%3CLINGO-SUB%20id%3D%22lingo-sub-1557338%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1557338%22%20slang%3D%22en-US%22%3E%3CP%3EI%20received%20the%20email%20with%20a%20link%20to%20this%20article%20and%20the%20message%3A%20%22You%20are%20receiving%20this%20message%20because%20our%20reporting%20indicates%20one%20or%20more%20of%20your%20applications%20are%20using%20ADAL.%22%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20don't%20develop%20our%20own%20apps%20and%20want%20to%20find%20which%20ones%20are%20using%20ADAL.%20However%2C%20there%20doesn't%20seem%20obvious%20choices%20in%20the%20Azure%20support%20area%20for%20that...%20Which%20should%20I%20select%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1557379%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1557379%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EI%20received%20the%20email%20with%20a%20link%20to%20this%20article%20and%20the%20message%3A%20%22You%20are%20receiving%20this%20message%20because%20our%20reporting%20indicates%20one%20or%20more%20of%20your%20applications%20are%20using%20ADAL.%22%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3ESo%20now%20I%20want%20to%20know%20how%20I%20can%20get%20a%20report%20of%20the%20applications%20that%20are%20using%20ADAL.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1557982%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1557982%22%20slang%3D%22en-US%22%3E%3CP%3ESame%20as%20the%20two%20comments%20above.%26nbsp%3B%20I%20have%20had%20the%20email%20to%20say%20we%20are%20using%20ADAL.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20only%20thing%20I%20can%20think%20of%20for%20me%20is%20our%20Hybrid%20Exchange%20or%20Azure%20AD%20Connect%20service%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1558037%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1558037%22%20slang%3D%22en-US%22%3E%3CP%3EAgain%20same%20as%20all%20above%20comments%2C%20email%20to%20say%20we%20are%20using%20ADAL%20but%20no%20idea%20what%20would%20be%20using%20it%2C%20we%20do%20not%20develop%20our%20own%20apps.%20The%20only%20service%20I%20can%20think%20of%20is%20Azure%20AD%20Connect.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1571242%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1571242%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20are%20working%20on%20the%20new%20feature%20in%20the%20Azure%20AD%20Portal%20with%20which%20we%20can%20provide%20you%20this%20list%20of%20applications%20which%20are%20using%20ADAL%20and%2For%20Azure%20AD%20Graph.%20Now%20we%20have%20also%20updated%20the%20blog%20post%20which%20talks%20about%20the%20product%20enhancements.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1571374%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1571374%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F102154%22%20target%3D%22_blank%22%3E%40Jeevan%20Desarda%3C%2FA%3E-%20Thanks%20for%20that.%3C%2FP%3E%3CP%3ECan%20you%20confirm%20if%20AD%20Connect%20and%20Exchange%20Hybrid%20use%20either%20of%20the%20soon-to-be-depreciated%20methods%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThen%2C%20those%20of%20us%20non-developers%20can%20relax%20and%20wait%20for%20updates%20from%20Microsoft.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1664699%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1664699%22%20slang%3D%22en-US%22%3E%3CP%3EHello%2C%20I'm%20trying%20to%20create%20a%20script%20that%20dumps%20all%20the%20IAM%20roles%20(%3CSPAN%3EGet-AzRoleAssignment%3C%2FSPAN%3E%3CFONT%20face%3D%22inherit%22%3E).%20Using%20service%20principal%20to%20login.%20When%20using%20the%20Microsoft%20Graph%20API%20permissions%2C%20I%20get%26nbsp%3BMicrosoft.Rest.Azure.CloudException.%20When%20debugging%2C%20it%20meant%20my%20SP%20is%20%3C%2FFONT%3Eunauthorized%3CFONT%20face%3D%22inherit%22%3E.%20But%20when%20I'm%26nbsp%3B%20using%20the%20legacy%20API%20(Azure%20Active%20Directory%20Graph)%20permissions%2C%20it%20works%20great.%20Any%20idea%3F%26nbsp%3B%3C%2FFONT%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1714016%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1714016%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F102154%22%20target%3D%22_blank%22%3E%40Jeevan%20Desarda%3C%2FA%3E%26nbsp%3B%3CBR%20%2F%3Ewhen%20we%20can%20expect%20the%20new%20feature%20be%20able%20to%20see%20easy%20which%20apps%20are%20affected%2C%20we%20have%20thousands%20reason%20why%20asking.%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1839904%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1839904%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20for%20this%20post%2C%20Alex%20(getting%20an%20error%20about%20invalid%20HTML%20in%20message%20when%20%40%20mentioning%20you%2C%20so%20removing%20that%20link).%20As%20the%20others%20before%20me%20have%20stated%2C%20I'm%20looking%20for%20documentation%20for%20how%20to%20determine%20which%20applications%20are%20currently%20using%20ADAL.%20I%20did%20find%20another%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fwindows-dev-appconsult%2Fhow-to-use-active-directory-authentication-library-adal-for-net%2Fba-p%2F400623%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3Earticle%20from%20April%202019%3C%2FA%3E%20about%20how%20to%20use%20ADAL%2C%20so%20I%20suspect%20that%20our%20Developers%20will%20need%20to%20comb%20through%20configuration%20files%2C%20looking%20for%20the%20code.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1957315%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1957315%22%20slang%3D%22en-US%22%3E%3CP%3EI'm%20a%20little%20confused...your%20initial%20paragraph%20says%20%22%3CSTRONG%3EAzure%20Active%20Directory%20(Azure%20AD)%3C%2FSTRONG%3E%2C%26nbsp%3BAuthentication%26nbsp%3BLibrary%26nbsp%3B(ADAL)%26nbsp%3Band%20Azure%20AD%20Graph%26nbsp%3BAPI%22%20are%20going%20away.%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3EBut...your%20link%20to%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fbuild-2020-fostering-a-secure-and-trustworthy-app-ecosystem-for%2Fba-p%2F1257360%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EMicrosoft%20Build%202020%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Esays%20%22MSAL%20makes%20it%20easy%20to%20implement%20the%20right%20authentication%20patterns%20that%20support%20any%20Microsoft%20identity%E2%80%94from%20%3CSTRONG%3EAzure%20Active%20Directory%20(Azure%20AD)%3C%2FSTRONG%3E%20accounts%20to%20Microsoft%20accounts%22.%3CBR%20%2F%3E%3CBR%20%2F%3EMeanwhile...if%20I%20%3CEM%3EGoogle%3C%2FEM%3E%20%22%3CSTRONG%3EIs%20Azure%20AD%20going%20away%3C%2FSTRONG%3E%22...I%20get%20different%20answers%20such%20as%20%22Azure%20AD%20Basic%20is%20going%20away%22%20(whatever%20that%20means).%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CUL%3E%3CLI%3EIs%20Azure%20AD%20going%20away%3F%3C%2FLI%3E%3CLI%3EWhat%20about%20B2C%20and%20B2B%3F%3C%2FLI%3E%3CLI%3EOr%20is%26nbsp%3BAzure%20AD%20simply%20%3CEM%3Echanging%3C%2FEM%3E%3F%3C%2FLI%3E%3CLI%3EIs%20MSAL%20and%20the%20Microsoft%20Graph%20API%20completely%20replacing%26nbsp%3BAzure%20AD%3F%3C%2FLI%3E%3CLI%3EOr%2C%20are%20MSAL%20and%20the%20Microsoft%20Graph%20API%20going%20to%20%22fit%20into%22%20a%20%3CEM%3Enew%20version%3C%2FEM%3E%20of%26nbsp%3BAzure%20AD%3F%3CBR%20%2F%3E%3CBR%20%2F%3EAnd%20lastly...%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FLI%3E%3CLI%3EIs%20there%20a%20video%20that%20clarifies%20all%20of%20this%3F%3C%2FLI%3E%3C%2FUL%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%20for%20the%20help.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1957404%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1957404%22%20slang%3D%22en-US%22%3E%3CP%3EI%20am%20a%20little%20confused...your%20initial%20paragraph%20says%20%22%3CSTRONG%3EAzure%20Active%20Directory%20(Azure%20AD)%3C%2FSTRONG%3E%2C%20Authentication%20Library%20(ADAL)%20and%20Azure%20AD%20Graph%20API%22%20are%20going%20away.%3C%2FP%3E%3CP%3E%3CBR%20%2F%3EBut...the%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fbuild-2020-fostering-a-secure-and-trustworthy-app-ecosystem-for%2Fba-p%2F1257360%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EMicrosoft%20Build%202020%3C%2FA%3E%26nbsp%3Blink%20says%20%22MSAL%20makes%20it%20easy%20to%20implement%20the%20right%20authentication%20patterns%20that%20support%20any%20Microsoft%20identity%E2%80%94from%20%3CSTRONG%3EAzure%20Active%20Directory%20(Azure%20AD)%3C%2FSTRONG%3E%20accounts%20to%20Microsoft%20accounts%22%3C%2FP%3E%3CP%3E%3CBR%20%2F%3EMeanwhile...if%20I%20%3CEM%3EGoogle%3C%2FEM%3E%20%22Is%20Azure%20AD%20going%20away%22%20I%20get%20differing%20results%2C%20such%20as%20%22%3CSTRONG%3EAzure%20AD%20Basic%20is%20going%20away.%3C%2FSTRONG%3E%22%20(whatever%20that%20means).%3CBR%20%2F%3E%3CBR%20%2F%3ESo...%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%3CUL%3E%3CLI%3EIs%20Azure%20AD%20going%20away%3F%3C%2FLI%3E%3CLI%3EOr%2C%20is%26nbsp%3BAzure%20AD%20simply%20%3CEM%3Echanging%3C%2FEM%3E%20in%20some%20manner%3F%3C%2FLI%3E%3CLI%3EWhat%20about%20B2C%20or%20B2B%3F%26nbsp%3B%20What%20happens%20to%20them%3F%3CBR%20%2F%3E%3CBR%20%2F%3ELastly...%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FLI%3E%3CLI%3EDo%20you%20have%20a%20video%20that%20explains%20all%20this%3F%3C%2FLI%3E%3C%2FUL%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%20for%20clarifying%20this%20for%20me.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1958270%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1958270%22%20slang%3D%22en-US%22%3E%3CP%3EIt's%20'%3CU%3EAzure%20Active%20Directory%20Authentication%20Library%20(ADAL)%3C%2FU%3E'%20that%20is%20going%20away%3B%20not%20Azure%20AD.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1975665%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1975665%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20have%20implemented%20azure%20b2c%20to%20control%20access%20to%20one%20of%20our%20applications.%26nbsp%3B%20As%20part%20of%20this%20process%20we%20have%20User%20flows%20for%20the%20signup%20process%20but%20we%20also%20(within%20our%20application%20itself)%20use%20MS%20graph%20to%20create%20users%20directly%20into%20azure%20b2c%20that%20we%20can%20then%20link%20to%20our%20application.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20also%20have%20a%20user%20portal%20where%20they%20are%20able%20to%20update%20their%20password%20-%20we%20are%20using%20MS%20graph%20to%20update%20the%20users%20password%20via%20the%20call%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Tomp_BCU_0-1607599659822.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F239543i05092641A2B6F318%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22Tomp_BCU_0-1607599659822.png%22%20alt%3D%22Tomp_BCU_0-1607599659822.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3EThis%20all%20works%20fine%20in%20our%20UAT%20environment%20-%20using%20a%26nbsp%3Bb2c%20tenant%20that%20i%20setup%20Feb%202020%20i%20was%20able%20to%20setup%20API%20permissions%20both%20application%20and%20delegate%20and%20able%20to%20set%20the%20following%20permission%20under%20API%20permissions%20for%20the%20application%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Tomp_BCU_1-1607599775717.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F239544i9DD67567DEF4CCEA%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22Tomp_BCU_1-1607599775717.png%22%20alt%3D%22Tomp_BCU_1-1607599775717.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3EThis%20(i%20believe%20enables%20the%20above%20call%20to%20work)%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhen%20we%20then%20went%20live%20-%20we%20setup%20a%20production%20environment%20and%20production%20version%20of%20b2c%20we%20were%20%3CU%3Eunable%3C%2FU%3E%20to%20set%20this%20permission%20as%20a%20delegate%20permission%20on%20Microsoft%20graph%20and%20this%20therefore%20stops%20us%20being%20able%20to%20update%20the%20users%20password%20from%20within%20the%20users%20web%20portal.%26nbsp%3B%20All%20the%20other%20functionality%20is%20working%20fine%20e.g.%20creating%20users%20through%20MS%20Graph.%26nbsp%3B%20When%20we%20try%20and%20call%20the%20update%20password%20method%20(on%20production)%20we%20get%20the%20following%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Tomp_BCU_2-1607600224436.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F239545iE33016AD4B4000B3%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Tomp_BCU_2-1607600224436.png%22%20alt%3D%22Tomp_BCU_2-1607600224436.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ENow%20i%20know%20that%20i%20can%20use%20user%20flows%20(which%20we%20do%20have%20in%20place%20as%20part%20of%20the%20registration%20process)%20but%20we%20want%20a%20seamless%20(as%20is%20working%20on%20our%20UAT%20environment)%20user%20experience%20so%20wish%20to%20do%20the%20password%20update%20through%20MS%20Graph.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAny%20thoughts%20on%20this%2C%20i%20have%20logged%20the%20issues%20through%20Microsoft%20support%20and%20chatted%20to%20their%20Tek%20experts%20but%20they%20don't%20seem%20to%20have%20an%20answer%20for%20this.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2043109%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2043109%22%20slang%3D%22en-US%22%3E%3CP%3EI'm%20facing%20the%20issue%20%22%3CSTRONG%3EAADSTS65001%3C%2FSTRONG%3E%3A%20The%20user%20or%20administrator%20has%20not%20consented%20to%20use%20the%20application%20with%20ID%20''%20named%20''.%20Send%20an%20interactive%20authorization%20request%20for%20this%20user%20and%20resource.%22%20when%20upgrading%20from%20ADAL%20to%20MSAL.%3C%2FP%3E%3CP%3EI'm%20using%20the%3CSPAN%3E%26nbsp%3Bon%20behalf%20flow%20to%20get%20access%20token.%20The%20ADAL%20I%20used%20before%20always%20works%2C%20but%20the%20MSAL%20always%20throws%20this%20exception.%3CBR%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CDIV%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%3CP%3EThis%20code%20uses%20MSAL%20got%20this%20error.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22KienTruong_0-1610099060056.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244879i7E91F9E03731A593%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22KienTruong_0-1610099060056.png%22%20alt%3D%22KienTruong_0-1610099060056.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EThis%20code%20uses%20ADAL%20work%20for%20me%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22KienTruong_1-1610099095762.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244880iCCCE06C4EFD3C421%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22KienTruong_1-1610099095762.png%22%20alt%3D%22KienTruong_1-1610099095762.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1257363%22%20slang%3D%22en-US%22%3EUpdate%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1257363%22%20slang%3D%22en-US%22%3E%3CP%3EHowdy%20folks%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fbuild-2020-fostering-a-secure-and-trustworthy-app-ecosystem-for%2Fba-p%2F1257360%22%20target%3D%22_blank%22%3EMicrosoft%20Build%202020%3C%2FA%3E%20allowed%20us%20to%20engage%20deeply%20with%20our%20developer%20community%2C%20and%20we%20are%20continuing%20to%20improve%20how%20developers%20can%20easily%20use%20identity%20features%20in%20their%20applications.%20To%20help%20developers%20take%20advantage%20of%20all%20the%20identity%20features%20available%20in%20our%20platform%2C%20we%E2%80%99re%20now%20recommending%20that%20all%20developers%20to%20use%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fdevelop%2Fmsal-overview%23languages-and-frameworks%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EMicrosoft%20Authentication%20Library%20(MSAL)%3C%2FA%3E%20and%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fgraph%2Foverview%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EMicrosoft%20Graph%20API%3C%2FA%3E%20in%20their%20application%20development.%20Moving%20forward%2C%20all%20new%20identity%20capabilities%20will%20only%20be%20available%20in%20MSAL%20and%20Microsoft%20Graph.%20We%E2%80%99re%20also%20providing%20guidance%20on%20end%20of%20support%20timelines%20for%20Azure%20Active%20Directory%20(Azure%20AD)%20Authentication%20Library%20(ADAL)%20and%20Azure%20AD%20Graph%20API%2C%20so%20you%20can%20plan%20to%20update%20any%20applications%20that%20are%20still%20using%20either%20one%20of%20them.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3EWhy%20use%20MSAL%20and%20Microsoft%20Graph%3F%3CP%3EMSAL%20makes%20it%20easy%20for%20developers%20to%20add%20identity%20capabilities%20to%20their%20applications.%20With%20just%20a%20few%20lines%20of%20code%2C%20developers%20can%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fdevelop%2Fabout-microsoft-identity-platform%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Eauthenticate%20users%20and%20applications%2C%20as%20well%20as%20acquire%20tokens%20to%20access%20resources%3C%2FA%3E.%20MSAL%20also%20enables%20developers%20to%20integrate%20with%20the%20latest%20capabilities%20in%20our%20platform%E2%80%94like%20passwordless%20and%20Conditional%20Access.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fgraph%2Foverview%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EMicrosoft%20Graph%20API%3C%2FA%3E%20offers%20a%20single%20endpoint%20for%20developers%20to%20access%20Azure%20AD%20APIs%2C%20as%20well%20as%20APIs%20from%20several%20other%20Microsoft%20services%20like%20Teams%2C%20Exchange%2C%20and%20Intune.%20Microsoft%20Graph%20has%20all%20the%20capabilities%20that%20have%20been%20available%20in%20Azure%20AD%20Graph%2C%20such%20as%20service%20principal%20and%20app%20role%20assignment%E2%80%94and%20new%20Azure%20AD%20APIs%20like%20identity%20protection%20and%20authentication%20methods.%20Developers%20can%20also%20use%20the%20Microsoft%20Graph%20client%20libraries%26nbsp%3Band%20get%20built-in%20support%20for%20features%20like%20retry%20handling%2C%20secure%20redirects%2C%20transparent%20authentication%2C%20and%20payload%20compression.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3EEnd%20of%20support%20timelines%20for%20ADAL%20and%20Azure%20AD%20Graph%20API%3CP%3EWe%E2%80%99re%20publishing%20the%20following%20timelines%20for%20end%20of%20support%20of%20ADAL%20and%20Azure%20AD%20Graph.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EStarting%2C%20June%2030th%2C%202020%2C%20we%20will%20no%20longer%20add%20any%20new%20features%20to%20ADAL%20and%20Azure%20AD%20Graph.%20We%20will%20continue%20to%20provide%20technical%20support%20and%20security%20updates%20but%20will%20no%20longer%20provide%20feature%20updates.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EStarting%20June%2030th%2C%202022%2C%20we%20will%20end%20support%20for%20ADAL%20and%20Azure%20AD%20Graph%20and%20will%20no%20longer%20provide%20technical%20support%20or%20security%20updates.%20Apps%20using%20Azure%20AD%20Graph%20after%20this%20time%20will%20no%20longer%20receive%20responses%20from%20the%20Azure%20AD%20Graph%20endpoint.%20Apps%20using%20ADAL%20on%20existing%20OS%20versions%20will%20continue%20to%20work%20after%20this%20time%20but%20will%20not%20get%20any%20technical%20support%20or%20security%20updates.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3EPlan%20to%20update%20your%20applications%20with%20MSAL%20and%20Microsoft%20Graph%3CP%3EYou%20can%20get%20started%20by%20using%20our%20migration%20guides%20to%20identify%20which%20applications%20need%20to%20be%20updated%20and%20how%20to%20best%20transition%20to%20MSAL%20and%20Microsoft%20Graph.%20For%20applications%20that%20are%20using%20ADAL%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fdevelop%2Fmsal-migration%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ereview%20our%20migration%20guide%3C%2FA%3E%20to%20transition%20to%20MSAL.%26nbsp%3BFor%20applications%20that%20are%20using%20Azure%20AD%20Graph%2C%20follow%20our%26nbsp%3Bguidance%20to%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fgraph%2Fmigrate-azure-ad-graph-overview%3Fview%3Dgraph-rest-1.0%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Emigrate%20Azure%20AD%20Graph%20apps%20to%20Microsoft%20Graph%3C%2FA%3E.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIn%20the%20coming%20months%2C%20we'll%20be%20providing%20reporting%20in%20the%20Azure%20portal%20to%20help%20you%20self-identify%20which%20of%20your%20apps%20are%20using%20ADAL%20or%20Azure%20AD%20Graph.%26nbsp%3BFor%20any%20other%20questions%2C%20open%20issues%2C%20and%20feature%20requests%2C%20let%20us%20know%20through%20Stack%20Overflow%20by%20using%20the%20tag%20%3CA%20href%3D%22https%3A%2F%2Fstackoverflow.com%2Fquestions%2Ftagged%2Fadal-deprecation%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Eadal-deprecation%3C%2FA%3E%20or%20%3CA%20href%3D%22https%3A%2F%2Fstackoverflow.com%2Fquestions%2Ftagged%2Fazureadgraph-deprecation%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Eazureadgraph-deprecation%3C%2FA%3E.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAs%20always%2C%20we%E2%80%99d%20love%20to%20hear%20any%20feedback%20or%20suggestions%20you%20may%20have.%20Please%20let%20us%20know%20what%20you%20think%20in%20the%20comments%20below%20or%20on%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ffeedback.azure.com%2Fforums%2F169401-azure-active-directory%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EAzure%20AD%20feedback%20forum%3C%2FA%3E.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBest%20regards%2C%26nbsp%3B%3C%2FP%3E%3CP%3EAlex%20Simons%20(Twitter%3A%E2%80%AF%3CA%20href%3D%22http%3A%2F%2Ftwitter.com%2Falex_a_simons%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3E%40Alex_A_Simons%3C%2FA%3E)%3C%2FP%3E%3CP%3ECorporate%20Vice%20President%20of%20Program%20Management%3C%2FP%3E%3CP%3EMicrosoft%20Identity%20Division%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1257363%22%20slang%3D%22en-US%22%3E%3CP%3E%3C%2FP%3ETake%20advantage%20of%20all%20the%20identity%20features%20available%20in%20our%20platform%2C%20by%20using%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fdevelop%2Fmsal-overview%23languages-and-frameworks%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EMicrosoft%20Authentication%20Library%20(MSAL)%3C%2FA%3E%26nbsp%3Band%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fgraph%2Foverview%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EMicrosoft%20Graph%20API%3C%2FA%3E%26nbsp%3Bin%26nbsp%3Byour%20application%20development.%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1257363%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EProduct%20Announcements%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2053933%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2053933%22%20slang%3D%22en-US%22%3E%3CP%3EHello%2C%26nbsp%3B%20I'm%20researching%20for%20my%20application%2C%20if%20there%20any%20impacting%20with%20end%20of%20support%20with%20%22%3CSTRONG%3E%3CSPAN%3EAzure%20AD%20%26amp%3B%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3EADAL%3C%2FSPAN%3E%3C%2FSTRONG%3E%22%2C%20when%20I%20look%20into%20the%20code%2C%20I%20see%20we%20are%20calling%26nbsp%3BIAuthenticationProvider.GetAuthToken(clientId%2C%20appKey)%3B%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3BBased%20on%20my%20research%2C%20we%20are%20using%20microsoft%20graph%20client%20only.%20So%20there%20may%20not%20be%20any%20impact%20with%20end%20of%20support%26nbsp%3BAzure%20AD%20%26amp%3B%26nbsp%3BADAL%20.%20Can%20you%20please%20confirm.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EMuch%20appreciated%20in%20advance.%3C%2FP%3E%3C%2FLINGO-BODY%3E

Howdy folks,

 

Microsoft Build 2020 allowed us to engage deeply with our developer community, and we are continuing to improve how developers can easily use identity features in their applications. To help developers take advantage of all the identity features available in our platform, were now recommending that all developers to use the Microsoft Authentication Library (MSAL) and the Microsoft Graph API in their application development. Moving forward, all new identity capabilities will only be available in MSAL and Microsoft Graph. Were also providing guidance on end of support timelines for Azure Active Directory (Azure AD) Authentication Library (ADAL) and Azure AD Graph API, so you can plan to update any applications that are still using either one of them.

 

Why use MSAL and Microsoft Graph?

MSAL makes it easy for developers to add identity capabilities to their applications. With just a few lines of code, developers can authenticate users and applications, as well as acquire tokens to access resources. MSAL also enables developers to integrate with the latest capabilities in our platformlike passwordless and Conditional Access.

 

Microsoft Graph API offers a single endpoint for developers to access Azure AD APIs, as well as APIs from several other Microsoft services like Teams, Exchange, and Intune. Microsoft Graph has all the capabilities that have been available in Azure AD Graph, such as service principal and app role assignment—and new Azure AD APIs like identity protection and authentication methods. Developers can also use the Microsoft Graph client libraries and get built-in support for features like retry handling, secure redirects, transparent authentication, and payload compression.

 

End of support timelines for ADAL and Azure AD Graph API

We’re publishing the following timelines for end of support of ADAL and Azure AD Graph.

 

Starting, June 30th, 2020, we will no longer add any new features to ADAL and Azure AD Graph. We will continue to provide technical support and security updates but will no longer provide feature updates.

 

Starting June 30th, 2022, we will end support for ADAL and Azure AD Graph and will no longer provide technical support or security updates. Apps using Azure AD Graph after this time will no longer receive responses from the Azure AD Graph endpoint. Apps using ADAL on existing OS versions will continue to work after this time but will not get any technical support or security updates.

 

Plan to update your applications with MSAL and Microsoft Graph

You can get started by using our migration guides to identify which applications need to be updated and how to best transition to MSAL and Microsoft Graph. For applications that are using ADAL, review our migration guide to transition to MSAL. For applications that are using Azure AD Graph, follow our guidance to migrate Azure AD Graph apps to Microsoft Graph.

 

In the coming months, we'll be providing reporting in the Azure portal to help you self-identify which of your apps are using ADAL or Azure AD Graph. For any other questions, open issues, and feature requests, let us know through Stack Overflow by using the tag adal-deprecation or azureadgraph-deprecation.

 

As always, we’d love to hear any feedback or suggestions you may have. Please let us know what you think in the comments below or on the Azure AD feedback forum.

 

Best regards, 

Alex Simons (Twitter: @Alex_A_Simons)

Corporate Vice President of Program Management

Microsoft Identity Division

15 Comments
Senior Member

I received the email with a link to this article and the message: "You are receiving this message because our reporting indicates one or more of your applications are using ADAL."

 

We don't develop our own apps and want to find which ones are using ADAL. However, there doesn't seem obvious choices in the Azure support area for that... Which should I select?

 

Thanks

Occasional Contributor

I received the email with a link to this article and the message: "You are receiving this message because our reporting indicates one or more of your applications are using ADAL."

 

So now I want to know how I can get a report of the applications that are using ADAL.

Occasional Visitor

Same as the two comments above.  I have had the email to say we are using ADAL.

 

The only thing I can think of for me is our Hybrid Exchange or Azure AD Connect service?

Frequent Visitor

Again same as all above comments, email to say we are using ADAL but no idea what would be using it, we do not develop our own apps. The only service I can think of is Azure AD Connect.

Microsoft

We are working on the new feature in the Azure AD Portal with which we can provide you this list of applications which are using ADAL and/or Azure AD Graph. Now we have also updated the blog post which talks about the product enhancements. 

Senior Member

@Jeevan Desarda- Thanks for that.

Can you confirm if AD Connect and Exchange Hybrid use either of the soon-to-be-depreciated methods?

 

Then, those of us non-developers can relax and wait for updates from Microsoft.

Occasional Visitor

Hello, I'm trying to create a script that dumps all the IAM roles (Get-AzRoleAssignment). Using service principal to login. When using the Microsoft Graph API permissions, I get Microsoft.Rest.Azure.CloudException. When debugging, it meant my SP is unauthorized. But when I'm  using the legacy API (Azure Active Directory Graph) permissions, it works great. Any idea? 

Occasional Contributor

@Jeevan Desarda 
when we can expect the new feature be able to see easy which apps are affected, we have thousands reason why asking.


New Contributor

Thanks for this post, Alex (getting an error about invalid HTML in message when @ mentioning you, so removing that link). As the others before me have stated, I'm looking for documentation for how to determine which applications are currently using ADAL. I did find another article from April 2019 about how to use ADAL, so I suspect that our Developers will need to comb through configuration files, looking for the code.

Occasional Visitor

I'm a little confused...your initial paragraph says "Azure Active Directory (Azure AD), Authentication Library (ADAL) and Azure AD Graph API" are going away. 

But...your link to Microsoft Build 2020 says "MSAL makes it easy to implement the right authentication patterns that support any Microsoft identity—from Azure Active Directory (Azure AD) accounts to Microsoft accounts".

Meanwhile...if I Google "Is Azure AD going away"...I get different answers such as "Azure AD Basic is going away" (whatever that means).

 

  • Is Azure AD going away?
  • Or is Azure AD simply changing?
  • What about B2C and B2B?  What happens if Azure AD goes away?  Or do they change (somehow)?
  • Is MSAL and the Microsoft Graph API completely replacing Azure AD?
  • Or, are MSAL and the Microsoft Graph API going to "fit into" a new version of Azure AD?

    And lastly...

  • Is there a video that clarifies all of this?

 

Thanks for the help.

Occasional Visitor

I am a little confused...your initial paragraph says "Azure Active Directory (Azure AD), Authentication Library (ADAL) and Azure AD Graph API" are going away.


But...the Microsoft Build 2020 link says "MSAL makes it easy to implement the right authentication patterns that support any Microsoft identity—from Azure Active Directory (Azure AD) accounts to Microsoft accounts"


Meanwhile...if I Google "Is Azure AD going away" I get differing results, such as "Azure AD Basic is going away." (whatever that means).

So...

  • Is Azure AD going away?
  • Or, is Azure AD simply changing in some manner?
  • What about B2C or B2B?  What happens to them?

    Lastly...

  • Do you have a video that explains all this?

 

Thanks for clarifying this for me.

Occasional Contributor

It's 'Azure Active Directory Authentication Library (ADAL)' that is going away; not Azure AD.

Occasional Visitor

We have implemented azure b2c to control access to one of our applications.  As part of this process we have User flows for the signup process but we also (within our application itself) use MS graph to create users directly into azure b2c that we can then link to our application. 

 

We also have a user portal where they are able to update their password - we are using MS graph to update the users password via the call

 

Tomp_BCU_0-1607599659822.png

This all works fine in our UAT environment - using a b2c tenant that i setup Feb 2020 i was able to setup API permissions both application and delegate and able to set the following permission under API permissions for the application

 

Tomp_BCU_1-1607599775717.png

This (i believe enables the above call to work)

 

When we then went live - we setup a production environment and production version of b2c we were unable to set this permission as a delegate permission on Microsoft graph and this therefore stops us being able to update the users password from within the users web portal.  All the other functionality is working fine e.g. creating users through MS Graph.  When we try and call the update password method (on production) we get the following;

 

Tomp_BCU_2-1607600224436.png

 

Now i know that i can use user flows (which we do have in place as part of the registration process) but we want a seamless (as is working on our UAT environment) user experience so wish to do the password update through MS Graph.

 

Any thoughts on this, i have logged the issues through Microsoft support and chatted to their Tek experts but they don't seem to have an answer for this.

 

 

Occasional Visitor

I'm facing the issue "AADSTS65001: The user or administrator has not consented to use the application with ID '' named ''. Send an interactive authorization request for this user and resource." when upgrading from ADAL to MSAL.

I'm using the on behalf flow to get access token. The ADAL I used before always works, but the MSAL always throws this exception.

 

This code uses MSAL got this error.

 

 

 

KienTruong_0-1610099060056.png

 

This code uses ADAL work for me

KienTruong_1-1610099095762.png

 

 

 

  

Occasional Visitor

Hello,  I'm researching for my application, if there any impacting with end of support with "Azure AD & ADAL", when I look into the code, I see we are calling IAuthenticationProvider.GetAuthToken(clientId, appKey); 

 

           Based on my research, we are using microsoft graph client only. So there may not be any impact with end of support Azure AD & ADAL . Can you please confirm.

 

Much appreciated in advance.