You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/entra/entra-id/users-groups-entra-apis/b2c-or-tenant-premium-license-sign-in-activities.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Tenant doesn't have premium license when querying user sign-in activities using Microsoft Graph
3
-
description: Provides solutions to the identity of the calling application could not be established error when using Microsoft Graph.
3
+
description: Provides solutions to the identity of the calling application couldn't be established error when using Microsoft Graph.
4
4
ms.date: 04/25/2025
5
5
ms.service: entra-id
6
6
ms.author: bachoang
@@ -40,14 +40,14 @@ Example response
40
40
41
41
### Scenario 1: Query user sign-in activities
42
42
43
-
1. Make sure the target tenant has an Entra ID Premium P1 or P2 license. In the Azure portal, go to **Micosoft Entra ID**, select Overview, and then check the **License**. For more information, see [Sign up for Microsoft Entra ID P1 or P2 editions](/entra/fundamentals/get-started-premium).
43
+
1. Make sure the target tenant has an Entra ID Premium P1 or P2 license. In the Azure portal, go to **Microsoft Entra ID**, select Overview, and then check the **License**. For more information, see [Sign up for Microsoft Entra ID P1 or P2 editions](/entra/fundamentals/get-started-premium).
44
44
1. Verify that the Microsoft Graph Access Token has been granted the `AuditLog.Read.All` and `Directory.Read.All` permissions.
45
45
46
46
### Scenario 2: Query credential user registration details
47
47
48
48
1. Make sure the target tenant has an Entra ID Premium P1 or P2 license.
49
49
1. Verify that the Microsoft Graph Access Token has been granted the `Reports.Read.All` permission.
50
-
1. The authenticating user or the service principle of the application must to be in one of these Administrative roles:
50
+
1. The authenticating user or the service principle of the application must be in one of these Administrative roles:
51
51
- Reports Reader
52
52
- Security Reader
53
53
- Security Administrator
@@ -56,4 +56,4 @@ Example response
56
56
57
57
## More information
58
58
59
-
If an application is configured with only the **AuditLog.Read.All** permission, this error may occur intermittently. This is expected behavior, as the **Directory.Read.All** permission is required to retrieve tenant licensing information when it is not already cached. Ensure both permissions are included to avoid this issue.
59
+
If an application is configured with only the **AuditLog.Read.All** permission, this error may occur intermittently. This is expected behavior, as the **Directory.Read.All** permission is required to retrieve tenant licensing information when it isn't already cached. Ensure both permissions are included to avoid this issue.
0 commit comments