Skip to content

Commit d824593

Browse files
authored
Add 'trustedCertificateAuthority' to restrictionType
1 parent 61626e6 commit d824593

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

api-reference/beta/resources/keycredentialconfiguration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ None.
2727
| certificateBasedApplicationConfigurationIds | String collection | Collection of GUIDs that represent [certificateBasedApplicationConfiguration](../resources/certificatebasedapplicationconfiguration.md) that is allowed as root and intermediate certificate authorities.|
2828
| maxLifetime | Duration | String value that indicates the maximum lifetime for key expiration, defined as an ISO 8601 duration. For example, `P4DT12H30M5S` represents four days, 12 hours, 30 minutes, and five seconds. This property is required when **restrictionType** is set to `keyLifetime`.|
2929
| restrictForAppsCreatedAfterDateTime | DateTimeOffset | Specifies the date from which the policy restriction applies to newly created applications. For existing applications, the enforcement date can be retroactively applied.|
30-
| restrictionType | appKeyCredentialRestrictionType | A unique identifier key for **keyCredentialConfiguration**. This value also represents the type of restriction being applied. Possible values are `asymmetricKeyLifetime`, and `unknownFutureValue`. Each value of restrictionType can be used only once per policy.|
30+
| restrictionType | appKeyCredentialRestrictionType | A unique identifier key for **keyCredentialConfiguration**. This value also represents the type of restriction being applied. Possible values are `asymmetricKeyLifetime`, `trustedCertificateAuthority`, and `unknownFutureValue`. Each value of restrictionType can be used only once per policy.|
3131
| state | appManagementRestrictionState | Indicates whether the restriction is evaluated. The possible values are: `enabled`, `disabled`, `unknownFutureValue`. If `enabled`, the restriction is evaluated. If `disabled`, the restriction isn't evaluated or enforced.|
3232
| excludeActors | [appManagementPolicyActorExemptions](appmanagementpolicyactorexemptions.md) | Collection of custom security attribute exemptions. If an actor user or service principal has the custom security attribute defined in this section, they're exempted from the restriction. This means that calls the user or service principal makes to create or update apps are exempt from this policy enforcement. |
3333

0 commit comments

Comments
 (0)