write"},{"CIMType":"String[]","Description":"The BypassModerationFromSendersOrMembers parameter specifies who is allowed to send messages to this moderated recipient without approval from a moderator. Valid values for this parameter are individual senders and groups in your organization. Specifying a group means all members of the group are allowed to send messages to this recipient without approval from a moderator.","Name":"BypassModerationFromSendersOrMembers","Option":"Write"},{"CIMType":"Boolean","Description":"The ByPassNestedModerationEnabled parameter specifies how to handle message approval when a moderated group contains other moderated groups as members.","Name":"BypassNestedModerationEnabled","Option":"Write"},{"CIMType":"String","Description":"Description of the distribution group.","Name":"Description","Option":"Write"},{"CIMType":"String","Description":"The DisplayName parameter specifies the display name of the group. The display name is visible in the Exchange admin center and in address lists. The maximum length is 256 characters.","Name":"DisplayName","Option":"Write"},{"CIMType":"Boolean","Description":"The HiddenGroupMembershipEnabled switch specifies whether to hide the members of the distribution group from members of the group and users who aren't members of the group.","Name":"HiddenGroupMembershipEnabled","Option":"Write"},{"CIMType":"String[]","Description":"The ManagedBy parameter specifies an owner for the group. A group must have at least one owner.","Name":"ManagedBy","Option":"Write"},{"CIMType":"String","Description":"The MemberDepartRestriction parameter specifies the restrictions that you put on requests to leave the group. Valid values are: Open & Closed","Name":"MemberDepartRestriction","Option":"Write","ValueMap":["Open","Closed"],"Values":["Open","Closed"]},{"CIMType":"String","Description":"The MemberJoinRestriction parameter specifies the restrictions that you put on requests to join the group. Valid values are: Open, Closed & ApprovalRequired","Name":"MemberJoinRestriction","Option":"Write","ValueMap":["Open","Closed","ApprovalRequired"],"Values":["Open","Closed","ApprovalRequired"]},{"CIMType":"String[]","Description":"The Members parameter specifies the recipients (mail-enabled objects) that are members of the group. You can use any value that uniquely identifies the recipient.","Name":"Members","Option":"Write"},{"CIMType":"String[]","Description":"The ModeratedBy parameter specifies one or more moderators for this group. A moderator approves messages sent to the group before the messages are delivered. A moderator must be a mailbox, mail user, or mail contact in your organization. You can use any value that uniquely identifies the moderator.","Name":"ModeratedBy","Option":"Write"},{"CIMType":"Boolean","Description":"The ModerationEnabled parameter specifies whether moderation is enabled for this recipient.","Name":"ModerationEnabled","Option":"Write"},{"CIMType":"String","Description":"The Notes parameters specifies additional information about the object.","Name":"Notes","Option":"Write"},{"CIMType":"String","Description":"The OrganizationalUnit parameter specifies the location in Active Directory where the group is created.","Name":"OrganizationalUnit","Option":"Write"},{"CIMType":"String","Description":"The PrimarySmtpAddress parameter specifies the primary return email address that's used for the recipient.","Name":"PrimarySmtpAddress","Option":"Write"},{"CIMType":"Boolean","Description":"The RequireSenderAuthenticationEnabled parameter specifies whether to accept messages only from authenticated (internal) senders.","Name":"RequireSenderAuthenticationEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"The RoomList switch specifies that all members of this distribution group are room mailboxes. You don't need to specify a value with this switch.","Name":"RoomList","Option":"Write"},{"CIMType":"String[]","Description":"The AcceptMessagesOnlyFrom parameter specifies who is allowed to send messages to this recipient. Messages from other senders are rejected.","Name":"AcceptMessagesOnlyFrom","Option":"Write"},{"CIMType":"String[]","Description":"The AcceptMessagesOnlyFromDLMembers parameter specifies who is allowed to send messages to this recipient. Messages from other senders are rejected.","Name":"AcceptMessagesOnlyFromDLMembers","Option":"Write"},{"CIMType":"String[]","Description":"The AcceptMessagesOnlyFromSendersOrMembers parameter specifies who is allowed to send messages to this recipient. Messages from other senders are rejected.","Name":"AcceptMessagesOnlyFromSendersOrMembers","Option":"Write"},{"CIMType":"String","Description":"This parameter specifies a value for the CustomAttribute1 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters. If the value contains spaces, enclose the value in quotation marks.","Name":"CustomAttribute1","Option":"Write"},{"CIMType":"String","Description":"This parameter specifies a value for the CustomAttribute2 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters. If the value contains spaces, enclose the value in quotation marks.","Name":"CustomAttribute2","Option":"Write"},{"CIMType":"String","Description":"This parameter specifies a value for the CustomAttribute3 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters. If the value contains spaces, enclose the value in quotation marks.","Name":"CustomAttribute3","Option":"Write"},{"CIMType":"String","Description":"This parameter specifies a value for the CustomAttribute4 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters. If the value contains spaces, enclose the value in quotation marks.","Name":"CustomAttribute4","Option":"Write"},{"CIMType":"String","Description":"This parameter specifies a value for the CustomAttribute5 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters. If the value contains spaces, enclose the value in quotation marks.","Name":"CustomAttribute5","Option":"Write"},{"CIMType":"String","Description":"This parameter specifies a value for the CustomAttribute6 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters. If the value contains spaces, enclose the value in quotation marks.","Name":"CustomAttribute6","Option":"Write"},{"CIMType":"String","Description":"This parameter specifies a value for the CustomAttribute7 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters. If the value contains spaces, enclose the value in quotation marks.","Name":"CustomAttribute7","Option":"Write"},{"CIMType":"String","Description":"This parameter specifies a value for the CustomAttribute8 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters. If the value contains spaces, enclose the value in quotation marks.","Name":"CustomAttribute8","Option":"Write"},{"CIMType":"String","Description":"This parameter specifies a value for the CustomAttribute9 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters. If the value contains spaces, enclose the value in quotation marks.","Name":"CustomAttribute9","Option":"Write"},{"CIMType":"String","Description":"This parameter specifies a value for the CustomAttribute10 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters. If the value contains spaces, enclose the value in quotation marks.","Name":"CustomAttribute10","Option":"Write"},{"CIMType":"String","Description":"This parameter specifies a value for the CustomAttribute11 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters. If the value contains spaces, enclose the value in quotation marks.","Name":"CustomAttribute11","Option":"Write"},{"CIMType":"String","Description":"This parameter specifies a value for the CustomAttribute12 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters. If the value contains spaces, enclose the value in quotation marks.","Name":"CustomAttribute12","Option":"Write"},{"CIMType":"String","Description":"This parameter specifies a value for the CustomAttribute13 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters. If the value contains spaces, enclose the value in quotation marks.","Name":"CustomAttribute13","Option":"Write"},{"CIMType":"String","Description":"This parameter specifies a value for the CustomAttribute14 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters. If the value contains spaces, enclose the value in quotation marks.","Name":"CustomAttribute14","Option":"Write"},{"CIMType":"String","Description":"This parameter specifies a value for the CustomAttribute15 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters. If the value contains spaces, enclose the value in quotation marks.","Name":"CustomAttribute15","Option":"Write"},{"CIMType":"String[]","Description":"The EmailAddresses parameter specifies all email addresses (proxy addresses) for the recipient, including the primary SMTP address. In on-premises Exchange organizations, the primary SMTP address and other proxy addresses are typically set by email address policies. However, you can use this parameter to configure other proxy addresses for the recipient.","Name":"EmailAddresses","Option":"Write"},{"CIMType":"String[]","Description":"The GrantSendOnBehalfTo parameter specifies who can send on behalf of this group. Although messages send on behalf of the group clearly show the sender in the From field ( on behalf of ), replies to these messages are delivered to the group, not the sender.","Name":"GrantSendOnBehalfTo","Option":"Write"},{"CIMType":"Boolean","Description":"The HiddenFromAddressListsEnabled parameter specifies whether this recipient is visible in address lists.","Name":"HiddenFromAddressListsEnabled","Option":"Write"},{"CIMType":"Boolean","Description":"The SendOofMessageToOriginatorEnabled parameter specifies how to handle out of office (OOF) messages for members of the group.","Name":"SendOofMessageToOriginatorEnabled","Option":"Write"},{"CIMType":"String","Description":"The SendModerationNotifications parameter specifies when moderation notification messages are sent. Valid values are: Always, Internal, Never.","Name":"SendModerationNotifications","Option":"Write","ValueMap":["Always","Internal","Never"],"Values":["Always","Internal","Never"]},{"CIMType":"String","Description":"The Type parameter specifies the type of group that you want to create. Valid values are: Distribution, Security","Name":"Type","Option":"Write","ValueMap":["Distribution","Security"],"Values":["Distribution","Security"]},{"CIMType":"String","Description":"Specifies if this AddressList should exist.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures Exchange Online distribution groups."},{"ClassName":"MSFT_EXODkimSigningConfig","Parameters":[{"CIMType":"String","Description":"The Identity parameter specifies the DKIM signing policy that you want to modify. This should be the FQDN. ","Name":"Identity","Option":"Key"},{"CIMType":"String","Description":"The AdminDisplayName parameter specifies a description for the policy.","Name":"AdminDisplayName","Option":"Write"},{"CIMType":"String","Description":"The BodyCanonicalization parameter specifies the canonicalization algorithm that's used to create and verify the message body part of the DKIM signature. This value effectively controls the sensitivity of DKIM to changes to the message body in transit. Valid values are 'Simple' or 'Relaxed'. 'Relaxed' is the default.","Name":"BodyCanonicalization","Option":"Write","ValueMap":["Simple","Relaxed"],"Values":["Simple","Relaxed"]},{"CIMType":"String","Description":"The HeaderCanonicalization parameter specifies the canonicalization algorithm that's used to create and verify the message header part of the DKIM signature. This value effectively controls the sensitivity of DKIM to changes to the message headers in transit. Valid values are 'Simple' or 'Relaxed'. 'Relaxed' is the default.","Name":"HeaderCanonicalization","Option":"Write","ValueMap":["Simple","Relaxed"],"Values":["Simple","Relaxed"]},{"CIMType":"Uint16","Description":"The KeySize parameter specifies the size in bits of the public key that's used in the DKIM signing policy. Valid values are 1024 and 2048","Name":"KeySize","Option":"Write","ValueMap":[1024,2048],"Values":[1024,2048]},{"CIMType":"Boolean","Description":"The Enabled parameter specifies whether the DKIM Signing Configuration is enabled or disabled. Default is $true.","Name":"Enabled","Option":"Write"},{"CIMType":"String","Description":"Specifies if this Client Access Rule should exist.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures the DomainKeys Identified Mail (DKIM) signing policy settings for domains in a cloud-based organization."},{"ClassName":"MSFT_EXODnssecForVerifiedDomain","Parameters":[{"CIMType":"String","Description":"DomainName parameter specifies the accepted domain in the Exchange Online organization where you want to view information about DNSSEC","Name":"DomainName","Option":"Key"},{"CIMType":"string","Description":"Status of the DnsSec for the given Domain Name.","Name":"DnssecFeatureStatus","Option":"Write","ValueMap":["Enabled","Disabled","Unknown"],"Values":["Enabled","Disabled","Unknown"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"DNSSec status for a verified domain."},{"ClassName":"MSFT_EXOEmailAddressPolicy","Parameters":[{"CIMType":"String","Description":"The Name parameter specifies the unique name of the email address policy. The maximum length is 64 characters.","Name":"Name","Option":"Key"},{"CIMType":"String","Description":"The Priority parameter specifies the order that the email address policies are evaluated. By default, every time that you add a new email address policy, the policy is assigned a priority of N+1, where N is the number of email address policies that you've created.","Name":"Priority","Option":"Write"},{"CIMType":"String[]","Description":"The EnabledEmailAddressTemplates parameter specifies the rules in the email address policy that are used to generate email addresses for recipients.","Name":"EnabledEmailAddressTemplates","Option":"Write"},{"CIMType":"String[]","Description":"The EnabledPrimarySMTPAddressTemplate parameter specifies the specifies the rule in the email address policy that's used to generate the primary SMTP email addresses for recipients. You can use this parameter instead of the EnabledEmailAddressTemplates if the policy only applies the primary email address and no additional proxy addresses.","Name":"EnabledPrimarySMTPAddressTemplate","Option":"Write"},{"CIMType":"String","Description":"The ManagedByFilter parameter specifies the email address policies to apply to Office 365 groups based on the properties of the users who create the Office 365 groups.","Name":"ManagedByFilter","Option":"Write"},{"CIMType":"String","Description":"Specify if the Email Address Policy should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures Email address policies in Exchange Online."},{"ClassName":"MSFT_EXOEmailTenantSettings","Parameters":[{"CIMType":"String","Description":"Only valid value is 'Yes'.","Name":"IsSingleInstance","Option":"Key","ValueMap":["Yes"],"Values":["Yes"]},{"CIMType":"String","Description":"Identity which indicates the organization name.","Name":"Identity","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether priority account protection is enabled.","Name":"EnablePriorityAccountProtection","Option":"Write"},{"CIMType":"Boolean","Description":"Specifies whether the migration configuration is valid.","Name":"IsValid","Option":"Write"},{"CIMType":"String","Description":"Specifies the state of the object.","Name":"ObjectState","Option":"Write"},{"CIMType":"String","Description":"Specifies the name of the object.","Name":"Name","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource allows users to manage email tenant settings."},{"ClassName":"MSFT_EXOEOPProtectionPolicyRule","Parameters":[{"CIMType":"String","Description":"The Comments parameter specifies informative comments for the rule, such as what the rule is used for or how it has changed over time. The length of the comment can't exceed 1024 characters.","Name":"Comments","Option":"Write"},{"CIMType":"String[]","Description":"The ExceptIfRecipientDomainIs parameter specifies an exception that looks for recipients with email addresses in the specified domains. You can specify multiple domains separated by commas.","Name":"ExceptIfRecipientDomainIs","Option":"Write"},{"CIMType":"String[]","Description":"The ExceptIfSentTo parameter specifies an exception that looks for recipients in messages. You can use any value that uniquely identifies the recipient.","Name":"ExceptIfSentTo","Option":"Write"},{"CIMType":"String[]","Description":"The ExceptIfSentToMemberOf parameter specifies an exception that looks for messages sent to members of groups. You can use any value that uniquely identifies the group.","Name":"ExceptIfSentToMemberOf","Option":"Write"},{"CIMType":"String","Description":"The Identity parameter specifies the rule that you want to view. You can use any value that uniquely identifies the rule. ","Name":"Identity","Option":"Key"},{"CIMType":"String","Description":"This parameter define if the rule is enabled or disabled","Name":"State","Option":"Write"},{"CIMType":"String","Description":"The Name parameter specifies a unique name for the rule. The maximum length is 64 characters.","Name":"Name","Option":"Write"},{"CIMType":"UInt32","Description":"The Priority parameter specifies a priority value for the rule that determines the order of rule processing. A lower integer value indicates a higher priority, the value 0 is the highest priority, and rules can't have the same priority value.","Name":"Priority","Option":"Write"},{"CIMType":"String[]","Description":"The RecipientDomainIs parameter specifies a condition that looks for recipients with email addresses in the specified domains. You can specify multiple domains separated by commas.","Name":"RecipientDomainIs","Option":"Write"},{"CIMType":"String[]","Description":"The SentTo parameter specifies a condition that looks for recipients in messages. You can use any value that uniquely identifies the recipient.","Name":"SentTo","Option":"Write"},{"CIMType":"String[]","Description":"The SentToMemberOf parameter specifies a condition that looks for messages sent to members of distribution groups, dynamic distribution groups, or mail-enabled security groups. You can use any value that uniquely identifies the group.","Name":"SentToMemberOf","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures EOP Protection Policy Rules."},{"ClassName":"MSFT_EXOExternalInOutlook","Parameters":[{"CIMType":"string","Description":"OrganisationIDParameter, not needed for cmdlet Functionality, use 'ExternalinOutlook' to use the same configuration for multiple Tenants","Name":"Identity","Option":"Key"},{"CIMType":"Boolean","Description":"The Enabled parameter enables or disables external sender identification in supported versions of Outlook. Valid values are:$true: External sender identification in Outlook is enabled. An External icon is added in the area of the subject line of messages from external senders. To exempt specific senders or sender domains from this identification, use the AllowList parameter.$false: External sender identification in Outlook is disabled.","Name":"Enabled","Option":"Write"},{"CIMType":"String[]","Description":"The AllowList parameter specifies exceptions to external sender identification in supported versions of Outlook. Messages received from the specified senders or senders in the specified domains don't receive native External sender identification. The allow list uses the 5322.From address (also known as the From address or P2 sender). Valid values are an individual domain (contoso.com), a domain and all subdomains (*.contoso.com) or email addresses (admin@contoso.com).","Name":"AllowList","Option":"Write"},{"CIMType":"string","Description":"Present ensures the instance exists, absent ensures it is removed.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Secret of the Azure Active Directory tenant used for authentication.","Name":"ApplicationSecret","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource manages the configuration of external sender identification that's available in Outlook, Outlook for Mac, Outlook on the web, and Outlook for iOS and Android."},{"ClassName":"MSFT_EXOFocusedInbox","Parameters":[{"CIMType":"String","Description":"The Identity parameter specifies the mailbox that you want to modify.","Name":"Identity","Option":"Key"},{"CIMType":"Boolean","Description":"The FocusedInboxOn parameter enables or disables Focused Inbox for the mailbox.","Name":"FocusedInboxOn","Option":"Write"},{"CIMType":"String","Description":"Specify if the AcceptedDomain should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present"],"Values":["Present"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the workload's Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"Manage the Focused Inbox configuration for mailboxes in your organization."},{"ClassName":"MSFT_EXOGlobalAddressList","Parameters":[{"CIMType":"String","Description":"The Name parameter specifies the unique name of the GAL. The maximum length is 64 characters.","Name":"Name","Option":"Key"},{"CIMType":"String[]","Description":"The ConditionalCompany parameter specifies a precanned filter that's based on the value of the recipient's Company property.","Name":"ConditionalCompany","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute1 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute1 property.","Name":"ConditionalCustomAttribute1","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute10 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute10 property.","Name":"ConditionalCustomAttribute10","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute11 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute11 property.","Name":"ConditionalCustomAttribute11","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute12 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute12 property.","Name":"ConditionalCustomAttribute12","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute13 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute13 property.","Name":"ConditionalCustomAttribute13","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute14 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute14 property.","Name":"ConditionalCustomAttribute14","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute15 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute15 property.","Name":"ConditionalCustomAttribute15","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute2 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute2 property.","Name":"ConditionalCustomAttribute2","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute3 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute3 property.","Name":"ConditionalCustomAttribute3","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute4 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute4 property.","Name":"ConditionalCustomAttribute4","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute5 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute5 property.","Name":"ConditionalCustomAttribute5","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute6 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute6 property.","Name":"ConditionalCustomAttribute6","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute7 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute7 property.","Name":"ConditionalCustomAttribute7","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute8 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute8 property.","Name":"ConditionalCustomAttribute8","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalCustomAttribute9 parameter specifies a precanned filter that's based on the value of the recipient's CustomAttribute9 property.","Name":"ConditionalCustomAttribute9","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalDepartment parameter specifies a precanned filter that's based on the value of the recipient's Department property.","Name":"ConditionalDepartment","Option":"Write"},{"CIMType":"String[]","Description":"The ConditionalStateOrProvince parameter specifies a precanned filter that's based on the value of the recipient's StateOrProvince property.","Name":"ConditionalStateOrProvince","Option":"Write"},{"CIMType":"String[]","Description":"The IncludedRecipients parameter specifies a precanned filter that's based on the recipient type.","Name":"IncludedRecipients","Option":"Write","ValueMap":["","AllRecipients","MailboxUsers","MailContacts","MailGroups","MailUsers","Resources"],"Values":["","AllRecipients","MailboxUsers","MailContacts","MailGroups","MailUsers","Resources"]},{"CIMType":"String","Description":"The RecipientFilter parameter specifies an OPath filter that's based on the value of any available recipient property.","Name":"RecipientFilter","Option":"Write"},{"CIMType":"String","Description":"Specify if the Global Address List should exist or not.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures Global Address Lists in Exchange Online."},{"ClassName":"MSFT_EXOGroupSettings","Parameters":[{"CIMType":"string","Description":"The DisplayName parameter specifies the name of the Microsoft 365 Group. The display name is visible in the Exchange admin center, address lists, and Outlook. The maximum length is 64 characters.","Name":"DisplayName","Option":"Key"},{"CIMType":"string","Description":"The unique Id of the group","Name":"Id","Option":"Write"},{"CIMType":"string[]","Description":"The AcceptMessagesOnlyFromSendersOrMembers parameter specifies who is allowed to send messages to this recipient. Messages from other senders are rejected.","Name":"AcceptMessagesOnlyFromSendersOrMembers","Option":"Write"},{"CIMType":"string","Description":"Private","Name":"AccessType","Option":"Write","ValueMap":["Public","Private"],"Values":["Public","Private"]},{"CIMType":"boolean","Description":"The AlwaysSubscribeMembersToCalendarEvents switch controls the default subscription settings of new members that are added to the Microsoft 365 Group. Changing this setting doesn't affect existing group members.","Name":"AlwaysSubscribeMembersToCalendarEvents","Option":"Write"},{"CIMType":"string","Description":"The AlwaysSubscribeMembersToCalendarEvents switch controls the default subscription settings of new members that are added to the Microsoft 365 Group. Changing this setting doesn't affect existing group members.","Name":"AuditLogAgeLimit","Option":"Write"},{"CIMType":"boolean","Description":"The AutoSubscribeNewMembers switch specifies whether to automatically subscribe new members that are added to the Microsoft 365 Group to conversations and calendar events. Only users that are added to the group after you enable this setting are automatically subscribed to the group.","Name":"AutoSubscribeNewMembers","Option":"Write"},{"CIMType":"boolean","Description":"The CalendarMemberReadOnly parameter specifies whether to set read-only Calendar permissions to the Microsoft 365 Group for members of the group.","Name":"CalendarMemberReadOnly","Option":"Write"},{"CIMType":"string","Description":"The CalendarMemberReadOnly switch specifies whether to set read-only Calendar permissions to the Microsoft 365 Group for members of the group.","Name":"Classification","Option":"Write"},{"CIMType":"boolean","Description":"The CalendarMemberReadOnly switch specifies whether to set read-only Calendar permissions to the Microsoft 365 Group for members of the group.","Name":"ConnectorsEnabled","Option":"Write"},{"CIMType":"string","Description":"This parameter specifies a value for the CustomAttribute1 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters.","Name":"CustomAttribute1","Option":"Write"},{"CIMType":"string","Description":"This parameter specifies a value for the CustomAttribute2 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters.","Name":"CustomAttribute2","Option":"Write"},{"CIMType":"string","Description":"This parameter specifies a value for the CustomAttribute3 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters.","Name":"CustomAttribute3","Option":"Write"},{"CIMType":"string","Description":"This parameter specifies a value for the CustomAttribute4 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters.","Name":"CustomAttribute4","Option":"Write"},{"CIMType":"string","Description":"This parameter specifies a value for the CustomAttribute5 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters.","Name":"CustomAttribute5","Option":"Write"},{"CIMType":"string","Description":"This parameter specifies a value for the CustomAttribute6 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters.","Name":"CustomAttribute6","Option":"Write"},{"CIMType":"string","Description":"This parameter specifies a value for the CustomAttribute7 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters.","Name":"CustomAttribute7","Option":"Write"},{"CIMType":"string","Description":"This parameter specifies a value for the CustomAttribute8 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters.","Name":"CustomAttribute8","Option":"Write"},{"CIMType":"string","Description":"This parameter specifies a value for the CustomAttribute9 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters.","Name":"CustomAttribute9","Option":"Write"},{"CIMType":"string","Description":"This parameter specifies a value for the CustomAttribute10 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters.","Name":"CustomAttribute10","Option":"Write"},{"CIMType":"string","Description":"This parameter specifies a value for the CustomAttribute11 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters.","Name":"CustomAttribute11","Option":"Write"},{"CIMType":"string","Description":"This parameter specifies a value for the CustomAttribute12 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters.","Name":"CustomAttribute12","Option":"Write"},{"CIMType":"string","Description":"This parameter specifies a value for the CustomAttribute13 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters.","Name":"CustomAttribute13","Option":"Write"},{"CIMType":"string","Description":"This parameter specifies a value for the CustomAttribute14 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters.","Name":"CustomAttribute14","Option":"Write"},{"CIMType":"string","Description":"This parameter specifies a value for the CustomAttribute15 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. The maximum length is 1024 characters.","Name":"CustomAttribute15","Option":"Write"},{"CIMType":"string","Description":"The DataEncryptionPolicy parameter specifies the data encryption policy that's applied to the Microsoft 365 Group. ","Name":"DataEncryptionPolicy","Option":"Write"},{"CIMType":"string[]","Description":"The EmailAddresses parameter specifies all the email addresses (proxy addresses) for the recipient, including the primary SMTP address.","Name":"EmailAddresses","Option":"Write"},{"CIMType":"string[]","Description":"This parameter specifies a value for the ExtensionCustomAttribute1 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. You can specify up to 1300 values separated by commas.","Name":"ExtensionCustomAttribute1","Option":"Write"},{"CIMType":"string[]","Description":"This parameter specifies a value for the ExtensionCustomAttribute2 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. You can specify up to 1300 values separated by commas.","Name":"ExtensionCustomAttribute2","Option":"Write"},{"CIMType":"string[]","Description":"This parameter specifies a value for the ExtensionCustomAttribute3 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. You can specify up to 1300 values separated by commas.","Name":"ExtensionCustomAttribute3","Option":"Write"},{"CIMType":"string[]","Description":"This parameter specifies a value for the ExtensionCustomAttribute4 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. You can specify up to 1300 values separated by commas.","Name":"ExtensionCustomAttribute4","Option":"Write"},{"CIMType":"string[]","Description":"This parameter specifies a value for the ExtensionCustomAttribute5 property on the recipient. You can use this property to store custom information about the recipient, and to identify the recipient in filters. You can specify up to 1300 values separated by commas.","Name":"ExtensionCustomAttribute5","Option":"Write"},{"CIMType":"string[]","Description":"The GrantSendOnBehalfTo parameter specifies who can send on behalf of this Microsoft 365 Group.","Name":"GrantSendOnBehalfTo","Option":"Write"},{"CIMType":"boolean","Description":"The GrantSendOnBehalfTo parameter specifies who can send on behalf of this Microsoft 365 Group.","Name":"HiddenFromAddressListsEnabled","Option":"Write"},{"CIMType":"boolean","Description":"The HiddenFromExchangeClientsEnabled switch specifies whether the Microsoft 365 Group is hidden from Outlook clients connected to Microsoft 365.","Name":"HiddenFromExchangeClientsEnabled","Option":"Write"},{"CIMType":"string","Description":"The InformationBarrierMode parameter specifies the information barrier mode for the Microsoft 365 Group.","Name":"InformationBarrierMode","Option":"Write","ValueMap":["Explicit","Implicit","Open","OwnerModerated"],"Values":["Explicit","Implicit","Open","OwnerModerated"]},{"CIMType":"boolean","Description":"This parameter specifies whether or not members are allow to edit content.","Name":"IsMemberAllowedToEditContent","Option":"Write"},{"CIMType":"string","Description":"The Language parameter specifies language preference for the Microsoft 365 Group.","Name":"Language","Option":"Write"},{"CIMType":"string","Description":"The MailboxRegion parameter specifies the preferred data location (PDL) for the Microsoft 365 Group in multi-geo environments.","Name":"MailboxRegion","Option":"Write"},{"CIMType":"string","Description":"The MailTip parameter specifies the custom MailTip text for this recipient. The MailTip is shown to senders when they start drafting an email message to this recipient. ","Name":"MailTip","Option":"Write"},{"CIMType":"string[]","Description":"The MailTipTranslations parameter specifies additional languages for the custom MailTip text that's defined by the MailTip parameter.","Name":"MailTipTranslations","Option":"Write"},{"CIMType":"string","Description":"The MaxReceiveSize parameter specifies the maximum size of an email message that can be sent to this group. Messages that exceed the maximum size are rejected by the group.","Name":"MaxReceiveSize","Option":"Write"},{"CIMType":"string","Description":"The MaxSendSize parameter specifies the maximum size of an email message that can be sent by this group.","Name":"MaxSendSize","Option":"Write"},{"CIMType":"string[]","Description":"The ModeratedBy parameter specifies one or more moderators for this recipient. A moderator approves messages sent to the recipient before the messages are delivered. A moderator must be a mailbox, mail user, or mail contact in your organization. You can use any value that uniquely identifies the moderator. ","Name":"ModeratedBy","Option":"Write"},{"CIMType":"boolean","Description":"The ModerationEnabled parameter specifies whether moderation is enabled for this recipient.","Name":"ModerationEnabled","Option":"Write"},{"CIMType":"string","Description":"The Notes parameter specifies the description of the Microsoft 365 Group. If the value contains spaces, enclose the value in quotation marks.","Name":"Notes","Option":"Write"},{"CIMType":"string","Description":"The PrimarySmtpAddress parameter specifies the primary return email address that's used for the recipient. You can't use the EmailAddresses and PrimarySmtpAddress parameters in the same command.","Name":"PrimarySmtpAddress","Option":"Write"},{"CIMType":"string[]","Description":"The RejectMessagesFromSendersOrMembers parameter specifies who isn't allowed to send messages to this recipient. Messages from these senders are rejected.","Name":"RejectMessagesFromSendersOrMembers","Option":"Write"},{"CIMType":"boolean","Description":"The RequireSenderAuthenticationEnabled parameter specifies whether to accept messages only from authenticated (internal) senders. ","Name":"RequireSenderAuthenticationEnabled","Option":"Write"},{"CIMType":"string","Description":"The SensitivityLabelId parameter specifies the GUID value of the sensitivity label that's assigned to the Microsoft 365 Group.","Name":"SensitivityLabelId","Option":"Write"},{"CIMType":"boolean","Description":"The SubscriptionEnabled switch specifies whether the group owners can enable subscription to conversations and calendar events on the groups they own. ","Name":"SubscriptionEnabled","Option":"Write"},{"CIMType":"boolean","Description":"The WelcomeMessageEnabled switch specifies whether to enable or disable sending system-generated welcome messages to users who are added as members to the Microsoft 365 Group.","Name":"WelcomeMessageEnabled","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures settings on groups such as the custom attributes and language."},{"ClassName":"MSFT_EXOHostedConnectionFilterPolicy","Parameters":[{"CIMType":"String","Description":"The Identity parameter specifies the Hosted Connection Filter Policy that you want to modify.","Name":"Identity","Option":"Key"},{"CIMType":"String","Description":"The AdminDisplayName parameter specifies a description for the policy.","Name":"AdminDisplayName","Option":"Write"},{"CIMType":"Boolean","Description":"The EnableSafeList parameter enables or disables use of the safe list. The safe list is a dynamic allow list in the Microsoft datacenter that requires no customer configuration. Valid input for this parameter is $true or $false. The default value is $false.","Name":"EnableSafeList","Option":"Write"},{"CIMType":"String[]","Description":"The IPAllowList parameter specifies IP addresses from which messages are always allowed. Messages from the IP addresses you specify won't be identified as spam, despite any other spam characteristics of the messages. Valid values for this parameter are: A single IP address, an IP address range, a CIDR IP.","Name":"IPAllowList","Option":"Write"},{"CIMType":"String[]","Description":"The IPBlockList parameter specifies IP addresses from which messages are never allowed. Messages from the IP addresses you specify are blocked without any further spam scanning. Valid values for this parameter are: A single IP address, an IP address range, a CIDR IP.","Name":"IPBlockList","Option":"Write"},{"CIMType":"Boolean","Description":"The MakeDefault parameter makes the specified policy the default connection filter policy. Default is $false.","Name":"MakeDefault","Option":"Write"},{"CIMType":"String","Description":"Specifies if this Hosted Connection Filter Policy should exist.","Name":"Ensure","Option":"Write","ValueMap":["Present","Absent"],"Values":["Present","Absent"]},{"CIMType":"MSFT_Credential","Description":"Credentials of the Exchange Global Admin","Name":"Credential","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory application to authenticate with.","Name":"ApplicationId","Option":"Write"},{"CIMType":"String","Description":"Id of the Azure Active Directory tenant used for authentication.","Name":"TenantId","Option":"Write"},{"CIMType":"String","Description":"Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.","Name":"CertificateThumbprint","Option":"Write"},{"CIMType":"MSFT_Credential","Description":"Username can be made up to anything but password will be used for CertificatePassword","Name":"CertificatePassword","Option":"Write"},{"CIMType":"String","Description":"Path to certificate used in service principal usually a PFX file.","Name":"CertificatePath","Option":"Write"},{"CIMType":"Boolean","Description":"Managed ID being used for authentication.","Name":"ManagedIdentity","Option":"Write"},{"CIMType":"String[]","Description":"Access token used for authentication.","Name":"AccessTokens","Option":"Write"}],"Description":"This resource configures the settings of connection filter policies in your cloud-based organization."},{"ClassName":"MSFT_EXOHostedContentFilterPolicy","Parameters":[{"CIMType":"String","Description":"The Identity parameter specifies the name of the Hosted Content Filter Policy that you want to modify.","Name":"Identity","Option":"Key"},{"CIMType":"String","Description":"The AddXHeaderValue parameter specifies the X-header value to add to spam messages when an action parameter is set to the value AddXHeader.","Name":"AddXHeaderValue","Option":"Write"},{"CIMType":"String","Description":"The AdminDisplayName parameter specifies a description for the policy.","Name":"AdminDisplayName","Option":"Write"},{"CIMType":"String[]","Description":"The AllowedSenderDomains parameter specifies trusted domains that aren't processed by the spam filter.","Name":"AllowedSenderDomains","Option":"Write"},{"CIMType":"String[]","Description":"The AllowedSenders parameter specifies a list of trusted senders that aren't processed by the spam filter.","Name":"AllowedSenders","Option":"Write"},{"CIMType":"String[]","Description":"The BlockedSenderDomains parameter specifies domains that are always marked as spam sources.","Name":"BlockedSenderDomains","Option":"Write"},{"CIMType":"String[]","Description":"The BlockedSenders parameter specifies senders that are always marked as spam sources.","Name":"BlockedSenders","Option":"Write"},{"CIMType":"String","Description":"The BulkQuarantineTag parameter specifies the quarantine policy that's used on messages that are quarantined as bulk email.","Name":"BulkQuarantineTag","Option":"Write"},{"CIMType":"String","Description":"The BulkSpamAction parameter specifies the action to take on messages that are classified as bulk email.","Name":"BulkSpamAction","Option":"Write","ValueMap":["MoveToJmf","AddXHeader","ModifySubject","Redirect","Delete","Quarantine","NoAction"],"Values":["MoveToJmf","AddXHeader","ModifySubject","Redirect","Delete","Quarantine","NoAction"]},{"CIMType":"UInt32","Description":"The BulkThreshold parameter specifies the Bulk Complaint Level (BCL) threshold setting. Valid values are from 1 - 9, where 1 marks most bulk email as spam, and 9 allows the most bulk email to be delivered. The default value is 7.","Name":"BulkThreshold","Option":"Write"},{"CIMType":"Boolean","Description":"The EnableLanguageBlockList parameter enables or disables blocking email messages that are written in specific languages, regardless of the message contents. Valid input for this parameter is $true or $false. The default value is $false.","Name":"EnableLanguageBlockList","Option":"Write"},{"CIMType":"Boolean","Description":"The EnableRegionBlockList parameter enables or disables blocking email messages that are sent from specific countries or regions, regardless of the message contents. Valid input for this parameter is $true or $false. The default value is $false.","Name":"EnableRegionBlockList","Option":"Write"},{"CIMType":"String","Description":"The HighConfidencePhishAction parameter specifies the action to take on messages that are marked as high confidence phishing","Name":"HighConfidencePhishAction","Option":"Write","ValueMap":["MoveToJmf","Redirect","Quarantine"],"Values":["MoveToJmf","Redirect","Quarantine"]},{"CIMType":"String","Description":"The HighConfidencePhishQuarantineTag parameter specifies the quarantine policy that's used on messages that are quarantined as high confidence phishing.","Name":"HighConfidencePhishQuarantineTag","Option":"Write"},{"CIMType":"String","Description":"The HighConfidenceSpamAction parameter specifies the action to take on messages that are classified as high confidence spam.","Name":"HighConfidenceSpamAction","Option":"Write","ValueMap":["MoveToJmf","AddXHeader","ModifySubject","Redirect","Delete","Quarantine","NoAction"],"Values":["MoveToJmf","AddXHeader","ModifySubject","Redirect","Delete","Quarantine","NoAction"]},{"CIMType":"String","Description":"The HighConfidenceSpamQuarantineTag parameter specifies the quarantine policy that's used on messages that are quarantined as high confidence spam.","Name":"HighConfidenceSpamQuarantineTag","Option":"Write"},{"CIMType":"String","Description":"The IncreaseScoreWithBizOrInfoUrls parameter increases the spam score of messages that contain links to .biz or .info domains. Valid values for this parameter are Off, On or Test. The default value is Off.","Name":"IncreaseScoreWithBizOrInfoUrls","Option":"Write","ValueMap":["Off","On","Test"],"Values":["Off","On","Test"]},{"CIMType":"String","Description":"The IncreaseScoreWithImageLinks parameter increases the spam score of messages that contain image links to remote websites. Valid values for this parameter are Off, On or Test. The default value is Off.","Name":"IncreaseScoreWithImageLinks","Option":"Write","ValueMap":["Off","On","Test"],"Values":["Off","On","Test"]},{"CIMType":"String","Description":"The IncreaseScoreWithNumericIps parameter increases the spam score of messages that contain links to IP addresses. Valid values for this parameter are Off, On or Test. The default value is Off.","Name":"IncreaseScoreWithNumericIps","Option":"Write","ValueMap":["Off","On","Test"],"Values":["Off","On","Test"]},{"CIMType":"String","Description":"The IncreaseScoreWithRedirectToOtherPort parameter increases the spam score of messages that contain links that redirect to other TCP ports. Valid values for this parameter are Off, On or Test. The default value is Off.","Name":"IncreaseScoreWithRedirectToOtherPort","Option":"Write","ValueMap":["Off","On","Test"],"Values":["Off","On","Test"]},{"CIMType":"Boolean","Description":"The InlineSafetyTipsEnabled parameter specifies whether to enable or disable safety tips that are shown to recipients in messages. The default is $true","Name":"InlineSafetyTipsEnabled","Option":"Write"},{"CIMType":"String","Description":"The IntraOrgFilterState parameter specifies whether to enable anti-spam filtering for messages sent between internal users (users in the same organization).","Name":"IntraOrgFilterState","Option":"Write","ValueMap":["Default","HighConfidencePhish","Phish","HighConfidenceSpam","Spam","Disabled"],"Values":["Default","HighConfidencePhish","Phish","HighConfidenceSpam","Spam","Disabled"]},{"CIMType":"String[]","Description":"The LanguageBlockList parameter specifies the languages to block when messages are blocked based on their language. Valid input for this parameter is a supported ISO 639-1 lowercase two-letter language code. You can specify multiple values separated by commas. This parameter is only use when the EnableRegionBlockList parameter is set to $true.","Name":"LanguageBlockList","Option":"Write"},{"CIMType":"Boolean","Description":"The MakeDefault parameter makes the specified content filter policy the default content filter policy. The default value is $false","Name":"MakeDefault","Option":"Write"},{"CIMType":"String","Description":"The MarkAsSpamBulkMail parameter classifies the message as spam when the message is identified as a bulk email message. Valid values for this parameter are Off, On or Test. The default value is On.","Name":"MarkAsSpamBulkMail","Option":"Write","ValueMap":["Off","On","Test"],"Values":["Off","On","Test"]},{"CIMType":"String","Description":"The MarkAsSpamEmbedTagsInHtml parameter classifies the message as spam when the message contains HTML tags. Valid values for this parameter are Off, On or Test. The default value is Off.","Name":"MarkAsSpamEmbedTagsInHtml","Option":"Write","ValueMap":["Off","On","Test"],"Values":["Off","On","Test"]},{"CIMType":"String","Description":"The MarkAsSpamEmptyMessages parameter classifies the message as spam when the message is empty. Valid values for this parameter are Off, On or Test. The default value is Off.","Name":"MarkAsSpamEmptyMessages","Option":"Write","ValueMap":["Off","On","Test"],"Values":["Off","On","Test"]},{"CIMType":"String","Description":"The MarkAsSpamFormTagsInHtml parameter classifies the message as spam when the message contains HTML
tags. Valid values for this parameter are Off, On or Test. The default value is Off.","Name":"MarkAsSpamFormTagsInHtml","Option":"Write","ValueMap":["Off","On","Test"],"Values":["Off","On","Test"]},{"CIMType":"String","Description":"The MarkAsSpamFramesInHtml parameter classifies the message as spam when the message contains HTML or