Skip to content

Commit 33ea0d3

Browse files
authored
Merge pull request #107428 from Makdaam/fixdocerror
Fixing an error in documentation.
2 parents 056f390 + 2c100b1 commit 33ea0d3

File tree

1 file changed

+14
-6
lines changed

1 file changed

+14
-6
lines changed

articles/openshift/howto-aad-app-configuration.md

Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -88,12 +88,20 @@ For details on creating a new Azure AD application, see [Register an app with th
8888

8989
## Add API permissions
9090

91-
1. In the **Manage** section click **API permissions**, and then click **+Add a permission**.
92-
3. In the **Request API Permissions** pane, select the **Microsoft APIs** tab, and then select the **Microsoft Graph** tile. Select **Application permissions**.
93-
4. Search for **User** and enable the **User.Read** permission. Search for **Directory** and enable **Directory.Read.All**.
94-
5. Click **Add permissions** to accept the changes.
95-
6. The API permissions panel should now show both *User.Read* and *Directory.Read.All*. Please note the warning in **Admin consent required** column next to *Directory.Read.All*.
96-
7. If you are the *Azure Subscription Administrator*, click **Grant admin consent for *Subscription Name***. If you are not the *Azure Subscription Administrator*, request the consent from your administrator.
91+
[//]: # (Do not change to Microsoft Graph. It does not work with Microsoft Graph.)
92+
1. In the **Manage** section click **API permissions**
93+
2. Click **Add permission** and select **Azure Active Directory Graph** then **Delegated permissions**.
94+
> [!NOTE]
95+
> Make sure you selected the "Azure Active Directory Graph" and not the "Microsoft Graph" tile.
96+
97+
3. Expand **User** on the list below and enable the **User.Read** permission. If **User.Read** is enabled by default, ensure that it is the **Azure Active Directory Graph** permission **User.Read**.
98+
4. Scroll up and select **Application permissions**.
99+
5. Expand **Directory** on the list below and enable **Directory.ReadAll**.
100+
6. Click **Add permissions** to accept the changes.
101+
7. The API permissions panel should now show both *User.Read* and *Directory.ReadAll*. Please note the warning in **Admin consent required** column next to *Directory.ReadAll*.
102+
8. If you are the *Azure Subscription Administrator*, click **Grant admin consent for *Subscription Name*** below. If you are not the *Azure Subscription Administrator*, request the consent from your administrator.
103+
104+
![Screenshot of the API permissions panel. User.Read and Directory.ReadAll permissions added, admin consent required for Directory.ReadAll](./media/howto-aad-app-configuration/permissions-required.png)
97105

98106
> [!IMPORTANT]
99107
> Synchronization of the cluster administrators group will work only after consent has been granted. You will see a green circle with a checkmark and a message "Granted for *Subscription Name*" in the *Admin consent required* column.

0 commit comments

Comments
 (0)