Skip to content

Commit 29309ae

Browse files
authored
Merge pull request #104919 from mmacy/b2c-mgmt-app-prereq
[b2c] devops: link to mgmt app reg article
2 parents 96180cb + 3c40c57 commit 29309ae

File tree

2 files changed

+6
-41
lines changed

2 files changed

+6
-41
lines changed

articles/active-directory-b2c/deploy-custom-policies-devops.md

Lines changed: 4 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ There are three primary steps required for enabling Azure Pipelines to manage cu
3131

3232
* [Azure AD B2C tenant](tutorial-create-tenant.md), and credentials for a user in the directory with the [B2C IEF Policy Administrator](../active-directory/users-groups-roles/directory-assign-admin-roles.md#b2c-ief-policy-administrator) role
3333
* [Custom policies](custom-policy-get-started.md) uploaded to your tenant
34+
* [Management app](microsoft-graph-get-started.md) registered in your tenant with the Microsoft Graph API permission *Policy.ReadWrite.TrustFramework*
3435
* [Azure Pipeline](https://azure.microsoft.com/services/devops/pipelines/), and access to an [Azure DevOps Services project][devops-create-project]
3536

3637
## Client credentials grant flow
@@ -39,47 +40,11 @@ The scenario described here makes use of service-to-service calls between Azure
3940

4041
## Register an application for management tasks
4142

42-
Start by creating an application registration that your PowerShell scripts executed by Azure Pipelines will use to communicate with Azure AD B2C. If you already have an application registration that you use for automation tasks, you can skip to the [Grant permissions](#grant-permissions) section.
43+
As mentioned in [Prerequisites](#prerequisites), you need an application registration that your PowerShell scripts--executed by Azure Pipelines--can use for accessing the resources in your tenant.
4344

44-
### Register application
45+
If you already have an application registration that you use for automation tasks, ensure it's been granted the **Microsoft Graph** > **Policy** > **Policy.ReadWrite.TrustFramework** permission within the **API Permissions** of the app registration.
4546

46-
[!INCLUDE [active-directory-b2c-appreg-mgmt](../../includes/active-directory-b2c-appreg-mgmt.md)]
47-
48-
### Grant permissions
49-
50-
Next, grant the application permission to use the Microsoft Graph API to read and write custom policies in your Azure AD B2C tenant.
51-
52-
#### [Applications](#tab/applications/)
53-
54-
1. On the **Registered app** overview page, select **Settings**.
55-
1. Under **API Access**, select **Required permissions**.
56-
1. Select **Add**, then **Select an API**.
57-
1. Select **Microsoft Graph**, then **Select**.
58-
1. Under **Application Permissions**, select **Read and write your organization's trust framework policies**.
59-
1. Select **Select**, then **Done**.
60-
1. Select **Grant permissions**, and then select **Yes**. It might take a few minutes to for the permissions to fully propagate.
61-
62-
#### [App registrations (Preview)](#tab/app-reg-preview/)
63-
64-
1. Select **App registrations (Preview)**, and then select the web application that should have access to the Microsoft Graph API. For example, *managementapp1*.
65-
1. Under **Manage**, select **API permissions**.
66-
1. Under **Configured permissions**, select **Add a permission**.
67-
1. Select the **Microsoft APIs** tab, then select **Microsoft Graph**.
68-
1. Select **Application permissions**.
69-
1. Expand **Policy** and select **Policy.ReadWrite.TrustFramework**.
70-
1. Select **Add permissions**. As directed, wait a few minutes before proceeding to the next step.
71-
1. Select **Grant admin consent for (your tenant name)**.
72-
1. Select your currently signed-in administrator account, or sign in with an account in your Azure AD B2C tenant that's been assigned at least the *Cloud application administrator* role.
73-
1. Select **Accept**.
74-
1. Select **Refresh**, and then verify that "Granted for ..." appears under **Status**. It might take a few minutes for the permissions to propagate.
75-
76-
* * *
77-
78-
### Create client secret
79-
80-
To authenticate with Azure AD B2C, your PowerShell script needs to specify a client secret that you create for the application.
81-
82-
[!INCLUDE [active-directory-b2c-client-secret](../../includes/active-directory-b2c-client-secret.md)]
47+
For instructions on registering a management application, see [Manage Azure AD B2C with Microsoft Graph](microsoft-graph-get-started.md).
8348

8449
## Configure an Azure Repo
8550

includes/active-directory-b2c-permissions-directory.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,14 +23,14 @@ ms.author: marsma
2323

2424
1. Under **Manage**, select **API permissions**.
2525
1. Under **Configured permissions**, select **Add a permission**.
26-
1. Select **Microsoft Graph**.
26+
1. Select the **Microsoft APIs** tab, then select **Microsoft Graph**.
2727
1. Select **Application permissions**.
2828
1. Expand the appropriate permission group and select the check box of the permission to grant to your management application. For example:
2929
* **AuditLog** > **AuditLog.Read.All**: For reading the directory's audit logs.
3030
* **Directory** > **Directory.ReadWrite.All**: For user migration or user management scenarios.
3131
* **Policy** > **Policy.ReadWrite.TrustFramework**: For continuous integration/continuous delivery (CI/CD) scenarios. For example, custom policy deployment with Azure Pipelines.
3232
1. Select **Add permissions**. As directed, wait a few minutes before proceeding to the next step.
3333
1. Select **Grant admin consent for (your tenant name)**.
34-
1. Select a tenant administrator account.
34+
1. Select your currently signed-in administrator account, or sign in with an account in your Azure AD B2C tenant that's been assigned at least the *Cloud application administrator* role.
3535
1. Select **Accept**.
3636
1. Select **Refresh**, and then verify that "Granted for ..." appears under **Status**. It might take a few minutes for the permissions to propagate.

0 commit comments

Comments
 (0)