Skip to content

Commit 0340d9b

Browse files
authored
Merge branch 'main' into patch-3
2 parents 15a19f4 + 5fb9b29 commit 0340d9b

File tree

1,477 files changed

+3472
-3170
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,477 files changed

+3472
-3170
lines changed
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
name: (Scheduled) Auto issue assign
2+
3+
permissions:
4+
issues: write
5+
6+
on:
7+
schedule:
8+
- cron: "0 17 * * *"
9+
10+
workflow_dispatch:
11+
12+
13+
jobs:
14+
15+
stale-branch:
16+
if: github.repository_owner == 'MicrosoftDocs'
17+
uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-AutoIssueAssign.yml@workflows-prod
18+
with:
19+
PayloadJson: ${{ toJSON(github) }}
20+
ExcludedUserList: '["user1", "user2"]'
21+
22+
secrets:
23+
AccessToken: ${{ secrets.GITHUB_TOKEN }}
24+
PrivateKey: ${{ secrets.M365_APP_PRIVATE_KEY }}
25+
ClientId: ${{ secrets.M365_APP_CLIENT_ID }}

.github/workflows/AutoPublish.yml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
12
name: (Scheduled) Publish to live
23

34
permissions:
@@ -7,8 +8,8 @@ permissions:
78

89
on:
910
schedule:
10-
# - cron: "25 2,5,8,11,14,17,20,22 * * *" # Times are UTC based on Daylight Saving Time (~Mar-Nov). Scheduling at :25 to account for queuing lag.
11-
- cron: "25 3,6,9,12,15,18,21,23 * * *" # Times are UTC based on Standard Time (~Nov-Mar). Scheduling at :25 to account for queuing lag.
11+
- cron: "25 2,5,8,11,14,17,20,22 * * *" # Times are UTC based on Daylight Saving Time (~Mar-Nov). Scheduling at :25 to account for queuing lag.
12+
# - cron: "25 3,6,9,12,15,18,21,23 * * *" # Times are UTC based on Standard Time (~Nov-Mar). Scheduling at :25 to account for queuing lag.
1213

1314
workflow_dispatch:
1415

@@ -25,4 +26,4 @@ jobs:
2526
secrets:
2627
AccessToken: ${{ secrets.GITHUB_TOKEN }}
2728
PrivateKey: ${{ secrets.M365_APP_PRIVATE_KEY }}
28-
ClientId: ${{ secrets.M365_APP_CLIENT_ID }}
29+
ClientId: ${{ secrets.M365_APP_CLIENT_ID }}

exchange/docfx.json

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@
7878
"uhfHeaderId": "MSDocsHeader-M365-IT",
7979
"author": "chrisda",
8080
"ms.author": "chrisda",
81-
"manager": "serdars",
81+
"manager": "bagol",
8282
"ms.date": "09/25/2017",
8383
"ms.topic": "reference",
8484
"ms.service": "exchange-powershell",
@@ -88,16 +88,28 @@
8888
],
8989
"ms.devlang": "powershell",
9090
"feedback_system": "Standard",
91-
"feedback_product_url": "https://github.com/MicrosoftDocs/office-docs-powershell/issues"
91+
"feedback_product_url": "https://github.com/MicrosoftDocs/office-docs-powershell/issues"
9292
},
9393
"fileMetadata": {
9494
"apiPlatform": {
9595
"exchange-ps/exchange/**/*.yml": [
9696
"powershell"
97+
],
98+
"contributors_to_exclude": [
99+
"aditisrivastava07",
100+
"AGuentherinWA",
101+
"claydetels19",
102+
"dstrome",
103+
"garycentric",
104+
"padmagit77",
105+
"rjagiewich",
106+
"Ruchika-mittal01",
107+
"Shipra-M09",
108+
"techtoons"
97109
]
98110
}
99111
},
100112
"template": [],
101113
"dest": "exchange-ps"
102114
}
103-
}
115+
}

exchange/docs-conceptual/app-only-auth-powershell-v2.md

Lines changed: 48 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,22 @@
11
---
22
title: App-only authentication in Exchange Online PowerShell and Security & Compliance PowerShell
3-
ms.author: chrisda
4-
author: chrisda
5-
manager: orspodek
6-
ms.date: 12/05/2025
3+
ms.date: 03/11/2026
74
ms.audience: Admin
8-
audience: Admin
95
ms.topic: article
106
ms.service: exchange-online
117
ms.reviewer:
128
ms.localizationpriority: high
139
ms.collection: Strat_EX_Admin
1410
ms.custom:
1511
ms.assetid:
16-
search.appverid: MET150
1712
description: "Learn how to configure app-only authentication (also known as certificate based authentication or CBA) using the Exchange Online PowerShell V3 module in scripts and other long-running tasks."
1813
---
1914

2015
# App-only authentication for unattended scripts in Exchange Online PowerShell and Security & Compliance PowerShell
2116

2217
Auditing and reporting scenarios in Microsoft 365 often involve unattended scripts in Exchange Online PowerShell and Security & Compliance PowerShell. In the past, unattended sign in required you to store the username and password in a local file or in a secret vault accessed at run-time. But, as we all know, storing user credentials locally isn't a good security practice.
2318

24-
Certificate based authentication (CBA) or app-only authentication as described in this article supports unattended script and automation scenarios by using Microsoft Entra apps and self-signed certificates.
19+
Certificate based authentication (CBA) or app-only authentication as described in this article supports unattended script and automation scenarios by using Microsoft Entra apps and certificates.
2520

2621
> [!NOTE]
2722
>
@@ -154,22 +149,20 @@ For a detailed visual flow about creating applications in Microsoft Entra ID, se
154149
155150
An application object has the **Delegated** API permission **Microsoft Graph** \> **User.Read** by default. For the application object to access resources in Exchange, it needs the **Application** API permission **Office 365 Exchange Online** \> **Exchange.ManageAsApp**.
156151
157-
3. [Generate a self-signed certificate](#step-3-generate-a-self-signed-certificate)
152+
3. [Generate a certificate](#step-3-generate-a-certificate)
158153
159154
- For app-only authentication in Microsoft Entra ID, you typically use a certificate to request access. Anyone who has the certificate and its private key can use the app with the permissions granted to the app.
160155
161-
- Create and configure a self-signed X.509 certificate, which is used to authenticate your Application against Microsoft Entra ID, while requesting the app-only access token.
156+
- Create and configure an X.509 certificate, which is used to authenticate your Application against Microsoft Entra ID, while requesting the app-only access token. The certificate can be self-signed.
162157
163-
- This procedure is similar to generating a password for user accounts. The certificate can be self-signed as well. See [this section](#step-3-generate-a-self-signed-certificate) later in this article for instructions to generate certificates in PowerShell.
158+
- This procedure is similar to generating a password for user accounts. See [this section](#step-3-generate-a-certificate) later in this article for instructions to generate certificates in PowerShell.
164159
165160
> [!NOTE]
166-
> Cryptography: Next Generation (CNG) certificates aren't supported for app-only authentication with Exchange. CNG certificates are created by default in modern versions of Windows. You must use a certificate from a CSP key provider. [This section](#step-3-generate-a-self-signed-certificate) section covers two supported methods to create a CSP certificate.
161+
> Cryptography: Next Generation (CNG) certificates aren't supported for app-only authentication with Exchange. CNG certificates are created by default in modern versions of Windows. You must use a certificate from a CSP key provider. [This section](#step-3-generate-a-certificate) section covers two supported methods to create a CSP certificate.
167162
168163
4. [Attach the certificate to the Microsoft Entra application](#step-4-attach-the-certificate-to-the-microsoft-entra-application)
169164
170-
5. [Assign Microsoft Entra roles to the application](#step-5-assign-microsoft-entra-roles-to-the-application)
171-
172-
The application needs to have the appropriate RBAC roles assigned. Because the apps are provisioned in Microsoft Entra ID, you can use any of the supported built-in roles.
165+
5. [Assign roles permissions to the application](#step-5-assign-role-permissions-to-the-application)
173166
174167
### Step 1: Register the application in Microsoft Entra ID
175168
@@ -339,27 +332,36 @@ Choose **one** of the following methods in this section to assign API permission
339332
340333
6. Close the current **API permissions** page (not the browser tab) to return to the **App registrations** page. You use the **App registrations** page in an upcoming step.
341334
342-
### Step 3: Generate a self-signed certificate
335+
<a name="step-3-generate-a-self-signed-certificate"></a>
343336
344-
Create a self-signed x.509 certificate using one of the following methods:
337+
### Step 3: Generate a certificate
345338
346-
- (Recommended) Use the [New-SelfSignedCertificate](/powershell/module/pki/new-selfsignedcertificate), [Export-Certificate](/powershell/module/pki/export-certificate), and [Export-PfxCertificate](/powershell/module/pki/export-pfxcertificate) cmdlets in an elevated (run as administrator) Windows PowerShell session to request a self-signed certificate and export it to `.cer` and `.pfx` (SHA1 by default). For example:
339+
> [!NOTE]
340+
> Cryptography: Next Generation (CNG) certificates aren't supported for app-only authentication as described in this article. CNG certificates are created by default in modern Windows versions. You need to use a certificate from a CSP key provider.
341+
>
342+
> You can use a self-signed certificate, a certificate issued by an internal public key infrastructure or PKI (for example, Active Directory Certificate Services or AD CS), or a certificate issued by a trusted commercial certificate authority (CA).
343+
>
344+
> The only requirements for the X.509 certificate are an exportable and available private key (.pfx) and public certificate (.cer).
347345
348-
```powershell
349-
# Create certificate
350-
$mycert = New-SelfSignedCertificate -DnsName "contoso.org" -CertStoreLocation "cert:\CurrentUser\My" -NotAfter (Get-Date).AddYears(1) -KeySpec KeyExchange
346+
For a **self-signed certificate**, use one of the following methods:
351347
352-
# Export certificate to .pfx file
353-
$mycert | Export-PfxCertificate -FilePath mycert.pfx -Password (Get-Credential).password
348+
- (Recommended): Use the [New-SelfSignedCertificate](/powershell/module/pki/new-selfsignedcertificate), [Export-Certificate](/powershell/module/pki/export-certificate) and [Export-PfxCertificate](/powershell/module/pki/export-pfxcertificate) cmdlets in an elevated PowerShell session (a PowerShell window you opened after selecting **Run as administrator**) to request a self-signed certificate and export the certificate's private and public keys to files (SHA1 by default). For example:
354349
355-
# Export certificate to .cer file
356-
$mycert | Export-Certificate -FilePath mycert.cer
357-
```
350+
```powershell
351+
# Create a self-signed certificate
352+
$mycert = New-SelfSignedCertificate -DnsName "contoso.org" -CertStoreLocation "cert:\CurrentUser\My" -NotAfter (Get-Date).AddYears(1) -KeySpec KeyExchange
353+
354+
# Export the X.509 certificate and the associated private key to a password-protected .pfx file
355+
$mycert | Export-PfxCertificate -FilePath mycert.pfx -Password (Get-Credential).password
356+
357+
# Export the X.509 public certificate to a .cer file
358+
$mycert | Export-Certificate -FilePath mycert.cer
359+
```
358360
359361
- Use the [Create-SelfSignedCertificate script](https://github.com/SharePoint/PnP-Partner-Pack/blob/master/scripts/Create-SelfSignedCertificate.ps1) script to generate SHA1 certificates.
360362
361363
```powershell
362-
.\Create-SelfSignedCertificate.ps1 -CommonName "MyCompanyName" -StartDate 2021-01-06 -EndDate 2022-01-06
364+
.\Create-SelfSignedCertificate.ps1 -CommonName "MyCompanyName" -StartDate 2026-01-06 -EndDate 2027-01-06
363365
```
364366
365367
### Step 4: Attach the certificate to the Microsoft Entra application
@@ -380,12 +382,10 @@ After you register the certificate with your application, you can use the privat
380382

381383
![Select Upload certificate on the Certificates & secrets page.](media/exo-app-only-auth-select-upload-certificate.png)
382384

383-
In the dialog that opens, browse to the self-signed certificate (`.cer` file) that you created in [Step 3](#step-3-generate-a-self-signed-certificate).
385+
In the **Upload certificate** flyout that opens, browse to the public certificate (`.cer` file) you exported in [Step 3](#step-3-generate-a-certificate), and then select **Add**.
384386

385387
![Browse to the certificate and then select Add.](media/exo-app-only-auth-upload-certificate-dialog.png)
386388

387-
When you're finished, select **Add**.
388-
389389
The certificate is now shown in the **Certificates** section.
390390

391391
![Application page showing that the certificate was added.](media/exo-app-only-auth-certificate-successfully-added.png)
@@ -404,19 +404,28 @@ If you made the application multitenant for **Exchange Online** delegated scenar
404404

405405
For more information about the URL syntax, see [Request the permissions from a directory admin](/entra/identity-platform/v2-admin-consent#request-the-permissions-from-a-directory-admin).
406406

407-
### Step 5: Assign Microsoft Entra roles to the application
407+
<a name="step-5-assign-microsoft-entra-roles-to-the-application"></a>
408+
409+
### Step 5: Assign role permissions to the application
410+
411+
You have the following options:
412+
413+
- [Option 1: Assign Microsoft Entra roles to the application](#option-1-assign-microsoft-entra-roles-to-the-application): Use built-in Microsoft Entra roles to grant all permissions of the role. You can't customize or scope these roles.
414+
415+
- [Option 2: Assign custom role groups to the application using service principals](#option-2-assign-custom-role-groups-to-the-application-using-service-principals): We recommend this option in the following scenarios:
416+
- You need to restrict the available commands in your application.
417+
- You need to use a Write scope to limit which recipients can be modified.
408418

409-
You have two options:
419+
- <u>Option 3: Combine Microsoft Entra roles with custom role groups</u>: RBAC combines permissions from all sources. We recommend this method to extend the capabilities of a built-in Microsoft Entra role. For example, you can extend the capabilities of the **Exchange Recipient Administrator** role by granting extra permissions from a custom role.
410420

411-
- **Assign Microsoft Entra roles to the application**
412-
- **Assign custom role groups to the application using service principals**: This method is supported only when you connect to Exchange Online PowerShell or Security & Compliance PowerShell in [REST API mode](exchange-online-powershell-v2.md#rest-api-connections-in-the-exo-v3-module). Security & Compliance PowerShell supports REST API mode in v3.2.0 or later.
421+
These options are described in the following subsections.
413422

414423
> [!NOTE]
415-
> You can also combine both methods to assign permissions. For example, you can use Microsoft Entra roles for the "Exchange Recipient Administrator" role and also assign your custom RBAC role to extend the permissions.
416-
>
417424
> For multitenant applications in **Exchange Online** delegated scenarios, you need to assign permissions in each customer tenant.
418425
419-
#### Assign Microsoft Entra roles to the application
426+
<a name="assign-microsoft-entra-roles-to-the-application"></a>
427+
428+
#### Option 1: Assign Microsoft Entra roles to the application
420429

421430
The supported Microsoft Entra roles are described in the following table:
422431

@@ -487,12 +496,12 @@ For general instructions about assigning roles in Microsoft Entra ID, see [Assig
487496

488497
![The role assignments page after to added the app to the role for Security & Compliance PowerShell.](media/exo-app-only-auth-app-assigned-to-role-scc.png)
489498

490-
#### Assign custom role groups to the application using service principals
499+
<a name="assign-custom-role-groups-to-the-application-using-service-principals"></a>
500+
501+
#### Option 2: Assign custom role groups to the application using service principals
491502

492503
> [!NOTE]
493504
> You need to connect to Exchange Online PowerShell or Security & Compliance PowerShell _before_ completing steps to create a new service principal. Creating a new service principal without connecting to PowerShell doesn't work (your Azure App ID and Object ID are needed to create the new service principal).
494-
>
495-
> This method is supported only when you connect to Exchange Online PowerShell or Security & Compliance PowerShell in [REST API mode](exchange-online-powershell-v2.md#rest-api-connections-in-the-exo-v3-module). Security & Compliance PowerShell supports REST API mode in v3.2.0 or later.
496505
497506
For information about creating custom role groups, see [Create role groups in Exchange Online](/exchange/permissions-exo/role-groups#create-role-groups) and [Create Email & collaboration role groups in the Microsoft Defender portal](/defender-office-365/mdo-portal-permissions#create-email--collaboration-role-groups-in-the-microsoft-defender-portal). The custom role group that you assign to the application can contain any combination of built-in and custom roles.
498507

exchange/docs-conceptual/cmdlet-property-sets.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,13 @@
11
---
22
title: Property sets in Exchange Online PowerShell module cmdlets
3-
ms.author: chrisda
4-
author: chrisda
5-
manager: orspodek
63
ms.date: 9/1/2023
74
ms.audience: Admin
8-
audience: Admin
95
ms.topic: article
10-
ms.service: exchange-powershell
116
ms.reviewer:
127
ms.localizationpriority: high
138
ms.collection: Strat_EX_Admin
149
ms.custom:
1510
ms.assetid:
16-
search.appverid: MET150
1711
description: "Admins can lear about the property sets that are available in the nine exclusive Get-EXO cmdlets in the Exchange Online PowerShell V2 module and V3 module."
1812
---
1913

exchange/docs-conceptual/connect-exo-powershell-managed-identity.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,14 @@
11
---
22
title: Use Azure managed identities to connect to Exchange Online PowerShell
3-
ms.author: chrisda
4-
author: chrisda
5-
manager: orspodek
63
ms.date: 8/24/2023
74
ms.audience: Admin
8-
audience: Admin
95
ms.topic: article
106
ms.service: exchange-online
117
ms.reviewer:
128
ms.localizationpriority: high
139
ms.collection: Strat_EX_Admin
1410
ms.custom:
1511
ms.assetid:
16-
search.appverid: MET150
1712
description: "Learn about using the Exchange Online PowerShell V3 module and Azure managed identity to connect to Exchange Online PowerShell."
1813
---
1914

exchange/docs-conceptual/connect-to-exchange-online-powershell.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,13 @@
11
---
22
title: Connect to Exchange Online PowerShell
3-
author: chrisda
4-
manager: orspodek
53
ms.date: 07/11/2025
64
ms.audience: Admin
7-
audience: Admin
85
ms.topic: article
9-
ms.service: exchange-powershell
106
ms.reviewer:
117
ms.localizationpriority: high
128
ms.collection: Strat_EX_Admin
139
ms.custom:
1410
ms.assetid:
15-
search.appverid: MET150
1611
description: "Learn how to use the Exchange Online PowerShell V3 module to connect to Exchange Online PowerShell with modern authentication and/or multifactor authentication (MFA)."
1712
---
1813

exchange/docs-conceptual/connect-to-exchange-servers-using-remote-powershell.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,8 @@
11
---
22
title: "Connect to Exchange servers using remote PowerShell"
3-
ms.author: chrisda
4-
author: chrisda
5-
manager: orspodek
63
ms.date: 01/23/2026
74
ms.audience: ITPro
8-
audience: ITPro
95
ms.topic: article
10-
ms.service: exchange-powershell
116
ms.localizationpriority: high
127
ms.collection: Strat_EX_Admin
138
ms.custom:

exchange/docs-conceptual/connect-to-exo-powershell-c-sharp.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,14 @@
11
---
22
title: Use C# to connect to Exchange Online PowerShell
3-
ms.author: chrisda
4-
author: chrisda
5-
manager: orspodek
63
ms.date: 8/21/2023
74
ms.audience: Admin
8-
audience: Admin
95
ms.topic: article
106
ms.service: exchange-online
117
ms.reviewer:
128
ms.localizationpriority: high
139
ms.collection: Strat_EX_Admin
1410
ms.custom:
1511
ms.assetid:
16-
search.appverid: MET150
1712
description: "Learn about using the Exchange Online PowerShell V3 module and C# to connect to Exchange Online."
1813
---
1914

exchange/docs-conceptual/connect-to-scc-powershell.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,13 @@
11
---
22
title: Connect to Security & Compliance PowerShell
3-
author: chrisda
4-
manager: orspodek
53
ms.date: 12/05/2025
64
ms.audience: Admin
7-
audience: Admin
85
ms.topic: article
9-
ms.service: exchange-powershell
106
ms.reviewer:
117
ms.localizationpriority: high
128
ms.collection: Strat_EX_Admin
139
ms.custom:
1410
ms.assetid:
15-
search.appverid: MET150
1611
description: "Learn how to use the Exchange Online PowerShell V3 module to connect to Security & Compliance PowerShell with modern authentication and/or multifactor authentication (MFA)."
1712
---
1813

0 commit comments

Comments
 (0)