-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Azure CLI app cannot be found in app registrations nor enterprise apps #28628
Comments
Thank you for opening this issue, we will look into it. |
Azure CLI is a First Party Application and its app ID is I am able to get its service principal in Microsoft tenant
But not in another tenant:
I need to work with Microsoft Entra team internally to understand why the API behaves like this and whether it is possible to add additionally delegated permissions to first party applications. Related: #22775 |
I have the same problem as OP, and I'm 99% sure I've been able to find the |
Seeing same issue in one of our tenants - nowhere to be seen and I need to grant it additional graph permissions. |
The enterprise application was also missing in one of our tenants; by running the following command from a cloud shell I was able to force it to appear. az ad sp create --id '04b07795-8ddb-461a-bbee-02f9e1bf7b46' |
It seems that the enterprise application cannot be found, either through the portal, Microsoft Graph, or the deprecated AzureAD module.
|
Related command
az account get-access-token --output json --resource "https://graph.microsoft.com"
Is your feature request related to a problem? Please describe.
I see a strange behaviour by following these steps:
az account get-access-token --output json --resource "https://graph.microsoft.com"
appid
claim) for the Azure CLI that is present in the token cannot be found in Entra ID for that tenant (not in app registrations nor in entreprise apps)Describe the solution you'd like
From my understanding, the Azure CLI is an Entra ID app that relies on a standard approach to interact with exposed APIs on behalf of users.
Additional permissions cannot be granted via the Portal and this leads to problems with other Microsoft solutions, such as the Graph SDK using Azure CLI credentials. Such SDKs might need additional permissions (for example,
Mail.Send
for the Graph API), however it doesn't seem the delegated permission can be granted to the Azure CLI.Is this just an issue with the Azure Portal, or is this scenario not possible at all?
Describe alternatives you've considered
A separate app registration can be created with delegated permissions, but this defeats the purpose of the Azure CLI credential.
Additional context
For ease of understanding and following the trail of thought, here is the associated issue in the Microsoft Graph SDK repo.
The text was updated successfully, but these errors were encountered: