Users must give an app the right to access personal information, including current location, calendar, contact information, reminders and photos. While people appreciate the convenience of using an app that has access to this information, they also expect to have control over their private data. For example, people like to be able to tag photos automatically with their physical location or make friends nearby, but they also want the option to disable these features. Explain why your app needs the information. Enter the custom text (designated in order of destination or description chain) for display in the system`s eligibility warning, and insert an example. Keep the text short and specific, use the sentence case, and be polite so people don`t feel under pressure. You don`t need to include your app name – the system already identifies your app. You`ll find information about developers under User Privacy. You can integrate your applications into the Microsoft identity platform to allow users to log in with their work or school account and access your organization`s data to provide comprehensive data-controlled experiences. The easiest way to connect your service account is to allow the user access to enterprise applications.
In your Office 365 administration portal, go to Admin Center> Azure AD > users and groups > user settings and make sure that „users can accept apps that access company data on their behalf“ are enabled. Faced with this configuration, two things can be done, in order to allow users to access the Read-Write app: you are asked to give the playback permissions that the Read-Write app requires, Hello @YASWANTHM-MSFT, I have the same problem as @rajmusuku and Admin Center > Azure AD > users and groups > > user settings > „Users can accept applications that access company data on their behalf,“ is already enabled. I want to enable AAD authentication for my Azure Account Blobs storage archive Use the warning provided by the system. You can customize the text in the default permission warning, but avoid adding custom command calls that replicate the behavior or appearance of the default warning. Figure 5. Allow members of the organization to allow third-party applications to access their information. Application approval rules describe the conditions that must be met before an application can be approved. These policies may include conditions for the application requesting access, as well as the permissions the application requests.
@rajmusuku, the easiest way to connect your service account is to allow the user access to enterprise applications. On your admin portal, go to Admin Center> Azure AD > users and groups > user settings and make sure that „users can accept apps that access company data on their behalf“ are enabled.