Skip to content

Commit 3c40c57

Browse files
committed
app reg step clarify
1 parent 7ceccb3 commit 3c40c57

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

includes/active-directory-b2c-permissions-directory.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,14 +23,14 @@ ms.author: marsma
2323

2424
1. Under **Manage**, select **API permissions**.
2525
1. Under **Configured permissions**, select **Add a permission**.
26-
1. Select **Microsoft Graph**.
26+
1. Select the **Microsoft APIs** tab, then select **Microsoft Graph**.
2727
1. Select **Application permissions**.
2828
1. Expand the appropriate permission group and select the check box of the permission to grant to your management application. For example:
2929
* **AuditLog** > **AuditLog.Read.All**: For reading the directory's audit logs.
3030
* **Directory** > **Directory.ReadWrite.All**: For user migration or user management scenarios.
3131
* **Policy** > **Policy.ReadWrite.TrustFramework**: For continuous integration/continuous delivery (CI/CD) scenarios. For example, custom policy deployment with Azure Pipelines.
3232
1. Select **Add permissions**. As directed, wait a few minutes before proceeding to the next step.
3333
1. Select **Grant admin consent for (your tenant name)**.
34-
1. Select a tenant administrator account.
34+
1. Select your currently signed-in administrator account, or sign in with an account in your Azure AD B2C tenant that's been assigned at least the *Cloud application administrator* role.
3535
1. Select **Accept**.
3636
1. Select **Refresh**, and then verify that "Granted for ..." appears under **Status**. It might take a few minutes for the permissions to propagate.

0 commit comments

Comments
 (0)