Oct 09 2020 12:47 AM
Hello,
I want to use in my Playbook connector to AAD Identity Protection for example to get the risk history of a risky user.
First, we need to sign in to create a connection to Azure AD Identity Protection. I try to sign in with my global admin permission I get an error in my test tenant.
AADSTS50020: User account 'admin@M365x593591.onmicrosoft.com' from identity provider 'https://sts.windows.net/1d3ca640-1619-4157-a50e-58f86f9cf1ba/' does not exist in tenant 'AmbaWolvesE5' and cannot access the application 'b37216c7-2651-4ee5-9c5d-617a30978148'(AADIP) in that tenant. The account needs to be added as an external user in the tenant first. Sign out and sign in again with a different Azure Active Directory user account.
In production tenant the same issue.
Oct 09 2020 04:57 AM
@Pawel_Giza Try an account that uses your domain name rather than the .onmicrosoft.com one.
Oct 09 2020 05:12 AM
Feb 04 2021 10:03 AM
I am facing similar issue. Want to use AADIP connector is a logic app but its giving me same error -
Message: AADSTS700016: Application with identifier 'b37216c7-2651-4ee5-9c5d-617a30978148' was not found in the directory 'xxxxxxxxxxxxxxxxxxx'. This can happen if the application has not been installed by the administrator of the tenant or consented to by any user in the tenant. You may have sent your authentication request to the wrong tenant. could not find any information on connector page or elsewhere on how to fix it.