Sales
Denmark +45 7944 7000
Europe +45 7944 7000
North America +1 (202)-536-4165
Support
Denmark +45 7944 7002
North America +1 (202)-536-4165

Azure AD Graph API - Ensure RealTime Service Functionality Beyond February 1, 2025

Modified on Mon, 20 Jan at 11:22 AM

Azure AD Graph Access Configuration for RealTime Service

Overview

RealTime Service integrates with Resource Central, Exchange Central, and WebTeam Central using Azure AD Graph APIs. To maintain functionality after February 1, 2025, you must explicitly enable extended Azure AD Graph access. This guide provides step-by-step instructions using the Microsoft Graph PowerShell SDK.

Prerequisites

  • Microsoft Graph PowerShell SDK installed
  • Administrative access to your Azure AD environment
  • Your application ID ready for configuration

Installation

  1. Install Microsoft Graph PowerShell SDK if not already installed
  2. Follow the official installation guide: Microsoft Graph PowerShell SDK
  3. Review Microsoft's documentation on extending Azure AD Graph access until June 30, 2025

Configuration Steps

1. Connect to Microsoft Graph

Connect-MgGraph -Scope "Application.Read.All"

2. List Available Applications

Get-MgApplication | Select-Object DisplayName, Id

3. Import Required Module

Import-Module Microsoft.Graph.Beta.Applications

4. Enable Extended Access

$applicationId = "your-application-id-here"

$params = @{
    authenticationBehaviors = @{
        blockAzureADGraphAccess = $false
    }
}
Update-MgBetaApplication -ApplicationId $applicationId -BodyParameter $params

Verification

You can verify your configuration using either of these commands:

(Get-MgBetaApplication -ApplicationId "your-application-id-here" -Select AuthenticationBehaviors).AuthenticationBehaviors

Or:

$x = Get-MgBetaApplication -ApplicationId "your-application-id-here" -Select AuthenticationBehaviors $x.AuthenticationBehaviors

Important Deadlines

  • February 1, 2025: Applications must have explicit opt-in for extended Azure AD Graph access
  • Applications without proper configuration will receive a 403 Unauthorized error when calling Azure AD Graph APIs

Rollback Procedure

If needed, you can revert the changes by executing:

$applicationId = "your-application-id-here"

$params = @{
    authenticationBehaviors = @{
        blockAzureADGraphAccess = $true
    }
}

Update-MgBetaApplication -ApplicationId $applicationId -BodyParameter $params

Support Information

  • For detailed and authoritative information, please consult the official Microsoft documentation
  • For technical issues, contact Microsoft support directly
  • Add-On Products consultancy services are available for additional support (fees apply)

Note

This document serves as general guidance for common scenarios. Always refer to official Microsoft documentation for the most up-to-date and authoritative information.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article