You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on May 17, 2024. It is now read-only.
$dictionary=@{ "Enter_the_Application_Id_Here"=$clientAadApplication.AppId;"Enter_the_Tenant_Info_Here"=$tenantId;"Enter_the_Web_Api_Application_Id_Here"=$clientAadApplication.AppId;"Enter the object ID for GroupAdmin group copied from Azure Portal"=$GroupAdmin.objectId;"Enter the object ID for GroupMember group copied from Azure Portal"=$GroupMember.objectId };
439
+
$dictionary=@{ "Enter_the_Application_Id_Here"=$clientAadApplication.AppId;"Enter_the_Tenant_Info_Here"=$tenantId;"Enter_the_Web_Api_Application_Id_Here"=$clientAadApplication.AppId;"Enter the object ID for GroupAdmin group copied from Azure Portal"=$GroupAdmin.Id;"Enter the object ID for GroupMember group copied from Azure Portal"=$GroupMember.Id };
442
440
443
441
Write-Host"Updating the sample config '$configFile' with the following config values:"-ForegroundColor Green
Copy file name to clipboardExpand all lines: 5-AccessControl/2-call-api-groups/README.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -177,7 +177,7 @@ To manually register the apps, as a first step you'll need to:
177
177
1. The generated key value will be displayed when you select the **Add** button. Copy and save the generated value for use in later steps.
178
178
1. You'll need this key later in your code's configuration files. This key value will not be displayed again, and is not retrievable by any other means, so make sure to note it from the Azure portal before navigating to any other screen or blade.
179
179
> :bulb: For enhanced security, instead of using client secrets, consider [using certificates](https://github.com/AzureAD/microsoft-identity-web/wiki/Certificates) and [Azure KeyVault](https://azure.microsoft.com/services/key-vault/#product-overview).
180
-
1. In the app's registration screen, select the **Expose an API** blade to the left to open the page where you can publish the permission as an API for which client applications can obtain [access tokens](https://aka.ms/access-tokens) for. The first thing that we need to do is to declare the unique [resource](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow) URI that the clients will be using to obtain access tokens for this API. To declare an resource URI(Application ID URI), follow the following steps:
180
+
1. In the app's registration screen, select the **Expose an API** blade to the left to open the page where you can publish the permission as an API for which client applications can obtain [access tokens](https://aka.ms/access-tokens) for. The first thing that we need to do is to declare the unique [resource](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-auth-code-flow) URI that the clients will be using to obtain access tokens for this API. To declare an resource URI(Application ID URI), follow the following steps:
181
181
1. Select **Set** next to the **Application ID URI** to generate a URI that is unique for this app.
182
182
1. For this sample, accept the proposed Application ID URI (`api://{clientId}`) by selecting **Save**. Read more about Application ID URI at [Validation differences by supported account types \(signInAudience\)](https://docs.microsoft.com/azure/active-directory/develop/supported-accounts-validation).
183
183
@@ -206,16 +206,18 @@ To manually register the apps, as a first step you'll need to:
206
206
1. Select the **Add a permission** button and then:
207
207
1. Ensure that the **My APIs** tab is selected.
208
208
1. In the list of APIs, select the API `msal-angular-app`.
209
-
* Since this app signs-in users, we will now proceed to select **delegated permissions**, which is is requested by apps when signing-in users.
210
-
1. In the **Delegated permissions** section, select **access_via_group_assignments** in the list. Use the search box if necessary.
209
+
1. Select **delegated permissions**, which is is requested by apps when signing-in users.
210
+
1. In the **Delegated permissions** section, select **access_via_group_assignments** in the list. Use the search box if necessary.
211
211
1. Select the **Add permissions** button at the bottom.
212
212
1. Select the **Add a permission** button and then:
213
213
1. Ensure that the **Microsoft APIs** tab is selected.
214
214
1. In the *Commonly used Microsoft APIs* section, select **Microsoft Graph**
215
-
* Since this app signs-in users, we will now proceed to select **delegated permissions**, which is is requested by apps when signing-in users.
216
-
1. In the **Delegated permissions** section, select **User.Read**, **GroupMember.Read.All** in the list. Use the search box if necessary.
215
+
1. Select **delegated permissions**, which is is requested by apps when signing-in users.
216
+
1. In the **Delegated permissions** section, select **User.Read**, **GroupMember.Read.All** in the list. Use the search box if necessary.
217
217
1. Select the **Add permissions** button at the bottom.
218
218
219
+
> :warning: For the overage scenario, make sure you have granted **Admin Consent** for the MS Graph API's **GroupMember.Read.All** scope (see the **App Registration** steps above).
220
+
219
221
##### Configure Optional Claims
220
222
221
223
1. Still on the same app registration, select the **Token configuration** blade to the left.
0 commit comments