I'm trying to follow along with the sample AAD Role Based Authorization.
(1) Is it necessary to call Microsoft Graph in this example? When I look at the source code (AccountController.cs line 42), it appears that Microsoft Graph could be any sample API whose access could be denied for some users. Is this true?
(2) I'd like to follow along and call Microsoft Graph but the instructions at step 10 don't seem to match what I am seeing in the portal.azure.com.
(2a) I click on API Permissions and "Add Permissions" and I see a blade with Microsoft APIs.
(2b) I select the "Microsoft APIs tab and then click on the "Microsoft Graph" (with the nice blue icosahedron icon) and then click on the box "delegated". I don't see the "Commonly Used Microsoft APIs" section.
(2c) I click on the "Delegated Permissions" box and I see check boxes for "offline_access" and "openid". I don't see "User.Read, User.ReadBasic.All & Directory.Read.All". I use the search box but it does not help.
(3) What is the best place for queries like this? I I started to post here, but this looked more like a place for bugs..
(4) Looks this other example of group authorization has the same issue with step 10. There is no GroupMember.Read.All.
Wed Feb 10 2021 Evening Update:
OK, I see the problem. I'm trying to re-use the client I created with 4-2-B2C and I get these results:
However, when I create a new client following the instructions in the link in the orange rectangle, everything is good: I can add User.ReadBasic.All.
So apparently I need to use this new client to follow along with the exercise... OK... I'll do that.
However, the new question is: how can I enhance 4-2-B2C to incorporate Role/Group authorization? In this example I need to select the green rectangle. But then I cannot add User.ReadBasic.All.
If I select the red rectangle (as per the instructions for Role Based Authz), then I cannot have the flows for authenticating users).
How can I have both?