Allow Microsoft Graph's Read.User API (How-To)

Article Details

While the Microsoft Graph's Read.User API endpoint is classified as a low-risk permission by default, your organization might have changed this. In order to use Gingr's SSO, users will need to have this permission on. To do this, please refer to the steps below.

Notice:  If you are a regular user, you will likely need the help of your organization's IT team to review and implement this!

 

Before You Begin

To configure permission classifications, you need:

  • An Azure account with an active subscription.

  • One of the following roles: Global Administrator, Application Administrator, or Cloud Application Administrator

 

Allow Microsoft Graph's Read.User API

Follow these steps to classify permissions using the Microsoft Entra admin center:

  1. Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.

  2. Browse to Identity » Applications » Enterprise applications » Consent and permissions » Permission classifications.

  3. Choose the tab for the low risk permission classification you'd like to update. 

  4. Choose Add permissions to classify another permission.

  5. Select the Microsoft Graph API.

  6. Select the User.Read delegated permission.  

 

Related Resources

 

Was this article helpful?

0 out of 0 found this helpful

Have more questions? Submit a request

Comments

0 comments

Article is closed for comments.