Skip to content

Commit e744275

Browse files
committed
link-fixing
1 parent 620e598 commit e744275

File tree

1 file changed

+8
-10
lines changed

1 file changed

+8
-10
lines changed

articles/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,17 +8,17 @@ ms.service: active-directory
88
ms.topic: how-to
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 12/08/2022
11+
ms.date: 01/11/2023
1212
ms.author: sarahlipsey
13-
ms.reviewer: dhanyahk
13+
ms.reviewer: besiler
1414

1515
ms.collection: M365-identity-device-management
1616
---
1717
# Prerequisites to access the Azure Active Directory reporting API
1818

1919
The Azure Active Directory (Azure AD) [reporting APIs](/graph/api/resources/azure-ad-auditlog-overview?view=graph-rest-1.0) provide you with programmatic access to the data through a set of REST APIs. You can call these APIs from many programming languages and tools. The reporting API uses [OAuth](../../api-management/api-management-howto-protect-backend-with-aad.md) to authorize access to the web APIs.
2020

21-
This article describes how to enable MS Graph to access the Azure AD reporting APIs in the Azure portal and through PowerShell
21+
This article describes how to enable Microsoft Graph to access the Azure AD reporting APIs in the Azure portal and through PowerShell
2222

2323
## Roles and license requirements
2424

@@ -30,14 +30,12 @@ To get access to the reporting data through the API, you need to have one of the
3030

3131
In order to access the sign-in reports for a tenant, an Azure AD tenant must have associated Azure AD Premium P1 or P2 license. Alternatively if the directory type is Azure AD B2C, the sign-in reports are accessible through the API without any additional license requirement.
3232

33-
Registration is needed even if you're accessing the reporting API using a script. The registration gives you an **Application ID**, which is required for the authorization calls and enables your code to receive tokens.
34-
35-
To configure your directory to access the Azure AD reporting API, you must sign in to the [Azure portal](https://portal.azure.com) in one of the required roles.
33+
Registration is needed even if you're accessing the reporting API using a script. The registration gives you an **Application ID**, which is required for the authorization calls and enables your code to receive tokens. To configure your directory to access the Azure AD reporting API, you must sign in to the [Azure portal](https://portal.azure.com) in one of the required roles.
3634

3735
> [!IMPORTANT]
3836
> Applications running under credentials with administrator privileges can be very powerful, so be sure to keep the application's ID and secret credentials in a secure location.
3937
>
40-
## App-only access
38+
## Enable the Microsoft Graph API through the Azure portal
4139

4240
To enable your application to access Microsoft Graph without user intervention, you'll need to register your application with Azure AD, then grant permissions to the Microsoft Graph API. This article covers the steps to follow in the Azure portal.
4341

@@ -83,13 +81,13 @@ Once you have the app registration configured, you can run activity log queries
8381
1. Use one of the following queries to start using Microsoft Graph for accessing activity logs:
8482
- GET `https://graph.microsoft.com/v1.0/auditLogs/directoryAudits`
8583
- GET `https://graph.microsoft.com/v1.0/auditLogs/signIns`
86-
- For more information on Microsoft Graph queries for activity logs, see [Activity reports API overview](/graph/api/resources/azuread-auditlog-overview?view=graph-rest-1.0)
84+
- For more information on Microsoft Graph queries for activity logs, see [Activity reports API overview](/graph/api/resources/azuread-auditlog-overview)
8785

8886
![Screenshot of an activity log GET query in Microsoft Graph.](./media/howto-configure-prerequisites-for-reporting-api/graph-sample-get-query.png)
8987

9088
## Access the reporting API through PowerShell
9189

92-
To use PowerShell to access the Azure AD reporting API, you'll need to gather a few configuration settings:
90+
To use PowerShell to access the Azure AD reporting API, you'll need to gather a few configuration settings. These settings were created as a part of the [app registration process](#register-an-azure-ad-application).
9391

9492
- Tenant ID
9593
- Client app ID
@@ -118,7 +116,7 @@ Microsoft Graph PowerShell cmdlets:
118116
- **Audit logs:** `Get-MgAuditLogDirectoryAudit`
119117
- **Sign-in logs:** `Get-MgAuditLogSignIn`
120118
- **Provisioning logs:** `Get-MgAuditLogProvisioning`
121-
- Explore the full list of [reporting related Microsoft Graph PowerShell cmdlets](powershell/module/microsoft.graph.reports/?view=graph-powershell-1.0).
119+
- Explore the full list of [reporting related Microsoft Graph PowerShell cmdlets](powershell/module/microsoft.graph.reports).
122120

123121
Microsoft Graph API endpoints:
124122
- **Audit logs:** `https://graph.microsoft.com/v1.0/auditLogs/directoryAudits`

0 commit comments

Comments
 (0)