@@ -1056,7 +1056,7 @@ microsoft.policies {
10561056 // Identity security default enforcement policy
10571057 identitySecurityDefaultsEnforcementPolicy() dict
10581058 // Admin consent request policy
1059- adminConsentRequestPolicy() dict
1059+ adminConsentRequestPolicy() microsoft.adminConsentRequestPolicy
10601060 // Permission grant policies
10611061 permissionGrantPolicies() []dict
10621062 // Consent policy settings
@@ -1065,6 +1065,30 @@ microsoft.policies {
10651065 authenticationMethodsPolicy() microsoft.policies.authenticationMethodsPolicy
10661066}
10671067
1068+ private microsoft.adminConsentRequestPolicy @defaults("isEnabled notifyReviewers") {
1069+ // Specifies whether the admin consent request feature is enabled or disabled
1070+ isEnabled bool
1071+ // Specifies whether reviewers will receive notifications
1072+ notifyReviewers bool
1073+ // Specifies whether reviewers will receive reminder emails
1074+ remindersEnabled bool
1075+ // Specifies the duration the request is active before it automatically expires if no decision is applied
1076+ requestDurationInDays int
1077+ // The list of reviewers for the admin consent
1078+ reviewers []microsoft.graph.accessReviewReviewerScope
1079+ // Specifies the version of this policy
1080+ version int
1081+ }
1082+
1083+ private microsoft.graph.accessReviewReviewerScope @defaults("query queryType") {
1084+ // The query specifying who will be the reviewer
1085+ query string
1086+ // In the scenario where reviewers need to be specified dynamically, this property is used to indicate the relative source of the query
1087+ queryRoot string
1088+ // The type of query
1089+ queryType string
1090+ }
1091+
10681092// The tenant-wide policy that controls which authentication methods are allowed
10691093private microsoft.policies.authenticationMethodsPolicy @defaults("displayName") {
10701094 // Policy ID
0 commit comments