To call Microsoft Graph, an app must obtain an access token from the Microsoft identity platform. This access token includes information about whether the app is authorized to access Microsoft Graph on behalf of a signed-in user or with its own identity. This article provides guidance on how an app can access Microsoft Graph with its own identity, also called app-only access.
This article details the raw HTTP requests involved for an app to call Microsoft Graph with its own identity using a popular flow called the OAuth 2.0 client credentials grant flow. Alternatively, you can avoid writing raw HTTP requests and use a Microsoft-built or supported authentication library that handles many of these details for you and helps you to get access tokens and call Microsoft Graph. For more information, see Use the Microsoft Authentication Library (MSAL).
Prerequisites
Before proceeding with the steps in this article:
Understand the authentication and authorization concepts in the Microsoft identity platform. For more information, see Authentication and authorization basics.
For an app to get authorization and access to Microsoft Graph using the client credentials flow, you must follow these five steps:
Register the app with Microsoft Entra ID.
Configure Microsoft Graph application permissions on the app.
Request administrator consent.
Request an access token.
Call Microsoft Graph using the access token.
1. Register the app
Before the app can use the Microsoft identity platform endpoint or call Microsoft Graph, it must be properly registered. Follow the steps to register your app on the Microsoft Entra admin center.
From the app registration, save the following values:
The application ID (referred to as Object ID on the Microsoft Entra admin center) assigned by the app registration portal.
A client secret (application password), a certificate, or a federated identity credential.
A redirect URI for the app to receive token responses from Microsoft Entra ID.
A redirect URI for the service to receive admin consent responses if the app implements functionality to request administrator consent.
2. Configure permissions for Microsoft Graph
Microsoft Graph exposes application permissions for apps that call Microsoft Graph under their own identity. These permissions always require administrator consent.
You preconfigure the application permissions the app needs when you register the app. An administrator can consent to these permissions either using the Microsoft Entra admin center when they install the app in their organization, or you can provide a sign-up experience in the app through which administrators can consent to the permissions you configured. Once Microsoft Entra ID records the administrator consent, the app can request tokens without having to request consent again.
To configure application permissions for the app in the app registrations experience on the Microsoft Entra admin center, follow these steps:
Under the application's API permissions page, choose Add a permission.
Select Microsoft Graph > select Application permissions.
In the Select Permissions dialog, choose the permissions to configure to the app.
The following screenshot shows the Select Permissions dialog box for Microsoft Graph application permissions.
Administrators can grant the permissions your app needs at the Microsoft Entra admin center. However, when you don't have access to the Microsoft Entra admin center, you can provide a sign-up experience for administrators by using the Microsoft identity platform /adminconsent endpoint.
Important
When you change the configured permissions, you must also repeat the admin consent process. Changes made in the app registration portal aren't reflected until an authorized administrator such as a privileged role administrator reconsents to the app.
// Line breaks are for legibility only.
GET https://login.microsoftonline.com/{tenant}/adminconsent
?client_id=6731de76-14a6-49ae-97bc-6eba6914391e
&state=12345
&redirect_uri=https://localhost/myapp/permissions HTTP/1.1
Parameter
Condition
Description
tenant
Required
The directory tenant that you want to request permission from. The value can be in GUID or a friendly name format. If you don't know which tenant the user belongs to and you want to let them sign in with any tenant, use common.
The redirect URI where you want the response to be sent for your app to handle. It must match one of the redirect URIs that you registered in the portal. It must be URL encoded and it can have additional path segments.
state
Recommended
A value that is included in the request that also is returned in the token response. It can be a string of any content that you want. The state is used to encode information about the user's state in the app before the authentication request occurred, such as the page or view they were on.
Administrator consent experience
With requests to the /adminconsent endpoint, Microsoft Entra ID enforces that only an authorized administrator can sign in to complete the request. The administrator is asked to approve all the application permissions that you requested for your app in the app registration portal.
The following screenshot is an example of the consent dialog that Microsoft Entra ID presents to the administrator:
Response
If the administrator approves the permissions for your application, the successful response looks like this:
HTTP
// Line breaks are for legibility only.
https://localhost/myapp/permissions?admin_consent=True&tenant=38d49456-54d4-455d-a8d6-c383c71e0a6d&state=12345#
Parameter
Description
tenant
The directory tenant that granted your application the permissions that it requested, in GUID format.
state
A value that is included in the request that also is returned in the token response. It can be a string of any content that you want. The state is used to encode information about the user's state in the app before the authentication request occurred, such as the page or view they were on.
admin_consent
Set to True.
4. Request an access token
In the OAuth 2.0 client credentials grant flow, you use the application ID and client secret values that you saved when you registered your app to request an access token directly from the Microsoft identity platform /token endpoint.
You specify the preconfigured permissions by passing https://graph.microsoft.com/.default as the value for the scope parameter in the token request.
Token request
Send a POST request to the /token identity platform endpoint to acquire an access token. In this request, the client uses the client secret.
// Line breaks are for legibility only.
POST https://login.microsoftonline.com/{tenant}/oauth2/v2.0/token HTTP/1.1
Host: login.microsoftonline.com
Content-Type: application/x-www-form-urlencoded
client_id=535fb089-9ff3-47b6-9bfb-4f1264799865
&scope=https%3A%2F%2Fgraph.microsoft.com%2F.default
&client_secret=qWgdYA....L1qKv5bPX
&grant_type=client_credentials
Parameter
Condition
Description
tenant
Required
The directory tenant that you want to request permission from. The value can be in GUID or a friendly name format.
The value passed for the scope parameter in this request should be the identifier (app ID URI) of the resource you want, affixed with the .default suffix. For example, the Microsoft Graph resource app ID URI is https://graph.microsoft.com/. For Microsoft Graph, the value of scope is therefore https://graph.microsoft.com/.default. This value informs the Microsoft identity platform endpoint to include in the access token all the app-level permissions the admin has consented to.
client_secret
Required
The client secret that you generated for your app in the app registration portal. Ensure that it's URL encoded.
The requested access token. Your app can use this token in calls to Microsoft Graph.
expires_in
How long the access token is valid (in seconds).
ext_expires_in
Used to indicate an extended lifetime for the access token and to support resiliency when the token issuance service isn't responding.
token_type
Indicates the token type value. The only type that Microsoft Entra ID supports is Bearer.
5. Use the access token to call Microsoft Graph
After you have an access token, the app uses it to call Microsoft Graph by attaching the access token as a Bearer token to the Authorization header in an HTTP request. The following request gets all users in the tenant. The app must have the User.Read.All permission to call this API.
Apps that have a signed-in user but also call Microsoft Graph with their own identity. For example, to use functionality that requires more elevated privileges than the user has.
In this article, the app used a client secret as the credential. You can optionally configure a certificate or a federated identity credential.
In this article, you walked through the low-level protocol details required only when manually crafting and issuing raw HTTP requests to execute the client credentials flow. In production apps, use a Microsoft-built or supported authentication library, such as the Microsoft Authentication Library (MSAL), to get security tokens and call protected web APIs such as Microsoft Graph.
MSAL and other supported authentication libraries simplify the process for you by handling details such as validation, cookie handling, token caching, and secure connections, allowing you to focus on the functionality of your application.
Microsoft has built and maintains a wide selection of code samples that demonstrate usage of supported authentication libraries with the Microsoft identity platform. To access these code samples, see the Microsoft identity platform code samples.
Related content
Choose from code samples that are built and maintained by Microsoft to run custom apps that use supported authentication libraries, sign-in users, and call Microsoft Graph. See Microsoft Graph tutorials.