Поделите своје повратне информације:
Желели бисмо ваше повратне информације о документима за програмере Мицрософт Теамс-а. Молимо Вас да одговорите на нашу кратку анкету са три питања.Узмите анкету
Овај прегледач више није подржан.
Надоградите на Microsoft Edge бисте искористили најновије функције, безбедносне исправке и техничку подршку.
Test resource-specific consent permissions in Teams
Чланак
Resource-specific consent (RSC) is an authorization framework built by Microsoft Teams and Microsoft identity that allows for granting scoped access to an application.
Through RSC, an authorized user can give an application access to the data of a specific instance of a resource type instead of every instance in the entire tenant. For example, a person who owns both team A and team B can decide to give the data for the Contoso app to only team A and not team B. The same concept of scoped data access applies to chats and meetings. For more information, see Resource-specific consent (RSC).
Prerequisites
Ensure that you verify the following app manifest changes for resource-specific consent before testing:
RSC permissions for app manifest version 1.12 and later
Add a webApplicationInfo key to your app manifest with the following values:
If the app is meant to support installation in both team and chat scopes, then both team and chat permissions can be specified in the same manifest under authorization.
RSC permissions for app manifest version 1.11 and earlier
Add a webApplicationInfo key to your app manifest with the following values:
If the app is meant to support installation in both team and chat scopes, then both team and chat permissions can be specified in the same manifest under applicationPermissions.
Важно
In your app manifest, only include the RSC permissions that you want your app to have.
Напомена
If the app is meant to access calling or media APIs, then the webApplicationInfo.Id should be the Microsoft Entra app ID of an Azure Bot Service.
Test added RSC permissions to a team using the Postman app
To check whether the RSC permissions are being honored by the API request payload, you need to copy the RSC JSON test code for team into your local environment and update the following values:
azureADAppId: Your app's Microsoft Entra app ID.
azureADAppSecret: Your Microsoft Entra app password.
token_scope: The scope is required to get a token. Set the value to https://graph.microsoft.com/.default.
teamGroupId: You can get the team group ID from the Teams client as follows:
In the Teams client, select Teams from the far left navigation bar.
Select the team where the app is installed from the dropdown menu.
Select the More options icon (⋯).
Select Get link to team.
Copy and save the groupId value from the string.
Test added RSC permissions to a chat using the Postman app
To check whether the RSC permissions are being honored by the API request payload, you need to copy the RSC JSON test code for chats into your local environment and update the following values:
azureADAppId: Your app's Microsoft Entra app ID.
azureADAppSecret: Your Microsoft Entra app password.
token_scope: The scope is required to get a token. Set the value to https://graph.microsoft.com/.default.
tenantId: The name or the Microsoft Entra Object ID of your tenant.
chatId: You can get the chat thread ID from the Teams web client as follows:
In the Teams web client, select Chat from the far left navigation bar.
Select the chat where the app is installed from the dropdown menu.
Copy the web URL and save the chat thread ID from the string.
Select File > Import > Import file to upload the updated JSON file from your environment.
Select the Collections tab.
Select the chevron > next to the Test RSC to expand the details view and see the API requests.
Execute the entire permissions collection for each API call. The permissions that you specified in your app manifest must succeed, while those not specified must fail with an HTTP 403 status code. Check all of the response status codes to confirm that the behavior of the RSC permissions in your app meets expectations.
Напомена
To test specific DELETE and READ API calls, add those instance scenarios to the JSON file.
Извор овог садржаја можете пронаћи на платформи GitHub, где можете и да креирате и прегледате проблеме и захтеве за повлачењем. Више информација потражите у нашем водичу за сараднике.
Platform Docs повратне информације
Platform Docs је пројекат отвореног кода. Изаберите везу да бисте обезбедили повратне информације:
Learn how to authenticate users with Microsoft identity platform, configure permissions, and retrieve user data for your Microsoft Teams app using the Microsoft Graph API.
Demonstrate skills to plan, deploy, configure, and manage Microsoft Teams to focus on efficient and effective collaboration and communication in a Microsoft 365 environment.
Microsoft Teams platform makes it easy for developers to build apps on Teams. Developers can integrate their own apps and services to improve productivity.