Skip to content

Commit c9bbc13

Browse files
authored
Clarify managed identities permissions description
1 parent 7821576 commit c9bbc13

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

support/entra/entra-id/users-groups-entra-apis/call-graph-api-using-managed-dentities.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ This article explains how to use managed identities to obtain access token, and
1313

1414
## Configure permissions for managed identities
1515

16-
To begin with, a User Assigned Managed Identity will have a service principal in the Enterprise applications blade, however, no app registration, which is where you normally go to assign and consent to permissions. A System Assigned Managed Identity doesn't have a service principal that is viewable in the Enterprise applications blade. To get permissions consented for Microsoft Graph on those identities, you'll need to make an OAuth Permission Grant. The following PowerShell script will do just that.
16+
All managed identities (User Assigned and System Assigned) will have a servicePrincipal that will show up in Enterprise Apps blade. To get permissions consented for Microsoft Graph on those identities, you'll need to make an OAuth Permission Grant. To do this, run the following PowerShell script:
1717

1818
```powershell
1919
# Your tenant id (in Azure Portal, under Azure Active Directory -> Overview )

0 commit comments

Comments
 (0)