Authenticate Graph API Using Power Automate – Part 1 (Configure application access in azure active directory)

In order to use Graph API, we need to first set up authentication.

Graph API only supports below methods of authentication:

Here are the steps:

1. Go to :
2. Click ” App Registrations” > “New Registration”
3. Give a name to the new app, select the relevant account type and click “Register”

Once the app is provisioned, you will be able to see the App ID, TenantID, ObjectID and other specific fields for the Azure App.

Now we need to create a client secret for this app. Click on “Certificates and secrets”.

Enter the name for your client secret and set expiration as needed. In this case, I’m setting it to : “Never”

This will generate the client secret. You need to copy this and save it as you won’t be able to see it after that.

We need below fields for authentication now:

1. App ID
2. Client Secret

We also need to set up implicit grant for ID and Tokens.

Now we need to setup API permissions to the new app we created.

Click “Add a permission”  and Select ” Group” > “Group.ReadWriteAll” and give admin consent. – You will need admin access to grant admin consent.

Once this is done, we can go ahead and setup the Graph API calls.

In my next post – , let’s discuss how to authenticate graph API using power automate(flow) and parse the auth token.

Happy Learning!

Categories: Power Automate

Tags: , , , , ,

4 replies


  1. Authenticate Graph API Using Power Automate – Part 2 – PowerPlatform Solutions
  2. Get schedule of another Office365 user in PowerApps – PowerPlatform Solutions
  3. Get schedule of another Office365 user in PowerApps - 365 Community
  4. How to copy planner tasks with labels using Graph API - 365 Community

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: