@Gurutej Nettalam Hello
I have seen this case before so many developers once upon a time had this issue, I'm going to share you somethings you can double check;
If non-admin users are still being prompted for consent despite an admin granting tenant-wide admin consent, here are a few things to check:
- Verify Admin Consent Has Been Granted Correctly
Ensure that the admin consent was successfully applied. To check:
- Go to Azure Portal → Azure AD → Enterprise Applications.
- Locate your application.
- Go to Permissions → Check "Admin consent granted" for the required permissions.
If the permissions show "Not granted," then the consent was not applied correctly.
- Confirm That the Permissions Were Granted Tenant-Wide
- If you used:
bash
CopyEdit
https://login.microsoftonline.com/{tenantId}/adminconsent?client_id=[client_id]&redirect_uri={myurl}
This should grant admin consent tenant-wide. However, confirm that the permissions granted match the ones requested in the OAuth flow.
- Check for Additional Required Permissions
- If new permissions were added after admin consent was granted, non-admin users will be prompted again.
- Ensure that all permissions (including "Calendars.ReadWrite", "OnlineMeetingTranscript.Read.All", etc.) are granted admin consent.
- Verify Conditional Access and User Consent Settings
- In Azure AD → Enterprise Applications → Consent and Permissions, check:
- If "Users can consent to apps accessing company data on their behalf" is disabled, users will require admin approval for any new permissions.
- If a Conditional Access Policy is requiring additional approval, this could trigger new consent prompts.
- If "Users can consent to apps accessing company data on their behalf" is disabled, users will require admin approval for any new permissions.
- Re-Grant Admin Consent via PowerShell
If the admin consent process via the URL isn't working as expected, you can try granting admin consent via PowerShell:
powershell
CopyEdit
Connect-AzureAD
$servicePrincipal = Get-AzureADServicePrincipal -Filter "AppId eq '[client_id]'"
$permissions = $servicePrincipal.Oauth2Permissions
New-AzureADServicePrincipalConsent -ObjectId $servicePrincipal.ObjectId -ConsentType "AllPrincipals" -PrincipalId $null -ResourceId $servicePrincipal.ObjectId -Scope "Calendars.ReadWrite OnlineMeetingTranscript.Read.All User.Read.All offline_access"
Replace [client_id]
with your actual application ID.
- Check App Registration API Permissions
- Go to Azure AD → App Registrations → Select your app.
- Under API Permissions, verify that all required permissions have admin consent granted.
- If not, click Grant admin consent for <TenantName>.
- Ensure There Are No App Updates That Require Re-Consent
- If the app developer updated the permissions in their manifest or API scopes, Azure AD may require users to re-consent.If non-admin users are still being prompted for consent despite an admin granting tenant-wide admin consent, here are a few things to check:
- Verify Admin Consent Has Been Granted Correctly
- Go to Azure Portal → Azure AD → Enterprise Applications.
- Locate your application.
- Go to Permissions → Check "Admin consent granted" for the required permissions.
- Confirm That the Permissions Were Granted Tenant-Wide
- If you used:
This should grant admin consent tenant-wide. However, confirm that the permissions granted match the ones requested in the OAuth flow.bash CopyEdit https://login.microsoftonline.com/{tenantId}/adminconsent?client_id=[client_id]&redirect_uri={myurl}
- Check for Additional Required Permissions
- If new permissions were added after admin consent was granted, non-admin users will be prompted again.
- Ensure that all permissions (including "Calendars.ReadWrite", "OnlineMeetingTranscript.Read.All", etc.) are granted admin consent.
- Verify Conditional Access and User Consent Settings
- In Azure AD → Enterprise Applications → Consent and Permissions, check:
- If "Users can consent to apps accessing company data on their behalf" is disabled, users will require admin approval for any new permissions.
- If a Conditional Access Policy is requiring additional approval, this could trigger new consent prompts.
- Re-Grant Admin Consent via PowerShell
powershell CopyEdit Connect-AzureAD
$servicePrincipal = Get-AzureADServicePrincipal -Filter "AppId eq '[client_id]'" $permissions = $servicePrincipal.Oauth2Permissions New-AzureADServicePrincipalConsent -ObjectId $servicePrincipal.ObjectId -ConsentType "AllPrincipals" -PrincipalId $null -ResourceId $servicePrincipal.ObjectId -Scope "Calendars.ReadWrite OnlineMeetingTranscript.Read.All User.Read.All offline_access"
Replace `[client_id]` with your actual application ID.
6. **Check App Registration API Permissions**
- Go to **Azure AD** → **App Registrations** → Select your app.
- Under **API Permissions**, verify that all required permissions have **admin consent granted**.
- If not, click **Grant admin consent for <TenantName>**.
7. **Ensure There Are No App Updates That Require Re-Consent**
- If the app developer updated the permissions in their manifest or API scopes, Azure AD may require users to re-consent.
😊 If my answer helped you resolve your issue, please consider marking it as the correct answer. This helps others in the community find solutions more easily. Thanks!