Hi @Patrick McInerney ,
Thanks for your post and for sharing your update!
Yes, the scope parameter in the request should be the resource identifier (application ID URI) of the resource you want, affixed with the default suffix. See Access token reference
If you want to use the application permissions with your own API, you need to expose the API by defining the scopes in the API's app registration. Then you need to configure access to the API by selecting those permissions in the client application's app registration.
If you set the scope parameter with a custom name such as "https://cnt-prod.loadtesting.azure.com/.default" without configuring the same URL as the application ID URI in Azure AD, then you will see the AADSTS500011 error.
See related thread and documentation:
Azure Active Directory Oauth 2.0 Client Credentials Flow with API Management Access Token issue
Application Permissions
Thanks again for sharing your update and let me know if you are still facing any issues!
-
If the information helped you, please Accept the answer. This will help us and other community members as well.