You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# HTTP 403 authorization error when calling Microsoft Graph Security API
9
+
# HTTP 403 authorization error when calling the Microsoft Graph Security API
10
+
11
+
This article provides soltions to an HTTP 403 error that occurs when you call the Microsoft Graph Security API.
10
12
11
13
## Symptoms
12
14
13
-
When using Microsoft Graph Security API to call endpoints such as `https://graph.microsoft.com/v1.0/security/alert` and `https://graph.microsoft.com/beta/security/secoreScores`, you might get an 403 error with the following message:
15
+
When using the Microsoft Graph Security API to call endpoints such as `https://graph.microsoft.com/v1.0/security/alert` and `https://graph.microsoft.com/beta/security/secoreScores`, you might get an 403 error with the following message:
14
16
15
17
> Auth token does not contain valid permissions or user does not have valid roles
16
18
@@ -21,9 +23,7 @@ The error occurs due to one of the following reasons:
21
23
- The access token lacks the necessary Microsoft Graph permission for the security endpoints.
22
24
- The authenticating user that obtains the access token isn't in a required Azure AD admin role for delegated permission type token.
23
25
24
-
## Solution
25
-
26
-
### Microsoft Graph permission
26
+
## Solution 1: Use valid Microsoft Graph permission
27
27
28
28
There are two types of tokens: application and delegated permission token. For more information, see [Application and delegated permissions for access tokens in the Microsoft identity platform](../app-integration/application-delegated-permission-access-tokens-identity-platform.md).
29
29
@@ -39,7 +39,7 @@ For delegated permission token, Microsoft Graph permission is in the `scp` claim
39
39
40
40
For more information, see [Use the Microsoft Graph security API](/graph/api/resources/security-api-overview) and [Microsoft Graph permissions reference](/graph/permissions-reference).
41
41
42
-
###Microsoft Entra admin roles
42
+
##Solution 2: Use valid Microsoft Entra admin roles
43
43
44
44
For delegated permission token, the authenticating user needs to be in one of the following admin roles:
0 commit comments