Share via

Microsoft Graph Access Token Not Returning All Granted Application Roles

Eugene Lucas 0 Reputation points
2026-02-18T15:56:11.22+00:00

User's image

User's image

User's image

I configured multiple Microsoft Graph Application permissions in Azure AD and granted admin consent.

However, when requesting a token,The access token only contains some of the roles, not all.

What could cause Graph to exclude certain application permissions from the token?

Microsoft Security | Microsoft Graph

1 answer

Sort by: Most helpful
  1. Lionel TRAVERSE 0 Reputation points MVP
    2026-04-06T16:04:09.77+00:00

    Hello,

    For your issue, when application permissions are granted via consent, they are normally visible in the access token, but I have already seen a delay of up to 24 hours before the permissions appear. Do you have the issue after waiting some hours ?

    For your information, application permissions can be assigned with "ADMIN CONSENT" or with "APPRBAC". When permissions are assigned using APPRBAC, they do not appear in the token. Since the number of scoping associated with permissions granted via consent is limited, many large companies are now using APPRBAC for application permissions. In this case, the ROLES field in the token will be empty. Please be very careful, as you may encounter situations where the roles field is empty even though the permissions are correctly configured.

    Regards,

    Lionel

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.