Multi-tenant issue in Microsoft Graph - botframework

Currently, I developing Microsoft ChatBot that needs login via Microsoft Graph.
After I log in the error display as below.

When you registered your app, you chose one of three supported account types:
Accounts in this organizational directory only (i.e. one Azure AD tenant only)
Accounts in any organizational directory (i.e. any Azure AD tenant)
Accounts in any organizational directory and personal Microsoft accounts (i.e. any Azure AD tenant and any personal Microsoft account)
If you chose the first option, your app is not considered "multi-tenant", and you cannot use the "common" endpoint, as the error message indicates. You have two options here:
If your application is to be used by users from multiple organizations, change the intended audience to "Accounts in any organizational directory" (Azure portal > Azure Active Directory > App registrations > Authentication).
If your application is only intended to be used by one organization, then update your code to use the tenant-specific endpoint (i.e. https://login.microsoftonline.com/{tenant-id}/..., instead of https://login.microsoftonline.com/common/...).

Related

set up MVC .NET application with Azure Connected Services

What we are trying to do is set up our MVC .NET application with Azure Connected Services within Visual Studio. We are trying to connect to the Existing Azure AD Application. We have the correct domain selected, and also the correct redirect URI
We need to be able to read directory data to determine user group but we don’t have client secret
This is the error we get
Make sure your existing Azure AD application is registered as:
Accounts in this organizational directory only (Devchat only - Single tenant) or Accounts in any organizational directory (Any Azure AD directory - Multitenant).
Other types are not supported to be updated in this case.
You can refer to this document to register an application for a quick test.

Cannot publish to azure directory

I am using Microsoft Graph API to send messages to private users in Microsoft Teams. I registered an App in Azure Active Directory, gave proper permissions and called the API and was able to successfully send the message.
My question is what would be the most efficient way to deliver this integration to different clients? Do we have to register an App in every azure directory of the client individually, or is there a way I can publish the app that I have created with all the API permissions required and the administrators can install the app in their azure directory
You would have to publish your application in your home tenant as a Multi-tenant application.
When a user from the client's tenant access your app, they will be prompted for login and post that either the user or an admin will have to consent to the app and the required permissions. This will create a service principal in the corresponding user's directory where the consent objects are stored. This way you don't have to register application in each directory.
You can follow the steps listed here for more detailed instructions to convert your application into a multi-tenant app.

How can I restrict particular users in my organization to access Azure DevOps from outside of our office IP

We have almost 16 users in our Azure DevOps Organisation. I am having the admin privilege for the azure account. I saw a few blogs regarding Active Directory Enabling method and all. But it was not clear.
How can we manage this restriction in Azure DevOps.
NB:-Our users are accessing Azure DevOps through their outlook account.For ex:-sample.orgnization#outlook.com
Depending on your setup, there are a couple of options:
Azure DevOps configured as MSA backed with AAD guests in Azure DevOps
When your Azure DevOps account is configured to be backed by Microsoft Accounts (formerly Live IDs, or Outlook.com or Hotmail.com), it can add Azure Active Directory users as guests into the account. This feature was added last autumn.
In this configuration, you can invite AAd and MSA users directly from Azure DevOps and the MSA users don't get any access to the Azure account.
Azure DevOps configured as AAD backed with MSA guests in Azure Active Directory
When your Azure DevOps account is configured to be backed by Azure Active Directory, it can only add users who are known in Azure Active Directory. However, you can invite Microsoft Accounts into your AAD as guests. You can even invite users from other AADs as federated guests.
In this configuration you can only invite users who are known by AAD into you Azure DevOps account. If they're not in AAD, you'll have to invite them into AAD first.
Switching
You can switch the account between the different association modes. To migrate existing users from one type to another (AAD->MSA, MSA->AAD) you currently need to open a support request to get all of the users mapped over. In this scenario you get an excel export from your account and you provide a mapping between the old and the new uesr account. Support will mapthem for you.
Manual process
You can also take a manual approach. This model isn't well documented. And when manually mappign you'll have to re-apply the security permissions manually as well. As such, thsi approach isn't recommended.
Once in AAD
Once your users are all in Azure Active directory, you can set policies on their access patterns, restrict IP addresses, require 2FA tokens and such. The value is questionable for external users as it won't work for all guest types. It will be valuable for your own users. You can enforce policy on users in your AAD. It's recommended to work with your federation partners to ensure that they're also using the right policies for their own users.
I think this will help you, I also faced the same problem which I mentioned, this article explained in details very clearly that how we can apply 'Conditional Access Policies' to avoid unauthorized access on Azure repositories(Code). after apply the policies on Azure portal, We need to enable the option on dev.portal Enable Conditional Access for Azure DevOps, Hope this will helps you.

Visual Studio: multiple accounts for Azure and license

For security reasons, we decided to create separate accounts for our Azure deployments.
Therefore, some users have an email account that holds Visual Studio license, and a separate account that has privileges on Azure subscriptions and no email address.
We use ADFS federation to log in to Azure. I tried to add the two accounts separately, but each time I validate authentication, it only displays my main (email) account.
I know that to log in to the Azure portal with my other account, I have to use Firefox.
Is there any way to do that with Visual Studio?
Thanks

Can not add Dynamics CRM to Registered Active Directory Application

I am trying to create a SPA that uses Dynamics CRM Web API. While registering my Application in Azure Active Directory I can not find Dynamics CRM Online in the permissions to other applications window.
Do I need to upgrade my subscription or am I doing something wrong?
It's easiest if your azure account uses the same login that has access to CRM. Then you will see CRM as an application option.
If the Azure account you're using isn't the same one that you use to login to CRM, you'll need to connect the two. In order to do this, though, the O365 account you use for CRM needs to be a global admin in O365. This page has instructions.
To associate an existing Azure subscription with your Office 365
account
Log on to the Microsoft Azure Management portal with your existing
Azure credentials (for example, your Microsoft ID such as
user#live.com).
Select the Active Directory node, then select the
Directory tab and, at the bottom of the screen, select New.
On the New
menu, select Active Directory > Directory > Custom Create.
In Add directory, in the Directory drop-down box, select Use existing
directory. Check I am ready to be signed out, and then select the
check mark in the lower-right corner. This brings you back to the
Azure Management Portal.
Log in with your Office 365 account
information. You will be prompted whether to use your directory with
Azure.
Important To associate your Office 365 account with Azure AD,
you'll need an Office 365 business account with global administrator
privileges.
Select continue, and then Sign out now.
Close the browser and reopen the portal. Otherwise, you will get an access denied error.
Log on again with your existing Azure credentials (for example, your
Microsoft ID such as user#live.com). Navigate to the Active Directory
node and, under Directory, you should now see your Office 365 account
listed.
If your CRM O365 doesn't have global admin privileges, I would recommend just creating an azure account with the same account you use to connect to CRM According to the SDK, "the account is free for application registration and your credit card won’t be charged if you only follow the procedures called out in this topic to register one or more apps."

Resources