Skip to content

Commit 1b85c96

Browse files
authored
Updates from editor
1 parent 4b243d5 commit 1b85c96

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed
Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,33 +1,33 @@
11
---
2-
title: HTTP 403 authorization error when calling the Microsoft Graph Security API
3-
description: Provides soltions to an HTTP 403 error that occurs when you call the Microsoft Graph Security API.
4-
ms.date: 05/06/2025
2+
title: HTTP 403 Authorization Error When Calling Microsoft Graph Security API
3+
description: Provides solutions to an HTTP 403 error that occurs when you call the Microsoft Graph Security API.
4+
ms.date: 05/14/2025
55
ms.service: entra-id
66
ms.custom: sap:Getting access denied errors (Authorization)
77
ms.reviewer: bachoang, v-weizhu
88
---
99
# HTTP 403 authorization error when calling the Microsoft Graph Security API
1010

11-
This article provides soltions to an HTTP 403 error that occurs when you call the Microsoft Graph Security API.
11+
This article provides solutions to an HTTP 403 error that occurs when you call the Microsoft Graph Security API.
1212

1313
## Symptoms
1414

15-
When using the Microsoft Graph Security API to call endpoints such as `https://graph.microsoft.com/v1.0/security/alert` and `https://graph.microsoft.com/beta/security/secoreScores`, you might get an 403 error with the following message:
15+
When using the Microsoft Graph Security API to call endpoints such as `https://graph.microsoft.com/v1.0/security/alert` and `https://graph.microsoft.com/beta/security/secoreScores`, you might receive a 403 error with the following message:
1616

1717
> Auth token does not contain valid permissions or user does not have valid roles
1818
1919
## Cause
2020

2121
The error occurs due to one of the following reasons:
2222

23-
- The access token lacks the necessary Microsoft Graph permission for the security endpoints.
24-
- The authenticating user that obtains the access token isn't in a required Azure AD admin role for delegated permission type token.
23+
- The access token lacks the necessary Microsoft Graph permissions for the security endpoints.
24+
- The authenticating user that obtains the access token doesn't have a Microsoft Entra admin role required for the delegated permission type token.
2525

26-
## Solution 1: Use valid Microsoft Graph permission
26+
## Solution 1: Use valid Microsoft Graph permissions
2727

28-
There are two types of tokens: application and delegated permission token. For more information, see [Application and delegated permissions for access tokens in the Microsoft identity platform](../app-integration/application-delegated-permission-access-tokens-identity-platform.md).
28+
There are two types of tokens: application and delegated permission tokens. For more information, see [Application and delegated permissions for access tokens in the Microsoft identity platform](../app-integration/application-delegated-permission-access-tokens-identity-platform.md).
2929

30-
For delegated permission token, Microsoft Graph permission is in the `scp` claim. For application permission token, the permission is in the `roles` claim. To get the required Microsoft Graph permissoin, you can refer to the following table that listed in [Authorization and the Microsoft Graph Security API](/graph/security-authorization#register-an-application-with-the-microsoft-identity-platform-endpoint):
30+
For delegated permission tokens, the Microsoft Graph permissions are in the `scp` claim. For application permission tokens, the permissions are in the `roles` claim. To get the required Microsoft Graph permissions, you can refer to the following table, which is also listed in [Authorization and the Microsoft Graph Security API](/graph/security-authorization#register-an-application-with-the-microsoft-identity-platform-endpoint):
3131

3232
|Permission | Entity | Supported requests |
3333
|:----------|:-------|:-------------------|
@@ -41,7 +41,7 @@ For more information, see [Use the Microsoft Graph security API](/graph/api/reso
4141

4242
## Solution 2: Use valid Microsoft Entra admin roles
4343

44-
For delegated permission token, the authenticating user needs to be in one of the following admin roles:
44+
For delegated permission tokens, the authenticating user needs to have one of the following admin roles:
4545

4646
|Microsoft Entra role|Role template ID|
4747
|---|---|
@@ -51,7 +51,7 @@ For delegated permission token, the authenticating user needs to be in one of th
5151

5252
For more information, see [Microsoft Entra built-in roles](/entra/identity/role-based-access-control/permissions-reference) and [Authorization and the Microsoft Graph Security API](/graph/security-authorization).
5353

54-
The `wids` claim in the token contains the Microsoft Entra role. It can be used to determine if the user has the sufficient privilege.
54+
The `wids` claim in the token contains the Microsoft Entra role. It can be used to determine whether the user has sufficient privileges.
5555

5656
```json
5757
"ver": "1.0"
@@ -65,6 +65,6 @@ The `wids` claim in the token contains the Microsoft Entra role. It can be used
6565
```
6666

6767
> [!NOTE]
68-
> If the token is obtained via the [implicit grant flow](/entra/identity-platform/v2-oauth2-implicit-grant-flow), the `wids` claim might not exist. For more information, see [Access tokens in the Microsoft identity platform](/entra/identity-platform/access-tokens). In this case, use a different OAuth 2 grant flow such as [authorization code flow](/entra/identity-platform/v2-oauth2-auth-code-flow) to obtain the access token.
68+
> If the token is obtained via the [implicit grant flow](/entra/identity-platform/v2-oauth2-implicit-grant-flow), the `wids` claim might not exist. For more information, see [Access tokens in the Microsoft identity platform](/entra/identity-platform/access-tokens). In this case, use a different OAuth 2 grant flow, such as the [authorization code flow](/entra/identity-platform/v2-oauth2-auth-code-flow), to obtain the access token.
6969
70-
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]
70+
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]

0 commit comments

Comments
 (0)