Azure RBAC Roles using PowerApps

For Previous Article, Assigning Azure RBAC Roles using PowerApps and Flow – Part 4

4. Adding Azure AD Application and Setting the permissions

Registering the application in Azure AD,

Login to https://Portal.Azure.comAzure Active directory –Select App Registration(Legacy)–Click on New Application registration

Give the name for the App and Sign-on URL: https://localhost and click on Create

Now can see the application has been created.

Click on Settings

Select Required permissions

Select Read and write directory data and sign in and read user profile

Click on Add — Select an API

Select Microsoft Graph

Select Permissions –> Read and Write directory data

Click on Done

Click on Grant Permissions

Click on Keys

Give the name for the Description and Click on Save. Now you can see value gets generated, copy and save it in the secured place.. once saved and closed. You will not be able to see it again.

Giving permissions for Azure ad Service Principal

Open PowerShell— Type Connect-AzureAD

Once Connected to the Azure Active directory –> type the below command and enter

$app = Get-AzureADServicePrincipal -SearchString “GuestInviterapp”

Run the below commands orderly

$role = Get-AzureADDirectoryRole | Where-Object { $_.DisplayName -eq “Company Administrator “}

Add-AzureADDirectoryRoleMember -ObjectId $role.ObjectId -RefObjectId $app.ObjectId

For Next Article, Assigning Azure RBAC Roles using PowerApps and Flow – Part 6

For Previous Articles in this series,

Assigning Azure RBAC Roles using PowerApps and Flow – Part 1

Assigning Azure RBAC Roles using PowerApps and Flow – Part 2

Assigning Azure RBAC Roles using PowerApps and Flow – Part 3

Assigning Azure RBAC Roles using PowerApps and Flow – Part 4

Assigning Azure RBAC Roles using PowerApps and Flow – Part 6

Assigning Azure RBAC Roles using PowerApps and Flow – Part 7

#AzureAD #MicrosoftFlow #MicrosoftGraph

Leave a comment

Your email address will not be published. Required fields are marked *