azure-ad-graph-api

Azure AD B2C - Sign out a user from all sessions

匆匆过客 提交于 2019-12-07 06:10:51
问题 I have 3 websites using a single B2C tenant. I have been asked to set it up so that when a user signs out of one website, sign out of them all. Likewise if their account is deleted. I thought that I would have to introduce a call to Azure on every request to determine if the user is still logged in, but as far as I can see, there isn't a Graph API endpoint that would allow me to determine the user status. Am I thinking about this the wrong way? Is there a way to do this easily using B2C,

Using Microsoft graph API to retrieve a specific attribute

梦想的初衷 提交于 2019-12-07 02:10:27
Hi (i'm new to this so you'll need to forgive me), I'm trying to use Microsoft Graph API to retrieve some user attributes from active directory. I'm conducting some testing on Microsoft graph explorer but i'm not entirely sure how to retrive a specific attribute called employeeID (which is needed). I've found out how to retrive some of the other basic information i need using the following: https://graph.microsoft.com/v1.0/me Which returns: { "@odata.context": "https://graph.microsoft.com/v1.0/$metadata#users/$entity", "id": "6df92a63-2bef-477c-8c84-bf1113d5bd3e", "businessPhones": [],

How to use Azure AD Graph API access for service principals?

回眸只為那壹抹淺笑 提交于 2019-12-06 21:11:22
I have a working Azure AD/Azure daemon application using adal4j that uses user/password authentication. Due to issues with ADFS, I wish to also be able to authenticate using a service principal (client ID/secret). This seems to work fine for the Azure (non-AD) portion of the app, as the SP roles can be defined for the subscriptions in question, however for the Azure AD part, I get: response code 403, error: Authorization_RequestDenied: Insufficient privileges to complete the operation. ...this occurs on the first call to the Graph API - I get valid tokens from AuthenticationContext

How to use Azure AD Graph API access for service principals?

蓝咒 提交于 2019-12-06 21:10:34
I have a working Azure AD/Azure daemon application using adal4j that uses user/password authentication. Due to issues with ADFS, I wish to also be able to authenticate using a service principal (client ID/secret). This seems to work fine for the Azure (non-AD) portion of the app, as the SP roles can be defined for the subscriptions in question, however for the Azure AD part, I get: response code 403, error: Authorization_RequestDenied: Insufficient privileges to complete the operation. ...this occurs on the first call to the Graph API - I get valid tokens from AuthenticationContext

Possible to update an Exchange o365 Online meeting Location to another room with graphapi or graph explorer

最后都变了- 提交于 2019-12-06 19:39:35
I am able to update the meeting event but does not update location to an actual room on Azure Active directory, only updates to text. So say someroom is an meeting room.. we only get "someroom" text location. Is this possible? how Trying this. Also read maybe I need location.AdditonalData , but see no examples anywhere. PATCH : Event_URL Body PAYLOAD : { "subject": "Test Graph 2", "location": { "displayName": "someroom", "locationEmailAddress": "someroom@mydomain.onmicrosoft.com", "address": { "@odata.type": "microsoft.graph.physicalAddress" } } } also tried this: endpoint: https://graph

Authorization_IdentityNotFound on Microsoft Graph API request

吃可爱长大的小学妹 提交于 2019-12-06 16:10:29
问题 I'm trying to develop an app in my enterprise and I've followed this tutorial to get access to the AD users information. Meaning: I created an app in https://apps.dev.microsoft.com/ I set User.Read.All in Application Permissions and User.Read in Delegated Permissions With this done I'm able to successfully login (Azure AD OAuth2 with https://graph.microsoft.com/ as resource and User.Read as scope) and get a correct response from https://graph.microsoft.com/v1.0/me . Ask the Admin for the

Correct Graph API to manage Azure AD B2C

China☆狼群 提交于 2019-12-06 15:53:48
Am I misinterpreting this -- see image? I go to documentation for managing Azure AD B2C, it tells me to use Azure AD Graph API, not Microsoft Graph API. Then I click the link to go to Azure AD Graph API, it tells me to use the Microsoft Graph API, not the Azure AD Graph API. Two questions: What do I use to manage users in Azure AD B2C? Microsoft Graph API or Azure AD Graph API? What's the easiest and most painless way to interact with the Graph API I should be using -- based on your answer to question #1? Can I use a tool like Postman? If I'm not mistaken, these are RESTful APIs. What do I use

Role Count using Graph Api against a tenant

瘦欲@ 提交于 2019-12-06 14:35:29
问题 Is there a way to find each role that exists against a tenant and number of users which have been assigned against each role using GraphServiceClient or GraphConnection class? I am using C#. 回答1: Directory Roles - Finding all directory roles and count of their members for tenant I have given sample code for both Microsoft Graph API (https://graph.microsoft.com) as well as Azure AD Graph API (https://graph.windows.net), but it would be strongly recommended to use newer Microsoft Graph API

Office 365 v2 API Authorization code is malformed or invalid

爱⌒轻易说出口 提交于 2019-12-06 13:49:02
问题 I've the following auth code copied from the browser for a user who granted our app to use their Office 365 email. code=OAQABAAIAAADRNYRQ3dhRSrm-4K-adpCJ3J3UJ8GyC2qJDvNhlrUAObjph6sQ3A9waeQ5Tr-DA6WzxCdFbvadCRJw2S4a_lwA7MyelZWAPQZOlaB_X_1165CbmTXJMGioU6Cr0DhVTUzIlUv_-Svjp8DBrLVCxcDp5rJMM5mDNR0iGysuDIozWnOaPqCOl35NxPzyktrYK6D1MBptmXOPbhS-stTZXbHJr9gGE3FHzMU0XANXmTm30q4SPaoWPch-S1uFFL4xwS2oUv-lELBdcfIGh5UJBSraabGihVWUnbwBhh8eURSMRwryi7kubUcq0D27S

authContext.AcquireTokenSilentAsync throwing error

梦想与她 提交于 2019-12-06 11:35:56
I have taken reference from this git project. This project has code to connect and get information about User Profile. While running the project i saw i am not able to get successful result from below code- result = await authContext.AcquireTokenSilentAsync(graphResourceId, credential, new UserIdentifier(userObjectID, UserIdentifierType.UniqueId)); Here is full code- // Get the access token from the cache string userObjectID = ClaimsPrincipal.Current.FindFirst("http://schemas.microsoft.com/identity/claims/objectidentifier") .Value; string authority = String.Format(CultureInfo.InvariantCulture,