Skip to content

Commit 63bc3d2

Browse files
authored
Update b2c-or-tenant-premium-license-sign-in-activities.md
Edit review per CI 5503
1 parent 86c769b commit 63bc3d2

1 file changed

Lines changed: 13 additions & 12 deletions

File tree

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
---
2-
title: Tenant doesn't have premium license when querying user sign-in activities using Microsoft Graph
3-
description: Provides solutions to the "either tenant is B2C or tenant doesn't have premium license" error when you query user sign-in activities using Microsoft Graph
2+
title: Tenant doesn't have premium license When You Query User Sign-in Activities By Using Microsoft Graph
3+
description: Provides solutions to the "either tenant is B2C or tenant doesn't have premium license" error when you query user sign-in activities by using Microsoft Graph
44
ms.date: 04/25/2025
55
ms.service: entra-id
66
ms.author: bachoang
77
ms.custom: sap:Getting access denied errors (Authorization)
88
---
99

10-
# Neither tenant is B2C or tenant doesn't have premium license when querying sign-in activities
10+
# "Neither tenant is B2C or tenant doesn't have premium license" error when you query sign-in activities
1111

12-
This article describes the error that occurs when you make Microsoft Graph API calls related to user sign-in activities or user registration details.
12+
This article discusses the error that occurs when you make Microsoft Graph API calls that are related to user sign-in activities or user registration details.
1313

1414
## Symptoms
1515

16-
When you run one of the following Microsoft Graph API calls, you might see this error:
16+
You run one of the following Microsoft Graph API calls:
1717

1818
```http
1919
GET https://graph.microsoft.com/v1.0/auditLogs/signIns
@@ -23,7 +23,7 @@ GET https://graph.microsoft.com/v1.0/users?$select=displayName,userPrincipalName
2323
GET https://graph.microsoft.com/v1.0/reports/UserRegistrationDetails
2424
```
2525

26-
Example response
26+
After you run the call, your receive an error response that resembles the following text:
2727

2828
```output
2929
'error': {
@@ -36,18 +36,19 @@ Example response
3636
}
3737
}
3838
```
39+
3940
## Solution
4041

4142
### Scenario 1: Query user sign-in activities
4243

43-
1. Make sure the target tenant has an Entra ID Premium P1 or P2 license. In the Azure portal, go to **Microsoft Entra ID**, select Overview, and then check the **License**. For more information, see [Sign up for Microsoft Entra ID P1 or P2 editions](/entra/fundamentals/get-started-premium).
44-
1. Verify that the Microsoft Graph Access Token has been granted the `AuditLog.Read.All` and `Directory.Read.All` permissions.
44+
1. Make sure that the target tenant has an Entra ID Premium P1 or P2 license. In the Azure portal, go to **Microsoft Entra ID**, select **Overview**, and then check the **License** value. For more information, see [Sign up for Microsoft Entra ID P1 or P2 editions](/entra/fundamentals/get-started-premium).
45+
1. Verify that the Microsoft Graph Access Token was granted the `AuditLog.Read.All` and `Directory.Read.All` permissions.
4546

4647
### Scenario 2: Query credential user registration details
4748

48-
1. Make sure the target tenant has an Entra ID Premium P1 or P2 license.
49-
1. Verify that the Microsoft Graph Access Token has been granted the `Reports.Read.All` permission.
50-
1. The authenticating user or the service principle of the application must be in one of these Administrative roles:
49+
1. Make sure that the target tenant has an Entra ID Premium P1 or P2 license.
50+
1. Verify that the Microsoft Graph Access Token was granted the `Reports.Read.All` permission.
51+
1. Verify that the authenticating user or the service principle of the application is in one of the following required administrative roles:
5152
- Reports Reader
5253
- Security Reader
5354
- Security Administrator
@@ -56,4 +57,4 @@ Example response
5657

5758
## More information
5859

59-
If an application is configured with only the **AuditLog.Read.All** permission, this error may occur intermittently. This is expected behavior, as the **Directory.Read.All** permission is required to retrieve tenant licensing information when it isn't already cached. Ensure both permissions are included to avoid this issue.
60+
If an application is configured by using only the **AuditLog.Read.All** permission, this error might occur intermittently. This is expected behavior because the **Directory.Read.All** permission is required to retrieve tenant licensing information if it isn't already cached. To avoid this error, make sure that both permissions are included.

0 commit comments

Comments
 (0)