Graph Permissions
π‘οΈ Why Are Permissions Important?
Permissions control what your app can do and what data it can access.
Without the right permissions:
Youβll get
403 Forbidden
errors.You may accidentally expose sensitive data.
Your app wonβt pass security reviews or compliance audits.
π In Microsoft Graph, permissions are everything.
π Two Types of Permissions
Delegated Permissions
App acts on behalf of a signed-in user. User's privileges and limitations apply.
Web and mobile apps where users sign in.
Application Permissions
App acts as itself. Full access if granted. No user needed.
Background services, daemons, automation scripts.
𧩠Understanding Permission Scopes
When you request an access token, you must specify the scope of permissions.
Example (Delegated):
Example (Application):
π How Permissions Are Granted
1
Developer requests permissions when registering an app.
2
Users or admins review the requested permissions.
3
Consent is given.
4
App gets an access token with the approved permissions.
User consent β For low-privilege operations.
Admin consent β For sensitive operations like reading all users, accessing mailboxes, etc.
ποΈ Delegated vs Application Permissions: Real-World Examples
Read signed-in user's profile
Delegated
User.Read
Read all users' profiles (no user signed in)
Application
User.Read.All
Send an email on behalf of the signed-in user
Delegated
Mail.Send
Read all mailbox settings
Application
Mail.Read
π Key Point: Application permissions are powerful and should be carefully restricted.
π οΈ Granting Admin Consent (Step-by-Step)
Sometimes, only an admin can approve permissions.
Hereβs how you (or your admin) can grant consent:
Go to Azure Portal β Microsoft Entra ID β App registrations.
Select your app.
Go to API Permissions β Add a permission β Microsoft Graph β Choose the required permissions.
Click Grant admin consent.
β This gives the app full authorization to perform those operations without needing a user to approve each time.
π¨ Important Security Practices for Graph Applications
Request the least privilege
Reduce the blast radius if app is compromised.
Only ask for permissions you truly need.
Use Conditional Access
Control when and where apps can sign in.
Restrict app logins by location or device compliance.
Rotate secrets regularly
Secrets can leak over time.
Rotate client secrets and certificates every 6β12 months.
Monitor consented apps
Old apps can become a security risk.
Regularly review what apps have permissions in your tenant.
Log and audit API usage
Detect anomalies early.
Use Microsoft Entra ID logs and Graph API activity monitoring.
π’ Common Errors Related to Permissions
403 Forbidden
Missing permission or no consent granted.
Check app permissions and consent status.
Insufficient privileges to complete the operation
User does not have the required role.
Use an account with the right Azure AD role (like Global Administrator).
Authorization_RequestDenied
Admin consent required.
Have an admin grant consent for the app.
π οΈ Hands-on Exercise: Secure Your App Properly
Review current permissions
Azure Portal β App registrations β API permissions.
Add User.Read.All
and grant admin consent
Add under Microsoft Graph β Application permissions.
Remove unused permissions
Clean up permissions you don't actually use.
Test API call
Try a GET /users
call to confirm your appβs permissions are working.
Last updated