AzureAD
2 TopicsShared channel not adding external users (One way issue)
Hello everyone, Hope someone can provide insight to this, i've been trying to find solution for the past few days to no avail. Background: Create shared channel between 2 organizations (My organization and the opposite organization) Both organizations have set up all B2B Direct connect inbound/outbound settings in cross-tenant access settings (Azure AD) Both organizations have ensured teams settings and shared channels are enabled. (Teams admin control centre) My organization is able to add the opposite organization into the teams channel as guest (in standard channel) Issue: The opposite organization is able to add me into their shared channel without any issue. When i try to add the member of the opposite organization, the following message popped up Solutions attempted: Adding the member from the Microsoft Teams admin control centre. Checked and confirmed that settings under admin.microsoft.com > settings > org settings > services | Microsoft Teams & Microsoft 365 Groups are identical for both organizations. Deleted the guest user and re-created again in admin.microsoft.com > users > Guest users > add new guest users via invitation (AzureAD) which led to the above screen cap scenario B2B collaboration and B2B direct connect in azure AD cross-tenant access settings all set up properly and identical for both organizations References: https://learn.microsoft.com/en-US/microsoft-365/solutions/collaborate-teams-direct-connect?WT.mc_id=TeamsAdminCenterCSH&view=o365-worldwide https://learn.microsoft.com/en-us/MicrosoftTeams/shared-channels#shared-channel-limits https://learn.microsoft.com/en-us/microsoftteams/shared-channels-errors https://learn.microsoft.com/en-us/microsoftteams/teams-policies https://learn.microsoft.com/en-us/azure/active-directory/external-identities/cross-tenant-access-settings-b2b-direct-connect5KViews0likes6CommentsCan't Authorize to Azure App Configuration using Azure AD token
We are developing MS Teams Tab app that trying to use Azure AD token to access our App Configuration. We use this token to fetch Office 365 contacts using Graph Service and it's working as expected but when we try to use same token to access App Configuration we created we get 401 Unauthorized error. Bearer error="invalid_token", error_description="Authorization token failed validation". Endpoint we use for fetching token is 'https://login.microsoftonline.com/{tenatdId}/oauth2/v2.0/token' Scope we are using is 'User.Read User.ReadBasic.All Contacts.Read openid profile offline_access' If we add KeyValue.Read to the scope we get 503 response - Service unavailable. In our App Registration we have granted permissions for AppConfiguration KeyValue.Read and KeyValue.Write. We are using Microsoft App Configuration client for JavaScript and created a custom implementation of the TokenCredential interface which returns the token mentioned above in its getToken() method. Is there any other configuration needed or what are we doing wrong?1.5KViews0likes2Comments