Events
Microsoft 365 Community Conference
May 6, 2 PM - May 9, 12 AM
Skill up for the era of AI at the ultimate community-led Microsoft 365 event, May 6-8 in Las Vegas.
Learn moreThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Microsoft Graph exposes hundreds of endpoints that allow you to tap into data and insights in Microsoft 365. To use these API endpoints, you need to request a correct set of permissions.
If you work on a large solution that uses many endpoints, it can be difficult to build the exact list of minimal permissions for your application.
To detect the minimal Microsoft Graph API permissions that your app requires:
GraphMinimalPermissionsPlugin
plugin.The proxy returns a list of minimal permissions in the activity summary based on the intercepted requests.
For example:
Retrieving minimal permissions for:
- GET /me
- GET /users/{users-id}/calendars
Minimal permissions:
User.Read, Calendars.Read
By default, Dev Proxy detects minimal Delegated
permissions.
To return Application
permissions, update the graphMinimalPermissionsPlugin
configuration block in the devproxyrc.json file to:
{
"graphMinimalPermissionsPlugin": {
"type": "application"
}
}
Dev Proxy feedback
Dev Proxy is an open source project. Select a link to provide feedback:
Events
Microsoft 365 Community Conference
May 6, 2 PM - May 9, 12 AM
Skill up for the era of AI at the ultimate community-led Microsoft 365 event, May 6-8 in Las Vegas.
Learn moreTraining
Learning path
Microsoft Graph Fundamentals - Training
New to Microsoft Graph? Microsoft Graph Fundamentals is a multi-part series that teaches you basic concepts of Microsoft Graph. It will guide you with hands-on exercises on how to use Microsoft Graph API requests to start developing or enhancing your applications with Microsoft 365 data.
Certification
Microsoft Certified: Information Protection and Compliance Administrator Associate - Certifications
Demonstrate the fundamentals of data security, lifecycle management, information security, and compliance to protect a Microsoft 365 deployment.