Skip to content

Commit 6b376ae

Browse files
authored
Updates from editor
1 parent 1a80454 commit 6b376ae

1 file changed

Lines changed: 7 additions & 7 deletions

File tree

support/entra/entra-id/users-groups-entra-apis/cannot-look-up-users-using-microsoft-graph-users-endpoint.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,24 @@
11
---
2-
title: Can't look up users using Microsoft Graph /users endpoint
2+
title: Can't Look Up Users Using Microsoft Graph /Users Endpoint
33
description: Provides a solution to an issue where a user can't look up other users using the Microsoft Graph /users endpoint when a tenant policy configuration restricts access.
4-
ms.date: 04/23/2025
4+
ms.date: 04/30/2025
55
ms.service: entra-id
66
ms.custom: sap:Getting access denied errors (Authorization)
77
ms.reviewer: daga, v-weizhu
88
---
9-
# 401 HTTP response when looking up users using Microsoft Graph /users endpoint
9+
# 401 HTTP response when looking up users using the Microsoft Graph /users endpoint
1010

11-
You can use the Microsoft Graph endpoint to interact programmatically with your tenant data. A common scenario is a Microsoft Graph `/users` endpoint to look up users in the tenant. In this scenario, if you use delegated permissions in your access token, the `User.Read.All` permission is necessary. There are ways to prevent you from looking up other users, for example, using an [authorizationPolicy](/graph/api/resources/authorizationpolicy) that can control Microsoft Entra authorization settings, unless you are a tenant administrator.
11+
You can use the Microsoft Graph endpoint to interact programmatically with your tenant data. A common scenario is to use a Microsoft Graph `/users` endpoint to look up users in the tenant. In this case, if you use delegated permissions in your access token, the `User.Read.All` permission is necessary. There are ways to prevent you from looking up other users, such as using an [authorizationPolicy](/graph/api/resources/authorizationpolicy) object that can control Microsoft Entra authorization settings, unless you're a tenant administrator.
1212

13-
This article provides a solution to an issue where you can't look up other users using the Microsoft Graph `users` endpoint after a tenant policy configuration restricts access to other users.
13+
This article provides a solution to an issue where you can't look up other users using the Microsoft Graph `/users` endpoint after a tenant policy configuration restricts access to other users.
1414

1515
## Symptoms
1616

17-
After you enable an authorizationPolicy in your tenant to prevent the user lookup action, if a new application performs this action, it gets a 401 HTTP response. This issue occurs even though proper permissions are consented to on the app registration and the access token has the proper permission.
17+
After you enable an `authorizationPolicy` object in your tenant to prevent the user lookup action, a new application receives a 401 HTTP response when it performs this action. This issue occurs even though the proper permissions are consented to during app registration and the access token has the proper permissions.
1818

1919
## Cause
2020

21-
The `allowedToReadOtherUser` property on the authorizationPolicy is set to `false`. This setting causes the default user role can't read other users. You can check its value via a `GET` request:
21+
The `allowedToReadOtherUser` property in the `authorizationPolicy` is set to `false`. This setting prevents the default user role from reading other users. You can check its value via a `GET` request:
2222

2323
`GET https://graph.microsoft.com/v1.0/policies/authorizationPolicy`
2424

0 commit comments

Comments
 (0)