Today we’re announcing two new ways to get Azure AD Identity Protection data through Microsoft Graph: The newly introduced riskyUsers API and an updated sign-in API with enhanced risk information.
In Day 19 we assigned user permissions to an Office 365 Group (unified group) using Microsoft Graph requests. Today we'll introduce device code authentication and modify the .Net Core console application to utilize this authentication flow.
In Day 11 we discussed Access Tokens which are crucial to make Microsoft Graph requests. Today we'll look at the various authentication scenarios that are possible when querying with Microsoft Graph.
Hi there!
The Microsoft Identity Platform team has heard your feedback about our application registration experience and how it needs to be simpler. We agree with you, and so over the last few months we've made several changes to improve the developer experience and make it simpler to configure and manage your apps.
Today, we’re excited to ...