%3CLINGO-SUB%20id%3D%22lingo-sub-1557338%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1557338%22%20slang%3D%22en-US%22%3E%3CP%3EI%20received%20the%20email%20with%20a%20link%20to%20this%20article%20and%20the%20message%3A%20%22You%20are%20receiving%20this%20message%20because%20our%20reporting%20indicates%20one%20or%20more%20of%20your%20applications%20are%20using%20ADAL.%22%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20don't%20develop%20our%20own%20apps%20and%20want%20to%20find%20which%20ones%20are%20using%20ADAL.%20However%2C%20there%20doesn't%20seem%20obvious%20choices%20in%20the%20Azure%20support%20area%20for%20that...%20Which%20should%20I%20select%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1557379%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1557379%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EI%20received%20the%20email%20with%20a%20link%20to%20this%20article%20and%20the%20message%3A%20%22You%20are%20receiving%20this%20message%20because%20our%20reporting%20indicates%20one%20or%20more%20of%20your%20applications%20are%20using%20ADAL.%22%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3ESo%20now%20I%20want%20to%20know%20how%20I%20can%20get%20a%20report%20of%20the%20applications%20that%20are%20using%20ADAL.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1557982%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1557982%22%20slang%3D%22en-US%22%3E%3CP%3ESame%20as%20the%20two%20comments%20above.%26nbsp%3B%20I%20have%20had%20the%20email%20to%20say%20we%20are%20using%20ADAL.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20only%20thing%20I%20can%20think%20of%20for%20me%20is%20our%20Hybrid%20Exchange%20or%20Azure%20AD%20Connect%20service%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1558037%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1558037%22%20slang%3D%22en-US%22%3E%3CP%3EAgain%20same%20as%20all%20above%20comments%2C%20email%20to%20say%20we%20are%20using%20ADAL%20but%20no%20idea%20what%20would%20be%20using%20it%2C%20we%20do%20not%20develop%20our%20own%20apps.%20The%20only%20service%20I%20can%20think%20of%20is%20Azure%20AD%20Connect.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1571242%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1571242%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20are%20working%20on%20the%20new%20feature%20in%20the%20Azure%20AD%20Portal%20with%20which%20we%20can%20provide%20you%20this%20list%20of%20applications%20which%20are%20using%20ADAL%20and%2For%20Azure%20AD%20Graph.%20Now%20we%20have%20also%20updated%20the%20blog%20post%20which%20talks%20about%20the%20product%20enhancements.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1571374%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1571374%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F102154%22%20target%3D%22_blank%22%3E%40Jeevan%20Desarda%3C%2FA%3E-%20Thanks%20for%20that.%3C%2FP%3E%3CP%3ECan%20you%20confirm%20if%20AD%20Connect%20and%20Exchange%20Hybrid%20use%20either%20of%20the%20soon-to-be-depreciated%20methods%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThen%2C%20those%20of%20us%20non-developers%20can%20relax%20and%20wait%20for%20updates%20from%20Microsoft.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1257363%22%20slang%3D%22en-US%22%3EUpdate%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1257363%22%20slang%3D%22en-US%22%3E%3CP%3EHowdy%20folks%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fbuild-2020-fostering-a-secure-and-trustworthy-app-ecosystem-for%2Fba-p%2F1257360%22%20target%3D%22_blank%22%3EMicrosoft%20Build%202020%3C%2FA%3E%20allowed%20us%20to%20engage%20deeply%20with%20our%20developer%20community%2C%20and%20we%20are%20continuing%20to%20improve%20how%20developers%20can%20easily%20use%20identity%20features%20in%20their%20applications.%20To%20help%20developers%20take%20advantage%20of%20all%20the%20identity%20features%20available%20in%20our%20platform%2C%20we%E2%80%99re%20now%20recommending%20that%20all%20developers%20to%20use%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fdevelop%2Fmsal-overview%23languages-and-frameworks%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EMicrosoft%20Authentication%20Library%20(MSAL)%3C%2FA%3E%20and%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fgraph%2Foverview%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EMicrosoft%20Graph%20API%3C%2FA%3E%20in%20their%20application%20development.%20Moving%20forward%2C%20all%20new%20identity%20capabilities%20will%20only%20be%20available%20in%20MSAL%20and%20Microsoft%20Graph.%20We%E2%80%99re%20also%20providing%20guidance%20on%20end%20of%20support%20timelines%20for%20Azure%20Active%20Directory%20(Azure%20AD)%20Authentication%20Library%20(ADAL)%20and%20Azure%20AD%20Graph%20API%2C%20so%20you%20can%20plan%20to%20update%20any%20applications%20that%20are%20still%20using%20either%20one%20of%20them.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3EWhy%20use%20MSAL%20and%20Microsoft%20Graph%3F%3CP%3EMSAL%20makes%20it%20easy%20for%20developers%20to%20add%20identity%20capabilities%20to%20their%20applications.%20With%20just%20a%20few%20lines%20of%20code%2C%20developers%20can%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fdevelop%2Fabout-microsoft-identity-platform%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Eauthenticate%20users%20and%20applications%2C%20as%20well%20as%20acquire%20tokens%20to%20access%20resources%3C%2FA%3E.%20MSAL%20also%20enables%20developers%20to%20integrate%20with%20the%20latest%20capabilities%20in%20our%20platform%E2%80%94like%20passwordless%20and%20Conditional%20Access.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fgraph%2Foverview%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EMicrosoft%20Graph%20API%3C%2FA%3E%20offers%20a%20single%20endpoint%20for%20developers%20to%20access%20Azure%20AD%20APIs%2C%20as%20well%20as%20APIs%20from%20several%20other%20Microsoft%20services%20like%20Teams%2C%20Exchange%2C%20and%20Intune.%20Microsoft%20Graph%20has%20all%20the%20capabilities%20that%20have%20been%20available%20in%20Azure%20AD%20Graph%2C%20such%20as%20service%20principal%20and%20app%20role%20assignment%E2%80%94and%20new%20Azure%20AD%20APIs%20like%20identity%20protection%20and%20authentication%20methods.%20Developers%20can%20also%20use%20the%20Microsoft%20Graph%20client%20libraries%26nbsp%3Band%20get%20built-in%20support%20for%20features%20like%20retry%20handling%2C%20secure%20redirects%2C%20transparent%20authentication%2C%20and%20payload%20compression.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3EEnd%20of%20support%20timelines%20for%20ADAL%20and%20Azure%20AD%20Graph%20API%3CP%3EWe%E2%80%99re%20publishing%20the%20following%20timelines%20for%20end%20of%20support%20of%20ADAL%20and%20Azure%20AD%20Graph.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EStarting%2C%20June%2030th%2C%202020%2C%20we%20will%20no%20longer%20add%20any%20new%20features%20to%20ADAL%20and%20Azure%20AD%20Graph.%20We%20will%20continue%20to%20provide%20technical%20support%20and%20security%20updates%20but%20will%20no%20longer%20provide%20feature%20updates.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EStarting%20June%2030th%2C%202022%2C%20we%20will%20end%20support%20for%20ADAL%20and%20Azure%20AD%20Graph%20and%20will%20no%20longer%20provide%20technical%20support%20or%20security%20updates.%20Apps%20using%20Azure%20AD%20Graph%20after%20this%20time%20will%20no%20longer%20receive%20responses%20from%20the%20Azure%20AD%20Graph%20endpoint.%20Apps%20using%20ADAL%20on%20existing%20OS%20versions%20will%20continue%20to%20work%20after%20this%20time%20but%20will%20not%20get%20any%20technical%20support%20or%20security%20updates.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3EPlan%20to%20update%20your%20applications%20with%20MSAL%20and%20Microsoft%20Graph%3CP%3EYou%20can%20get%20started%20by%20using%20our%20migration%20guides%20to%20identify%20which%20applications%20need%20to%20be%20updated%20and%20how%20to%20best%20transition%20to%20MSAL%20and%20Microsoft%20Graph.%20For%20applications%20that%20are%20using%20ADAL%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fdevelop%2Fmsal-migration%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ereview%20our%20migration%20guide%3C%2FA%3E%20to%20transition%20to%20MSAL.%26nbsp%3BFor%20applications%20that%20are%20using%20Azure%20AD%20Graph%2C%20follow%20our%26nbsp%3Bguidance%20to%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fgraph%2Fmigrate-azure-ad-graph-overview%3Fview%3Dgraph-rest-1.0%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Emigrate%20Azure%20AD%20Graph%20apps%20to%20Microsoft%20Graph%3C%2FA%3E.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIn%20the%20coming%20months%2C%20we'll%20be%20providing%20reporting%20in%20the%20Azure%20portal%20to%20help%20you%20self-identify%20which%20of%20your%20apps%20are%20using%20ADAL%20or%20Azure%20AD%20Graph.%26nbsp%3BFor%20any%20other%20questions%2C%20open%20issues%2C%20and%20feature%20requests%2C%20let%20us%20know%20through%20Stack%20Overflow%20by%20using%20the%20tag%20%3CA%20href%3D%22https%3A%2F%2Fstackoverflow.com%2Fquestions%2Ftagged%2Fadal-deprecation%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Eadal-deprecation%3C%2FA%3E%20or%20%3CA%20href%3D%22https%3A%2F%2Fstackoverflow.com%2Fquestions%2Ftagged%2Fazureadgraph-deprecation%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Eazureadgraph-deprecation%3C%2FA%3E.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAs%20always%2C%20we%E2%80%99d%20love%20to%20hear%20any%20feedback%20or%20suggestions%20you%20may%20have.%20Please%20let%20us%20know%20what%20you%20think%20in%20the%20comments%20below%20or%20on%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ffeedback.azure.com%2Fforums%2F169401-azure-active-directory%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EAzure%20AD%20feedback%20forum%3C%2FA%3E.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBest%20regards%2C%26nbsp%3B%3C%2FP%3E%3CP%3EAlex%20Simons%20(Twitter%3A%E2%80%AF%3CA%20href%3D%22http%3A%2F%2Ftwitter.com%2Falex_a_simons%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3E%40Alex_A_Simons%3C%2FA%3E)%3C%2FP%3E%3CP%3ECorporate%20Vice%20President%20of%20Program%20Management%3C%2FP%3E%3CP%3EMicrosoft%20Identity%20Division%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1257363%22%20slang%3D%22en-US%22%3E%3CP%3E%3C%2FP%3ETake%20advantage%20of%20all%20the%20identity%20features%20available%20in%20our%20platform%2C%20by%20using%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fdevelop%2Fmsal-overview%23languages-and-frameworks%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EMicrosoft%20Authentication%20Library%20(MSAL)%3C%2FA%3E%26nbsp%3Band%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fgraph%2Foverview%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EMicrosoft%20Graph%20API%3C%2FA%3E%26nbsp%3Bin%26nbsp%3Byour%20application%20development.%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1257363%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EProduct%20Announcements%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1664699%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1664699%22%20slang%3D%22en-US%22%3E%3CP%3EHello%2C%20I'm%20trying%20to%20create%20a%20script%20that%20dumps%20all%20the%20IAM%20roles%20(%3CSPAN%3EGet-AzRoleAssignment%3C%2FSPAN%3E%3CFONT%20face%3D%22inherit%22%3E).%20Using%20service%20principal%20to%20login.%20When%20using%20the%20Microsoft%20Graph%20API%20permissions%2C%20I%20get%26nbsp%3BMicrosoft.Rest.Azure.CloudException.%20When%20debugging%2C%20it%20meant%20my%20SP%20is%20%3C%2FFONT%3Eunauthorized%3CFONT%20face%3D%22inherit%22%3E.%20But%20when%20I'm%26nbsp%3B%20using%20the%20legacy%20API%20(Azure%20Active%20Directory%20Graph)%20permissions%2C%20it%20works%20great.%20Any%20idea%3F%26nbsp%3B%3C%2FFONT%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1714016%22%20slang%3D%22en-US%22%3ERe%3A%20Update%20your%20applications%20to%20use%20Microsoft%20Authentication%20Library%20and%20Microsoft%20Graph%20API%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1714016%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F102154%22%20target%3D%22_blank%22%3E%40Jeevan%20Desarda%3C%2FA%3E%26nbsp%3B%3CBR%20%2F%3Ewhen%20we%20can%20expect%20the%20new%20feature%20be%20able%20to%20see%20easy%20which%20apps%20are%20affected%2C%20we%20have%20thousands%20reason%20why%20asking.%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E

Howdy folks,

 

Microsoft Build 2020 allowed us to engage deeply with our developer community, and we are continuing to improve how developers can easily use identity features in their applications. To help developers take advantage of all the identity features available in our platform, were now recommending that all developers to use the Microsoft Authentication Library (MSAL) and the Microsoft Graph API in their application development. Moving forward, all new identity capabilities will only be available in MSAL and Microsoft Graph. Were also providing guidance on end of support timelines for Azure Active Directory (Azure AD) Authentication Library (ADAL) and Azure AD Graph API, so you can plan to update any applications that are still using either one of them.

 

Why use MSAL and Microsoft Graph?

MSAL makes it easy for developers to add identity capabilities to their applications. With just a few lines of code, developers can authenticate users and applications, as well as acquire tokens to access resources. MSAL also enables developers to integrate with the latest capabilities in our platformlike passwordless and Conditional Access.

 

Microsoft Graph API offers a single endpoint for developers to access Azure AD APIs, as well as APIs from several other Microsoft services like Teams, Exchange, and Intune. Microsoft Graph has all the capabilities that have been available in Azure AD Graph, such as service principal and app role assignment—and new Azure AD APIs like identity protection and authentication methods. Developers can also use the Microsoft Graph client libraries and get built-in support for features like retry handling, secure redirects, transparent authentication, and payload compression.

 

End of support timelines for ADAL and Azure AD Graph API

We’re publishing the following timelines for end of support of ADAL and Azure AD Graph.

 

Starting, June 30th, 2020, we will no longer add any new features to ADAL and Azure AD Graph. We will continue to provide technical support and security updates but will no longer provide feature updates.

 

Starting June 30th, 2022, we will end support for ADAL and Azure AD Graph and will no longer provide technical support or security updates. Apps using Azure AD Graph after this time will no longer receive responses from the Azure AD Graph endpoint. Apps using ADAL on existing OS versions will continue to work after this time but will not get any technical support or security updates.

 

Plan to update your applications with MSAL and Microsoft Graph

You can get started by using our migration guides to identify which applications need to be updated and how to best transition to MSAL and Microsoft Graph. For applications that are using ADAL, review our migration guide to transition to MSAL. For applications that are using Azure AD Graph, follow our guidance to migrate Azure AD Graph apps to Microsoft Graph.

 

In the coming months, we'll be providing reporting in the Azure portal to help you self-identify which of your apps are using ADAL or Azure AD Graph. For any other questions, open issues, and feature requests, let us know through Stack Overflow by using the tag adal-deprecation or azureadgraph-deprecation.

 

As always, we’d love to hear any feedback or suggestions you may have. Please let us know what you think in the comments below or on the Azure AD feedback forum.

 

Best regards, 

Alex Simons (Twitter: @Alex_A_Simons)

Corporate Vice President of Program Management

Microsoft Identity Division

8 Comments
Senior Member

I received the email with a link to this article and the message: "You are receiving this message because our reporting indicates one or more of your applications are using ADAL."

 

We don't develop our own apps and want to find which ones are using ADAL. However, there doesn't seem obvious choices in the Azure support area for that... Which should I select?

 

Thanks

New Contributor

I received the email with a link to this article and the message: "You are receiving this message because our reporting indicates one or more of your applications are using ADAL."

 

So now I want to know how I can get a report of the applications that are using ADAL.

Occasional Visitor

Same as the two comments above.  I have had the email to say we are using ADAL.

 

The only thing I can think of for me is our Hybrid Exchange or Azure AD Connect service?

Frequent Visitor

Again same as all above comments, email to say we are using ADAL but no idea what would be using it, we do not develop our own apps. The only service I can think of is Azure AD Connect.

Microsoft

We are working on the new feature in the Azure AD Portal with which we can provide you this list of applications which are using ADAL and/or Azure AD Graph. Now we have also updated the blog post which talks about the product enhancements. 

Senior Member

@Jeevan Desarda- Thanks for that.

Can you confirm if AD Connect and Exchange Hybrid use either of the soon-to-be-depreciated methods?

 

Then, those of us non-developers can relax and wait for updates from Microsoft.

Occasional Visitor

Hello, I'm trying to create a script that dumps all the IAM roles (Get-AzRoleAssignment). Using service principal to login. When using the Microsoft Graph API permissions, I get Microsoft.Rest.Azure.CloudException. When debugging, it meant my SP is unauthorized. But when I'm  using the legacy API (Azure Active Directory Graph) permissions, it works great. Any idea? 

Occasional Contributor

@Jeevan Desarda 
when we can expect the new feature be able to see easy which apps are affected, we have thousands reason why asking.