Skip to content

Latest commit

 

History

History
31 lines (28 loc) · 1.71 KB

active-directory-b2c-permissions-api.md

File metadata and controls

31 lines (28 loc) · 1.71 KB
author ms.service ms.subservice ms.topic ms.date ms.author
msmimart
active-directory-b2c
B2C
include
04/04/2020
mimart
  1. Select App registrations, and then select the web application that should have access to the API. For example, webapp1.
  2. Under Manage, select API permissions.
  3. Under Configured permissions, select Add a permission.
  4. Select the My APIs tab.
  5. Select the API to which the web application should be granted access. For example, webapi1.
  6. Under Permission, expand demo, and then select the scopes that you defined earlier. For example, demo.read and demo.write.
  7. Select Add permissions.
  8. Select Grant admin consent for (your tenant name).
  9. If you're prompted to select an account, select your currently signed-in administrator account, or sign in with an account in your Azure AD B2C tenant that's been assigned at least the Cloud application administrator role.
  10. Select Yes.
  11. Select Refresh, and then verify that "Granted for ..." appears under Status for both scopes.
  1. Select Applications (Legacy), and then select the web application that should have access to the API. For example, webapp1.
  2. Select API access, and then select Add.
  3. In the Select API dropdown, select the API to which web application should be granted access. For example, webapi1.
  4. In the Select Scopes dropdown, select the scopes that you defined earlier. For example, demo.read and demo.write.
  5. Select OK.