author | ms.service | ms.subservice | ms.topic | ms.date | ms.author |
---|---|---|---|---|---|
msmimart |
active-directory-b2c |
B2C |
include |
04/04/2020 |
mimart |
- Select App registrations, and then select the web application that should have access to the API. For example, webapp1.
- Under Manage, select API permissions.
- Under Configured permissions, select Add a permission.
- Select the My APIs tab.
- Select the API to which the web application should be granted access. For example, webapi1.
- Under Permission, expand demo, and then select the scopes that you defined earlier. For example, demo.read and demo.write.
- Select Add permissions.
- Select Grant admin consent for (your tenant name).
- If you're prompted to select an account, select your currently signed-in administrator account, or sign in with an account in your Azure AD B2C tenant that's been assigned at least the Cloud application administrator role.
- Select Yes.
- Select Refresh, and then verify that "Granted for ..." appears under Status for both scopes.
- Select Applications (Legacy), and then select the web application that should have access to the API. For example, webapp1.
- Select API access, and then select Add.
- In the Select API dropdown, select the API to which web application should be granted access. For example, webapi1.
- In the Select Scopes dropdown, select the scopes that you defined earlier. For example, demo.read and demo.write.
- Select OK.