Granting Permissions

To grant the required API permissions to the application, complete the following steps:

  1. Select the configured Azure application and click API permissions.

  2. Click Add a permission and select the type of permission you wish to add: Microsoft Graph, Azure Service Management, etc.
  3. Select Delegated Permissions or Application permissions, as required (see the table below).
  4. Select the required permissions specified in the following table and click Add Permissions. To make it easier to find API permissions, you can search by id instead of by name (see the image below).

API Name / ID Permissions

Azure Active Directory Graph

https://graph.windows.net/

00000002-0000-0000-c000-000000000000

Permission id Type Description Admin Consent Required
Directory.AccessAsUser.All a42657d6-7f20-40e3-b6f0-cee03008a62a Delegated Access the directory as the signed-in user -

Azure Service Management

https://management.azure.com/

797f4846-ba00-4fd7-ba43-dac1f8f63013

Permission id Type Description Admin Consent Required
user_impersonation 41094075-9dad-400e-a0bd-54e686782033 Delegated Access Azure Service Management as organization users (preview) -

Microsoft Partner Center

https://reseller.microsoft.com

fa3d9a0c-3fb0-42cc-9193-47c7ecd2edbd

Permission id Type Description Admin Consent Required
user_impersonation 1cebfa2a-fb4d-419e-b5f9-839b4383e05a Delegated Access Partner Center -

Microsoft Partner

https://api.partner.microsoft-int.com

4990cffe-04e8-4e8b-808a-1175604b879f

Permission id Type Description Admin Consent Required
user_impersonation eabf9ef3-1f9e-f3da-19a1-bcd60d080567 Delegated Partner Center -

Important: Make sure you click the Grant admin consent for {My App Name} button once permissions have been included.