Get application list from Azure AD with same user access
I want to create a dashboard. Azure AD is used to authenticate the user and i already implemented that. Now my task is to display the icons in the dashboard according to access. for eg in my organization, there are 3 other applications, A, B and C. User has access to application A and B but not C, so after login, the user can see Applications A and B as icons but not C. On click of A or B, will allow user to access without any sign in again. Any pointer would be great.


add a comment |
I want to create a dashboard. Azure AD is used to authenticate the user and i already implemented that. Now my task is to display the icons in the dashboard according to access. for eg in my organization, there are 3 other applications, A, B and C. User has access to application A and B but not C, so after login, the user can see Applications A and B as icons but not C. On click of A or B, will allow user to access without any sign in again. Any pointer would be great.


add a comment |
I want to create a dashboard. Azure AD is used to authenticate the user and i already implemented that. Now my task is to display the icons in the dashboard according to access. for eg in my organization, there are 3 other applications, A, B and C. User has access to application A and B but not C, so after login, the user can see Applications A and B as icons but not C. On click of A or B, will allow user to access without any sign in again. Any pointer would be great.


I want to create a dashboard. Azure AD is used to authenticate the user and i already implemented that. Now my task is to display the icons in the dashboard according to access. for eg in my organization, there are 3 other applications, A, B and C. User has access to application A and B but not C, so after login, the user can see Applications A and B as icons but not C. On click of A or B, will allow user to access without any sign in again. Any pointer would be great.




asked Nov 20 '18 at 9:05
RajeshRajesh
357
357
add a comment |
add a comment |
1 Answer
1
active
oldest
votes
Generally speaking, you will probably find it's simpler to use the existing Access Panel from Azure AD (https://myapps.microsoft.com), which already displays the apps the user has access to.
That said, if you have a compelling reason to re-build this yourself, you can list a user's app role assignments (apps that the user has been assigned to) using the Microsoft Graph API or the Azure AD Graph API. For example, using the Microsoft Graph, the following request will list the apps the signed-in user is assigned to:
GET https://graph.microsoft.com/beta/me/appRoleAssignments
In the resulting list of app role assignments, the resourceId
attribute will identify a ServicePrincipal object. You can then retrieve the ServicePrincipal object and retrieve (for example) the homepage
property (for building your link):
GET https://graph.microsoft.com/beta/servicePrincipals/{id}
(Note: The equivalent requests using Azure AD Graph are below:)
GET https://graph.windows.net/myorganization/me/appRoleAssignments
https://graph.windows.net/myorganization/servicePrincipals/{id}
add a comment |
Your Answer
StackExchange.ifUsing("editor", function () {
StackExchange.using("externalEditor", function () {
StackExchange.using("snippets", function () {
StackExchange.snippets.init();
});
});
}, "code-snippets");
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "1"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53389540%2fget-application-list-from-azure-ad-with-same-user-access%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
Generally speaking, you will probably find it's simpler to use the existing Access Panel from Azure AD (https://myapps.microsoft.com), which already displays the apps the user has access to.
That said, if you have a compelling reason to re-build this yourself, you can list a user's app role assignments (apps that the user has been assigned to) using the Microsoft Graph API or the Azure AD Graph API. For example, using the Microsoft Graph, the following request will list the apps the signed-in user is assigned to:
GET https://graph.microsoft.com/beta/me/appRoleAssignments
In the resulting list of app role assignments, the resourceId
attribute will identify a ServicePrincipal object. You can then retrieve the ServicePrincipal object and retrieve (for example) the homepage
property (for building your link):
GET https://graph.microsoft.com/beta/servicePrincipals/{id}
(Note: The equivalent requests using Azure AD Graph are below:)
GET https://graph.windows.net/myorganization/me/appRoleAssignments
https://graph.windows.net/myorganization/servicePrincipals/{id}
add a comment |
Generally speaking, you will probably find it's simpler to use the existing Access Panel from Azure AD (https://myapps.microsoft.com), which already displays the apps the user has access to.
That said, if you have a compelling reason to re-build this yourself, you can list a user's app role assignments (apps that the user has been assigned to) using the Microsoft Graph API or the Azure AD Graph API. For example, using the Microsoft Graph, the following request will list the apps the signed-in user is assigned to:
GET https://graph.microsoft.com/beta/me/appRoleAssignments
In the resulting list of app role assignments, the resourceId
attribute will identify a ServicePrincipal object. You can then retrieve the ServicePrincipal object and retrieve (for example) the homepage
property (for building your link):
GET https://graph.microsoft.com/beta/servicePrincipals/{id}
(Note: The equivalent requests using Azure AD Graph are below:)
GET https://graph.windows.net/myorganization/me/appRoleAssignments
https://graph.windows.net/myorganization/servicePrincipals/{id}
add a comment |
Generally speaking, you will probably find it's simpler to use the existing Access Panel from Azure AD (https://myapps.microsoft.com), which already displays the apps the user has access to.
That said, if you have a compelling reason to re-build this yourself, you can list a user's app role assignments (apps that the user has been assigned to) using the Microsoft Graph API or the Azure AD Graph API. For example, using the Microsoft Graph, the following request will list the apps the signed-in user is assigned to:
GET https://graph.microsoft.com/beta/me/appRoleAssignments
In the resulting list of app role assignments, the resourceId
attribute will identify a ServicePrincipal object. You can then retrieve the ServicePrincipal object and retrieve (for example) the homepage
property (for building your link):
GET https://graph.microsoft.com/beta/servicePrincipals/{id}
(Note: The equivalent requests using Azure AD Graph are below:)
GET https://graph.windows.net/myorganization/me/appRoleAssignments
https://graph.windows.net/myorganization/servicePrincipals/{id}
Generally speaking, you will probably find it's simpler to use the existing Access Panel from Azure AD (https://myapps.microsoft.com), which already displays the apps the user has access to.
That said, if you have a compelling reason to re-build this yourself, you can list a user's app role assignments (apps that the user has been assigned to) using the Microsoft Graph API or the Azure AD Graph API. For example, using the Microsoft Graph, the following request will list the apps the signed-in user is assigned to:
GET https://graph.microsoft.com/beta/me/appRoleAssignments
In the resulting list of app role assignments, the resourceId
attribute will identify a ServicePrincipal object. You can then retrieve the ServicePrincipal object and retrieve (for example) the homepage
property (for building your link):
GET https://graph.microsoft.com/beta/servicePrincipals/{id}
(Note: The equivalent requests using Azure AD Graph are below:)
GET https://graph.windows.net/myorganization/me/appRoleAssignments
https://graph.windows.net/myorganization/servicePrincipals/{id}
answered Nov 20 '18 at 10:12
Philippe SignoretPhilippe Signoret
6,64612443
6,64612443
add a comment |
add a comment |
Thanks for contributing an answer to Stack Overflow!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53389540%2fget-application-list-from-azure-ad-with-same-user-access%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown