Apps can’t make requests to Azure AD Graph APIs after February 1, 2025 – unless you take action to postpone the impact.
Applications are unable to make requests to Azure AD Graph APIs after February 1, 2025. Here’s how you can take action to extend access until June 30, 2025.
Retirement of the Azure AD Graph API service began in September 2024 and impacts both new and existing applications. We’re now completing the first phase of Azure AD Graph retirement, and new applications will not be able to use Azure AD Graph APIs unless they are configured for extended access. Microsoft Graph is the replacement for Azure AD Graph APIs, and we strongly recommend immediately migrating use of Azure AD Graph APIs to Microsoft Graph and limiting any further development using Azure AD Graph APIs.
We’ve communicated extensively about this retirement, but as a refresher, here are the key milestones:
Phase start date |
Impact to existing apps |
Impact to new apps |
September 1, 2024 |
None. |
All new apps must use Microsoft Graph. New apps are blocked from using Azure AD Graph APIs, unless the app is configured to allow extended Azure AD Graph access until June 30, 2025 by setting to false. |
February 1, 2025 |
Application is unable make requests to Azure AD Graph APIs unless it is configured to allow extended Azure AD Graph access by setting blockAzureAdGraphAccess to false. Take action to prepare via the steps in this blog post. | |
July 1, 2025 |
Azure AD Graph is fully retired. No Azure AD Graph API requests will function. |
Required actions:
To avoid impact, it’s important to take action now to ensure that your tenant is ready for the Azure AD Graph retirement. Follow the two steps detailed below to identify and mitigate use of Azure AD Graph APIs by applications in your tenant.
Step one: Identify apps using Azure AD Graph APIs in your tenant
The first step in getting your tenant ready for the Azure AD Graph retirement is to identify applications that are using Azure AD Graph APIs. We’ve provided two Microsoft Entra recommendations that show information about applications and service principals that are actively using Azure AD Graph APIs in your tenant. These recommendations are:
- Migrate Applications from the retiring Azure AD Graph APIs to Microsoft Graph - Details applications that are created in your tenant that are accessing Azure AD Graph APIs currently.
- Migrate Service Principals from the retiring Azure AD Graph APIs to Microsoft Graph: Details multi-tenant applications provided by a software vendor that are used in your tenant and are accessing Azure AD Graph APIs currently.
The information shown in these recommendations is based on actual usage of Azure AD Graph APIs in your tenant and is the best source to find apps that need attention for Azure AD Graph retirement. The recommendations list Applications and provide information about the operations the apps are performing. This can help clarify the usage of Azure AD Graph APIs that must be migrated.
You can access these recommendations in the Microsoft Entra admin center by browsing to: Identity > Overview > Recommendations
Figure 1: Microsoft Entra Recommendations for Azure AD Graph retirement.Figure 2: Detailed view of Microsoft Entra recommendations for Azure AD Graph retirement.
Resources:
- Learn more about these recommendations: Recommendation to migrate to Microsoft Graph API - Microsoft Entra ID | Microsoft Learn
- Learn how to find and act upon recommendations in the Microsoft Entra admin center: How to use Microsoft Entra recommendations - Microsoft Entra ID | Microsoft Learn
Optional: Programmatically reporting on impacted applications
If you would like to export the information from the Microsoft Entra recommendations, or automate a periodic report, you can use the Microsoft Entra Recommendations APIs or Microsoft Graph PowerShell.
PowerShell example:
Import-Module Microsoft.Graph.Beta.Identity.DirectoryManagement Import-Module Microsoft.Graph.Beta.Applications Connect-MgGraph -Scopes "Application.Read.All", "User.Read.All", "DirectoryRecommendations.Read.All" $appsRecommendationType = "aadGraphDeprecationApplication" $spRecommendationType = "aadGraphDeprecationServicePrincipal" function getImpactedResources($recommendationType){ $recommendation = Get-MgBetaDirectoryRecommendation -Filter "recommendationType eq `'$recommendationType`'" $resources ="" if($recommendation){ $resources = Get-MgBetaDirectoryRecommendationImpactedResource -RecommendationId $recommendation.id -Filter "Status eq 'active'" | select DisplayName, Id, Status } $resources | ft } Write-Output "Applications to migrate from Azure AD Graph to Microsoft Graph" getImpactedResources $appsRecommendationType Write-Output "Service Principals to migrate from Azure AD Graph to Microsoft Graph" getImpactedResources $spRecommendationType |
Step 2: Preparing applications for Azure AD Graph retirement
Action will be needed for each application using Azure AD Graph APIs identified by the two Microsoft Entra Recommendations. Applications shown in both the Migrate Applications recommendation and the Migrate Service Principals recommendation will need to be updated by the developer to use Microsoft Graph APIs instead of Azure AD Graph APIs. An extension can be configured to allow an application to use Azure AD Graph through June 30, 2025.
The next steps and who needs to take action will be different for applications created in your tenant versus service principals for vendor-supplied applications.
Applications created in your tenant
Impacted resources shown in the Migrate Applications from the retiring Azure AD Graph APIs to Microsoft Graph are applications that are created in your tenant. You must take action for any application listed in this recommendation before 1 February 2025.
- Contact the application owners or developers in your organization and ensure that they’re aware of Azure AD Graph retirement and have a plan to migrate to Microsoft Graph APIs. You can find the owners for the application by clicking on More Details and then the application name in the Microsoft Entra Recommendation, or by finding the application in the App Registrations list in the Microsoft Entra portal.
- If the application will not be migrated to Microsoft Graph APIs by February 1, 2025, you can configure an extension for the application, allowing access through June 30, 2025. This is done by setting blockAzureADGraphAccess:false in the app’s authenticationBehaviors configuration. This can be done through Microsoft Graph Explorer or Microsoft Graph PowerShell. Learn more: Manage application authenticationBehaviors.
- The application developer should reference our documentation on migrating applications from Azure AD Graph to Microsoft Graph, and plan on completing this migration by June 30, 2025 (if the extension has been set for the application).
- Note: If you are using service principal login for applications like Microsoft Azure PowerShell or Microsoft Azure CLI, and the application is using Azure AD Graph APIs, it will show on the Migrate Applications recommendation. In this case, the application’s identity is registered in your tenant, and you must take action. For these cases, you should update the installed version of the software to eliminate Azure AD Graph API usage, and/or set the extension for the app defined in your tenant.
Service Principals for vendor-supplied applications
Impacted resources shown in the Migrate Service Principals from the retiring Azure AD Graph APIs to Microsoft Graph are service principals – multi-tenant applications provided by a software vendor that are used in your tenant. We have ensured that all Microsoft ‘first-party’ applications that are still using Azure AD Graph APIs have the extension through June, 2025.
However, action is still needed for each service principal listed in this recommendation. In many cases, an update will already be available that has replaced calls to Azure AD Graph APIs with Microsoft Graph APIs, and you will need to install the newer version. For apps provided by software vendors other than Microsoft, you will need to confirm readiness with the software vendor:
- If an update is available, you will need to plan to update the client software to the newer version.
- If there is not an update available:
-
- Ask the vendor if they have configured the application for an extension to continue using Azure AD Graph APIs through June 30, 2025. If needed, you can direct the vendor to this documentation.
- Confirm that the vendor has a plan to provide an update to the client software that replaces use of Azure AD Graph APIs with Microsoft Graph APIs.
Microsoft-provided applications
You may see applications provided by Microsoft in the Migrate Service Principals recommendation. These are using Azure AD Graph APIs in your tenant. As the software vendor for these applications, Microsoft has configured the extension for any “first-party” applications that are actively using Azure AD Graph APIs. To identify first-party applications, you can reference here and a more thorough list here. This means that they will not be impacted in the retirement phase starting 1 February 2025.
However, most Microsoft-provided applications that you may see in this recommendation have an update available that uses Microsoft Graph instead of Azure AD Graph APIs. You should take action for these to avoid impact later in 2025. Examples include:
Appid |
App Name |
Action required |
1b730954-1685-4b74-9bfd-dac224a7b894
|
Azure AD PowerShell |
Azure AD PowerShell is deprecated and will be retired soon. You should migrate to Microsoft Graph PowerShell SDK. For more information, reference: Migrate from Azure AD PowerShell to Microsoft Graph PowerShell. |
04b07795-8ddb-461a-bbee-02f9e1bf7b46 |
Azure CLI |
Update to version 2.66.0 or later. For more information, see Microsoft Graph migration. |
1950a258-227b-4e31-a9cf-717495945fc2 |
Azure PowerShell |
Update to version 12.4.0 or later: PowerShell Gallery | Az 12.4.0 |
04f0c124-f2bc-4f59-8241-bf6df9866bb |
Visual Studio |
Update Microsoft Visual Studio 2022 to version 17.7 or later: Visual Studio 2022 version 17.7 Release Notes |
You should plan to update any other Microsoft-provided applications listed in this recommendation.
Extending Azure AD Graph access for an app
If you have not fully completed app migrations to Microsoft Graph, you can extend this retirement. If you set the blockAzureADGraphAccess attribute to false in the app’s authenticationBehaviors configuration, the application will be able to use Azure AD Graph APIs through June 30, 2025. Further documentation can be found here.
New applications will receive a 403 error when attempting to access Azure AD Graph APIs unless this setting is set to false. For all existing applications that will not complete migration to Microsoft Graph in 2024, you should plan to set this configuration now.
Learn more: Allow extended Azure AD Graph access until June 30, 2025 - Microsoft Graph | Microsoft Learn
Benefits of migrating to Microsoft Graph
Microsoft Graph represents our best-in-breed API surface. It offers a single unified endpoint to access Microsoft Entra services and Microsoft 365 services such as Microsoft Teams and Microsoft Intune. All new functionalities will only be available through Microsoft Graph. Microsoft Graph is also more secure and resilient than Azure AD Graph.
Microsoft Graph has all the capabilities that have been available in Azure AD Graph and new APIs like identity protection and authentication methods. Its client libraries offer built-in support for features like retry handling, secure redirects, transparent authentication, and payload compression.
Resources:
Migrating to Microsoft Graph from Azure AD Graph is made easier with the following tools and documentation:
- Migrate from Azure Active Directory (Azure AD) Graph to Microsoft Graph
- Azure AD Graph app migration planning checklist
- Azure AD Graph to Microsoft Graph migration FAQ
And – if needed – you can extend access for your applications until June 30, 2025: Allow extended Azure AD Graph access until June 30, 2025 - Microsoft Graph | Microsoft Learn
Kristopher Bash
Product Manager, Microsoft Graph
LinkedIn
Learn more about Microsoft Entra
Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.
Updated Mar 12, 2025
Version 4.0krbash
Microsoft
Joined August 21, 2019
Microsoft Entra Blog
Stay informed on how to secure access for employees, customers, and non-human identities, from anywhere, to multicloud and on-premises resources, with comprehensive identity and network access solutions powered by AI.