Hi @marekPan,
Thank you for posting this in Microsoft Q&A.
I understand that you have encountering an issue with the token format in Microsoft Azure's Entra ID service. you have attempted to modify the accessTokenAcceptedVersion field in the app manifest from null to 2, but the token format has not changed.
Are you requesting a token for your own web API or Microsoft web-hosted resources such as Microsoft Graph?
Unfortunately, we are unable to configure a Microsoft Graph on the service side because the Microsoft Graph app registration is officially managed by Microsoft.
To fix this issue you have to call your own API, follow below steps:
Expose delegated permissions:
Go to your application -> Select Expose an API -> Select Add next to Application ID URI if you haven't yet configured one.
Add scope then go to API permissions -> click Add a permission then select your scope which is created earlier and grant admin consent for that.
While requesting token, pass scope parameter which you have created (e.g:api//applicationid/sample)
For your reference: Expose delegated permissions:
Protected web API: App registration
If you are using client credential flow to get token need to Expose application permissions.
For your reference :Expose application permissions
Hope this helps. Do let us know if you any further queries.
Thanks,
Navya.
Please "Accept the answer" if the information helped you. This will help us and others in the community as well.