#LogicAPP #ManagedIdentity #graphapi #authentication
managed identity,managed service identity,microsoft,logic apps,graph api,azure active directory,role based access,azure ad,security,app service,passwordless,azure,secure
Managed Identity
Authentication
Microsoft Graph
Logic Apps
Cloud Computing
Microsoft Azure
Developer Tools
Cloud Services
Programming
Identity Management
Step 1.
Find the Service Principal of the Managed Identity
GET graph.microsoft.com/v1.0/serv..."displayName:test"&$count=true
Header: ConsistencyLevel = eventual
Step 2: Find the Service Principal of the Microsoft Graph (or other) API
Graph API ID: 00000003-0000-0000-c000-000000000000
GET graph.microsoft.com/v1.0/serv... eq '00000003-0000-0000-c000-000000000000'
Step 3: Find the Application Role that will be the Permission you want to assign
GET: graph.microsoft.com/v1.0/serv...{your-graph-serviceprincipal-id}/appRoles
Step 4: Assign Application Role to Managed Identity
POST graph.microsoft.com/v1.0/serv...{your-graph-serviceprincipal-id}/appRoleAssignedTo
Content-Type: application/json
{
"principalId": "{your-managed-identity-service-principal-id}",
"resourceId": "{your-graph-serviceprincipal-id}",
"appRoleId": "{your-app-role-id}"
}
20 ноя 2022