Working with Azure Active Directory resources in Microsoft Graph
With Microsoft Graph, you can access Azure Active Directory (Azure AD) resources to enable scenarios like managing administrator (directory) roles, inviting external users to an organization, and, if you are a Cloud Solution Provider (CSP), managing your customer's data. Microsoft Graph also provides methods that apps can use to, for example, discover information about users' transitive group and role memberships.
To call the Microsoft Graph APIs on Azure AD resources, your app will need the appropriate permissions. Many of the APIs exposed on Azure AD resources require one of the Directory permissions. Directory permissions are highly privileged and always require administrator consent.
If your app is acting on behalf of a user (delegated permissions), that user will likely need to be a member of an appropriate administrator role for your app to successfully call many of the Azure AD APIs.
For more information about permissions, including delegated and application permissions, see Permissions.
Common use cases
The following table lists some common use cases for Azure AD resources.
|Use cases||REST resources||See also|
|Directory object and methods|
|Manage directory (administrator) roles|
|Activate directory roles in an Azure AD tenant and manage user memberships in directory roles. Directory roles are also known as administrator roles.||directoryRole
|Assigning administrator roles in Azure Active Directory|
|Apply predefined group settings across a tenant or to individual resource instances. Group settings control behaviors like blocked word lists for group display names, whether guest users are allowed to be group owners, and much more.||groupSetting
|Azure Active Directory cmdlets for configuring group settings|
|Manage devices registered in the organization. Devices are registered to users and include items like laptops, desktops, tablets, and mobile phones. Devices are typically created in the cloud using the Device Registration Service or by Microsoft Intune. They're used by conditional access policies for multifactor authentication.||device||Getting started with Azure Active Directory device registration.
What is InTune?
Enroll devices for management in InTune
|Partner tenant management|
|Get information about partnerships with customer tenants.
Note: This applies to partner tenants only. Partner tenants are Azure AD tenants that belong to Microsoft partners who are either part of the Microsoft Cloud Solution Provider, Office 365 Syndication, or Microsoft Advisor partner programs.
|contract||Call Microsoft Graph from a Cloud Solution Provider application|
|Manage domains associated with a tenant. Domain operations enable registrars to automate domain association for services such as Microsoft 365.||domain||Add a custom domain name to Azure Active Directory|
|Get information about an organization, such as its business address, technical and notification contacts, the service plans that it's subscribed to, and the domains associated with it.||organization||N/A|
|Get information about the service SKUs that a company is subscribed to.||subscribedSku||N/A|
|Invite external (guest) users to an organization.||invitation||What is Azure AD B2B collaboration?|
|Manage branding for the sign-in experience of an organization.||organizationalbranding||Add branding to your organization's Azure Active Directory sign-in page|
|Manage the consent request workflow for users attempting to access apps that require admin authorization.||Consent requests API||Configure the admin consent workflow|
Find out about the latest new features and updates for this API set.
Directory resources and APIs can open up new ways for you to engage with users and manage their experiences with Microsoft Graph. To learn more:
- Drill down on the methods and properties of the resources most helpful to your scenario.
- Try the API in the Graph Explorer.
Need more ideas? See how some of our partners are using Microsoft Graph.