Skip to content

Commit a5ecda5

Browse files
committed
apply edit changes
1 parent 975a9c0 commit a5ecda5

1 file changed

Lines changed: 4 additions & 4 deletions

File tree

support/entra/entra-id/users-groups-entra-apis/b2c-or-tenant-premium-license-sign-in-activities.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Tenant doesn't have premium license when querying user sign-in activities using Microsoft Graph
3-
description: Provides solutions to the identity of the calling application could not be established error when using Microsoft Graph.
3+
description: Provides solutions to the identity of the calling application couldn't be established error when using Microsoft Graph.
44
ms.date: 04/25/2025
55
ms.service: entra-id
66
ms.author: bachoang
@@ -40,14 +40,14 @@ Example response
4040

4141
### Scenario 1: Query user sign-in activities
4242

43-
1. Make sure the target tenant has an Entra ID Premium P1 or P2 license. In the Azure portal, go to **Micosoft Entra ID**, select Overview, and then check the **License**. For more information, see [Sign up for Microsoft Entra ID P1 or P2 editions](/entra/fundamentals/get-started-premium).
43+
1. Make sure the target tenant has an Entra ID Premium P1 or P2 license. In the Azure portal, go to **Microsoft Entra ID**, select Overview, and then check the **License**. For more information, see [Sign up for Microsoft Entra ID P1 or P2 editions](/entra/fundamentals/get-started-premium).
4444
1. Verify that the Microsoft Graph Access Token has been granted the `AuditLog.Read.All` and `Directory.Read.All` permissions.
4545

4646
### Scenario 2: Query credential user registration details
4747

4848
1. Make sure the target tenant has an Entra ID Premium P1 or P2 license.
4949
1. Verify that the Microsoft Graph Access Token has been granted the `Reports.Read.All` permission.
50-
1. The authenticating user or the service principle of the application must to be in one of these Administrative roles:
50+
1. The authenticating user or the service principle of the application must be in one of these Administrative roles:
5151
- Reports Reader
5252
- Security Reader
5353
- Security Administrator
@@ -56,4 +56,4 @@ Example response
5656

5757
## More information
5858

59-
If an application is configured with only the **AuditLog.Read.All** permission, this error may occur intermittently. This is expected behavior, as the **Directory.Read.All** permission is required to retrieve tenant licensing information when it is not already cached. Ensure both permissions are included to avoid this issue.
59+
If an application is configured with only the **AuditLog.Read.All** permission, this error may occur intermittently. This is expected behavior, as the **Directory.Read.All** permission is required to retrieve tenant licensing information when it isn't already cached. Ensure both permissions are included to avoid this issue.

0 commit comments

Comments
 (0)