Skip to content

Commit 82ebdd0

Browse files
authored
Clarify managed identities permissions description
1 parent c9bbc13 commit 82ebdd0

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

support/entra/entra-id/users-groups-entra-apis/call-graph-api-using-managed-dentities.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ This article explains how to use managed identities to obtain access token, and
1313

1414
## Configure permissions for managed identities
1515

16-
All managed identities (User Assigned and System Assigned) will have a servicePrincipal that will show up in Enterprise Apps blade. To get permissions consented for Microsoft Graph on those identities, you'll need to make an OAuth Permission Grant. To do this, run the following PowerShell script:
16+
All managed identities (User Assigned or System Assigned) will have a service principal that appears in the Enterprise Apps blade. To get permissions consented for Microsoft Graph on those identities, you'll need to make an OAuth Permission Grant. To do this, run the following PowerShell script:
1717

1818
```powershell
1919
# Your tenant id (in Azure Portal, under Azure Active Directory -> Overview )

0 commit comments

Comments
 (0)