Wählen Sie die Berechtigungen aus, die für diese API als am wenigsten privilegiert markiert sind. Verwenden Sie eine höhere Berechtigung oder Berechtigungen nur, wenn Ihre App dies erfordert. Ausführliche Informationen zu delegierten Berechtigungen und Anwendungsberechtigungen finden Sie unter Berechtigungstypen. Weitere Informationen zu diesen Berechtigungen finden Sie in der Berechtigungsreferenz.
Berechtigungstyp
Berechtigungen mit den geringsten Berechtigungen
Berechtigungen mit höheren Berechtigungen
Delegiert (Geschäfts-, Schul- oder Unikonto)
Policy.ReadWrite.ConditionalAccess
Policy.ReadWrite.AuthenticationMethod
Delegiert (persönliches Microsoft-Konto)
Nicht unterstützt
Nicht unterstützt
Anwendung
Policy.ReadWrite.ConditionalAccess
Policy.ReadWrite.AuthenticationMethod
Wichtig
In delegierten Szenarien mit Geschäfts-, Schul- oder Unikonten muss dem angemeldeten Benutzer eine unterstützte Microsoft Entra Rolle oder eine benutzerdefinierte Rolle mit einer unterstützten Rollenberechtigung zugewiesen werden. Die folgenden Rollen mit den geringsten Berechtigungen werden für diesen Vorgang unterstützt.
Administrator für bedingten Zugriff
Sicherheitsadministrator
HTTP-Anforderung
POST /identity/conditionalAccess/authenticationStrength/policies/{authenticationStrengthPolicyId}/combinationConfigurations
Sie können die folgenden Eigenschaften angeben, wenn Sie eine authenticationCombinationConfiguration erstellen. Darüber hinaus müssen Sie die und die @odata.type erforderlichen Eigenschaften des abgeleiteten Typs von authenticationCombinationConfiguration angeben, den Sie erstellen. Beispiel: "@odata.type" : "#microsoft.graph.fido2CombinationConfiguration".
Eigenschaft
Typ
Beschreibung
appliesToCombinations
authenticationMethodModes-Auflistung
Die Kombinationen, in denen diese Konfiguration angewendet wird. Verwenden Sie "fido2"für fido2combinationConfigurations , für x509certificatecombinationconfiguration"x509CertificateSingleFactor" oder "x509CertificateMultiFactor". Erforderlich.
// Code snippets are only available for the latest version. Current version is 5.x
// Dependencies
using Microsoft.Graph.Models;
var requestBody = new Fido2CombinationConfiguration
{
OdataType = "#microsoft.graph.fido2CombinationConfiguration",
AllowedAAGUIDs = new List<string>
{
"486c3b50-889c-480a-abc5-c04ef7c873e0",
"c042882f-a621-40c8-94d3-9cde3a826fed",
"ec454c08-4c77-4012-9d48-45f7f0fccdfb",
},
AppliesToCombinations = new List<AuthenticationMethodModes?>
{
AuthenticationMethodModes.Fido2,
},
};
// To initialize your graphClient, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=csharp
var result = await graphClient.Identity.ConditionalAccess.AuthenticationStrength.Policies["{authenticationStrengthPolicy-id}"].CombinationConfigurations.PostAsync(requestBody);
// Code snippets are only available for the latest major version. Current major version is $v1.*
// Dependencies
import (
"context"
msgraphsdk "github.com/microsoftgraph/msgraph-sdk-go"
graphmodels "github.com/microsoftgraph/msgraph-sdk-go/models"
//other-imports
)
requestBody := graphmodels.NewAuthenticationCombinationConfiguration()
allowedAAGUIDs := []string {
"486c3b50-889c-480a-abc5-c04ef7c873e0",
"c042882f-a621-40c8-94d3-9cde3a826fed",
"ec454c08-4c77-4012-9d48-45f7f0fccdfb",
}
requestBody.SetAllowedAAGUIDs(allowedAAGUIDs)
appliesToCombinations := []graphmodels.AuthenticationMethodModesable {
authenticationMethodModes := graphmodels.FIDO2_AUTHENTICATIONMETHODMODES
requestBody.SetAuthenticationMethodModes(&authenticationMethodModes)
}
requestBody.SetAppliesToCombinations(appliesToCombinations)
// To initialize your graphClient, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=go
combinationConfigurations, err := graphClient.Identity().ConditionalAccess().AuthenticationStrength().Policies().ByAuthenticationStrengthPolicyId("authenticationStrengthPolicy-id").CombinationConfigurations().Post(context.Background(), requestBody, nil)
// Code snippets are only available for the latest version. Current version is 6.x
GraphServiceClient graphClient = new GraphServiceClient(requestAdapter);
Fido2CombinationConfiguration authenticationCombinationConfiguration = new Fido2CombinationConfiguration();
authenticationCombinationConfiguration.setOdataType("#microsoft.graph.fido2CombinationConfiguration");
LinkedList<String> allowedAAGUIDs = new LinkedList<String>();
allowedAAGUIDs.add("486c3b50-889c-480a-abc5-c04ef7c873e0");
allowedAAGUIDs.add("c042882f-a621-40c8-94d3-9cde3a826fed");
allowedAAGUIDs.add("ec454c08-4c77-4012-9d48-45f7f0fccdfb");
authenticationCombinationConfiguration.setAllowedAAGUIDs(allowedAAGUIDs);
LinkedList<AuthenticationMethodModes> appliesToCombinations = new LinkedList<AuthenticationMethodModes>();
appliesToCombinations.add(AuthenticationMethodModes.Fido2);
authenticationCombinationConfiguration.setAppliesToCombinations(appliesToCombinations);
AuthenticationCombinationConfiguration result = graphClient.identity().conditionalAccess().authenticationStrength().policies().byAuthenticationStrengthPolicyId("{authenticationStrengthPolicy-id}").combinationConfigurations().post(authenticationCombinationConfiguration);
# Code snippets are only available for the latest version. Current version is 1.x
from msgraph import GraphServiceClient
from msgraph.generated.models.fido2_combination_configuration import Fido2CombinationConfiguration
from msgraph.generated.models.authentication_method_modes import AuthenticationMethodModes
# To initialize your graph_client, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=python
request_body = Fido2CombinationConfiguration(
odata_type = "#microsoft.graph.fido2CombinationConfiguration",
allowed_a_a_g_u_i_ds = [
"486c3b50-889c-480a-abc5-c04ef7c873e0",
"c042882f-a621-40c8-94d3-9cde3a826fed",
"ec454c08-4c77-4012-9d48-45f7f0fccdfb",
],
applies_to_combinations = [
AuthenticationMethodModes.Fido2,
],
)
result = await graph_client.identity.conditional_access.authentication_strength.policies.by_authentication_strength_policy_id('authenticationStrengthPolicy-id').combination_configurations.post(request_body)
// Code snippets are only available for the latest version. Current version is 5.x
// Dependencies
using Microsoft.Graph.Models;
var requestBody = new X509CertificateCombinationConfiguration
{
OdataType = "#microsoft.graph.x509CertificateCombinationConfiguration",
AllowedIssuerSkis = new List<string>
{
"9A4248C6AC8C2931AB2A86537818E92E7B6C97B6",
},
AllowedPolicyOIDs = new List<string>
{
},
AppliesToCombinations = new List<AuthenticationMethodModes?>
{
AuthenticationMethodModes.X509CertificateSingleFactor,
},
};
// To initialize your graphClient, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=csharp
var result = await graphClient.Identity.ConditionalAccess.AuthenticationStrength.Policies["{authenticationStrengthPolicy-id}"].CombinationConfigurations.PostAsync(requestBody);
// Code snippets are only available for the latest version. Current version is 6.x
GraphServiceClient graphClient = new GraphServiceClient(requestAdapter);
X509CertificateCombinationConfiguration authenticationCombinationConfiguration = new X509CertificateCombinationConfiguration();
authenticationCombinationConfiguration.setOdataType("#microsoft.graph.x509CertificateCombinationConfiguration");
LinkedList<String> allowedIssuerSkis = new LinkedList<String>();
allowedIssuerSkis.add("9A4248C6AC8C2931AB2A86537818E92E7B6C97B6");
authenticationCombinationConfiguration.setAllowedIssuerSkis(allowedIssuerSkis);
LinkedList<String> allowedPolicyOIDs = new LinkedList<String>();
authenticationCombinationConfiguration.setAllowedPolicyOIDs(allowedPolicyOIDs);
LinkedList<AuthenticationMethodModes> appliesToCombinations = new LinkedList<AuthenticationMethodModes>();
appliesToCombinations.add(AuthenticationMethodModes.X509CertificateSingleFactor);
authenticationCombinationConfiguration.setAppliesToCombinations(appliesToCombinations);
AuthenticationCombinationConfiguration result = graphClient.identity().conditionalAccess().authenticationStrength().policies().byAuthenticationStrengthPolicyId("{authenticationStrengthPolicy-id}").combinationConfigurations().post(authenticationCombinationConfiguration);
# Code snippets are only available for the latest version. Current version is 1.x
from msgraph import GraphServiceClient
from msgraph.generated.models.x509_certificate_combination_configuration import X509CertificateCombinationConfiguration
from msgraph.generated.models.authentication_method_modes import AuthenticationMethodModes
# To initialize your graph_client, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=python
request_body = X509CertificateCombinationConfiguration(
odata_type = "#microsoft.graph.x509CertificateCombinationConfiguration",
allowed_issuer_skis = [
"9A4248C6AC8C2931AB2A86537818E92E7B6C97B6",
],
allowed_policy_o_i_ds = [
],
applies_to_combinations = [
AuthenticationMethodModes.X509CertificateSingleFactor,
],
)
result = await graph_client.identity.conditional_access.authentication_strength.policies.by_authentication_strength_policy_id('authenticationStrengthPolicy-id').combination_configurations.post(request_body)