Skip to main content

WebTitan

Grant Graph API Permissions to your App

The following permissions need to be granted to the app registration created following these steps in Azure AD:

API

Permission

Microsoft Graph

User.Read.All

Microsoft Graph

Group.Read.All

Microsoft Graph

AuditLog.Read.All

Azure Service Management

user_impersonate

Follow the steps below to grant these API permissions.

  1. Sign in to your Microsoft Azure portal Microsoft Azure Portal external_link.png.

  2. Enter active directory in search and select azure-active-directory-icon.jpg Azure Active Directory to open the Azure Active Directory page.

  3. From the side bar menu, select app-registrations-icon.jpgApp registrations.

  4. From the list of app registrations, select the DNS Proxy app registration and the app registration page opens.

    Note

    This is the app registration created following these steps. If you named your app registration something other than DNS Proxy, select that app registration from the list.

  5. On the app registration page, select api-permisions-icon.jpgAPI permissions from the side bar menu.

  6. Select WT-AAD-plus-icon.jpgAdd a permission and the Request API permissions page opens.

  7. Select Microsoft Graph.

    WT-AAD-App-MS-Graph.jpg
  8. Select Application permissions.

  9. Expand AuditLog and select AuditLog.Read.All.

    WT-AAD-audit-log-permissions.jpg
  10. Expand User and check User.Read.All.

    WT-AAD-user-permissions.jpg
  11. Expand Group and check Group.Read.All.

    WT-AAD-group-permissions.jpg
  12. Select Add permissions.

  13. Select WT-AAD-plus-icon.jpgAdd a permission and the Request API permissions page opens.

  14. Select Azure Service Management.

    WT-AAD-App-request-API-permissions.jpg
  15. Expand Permissions and select user_impersonation.

    WT-AAD-user-impersonation-permissions.jpg
  16. Select Add permissions.

  17. Select WT-AAD-check-icon.jpgGrant admin consent.

    WT-AAD-App-API-permissions.jpg