Hi @jabran-corp, you can achieve this with the following request to Microsoft Graph. It's a workaround that depends on retrieving the service principal representing Microsoft Graph in the tenant, rather than a dedicated API, but the result is accurate.
Steps:
- In your tenant, identify the service principal that represents the Microsoft Graph app. This is the service principal where appId = "00000003-0000-0000-c000-000000000000".
- To see the application permissions, retrieve the appRoles property.
- To see the delegated permissions, retrieve the oauth2PermissionScopes property.
You can do this in Graph Explorer using the following command. It should work whether or not you sign in to Graph Explorer:
- GET https://graph.microsoft.com/v1.0/servicePrincipals?$filter=appId eq '00000003-0000-0000-c000-000000000000'&$select=appRoles,oauth2PermissionScopes
As @JamesTran-MSFT mentioned, please post on User Voice if you'd still like to share a feature request with the team.