Skip to content

Commit 85e6fa0

Browse files
authored
commit
1 parent 7febb0b commit 85e6fa0

2 files changed

Lines changed: 6 additions & 4 deletions

File tree

support/entra/entra-id/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -289,6 +289,8 @@
289289
href: users-groups-entra-apis/cannot-modify-user-mail-phone-attributes.md
290290
- name: Error "The identity of the calling application could not be established"
291291
href: users-groups-entra-apis/identity-of-calling-application-not-established.md
292+
- name: Can't look up users using the /users endpoint
293+
href: users-groups-entra-apis/add-owner-for-application-microsoft-graph.md
292294
- name: Add an owner to an application
293295
href: users-groups-entra-apis/add-owner-for-application-microsoft-graph.md
294296

support/entra/entra-id/users-groups-entra-apis/users-look-up-other-users-using-microsoft-graph-users-endpoint.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,17 +8,17 @@ ms.reviewer: daga, v-weizhu
88
---
99
# 401 HTTP response when looking up users using Microsoft Graph /users endpoint
1010

11-
You can use the Microsoft Graph endpoint to interact programmatically with your tenant data. A common scenario is a Microsoft Graph `/users` endpoint to look up users in the tenant. In this scenario, if you use delegated permissions in your access token, the `User.Read.All` permission is necessary. However, there are ways to prevent you from looking up other users, for example, using an [authorization policy](https://learn.microsoft.com/en-us/graph/api/resources/authorizationpolicy) that can control Microsoft Entra authorization settings.
11+
You can use the Microsoft Graph endpoint to interact programmatically with your tenant data. A common scenario is a Microsoft Graph `/users` endpoint to look up users in the tenant. In this scenario, if you use delegated permissions in your access token, the `User.Read.All` permission is necessary. There are ways to prevent you from looking up other users, for example, using an [authorizationPolicy](https://learn.microsoft.com/en-us/graph/api/resources/authorizationpolicy) that can control Microsoft Entra authorization settings, unless you are a tenant administrator.
1212

13-
This article provides a solution to an issue where you can't look up other users using the Microsoft Graph `users` endpoint when a tenant policy configuration restricts access.
13+
This article provides a solution to an issue where you can't look up other users using the Microsoft Graph `users` endpoint after a tenant policy configuration restricts access to other users.
1414

1515
## Symptoms
1616

17-
After you enable an authorization policy in your tenant to prevent the user lookup action, if a new application performs this action, it gets a 401 HTTP response. This issue occurs even though proper permissions are consented to on the app registration and the access token has the proper permission. It doesn't occur with tenant administrators.
17+
After you enable an authorizationPolicy in your tenant to prevent the user lookup action, if a new application performs this action, it gets a 401 HTTP response. This issue occurs even though proper permissions are consented to on the app registration and the access token has the proper permission.
1818

1919
## Cause
2020

21-
The `allowedToReadOtherUser` property on the [authorization policy](/graph/api/resources/authorizationpolicy) is set to `false`, which restricts access. You can check its value via a `GET` request:
21+
The `allowedToReadOtherUser` property on the authorizationPolicy is set to `false`. This setting causes the default user role can't read other users. You can check its value via a `GET` request:
2222

2323
`GET https://graph.microsoft.com/v1.0/policies/authorizationPolicy`
2424

0 commit comments

Comments
 (0)