Unable to register app (iOS app) on Azure portal - ios

I am following the link to integrate One Drive SDK into an existing iOS app. I have an free account created on azure portal. Its a work account so I can see a default Azure Active Directory.
During this process, I need to register the app on the Azure portal. This link for registering apps and generating app ID does not work in my case.
I am unable to create an app ID or access existing active Azure Directory details. The portal shows me restricted access page as mentioned in this link : https://learn.microsoft.com/en-us/answers/questions/352443/microsoft-azure-free-trial-no-access-to-acitive-di.html. The solutions mentioned in this link does not work for me as those options are not seen on the screen.
Any kind of help in understanding the trouble will be of great help!

This might be due to insuffient permissions as this is a free trial account.
Go to your Overview pane of your subscription and check if there are any directories present.
If not try creating a free trial account using a Work or school account and there you will be provided with a default directory. Then Create new Azure AD Tenant and then Connect your Azure free subscription to your new Azure AD Directory.
REFERENCES:
Associate a subscription to a directory.
Create a new tenant for your organization.

Related

When my admin account trial is expired, does my OAUTH2 project become external again?

I have a project using OAUTH2 API of Google, but this project is created by a personal account, instead of creating by a Google Workspace Admin Account. Later on, I migrated this project to a Google Workspace Admin Account to make this project internal. When my admin account trial is expired, does my project become external again?
I think my project become external, but I don't want to check because it disrupts the system.

How do you automatically look up Microsoft teams app tenant id

We have created a Microsoft Teams tab app with bot integration that we want to distribute to various organizations either manually or via an App Store. In summary,
We created Tabs App with Microsoft Bot using node.js botbuilder package.
We provided zip archive to another organization (another tenant Id).
Organization uploaded our app using Microsoft Teams Admin panel and approved permission in Permission tabs.
Question is how can we receive the tenant id from the organization we are deploying to without asking their admins to go to Azure Active Directory and look it up. Once provided, the graph api and the multi tenant bot does work fine. We are trying to avoid asking their admin to provide us the tenant id and want to retrieve it automatically upon the app being uploaded or on startup.
Thank you.
The best place to get the tenant id is from the access token you are provided by logging in to your app. Look for the 'tid' value.
I'm assuming you are talking about stream lining the company wide admin consent for your application.
What you can do is have a web site that a customer's admin can log into (using standard Microsoft OAuth interactive flow). You can then pull the Tenant ID from the access token and then run through the Microsoft consent process. Once consent process redirected back to your web site, you can do your own customer onboarding if required.

Graph API for iOS Push Notifications - Confused AAD customer on Partner Portal

I want to use Microsoft Graph to send our company mobile app push notifications as discussed at Microsoft Build 2019.
I am following Integrate with Microsoft Graph notifications. It directs me to create a "Developer Account" to use the Partner Portal but my company already has an Enterprise Azure account with Microsoft and we leverage Azure AD.
I've tried the "Onboard" step but then I read "To get started, sign in to the Partner Center dashboard using your Windows developer account (you cannot use an Azure AD account)". I'm very confused.
Also, the Partner Portal shows no items under the menu no matter how I signed in. I tried using a personal account and my AAD account and I get the same result. No menu items at all.
I'm not sure where you're getting a "Developer Account" from but the first step is registering your application. This gives you an Application Id and Secret which is required to authenticate against Graph:
In order for your application service to integrate with Microsoft Graph notifications, you need to register your app with the Microsoft identity platform to support Microsoft accounts or work or school accounts, and declare the API permissions that are required.
With regards to the windows developer account, this is explained in the documentation:
If you don’t already have a Windows developer account, you’ll need to create one. For details, see Opening a developer account. You need to do this even if you don’t plan to build a Windows UWP application. If you’re building a school or work application as part of an enterprise, you can associate your developer account with the appropriate Azure AD account that is used for managing your enterprise submissions. For details, see Associate Azure Active Directory with your Partner Center account.

How to give permissions for the application for all users which was created in azure apps portal

I have created an app in https://apps.dev.microsoft.com portal with name GroupsApp and I have given couple of permissions as below:
I have created client id and secret to use in my application. I am using asp.net MVC (with 4.5.1 .net framework) web application.
I am getting some groups info and displaying on the screen. If I am logged with my account it is working fine. But if I logged in as another user then it is giving me issue as below:
I have formatted url as below: https://login.microsoftonline.com/948894dc-c0e2-43e5-a7e6-1d21dd183c9d/oauth2/authorize?client_id=75acb700-e675-4dc4-9deb-d3f68f6911a1&response_type=code&redirect_uri=http://localhost:34280&prompt=admin_consent and trying to granted the permission. Here I have logged in as admin and given permissions.
Now if I check with normal user same issue is happening.
How should I give the permissions to this application.
I am not able to find any option to approve the permissions from the Azure portal.
Now if I check with normal user same issue is happening.
How should I give the permissions to this application.
I am not able to find any option to approve the permissions from the Azure portal.
I could encounter the same issue according to your settings. I assumed that you may hit the Admin-restricted scopes of AAD v2.0 as follows:
Some high-privilege permissions in the Microsoft ecosystem can be set to admin-restricted. Examples of these kinds of scopes include the following permissions:
Read an organization's directory data by using Directory.Read
Write data to an organization's directory by using Directory.ReadWrite
Read security groups in an organization's directory by using Groups.Read.All
Although a consumer user might grant an application access to this kind of data, organizational users are restricted from granting access to the same set of sensitive company data. If your application requests access to one of these permissions from an organizational user, the user receives an error message that says they are not authorized to consent to your app's permissions.
You could Using the admin consent endpoint and follow this Build an app with admin restricted scopes using the v2.0 endpoint github code sample to ensure your app can gather permissions for all users in a tenant, including admin-restricted scopes.

How to fix the access_denied_insufficient_permissions when trying to list the users in your Enterprise box account?

I am using the Box enterprise Python SDK and Java SDK. I have created a service account, and I want to access files in my enterprise from this account using the "As-User" header.
I try to list users with box_client.users(). But I keep getting access_denied_insufficient_permissions
How do I give my Service Account access to list all users?
I believe you have to have the scope set in the app and have it authorized in the enterprise admin console by an admin.

Resources