Azure App Registration - IAM under Subscription doesnt show my app - azure

Problem Description:
I need to add a new app registration for an integration with an application.
I go ahead and create an app registration with minimal details like web redirect URL, owners etc.
Now I would like to add certain permissions to the app using the subscription > (Access Control) IAM and under role assignment, I am not able to find my app unlike others.
Has anyone seen this behavior before?
Thanks,
Akshay

I have encountered this situation before, please make sure your app and the subscription are in the same Azure AD tenant, then just refresh the portal and search for the app name again, it should work.

Related

Multi-tenant SPN configuration

My customer simply created an App registration on the Azure AD portal and is trying to grant multi-tenant access to the SPN, there's no code involved.
I recommended this article: https://learn.microsoft.com/en-us/azure/active-directory/develop/howto-convert-app-to-be-multi-tenant but it talks about some code changes, can you please advise how this can be achieved?
Changing the app registration itself to accept multi tenant is simple. its just a radio button change. as per your article. question is now, if there is no code, what are they trying to connect to the spn/app registration? meaning, what are they creating this app registration for?

Unable to access application in Application Registration Portal after creation of Azure Web App Bot

I created a Web App Bot via the Azure Portal for the company I'm working for.
I currently have the Contributor role in the Resource Group where the Web App Bot resource is created.
After the deployment of the resource, I wanted to manage the AppID and AppPassword of the application so I clicked on the "Manage" link in the "Bot Management>Settings" section of the Web App Bot resource.
This link redirected me to the Application Registration Portal where I received the following error message:
Therefore, am I missing some permissions to be able to see the application in the Application Registration Portal ?
And, as I created the Web App Bot resource, shouldn't I be the owner of the application allowing me to see it in the portal ?
Unfortunately the error message does not provide a lot of information on how to solve that issue.
Fortunately I was able to retrieve the AppID and AppPassword in the "App Service Settings>Application Settings" section of the Azure resource but I still can't access and manage the application in the Registration Portal.
It looks like the user accessing https://portal.azure.com/ is not assigned as "Owner" at https://apps.dev.microsoft.com/ for your application.
Ask your Azure Active Directory Tenant Administrator to review the application from the list at https://apps.dev.microsoft.com/#/appList and request to add your account as additional "Owner".
Alternatively ask some other user (yourself with other account?) who is now the default Owner if you can find out who it is?

Need help to link Azure main portal to my Azur active directory V2

I am quite new to the wonderful world of Azure development. I currently work on a Xamarin.Form project with an Azure backend. After researching a lot, I found this post: https://azure.microsoft.com/en-in/resources/samples/active-directory-b2c-xamarin-native/
that explain how to do signIn in Azure from XF2.4.
But I am a little bit lost in all the portal offered by Microsoft. I create my backend on the portal.azure.com and at first I create the application in the portail.azure too. But I rapidly understand that I need to use the new apps.dev.microsoft.com to create the application. Now I am able to Singin from my XF project correctly.
My question: it is the correct way to do that? Now I try to add some Admin and "Normal user" application roles, then assigned roles to users. But the application created in the apps.dev.microsoft.com is not listed in the AzurePortal and the configuration available in apps.dev.micorosft.com is very simple.
How I can do that? Thanks
To register an app that works with the v2.0 endpoint, you must use a new app registration portal: apps.dev.microsoft.com . And refer to document :
The v2.0 endpoint does not support issuing role or group claims in ID tokens.
The workaround would be add users to different groups , use microsoft graph api in you application to get user's group membership , then model Role based access control on top of Security Groups.
In addition .If you want to use Azure AD B2C , you should register the app in b2c application blade . And refer to this thread for how to manually retrieve these claims the group claims(need register a separate application) and inject them into the token.

Can't authenticate Azure Web App with Azure AD. What am I doing wrong?

We are a teeny tiny startup. We were in Bizspark, which has now expired, but we all still have our MSDN accounts at the free level. I have commented our product code, run JsDoc3 on it to generate a documentation website. I put up a free level Web App on Azure. Works fine unauthenticated. I figured I'd throw together a small AD for the few of us in there with our Microsoft accounts, set the authentication of the app to the AD and pow, good to go. It would ask us to log in with our Microsoft accounts and all would be fine. Only we would be able to see the site with our internal code documentation. Seemed to work for me since I created everything. But everyone else I put into the AD can't authenticate. We get this error:
"AADSTS50020: User account 'joe#ourdomain.com' from identity provider 'live.com' does not exist in tenant 'Default Directory' and cannot access the application 'app-id-key' in that tenant. The account needs to be added as an external user in the tenant first. Sign out and sign in again with a different Azure Active Directory user account."
I have no idea. I've never used AD before. This is so common, I figure it must be the simplest use-case. I must be missing something stupid. All of my googling and searching Stack Exchange isn't finding me the answer though. Can someone please help me figure this out?
Thanks in advance for your help.
Please ensure you have added the external account successfully in your Azure AD tenant. In my testing , if I haven’t added the external account , I will get the same error message like yours .
To add an exits Microsoft Account to azure ad tenant ,you could follow below steps :
In the classic portal , click users in your azure ad tenant .
Click [Add User] button ,choose type : User with an existing Microsoft account :
After added , you will find the added Microsoft account in azure ad tenant like :
In addition, There are some limitations of Azure AD external users ,for example ,external users can't consent to multi-tenant applications in directories outside of their home directory . You could click here to know more about external users in azure ad.

Azure AD Multi tenant app

I have added a Web Application in the Microsoft Application Registration Portal. I can view this app in old azure portal. When I try to configure this app as multi tenant and set the Sign-on URL and the App ID URI values, an error pops up saying one of the values is invalid and the save fails. I can connect to this application using OAUTH and get the required refresh and access tokens. Using these tokens in the graph API I can get mails,contacts and calendar events from my office 365 account. But this happens only for a single tenant. I need to able to do this for multiple tenants and so I want to set this app as multi-tenant. If I create the application in Azure AD itself then I am able to set all the values but I cannot connect to this app using OAUTH as the authentication fails with error message saying
error=unauthorized_client&error_description=AADSTS70001%3a+Application+%2791470123-7e7e-4139-9922-ac95b0a6b383%27+is+not+supported+for+this+API+version.
.I went through a few links like here , here and here but until now I haven't been able to find a solution. I am re-posting this as suggested here. Can anyone suggest what I must do to get through this ?
All applications created through the App Registration Portal have the Multi-Tenant flag set to True by default.
The issues you are facing here are likely due to the fact that the App Registration Portal created our new V2 Applications, while our old portals use our V1 Applications. As a result, switching between portals and trying to make configuration changes, you will likely run into issues where our app model has changed, and certain properties exist in one place, and not another.
Finally it is important to note that we now have a V2 endpoint as well, which lines up with our V2 applications. You need to make sure you are using the right kind of application for the right endpoint.
Let me know if this helps!

Resources