For Previous Article, Assigning Azure RBAC Roles using PowerApps and Flow – Part 4
4. Adding Azure AD Application and Setting the permissions
Registering the application in Azure AD,
Login to https://Portal.Azure.com— Azure Active directory –Select App Registration(Legacy)–Click on New Application registration
Give the name for the App and Sign-on URL: https://localhost and click on Create
Now can see the application has been created.
Click on Settings
Select Required permissions
Select Read and write directory data and sign in and read user profile
Click on Add — Select an API
Select Microsoft Graph
Select Permissions –> Read and Write directory data
Click on Done
Click on Grant Permissions
Click on Keys
Give the name for the Description and Click on Save. Now you can see value gets generated, copy and save it in the secured place.. once saved and closed. You will not be able to see it again.
Giving permissions for Azure ad Service Principal
Open PowerShell— Type Connect-AzureAD
Once Connected to the Azure Active directory –> type the below command and enter
$app = Get-AzureADServicePrincipal -SearchString “GuestInviterapp”
Run the below commands orderly
$role = Get-AzureADDirectoryRole | Where-Object { $_.DisplayName -eq “Company Administrator “}
Add-AzureADDirectoryRoleMember -ObjectId $role.ObjectId -RefObjectId $app.ObjectId
For Next Article, Assigning Azure RBAC Roles using PowerApps and Flow – Part 6
For Previous Articles in this series,
Assigning Azure RBAC Roles using PowerApps and Flow – Part 1
Assigning Azure RBAC Roles using PowerApps and Flow – Part 2
Assigning Azure RBAC Roles using PowerApps and Flow – Part 3
Assigning Azure RBAC Roles using PowerApps and Flow – Part 4
Assigning Azure RBAC Roles using PowerApps and Flow – Part 6
Assigning Azure RBAC Roles using PowerApps and Flow – Part 7