How to use Azure AD Graph API access for service principals?
问题 I have a working Azure AD/Azure daemon application using adal4j that uses user/password authentication. Due to issues with ADFS, I wish to also be able to authenticate using a service principal (client ID/secret). This seems to work fine for the Azure (non-AD) portion of the app, as the SP roles can be defined for the subscriptions in question, however for the Azure AD part, I get: response code 403, error: Authorization_RequestDenied: Insufficient privileges to complete the operation. ..