Skip to content

Commit 004eae8

Browse files
authored
Merge pull request #185073 from rolyon/rolyon-abac-attributes-graph-explorer
[Azure ABAC] Graph Explorer for Microsoft Graph APIs
2 parents 8f2accc + bcec8fe commit 004eae8

File tree

5 files changed

+37
-2
lines changed

5 files changed

+37
-2
lines changed

articles/active-directory/fundamentals/custom-security-attributes-overview.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: fundamentals
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 11/16/2021
11+
ms.date: 01/14/2022
1212
ms.collection: M365-identity-device-management
1313
---
1414

@@ -167,6 +167,12 @@ Azure AD provides built-in roles to work with custom security attributes. The At
167167
> [!IMPORTANT]
168168
> By default, [Global Administrator](../roles/permissions-reference.md#global-administrator) and other administrator roles do not have permissions to read, define, or assign custom security attributes.
169169
170+
## Graph Explorer
171+
172+
If you use the Microsoft Graph API, you can use [Graph Explorer](/graph/graph-explorer/graph-explorer-overview) to more easily try the Microsoft Graph APIs for custom security attributes. For more information, see [Overview of custom security attributes using the Microsoft Graph API](/graph/api/resources/custom-security-attributes-overview).
173+
174+
![Screenshot that shows a Microsoft Graph API call for custom security attributes.](./media/custom-security-attributes-overview/graph-explorer-success.png)
175+
170176
## Known issues
171177

172178
Here are some of the known issues with custom security attributes:

articles/active-directory/fundamentals/custom-security-attributes-troubleshoot.md

Lines changed: 30 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: fundamentals
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 11/16/2021
11+
ms.date: 01/14/2022
1212
ms.collection: M365-identity-device-management
1313
---
1414

@@ -110,6 +110,35 @@ When you try to add an eligible Azure AD role assignment using [Azure AD Privile
110110

111111
PIM currently does not support adding an eligible Azure AD role assignment at an attribute set scope.
112112

113+
## Symptom - Insufficient privileges when using Graph Explorer
114+
115+
When you try to use [Graph Explorer](/graph/graph-explorer/graph-explorer-overview) to call Microsoft Graph APIs for custom security attributes, you see a message similar to the following:
116+
117+
```
118+
Forbidden - 403. You need to consent to the permissions on the Modify permissions (Preview) tab
119+
Authorization_RequestDenied
120+
Insufficient privileges to complete the operation.
121+
```
122+
123+
![Screenshot of Graph Explorer displaying an insufficient privileges error message.](./media/custom-security-attributes-troubleshoot/graph-explorer-insufficient-privileges.png)
124+
125+
**Cause 1**
126+
127+
You have not consented to the required custom security attribute permissions to make the API call.
128+
129+
**Solution 1**
130+
131+
Open the Permissions panel, select the appropriate custom security attribute permission, and click **Consent**. In the Permissions requested window that appears, review the requested permissions.
132+
133+
![Screenshot of Graph Explorer Permissions panel with CustomSecAttributeDefinition selected.](./media/custom-security-attributes-troubleshoot/graph-explorer-permissions-consent.png)
134+
135+
**Cause 2**
136+
137+
You are not assigned the required custom security attribute role to make the API call. By default, [Global Administrator](../roles/permissions-reference.md#global-administrator) and other administrator roles do not have permissions to read, define, or assign custom security attributes.
138+
139+
**Solution 2**
140+
141+
Make sure that you are assigned the required custom security attribute role. For more information, see [Manage access to custom security attributes in Azure AD](custom-security-attributes-manage.md).
113142

114143
## Next steps
115144

84.2 KB
Loading
Loading
Loading

0 commit comments

Comments
 (0)