You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/tutorial-access-api-with-certificates.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,13 +20,13 @@ ms.custom: has-adal-ref
20
20
21
21
# Tutorial: Get data using the Azure Active Directory reporting API with certificates
22
22
23
-
The [Azure Active Directory (Azure AD) reporting APIs](concept-reporting-api.md) provide you with programmatic access to the data through a set of REST-based APIs. You can call these APIs from a variety of programming languages and tools. If you want to access the Azure AD Reporting API without user intervention, you must configure your access to use certificates.
23
+
The [Azure Active Directory (Azure AD) reporting APIs](concept-reporting-api.md) provide you with programmatic access to the data through a set of REST-based APIs. You can call these APIs from various programming languages and tools. If you want to access the Azure AD Reporting API without user intervention, you must configure your access to use certificates.
24
24
25
25
In this tutorial, you learn how to use a test certificate to access the MS Graph API for reporting. We don't recommend using test certificates in a production environment.
26
26
27
27
## Prerequisites
28
28
29
-
1. To access sign-in data, make sure you have an Azure AD tenant with a premium (P1/P2) license. See [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md) to upgrade your Azure AD edition. Note that if you did not have any activities data prior to the upgrade, it will take a couple of days for the data to show up in the reports after you upgrade to a premium license.
29
+
1. To access sign-in data, make sure you have an Azure AD tenant with a premium (P1/P2) license. See [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md) to upgrade your Azure AD edition. If you didn't have any activities data prior to the upgrade, it will take a couple of days for the data to show up in the reports after you upgrade to a premium license.
30
30
31
31
2. Create or switch to a user account in the **Global Administrator**, **Security Administrator**, **Security Reader** or **Report Reader** role for the tenant.
32
32
@@ -35,8 +35,8 @@ In this tutorial, you learn how to use a test certificate to access the MS Graph
35
35
4. Download and install [Azure AD PowerShell V2](https://github.com/Azure/azure-docs-powershell-azuread/blob/master/docs-conceptual/azureadps-2.0/install-adv2.md).
36
36
37
37
5. Install [MSCloudIdUtils](https://www.powershellgallery.com/packages/MSCloudIdUtils/). This module provides several utility cmdlets including:
38
-
- The ADAL libraries needed for authentication
39
-
- Access tokens from user, application keys, and certificates using ADAL
38
+
- The Microsoft Authentication Library libraries needed for authentication
39
+
- Access tokens from user, application keys, and certificates using Microsoft Authentication Library
40
40
- Graph API handling paged results
41
41
42
42
6. If it's your first time using the module run **Install-MSCloudIdUtilsModule**, otherwise import it using the **Import-Module** PowerShell command. Your session should look similar to this screen:
@@ -59,11 +59,11 @@ In this tutorial, you learn how to use a test certificate to access the MS Graph
59
59
60
60
1. Go to the [Azure portal](https://portal.azure.com) > **Azure Active Directory** > **App registrations** and choose your application from the list.
61
61
62
-
2.Select **Certificates & secrets** under the **Manage** section on Application registration blade and select **Upload Certificate**.
62
+
2.From the Application registration area, select **Certificates & secrets** under the **Manage** section, and then select **Upload Certificate**.
63
63
64
64
3. Select the certificate file from the previous step and select **Add**.
65
65
66
-
4. Note the Application ID, and the thumbprint of the certificate you just registered with your application. To find the thumbprint, from your application page in the portal, go to **Certificates & secrets** under **Manage** section. The thumbprint will be under the **Certificates** list.
66
+
4. Note the Application ID, and the thumbprint of the certificate you registered with your application. To find the thumbprint, from your application page in the portal, go to **Certificates & secrets** under **Manage** section. The thumbprint will be under the **Certificates** list.
67
67
68
68
5. Open the application manifest in the inline manifest editor and verify the *keyCredentials* property is updated with your new certificate information as shown below -
69
69
@@ -82,13 +82,13 @@ In this tutorial, you learn how to use a test certificate to access the MS Graph
82
82
83
83

84
84
85
-
7. Use the access token in your PowerShell script to query the Graph API. Use the **Invoke-MSCloudIdMSGraphQuery** cmdlet from the MSCloudIDUtils to enumerate the signins and directoryAudits endpoint. This cmdlet handles multi-paged results, and sends those results to the PowerShell pipeline.
85
+
7. Use the access token in your PowerShell script to query the Graph API. Use the **Invoke-MSCloudIdMSGraphQuery** cmdlet from the MSCloudIDUtils to enumerate the `signins` and `directoryAudits` endpoint. This cmdlet handles multi-paged results, and sends those results to the PowerShell pipeline.
86
86
87
-
8. Query the directoryAudits endpoint to retrieve the audit logs.
87
+
8. Query the `directoryAudits` endpoint to retrieve the audit logs.
88
88
89
89

90
90
91
-
9. Query the signins endpoint to retrieve the sign-in logs.
91
+
9. Query the `signins` endpoint to retrieve the sign-in logs.
92
92
93
93

0 commit comments