admin管理员组文章数量:1350044
I am trying to automate granting admin consent for 'user_impersonation' permission. I was able to add for mggraph items but not for a user impersonation using powershell
enter image description here
using below code I was able to grant permissions for "offline_access openid but not for 'user_impersonation'. it shows no error and permission is also not being granted admin consent
# Grant admin consent for delegated permissions
$uri = "$graphBaseUri/oauth2PermissionGrants"
$body = @{
clientId = $principalId
consentType = "AllPrincipals"
resourceId = $resourceId
principalId = $null
scope = "user_impersonation offline_access openid"
} | ConvertTo-Json -Depth 10 -Compress
try {
Invoke-RestMethod -Method $method -Uri $uri -Headers $headers -Body $body -ErrorAction Stop
} catch {
Write-Host "Error: $($_.Exception.Message)"
if ($_.Exception.Response -and $_.Exception.Response.GetResponseStream()) {
$streamReader = New-Object System.IO.StreamReader($_.Exception.Response.GetResponseStream())
$responseBody = $streamReader.ReadToEnd()
Write-Host "Response Body: $responseBody"
} else {
Write-Host "No response body available."
}
exit 1
}
I am trying to automate granting admin consent for 'user_impersonation' permission. I was able to add for mggraph items but not for a user impersonation using powershell
enter image description here
using below code I was able to grant permissions for "offline_access openid but not for 'user_impersonation'. it shows no error and permission is also not being granted admin consent
# Grant admin consent for delegated permissions
$uri = "$graphBaseUri/oauth2PermissionGrants"
$body = @{
clientId = $principalId
consentType = "AllPrincipals"
resourceId = $resourceId
principalId = $null
scope = "user_impersonation offline_access openid"
} | ConvertTo-Json -Depth 10 -Compress
try {
Invoke-RestMethod -Method $method -Uri $uri -Headers $headers -Body $body -ErrorAction Stop
} catch {
Write-Host "Error: $($_.Exception.Message)"
if ($_.Exception.Response -and $_.Exception.Response.GetResponseStream()) {
$streamReader = New-Object System.IO.StreamReader($_.Exception.Response.GetResponseStream())
$responseBody = $streamReader.ReadToEnd()
Write-Host "Response Body: $responseBody"
} else {
Write-Host "No response body available."
}
exit 1
}
Share
Improve this question
asked Apr 1 at 20:48
TrishaTrisha
1
New contributor
Trisha is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
1 Answer
Reset to default 0Pay attention to the Id which be passed in, all should be the service principal
object-id
Make sure you
header token
has enough permission.
Below is a sample script, I have just test, it works well.
$graphBaseUri = "https://graph.microsoft/v1.0/"
$principalId = 'bc5cbd61-xxxx' ## sp object id
$resourceId = 'a6311949-xxxx' ## resource sp object id
$uri = "$graphBaseUri/oauth2PermissionGrants"
#
$method = 'POST'
$headers = @{
"Content-Type" = "application/json"
"Authorization" = "Bearer " + $token.access_token
}
$body = @{
clientId = $principalId
consentType = "AllPrincipals"
resourceId = $resourceId
scope = "user_impersonation offline_access openid"
} | ConvertTo-Json -Depth 10 -Compress
Invoke-RestMethod -Method $method -Uri $uri -Headers $headers -Body $body -ErrorAction Stop
where to find: $principalId
where to find: $resourceId
Test Result:
本文标签: microsoft graph apiGranting admin consent userimpersonation permissionStack Overflow
版权声明:本文标题:microsoft graph api - Granting admin consent user_impersonation permission - Stack Overflow 内容由网友自发贡献,该文观点仅代表作者本人, 转载请联系作者并注明出处:http://www.betaflare.com/web/1743871859a2553617.html, 本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容,一经查实,本站将立刻删除。
发表评论