Skip to content

Commit d392ac9

Browse files
Merge pull request #10643 from markwahl-msft/mwahl-uar-graph
UAR custom data resource: update Graph references
2 parents 5cf969b + b5d1384 commit d392ac9

File tree

1 file changed

+16
-8
lines changed

1 file changed

+16
-8
lines changed

docs/id-governance/custom-data-resource-access-reviews.md

Lines changed: 16 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,8 @@ With a catalog created, you can add custom data provided resource to it by doing
7979
1. Select **Create**.
8080

8181

82+
You can also create an access review programmatically using Microsoft Graph. For more information, see [Create a single stage access review on a catalog](/graph/api/accessreviewset-post-definitions?view=graph-rest-beta&tabs=http#example-6-create-a-single-stage-access-review-on-a-catalog).
83+
8284
## Get Access Review Object and Instance ID
8385

8486
After creating the catalog access review, but before uploading your custom data, you must get both the Access Review object ID, and the Access Review instance object ID. To get this information, you'd do the following:
@@ -115,6 +117,7 @@ After copying both the Access review object, and access review instance object,
115117
> To confirm all CSVs were uploaded successfully, view the [audit logs](entitlement-management-logs-and-reporting.md).
116118
1. You have **up to two hours** from the time the review enters the *Initializing* state to complete the upload.
117119

120+
You can also upload custom data via Graph, by creating an upload session and then uploading a CSV file. For more information, see [customDataProvidedResourceUploadSession](/graph/api/resources/customdataprovidedresourceuploadsession?view=graph-rest-beta).
118121

119122
## Active review state
120123

@@ -126,33 +129,38 @@ At the **Active** stage:
126129
## Applying stage
127130

128131

129-
In the **Applying** stage, you manually get a list of denied users by making the following API call:
132+
In the **Applying** stage, you can get a list of denied users by making the [list decisions](/graph/api/accessreviewinstance-list-decisions?view=graph-rest-beta&tabs=http) API call:
130133

131134
``` http
132-
GET /identityGovernance/accessReviews/definitions/{access review object ID}/instances/{access review instance object ID}/decisions?$filter=(decision eq Deny and resourceId eq <custom data provided resource ID>)
135+
GET https://graph.microsoft.com/beta/identityGovernance/accessReviews/definitions/{access review object ID}/instances/{access review instance object ID}/decisions?$filter=(decision eq 'Deny' and resourceId eq '<custom data provided resource ID>')
133136
```
134137

135138
For each decision item:
136139

137-
Remove access from your own system and Patch each decision item to indicate success or failure for removal by making the following API call:
140+
Remove access from your own system and then patch each decision item to indicate success or failure for removal by making the [update accessReviewInstanceDecisionItem](/graph/api/accessreviewinstancedecisionitem-update?view=graph-rest-beta&tabs=http) API call:
138141

139142
``` http
140-
PATCH /identityGovernance/accessReviews/definitions/{access review object ID}/instances/{access review instance object ID}/decisions/{decision ID}
141-
{ “applyResult” : “Success/Failure/PartialSuccess/NotSupported”, “applyDescription”: “ServiceNow ticket created” }
143+
PATCH https://graph.microsoft.com/beta/identityGovernance/accessReviews/definitions/{access review object ID}/instances/{access review instance object ID}/decisions/{decision ID}
144+
Content-Type: application/json
145+
146+
{
147+
"applyResult": "AppliedSuccessfully",
148+
"applyDescription": "ServiceNow ticket created"
149+
}
142150
```
143151

144-
The review transition to the **Applied** state once all the custom data provided decisions have been applied. For example, if you have five decisions that must be made from the data, you must apply(PATCH) five decisions before the review transitions to **Applied**.
152+
The review transition to the **Applied** state once all the custom data provided decisions have been applied. For example, if you have five decisions that must be made from the data, you must apply using PATCH each of five decision items before the review transitions to **Applied**.
145153

146154

147155

148156

149-
## Complete and apply review decisions
157+
## Review status
150158

151159
As reviewers take actions, the review progresses through several states:
152160

153161
| Review Status | Description |
154162
|--------------------|-----------------|
155-
| Initializing | Review created; waiting for custom data upload. |
163+
| Initializing | Review instance created; waiting for custom data upload. |
156164
| Active | Reviewers can take decisions in the My Access portal. |
157165
| Applying | Review decisions are being remediated. |
158166
| Applied | All decisions are marked as applied. |

0 commit comments

Comments
 (0)