Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to content

Latest commit

 

History

History
25 lines (23 loc) · 1.55 KB

active-directory-b2c-permissions-directory.md

File metadata and controls

25 lines (23 loc) · 1.55 KB
author ms.service ms.subservice ms.topic ms.date ms.author
kengaderdus
active-directory-b2c
B2C
include
11/20/2023
kengaderdus

App registrations

  1. Under Manage, select API permissions.
  2. Under Configured permissions, select Add a permission.
  3. Select the Microsoft APIs tab, then select Microsoft Graph.
  4. Select Application permissions.
  5. Expand the appropriate permission group and select the check box of the permission to grant to your management application. For example:
    • User > User.ReadWrite.All: For user migration or user management scenarios.
    • Group > Group.ReadWrite.All: For creating groups, read and update group memberships, and delete groups.
    • AuditLog > AuditLog.Read.All: For reading the directory's audit logs.
    • Policy > Policy.ReadWrite.TrustFramework: For continuous integration/continuous delivery (CI/CD) scenarios. For example, custom policy deployment with Azure Pipelines.
  6. Select Add permissions. As directed, wait a few minutes before proceeding to the next step.
  7. Select Grant admin consent for (your tenant name).
  8. Sign in with an account in your Azure AD B2C tenant that has the Cloud Application Administrator role assigned to it, then select Grant admin consent for (your tenant name).
  9. Select Refresh, then verify that "Granted for ..." appears under Status. It might take a few minutes for the permissions to propagate.