@Pedro Reinoso Thanks for reaching out. I believe you wanted to pre-authorize the token from the incoming request by writing a policy in APIM before sending it to the backend correct me if am wrong here
If yes, you can write Validate JWT policy in Inbound section to pre-authorize requests with AD token as below
<inbound>
<validate-jwt header-name="Authorization" failed-validation-httpcode="401" failed-validation-error-message="Unauthorized. Access token is missing or invalid.">
<openid-config url="https://login.microsoftonline.com/common/v2.0/.well-known/openid-configuration" />
<required-claims>
<claim name="aud">
<value>{client-id}</value>
</claim>
</required-claims>
</validate-jwt>
</inbound>
please refer this blog which explains step by steps process of protecting api's using oauth2.0 in APIM.
For simple token validation samples please refer this doc
Hope this helps! Please let me know incase of further queries, I would be happy to assist you.