-
Notifications
You must be signed in to change notification settings - Fork 267
Description
Describe the bug
M365 Agent Toolkit is using M365 account to provision Azure Resources with actions like aadApp/create, aadApp/update
Environment scenario
Single tenant
As a developer I use two accounts in same tenant.
Microsoft 365 Account: [email protected]
Azure Account: [email protected]
[email protected] does not have access to Create/Update Azure resources like aad app.
To Reproduce
Steps to reproduce the behavior:
- Sign in M365 account with [email protected]
- Sign in Azure account with [email protected]
- Execute Local or Dev environment provisioning
- ... going through action aadApp/create OR aadApp/update
- Error: Message for denied access
Issue
I reviewed Fiddler trace to review the REST API call to update the aap app.
Auth token sent to Microsoft Graph REST API to update the Azure Application, is from M365 account instead of Azure account.
Added few screenshots
Expected behavior
Use [email protected] to provision resources in Azure and use [email protected] for M365 resources
VS Code Extension Information (please complete the following information):
- OS: Windows Server 2022 Data Center
- Version 6.4.0
Additional context
Fiddler screenshot of decoded Auth token to confirm the account being used (Sorry had to remove)
