You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/deploy-custom-policies-devops.md
+4-39Lines changed: 4 additions & 39 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,6 +31,7 @@ There are three primary steps required for enabling Azure Pipelines to manage cu
31
31
32
32
*[Azure AD B2C tenant](tutorial-create-tenant.md), and credentials for a user in the directory with the [B2C IEF Policy Administrator](../active-directory/users-groups-roles/directory-assign-admin-roles.md#b2c-ief-policy-administrator) role
33
33
*[Custom policies](custom-policy-get-started.md) uploaded to your tenant
34
+
*[Management app](microsoft-graph-get-started.md) registered in your tenant with the Microsoft Graph API permission *Policy.ReadWrite.TrustFramework*
34
35
*[Azure Pipeline](https://azure.microsoft.com/services/devops/pipelines/), and access to an [Azure DevOps Services project][devops-create-project]
35
36
36
37
## Client credentials grant flow
@@ -39,47 +40,11 @@ The scenario described here makes use of service-to-service calls between Azure
39
40
40
41
## Register an application for management tasks
41
42
42
-
Start by creating an application registration that your PowerShell scriptsexecuted by Azure Pipelines will use to communicate with Azure AD B2C. If you already have an application registration that you use for automation tasks, you can skip to the [Grant permissions](#grant-permissions) section.
43
+
As mentioned in [Prerequisites](#prerequisites), you need an application registration that your PowerShell scripts--executed by Azure Pipelines--can use for accessing the resources in your tenant.
43
44
44
-
### Register application
45
+
If you already have an application registration that you use for automation tasks, ensure it's been granted the **Microsoft Graph** > **Policy** > **Policy.ReadWrite.TrustFramework** permission within the **API Permissions** of the app registration.
1. Select **App registrations (Preview)**, and then select the web application that should have access to the Microsoft Graph API. For example, *managementapp1*.
65
-
1. Under **Manage**, select **API permissions**.
66
-
1. Under **Configured permissions**, select **Add a permission**.
67
-
1. Select the **Microsoft APIs** tab, then select **Microsoft Graph**.
68
-
1. Select **Application permissions**.
69
-
1. Expand **Policy** and select **Policy.ReadWrite.TrustFramework**.
70
-
1. Select **Add permissions**. As directed, wait a few minutes before proceeding to the next step.
71
-
1. Select **Grant admin consent for (your tenant name)**.
72
-
1. Select your currently signed-in administrator account, or sign in with an account in your Azure AD B2C tenant that's been assigned at least the *Cloud application administrator* role.
73
-
1. Select **Accept**.
74
-
1. Select **Refresh**, and then verify that "Granted for ..." appears under **Status**. It might take a few minutes for the permissions to propagate.
75
-
76
-
* * *
77
-
78
-
### Create client secret
79
-
80
-
To authenticate with Azure AD B2C, your PowerShell script needs to specify a client secret that you create for the application.
Copy file name to clipboardExpand all lines: includes/active-directory-b2c-permissions-directory.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,14 +23,14 @@ ms.author: marsma
23
23
24
24
1. Under **Manage**, select **API permissions**.
25
25
1. Under **Configured permissions**, select **Add a permission**.
26
-
1. Select **Microsoft Graph**.
26
+
1. Select the **Microsoft APIs** tab, then select **Microsoft Graph**.
27
27
1. Select **Application permissions**.
28
28
1. Expand the appropriate permission group and select the check box of the permission to grant to your management application. For example:
29
29
***AuditLog** > **AuditLog.Read.All**: For reading the directory's audit logs.
30
30
***Directory** > **Directory.ReadWrite.All**: For user migration or user management scenarios.
31
31
***Policy** > **Policy.ReadWrite.TrustFramework**: For continuous integration/continuous delivery (CI/CD) scenarios. For example, custom policy deployment with Azure Pipelines.
32
32
1. Select **Add permissions**. As directed, wait a few minutes before proceeding to the next step.
33
33
1. Select **Grant admin consent for (your tenant name)**.
34
-
1. Select a tenant administrator account.
34
+
1. Select your currently signed-in administrator account, or sign in with an account in your Azure AD B2C tenant that's been assigned at least the *Cloud application administrator* role.
35
35
1. Select **Accept**.
36
36
1. Select **Refresh**, and then verify that "Granted for ..." appears under **Status**. It might take a few minutes for the permissions to propagate.
0 commit comments