Hi @Sharayu Mundhe · Thank you for reaching out.
Having Azure AD MFA enabled or disabled doesn't make any difference in how you pass the Access Token to a Web API. You need to make sure that the token that you get after successful authentication contains required permissions in the scp (scope) claim. I am suspecting that your Web API requires certain scopes to be present in the token, in order to authorize the user(s).
For this purpose, you need to navigate to:
Azure AD > App Registrations > Select your app > API permissions > select your API from Microsoft APIs/APIs my organization uses/My APIs > Add appropriate scope > Grant admin consent.
Once you successfully acquire a token, decode the token at https://jwt.ms to verify if it includes required scope(s).
Additional ref:
- Quickstart: Sign in users and call the Microsoft Graph API from an Android app
- https://learn.microsoft.com/en-us/graph/notifications-integration-app-registration
-----------------------------------------------------------------------------------------------------------
Please "Accept the answer" if the information helped you. This will help us and others in the community as well.